DEV Community

Palak Hirave
Palak Hirave

Posted on

Network Components

Devices are able to communicate with each other, share resources, and access the internet with almost uniform consistency but, what exactly enables this? Various network components work together to make this happen.

End Devices

End Devices, also known as hosts, are devices that end up receiving or sending data within a network(e.g. phones, laptops). Users interact with these devices directly to perform tasks such as browsing the web, sending messages and creating documents. These devices play an important role in data generation and data consumption, like when users stream videos(consumption) or send emails(generation). End devices serve as the primary UI(User Interface) to the WWW(World Wide Web), enabling them to access network resources and services seamlessly. This can be done through both wired(Ethernet) and wireless(Wi-Fi) connections. An example of this is an office employee using a laptop to connect to the office's network to access online resources and communicate with others. The end device is the laptop and serves as the user's way to interact with the network.

Intermediary Devices

These devices assist the flow of data between end devices, within a LAN or between different networks. They include routers, switches, modems and access points, all of which play a role in ensuring efficient and secure data transmission. These devices are responsible for things such as packet forwarding, directing data packets to their destinations(by reading network address info) and determining the most efficient paths. Their main job is to connect networks and control network traffic to enhance performance and reliability. Intermediary devices often incorporate security features like firewalls to protect certain networks from unauthorized access and potential threats. They operate at different layers of the OSI model, e.g. routers at the Network Layer and switches at the Data Link Layer, and use routing tables(a digital data file in a router or network device that acts as a roadmap to store rules and determine the best path for forwarding IP packets to their destinations) and protocols to make decisions about data forwarding.

Network Interface Card (NIC)

Is a hardware component installed into a computer/other device that enables it to connect to a network. It provides the physical interface between the device and network media and handles the sending and receiving of data across a network. Each NIC has their own unique MAC address so that devices can identify each other and enable communication at the data link layer of the OSI model. They can be designed for both wired connections(Ethernet cards that connect via cables) and wireless connections(Wi-Fi adapters using radio waves). A desktop computer may use a wired NIC with an Ethernet cable whilst your smartphone uses a wireless NIC to connect to networks via Wi-Fi.

Router

A router is an intermediary device that forwards data packets between networks and directs internet traffic. They work at the Network Layer of the OSI model and read the network address info in data packets to determine their destinations. By using routing tables and routing protocols like Open Shortest Path First(OSPF) or Border Gateway Protocol(BGP) they can find the most efficient path for the data to travel across interconnected networks and the internet. They do this by examining incoming data packets and forwarding them toward their destinations based on IP addresses. By connecting multiple networks, routers enable devices on different networks to communicate. They also manage network traffic by selecting optimal paths for data transmission, which helps prevent congestion, a process known as traffic management. Routers also enhance security by incorporating features like firewalls and access control lists, protecting the network from unauthorized access and potential threats. To understand this better, visualize all the devices in a home network(printer, smartphones, laptops, smart TV, etc.). A router connects all these devices together in a network. It also connects this network to the internet which is provided by your Internet Service Provider(ISP). The router then directs incoming and outgoing internet traffic efficiently, ensuring that each device in the network can communicate with external networks(e.g. Internet) and with each other.

Switches & Hubs

A switch connects multiple devices within the same network, usually a LAN. Don't confuse this with a router as routers can also connect various networks together(e.g. home network and the Internet). A switch only connects the devices in a single network. They operate at the Data Link Layer and use MAC addresses to forward data only to its intended recipient. They reduce network congestion and improve overall performance by managing data traffic between the connected devices. They enable devices like computers, printers, and servers to communicate directly with each other within the network. For example, in a school, switches can connect the teacher's laptops in order for them to communicate quickly and effectively with each other and share files.

On the other hand, a hub is a far more basic networking device and isn't really used anymore. You would only find a few networks still using it. It connects multiple devices in a network segment just like a router but rather than sending data to only its intended recipient it broadcasts the data to all connected ports, regardless of the destination. This means that there's increased network traffic and higher chance of data collisions(when packets of data collide, causing that bit of data to be lost and you will have to resend the file/request). It is also quite easier to hack and gather all data as every bit of it is broadcasted to all devices, even if the device doesn't open it.

Network Media and Software Components

Network Media provides the physical paths that connect devices and allow data to be transmitted between them and includes wired media such as Ethernet cables and fiber-optic cables and wireless media such as Wi-Fi and Bluetooth.

Software components define the rules and procedures for data transmission, ensuring that the info is correctly formatted, addressed, transmitted, routed and received. It does this through management software which allows administrators to monitor network performance, configure devices, and enhance security and network protocols such as TCP/IP, and HTTP to enable devices to communicate over the network.

Cabling and Connectors

These are the physical materials that are used to link devices in networks which form pathways so that data can be transmitted through them. This includes all sorts of cables such as Ethernet, Fiber-Optic(which sends data via. light pulses) and also uses connections like the RJ-45 plug which is used to directly connect network devices such as computers, switches, printers and routers. The quality and type of cabling and connectors can affect network performance, reliability, and speed. For example, in an office, Ethernet cables with RJ-45 connectors might connect desktop computers to network switches to enable high-speed data transfer across the local area network.

Network Protocols

They are a set of rules and conventions that control how data is formatted, transmitted, received and interpreted across a network. This ensures that devices from different manufacturers and with varying configurations can adhere to the same standard and communicate effectively and without errors. They encompass a large range of things such as data segmentation, addressing, routing, error checking and synchronization. Some common protocols are TCP/IP, HTTPS, SMTP, FTP and more.

Network Management Software

This consists of various tools and applications that are used to monitor, control and maintain network components and operations. These software can do things such as performance monitoring, configuration management, fault analysis and security management.

They help network admins ensure that the network remains secure, can quickly address any issues that arise and operate efficiently. For example, in a business, the IT department might use network management software to oversee all devices connected to the company network, monitor traffic for unusual activity, update device configurations remotely and enforce security policies to maintain optimal network performance and security. This can also help prevent hackers and data breaches.

Software Firewalls

This is a security application that is installed on someone's device that monitors and controls incoming and outgoing network traffic based on predetermined security rules(you can edit/change/add/modify these rules) Hardware firewalls are physical components that protect entire networks whilst software firewalls(also known as Host-based firewalls) provide protection only to the device that it has been installed on. They guard the device from threats that may have bypassed the network's physical firewall. Software firewalls help prevent unauthorized access, reject incoming packets that contain suspicious or malicious data and can be configured to restrict access to certain applications or services. For example, most operating systems include a built-in software firewall that can be set up to block incoming connections from untrusted sources. This ensures that only legitimate network traffic reaches the device and reduces the change of a virus being installed on the device.

Servers

They are powerful computers that are made to provide services to other computers(clients) over a network. They host services that the clients access, suppose opening a web page or email service. They enable resource sharing by allowing multiple users to access resources like files and printers via the network. They also handle data management by storing and managing data centrally, which simplifies backup processes and enhances security management. Rather than having hard drives all around your house where they might easily get lost or stolen, servers provide a secure place to store your data without having to worry about the physical aspects of it. Additionally, they manage authentication by controlling user access and permissions across multiple components in the network. Servers often run specialized operating systems optimized for handling multiple, simultaneous requests in what is known as the Client-Server Model(which is when the sever waits for the client to respond and then goes about it accordingly). When you browse, your browser sends a request to the server hosting that site, who then responds back with the web page data after processing the request. This is also show in the TCP 3-Way Handshake(which I will not be explaining but it's good to look into it).

Anyways...that's all for this one. Bye!

Top comments (0)