Network Hub:
Network Hub is a networking device which is used to connect multiple network hosts. A network hub is also used to do data transfer. The data is transferred in terms of packets on a computer network. So when a host sends a data packet to a network hub, the hub copies the data packet to all of its ports connected to. Like this, all the ports know about the data and the port for whom the packet is intended, claims the packet.
However, because of its working mechanism, a hub is not so secure and safe. Moreover, copying the data packets on all the interfaces or ports makes it slower and more congested which led to the use of network switch.
Hub’s properties:
- Works at the physical layer of the OSI layer
- Uses ‘Store and forwarding’ when it receives a data packet
- A virtual LAN cannot be created using a hub
- Usually comes with 4 to 12 ports
- Only transmits electrical signals or the bits (relate it with physical layer)
- Does not use any software
- Does not have its own memory for memorizing the devices connected over to the network
- Cannot learn the MAC addresses and neither can forward them
- Supports Half-duplex transmission mode
- A hub has only one broadcast domain
- Cannot support Spanning tree protocol
- Packet collisions occur commonly inside a hub
Network Switch:
Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can say that a switch is more intelligent than a hub. While hub just does the work of data forwarding, a switch does ‘filter and forwarding’ which is a more intelligent way of dealing with the data packets.
So, when a packet is received at one of the interfaces of the switch, it filters the packet and sends only to the interface of the intended receiver. For this purpose, a switch also maintains a CAM (Content Addressable Memory) table and has its own system configuration and memory. CAM table is also called as forwarding table or forwarding information base (FIB).
Switch’s properties:
- Works at the Data link layer or layer two of the OSI model
- Uses ‘filter and forwarding’ when it receives a data packet
- A virtual LAN can be created using a Switch and it can also work as a multi-port bridge
- Usually comes with 24 to 48 ports
- Transmits Frames (layer 2 packets) and Layer 3 packets of the OSI model
- Uses its software for admin access and other configurations
- Has its own memory for memorizing the devices connected over to the network
- Can learn the MAC addresses and stores those addressed in a CAM (Content Addressable Memories)
- Supports Half as well as full duplex transmission mode
- A hub has only one broadcast domain
- Can support Spanning tree protocol
- No packet collisions occur commonly inside a hub
Modem:
A Modem is somewhat a more interesting network device in our daily life. So if you have noticed around, you get an internet connection through a wire (there are different types of wires) to your house. This wire is used to carry our internet data outside to the internet world.
However, our computer generates binary data or digital data in forms of 1s and 0s and on the other hand, a wire carries an analog signal and that’s where a modem comes in.
A modem stands for (Modulator+Demodulator). That means it modulates and demodulates the signal between the digital data of a computer and the analogue signal of a telephone line.
Network Router:
A router is a network device which is responsible for routing traffic from one to another network. These two networks could be a private company network to a public network. You can think of a router as a traffic police who directs different network traffic to different directions.
If a router connects two different types of networks, then a bridge connects two subnetworks as a part of the same network. You can think of two different labs or two different floors connected by a bridge.
Repeater:
For example, inside a college campus, the hostels might be far away from the main college where the ISP line comes in. If the college authority wants to pull a wire in between the hostels and main campus, they will have to use repeaters if the distance is much because different types of cables have limitations in terms of the distances they can carry the data for.
When these network devices take a particular configurational shape on a network, their configuration gets a particular name and the whole formation is called Network topology. In certain circumstances when we add some more network devices to a network topology, its called Daisy chaining.