Itec 90

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

II.

Network Introduction both analog and digital communications and can be used
⇒ Network - is a combination or group of computers and for important processes, ranging from transferring files
devices connected together which can “communicate” to between devices to accessing the internet.
each other.
- They can “see” and “speak” to each other by the ● Common types of communication protocols include
help of "network connections, standards and the following:
protocols". This means that they can share data, ● Automation: It is used to automate different
resources and services to each other. processes in both commercial and personal
Origin of Network settings, such as in smart buildings, cloud
⇒ The story of the internet largely starts during the 1960’s technology or self-driving vehicles.
which the United States government created ARPA-net. ● Instant messaging: Instantaneous, text-based
⇒ This was a program designed to combat the communications on smartphones and computers
communism. occur because of a number of different instant
⇒ According to Stephen J. Lukasik, one of the leading messaging network protocols.
figure in the development of Advanced Research Projects ● Routing: Routing protocols permit communication
Agency Network (ARPANET): “The goal of ARPANET was between routers and other network devices. There
to exploit new computer technologies to meet the needs of are also routing protocols specifically for ad hoc
military command and control against nuclear threats, networks.
achieve survivable control of US nuclear forces, and ● Bluetooth: Ever-popular Bluetooth devices —
improve military tactical and management decision including headsets, smartphones and computers
making.” — work due to a variety of different Bluetooth
● Network Types protocols.
- It is a group of computers linked to each other that ● File transfer: If you have ever moved files from
enables the computer to communicate with one device to another, either via a physical or
another computer and share their resources, data, digital medium, you’ve used file transfer protocols
and applications. (FTP).
⇒ A computer network can be categorized by their size. ● Internet Protocol: It allows data to be sent
● A computer network is mainly of four types: between devices via the internet. The internet
⇒ Local Area Network (LAN)- is the most common could not operate as it currently does without IP.
network type. It allows users to connect within a short ⇒ Network Management Protocol - define and describe
distance in a common area. Once they connect, users the various procedures needed to effectively operate a
have access to the same resources. computer network. These protocols affect various devices
⇒ Personal area network (PAN)- is a small-scale network on a single network including computers, routers and
that revolves around one person or device. A PAN servers to ensure each one, and the network as a whole,
connects just a few devices in a small localized area. perform optimally.
PANs usually operate from one or two main devices. **The functions of network management protocols
⇒ Wide area network (WAN) - is an extensive network include the following:
that's not confined to geographical space. Corporations ● Connection: These protocols establish and
and international companies may use WANs to provide a maintain stable connections between different
common network with far-reaching connectivity. devices on the same network.
⇒ Metropolitan area network (MAN) - is a medium-sized ● Link aggregation: It allows you to combine
network that's larger than a CAN. While a MAN is a costly multiple network connections into one link
network, it provides efficient connectivity between devices between two devices. This works to increase the
across a wide geographical range. strength of the connection and helps sustain the
● Other Network Types: connection should one of the links fail.
⇒ Wireless local area network (WLAN) ● Troubleshooting: It allows network
⇒ Campus area network (CAN) administrators to identify errors affecting the
⇒ Storage area network (SAN) network, evaluate the quality of the network
⇒ Enterprise private network (EPN) connection, and determine how administrators can
⇒ Virtual private network (VPN) fix any issues.
⇒ Security protocols - also called cryptographic
● Network Protocol protocols, work to ensure that the network and the data
- It is the rules that govern network sent over it are protected from unauthorized users.
communications. These rules, or protocols are ⇒ Common functions of security network protocols
specific to the characteristics of the conversation. include the following:
Network communication follows protocols similar ● Encryption: It protects data and secure areas by
to those used in human communication. requiring users to input a secret key or password
⇒ There are thousands of different network protocols, but in order to access that information.
they all perform one of three primary actions: ● Entity Authentication: It creates a system that
● Communication requires different devices or users on a network to
● Network management verify their identity before accessing secure areas.
● Security ● Transportation: It protects data while it is
transported from one network device to another.
Communication protocols - allow different network
devices to communicate with each other. They are used in ● Network Topology
⇒ Star Topology - the most common network topology, is ● Sometimes, it becomes difficult to fit a new
laid out so every node in the network is directly connected protocol into this model.
to one central hub via coaxial, twisted-pair, or fiber-optic ● It is only used as a reference model.
cable. Acting as a server, this central node manages data
transmission as information sent from any node on the ❖ TCP/IP MODEL
network has to pass through the central one to reach its ⇒ TCP/IP stands for Transmission Control
destination and functions as a repeater which helps Protocol/Internet Protocol. It has 4 layers named as
prevent data loss. Physical layer, Network layer, Transport layer, and
⇒ Bus Topology - orients all the devices on a network Application layer. It also can be used as a
along a single cable running in a single direction from one communications protocol in a private computer network. It
end of the network to the other which is why it’s was designed by Vint Cerf and Bob Kahn in the 1970s.
sometimes called a “line topology” or “backbone topology.” ⇒ Advantages
Data flow on the network also follows the route of the ● Many Routing protocols are supported.
cable, moving in one direction. ● It is highly scalable and uses a client-server
⇒ Ring topology - is where nodes are arranged in a circle architecture.
(or ring). The data can travel through the ring network in ● It is lightweight.
either one direction or both directions, with each device ⇒ Disadvantages
having exactly two neighbors. ● Little difficult to set up.
⇒ Tree Topology - structure gets its name from how the ● Delivery of packets is not guaranteed by the
central node functions as a sort of trunk for the network, transport layer.
with nodes extending outward in a branch-like fashion. A ● Vulnerable to a synchronization attack
tree topology has a parent-child hierarchy to how the .
nodes are connected. Those connected to the central hub ❖ THE DIFFERENCE OF 2 MODELS:
are connected linearly to other nodes, so two connected Here is a breakdown of what each layer in the TCP/IP
nodes only share one mutual connection. Because the model does:
tree topology structure is both extremely flexible and ● Application layer - It is where data originates on
scalable, it’s often used for wide area networks to support the sender’s side. Applications are used to create
many spread-out devices. the data. A web browser, for example, is used to
⇒ Mesh Topology - is an intricate and elaborate structure generate the data that gets sent through the rest
of point-to-point connections where the nodes are of the layers, assisted by the Domain Name
interconnected. Mesh networks can be full or partial mesh. System (DNS), which associates web domain
Partial mesh topologies are mostly interconnected, with a names with their Internet Protocol (IP) addresses.
few nodes with only two or three connections, while full- ● Transport layer - The data gets encoded so it
mesh topologies are fully interconnected. can be transported through the internet using
⇒ Hybrid Topology - combine two or more different either the User Datagram Protocol (UDP) or TCP.
topology structures the tree topology is a good example, ● Network access layer - The data gets a header
integrating the bus and star layouts. Hybrid structures are and a trailer, and these tell the data where to go.
most commonly found in larger companies where This information is then conveyed to the network
individual departments have personalized network interface layer.
topologies adapted to suit their needs and network usage. ● Network interface layer - The packet of data
gets formatted and prepared to be transported
III. TCP/IP and OSI Model and routed through the network.
⇒ Data communication - is a process or act in which we ● Hardware layer - The data is turned into
can send or receive data. For data communication two something that can be sent to and read by a
models are available. We will discuss these two models in computer or other device. For example, the IEEE
this article and also see the differences between these two 802.3 protocol is used to convert data into what is
common model or “set of standards” on our networks. used in an Ethernet connection.
● OSI (Open Systems Interconnection) *Here is a breakdown of what each layer in the OSI
● TCP/IP (Transmission Control Protocol / Internet model does:
Protocol). ⇒ Physical - This consists of a data connection between
❖ OSI MODEL a device generating data and the network.
❖ OSI stands for Open Systems Interconnection. ⇒ Datalink - The datalink layer is the point-to-point
It has 7 layers Physical layer, Data Link layer, connection that transmits the data to the network layer.
Network layer, Transport layer, Session layer, ⇒ Network - In the network layer, the data gets its
Presentation layer, and Application layer. Each address and routing instructions in preparation for its
layer performs its task independently. It was journey across the network.
developed in 1984. ⇒ Transport - In the transport layer, the data hops
⇒ Advantages between different points on the network on its way to its
● Both connection-oriented services and destination.
connectionless services are supported. ⇒ Session - The session layer has a connection that
● It is quite flexible. manages the sessions happening between applications.
● All the layers work independently. ⇒ Presentation - The presentation layer is where data
gets encrypted and decrypted and converted into a form
⇒ Disadvantages that is accessible by the application layer,
● Setting up a model is a challenging task.
⇒ Application - In the application layer, an application, Step 2: The Data-Link layer (in the OSI or TCP/IP model)
such as an internet browser, gets the data and a user can takes the data frames from the Physical layer. It de-
then interact with it. encapsulates the data frames and checks the frame
● Data Encapsulation and De-encapsulation header whether the data frame is switched to the correct
⇒ Data Encapsulation - is the process in which some hardware or not. If the frame is switched to the incorrect
extra information is added to the data item to add some destination, it is discarded, else it checks the trailer
features to it. We use either the OSI or the TCP/IP model information. If there is any error in the data, data
in our network, and the data transmission takes place retransmission is requested, else it is de-encapsulated
through various layers in these models. Data and the data packet is forwarded to the upper layer.
encapsulation adds the protocol information to the data so Step 3: The Network layer (in the OSI model) or the
that data transmission can take place in a proper way. Internet layer (in the TCP/IP model) takes the data packet
This information can either be added in the header or the or datagram from the Data-Link layer. It de-encapsulates
footer of the data. The data is encapsulated on the the data packets and checks the packet header whether
sender’s side, starting from the application layer to the the packet is routed to the correct destination or not. If the
physical layer. packet is routed to the incorrect destination, the packet is
discarded, else it is de-encapsulated and the data
⇒ Data De-encapsulation - is the reverse process of data segment is forwarded to the upper layer.
encapsulation. The encapsulated information is removed Step 4: The Transport layer (in the OSI or TCP/IP model)
from the received data to obtain the original data. This takes the data segments from the network layer and de-
process takes place at the receiver’s end. The data is de- encapsulate it. It first checks the segment header and then
encapsulated at the same layer at the receiver’s end to the reassembles the data segments to form data streams, and
encapsulated layer at the sender’s end. The added header these data streams are then forwarded to the upper
and trailer information are removed from the data in this layers.
process. Step 5: The Application, Presentation, and Session layer
● Encapsulation Process in the OSI model , or the Application layer in the TCP/IP
Step 1: The Application, Presentation, and Session layer model takes encapsulated data from the Transport layer,
in the OSI model , or the Application layer in the TCP/IP de-encapsulate it, and the application-specific data is
model takes the user data in the form of data streams, forwarded to the applications.
encapsulates it and forwards the data to the Transport
layer. It does not necessarily add any header or footer to IV. Module 1: Networking Today
the data. But it is application-specific and can add the
header if needed. 1.2 Network Components
Step 2: The Transport layer (in the OSI or TCP/IP model )
takes the data stream from the upper layers, and divide it ⇒ Host Roles - Every computer on a network is called a
into multiple pieces. The Transport layer encapsulates the host or end device.
data by adding the appropriate header to each piece. ⇒ Servers - are computers that provide information to
These data pieces are now called as data segments. The end devices:
header contains the sequencing information so that the • email servers
data segments can be reassembled at the receiver’s end. • web servers
Step 3: The Network layer (in the OSI model) or the • file server
Internet layer (in the TCP/IP model) takes the data ⇒ Clients - are computers that send requests to the
segments from the Transport layer and encapsulate it by servers to retrieve information:
adding an additional header to the data segment. This • web page from a web server
data header contains all the routing information for the • email from an email server
proper delivery of the data. Here, the encapsulated data is
termed as a data packet or datagram. ⇒ Server Type:
Step 4: The Data-Link layer (in the OSI or TCP/IP model) ● Email - Email server runs email server software.
takes the data packet or datagram from the Network layer Clients use client software to access email.
and encapsulate it by adding an additional header and ● Web - Web server runs web server software.
footer to the data packet or datagram. The header Clients use browser software to access web
contains all the switching information for the proper pages.
delivery of the data to the appropriate hardware ● File - File server stored corporate and user files.
components, and the trailer contains all the information The client devices access these files
related to error detection and control. Here, the
encapsulated data is termed as a data frame. ⇒ Peer-to-Peer - It is possible to have a device be a client
Step 5: The Physical layer (in the OSI or TCP/IP model) and a server in a Peer-to-Peer Network. This type of
takes the data frames from the Data-Link layer and network design is only recommended for very small
encapsulate it by converting it to appropriate data signals networks.
or bits (corresponding to the physical medium). ● Advantages:
● De-Encapsulation Process 1. Easy to set up
Step 1: The Physical layer (in the OSI or TCP/IP model ) 2. Less complex
takes the encapsulated data signals or bits from the 3. Lower cost
sender, and de-encapsulate it in the form of a data frame 4. Used for simple task: Transferring files
to be forwarded to the upper layer, i.e., the Data-Link and sharing printers
layer.
● Disadvantages: ● A LAN is a network infrastructure that spans a
1. No centralized administration small geographical area.
2. Not as secure ⇒ Interconnect end devices in a limited area.
3. Not scalable ⇒ Administered by a single organization or individual.
4. Slower Performance ⇒ Provide high-speed bandwidth to internal devices.
⇒ End Devices - It is where a message originates from or ● A WAN is a network infrastructure that spans a
where it is received. Data originates with an end device, wide geographical area.
flows through the network, and arrives at an end device. ⇒ Interconnect LANs over wide geographical areas.
❖ Intermediary Network Devices - An intermediary device ⇒ Typically administered by one or more service
interconnects end devices. Examples include switches, providers.
wireless access points, routers, and firewalls. ⇒ Typically provide slower speed links between LANs.
Management of data as it flows through a network is also
the role of an intermediary device, including: ● The Internet
• Regenerate and retransmit data signals. - The internet is a worldwide collection of
• Maintain information about what pathways exist in the interconnected LANs and WANs.
network. • LANs are connected to each other using WANs.
• Notify other devices of errors and communication • WANs may use copper wires, fiber optic cables, and
failures. wireless transmissions. The internet is not owned by any
❖ Network Media - Communication across a network is individual or group. The following groups were developed
carried through a medium which allows a message to to help maintain structure on the internet:
travel from source to destination. • IETF
● Media Types: • ICANN
⇒ Metal wires with cable (Copper) - uses electrical • IAB
impulses. ● Intranets and Extranets
⇒ Glass or Plastic Fiber within Cables (Fiber-optic ⇒ An intranet is a private collection of LANs and WANs
cables) - Uses pulses of light. internal to an organization that is meant to be accessible
⇒ Wireless Transmission (Wireless) - Uses only to the organizations members or others with
modulation of specific frequencies of authorization.
electromagnetic waves. ⇒ An organization might use an extranet to provide
secure access to their network for individuals who work for
1.3 Network Representations and Topologies a different organization that need access to their data on
❖ Network Representations - Network diagrams, often their network.
called topology diagrams, use symbols to represent
devices within the network. Module 2: Basic Switch and End Device Configuration
- Important terms to know include: 2.1 Cisco IOS Access
• Network Interface Card (NIC)
• Physical Port • Shell - The user interface that allows users to request
• Interface specific tasks from the computer. These requests can be
❖ Topology Diagrams made either through the CLI or GUI interfaces.
● Physical topology diagrams illustrate the • Kernel - Communicates between the hardware and
physical location of intermediary devices and software of a computer and manages how hardware
cable installation. resources are used to meet software requirements.
● Logical topology diagrams illustrate devices, • Hardware - The physical part of a computer including
ports, and the addressing scheme of the network. underlying Electronics.
1.4 Common Types of Networks ⇒ GUI
⇒ Networks of Many Sizes • A GUI allows the user to interact with the system using
• Small Home Networks – connect a few computers to an environment of graphical icons, menus, and windows.
each other and the Internet • A GUI is more user-friendly and requires less knowledge
• Small Office/Home Office – enables computer within a of the underlying command structure that controls the
home or remote office to connect to a corporate network System.
• Medium to Large Networks – many locations with ⇒ Access Methods
hundreds or thousands of interconnected computers. ● Console – A physical management port used to
• World Wide Networks – connects hundreds of millions access a device in order to provide maintenance,
of computers world-wide – such as the internet. such as performing the initial configurations.
● Secure Shell (SSH) – Establishes a secure
⇒ LANs and WANs remote CLI connection to a device, through a
- Network infrastructures vary greatly in terms of: virtual interface, over a network.
• Size of the area covered ● Telnet – Establishes an insecure remote CLI
• Number of users connected connection to a device over the Network.
• Number and types of services available ⇒ Terminal Emulation Programs
• Area of responsibility ● Terminal emulation programs are used to connect
⇒ Two most common types of networks: to a network device by either a console port or by
• Local Area Network (LAN) an SSH/Telnet connection.
• Wide Area Network (WAN).
● There are several terminal emulation programs to - The command is traceroute and the user-defined
chose from such as PuTTY, Tera Term, and argument is the ip-address of the destination
SecureCRT. device. For example, traceroute 192.168.254.254.
2.2 IOS Navigation ⇒ Hot Keys and Shortcuts
⇒ Primary Command Modes - When a command output produces more text than
- User EXEC Mode: can be displayed in a terminal window, the IOS
● Allows access to only a limited number of basic will display a “--More--” prompt.
monitoring commands. ● Enter Key - Displays the next line.
● Identified by the CLI prompt that ends with the > ● Space Bar - Displays the next screen.
symbol. ● Any other key - Ends the display string, returning
- Privileged EXEC Mode: commands that can be used to exit out of an
● Allows access to all commands and features operation. Ctrl-C , Ctrl-Z , Ctrl-Shift-6
● Identified by the CLI prompt that ends with the #
symbol. 2.4 Basic Device Configuration
⇒ Configuration Mode and Subconfiguration Modes ⇒ Configure Passwords
- Global Configuration Mode: Securing user EXEC mode access:
● Used to access configuration options on the ● First enter line console configuration mode using
device. the line console 0 command in global
- Line Configuration Mode: configuration mode.
● Used to configure console, SSH, Telnet or AUX ● Next, specify the user EXEC mode password
access. using the password password command.
- Interface Configuration Mode: ● Finally, enable user EXEC access using the login
● Used to configure a switch port or router interface. command.
⇒ Navigation Between IOS Modes Securing privileged EXEC mode access:
● Privileged EXEC Mode: ● First enter global configuration mode.
- To move from user EXEC mode to privilege EXEC ● Next, use the enable secret password
mode, use the enabled command. command.
● Global Configuration Mode: Securing VTY line access:
- To move in and out of global configuration mode, ● First enter line VTY configuration mode using the
use the configure terminal command. To return to line vty 0 15 command in global configuration
privilege EXEC mode, use the exit command. mode.
● Line Configuration Mode: ● Next, specify the VTY password using the
- To move in and out of line configuration mode, password password command.
use the line command followed by the ● Finally, enable VTY access using the login
management line type. To return to global command.
configuration mode, use the exit Command. ⇒ Encrypt Passwords
⇒ Subconfiguration Modes: - The startup-config and running-config files display
• To move out of any subconfiguration mode to get back to most passwords in plaintext.
global configuration mode, use the exit command. To - To encrypt all plaintext passwords, use the service
return to privilege EXEC mode, use the end command or password-encryption global config command.
key combination Ctrl +Z. - Use the show running-config command to verify
• To move directly from one subconfiguration mode to that the passwords on the device are now
another, type in the desired subconfiguration mode encrypted.
command. In the example, the command prompt changes ⇒ Banner Messages
from (config-line)# to (config-if)#. - It is important to warn unauthorized personnel
from attempting to access the device.
- To create a banner message of the day on a
network device, use the banner motd # the
message of the day # global config command.
2.5 Save Configurations
⇒ There are two system files that store the device
configuration:
• Keyword – This is a specific parameter defined in the ● startup-config - This is the saved configuration
operating system (in the figure, ip protocols). file that is stored in NVRAM. It contains all the
• Argument - This is not predefined; it is a value or commands that will be used by the device upon
variable defined by the user (in the figure, 192.168.10.5). startup or reboot. Flash does not lose its contents
⇒ IOS Command Syntax Check when the device is powered off.
- The command syntax provides the pattern, or ● running-config - This is stored in Random
format, that must be used when entering a Access Memory (RAM). It reflects the current
command. configuration. Modifying a running configuration
- The command is ping and the user-defined affects the operation of a Cisco device
argument is the ip-address of the destination immediately. RAM is volatile memory. It loses all
device. For example, ping 10.10.10.5. of its content when the device is powered off or
restarted.
● To save changes made to the running station and the frame specifies which route to
configuration to the startup configuration file, use follow. The host can discover the frame by
the copy running-config startup-config privileged sending a special frame called the discovery
EXEC mode command. frame, which spreads through the entire network
using all possible paths to the destination.
WEEK 5: NETWORK DEVICES 3.) A Repeater operates at the physical layer. Its job is to
⇒ Network device - is a piece of hardware or software regenerate the signal over the same network before the
integral to communication between a computer and an signal becomes too weak or corrupted to extend the length
internet network. Network devices play two roles. The first to which the signal can be transmitted over the same
is establishing a network connection, as a router or a network. An important point to be noted about repeaters is
modem does. The second one is maintaining, protecting that they not only amplify the signal but also regenerate it.
and enhancing that connection, as with a hub, repeater, When the signal becomes weak, they copy it bit by bit and
switch or gateway. regenerate it at its star topology connectors connecting
Function of Network Devices following the original strength.
● Facilitate data transmission and communication 4.) A Switch is a multiport device that improves network
between devices efficiency. Switches maintain limited routing information
● Enable efficient and secure network connectivity about nodes in the internal network, allowing connections
● Enhance network performance and optimize traffic to systems like hubs or routers. Strands of LANs are
flow usually connected using switches. Generally, switches
● Provide network security by enforcing access read the hardware addresses of incoming packets to
control and threat prevention transmit them to the appropriate destination.
● Simplify network management and configuration ⇒ Types of Switch
● Extend network coverage and overcome signal ● Modular switches allow systems to expand as
limitations needed or if network requirements change.
Types of Network Devices: ● Fixed configuration switches have a set number
1. ) A Hub is a basically multi-port repeater. A hub of ports and cannot be expanded. They are
connects multiple wires coming from different branches, cheaper but less flexible.
for example, the connector in star topology which 5.) A Router is a device like a switch that routes data
connects different stations. Hubs cannot filter data, so packets based on their IP addresses. The router is mainly
data packets are sent to all connected devices. In other a Network Layer device. Routers normally connect LANs
words, the collision domain of all hosts connected through and WANs and have a dynamically updating routing table
Hub remains one. based on which they make decisions on routing the data
⇒ Types of Hub packets. The router divides the broadcast domains of
● Active Hub - These are the hubs that have their hosts connected through it..
power supply and can clean, boost, and relay the ⇒ Router configure in two way:
signal along with the network. It serves both as a - Routers act as your first line of defense. The
repeater as well as a wiring center. These are routers themselves are configured as static or
used to extend the maximum distance between dynamic:
nodes. ● Static routers can only be configured manually
● Passive Hub - These are the hubs that collect and stay that way until changed.
wiring from nodes and power supply from the ● Dynamic routers use information about nearby
active hub. These hubs relay signals onto the routers to build their routing tables.
network without cleaning and boosting them and 6.) A Firewall restricts the internet traffic of a private
can’t be used to extend the distance between network, controlling what goes in and out. They analyze
nodes. and restrict data packets based on programmed
● Intelligent Hub - It works like an active hub and parameters, either whitelists or blacklists. Whitelists only
includes remote management capabilities. They allow information that falls within a certain set of
also provide flexible data rates to network devices. parameters, while blacklists deny all information that falls
It also enables an administrator to monitor the inside the parameters.
traffic passing through the hub and to configure ⇒ Types of firewall
each port in the hub. ● Packet filtering: Acts as a network layer
2. ) A Bridge operates at the data link layer. A bridge is a checkpoint, analyzing data packets by IP address,
repeater, with add on the functionality of filtering content packet type, port number or network protocols
by reading the MAC addresses of the source and ● Stateful inspection: Analyzes data at network
destination. It is also used for interconnecting two LANs and transport layers, inspecting source IP,
working on the same protocol. It has a single input and destination IP, source port and destination port
single output port, thus making it a 2 port device. ● Next-generation: Analyzes actual packet content
⇒ Types of Bridge and all TCP handshake checks, checking for
● Transparent Bridges - These are the bridge in malware, and detects advanced threats (see the
which the stations are completely unaware of the section on IDS and IPS below)
bridge’s existence i.e. whether or not a bridge is 7.) Gateways connect networks operating on different
added or deleted from the network, protocols so data can transfer between destinations.
reconfiguration of the stations is unnecessary. These devices normally work at the Transport and
● Source Routing Bridges - In these bridges, Session layers of the OSI model. At the Transport layer
routing operation is performed by the source
and above, there are numerous protocols and standards
from different vendors, and gateways help deal with them.
8.) A Modem (modulator-demodulator) converts digital
signals into analog signals of different frequencies and
transmits them to a modem at the receiving location. The
receiving modem performs the reverse transformation and
provides a digital output to a device connected to a
modem, usually a computer.

⇒ Types of Modem
● A DSL modem uses telephone cables and is
considered the slowest connection.
● A cable modem transmits information over TV
lines and is faster than DSL.
● A wireless modem transfers information between
the local network and an internet service provider;
it is the fastest transmitter.
9.) An Access Point is a device that creates a wireless
local area network, or WLAN, usually in an office or large
building. An access point connects to a wired router,
switch, or hub via an Ethernet cable, and projects a Wi-Fi
signal to a designated area. For example, if you want to
enable Wi-Fi access in your company's reception area but
don’t have a router within range, you can install an access
point near the front desk and run an Ethernet cable
through the ceiling back to the server room.

You might also like