Network Hardware

Network Hardware

Routers

  • Routers are central devices that help in connecting multiple networks together.

  • They are responsible for managing the best path for data transfer between networks.

  • They ensure that data packets reach their intended destinations through the most effective and efficient route.

Switches

  • Switches are crucial for connecting multiple devices to a single network.

  • They control data flow within the network, ensuring that data reaches the right destination within the network.

  • Unlike routers, switches work within a single network and not across different networks.

Hubs

  • Hubs are often used as a simpler connector for small scale networks.

  • They transmit data to all devices in a network, regardless of the destination.

  • Hubs are less efficient than switches, as they don’t direct data, leading to higher network traffic.

Network Interface Card (NIC)

  • Network Interface Card (NIC) is a crucial hardware component located inside the computer.

  • A NIC provides the physical connection to a network by translating data into a form transmittable over the network.

  • Each NIC has a unique MAC address for identification purposes.

Access Points

  • Access points are used in wireless networks to transmit and receive wireless signals.

  • They serve as the communication hub by linking wireless devices to a wired network.

  • Basic access points simply extend the reach of an existing network, while more advanced ones could provide additional functionalities like security features.

Modems

  • Modems are devices that modulate (convert) digital signals to analogue and demodulate (convert) analogue signals to digital.

  • They enable data to be transmitted over communication lines such as phone lines or cable.

  • The word “Modem” is derived from its function, which is MOdulator/DEModulator.

Firewall

  • Firewalls are network security devices that monitor and control incoming and outgoing network traffic.

  • They establish a barrier between secured internal networks and untrusted external networks, such as the internet.

  • They are an important part of a network’s defense system, blocking unauthorized access while allowing legitimate communication.