computer network Client is the term used to mention a workstation, a normal desktop computer, or a laptop which an end user uses to perform his normal duties in the office. The term client computer is used to refer any device which participate in the Client network. Workstation is the term used for a high-end type computer which has much more memory and processing power than a Workstation normal desktop computer. Workstation computers are used Computer for computing tasks which require more memory and processing power than normal computing. Examples are video rendering, 2D CAD drafting, 3D CAD drafting, heavy image editing etc. A server is a high configuration special computer, which serves resources to clients. A typical computer network uses different types of servers. Examples of servers used in a network are file server, print server, database server, mail Server server, web server, DNS server, DHCP server, video streaming server etc. Servers normally run continuously 24/7. An unexpected shutdown of a server may cause entire operation of the business down. Network media is used to connect different devices in a network together. Commonly used network media in wired Network networks are copper twisted pair cables. Optical fiber cables Media are also used to connect different devices in wired networks. Wireless networks use electromagnetic waves to connect different devices together. Network media (cable) A hub (Ethernet hub) is a network connectivity device used to connect clients during the early days of computer networking. A network hub receives traffic from a device in the port where the device is connected. Ethernet hub then forwards the received traffic out to all its other ports. As a result, all the clients in the Network Hub network receive the traffic which is a burden to other clients which are not the intended recipient. This nature of operation of Ethernet hubs can cause large amount of unnecessary traffic in the network. Hubs are out from the computer networking industry and not even available in the market to purchase. Network hub A layer 2 switch is another type of connectivity device widely used these days. Layer 2 switches operate at Layer 2 of OSI reference model. A network switch has the capability to learn which devices are connected to its ports. Switches learn Network about connected devices by using a unique device address called as Switch Media Access Control (MAC) address or Layer 2 address. Using Media Access Control (MAC) address or Layer 2 addresses, a Layer 2 switch can forward the packet only to the intended recipient, not to every device in the network. A network switch is commonly used to connect the devices inside a OSI Layer 3 network segment. Network switch Access Points (AP) are used in wireless networks. Access Points (AP) are used to connect wirelessly connected devices Access Points to wired network. Typically Access Points (AP) is a separate device, but it can be a function of router also. Access Points A router is another type of network connectivity device. Routers operate at Layer 3 of OSI reference model. A router is used to forward and receive traffic between different Layer 3 network segments. Routers depend on Router IP addresses (also called as Layer 3 address) to forward traffic from one network to another network. That means, switches are used to connect devices inside a Layer 3 network segment but routers are used to connect different Layer 3 network segments together. Cisco Router A firewall is a network security device which is used to prevent unauthorized traffic. Firewall can inspect, control, police and if required block network traffic. Firewall can be a software, a Firewall hardware device or a software running on a special hardware device. Typically, firewalls are used to prevent unauthorized access to private networks from the users of internet. Firewall An intrusion prevention system (IPS) another network security device which is used to detect and prevent network threats. Intrusion prevention systems (IPS) can be connected Intrusion inline within your network and it can continuously monitor Prevention your network for any network threats. These devices can Systems (IPS) identify traffic patterns of different network threats. Intrusion Prevention Systems (IPS) can report any threat to the network administrator or it can proactively shut the line, if a threat is identified. Intrusion Prevention Systems (IPS)