0% found this document useful (0 votes)
15 views

Group 9

networking: devices and equipment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Group 9

networking: devices and equipment
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

DATA

COMMUNICATION
DEVICES AND
EQUIPMENT
By: Group 9
01. TRANSMISSION EQUIPMENT

02. NETWORKING HARDWARE

03. CABLING & TRANSMISSION MEDIA

04. PROTOCOL-SPECIFIC
EQUIPMENT

05. MONITORING & SECURITY TABLE OF


EQUIPMENT
CONTENT
GREETINGS!

Reyes, Rayver Reyes, John Lexter Rosales, Frederick

Rivera, Friscel Retardo, Glaiza Mae Rivera, Keneth


01.

TRANSMISSION
EQUIPMENT
Modulates and
demodulates
signals for
transmission over
telephone lines.
Modem
Directs data
packets between
networks,
managing traffic
between them.

Router
Switch

Connects multiple devices within a local area


network (LAN) and forwards data based on MAC
addresses.
Repeater

Amplifies and regenerates signals to extend the


transmission distance.
Serves as an entry
and exit point for
data going
between different
networks.

Gateway
Multiplexer (MUX)

Combines multiple signals into one for


transmission and splits them back at the
destination.
02.

NETWORKING
HARDWARE
1. NETWORK INTERFACE CARD (NIC)

Network Interface
Controller
Network Card
Lan Adapter
Wireless Wired

USB Fiber Optic


A simple device that connects
multiple devices in a network.

Hub

Provides wireless access to a wired


network for wireless devices like
smartphones and laptops.

Access Point
Controls incoming and outgoing network
traffic, protecting the network from
unauthorized access

Firewall
03.
CABLING &
TRANSMISSION
MEDIA
Ethernet Cables

Ethernet Cables (Cat5, Cat6, etc.):


Physical cables used to connect
devices in a wired network.
Fiber Optic Cable:
Transmits data as
light pulses,
supporting high-
speed
communication
over long
distances.
Fiber Optic Cable:
Coaxial Cable:
Used for
transmitting data
in television and
broadband
internet
connections.
Coaxial Cable:
04.
PROTOCOL-
SPECIFIC
EQUIPMENT
VoIP PHONES
Voice over Internet Protocol (VoIP) Facilitate voice
communication over IP networks.

One of the primary characteristics of VoIP phones is


their ability to convert analog voice signals into digital
data packets, which are then sent over the internet.
This allows for greater flexibility and often lower costs
compared to conventional phone systems.

VoIP phones typically offer a range of features such


as call forwarding, voicemail to email, conference
calling, and integration with other digital services like
customer relationship management (CRM) systems.
WIRELESS CONTROLLER
Manages multiple wireless access points in a large
network, controlling traffic flow and security.

These controllers typically use Bluetooth, RF (radio


frequency), or infrared technology to communicate
with the main device, offering greater freedom of
movement and convenience.

Wireless controllers often boast low-latency


performance, ensuring that actions are executed in
real-time with minimal delay, a critical feature for
gaming and other interactive applications.
PROXY SERVER
A proxy server acts as an intermediary between a
user's computer and the internet, allowing for indirect
network connections to other servers.

It essentially receives requests from clients seeking


resources from other servers, and then forwards
those requests to the appropriate servers.

The responses are then sent back through the proxy


server to the client, effectively masking the client's IP
address and providing an additional layer of security
and privacy.
05
MONITORING &
SECURITY
EQUIPMENT
NETWORK ANALYZER
Monitors and analyzes network
traffic, helping diagnose issues or
performance bottlenecks.

The basic working principle of a


network analyzer is to measure the
phase & amplitude of both the waves
like reflected & incident at the
different ports of the Device Under
Test (DUT).
Works and Purpose
1. Captures Network Traffic
It listens to the data (called packets) being sent and received over a network.

2. Monitors Performance
It helps see how well the network is working, checking things like speed,
efficiency, and any delays or drops in communication.

3. Diagnoses Issues
It identifies problems, such as bottlenecks (slow points in the network), errors,
or security threats (like unauthorized access or hacking).
4. Improves Network
Based on the data, it helps technicians make changes to improve the network’s
performance or fix issues.
INTRUSION DETECTION
SYSTEM
An intrusion detection system (IDS) is an
application that monitors network traffic
and searches for known threats and
suspicious or malicious activity. The IDS
sends alerts to IT and security teams when
it detects any security risks and threats.

What is an Intrusion in Cybersecurity?


typically an attacker gaining unauthorized
access to a device, network, or system.
HOW DOES AN INTRUSION
DETECTION SYSTEM WORK?

An IDS works by looking for the


signature of known attack
types or detecting activity that
deviates from a prescribed
normal. It then alerts or reports
these anomalies and potentially
malicious actions to
administrators so they can be
examined at the application
and protocol layers.
HOW DOES AN INTRUSION
DETECTION SYSTEM WORK?

1. Traffic from the Internet


and LAN
2. Intrusion Detection System
(IDS)

3. Alert Administrator
4. Forensic Analysis
VPN (VIRTUAL PRIVATE
NETWORK) GATEWAY
A VPN gateway is a network device that
enables encrypted communication
between different networks over the
internet, serving as the central point in a
virtual private network.

VPN gateways can connect multiple


networks, ranging from on-premises sites
to virtual private clouds, facilitating the
secure exchange of information over the
internet. When establishing multiple
connections through the same gateway,
the bandwidth is shared among all VPN
tunnels.
HOW DOES A VPN GATEWAY WORK?
LOAD BALANCER
A load balancer is a networking device or
software application that distributes and
balances the incoming traffic among the
servers to provide high availability,
efficient utilization of servers, and high
performance.

Load balancers are highly used in cloud


computing domains, data centers, and
large-scale web applications where
traffic flow needs to be managed.
The primary goal of using a load
balancer is, not to overburden with
huge incoming traffic which may lead
to server crashes or high latency.
HOW LOAD BALANCER WORKS?

We can spread the request across multiple servers


if one of the servers goes offline the service will be continued.
the latency on each request will go down because each server is not
bottlenecked on RAM/Disk/CPU anymore.
THANK YOU
Do you have any question?

You might also like