Networks are groups of computers linked to each other with a cable or wireless connections. Networks are made up of nodes that communicate with each other to share information, and enable data transmission between devices The advantages are that they share data and resources. They are also a central control for programs and can also be a central repository of stored data.
In this section, we will be discussing about the different terminologies related to networking devices. The first type is the passive hub which use a star topology ideal for: broadcasting, The second is Active hubs which amplify broadcast, The third is intelligent hubs which enable switching and provide data rates.
Repeaters extend the transmission but they don’t amplify it.
Networking is a vast topic that can be difficult to understand. It is important to know the different terminologies and their definitions in order to be able to communicate with other network engineers. A bridge is a LAN connection and is a type of network connection that allows two or more networks to communicate with each other on a data later. A data layer is the lowest layer in the OSI model, which handles data transfer between devices on a network. A managed switch SNMP (Simple Network Management Protocol) is an application that monitors and manages switch ports on a network. Next generation routers are designed for high-speed internet connections and are capable of handling large amounts of data packets all at once including Inter networking which connects two or more networks together, which can be done by using routers, bridges, switches, or gateways.
A statefull firewall A unified threat management firewall is a type of firewall that combines the functions of a stateful inspection firewall and an intrusion prevention system. The UTM firewall is designed to protect networks from both external and internal threats. The UTM firewall can be used to block malicious traffic, such as spam, viruses, and worms. It can also be used to control access to the network by enforcing policies on who can use it and what they are allowed to do while they are connected.
0 Comments