Types of Routing and Date Retransmitting Hardware and Devices

Good Essays
There are many types of routing or data/packet retransmitting hardware and devices that networks can utilize for security purposes. Some use one or a combination for data transfer. However, each poses a level or type of vulnerabilities, additional unwanted threats, and countless types of risk. The quintessential design is to provide a means to controlling the flow of packet transfer. The main function of the switch, router, gateways, or hubs is having the ability to process and forward data packets on the network. The creation and function is to ensure that each having their own unique functions and configurations which makes one a more viable optional choice over the next for ensuring data forwarding. For example, large networks will need routing protocols that will send the data packet to the intended destination and not broadcast it throughout the entire network.
Gateways provide nodes with a contactless connection into the resources that are available for the users. The basic gateways that are installed in many pc are called NIC’s or network interface card (Andrews, 2006, pp. 846-847). These gateways can wither be hardware or protocols within the given equipment that in installed. It is essential that data have the ability to transverse the network. However, to accommodate this function, the data needs to be accepted/rejected and/or forward or dropped. For the purpose of connecting nods, networks, and interaction, gateways must be present. Without any form of implementing gateways, communications would be non-existent. However, the term gateway can also be referred to as routers, wiles AP’s, switches, and hubs. This is fairly easy to distinguish as it points to some form of access to the networks resources.
Hubs are the basic...

... middle of paper ...

...l, however, with more accuracy involved. Nodes that are connected to the switch will not re-transmit data to everyone. The switch will deliver its payload according to the hear destination which keeps everyone else from receiving the data. Essentially speaking and highly dependent on the network set-up and configurations, each provides for a single point of access, ingress/egress management, and a certain level of security.

Works Cited

(2006). Installing a Network Interface Card. In J. Andrews, Managing and Maintaining your PC (pp. 846-847). Boston, MA: Course Technology Cengage Learning.
Beasley, J. (2004). The Network switch. In J. Beasley, Networking (pp. 92-93). Upper Saddle River, NJ: Prentice Hall.
Institute, C. L. (2005). Switching and Routing. In R. H. Ivy, Networking + Fundamentals and Certification (pp. 192-193). Upper Saddle River, NJ: Prentice Hall.
Get Access