Formulas and K-Values
How does the Eigrp wide metric calculation work?
Networks Devices and Their Functions
In the digital era, people around the world are connected just because of networking devices. These devices play a vital role in communication and provide an online platform for people to get in touch with other people across the globe.
They can communicate through the internet, social media, and other modes of communication like cell phones, laptops, etc. It’s enough to mention It's all possible due to networking devices only.
The base of social media is the internet, even smartphones have networking equipment fitted to them. Some of the big networking companies have made it possible towards connecting people around the globe. Let's know some basic networks devices and their functions that are widely used in many organizations.
Also read - What Is A Home Router?
What is Hub in Networking
A hub is a networking device that is used to connect multiple Ethernet devices together. Hub has several ports that are used to connect two or more Ethernet devices together. It is a Layer 1 device and uses twisted-pair cabling to connect devices.
Basically, a hub does nothing it just provides a path for the data signals. In addition, a hub does not perform any error checking and re-transmits any data packets or frames it receives on all its connected devices regardless of whether the data package is destined for the particular device.
Hubs typically do not filter data that introduces congestion within the network. Some important points should be mentioned here.
- No routing and no MAC table available
- 1 broadcast domain per device
- 1 collision domain per device
- HUB can not create VLAN
- It is a Layer 1 (Physical Layer) Device
The Function of Bridge in Networking
Types of Bridges in Networking
Generally, there are 3 types of bridges used in networking.
Source route type bridge is designed by the Tech giant IBM and used in token ring networks. The source route bridge determines the path between two host machines uses the frame's MAC destination address to direct it by the source routing algorithm. It learns its bridging information embedded within the frame.
Transparent bridges its name suggest the devices on the network are uninformed of its presence. It does nothing except forward or blocking data packets based on physical address. It connects network segments with other bridges using similar media to make all routing decisions. All operations are transparent to devices connected to the network.
A transnational bridge in networking can be used to connect two different networks like Ethernet to Token Ring. It forward frames between LANs that utilize different network protocols.
When a host wants to communicate with another host in a different network like a token to an Ethernet network, it transmits the frame (token ring frame) that the bridge receives, and rebuilds in Ethernet format. The bridge then transmits the frame to the destination host.
- No routing but the MAC table is available
- 1 broadcast domain per device
- 1 collision domain per port
- The bridge can not create Vlan
- It is a Layer 2 (Data Link Layer) Device
- Bridges are more expensive than the repeaters and hubs.
Switch In Networking
Switches form the backbone of any network. The switch is an intelligent device and is widely used in modern networks. Ethernet switches or LAN switches are used to interconnect multiple networking devices together such as computers, printers, and wireless access points, and allow for exchanging data packets.
A switch provides wired connections to routers, servers, desktop computers, printers wireless access points, and some IoT devices. A switch operates on both the data link layer (layer 2) and network layer (layer 3) of the OSI model. Layer 2 switch determines the path by looking at the physical device address (or MAC address) while the network switch performs based on the IP routing table and provides the shortest path for the destination host.
Switches maintain their own MAC tables. The switch has multiple ports for plugging in network cables. There are 4-port, 8-port, 16-port 32-ports, 48 ports, and 52 ports switches available in the market.
- No routing but the MAC table is available
- 1 broadcast domain per device
- 1 collision domain per port
- The switch can create VLAN
- It is a Layer 2 (Data Link Layer) Device
What is a Router and how does it work
We are all relying on a router for an Internet connection. Routers are responsible for maintaining data flow between different networks and for keeping internal networks connected to the Internet.
A router is a Layer 3 device that is used to connect two different network segments and provide communication between them. Each router maintains its own routing table and determines the best path. it routes the data packets to their intended IP addresses.
The router reads a packet's header to determine the destination address, then checks the routing table and provides the best path to that destination. It allows multiple devices to connect to the Internet simultaneously. Router exchange data between LAN and WAN. Generally, routers are operated at the gateways of networks.
- Maintain Routing table and manage traffic
- ARP table uses the IP address to determine the physical (MAC) address of the gateway.
- 1 broadcast domain per port
- 1 collision domain per port
- L3 Device (Network Layer)
Different types of Routers
According to the application category, there are five major types of routers on the market. Wired routers, wireless routers, core routers, edge routers, and VPN routers are all types of routers. When deciding on a router, the following basic information is provided to assist you in making the best decision.
Wired Routers
Older routers that receive and deliver data packets via both ends of a cable connection are known as wired routers. A wired router connects to a PC through a cable. One port receives Internet packets via modem, while the other connects to a computer and distributes the processed packets. The Ethernet broadband router is one of the most used wired routers.
Typically, wired routers are made box-shaped, and use an Ethernet cable to connect to a modem for receiving Internet data packets. There are many ports in the router. One port allows the router to connect to a modem while another set of ports allows connecting the other devices for distributing data packets within the network.
Such routers support the network address translation (NAT) method to connect internal devices to the WAN. It uses Dynamic Host Configuration Protocol (DHCP) to assign an IP address to the devices connected to the networks.
Wireless routers are more advanced because they use radio waves to deliver data to computers and other electrical devices.
Wireless Routers
Like a wired router, a wireless router uses an Ethernet cable to connect directly to a modem for receiving data packets. However, instead of using another set of cables for distributing Internet data packets, uses one or more wireless antennas.
A wireless router is distinguished from a wired router. It is common in offices, homes, and other public places. Wireless routers, like wired routers, receive data packets over wired broadband, convert the binary-code packets into radio signals picked up by electronic devices, and then convert them back into previous packets.
Wireless signals, as opposed to wired routers, are the medium through which packets are sent to electronic devices. The routers convert the data packets into radio signals, which the antennas broadcast wirelessly. Unlike wired connection, the wireless router establishes wireless LAN (WLAN) which is known as WiFi. So, as long as your device is within range of the signal, all you need to do to access the Internet is enter a specific ID and password.
The WiFi network, with which we are all too familiar, is the most widely used wireless router. There is no limit to the number of users who can connect to the network with passwords, assuming your router is strong enough. Wireless routers are popular in the market due to their ease of use and high load capacity. To protect a wireless network, wireless routers provide MAC address filtering and (WPA) security.
Virtual Routers
Unlike a wired or wireless router, a virtual router is a software application that uses Virtual Router Redundancy Protocol (VRRP) and performs the same function as a standard hardware router. It becomes active when a physical router fails or is disabled for some reason. A VPN router is similar to a standard Gigabit router that has VPN client software installed on it. VPN protects every device that connects to the VPN router. VPN routers, whether in your home, office or business, can provide a variety of VPN benefits to all devices.
Edge Routers
In simple words, an edge router communicates with both external routers and core routers. Edge routers operate at the edge of a network and use the Border Gateway Protocol - BGP to exchange data from other networks. Edge routers sit at network intersections, distributing packets across various networks and allowing several networks to speak with one another. The core router, on the other hand, is connected to the same network and handles huge data transfers quickly.
As the name implies, an edge router is located at the network's edge or boundary and distributes packets across multiple networks, but not within the same network. It is typically linked to the network of an Internet service provider (ISP) or another organization. Their job is to keep your network connected to other networks smoothly, and they can be wired or wireless routers. The edge router can communicate with the core router as well.
Core Routers
Unlike the routers used within SOHO networks, Core routers operate at the core of a network and it is used by large corporations and businesses that manage a high volume of data packets within their network. Core routers do not communicate with external networks. In contrast to edge routers, core routers distribute packets within the same network rather than across multiple networks. It is in charge of large data transfers and operates on the Internet's backbone. It is capable of achieving high-speed communication interface transmission for a wide range of communication interfaces, allowing all IP packets to move at full speed.
Because core routers can connect distributed routers from multiple large enterprises or community locations in some cases, high performance is a must.
I hope you are now familiar with the different Networks Devices available in the market. It will help you when choosing the correct network device through this analysis of the characteristics and pertinent information.
Dynamic Multipoint-VPN - Definition and Practical Guide
What is Dynamic Multipoint - VPN?
GRE Multipoint
Next Hop Resolution Protocol (NHRP)
Next Hop Resolution Protocol (NHRP) Phase 1
DMVPN Configuration - Phase 1, 2, 3
Integrating IPsec with DMVPN
FAQs: Dynamic Multipoint-VPN
Q: What is the distinction between SSL VPN and remote access VPN?
Q: SSL or VPN, which is more secure?
Q: Is DMVPN only available from Cisco?
MPLS + MPLS VPN Configuration Step by Step
What exactly does MPLS stand for?
What exactly is an MPLS network, and how does it work?
Why do we require MPLS?
Components OF MPLS
- Only the edge points (ingress and egress) must comprehend the meaning of the inner network information (prefixes); core routers simply switch traffic based on labels.
- You can easily and explicitly redirect tunnel traffic.
- Tunnels within tunnels can be built.
- The tunnel is less susceptible to data spoofing.
- The overhead associated with MPLS is relatively low (4 bytes per MPLS header)