Sunteți pe pagina 1din 19

Different types of

devices used to create a


computer network
Client is the term used to mention a workstation, a normal
desktop computer, or a laptop which an end user uses to
perform his normal duties in the office. The term client
computer is used to refer any device which participate in the
Client network.
Workstation is the term used for a high-end type computer
which has much more memory and processing power than a
Workstation normal desktop computer. Workstation computers are used
Computer for computing tasks which require more memory and
processing power than normal computing. Examples are
video rendering, 2D CAD drafting, 3D CAD drafting, heavy
image editing etc.
A server is a high configuration special computer, which
serves resources to clients. A typical computer network uses
different types of servers. Examples of servers used in a
network are file server, print server, database server, mail
Server
server, web server, DNS server, DHCP server, video streaming
server etc. Servers normally run continuously 24/7. An
unexpected shutdown of a server may cause entire operation
of the business down.
Network media is used to connect different devices in a
network together. Commonly used network media in wired
Network
networks are copper twisted pair cables. Optical fiber cables
Media
are also used to connect different devices in wired networks.
Wireless networks use electromagnetic waves to connect
different devices together.
Network
media (cable)
A hub (Ethernet hub) is a network connectivity device used to
connect clients during the early days of computer networking. A
network hub receives traffic from a device in the port where the
device is connected. Ethernet hub then forwards the received
traffic out to all its other ports. As a result, all the clients in the
Network Hub
network receive the traffic which is a burden to other clients
which are not the intended recipient. This nature of operation of
Ethernet hubs can cause large amount of unnecessary traffic in
the network. Hubs are out from the computer networking
industry and not even available in the market to purchase.
Network hub
A layer 2 switch is another type of connectivity device widely used
these days. Layer 2 switches operate at
Layer 2 of OSI reference model. A network switch has the capability
to learn which devices are connected to its ports. Switches learn
Network about connected devices by using a unique device address called as
Switch Media Access Control (MAC) address or Layer 2 address. Using
Media Access Control (MAC) address or Layer 2 addresses, a Layer 2
switch can forward the packet only to the intended recipient, not to
every device in the network. A network switch is commonly used to
connect the devices inside a OSI Layer 3 network segment.
Network
switch
Access Points (AP) are used in wireless networks. Access
Points (AP) are used to connect wirelessly connected devices
Access Points
to wired network. Typically Access Points (AP) is a separate
device, but it can be a function of router also.
Access Points
A router is another type of network connectivity device.
Routers operate at Layer 3 of OSI reference model. A router is
used to forward and receive traffic between different Layer 3
network segments. Routers depend on
Router IP addresses (also called as Layer 3 address) to forward traffic
from one network to another network. That means, switches
are used to connect devices inside a Layer 3 network segment
but routers are used to connect different Layer 3 network
segments together.
Cisco Router
A firewall is a network security device which is used to prevent
unauthorized traffic. Firewall can inspect, control, police and if
required block network traffic. Firewall can be a software, a
Firewall
hardware device or a software running on a special hardware
device. Typically, firewalls are used to prevent unauthorized
access to private networks from the users of internet.
Firewall
An intrusion prevention system (IPS) another network
security device which is used to detect and prevent network
threats. Intrusion prevention systems (IPS) can be connected
Intrusion
inline within your network and it can continuously monitor
Prevention
your network for any network threats. These devices can
Systems (IPS)
identify traffic patterns of different network threats. Intrusion
Prevention Systems (IPS) can report any threat to the
network administrator or it can proactively shut the line, if a
threat is identified.
Intrusion
Prevention
Systems (IPS)