SlideShare ist ein Scribd-Unternehmen logo
1 von 10
DIFFERENCE BETWEEN
HUB, BRIDGE, SWITCH AND
ROUTER
COMMON NETWORK
ENVIRONMENTS,
CONNECTIVITY AND
SECURITY ISSUES
07/01/2015 AKMALCIKMAT
HUB
Hub is known as the most simplest amongst these device
In general, hub is the central part of a wheel where the spokes come
together.
It cannot filter data. Data packets are sent to all connected devices,
and there is no intelligence to find out the best path for data packet
which then leads to inefficiencies and wastage.
As a network product, a hub may include a group of
Modem-cards : for dial-in user
a gateway card : for connections to a local area network (LAN) and a connection to
a line
Hubs are used on a small networks where data transmission is not
very high.07/01/2015 AKMALCIKMAT
SUMMARY
A common connection point for
device in a network.
Hubs are commonly used to
connect segments of a LAN.
A hub contains multiple ports.
When a packet arrives at one
port, it is copied to the other
ports so that all segments of the
LAN can see all packets.
07/01/2015 AKMALCIKMAT
Sample Picture : A Network Hub
BRIDGE
In a telecommunication networks, a bridge is a product that
connects a local area network (LAN) to another LAN that uses the
same protocol.
Has a single incoming and outgoing port
Filters traffic on the LAN by looking at the Media Access Control
(MAC) address, thus a bridge is more complex than a hub
A bridge looks at the destination of the packet before forwarding
unlike a hub.
It restricts transmission on other LAN segment if the destination is
not found.
A bridge works at the data-link (physical network) level of a
network, copying a data frame from one network to the next network07/01/2015 AKMALCIKMAT
BRIDGE
07/01/2015 AKMALCIKMAT
SWITCH
When compared to bridge, a switch has multiple ports.
Switches can perform error checking before forwarding data, which
are very efficient by not forwarding packets that error-end out or
forwarding good packets selectively to correct devices only.
Switches can support both layer 2 (based on MAC address) and layer
3 (based on IP address) depending on the type of switch.
Usually, large networks use switches instead of hubs to connect
computers within the same subset
07/01/2015 AKMALCIKMAT
SUMMARY
 In networks, a device
that filters and
forwards packets between LAN
segments.
 Switches operate at the data link
layer (layer 2) and sometimes
the network layer (layer 3) of
the OSI Reference Model and
therefore support any packet
protocol.
 LANs that use switches to
join segments are called switched
LANs or, in the case of Ethernet
networks, switched Ethernet LANs.07/01/2015 AKMALCIKMAT
Sample Picture : Network Switch
ROUTER
Router forwards packets based on address just like a switch.
Routers usually use the IP address to forward packets, which allow
the network to go across different protocols.
Routers forward packets based on software while a switch forwards
using hardware.
Eg: Layer 3 uses a hardware called ASIC (Application Specific Integrated Circuits)
Routers support different Wide Area Network (WAN) technologies but
switches do not.
Wireless routers have access point built in. The most common home
use for routers is to share a broadband internet connection.
As the router has a public IP address which is shared with the
network, when data comes through the router, it is forwarded to the
correct computer.07/01/2015 AKMALCIKMAT
SUMMARY
 A device that
forwards data packets along netwo
rks.
 A router is connected to at least
two networks, commonly
two LANs or WANs or a LAN and
its ISP.s network.
 Routers are located at gateways,
the places where two or more
networks connect.
 Routers use headers and
forwarding tables to determine the
best path for forwarding the
packets, and they
use protocols such as ICMP to
communicate with each other and07/01/2015 AKMALCIKMAT
Sample Picture : Router
COMPARISON OF BRIDGE MODE
AND ROUTER MODE
Photo credited to cisco900router
07/01/2015 AKMALCIKMAT

Weitere ähnliche Inhalte

Was ist angesagt?

10.data transmission
10.data transmission10.data transmission
10.data transmissionDeepak Sharma
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Networking devices
Networking devicesNetworking devices
Networking devicesrupinderj
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithmBushra M
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Mediaasrabatool
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 

Was ist angesagt? (20)

10.data transmission
10.data transmission10.data transmission
10.data transmission
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Ethernet
EthernetEthernet
Ethernet
 
Dqdb
DqdbDqdb
Dqdb
 
Routing algorithm
Routing algorithmRouting algorithm
Routing algorithm
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Data link layer
Data link layerData link layer
Data link layer
 
Network software
Network softwareNetwork software
Network software
 
Data transmission
Data transmissionData transmission
Data transmission
 
Guided Transmission Media
Guided Transmission MediaGuided Transmission Media
Guided Transmission Media
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
HUB Device
HUB Device HUB Device
HUB Device
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Protocols
ProtocolsProtocols
Protocols
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 

Andere mochten auch

The difference between a hub, switch and router webopedia
The difference between a hub, switch and router   webopediaThe difference between a hub, switch and router   webopedia
The difference between a hub, switch and router webopediaHarikiran Raju
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communicationAntonio Moreno
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationRishabh Dangwal
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)Netwax Lab
 
Assembling and deassembling
Assembling and deassemblingAssembling and deassembling
Assembling and deassemblingOnline
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolArash Foroughi
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree ProtocolManoj Gharate
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbcHanzel Metrio
 
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...Jorge Saguinsin
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Andere mochten auch (15)

Hub vs-switch
Hub vs-switchHub vs-switch
Hub vs-switch
 
The difference between a hub, switch and router webopedia
The difference between a hub, switch and router   webopediaThe difference between a hub, switch and router   webopedia
The difference between a hub, switch and router webopedia
 
Lecture 5 - Agent communication
Lecture 5 - Agent communicationLecture 5 - Agent communication
Lecture 5 - Agent communication
 
Introduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigationIntroduction to layer 2 attacks & mitigation
Introduction to layer 2 attacks & mitigation
 
STP (spanning tree protocol)
STP (spanning tree protocol)STP (spanning tree protocol)
STP (spanning tree protocol)
 
Assembling and deassembling
Assembling and deassemblingAssembling and deassembling
Assembling and deassembling
 
Rufus
RufusRufus
Rufus
 
Pace IT - Basic Network Connections
Pace IT - Basic Network ConnectionsPace IT - Basic Network Connections
Pace IT - Basic Network Connections
 
Overview of Spanning Tree Protocol
Overview of Spanning Tree ProtocolOverview of Spanning Tree Protocol
Overview of Spanning Tree Protocol
 
Spanning Tree Protocol
Spanning Tree ProtocolSpanning Tree Protocol
Spanning Tree Protocol
 
Disassembling a PC
Disassembling a PCDisassembling a PC
Disassembling a PC
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...
Entrepreneurship, introduction to entrepreneurship, definition of entrepreneu...
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Ähnlich wie difference between hub, bridge, switch and router

05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.pptssuserf7cd2b
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Raj vardhan
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their securitylovizabasharat
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copyTonny Michael
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptEliasPetros
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfSanjanaSingh158
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iiiAbenezer Abiti
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan Singh
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)Siddique Ibrahim
 

Ähnlich wie difference between hub, bridge, switch and router (20)

05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt05 - Networking Components and Devices.ppt
05 - Networking Components and Devices.ppt
 
unit5-190409094326.pdf
unit5-190409094326.pdfunit5-190409094326.pdf
unit5-190409094326.pdf
 
Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5Network Connecting Devices UNIT 5
Network Connecting Devices UNIT 5
 
Computer network_network devices
Computer network_network devicesComputer network_network devices
Computer network_network devices
 
Switches on Networking
Switches on NetworkingSwitches on Networking
Switches on Networking
 
Network connecting devices and their security
Network connecting devices and their securityNetwork connecting devices and their security
Network connecting devices and their security
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Nwk assignment body copy
Nwk assignment body   copyNwk assignment body   copy
Nwk assignment body copy
 
Network devices
Network devicesNetwork devices
Network devices
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Cna
CnaCna
Cna
 
chaptet 4 DC and CN.ppt
chaptet 4 DC and CN.pptchaptet 4 DC and CN.ppt
chaptet 4 DC and CN.ppt
 
NETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdfNETWORK COMPONENTS AND CABLES.pdf
NETWORK COMPONENTS AND CABLES.pdf
 
network hardware
network hardwarenetwork hardware
network hardware
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Best fit topology - lo1 part iii
Best fit topology - lo1 part iiiBest fit topology - lo1 part iii
Best fit topology - lo1 part iii
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 

Mehr von Akmal Cikmat

Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Akmal Cikmat
 
Air Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAir Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAkmal Cikmat
 
Book Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaBook Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaAkmal Cikmat
 
Operating System-Memory Management
Operating System-Memory ManagementOperating System-Memory Management
Operating System-Memory ManagementAkmal Cikmat
 
Mitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportMitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportAkmal Cikmat
 
Pendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiPendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiAkmal Cikmat
 
Pendidikan Dalam Islam
Pendidikan Dalam IslamPendidikan Dalam Islam
Pendidikan Dalam IslamAkmal Cikmat
 
AS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAkmal Cikmat
 
Sumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuSumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuAkmal Cikmat
 
Malaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaMalaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaAkmal Cikmat
 

Mehr von Akmal Cikmat (10)

Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
Reflective Case Study - OBSERVATION ON THE 2019 NOVEL CORONAVIRUS PANDEMIC (C...
 
Air Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational StructureAir Asia- Geographic Organizational Structure
Air Asia- Geographic Organizational Structure
 
Book Report : The Prisoner Of Zenda
Book Report : The Prisoner Of ZendaBook Report : The Prisoner Of Zenda
Book Report : The Prisoner Of Zenda
 
Operating System-Memory Management
Operating System-Memory ManagementOperating System-Memory Management
Operating System-Memory Management
 
Mitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book ReportMitch Albom's For One More Day Book Report
Mitch Albom's For One More Day Book Report
 
Pendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt iiPendidikan Dalam Islam pt ii
Pendidikan Dalam Islam pt ii
 
Pendidikan Dalam Islam
Pendidikan Dalam IslamPendidikan Dalam Islam
Pendidikan Dalam Islam
 
AS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity PresentationAS Level Physics' Radioactivity Presentation
AS Level Physics' Radioactivity Presentation
 
Sumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmuSumber ilmu & penerima ilmu
Sumber ilmu & penerima ilmu
 
Malaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di MalaysiaMalaysian Studies -destinasi pelancongan di Malaysia
Malaysian Studies -destinasi pelancongan di Malaysia
 

Kürzlich hochgeladen

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 

Kürzlich hochgeladen (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 

difference between hub, bridge, switch and router

  • 1. DIFFERENCE BETWEEN HUB, BRIDGE, SWITCH AND ROUTER COMMON NETWORK ENVIRONMENTS, CONNECTIVITY AND SECURITY ISSUES 07/01/2015 AKMALCIKMAT
  • 2. HUB Hub is known as the most simplest amongst these device In general, hub is the central part of a wheel where the spokes come together. It cannot filter data. Data packets are sent to all connected devices, and there is no intelligence to find out the best path for data packet which then leads to inefficiencies and wastage. As a network product, a hub may include a group of Modem-cards : for dial-in user a gateway card : for connections to a local area network (LAN) and a connection to a line Hubs are used on a small networks where data transmission is not very high.07/01/2015 AKMALCIKMAT
  • 3. SUMMARY A common connection point for device in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets. 07/01/2015 AKMALCIKMAT Sample Picture : A Network Hub
  • 4. BRIDGE In a telecommunication networks, a bridge is a product that connects a local area network (LAN) to another LAN that uses the same protocol. Has a single incoming and outgoing port Filters traffic on the LAN by looking at the Media Access Control (MAC) address, thus a bridge is more complex than a hub A bridge looks at the destination of the packet before forwarding unlike a hub. It restricts transmission on other LAN segment if the destination is not found. A bridge works at the data-link (physical network) level of a network, copying a data frame from one network to the next network07/01/2015 AKMALCIKMAT
  • 6. SWITCH When compared to bridge, a switch has multiple ports. Switches can perform error checking before forwarding data, which are very efficient by not forwarding packets that error-end out or forwarding good packets selectively to correct devices only. Switches can support both layer 2 (based on MAC address) and layer 3 (based on IP address) depending on the type of switch. Usually, large networks use switches instead of hubs to connect computers within the same subset 07/01/2015 AKMALCIKMAT
  • 7. SUMMARY  In networks, a device that filters and forwards packets between LAN segments.  Switches operate at the data link layer (layer 2) and sometimes the network layer (layer 3) of the OSI Reference Model and therefore support any packet protocol.  LANs that use switches to join segments are called switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.07/01/2015 AKMALCIKMAT Sample Picture : Network Switch
  • 8. ROUTER Router forwards packets based on address just like a switch. Routers usually use the IP address to forward packets, which allow the network to go across different protocols. Routers forward packets based on software while a switch forwards using hardware. Eg: Layer 3 uses a hardware called ASIC (Application Specific Integrated Circuits) Routers support different Wide Area Network (WAN) technologies but switches do not. Wireless routers have access point built in. The most common home use for routers is to share a broadband internet connection. As the router has a public IP address which is shared with the network, when data comes through the router, it is forwarded to the correct computer.07/01/2015 AKMALCIKMAT
  • 9. SUMMARY  A device that forwards data packets along netwo rks.  A router is connected to at least two networks, commonly two LANs or WANs or a LAN and its ISP.s network.  Routers are located at gateways, the places where two or more networks connect.  Routers use headers and forwarding tables to determine the best path for forwarding the packets, and they use protocols such as ICMP to communicate with each other and07/01/2015 AKMALCIKMAT Sample Picture : Router
  • 10. COMPARISON OF BRIDGE MODE AND ROUTER MODE Photo credited to cisco900router 07/01/2015 AKMALCIKMAT