Hacking For Babies
  • Introduction
  • Ethical Hacking
  • Kali Linux
    • Why Kali ?
    • Virtual Machine
    • kali on Cloud
    • Bootable USB
    • Dual Boot Kali
    • Kali Nethunter
    • Most Used Linux Commands
    • Additional Information
  • Network Basics
    • What is the internet ?
    • Key Words
    • Network devices
    • LAN / WAN
    • VPN (Virtual Private Network)
    • Deep and Dark Web
    • Networking Commands
    • Additional Information
  • OSINT
    • Maltego
    • Google Advanced Search Operators
    • OSINT Username Finder
    • Social Media OSINT
    • Reverse Image Search
    • Protect yourself from OSINT
    • Additional Information
  • Digital Forensics
  • Phishing Attacks
    • Temporary Numbers
    • GitHub Projects/Tools
    • Kali Pre-Installed Tools
    • Emails Tricks
    • How to secure yourself from phishing attacks
    • Additional Information
  • Hardware Attacks
    • Marketplaces and Websites
    • Keylogger
    • USB Killer
    • Ethernet Hacking Tools
    • Flipper Zero
    • Bad USB
  • HID Attacks
    • Classic Bad USB
    • Wireless Bad USB
    • Keystroke Injection Cable
    • Other Tools Using the Some Concept
    • Simple Ducky Script
    • Reverse Shell Ducky Script
    • Solution for Bad USB
  • Cryptography
    • What is Cryptography ?
    • Simple Cryptography Algorithms
    • Hash Algorithms
    • Symmetric / Asymmetric cryptography
    • RSA Cryptosystem
    • Quantum Computers VS Cryptography
    • Steganography: Hiding Data in music and photos
    • Additional Information
  • Password Attacks
    • Dictionary Attacks
    • Brute Force Attacks
    • Hashcat
    • Hydra
    • Other Password Attacks Tools
    • Protect your Self against Password Attacks
  • Wireless Attacks
    • RFID / NFC Attacks
    • Bluetooth Attacks
    • MouseJack Attacks
    • IR Replay Attacks
    • RF Attacks
    • Wifi Attacks
  • WIFI Attacks
    • Wireless Adapters
    • Basic WIFI Manipulation
    • Deauthentication Attack
    • WIFI Cracking
    • MITM Attacks
    • Prebuild WIFI Pentesting Tools
    • WIFI Attack Solution
    • Additional Information
  • WIFI Cracking
    • WEP Cracking
    • WPS Attack
    • WPA Handshake Capture
    • PMKID Hash Capture
    • Hashcat Cracking
    • Wifite
    • Airgeddon
    • Fern WIFI Cracker
    • Protecting your Wi-Fi network from cracking
  • Coming Soon
Powered by GitBook
On this page
  1. Network Basics

Network devices

PreviousKey WordsNextLAN / WAN

Last updated 1 year ago

Network devices are physical devices that allow computers and other devices to connect to a network and communicate with each other. They come in a variety of shapes and sizes, and each has a different function.

Some of the most common network devices include:

  • Hubs. Hubs are simple devices that connect multiple devices to the same network. They work by repeating all data packets that they receive to all connected devices.

  • Switches. Switches are more intelligent than hubs and bridges. They can learn the MAC addresses of the devices connected to them and forward data packets only to the intended recipient. This allows for more efficient use of network bandwidth. (You can watch created by to understand more how Switchers Works).

  • Routers. Routers are the most complex network devices. They connect different networks together, such as a home network to the internet. They do this by routing data packets between networks based on their destination IP addresses.(You can watch created by to understand more how Routers Works).

  • Modem: A modem converts digital signals from a device into analog signals that can be transmitted over a telecommunications network. It allows devices to connect to the internet through an internet service provider (ISP).

  • Wireless Access Point (WAP): A WAP allows wireless devices to connect to a wired network. It acts as a bridge between wireless and wired networks, enabling wireless communication.

  • Repeaters. Repeaters are similar to hubs, but they amplify the signal as they repeat it. This allows them to extend the reach of a network.

  • Network Interface Card (NIC): A NIC is a hardware component that enables a device to connect to a network. It provides the physical interface for devices to transmit and receive data over the network.

  • Firewall: A firewall is a security device that monitors and controls network traffic based on predefined security rules. It helps protect the network from unauthorized access and potential threats.

  • Gateways. Gateways connect two or more networks that use different protocols. For example, a gateway can connect a home network to a corporate network that uses a different type of network operating system.

  • Bridges. Bridges connect two or more network segments that use the same type of network technology. They work by filtering out duplicate data packets and sending only the unique packets to each segment.

These are just some of the many different types of network devices. The specific devices that are used in a network will depend on the size and complexity of the network, as well as the specific needs of the organization.

this YouTube Video/Tutorial
NetworkChuck
this YouTube Video/Tutorial
NetworkChuck