CONNECTING DEVICES AND VIRTUAL LANS SANA SAYYAD - 4138 VIBHUTI SHARMA- 4166 KHUSHI BAGDI- 4167 SNEHA GAWAS- 4168 SHIVANI
WHAT IS CONNECTING DEVICE ?? A connecting device, I n simple words, is something that links or joins different things together. It's like a bridge or a connector that allows various devices or parts of a system to communicate or work together.
NETWORK CONNECTING DEVICES HUBS AND REPEATERS BRIDGES ROUTERS SWITCHES GATEWAY
Connecting Devices HUBS Which operates below the physical layer. a repeater or an active hub Which operates at the physical layer. a bridge or a two-layer switch Which operates at the physical and data link layers . a router or a three-layer switch Which operates at the physical, data link, and network layers. a gateway Which can operate at all layers.
The general meaning of the word hub is any connecting device. But its specific meaning is multiport repeater . It is normally used for connecting stations like in a physical star topology. All networks require a central location to connect various segments of media coming from various nodes. Such a central location is called as a hub. HUBS HUB
A repeater is a connecting device which can operate only in the physical layer. It Amplifies or regenerates an incoming signal before retransmitting it. Why are Repeaters needed? When an electrical signal is transmitted via a channel, it gets attenuated depending upon the nature of the channel . This poses a limitation upon the length of the LAN. So, repeaters are popularly incorporated to connect between two LANs thus forming a large single LAN. REPEATERS
A bridge is a repeater, with add on the functionality of filtering content by reading the MAC addresses of the source and destination. U sed for interconnecting two LANs working on the same protocol. Types of Bridges : Transparent Bridges :- In this the stations are completely unaware of the bridge’s existence i.e. whether or not a bridge is added or deleted from the network, reconfiguration of the stations is unnecessary. These bridges make use of two processes i.e. bridge forwarding and bridge learning. Source Routing Bridges :- In these bridges, routing operation is performed by the source station and the frame specifies which route to follow. The host can discover the frame by sending a special frame called the discovery frame, which spreads through the entire network using all possible paths to the destination. BRIDGE
DIAGRAM ROUTER A router is a device like a switch that routes data packets based on their IP addresses. The router is mainly a Network Layer device. Routers normally connect LANs and WANs and have a dynamically updating routing table based on which they make decisions on routing the data packets. The router divides the broadcast domains of hosts connected through it.
A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together . Gateways serve as an entry and exit point for a network as all data must pass through or communicate with the gateway prior to being routed. There are two main types of gateways: unidirectional gateways and bidirectional gateways . Unidirectional gateways allow alerts to flow in only one direction and Bidirectional gateways allow alerts to flow in both of the two directions. It operates in all the layers of the OSI model. GATEWAY
Switches can be hardware devices that manage physical ,also a Network S witch connects devices in a network to each other, enabling them to talk by exchanging data packets . There are two main categories of switches: M odular and F ixed configuration . There are variations among these categories of network switches, but the primary definition of each remains the same. The main significance of switches in network connection devices is their ability to efficiently and intelligently manage data transmission within a LAN. They provide better performance, security, and scalability compared to older technologies like hubs and offer advanced features for network management and optimization. SWITCHES
A Virtual LAN (VLAN) is a technology used in computer networking that allows you to segment a physical network into multiple logical networks. These logical networks operate as if they are separate and isolated, even though they share the same physical infrastructure. VLANs are typically used to improve network efficiency, security, and management by grouping devices into different broadcast domains regardless of their physical location. This segmentation is achieved through network switches and is a fundamental tool for network administrators to control and organize traffic in complex networks. VIRTUAL LANS Vlans
VLAN 0, 4095: These are reserved VLAN which cannot be seen or used. VLAN 1: It is the default VLAN of switches. By default, all switch ports are in VLAN. This VLAN can’t be deleted or edit but can be used. VLAN 2-1001: This is a normal VLAN range. We can create, edit and delete these VLAN. VLAN 1002-1005: These are CISCO defaults for token rings. These VLAN can’t be deleted. VLAN 1006-4094: This is the extended range of VLAN. 4095: These are reserved VLAN which cannot be seen or used. VLANS RANGE
Improved network security : VLANs can be used to separate network traffic and limit access to specific network resources that improves security. Better network performance : By segregating network traffic into smaller logical networks, VLANs can reduce the amount of broadcast traffic . Simplified network management: VLANs allow network administrators to group devices together logically, rather than physically, which can simplify network management tasks such as configuration, troubleshooting etc. Flexibility: VLANs can be configured dynamically, allowing network administrators to quickly and easily adjust network configurations as needed. Cost savings: VLANs can help reduce hardware costs by allowing multiple virtual networks to share a single physical network . SEVERAL FEATURES AND BENEFITS
In conclusion, connecting devices and implementing Virtual LANs (VLANs) in a computer network is a pivotal strategy for enhancing network efficiency, security, and scalability. VLANs facilitate better resource management, improved isolation of sensitive data, and simplified network administration. This approach empowers organizations to adapt to evolving network demands, ensuring a more agile and resilient infrastructure that can meet the challenges of today's rapidly evolving digital landscape. CONCLUSION