In This Topic
- 1.1 Explain the role and function of network components
- 1.2 Describe characteristics of network topology architectures
- 1.3 Compare physical interface and cabling types
- 1.4 Identify interface and cable issues
- 1.5 Compare TCP to UDP
- 1.6 Configure and verify IPv4 addressing and subnetting
- 1.7 Describe the need for private IPv4 addressing
- 1.8 Configure and verify IPv6 addressing and prefix
- 1.9 Compare IPv6 address types
- 1.10 Verify IP parameters for client OS
- 1.11 Describe wireless principles
- 1.12 Explain virtualization fundamentals
- 1.13 Describe switching concepts
1.1 Explain the role and function of network components
Routers
Routers are Layer 3 devices that forward data packets between computer networks. They perform the traffic directing functions on the Internet.
Key functions of routers include:
- Connecting multiple networks and forwarding data packets between them
- Determining the best path for data to travel using routing protocols
- Acting as a demarcation point between different network segments
- Providing basic firewall functionality
Routers maintain routing tables that store information about network destinations. When a router receives a packet, it examines the destination IP address and determines the best path for forwarding the packet based on its routing table.
Figure 1: Illustration of routers in a network
Switches
Switches are Layer 2 devices that connect devices within a network (usually a LAN) and use MAC addresses to forward data to the correct destination.
Key functions of switches include:
- Creating a network by connecting multiple devices
- Learning MAC addresses of connected devices
- Forwarding frames only to the specific port where the destination device is connected
- Supporting VLANs to segment a network logically without changing the physical topology
Unlike hubs, which broadcast data to all connected devices, switches use MAC address tables to send data only to the intended recipient, improving network efficiency and security.
Firewalls
Firewalls are network security devices that monitor and filter incoming and outgoing network traffic based on an organization's previously established security policies.
Key functions of firewalls include:
- Establishing a barrier between a trusted internal network and untrusted external networks
- Filtering traffic based on predefined security rules
- Protecting against unauthorized access attempts
- Logging network traffic for security analysis
Modern firewalls can operate at different layers of the OSI model and can include advanced features like intrusion prevention, application control, and deep packet inspection.
Access Points
Wireless Access Points (WAPs) are networking devices that allow wireless devices to connect to a wired network using Wi-Fi standards.
Key functions of access points include:
- Providing wireless connectivity to wired networks
- Broadcasting SSIDs (network names)
- Authenticating wireless clients
- Encrypting wireless traffic for security
Access points can operate in different modes, including standalone mode, controller-based mode, and mesh mode, depending on the network requirements.
Key Points to Remember
- Routers operate at Layer 3 and forward packets between different networks
- Switches operate at Layer 2 and forward frames within the same network
- Firewalls filter traffic based on security policies to protect networks
- Access points provide wireless connectivity to wired networks