Introduction
All
but the most basic of networks require devices to provide connectivity and functionality.
understanding how these networking devices operate and identifying the
functions they perform are essential skills for any network administrator and
are requirements for a Network+ candidate. This chapter introduces commonly
used networking devices. Although it is true that you are not likely to
encounter all the devices mentioned in this chapter on the exam, you can be assured
of working with at least some of them.
Networking Devices
- Hub, Repeater, Modem, Network Interface Card (NIC), Media converters, Basic switch, Bridge, Wireless access point, Basic router, Basic firewall, Basic DHCP server, Multilayer switch, Bandwidth shaper
Hub
At the bottom of the networking food chain, so to speak, are hubs. Hubs are used in networks that use twisted-pair cabling to connect devices. Hubs also can be joined to create larger networks. Hubs are simple devices that direct data packets to all devices connected to the hub, regardless of whether the data package is destined for the device. This makes them inefficient devices and can create a performance bottleneck on busy networks.
In its most basic form, a hub does nothing except provide a pathway for the electrical signals to travel along. Such a device is called a passive hub. Far more common nowadays is an active hub, which, as well as providing a path for the data signals, regenerates the signal before it forwards it to all the connected devices. In addition, an active hub can buffer data before forwarding it. However, a hub does not perform any processing on the data it forwards, nor does it perform any error checking.
Multistation Access Unit
In a token ring network, a multistation access unit (MSAU) is used in place of the hub that is used on an Ethernet network. The MSAU performs the token circulation inside the device, giving the network a physical star appearance. It functions as a logical ring. The logical ring function is performed from within the MSAU. Each MSAU has a ring in (RI) port on the device, which is connected to the ring out (RO) port on another MSAU. The last MSAU in the ring is then connected to the first to complete the ring. Because token ring networks are few and far between nowadays, it is far more likely that you will find yourself working with Ethernet hubs and switches.
Switches
Like hubs, switches are the connectivity points of an Ethernet network. Devices connect to switches via twisted-pair cabling, one cable for each device. The difference between hubs and switches is in how the devices deal with the data they receive. Whereas a hub forwards the data it receives to all the ports on the device, a switch forwards it to only the port that connects to the destination device. It does this by learning the MAC address of the devices attached to it and then by matching the destination MAC address in the data it receives. By forwarding data to only the connection that should receive it, the switch can greatly improve network performance. By creating a direct path between two devices and controlling their communication, the switch can greatly reduce the traffic on the network and therefore the number of collisions. As you might recall, collisions occur on Ethernet networks when two devices attempt to transmit at exactly the same time. In addition, the lack of collisions enables switches to communicate with devices in full-duplex mode. In a full-duplex configuration, devices can send data to and receive data from the switch at the same time. Contrast this with half-duplex communication, in which communication can occur in only one direction at a time. Full-duplex transmission speeds are double that of a standard half-duplex connection. So, a 10Mbps connection becomes 20Mbps, and a 100Mbps connection becomes 200Mbps.
Bridges
Bridges are used to divide larger networks into smaller sections. Bridges accomplish this by sitting between two physical network segments and managing the flow of data between the two. By looking at the MAC address of the devices connected to each segment, bridges can elect to forward the data (if they believe that the destination address is on another interface) or block it from crossing (if they can verify that it is on the interface from which it came).
When bridges were introduced, the MAC addresses of the devices on the connected networks had to be entered manually. This was a time-consuming process that had plenty of opportunity for error. Today, almost all bridges can build a list of the MAC addresses on an interface by watching the traffic on the
network. Such devices are called learning bridges because of this functionality.
network. Such devices are called learning bridges because of this functionality.
Types of Bridges
Three types of bridges are used in networks:
Transparent bridge: Derives its name from the fact that the devices on the network are unaware of its existence. A transparent bridge does nothing except block or forward data based on the MAC address.
Source route bridge: Used in token ring networks. The source route bridge derives its name from the fact that the entire path that the packet is to take through the network is embedded in the packet.
Translational bridge: Used to convert one networking data format to another, such as from token ring to Ethernet and vice versa.
Routers
In a common configuration, routers are used to create larger networks by joining two network segments. A small office, home office (SOHO) router is used to connect a user to the Internet. A SOHO router typically serves 1 to 10 users on the system. A router can be a dedicated hardware device or a computer system with more than one network interface and the appropriate routing software. All modern network operating systems include the functionality to act as a router.A router derives its name from the fact that it can route data it receives from one network to another. When a router receives a packet of data, it reads the packet’s header to determine the destination address. After the router has determined the address, it looks in its routing table to determine whether it knows how to reach the destination; if it does, it forwards the packet to the next hop on the route. The next hop might be the final destination, or it might be another router.
Gateways
Any device that translates one data format into another is called a gateway. Some examples of gateways include a router that translates data from one network protocol into another, a bridge that converts between two networking systems, and a software application that converts between two dissimilar formats. The key point about a gateway is that only the data format is translated, not the data itself. In many cases, the gateway functionality is incorporated into another device.Don’t confuse a gateway with the term default gateway. The term default gateway refers to a router to which all network transmissions not destined for the local network are sent. Don’t confuse a gateway with the term default gateway. The term default gateway refers to a router to which all network transmissions not destined for the local network are sent.
Network Cards
A network card, also called a network interface card (NIC), is a device that enables a computer to connect to the network. When specifying or installing a NIC, you must consider the following issues:
Types of Network Interfaces
Network interfaces come as add-in expansion cards or as PCMCIA cards used in laptop systems. In some cases, rather than having an add-in NIC, the network interface is embedded into the motherboard.
A network interface typically has at least two LEDs that indicate certain conditions:
Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wireless LAN (WLAN). APs typically are a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports, giving you a way to expand the network to support additional clients.
Depending on the size of the network, one or more APs might be required. Additional APs are used to allow access to more wireless clients and to expand the range of the wireless network. Each AP is limited by a transmission range the distance a client can be from an AP and still get a usable signal. The actual distance depends on the wireless standard being used and the obstructions and environmental conditions between the client and the AP.
Modems
A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format that the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up a LAN. Modems can be internal add-in expansion cards or integrated with the motherboard, external devices that connect to a system’s serial or USB port, PCMCIA cards designed for use in laptops, or proprietary devices designed for use on other devices, such as portables and handhelds. The configuration of a modem depends on whether it is an internal or external device. For internal devices, the modem must be configured with an interrupt request (IRQ) and a memory I/O address. It is common practice, when installing an internal modem, to disable the built-in serial interfaces and assign the modem the resources of one of them (typically COM2). Table shows the resources associated with serial (COM) port assignments. Which Given Below.
For external modems, you need not concern yourself directly with these port assignments, because the modem connects to the serial port and uses the resources assigned to it. This is a much more straightforward approach and one favored by those who work with modems on a regular basis. For PCMCIA and USB modems, the plug-and-play nature of these devices makes them simple to configure, and no manual resource assignment is required. After the modem is installed and recognized by the system, drivers must be configured to enable use of the device.
Two factors directly affect the speed of the modem connection the speed of the modem itself and the speed of the Universal Asynchronous Receiver/Transmitter (UART) chip in the computer that is connected to the modem. The UART chip controls a computer’s serial communication. Although modern systems have UART chips that can accommodate far greater speeds than the modem is capable of, older systems should be checked to make sure that the UART chip is of sufficient speed to support the modem speed. Normally you can determine which UART chip is installed in the system by looking at the documentation that comes with the system.
UART Chip Speeds
Firewalls
A firewall is a networking device, either hardware- or software-based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls typically are placed at a network’s entry/exit points—for example, between an internal network and the Internet. After it is in place, a firewall can control access into and out of that point.
As mentioned, firewalls can be implemented through software or through a dedicated hardware device. Organizations implement software firewalls through network operating systems (NOSs) such as Linux/UNIX, Windows servers, and Mac OS servers. The firewall is configured on the server to allow or block certain types of network traffic. In small offices and for regular home use, a firewall is commonly installed on the local system and is configured to control traffic. Many third-party firewalls are available.
DHCP Server
Repeaters
Network Cards
A network card, also called a network interface card (NIC), is a device that enables a computer to connect to the network. When specifying or installing a NIC, you must consider the following issues:
System bus compatibility: If the network interface you are installing is an internal device, bus compatibility must be verified. The most common bus system in use is the Peripheral Component Interconnect (PCI) bus, but some older systems might still use Industry Standard Architecture (ISA) expansion cards.
System resources: Network cards, like other devices, need Interrupt Request (IRQ) and memory I/O addresses. If the network card does not operate correctly after installation, there might be a device conflict.
Media compatibility: Today, the assumption is that networks use twisted- pair cabling, so if you need a card for coaxial or fiber-optic connections, you must specify this. Wireless network cards are also available.
Types of Network Interfaces
Network interfaces come as add-in expansion cards or as PCMCIA cards used in laptop systems. In some cases, rather than having an add-in NIC, the network interface is embedded into the motherboard.
A network interface typically has at least two LEDs that indicate certain conditions:
Link light: This LED indicates whether a network connection exists between the card and the network. An unlit link light indicates that something is awry with the network cable or connection.
Activity light: This LED indicates network activity. Under normal conditions, the light should flicker sporadically and often. Constant flickering might indicate a very busy network or a problem somewhere on the network that is worth investigating.
Speed light: This LED indicates that the interface is connected at a certain speed. This feature normally is found on Ethernet NICs that operate at 10Mbps/100Mbps—and then only on certain cards.Wireless Access Points
Wireless access points (APs) are a transmitter and receiver (transceiver) device used to create a wireless LAN (WLAN). APs typically are a separate network device with a built-in antenna, transmitter, and adapter. APs use the wireless infrastructure network mode to provide a connection point between WLANs and a wired Ethernet LAN. APs also typically have several ports, giving you a way to expand the network to support additional clients.
Depending on the size of the network, one or more APs might be required. Additional APs are used to allow access to more wireless clients and to expand the range of the wireless network. Each AP is limited by a transmission range the distance a client can be from an AP and still get a usable signal. The actual distance depends on the wireless standard being used and the obstructions and environmental conditions between the client and the AP.
Modems
A modem, short for modulator/demodulator, is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines. The modem at the receiving end converts the signal back into a format that the computer can understand. Modems can be used as a means to connect to an ISP or as a mechanism for dialing up a LAN. Modems can be internal add-in expansion cards or integrated with the motherboard, external devices that connect to a system’s serial or USB port, PCMCIA cards designed for use in laptops, or proprietary devices designed for use on other devices, such as portables and handhelds. The configuration of a modem depends on whether it is an internal or external device. For internal devices, the modem must be configured with an interrupt request (IRQ) and a memory I/O address. It is common practice, when installing an internal modem, to disable the built-in serial interfaces and assign the modem the resources of one of them (typically COM2). Table shows the resources associated with serial (COM) port assignments. Which Given Below.
Common
Serial (COM) Port Resource Assignments
Port ID
|
IRQ
|
I/O Address
|
Associated Serial Interface
Number
|
COM1
|
4
|
03F8
|
1
|
COM2
|
3
|
02F8
|
2
|
COM3
|
4
|
03E8
|
1
|
COM4
|
3
|
02E8
|
2
|
For external modems, you need not concern yourself directly with these port assignments, because the modem connects to the serial port and uses the resources assigned to it. This is a much more straightforward approach and one favored by those who work with modems on a regular basis. For PCMCIA and USB modems, the plug-and-play nature of these devices makes them simple to configure, and no manual resource assignment is required. After the modem is installed and recognized by the system, drivers must be configured to enable use of the device.
Two factors directly affect the speed of the modem connection the speed of the modem itself and the speed of the Universal Asynchronous Receiver/Transmitter (UART) chip in the computer that is connected to the modem. The UART chip controls a computer’s serial communication. Although modern systems have UART chips that can accommodate far greater speeds than the modem is capable of, older systems should be checked to make sure that the UART chip is of sufficient speed to support the modem speed. Normally you can determine which UART chip is installed in the system by looking at the documentation that comes with the system.
UART Chip Speeds
UART Chip
|
Speed (Kbps)
|
8250
|
9600
|
16450
|
9600
|
16550
|
115,200
|
16650
|
430,800
|
16750
|
921,600
|
16950
|
921,600
|
Firewalls
A firewall is a networking device, either hardware- or software-based, that controls access to your organization’s network. This controlled access is designed to protect data and resources from an outside threat. To do this, firewalls typically are placed at a network’s entry/exit points—for example, between an internal network and the Internet. After it is in place, a firewall can control access into and out of that point.
As mentioned, firewalls can be implemented through software or through a dedicated hardware device. Organizations implement software firewalls through network operating systems (NOSs) such as Linux/UNIX, Windows servers, and Mac OS servers. The firewall is configured on the server to allow or block certain types of network traffic. In small offices and for regular home use, a firewall is commonly installed on the local system and is configured to control traffic. Many third-party firewalls are available.
DHCP Server
Without
question, the easiest way to assign TCP/IP information to client systems is to
use a Dynamic Host Configuration Protocol (DHCP) server. On a network running
TCP/IP, each computer must have a unique IP address in order to be recognized
and be part of the network. Briefly, a protocol is a
method of communicating between computers.
Computers
on a network using TCP/IP require specific network settings to be able to
connect to the network. First among these settings is the IP address. An IP
address consists of four octets, or
four sets of 8 bits—for example, 192.168.2.1. Each computer on the network must
have one of these numbers in order to perform network functions through TCP/IP.
The number must be unique to the PC and must be within a certain range to allow
the PC to connect to other systems. In larger networks, the assignment of
manual addresses can be a nightmare, especially when IP addressing schemes can
be changed and computers can be moved, retired, or replaced. That’s where DHCP
comes in. DHCP assigns IP addresses, eliminating the need to assign IP
addresses individually and making the job of network administrators
considerably easier. When a DHCP server is running on a network, the
workstation boots up and requests an IP address from the server. The server
responds to the request and automatically assigns an IP address to the computer
for a given period of time, known as a lease.
The workstation acknowledges the receipt of the IP address, and the workstation
has all the information it needs to become part of the network. This
communication between the server and the workstation happens completely
automatically and is invisible to the computer user.
Repeaters
Data
signals weaken as they travel down a particular medium. This is known as attenuation.
To increase the distance a signal can travel,
you can use repeaters. Repeaters increase the cable’s usable length and
are commonly used with coaxial network configurations. Because coaxial networks
have fallen out of favor, and because the functionality of repeaters has been
built in to other devices, such as hubs and switches, repeaters are rarely used
as an independent device.
Specialized
Network Devices
Any
network is composed of many different pieces of hardware. Some, like firewalls and
DHCP servers,are in most networks. Other devices are more specialized and are
not found in every network environment. CompTIA lists the following as
specialized networking devices:
- Multilayer and content switch
- IDS and IPS
- Load balancer
- Multifunction network devices
- DNS server
- Bandwidth shaper
- Proxy server
- CSU/DSU
Multilayer
and Content Switches
It
used to be that networking devices and the functions they performed were pretty
much separate. We had bridges, routers, hubs, and more, but they were separate
devices. Over time, the functions of some individual network devices became
integrated into a single device. This is true of multilayer switches. A
multilayer switch is one that can operate at both Layer 2 and Layer 3 of the OSI
model, which means that the multilayer device can operate as both a switch and
a router. Also called a Layer 3 switch, the multilayer switch is a
high-performance device that actually supports the same routing protocols that
routers do. It is a regular switch directing traffic within the LAN; in
addition, it can forward packets between subnets.
Intrusion
Detection and Prevention Systems
Administrators
can use several methods to help secure the network. In addition to a firewall,
an intrusion detection system (IDS) and intrusion prevention system (IPS) can
be used. Both are designed to help identify unwanted network access and traffic;
however, they work in slightly different ways. An IDS is either a hardware- or
software-based device that constantly monitors inbound and outbound network
traffic. The IDS uses built-in parameters to flag and document any traffic it
determines to be suspicious or potentially dangerous. But that is where the IDS
stops. It does not actively try to manage the threat. Instead, it identifies
the threat, and then the administrator must monitor the IDS to see what the
problem might be. Although it doesn’t try to fix the potential threat, the IDS
can be configured to send an alert to the administrator, notifying him or her
of a potential threat and security breach.
An
IDS can be deployed as a host-based (resident to a single system) or
networkbased (watches all network traffic) device. In either case, an IDS
cannot replace a firewall, because they have different functions. The firewall
monitors secured access between two networks such as a business and the
Internet and prevents unwanted traffic from entering the network. The IDS
inspects an intrusion after it has taken place—that is, after it has passed the
firewall. An IDS also watches for threats from within the network while the
firewall operates on the network perimeter.
Load
Balancer
Network
servers are the workhorses of the network. They are relied on to hold and
distribute data, maintain backups, secure network communications, and more. The
load of servers is often a lot for a single server to maintain. This is where
load balancing comes into play. Load balancing is a technique in which the
workload is distributed between several servers. This feature can take networks
to the next level; it increases network performance, reliability, and
availability.
Multifunction
Network Devices
It
used to be that each device on a network (firewall, router, repeater, hub, to name
a few) had its own purpose. It wasn’t long before the functions of these individual
devices were combined into single units, creating multifunction network devices.
Consider a high-speed cable modem used by home users or small companies to
access the Internet. These are multifunction network devices that have combined
functionality, including firewall, DHCP server, wireless access point, switch,
and router. Networks are full of multifunction devices, including switches,
routers, servers, and more.
Multifunction
devices offer some advantages over multiple independent devices or software
packages. Suppose an organization maintains antivirus, firewall, content
filtering, and IDS/IPS software on a single server or even several servers.
This organization must pay for the software on each of the servers, the operating
system, and the personnel to maintain the systems. All of this can be simply
replaced with a single multifunction network device.
DNS
Server
A
Domain Name System (DNS) server performs a relatively basic, but vital, role
for many organizations. The function of a DNS server is relatively simple in
that it provides name resolution from hostnames to IP addresses. The measures
to which the server goes to provide a successful resolution, however, are not
so simple. As well as consulting its own databases for the requested
information, a DNS server contacts other DNS servers as needed to get the necessary
information. This process might involve a large number of queries.
As
you may know, each device on a network requires a unique IP address so that it
can provide services to clients. Rather than rely on flawed human memory to
remember these addresses, DNS allows us to use easy-to-remember hostnames, such
as comptia.org, to access these hosts. When we type www.comptia.org into a web
browser, our configured DNS server takes the request and searches through a
system of servers to find the correct TCP/IP address that relates to
www.comptia.org. After the DNS server has ascertained the correct TCP/IP
address, that address is returned to the client, which then contacts the IP
address directly. To speed up subsequent requests for the same address, the DNS
server adds the address to its cache. For a workstation to send requests to the
DNS server, the TCP/IP address of the DNS server must be provided to the
workstations. This can be done manually, or the address can be included in the
information supplied by a DHCP (Dynamic Host Configuration Protocol) server.
Before
DNS was used, resolution of hostnames to IP addresses was (and still is in some
cases) performed through static text files called HOSTS files. These text files
quickly became too large to manage easily and therefore were replaced by DNS.
The
function of DNS remains largely hidden from most users, but our reliance on the
system is amazingly
high.
In January 2001, a Microsoft employee made a configuration change to one of
Microsoft’s DNS ervers. The change
caused an error that rendered some Microsoft-hosted websites, including the
popular Hotmail system, inaccessible for a number of hours. The servers were up
and running, but they simply could not be reached.
Most
common operating systems provide the capability to act as a DNS server. Some
implementations are more sophisticated than others, but the basic principle of
hostname-to-TCP/IP address resolution remains the same.
The
amount of computing power required by a DNS server is proportional to the
number of DNS requests that it will handle. Within an organization, records
might be configured for only a relatively small number of hosts, and there
might be only a small number of client requests. In such an environment, it
would be unlikely to have a server dedicated to DNS functions. In contrast, a
DNS server for an Internet service provider would need to be powerful enough to
accommodate perhaps millions of requests per hour.
Bandwidth Shaper
The
demand for bandwidth on networks has never been higher. Internet and intranet
applications demand a large amount of bandwidth. Administrators have to ensure
that despite all these demands, adequate bandwidth is available for
mission-critical applications while few resources are dedicated to spam or peerto-
peer downloads. To do this, you need to monitor network traffic to ensure that
data is flowing as you need it to. The term bandwidth
shaping describes the mechanisms used to control
bandwidth usage on the network. With this, administrators can control who uses
bandwidth, for what purpose, and what time of day bandwidth can be used.
Bandwidth shaping establishes priorities for data traveling to and from the
Internet and within the network. A bandwidth shaper, essentially performs two
key functions— monitoring and shaping. Monitoring includes identifying where
bandwidth usage is high and the time of day. After that information is
obtained, administrators can customize or shape bandwidth usage for the best
needs of the network.
Proxy Server
Proxy
servers typically are part of a firewall system. In fact, they have become so
integrated with firewalls that the distinction between the two can sometimes be
lost.
However,
proxy servers perform a unique role in the network environment—a role that is
very separate from that of a firewall. For the purposes of this book, a proxy
server is defined as a server that sits between a client computer and the
Internet, looking at the web page requests the client sends. For example, if a
client computer wants to access a web page, the request is sent to the proxy
server rather than directly to the Internet. The proxy server first determines
whether the request is intended for the Internet or for a web server locally.
If the request is intended for the Internet, the proxy server sends the request
as if it originated the request.
When the Internet web server returns the information, the proxy server returns
the information to the client. Although a delay might be induced by the extra
step of going through the proxy server, the process is largely transparent to
the client that originated the request. Because each request a client sends to
the Internet is channeled through the proxy server, the proxy
server
can provide certain functionality over and above just forwarding requests.
One
of the biggest of these extra features is that proxy servers can greatly
improve network performance through a process called caching. When a caching proxy
server answers a request for a web page, the server makes a copy of all or part
of that page in its cache. Then, when the page is requested again, the proxy
server answers the request from the cache rather thangoing back to the
Internet. For example, if a client on a network requests the web page
www.comptia.org, the proxy server can cache the contents of that web page. When
a second client computer on the network attempts to access the same site, that
client can grab it from the proxy server cache, and accessing the Internet is
unnecessary. This greatly increases the response time to the client and can
significantly reduce the bandwidth needed to fulfill client requests.
Nowadays,
speed is everything, and the ability to quickly access information from the
Internet is a crucial concern for some organizations. Proxy servers and their
ability to cache web content accommodate this need for speed. An example of
this speed might be found in a classroom. If a teacher asks 30 students to
access a specific Uniform Resource Locator (URL), without a proxy server, all
30 requests would be sent into cyberspace and subjected to delays or other
issues that might arise. The classroom scene with a proxy server is quite
different. Only one request of the 30 finds its way to the Internet; the other
29 are filled by the proxy server’s cache. Web page retrieval can be almost
instantaneous.
CSUs/DSUs
A
Channel Service Unit/Data Service Unit (CSU/DSU) acts as a translator between
the LAN data format and the WAN data format. Such a conversion is necessary
because the technologies used on WAN links are different from those used on
LANs. Some consider a CSU/DSU a type of digital modem. But unlike
a
normal modem, which changes the signal from digital to analog, a CSU/DSU changes
the signal from one digital format to another.
A
CSU/DSU has physical connections for the LAN equipment, normally via a serial
interface, and another connection for a WAN. Traditionally, the CSU/DSU has
been in a box separate from other networking equipment. However, the increasing
use of WAN links means that some router manufacturers are now including CSU/DSU
functionality in routers or are providing the expansion capability to do so.
Network Devices Summary
Network Devices Summary
Device
|
Description
|
Key
Points
|
Hub
|
Connects
devices on an Ethernet twisted-pair network.
|
A hub does not perform
any tasks besides signal regeneration.
|
Switch
|
Connects
devices on a twisted-pair network.
|
A switch forwards data to its
destination by using the MAC address embedded in each packet.
|
Repeater
|
Regenerates
data signals.
|
The function a
repeater provides
typically is built in
to other
devices such as
switches.
|
Bridge
|
Connects
LANs to reduce overall network traffic.
|
A bridge allows data
to pass through it or prevents data from passing through it by reading the
MAC address.
|
Router
|
Connects
networks.
|
A router uses the softwareconfigured
network address to make
forwarding decisions.
|
Gateway
|
Translates
from one data format into another.
|
Gateways can be hardware or
softwarebased. Any device that translates data formats is called a gateway.
|
CSU/DSU
|
Translates
digital signals used on a LAN into those used on a WAN
|
CSU/DSU functionality is
sometimes incorporated into other devices, such as a router with a WAN connection.
|
Modem
|
Provides
serial communication capabilities across phone lines.
|
Modems modulate the digital
signal into analog at the sending end and perform the reverse function at the
receiving end.
|
Network
card
|
Enables
systems to connect to the network.
|
Network interfaces can
be add-in expansion cards, PCMCIA cards, or built-in interfaces.
|
Media
converter
|
Interconnects
older technology with new.
|
A media converter is a
hardware device that connects newer Gigabit Ethernet technologies with older
100BaseT networks or older copper standards with fiber.
|
Firewall
|
Provides
controlled data access between networks.
|
Firewalls can be hardware- or
softwarebased. They are an essential part of a network’s security strategy
|
DHCP
server
|
Automatically distributes information.
|
DHCP assigns all IP information,
including IP address, subnet mask, DNS, gateway, and more.
|
Multilayer
switch
|
Functions
as a switch or router
|
Operates on Layers 2
and 3 of the OSI model as a switch and can perform router functionality
|
Content
switch
|
Forwards
data by application.
|
Content switches can
identify and forward data by its port and application
|
Load
balancer
|
Distributes
network load.
|
Load balancing increases redundancy by
distributing the load to multiple servers.
|
Multifunction
devices
|
Combines
network services
|
These are hardware devices that combine
multiple network services into a single device reducing
cost and easing administrative difficulty.
|
DNS
server
|
Provides
name resolution from hostnames to IP addresses.
|
A DNS server answers clients’
requests to translate hostnames into IP addresses.
|
Bandwidth
shaper
|
Manages
network bandwidth.
|
The bandwidth shaper
monitors and controls bandwidth usage.
|
Proxy
server
|
Manages
client Internet requests.
|
Serves two key network functions increases
network performance by caching, and filters outgoing client requests.
|
No comments:
Post a Comment