Fact-checked by Grok 2 weeks ago

Networking hardware

Networking hardware refers to the physical devices and components essential for establishing, maintaining, and facilitating communication and data exchange between computers, servers, and other digital endpoints in a . These elements operate at the lower layers of the , primarily the physical, , and network layers, enabling the transmission of signals over wired or wireless media while ensuring reliable connectivity. Key components of networking hardware include network interface cards (NICs), which serve as the primary interface between a host device (such as a PC, , or ) and the network, supporting standards like Ethernet for wired connections or for wireless ones. Hubs and switches act as central connection points: hubs broadcast data to all connected devices, while switches intelligently forward data only to the intended recipient based on MAC addresses, reducing . Routers connect disparate networks, such as linking a (LAN) to the wider , by using routing tables to determine optimal data paths and perform protocol translations. Additional devices enhance network functionality and security, including bridges that segment traffic to prevent collisions, repeaters that amplify signals to extend cable lengths beyond 100 meters, and firewalls that filter incoming and outgoing traffic to protect against unauthorized access. Networking hardware supports various topologies, such as star (using a central switch), bus, ring, and mesh, each suited to different scales from small LANs to wide area networks (WANs). The evolution of these components, from early hubs to modern high-speed switches supporting (up to 1000 Mbps), has been driven by standards from organizations like IEEE, enabling scalable and efficient data processing in environments ranging from homes to enterprise data centers.

Overview

Definition and Scope

Networking hardware encompasses the physical devices essential for interconnecting computers and other equipment within a , enabling the , , and exchange of across various communication systems. These components include both active devices, which process and manage signals—such as routers and switches that perform , switching, and amplification functions—and passive devices, which primarily facilitate without active processing, like connectors and certain hubs that simply relay . This hardware forms the tangible infrastructure that supports operations, distinct from intangible elements like software protocols or that govern handling rules. The scope of networking hardware spans a wide range of physical components, from basic elements like network interface cards (NICs) and connectors that enable device attachment to more sophisticated systems such as multilayer switches and enterprise-grade routers that handle high-volume traffic. It excludes transmission media, such as cables, fiber optics, or wireless spectrum, which serve as the pathways for data rather than the devices themselves, as well as purely software-based components like network operating systems or protocols that define communication standards. This delineation ensures that networking hardware focuses solely on the electromechanical and electronic apparatuses required for physical connectivity and basic signal management in local area networks (LANs), wide area networks (WANs), and beyond. Central to networking hardware are key concepts distinguishing between end devices, or hosts, which originate or consume —such as computers, servers, smartphones, and sensors—and intermediary devices that act as transit points to forward, amplify, or direct between hosts, including bridges and gateways. Hosts serve as the network's endpoints, generating requests and processing responses, while intermediaries ensure efficient flow without originating content themselves. This architecture scales from small personal LANs connecting a few home devices to vast global infrastructures like the , comprising millions of interconnected routers and switches to support worldwide exchange. As of 2025, networking hardware plays a pivotal role in powering modern connectivity demands, underpinning the proliferation of (IoT) ecosystems where billions of devices require robust, low-latency links for data sharing in applications like smart cities and industrial automation. It also enables seamless services by providing the scalable infrastructure for hybrid and multi-cloud environments, facilitating edge processing and secure data routing essential for AI-driven analytics and remote operations. Furthermore, advancements in hardware support applications, such as 5G-enabled video streaming and autonomous systems, ensuring reliable performance amid growing complexity and cyber threats.

Historical Evolution

The foundations of networking hardware lie in 19th-century telecommunications innovations that introduced concepts of signal transmission and switching. In the 1830s, the electric telegraph, pioneered by inventors such as Samuel F. B. Morse and , relied on electromagnetic relays—early —to boost fading signals over long distances, enabling reliable point-to-point communication across wires. These devices marked the first use of hardware to regenerate and extend electrical signals, a principle central to later network . By the 1870s, the telephone's invention by spurred the development of manual switchboards, with the first operational exchange established in 1878 to connect multiple callers via electromechanical switching, laying groundwork for circuit-based network architectures. The mid-20th century saw the emergence of computer networking hardware with the project, launched in 1969 by the U.S. Department of Defense's Advanced Research Projects Agency (). This network employed Interface Message Processors (IMPs), rugged minicomputers developed by Bolt, Beranek and Newman (BBN), to handle and interface host computers with leased telephone lines, connecting the first four nodes at UCLA, Stanford Research Institute, UC Santa Barbara, and the . In 1973, and colleagues at Xerox PARC invented , a technology using coaxial cables for collision-detection-based data transmission at 2.94 Mbps, which initially incorporated multiport transceivers akin to rudimentary hubs for shared medium access. The Institute of Electrical and Electronics Engineers (IEEE) standardized Ethernet as 802.3 in 1983, promoting its adoption through defined cabling and signaling protocols. Meanwhile, Cisco Systems, founded in 1984, commercialized multi-protocol routers in the late 1980s, enabling internetworking of disparate LANs via , which became essential for expanding ARPANET into the broader . The 1990s and 2000s brought refinements in efficiency and wireless capabilities, with Ethernet switches supplanting hubs by the mid-1990s through store-and-forward switching that reduced collisions and supported full-duplex operation at 100 Mbps under (IEEE 802.3u, 1995). The standard, ratified in 1997, introduced wireless networking hardware like access points and client adapters operating at up to 2 Mbps in the 2.4 GHz band, enabling untethered LAN connectivity. Into the 2010s, IPv6 adoption accelerated to address , with global traffic reaching approximately 6% by 2015 and 35% by 2020, increasing to around 45% as of 2025. High-speed fiber optic transceivers, such as 40G and 100G Ethernet modules, proliferated in data centers during this decade, supporting backbone speeds exceeding 100 Gbps via dense . From the late 2010s to 2025, networking hardware evolved toward higher performance and intelligence amid surging data demands. The rollout began in 2019 with commercial modems and base stations from vendors like and , delivering sub-1 ms and up to 20 Gbps peaks for . hardware, including distributed gateways and micro data centers, gained prominence to process data locally, reducing in ecosystems. Post-2020, (SDN) hardware surged due to expansion, with programmable switches from companies like enabling dynamic traffic orchestration via protocols. By 2025, integration in hardware like smart NICs and controllers is optimizing traffic routing through machine learning-based prediction, improving efficiency in hyperscale networks. In 2025, Wi-Fi 7 hardware became widely available, supporting multi-gigabit speeds and improved connectivity.

Classification

By OSI Model Layers

Networking hardware is classified by the Open Systems Interconnection (OSI) model, a conceptual framework that divides network communication into seven layers, each handling specific functions from physical transmission to application-level interactions. This classification helps in understanding how devices operate at particular layers to process data units—such as bits, frames, and packets—ensuring interoperability across diverse network environments. Devices are often designed to function primarily at one or more layers, though many modern implementations are hybrids that span multiple layers for enhanced efficiency. Layer 1: handles the transmission of raw bit streams over physical media, defining electrical, mechanical, and procedural specifications for hardware connections. Devices at this layer, such as , hubs, and network interface cards (NICs), focus on signal regeneration to extend transmission distances, broadcasting bits without interpreting content, and providing interfaces for cabling or wireless media. For instance, amplify signals to prevent degradation over long distances, while NICs convert into physical signals for transmission via Ethernet cables or fiber optics. Layer 2: manages node-to-node delivery of within a single , incorporating error detection and flow control using (MAC) addresses. Hardware like bridges and switches operates here, forwarding based on to reduce collisions and segment traffic efficiently. Switches, for example, use a to direct only to the intended , improving over shared media. Layer 3: facilitates and forwarding of packets across interconnected networks using logical addressing, such as addresses, and protocols to determine optimal paths. Routers are the primary devices at this layer, examining packet headers to make forwarding decisions via tables, enabling communication between disparate networks like LANs and WANs. Layers 4-7: Transport to Application Layers involve end-to-end delivery, session management, data formatting, and application-specific interactions, where hardware often integrates translation and functions. Gateways operate primarily at these higher layers, translating between different (e.g., converting HTTP to another application ) to connect incompatible networks. Firewalls function across these layers, particularly at Layer 4 for stateful inspection of segments and Layer 7 for application-aware filtering to enforce policies. A key concept in this classification is the specificity of layer functions, where lower-layer devices handle hardware-centric tasks like signal , while higher-layer ones manage logical and application-oriented operations; however, hybrid devices like multilayer switches combine Layer 2 switching with Layer 3 to optimize both and inter-network traffic.

By Functional Role in Network Architecture

Networking hardware can be classified by its functional role within network topologies, emphasizing its position in data flow and hierarchical structures rather than protocol layers. This approach highlights how devices contribute to , reliability, and in architectures like the traditional three-tier model, where roles are divided into , , /border, and end functions. Such classification aids in designing networks that optimize performance for specific environments, such as enterprise campuses or data centers. In the core role, hardware serves as the high-capacity backbone for internal traffic aggregation, providing low-latency switching and reliable connectivity across the network. Core devices, such as high-performance routers and switches, connect multiple layers and handle high-speed transit without complex to minimize delays, often supporting features like redundant supervisors for in environments like centers. For example, 9600 series switches in the core layer ensure consistent (QoS) for priority traffic, such as voice and video, through advanced queuing mechanisms. This role focuses on and speed, aggregating flows from lower tiers into a unified internal pathway. The distribution or hybrid role involves intermediate hardware that aggregates traffic from access layers while enforcing policies, routing, and security boundaries. These devices, typically multilayer switches, act as a demarcation point between core and access, performing tasks like VLAN segmentation, access control lists (ACLs), and load balancing to manage inter-network flows efficiently. In Cisco's model, distribution layer hardware like the Catalyst 9300 series supports non-stop forwarding (NSF) and stateful switchover (SSO) for high availability, allowing seamless protocol continuity during failures. Hybrid designs often collapse distribution and core functions in smaller networks to reduce complexity while maintaining policy application. For the access or border role, hardware functions as entry and exit points, connecting internal users or segments to external networks and applying perimeter controls. Access layer devices, such as Layer 2 switches, provide direct connectivity to end users with features like (PoE) and , while border elements like firewalls secure transitions to wide-area networks (WANs) by filtering inbound/outbound traffic. In hierarchical topologies, access switches like the Cisco Catalyst 9200 series manage edge QoS and isolate broadcast domains, serving as the for user devices. Border roles emphasize demarcation, with firewalls at perimeters to enforce security policies against external threats. The end role encompasses user-facing hardware that enables direct network connectivity for hosts and terminals. Devices like network interface cards (NICs) in computers or modems in residential setups serve as the final , handling signaling and initial packet framing for local attachment. These components integrate into endpoints to support plug-and-play access, often with built-in support for standards like Ethernet or , ensuring seamless integration into access layers without additional aggregation. Key concepts in this classification stem from hierarchical models, such as Cisco's three-tier architecture, which separates roles to enhance manageability and fault isolation in campus networks. As of , network designs are increasingly evolving toward flat (SDN) architectures in many environments, where traditional tiers are complemented or replaced by programmable, centralized planes that abstract hardware roles into more unified, scalable topologies. SDN separates from planes, allowing commodity switches to handle simplified forwarding under software , reducing the need for rigid hierarchies and enabling dynamic adaptations for and environments. This shift, driven by standards like , promotes vendor-agnostic hardware utilization and automation, as seen in deployments by organizations like and .

Core Devices

Repeaters and Hubs

are networking devices that operate at the (OSI Layer 1) to extend the range of network signals by amplifying or regenerating them, thereby counteracting signal attenuation caused by distance and medium resistance. They receive incoming signals, clean them of noise where applicable, and retransmit them at full strength without performing any intelligent processing or decisions. In Ethernet networks, repeaters are particularly useful for connecting segments over long cables, such as unshielded twisted-pair (UTP) wiring, allowing compliance with maximum segment lengths like 100 meters in 10BASE-T setups. There are two primary types of repeaters: analog and digital. Analog repeaters simply boost the incoming signal's amplitude, including any accumulated noise, making them suitable for short extensions but prone to further degradation over multiple hops. Digital repeaters, in contrast, fully regenerate the signal by reconstructing the original bits through techniques like bit timing recovery, reshaping the waveform to remove distortion and jitter while retiming the signal, which provides cleaner transmission for longer distances. Both types introduce minimal propagation delay, but their use must account for the basic signal delay formula in copper media: \tau = \frac{d}{v}, where \tau is the delay, d is the distance, and v is the propagation velocity (approximately 200 m/μs or 0.66c in UTP cables), resulting in a typical delay of about 5 ns per meter for Category 5e copper. Hubs function as multi-port at OSI Layer 1, connecting multiple devices in a star topology by broadcasting all incoming traffic from one port to every other connected port, effectively creating a single shared . Introduced in the late alongside 10BASE-T Ethernet (standardized in IEEE 802.3i-1990), hubs enabled the shift from bus topologies to simpler twisted-pair installations, supporting up to 10 Mbps over distances up to 100 meters per segment. They come in passive and active variants: passive hubs require no external power and merely provide connectivity without signal amplification, while active hubs (also called managed or intelligent in advanced forms) use power to regenerate signals, detect errors, and sometimes offer basic monitoring. Despite their historical role, hubs are now largely obsolete in modern networks due to inefficiencies such as half-duplex , where devices cannot transmit and receive simultaneously, leading to frequent collisions within the single shared by all ports. This broadcasting mechanism also poses risks, as all traffic is visible to every connected device, enabling easy without . and hubs perform no advanced functions like learning or routing, limiting them strictly to physical signal extension.

Bridges and Switches

Bridges are data link layer devices that interconnect multiple local area network (LAN) segments, enabling them to function as a single logical network while filtering traffic to reduce collisions and improve efficiency. By examining the destination Media Access Control (MAC) address in Ethernet frames, bridges forward data only to the relevant segment, unlike hubs that broadcast indiscriminately. This selective forwarding minimizes unnecessary traffic and extends the effective size of collision domains beyond the limitations of a single Ethernet segment, which is typically restricted to about 2500 meters due to signal degradation. Invented in the early 1980s by engineers at Digital Equipment Corporation (DEC), such as Mark Kempf, the first commercial bridge, the LAN Bridge 100, addressed the scalability issues of growing Ethernet networks by segmenting them intelligently. There are two primary types of bridges: transparent bridges and source-routing bridges. Transparent bridges, standardized in IEEE 802.1D, operate without explicit configuration from end devices; they automatically learn MAC addresses by observing incoming frames and maintain a dynamic filtering database (also called a MAC address table) that maps source MAC addresses to specific ports. When a frame arrives with an unknown destination MAC, the bridge floods it to all ports except the source port; once learned, subsequent frames are unicast to the appropriate port. Entries in this table age out after an inactivity period, typically 300 seconds, to account for device mobility or failures. In contrast, source-routing bridges, primarily used in Token Ring networks, rely on the source device to specify the route through the network using a Routing Information Field (RIF) in the frame header, allowing explicit path selection across bridged segments but introducing higher overhead. Switches represent an evolution of multi-port bridges, providing higher port densities and enhanced performance for modern LANs while operating at OSI Layer 2 using MAC address-based forwarding. Essentially advanced bridges with multiple ports, switches create dedicated collision domains per port, isolating traffic and eliminating the shared medium issues of half-duplex Ethernet; in full-duplex mode, simultaneous bidirectional communication doubles effective bandwidth without collision risks. They support VLANs per , allowing logical segmentation of a physical into multiple broadcast domains for improved security and . Switches are categorized as unmanaged (plug-and-play with no options, suitable for small networks) or managed (configurable via protocols like SNMP for features such as , QoS, and security policies). To prevent loops in redundant topologies, both bridges and switches implement the as defined in , which builds a loop-free logical by electing a root and blocking redundant paths. The root is selected based on the lowest Bridge , a 64-bit value combining a configurable priority (default 32768, in multiples of 4096) and the device's ; switches exchange Bridge Protocol Data Units (BPDUs) every 2 seconds (hello time) to propagate this information, with ports transitioning through listening, learning, and forwarding states over a 15-second forwarding delay to ensure stability. If a topology change occurs, aging timers are accelerated to 15 seconds for rapid reconvergence. The learning process in switches mirrors that of bridges: incoming frames' source are associated with ingress ports, unknown destinations trigger flooding, and tables support up to thousands of entries depending on hardware, with aging at 300 seconds to maintain accuracy. Switches employ two main forwarding methods: store-and-forward and cut-through. In store-and-forward mode, the entire frame is received, buffered, and verified for errors via before forwarding, ensuring clean transmission but adding of about 10-20 microseconds per gigabit port. Cut-through mode, by contrast, begins forwarding after reading only the destination (first 6 bytes), reducing to under 5 microseconds but potentially propagating erroneous frames. Many modern switches use adaptive or fragment-free hybrids to balance speed and reliability. Overall switch throughput is calculated as the number of ports multiplied by the link speed and doubled for full-duplex operation; for example, a 24-port gigabit switch achieves up to 48 Gbps aggregate non-blocking when all ports operate simultaneously.

Routers and Gateways

Routers are networking devices that operate at the OSI model's Layer 3, the network layer, where they interconnect local area networks (LANs) and wide area networks (WANs) by forwarding data packets between distinct networks using logical addressing such as addresses. They determine optimal paths for packet transmission based on routing tables, which are populated through static configurations or protocols. Introduced in the , routers like Cisco's Advanced Gateway Server (AGS), launched in 1986, marked a pivotal advancement in by supporting multi-protocol environments and enabling the expansion of early backbones. Core functions of routers include packet fragmentation, where oversized packets are divided into smaller fragments to fit the (MTU) of outgoing interfaces, and time-to-live (TTL) decrement, which reduces the TTL field by one per hop to prevent infinite loops, discarding packets when TTL reaches zero. In subnet environments, a —typically the of the local router—serves as the exit point for traffic destined outside the local , allowing end devices to reach remote networks without specific routes. Routers employ dynamic routing protocols to maintain and update routing tables efficiently. (OSPF), a link-state protocol, and Border Gateway Protocol (BGP), an , are widely used; OSPF suits internal enterprise networks, while BGP handles inter-domain routing across the . Advancements in 2024 saw BGP routing tables grow by 10% in entries (from ~201,000 to ~221,000), with continued growth in 2025 reaching 236,461 entries as of November 2025, emphasizing IPv6 scaling and optimizations for larger address spaces to support expanding global connectivity. Routing decisions rely on metrics to evaluate path quality, such as hop count—the number of intermediate routers traversed—or bandwidth, which prioritizes higher-capacity links to minimize congestion. In link-state protocols like OSPF, the is computed using , which builds a from the link-state database. The algorithm proceeds iteratively: first, initialize distances by setting the source node's distance to zero and all others to infinity; then, repeatedly select the unvisited node with the smallest tentative distance, mark it as visited, and relax its adjacent edges by updating neighbors' distances if a shorter path is found through the selected node, continuing until all nodes are processed. Gateways function as protocol converters that bridge dissimilar networks by translating data formats and protocols, such as converting IP traffic to legacy systems like SNA or industrial protocols. Often implemented as routers with additional translation capabilities, gateways enable interoperability in heterogeneous environments, ensuring seamless communication across protocol boundaries without altering the underlying network architecture.

Border Devices

Firewalls and Intrusion Detection Systems

Firewalls are specialized appliances deployed at the perimeter of to monitor, filter, and control inbound and outbound traffic according to predefined policies, thereby protecting internal resources from external threats. These devices enforce rules that determine whether to permit or deny packets based on criteria such as source and destination addresses, ports, and protocols, often implemented through lists (s). For instance, an ACL might specify permit any any eq 80 to allow HTTP traffic from any source to any destination on , while deny 192.168.1.0 0.0.0.255 any blocks all traffic from a specific internal . Common types of firewalls include packet-filtering firewalls, which perform basic stateless inspection by evaluating individual packets against static rules without considering connection context; stateful inspection firewalls, which maintain a state table to track active connections and make decisions based on the overall session , such as ensuring return traffic for established TCP sessions is allowed; and proxy firewalls, which act as intermediaries by terminating connections and inspecting application-layer data before forwarding. Next-generation firewalls (NGFWs) extend these capabilities by integrating intrusion prevention systems (), deep packet inspection for application awareness, and advanced threat intelligence feeds to detect sophisticated attacks like zero-day exploits. Hardware-based firewalls, often in appliance form, provide high-throughput processing essential for perimeters, with dedicated accelerating rule evaluation and packet handling. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) complement firewalls by monitoring network traffic for malicious activities and policy violations, typically positioned inline or in passive modes at network edges. IDS operate in detection-only mode, analyzing traffic for anomalies using signature-based methods, which match packets against known attack patterns like specific malware payloads, or anomaly-based methods, which establish baselines of normal behavior and flag deviations such as unusual data volumes. In contrast, IPS extend IDS functionality by actively blocking threats in real-time; hardware IPS appliances deploy inline to inspect and drop malicious packets at wire speed, preventing attacks from reaching protected hosts. Modern hardware IDS/IPS achieve false positive rates of approximately 5-10% through machine learning refinements that reduce erroneous alerts on benign traffic. The evolution of these systems traces back to the with screening routers that applied basic packet filters to block unauthorized access, as pioneered in early implementations described by Cheswick and Bellovin. By the , dedicated firewall hardware emerged with stateful capabilities, and into the 2020s, integration of AI-driven threat detection has become standard, enabling to identify zero-day attacks by analyzing behavioral patterns in real-time. NIST standards, such as SP 800-41 for s and SP 800-94 for IDPS, provide guidelines for deployment, configuration, and policy management to ensure effective perimeter security without impeding legitimate traffic.

Proxies and Network Address Translators

Proxies and Network Address Translators serve as intermediary border devices in networking architectures, mediating communication between internal networks and external realms while concealing internal structures to enable secure and efficient connectivity. Operating primarily at OSI layers 3 through 7, these devices intercept traffic, perform address mappings, and apply protocol-specific transformations without requiring endpoint modifications. By acting as gateways between private and public address spaces, they address key challenges like IP address scarcity and performance optimization in modern networks. Proxies function by intercepting client requests and forwarding them to destination servers, or vice versa, to provide services such as , filtering, or load balancing. Forward proxies are client-facing intermediaries that clients explicitly configure to route outbound requests, often for or centralized in environments like corporate networks. In contrast, reverse proxies are server-facing, receiving inbound client requests and directing them to backend servers, commonly used for caching, , or shielding origin servers from direct . Application-layer proxies, such as those handling HTTP traffic, operate at OSI layer 7 to inspect and modify protocol-specific payloads, enabling features like adaptation or virus scanning. A key performance enhancement of proxies is caching, where frequently accessed resources are stored locally to reduce origin server load and latency. Caching proxies store HTTP responses and serve them to subsequent identical requests, minimizing consumption and improving response times, particularly in high- scenarios. Transparent proxies intercept without client , while non-transparent ones may alter requests for added functionality like services. Network Address Translators (NATs) mitigate by mapping multiple private addresses from stub domains—such as those in the 192.168.0.0/16 range defined in RFC 1918—to one or more public addresses, allowing internal hosts to communicate externally as if using a single shared identity. Standardized in RFC 1631 in 1994, employs a stateful translation table to track bidirectional mappings, modifying headers and recalculating checksums for outgoing and incoming packets. For instance, a private address like 192.168.1.10 might map to a public address 203.0.113.1, with the table recording source port changes to ensure proper return traffic . NAT implementations vary by mapping strategy: static NAT provides fixed one-to-one translations for dedicated public addresses, suitable for servers requiring inbound access; dynamic NAT allocates temporary public addresses from a pool on a first-come, first-served basis; and Port Address Translation (PAT), or NAT overload, extends this by multiplexing multiple private addresses onto a single public IP using unique transport-layer ports. In PAT, the translation table expands to include port mappings, enabling port overloading where up to 65,535 concurrent connections per public IP are theoretically possible, limited by the 16-bit TCP/UDP port space (ports 0–65535, though some are reserved). This overload capacity is calculated as the available port count, allowing thousands of internal devices to share one public address without exhaustion in typical deployments. Beyond address conservation, NAT offers security benefits by hiding internal and private IPs from external observers, effectively creating a form of default inbound filtering that prevents direct unsolicited access to local hosts. Proxies and NATs are often integrated with firewalls to combine address mediation with threat blocking, enhancing overall border protection. In the context of transition, 2025 enhancements include refined (CGNAT) mechanisms in IPv6-mostly networks, as outlined in IETF drafts, to support gradual migration while maintaining compatibility with legacy IPv4 applications.

End Devices

Network Interface Cards

A network interface card (NIC), also known as a , is a hardware component, typically implemented as a circuit board or integrated chip, that connects a computer or to a network by providing physical and data link layer connectivity. It enables data transmission and reception over local area networks (LANs) or wide area networks (WANs) by handling the conversion of into signals suitable for the transmission medium. The primary functions of a NIC include assigning and managing Media Access Control (MAC) addresses, which are unique 48-bit identifiers used for frame-level addressing on the data link layer, as well as encapsulating outgoing data into frames by adding headers with source and destination MAC addresses, and decapsulating incoming frames to extract the payload for the operating system. Encapsulation involves wrapping higher-layer protocol data units (PDUs) with Ethernet frame headers, including preamble, start frame delimiter, and error-checking cyclic redundancy check (CRC), while decapsulation reverses this process upon receipt. To integrate with the host operating system, NICs rely on device drivers that abstract hardware-specific operations, allowing the OS to send and receive packets via a standardized interface like the Network Driver Interface Specification (NDIS) in Windows environments. NICs support various physical interfaces, with Ethernet connectivity commonly using RJ-45 connectors for twisted-pair copper cabling, while fiber optic variants employ connectors such as , , or MPO for multimode or single-mode to enable higher speeds over longer distances. Common form factors include Express (PCIe) slots for high-performance, internal installations in desktops and servers, offering direct integration for low latency, and Universal Serial Bus (USB) adapters for portable or external connectivity in laptops and low-power devices. Ethernet NICs are standardized under IEEE 802.3, which defines the physical layer specifications, MAC sublayer operations, and framing formats for wired LANs. By 2025, Ethernet NICs have evolved to support speeds exceeding 100 Gbps, with standards like 400 Gbps and emerging 800 Gbps/1.6 Tbps options driven by demands from AI, cloud computing, and high-performance computing (HPC), often incorporating Remote Direct Memory Access (RDMA) via protocols like RoCEv2 for reduced CPU overhead and sub-microsecond latency in data center environments. Some advanced NICs also support Power over Ethernet (PoE), allowing them to deliver up to 25.5 W per port over standard Ethernet cabling to power connected devices like IP phones or cameras, compliant with IEEE 802.3at standards. In half-duplex Ethernet configurations, NICs implement the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) algorithm to manage shared media access, where a device first senses the carrier to check for activity (carrier sense), transmits if idle, detects collisions during transmission, and applies an exponential backoff mechanism—waiting a random time slot doubled after each retry—before retransmitting to minimize contention. Effective throughput on Ethernet links is reduced from raw speeds due to protocol overhead, including frame headers (18-22 bytes for standard Ethernet) and inter-frame gaps; for example, on a 1 Gbps link with 1500-byte frames, effective bandwidth is approximately 94% of the line rate, or about 940 Mbps, calculated as payload size divided by total frame size including overhead. Wireless variants of NICs, such as those for Wi-Fi, provide similar host connectivity but operate under IEEE 802.11 standards and are detailed in wireless access point discussions.

Modems and Residential Gateways

Modems are hardware devices that perform and to convert signals into a format suitable for transmission over analog or hybrid communication lines, such as those used in DSL, , and -optic broadband connections. In DSL modems, this process enables high-speed data over existing lines using techniques like (QAM), while modems adapt signals for infrastructure, and modems interface with optical networks to support gigabit speeds. The core function ensures compatibility between end-user devices and wide-area network () providers, bridging local environments with external transmission media. For cable broadband, the Data Over Cable Service Interface Specification () standards govern modem performance, with DOCSIS 3.1 enabling downstream speeds up to 10 Gbps through advanced channel bonding and efficiency. By 2025, DOCSIS 3.1 and its extensions have become the prevailing standard for multi-gigabit cable services, supporting applications like 4K streaming and with reduced latency compared to prior versions. (OFDM) is a key technique in these modems, dividing data across multiple subcarriers to enhance and robustness against in broadband channels. Residential gateways integrate modem functionality with routing, firewall capabilities, and wireless access point features, serving as centralized hubs for small office/home office () environments. These devices typically employ () to manage multiple internal IP addresses behind a single public WAN IP, alongside built-in firewalls for basic threat protection and integration for local device connectivity. Many models also support (VoIP), allowing analog phones to connect via foreign exchange station (FXS) ports for unified home communication services. The evolution of modems traces from 1990s dial-up models achieving 56 kbit/s over telephone lines to modern cellular modems delivering multi-gigabit , with prototypes emerging in research by 2025 for terahertz-spectrum access. This progression reflects shifts from analog to schemes, driven by demand for higher throughput in residential settings. However, residential gateways remain vulnerable to , where excessive buffering in queues during congestion leads to increased and , impacting real-time applications like video calls. Link quality in modems is often assessed via (SNR), where values exceeding 30 dB indicate reliable performance for high-speed connections, enabling stable data rates without frequent errors. Advanced like 256-QAM, which encodes 8 bits per symbol, is commonly used in cable modems to achieve these speeds by packing more data into each transmission cycle, though it requires strong SNR to avoid bit errors.

Wireless and Access Devices

Wireless Access Points

A wireless access point (AP) is a networking device that connects wireless clients, such as laptops and smartphones, to a wired local area network (LAN) by broadcasting service set identifiers (SSIDs) and managing client associations through the IEEE 802.11 protocol suite. APs serve as the central hub for radio-based communication, translating data between wired Ethernet connections and wireless signals while handling authentication, encryption, and traffic forwarding for connected devices. In enterprise environments, APs often operate in a controller-based architecture, where a centralized system—such as Cisco Meraki's cloud-managed platform—coordinates multiple APs for seamless deployment, configuration, and monitoring across large-scale networks. Modern APs adhere to evolving IEEE 802.11 standards, with IEEE 802.11ax (Wi-Fi 6), published in 2021, introducing multi-user multiple-input multiple-output (MU-MIMO) technology to support simultaneous data streams for multiple clients, enhancing efficiency in dense environments across 2.4 GHz and 5 GHz bands. The subsequent IEEE 802.11be (Wi-Fi 7) standard, published in 2025, extends these capabilities to include the 6 GHz band, enabling wider channel bonding up to 320 MHz and advanced MU-MIMO with up to 16 spatial streams for extremely high throughput exceeding 30 Gbps in aggregate. These standards operate primarily at OSI layers 1 (physical) and 2 (data link), implementing the physical layer (PHY) for signal modulation and the medium access control (MAC) sublayer for frame handling and access coordination. APs facilitate client mobility through roaming handoff protocols like IEEE 802.11r, which enables fast basic service set () transitions by pre-authenticating with target APs, reducing handover latency to under 50 ms for real-time applications. Security is enforced via the Wi-Fi Alliance's WPA3 , which has been the mandatory certification requirement for new Wi-Fi devices since 2020, providing stronger protection against brute-force attacks through and 192-bit encryption modes. For extended coverage, APs support extensions under IEEE 802.11s, allowing wireless backhaul between APs to form self-healing topologies without dedicated wired connections. Key performance aspects include channel bandwidths ranging from 20 MHz to 160 MHz in , which directly influences capacity by allowing more subcarriers for data transmission. Throughput is calculated using the formula for data rate ≈ (modulation order in bits per symbol) × (coding rate) × (number of spatial streams), where higher-order modulations like 1024-QAM in yield up to 10 bits per symbol, enabling peak rates over 9.6 Gbps under ideal conditions. Interference mitigation is achieved through techniques, which direct radio signals toward specific clients using phased-array antennas, improving signal-to-noise ratios and reducing in multi-AP deployments.

Bridges and Extenders

Bridges and extenders are networking hardware devices that operate primarily at Layer 2 of the , facilitating the connection of network segments and the extension of signal coverage without performing full functions. These devices are essential for expanding local area networks (LANs), particularly in local area networks (WLANs), by linking disparate segments such as buildings or covering areas with poor signal reception. In wired environments, simple bridges connect Ethernet segments to filter and forward frames based on MAC addresses, while extenders amplify signals over longer distances using technologies like or repeaters; however, this section emphasizes implementations due to their prevalence in modern access scenarios. Wireless bridges establish point-to-point or point-to-multipoint links to interconnect separate networks, often for building-to-building where cabling is impractical. These devices use directional antennas to create a dedicated path, transmitting Ethernet frames transparently at Layer 2 to maintain . For high-speed applications in 2025, 60 GHz millimeter wave (mmWave) bridges, such as those based on unlicensed solutions, deliver multi-gigabit throughput over distances up to several kilometers, rivaling performance for urban extension. Point-to-multipoint configurations allow a central bridge to connect multiple remote sites, enhancing in or WLAN extensions. Wireless extenders, also known as repeaters, amplify and rebroadcast signals from a primary access point to eliminate dead zones in WLAN coverage. Single-band extenders operate on one frequency (typically 2.4 GHz for broader range but lower speed), while dual-band models use both 2.4 GHz and 5 GHz to balance coverage and performance, reducing interference by dedicating bands for backhaul and client access. The Wireless Distribution System (WDS) protocol enables bridging between access points and extenders in IEEE 802.11 networks, allowing seamless interconnection without wired backhaul by encapsulating frames for distribution across multiple points. In 2025, Wi-Fi 7 (IEEE 802.11be) extenders incorporate multi-link operations and enhanced puncturing to achieve significantly reduced latency in dense environments, supporting high-throughput extensions for applications like AR/VR. Signal propagation in these devices is limited by , which quantifies over and ; the formula for (FSPL) in decibels is: \text{FSPL (dB)} = 20\log_{10}(d) + 20\log_{10}(f) + 20\log_{10}\left(\frac{4\pi}{c}\right) where d is in meters, f is in Hz, and c is the (3 × 10^8 m/s). This model highlights why higher frequencies like 60 GHz experience rapid loss, necessitating line-of-sight alignments. Extenders often face half-duplex limitations, where devices cannot simultaneously transmit and receive on the same , halving effective throughput compared to full-duplex wired links and increasing in chains.

Specialized and Modern Hardware

IoT Devices and Gateways

IoT devices encompass a wide range of sensors and actuators designed for low-power, resource-constrained environments, typically integrating embedded network interface controllers (NICs) that support specialized wireless protocols. These hardware components enable connectivity in massive-scale deployments, such as environmental monitoring or industrial automation, where devices collect data on variables like temperature, humidity, or motion and transmit it wirelessly. Common examples include modules based on Zigbee for short-range, low-data-rate mesh networks, which facilitate reliable communication among numerous nodes with minimal energy use. Similarly, LoRa modules provide long-range, low-power wide-area network (LPWAN) capabilities, ideal for applications like smart agriculture where sensors span large areas without frequent battery replacements. Edge processing chips, such as the ESP32, incorporate microcontrollers with integrated Wi-Fi and Bluetooth, allowing on-device data preprocessing to reduce upstream bandwidth demands. IoT gateways serve as critical aggregators that bridge heterogeneous devices to broader IP-based networks, performing protocol translation to ensure . For instance, these gateways convert lightweight messaging protocols like —optimized for unreliable networks with publish-subscribe patterns—into standard web protocols such as HTTP, enabling seamless integration with services. This translation not only consolidates data from diverse sources but also filters and preprocesses information to minimize latency and bandwidth usage. In 2025, advancements in 5G gateways have introduced ultra-reliable low-latency communication (URLLC) features, supporting real-time applications like autonomous vehicles or remote surgery by achieving sub-millisecond response times over cellular networks. Key protocols underpinning these devices and gateways include CoAP, a RESTful protocol tailored for constrained devices over , which reduces overhead compared to HTTP for resource-limited endpoints, and , an IPv6-based standard that enhances reliability in home and by enabling self-healing topologies. challenges in hardware persist, particularly with the adoption of zero-trust models in 2025 standards, which mandate continuous authentication and encryption to mitigate vulnerabilities in billions of connected devices—over 20 billion globally as of 2025. These standards, influenced by frameworks from organizations like NIST, emphasize hardware-rooted features such as and attested identities to address issues in massive deployments. To support long-term operation in battery-powered scenarios, devices employ techniques, including modes that reduce consumption to the microwatt range during idle periods. This is crucial for extending device lifetimes in remote or untethered applications. life can be modeled using the approach, where the device alternates between active transmission and states; the estimated lifetime is given by: \text{Battery Life} = \frac{\text{[Capacity](/page/Capacity)}}{\text{Power} \times \text{[Duty Cycle](/page/Duty_cycle)}} Here, capacity is in watt-hours, power represents the active-state consumption, and duty cycle is the fraction of time spent active (typically <<1 for ). Such models guide hardware design, ensuring for ecosystems handling billions of intermittently active nodes while integrating briefly with standards like those in access points for hybrid .

Software-Defined Networking Components

Software-Defined Networking (SDN) separates the from the data plane in network hardware, enabling programmable and centralized management of network traffic through specialized components. This paradigm relies on hardware that supports open protocols like for communication between controllers and switches, allowing for dynamic reconfiguration without proprietary . Key hardware elements include data plane devices such as switches equipped with ternary (TCAM) for high-speed flow lookups and centralized controllers running on commodity servers. OpenFlow-compatible switches form the core of SDN data planes, using TCAM to store and match flow rules at wire speed, supporting up to millions of entries depending on the scale. These switches perform exact-match or wildcard-based packet classification, where exact rules target specific header fields like addresses and ports, while wildcard rules use don't-care bits for broader matching, such as subnet-level traffic. For instance, a wildcard rule might match all packets from a source prefix, enabling efficient aggregation of flows without exhaustive table entries. Group tables in these switches further enhance local decision-making, allowing actions like or load balancing with latencies under 1 ms for intra-switch processing, minimizing reliance on remote controller queries. White-box switches, such as bare-metal models from vendors like Edgecore, provide cost-effective SDN hardware by decoupling the operating system from proprietary firmware, supporting and other southbound protocols on merchant silicon. These devices, often deployed in data centers, offer flexibility for custom functions and have seen widespread adoption by 2025, with models like the Edgecore AS7712 handling 100 Gbps+ ports for scalable SDN fabrics. SDN controllers, such as ONOS and OpenDaylight, operate on centralized servers and interface with switches via southbound APIs like , installing flow rules dynamically to orchestrate traffic. Hardware accelerators, including DPUs like BlueField, offload flow processing from controllers, achieving throughputs exceeding 200 Gbps while reducing CPU overhead for complex rule computations. The SDN paradigm emerged in the late 2000s, with foundational work on at in 2008 enabling experimental programmable networks, evolving into commercial deployments throughout the 2010s. By 2025, SDN has integrated with P4-programmable data planes in core networks, allowing operators to customize packet processing for ultra-low latency services like . This adoption yields benefits such as dynamic , where controllers automate resource allocation across heterogeneous hardware, improving network agility and reducing operational costs by up to 40% in large-scale environments compared to traditional setups.

References

  1. [1]
    Chapter 3: Hardware - Florida Center for Instructional Technology
    Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-processing and communications within the ...Missing: definition | Show results with:definition
  2. [2]
    [PDF] Networking Fundamentals - University of Delaware
    triple-E”) is in charge of defining the networking ... Physical network components are the actual devices that you connect together to create a network.
  3. [3]
    [PDF] Introduction What is a computer network? Components of a ...
    Components of a computer network: • hosts (PCs, laptops, handhelds). • routers & switches (IP router, Ethernet switch). • links (wired, wireless).
  4. [4]
    What Is Network Hardware? - Supermicro
    The main components of network hardware are routers, switches, modems, hubs, and bridges. Each serves a specific function in a network, such as routing data ...Missing: authoritative | Show results with:authoritative
  5. [5]
    Networking Hardware - an overview | ScienceDirect Topics
    Networking Hardware refers to the physical components that are responsible for transmitting and receiving data in a computer system.
  6. [6]
  7. [7]
    What Is Network Hardware? Definition, Architecture, Challenges ...
    Dec 17, 2021 · Network hardware is a set of physical or network devices that are essential for interaction and communication between hardware units operational on a computer ...Missing: authoritative | Show results with:authoritative
  8. [8]
    What Is Computer Networking? | IBM
    Computer networking is the process of connecting two or more computing devices to enable the transmission and exchange of information and resources.Missing: authoritative | Show results with:authoritative
  9. [9]
    What is a Host (in Computing)? | Definition from TechTarget
    Jul 7, 2025 · A host is a computer or other device that communicates with other hosts on a network. Also known as network hosts, hosts include clients and servers.
  10. [10]
    1.3.4 Intermediary network devices | OpenLearn - The Open University
    Intermediary devices connect the individual hosts to the network and can connect multiple individual networks to form an internetwork.
  11. [11]
    Types of Node Devices in a Computer Network - GeeksforGeeks
    Jul 23, 2025 · Intermediary devices are node devices that are designed to forward data from one side to another side in a computer network. These intermediary ...
  12. [12]
    IoT technology in 2025: Emerging trends and insights - Telnyx
    Oct 2, 2025 · IoT devices connect through wired or wireless networks like Wi-Fi, Bluetooth, 5G, and LPWAN to enable real-time communication. Reliable ...What powers an effective IoT... · IoT trends in 2025 and beyond<|control11|><|separator|>
  13. [13]
    Cloud computing in IoT: Transforming businesses in 2025 - Viam
    Nov 13, 2024 · 3 main benefits of cloud computing for IoT · Scalability for growing networks · Centralized data management · Cost-effectiveness.
  14. [14]
    What to Know About New Technology Networking in 2025 - Netsync
    Aug 13, 2025 · In 2025, networking is built around AI automation, edge computing, Wi-Fi 7, and zero trust security. Networks must support hybrid cloud, ...
  15. [15]
    The Victorian “Internet” - CHM Revolution - Computer History Museum
    In the 1830s, the telegraph pioneered a new concept: carrying information with electricity. That “big idea” became a building block of computers and ...
  16. [16]
    1870s – 1940s: Telephone | Imagining the Internet - Elon University
    In 1877-78, the first telephone line was constructed, the first switchboard was created and the first telephone exchange was in operation. Three years later, ...Missing: precursors credible
  17. [17]
    Networking & The Web | Timeline of Computer History
    1969 · Hooking up – networks come online. ARPAnet Interface Message Processor (IMP). Switched on in late October 1969, the ARPAnet is the first large-scale ...
  18. [18]
    [PDF] transformative technology - 5G Americas
    With the rollout of 5G networks in 2019, the wireless industry has taken another major step in transforming how people interact with the world.
  19. [19]
    Technology trends and challenges in SDN and service assurance ...
    This paper reviews and summarizes the recent technological trends and challenges related to Software-Defined Networking (SDN) and service assurance for end-to- ...Missing: modems post-
  20. [20]
    What is the OSI Model? 7 Network Layers Explained - Fortinet
    The physical layer includes a variety of components, such as cables, the radio frequency used to transmit data, Wi-Fi, and the other physical structures for ...Osi Model Explained · Layer 4 - Transport Layer · How Data Flows Through Osi...<|control11|><|separator|>
  21. [21]
    What is OSI Model | 7 Layers Explained - Imperva
    The Physical Layer is responsible for the physical connection between devices. It defines the hardware elements involved in the network, including cables, ...
  22. [22]
    OSI Model Examples - Cisco Learning Network
    Mar 5, 2020 · The OSI model is a model for network communication, with 7 layers. Examples include L1-L4 for printers, L4 for FTP, and L2 for Ethernet.
  23. [23]
    What is the OSI Model? The 7 Layers Explained - BMC Software
    Jul 31, 2024 · The seven layers of the OSI model · Layer 7: Application Layer · Layer 6: Presentation Layer · Layer 5: Session Layer · Layer 4: Transport Layer ...What Is The Osi Model? The 7... · Layer 2: The Data Link Layer · Layer 1: The Physical Layer
  24. [24]
    [PDF] Small Enterprise Design Profile (SEDP)—Network Foundation Design
    Collapsed Core Network Design. The three-tier hierarchical design maximizes performance, network availability, and the ability to scale the network design.
  25. [25]
    Explore Hierarchical Networks: Access, Distribution, Core Layers
    Dec 9, 2023 · The hierarchical structure of the network usually consists of access, distribution, and core layers. While a three-layer design is common, it ...
  26. [26]
    The Evolution of Network Architecture: From Traditional to Software ...
    Mar 8, 2025 · This paper examines the progression from traditional network architectures, characterized by static configurations and hardware-based solutions, to the dynamic ...
  27. [27]
    Software-Defined Networking: The New Norm for Networks
    With SDN, today's static network can evolve into an extensible service delivery platform capable of responding rapidly to changing business, end-user, and ...
  28. [28]
    Common Types of Network Devices and Their Functions | Netwrix
    ### Summary of Repeaters and Hubs in Networking
  29. [29]
    Hubs & Repeaters - Networking - Firewall.cx
    Passive Hub: A passive hub is a basic type of hub that does not require an external power source. It simply amplifies the incoming signal and broadcasts it to ...
  30. [30]
    What is 10BASE-T and how does it work? - TechTarget
    Oct 1, 2021 · In the 1980s, inexpensive twisted-pair wires were widely used to deploy 10BASE-T, which was easier to install than thick and thin coaxial cables ...
  31. [31]
    Repeaters in Computer Networks - Tutorials Point
    Types of Repeaters ; Analog Repeaters They can only amplify the analog signal. Digital Repeaters They can reconstruct a distorted signal. ; Wired Repeaters They ...
  32. [32]
    Network Propagation Delay Calculation and Testing | Flukenetworks
    Typical propagation delay for category 5e UTP is a bit less than 5 nS per meter (worst case allowed is 5.7 nS/m). A 100 meter cable might have delay as shown ...Missing: formula | Show results with:formula
  33. [33]
    [PDF] The Story Of Bridging - Computer Science
    Let us take an imaginary journey into the mind of Mark Kempf, an engineer in the Advanced Development Group at DEC, who invented bridges around 1980. ...
  34. [34]
    DEC's LAN Bridge 100: The Invention Of The Network Bridge
    Aug 27, 2024 · DEC's LAN Bridge 100 was a major milestone in the history of Ethernet which made it a viable option for the ever-growing LANs of yesteryear and today.
  35. [35]
    Transparent and Source-Route Transparent (SRT) Bridging - Cisco
    Sep 9, 2007 · A source-route bridge connects multiple physical Token Rings into one logical network segment. If the network segment bridges only Token Ring ...
  36. [36]
    802.1Q-2018 - IEEE Standard for Local and Metropolitan Area ...
    Jul 6, 2018 · This standard specifies Bridges that interconnect individual LANs, each supporting the IEEE 802 MAC Service using a different or identical media access control ...
  37. [37]
    Different types of network and Ethernet switches - Cisco
    Ethernet network switches are broadly categorised into two main categories – modular and fixed configuration.
  38. [38]
    IEEE 802.1Q-2022 - IEEE SA
    Dec 22, 2022 · This standard specifies how the Media Access Control (MAC) Service is supported by Bridged Networks, the principles of operation of those networks, and the ...
  39. [39]
    None
    Summary of each segment:
  40. [40]
    Network Switching Tutorial - Lantronix
    LAN switches come in two basic architectures, cut-through and store-and-forward. Cut-through switches only examine the destination address before forwarding it ...
  41. [41]
  42. [42]
    Cisco Networking Academy Program
    Routers are internetworking devices that operate at OSI Layer 3, the network layer. Routers tie together, or interconnect, network segments or entire ...
  43. [43]
    Recognize the purpose & functions of various network devices ...
    Apr 11, 2016 · Routers process packets, which are units of data at Layer 3, the Network layer, this is why Routers are refer to as “Layer 3 devices”.
  44. [44]
    AGS router - CHM Revolution - Computer History Museum
    The software was originally developed by Bill Yeager at Stanford, then licensed and enhanced by Cisco (from “San Francisco”) founders Len Bosack and Sandy ...
  45. [45]
    IPv4 Packet Header - NetworkLessons.com
    Time to Live: Everytime an IP packet passes through a router, the time to live field is decremented by 1. Once it hits 0 the router will drop the packet and ...
  46. [46]
    What is Time to Live (TTL) | TTL Best Practices | CDN Guide - Imperva
    The TTL value is a counter that is decremented by 1 every time the packet passes through a router. Once the TTL reaches 0, the router no longer forwards the ...Missing: fragmentation | Show results with:fragmentation
  47. [47]
    Why do PCs need a default gateway to be configured on them?
    May 2, 2023 · Without a default gateway configured on the PC , it will not know where to send packets destined for IP addresses outside of its own subnet, and ...
  48. [48]
    BGP vs OSPF: Differences & Tutorials - Catchpoint
    OSPF must be deployed hierarchically (we will discuss this in the next section), whereas BGP does not require any hierarchy to scale.
  49. [49]
    BGP in 2024 - APNIC Blog
    Jan 6, 2025 · The IPv6 network growth rate is somewhat lower than previous years, with a 10% growth in routing entries, and a 4% growth in the advertised ...
  50. [50]
    Metrics used in Different Routing Protocols | Blog
    Aug 15, 2021 · Hop count is simply the number of routers a packet must traverse to reach the destination network. RIP supports a maximum of 15 hops, after that ...
  51. [51]
  52. [52]
    What Is a Network Gateway? - Cisco
    A network gateway connects networks by translating communications from one protocol to another, unlike a router which delivers data within a network.
  53. [53]
    Cisco Internetworking Basics
    This model consists of a seven layer protocol stack. The OSI Protocol Reference Model. The following section explains how network protocols work, and it defines ...
  54. [54]
    [PDF] Guidelines on Firewalls and Firewall Policy
    2.1.2 Stateful Inspection​​ As with packet filtering, stateful inspection intercepts packets at the network layer and inspects them to see if they are permitted ...
  55. [55]
    Configure IP Access Lists - Cisco
    Every ACL has an implicit deny at the end for any traffic that is not explicitly permitted.. A single-entry ACL with only one deny entry can deny all traffic.
  56. [56]
    Types of Firewalls Defined and Explained - Palo Alto Networks
    There are many types of firewalls, often categorized by system protected, form factor, network placement, and data filtering method.Missing: NIST | Show results with:NIST
  57. [57]
    [PDF] Guide to Intrusion Detection and Prevention Systems (IDPS)
    Most products use a combination of signature-based detection, anomaly-based detection, and stateful protocol analysis ... IDS: Signature Versus Anomaly Detection.
  58. [58]
    Evaluating machine learning-based intrusion detection systems with ...
    May 21, 2025 · The experimental results revealed that XGBoost and CatBoost achieved the highest accuracy of 87%, with a false positive rate of 0.07 and a false ...
  59. [59]
  60. [60]
    What is a network interface card (NIC)? | Definition from TechTarget
    Mar 12, 2025 · A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can connect to a network.
  61. [61]
    What Is a Network Interface Card - NIC Definition, Function & Types
    Nov 8, 2021 · The network interface card function is to facilitate communication between a computer/server and a local area network (LAN), wide area network ( ...
  62. [62]
    Ethernet MAC and PHY Explained: Architecture & Key Differences
    Aug 2, 2025 · MAC (Layer 2) manages frame encapsulation and addressing, while PHY (Layer 1) handles signal conversion and link control. MAC uses digital ...<|separator|>
  63. [63]
    How Data Encapsulation and De-encapsulation Works?
    Jul 23, 2025 · The Data Link layer receives the frames and checks MAC address whether it is matching or not. If everything matched and also no error is found.
  64. [64]
    Network Interface Card Support - Windows drivers | Microsoft Learn
    Jul 23, 2025 · This topic describes the types of Network Interface Cards (NICs) that an NDIS miniport driver can manage, as well as how the different kinds of NICs affect the ...
  65. [65]
    What does a network card driver do? - Super User
    May 25, 2011 · The job of the driver is simply to abstract those differences away so that the O/S has a common API for moving packets from the higher network layers down to ...
  66. [66]
    Understanding Industrial Ethernet Connections: RJ45, Fiber, M12 ...
    Apr 2, 2024 · Industrial Ethernet uses RJ45 (copper), fiber (long-distance), M12 (durable, on-machine), and SFP (modular, versatile) connections.
  67. [67]
  68. [68]
    StarTech.com 4 Port USB 3.0 PCIe Card w/ 4 Dedicated 5Gbps ...
    The USB 3.0 PCIe card is equipped with a standard profile bracket and includes a low-profile/half-height bracket for installation in small form-factor computers ...
  69. [69]
    Ethernet (IEEE 802.3) - Cisco
    Aug 20, 2012 · The IEEE 802.3 standard provides MAC (Layer 2) addressing, duplexing, differential services, and flow control attributes, and various physical ( ...
  70. [70]
    Unlocking the Power of 100 Gigabit Ethernet: The Future of High ...
    Feb 18, 2025 · 100 Gigabit Ethernet (100GbE) is a new telecommunication standard capable of transferring data at a speed of 100 gigabits per second.
  71. [71]
    [PDF] ethernet roadmap
    Mar 17, 2025 · AI and Machine. Learning (ML) are driving the roadmap extending Ethernet speeds to 1.6T and beyond. The architecture within AI-driven data ...
  72. [72]
    How RDMA Became the Fuel for Fast Networks - NVIDIA Blog
    Apr 29, 2020 · After its first success in supercomputers, baking RDMA into mature, mainstream Ethernet networks was a logical next step, but it took hard work ...
  73. [73]
  74. [74]
    [PDF] Gigabit Power-over-Ethernet NIC - Lantronix
    The N-GXE-POE-xx-01 Series Network Interface Card (NIC) provides connectivity to a secure fiber network while also delivering power to a PoE powered device (PD) ...
  75. [75]
    Collision Detection in CSMA/CD - GeeksforGeeks
    Oct 3, 2025 · CSMA/CD (Carrier Sense Multiple Access/ Collision Detection) is a media access control method that was widely used in Early Ethernet ...
  76. [76]
    What is the actual maximum throughput on Gigabit Ethernet?
    Jan 22, 2018 · The actual maximum throughput on Gigabit Ethernet is around 928Mbps (116MB/s) without jumbo frames, and 987Mbps (123MB/s) with jumbo frames.
  77. [77]
    What Is A Modem? - ITU Online IT Training
    A modem (modulator-demodulator) is a hardware device that converts data into a format suitable for a transmission medium so that it can be transmitted from.How Modems Work · Benefits Of Modems · Features Of Modems<|separator|>
  78. [78]
    The Everyday Guide to DSL Modems - CBT Nuggets
    Aug 22, 2025 · Different DSL standards use different modulation techniques to maximize speed and reliability over varying distances.
  79. [79]
  80. [80]
    What is a Modem? Types & How It Works – 2025 - BroadbandSearch
    Demodulation typically involves detecting the modulation of the carrier wave and using this information to reconstruct the original digital signal.Dissecting Modem · Operation Of Modems · How Does A Modem Work?Missing: standards | Show results with:standards
  81. [81]
    DOCSIS® 3.1 - CableLabs
    With this release, cable high-speed data can now reach download speeds of up to 10 Gbps (gigabits per second), enabling a wide variety of online experiences and ...
  82. [82]
    Understanding DOCSIS 3.1 For Gigabit Cable Internet - Netgear
    The DOCSIS 3.1 standard supports download speeds up to 10 Gbps and upload speeds up to 2 Gbps. That's a huge leap from previous versions. Benefit 2: Lower ...
  83. [83]
    Cable Modems Explained: OFDM vs OFDMA | Learn - Hitron Americas
    OFDM stands for orthogonal frequency division multiplexing. It is a form of multi-carrier modulation. What this means is that a cable modem that supports OFDM ...
  84. [84]
    SOHO Routers and Networks Explained - Lifewire
    Jul 16, 2021 · A SOHO router is for small offices/home offices, and a SOHO network is a mixed wired/wireless network for 1-10 people, sometimes with printers.
  85. [85]
    Products : SOHO Routers
    The SOHO router integrates a broadband modem with a router, within a single box. It features voice capability, multiple channel control, NAT (Network Address ...Missing: Wi- Fi<|separator|>
  86. [86]
    [PDF] Building Residential VoIP Gateways: A Tutorial - Texas Instruments
    Feb 14, 2004 · If the household has more than one PC, the voice gateway can be a standalone device terminating IP connections by connecting to a router or hub.
  87. [87]
    History of the internet: a timeline throughout the years - Uswitch
    Aug 5, 2025 · From the days of dial-up to the development of fibre and 5G. Here is all you need to know about the history of the internet.Missing: 6G | Show results with:6G
  88. [88]
    Mitigations and Solutions for Home Gateways - Bufferbloat.net
    We can mitigate (but not solve) broadband bufferbloat to a decent, if not ideal, degree by using bandwidth shaping facilities found in many recent home routers.Missing: vulnerability | Show results with:vulnerability
  89. [89]
    What cable modem signal levels are considered good ? :: SG FAQ
    The modem status will show the downstream SNr (signal to noise ratio) which usually should be above 30, mid to upper 30's is good, over 30 usually means you've ...
  90. [90]
    What is 256-QAM Modulation? - everything RF
    Jul 21, 2022 · The wireless networking standard IEEE 802.11ac employs 256-QAM which can pack 33% additional information relative to 64-QAM modulation scheme.
  91. [91]
    Quadrature amplitude modulation - Wikipedia
    64-QAM and 256-QAM are often used in digital cable television and cable modem applications. In the United States, 64-QAM and 256-QAM are the mandated modulation ...Amplitude-shift keying · Phase-shift keying · Constellation diagram
  92. [92]
    What is a wireless access point? - Cisco
    A wireless access point (WAP) is a networking device that allows wireless-capable devices to connect to a wired network.Missing: OSI | Show results with:OSI
  93. [93]
    Wireless Access Points Glossary of Terms - Cisco
    Access Point (AP): A device in a network that is used to allow users to connect to the Network wirelessly. Specific labels may be added to this depending on its ...
  94. [94]
    Wireless LAN | Cloud-Managed Wi-Fi Access Points - Cisco Meraki
    Cisco Meraki cloud-managed Wi-Fi access points offer smart, secure, resilient connectivity with Wi-Fi 7, AI, and cloud-based services, and are enterprise-grade.
  95. [95]
    IEEE 802.11ax-2021
    May 19, 2021 · IEEE 802.11ax-2021 ... This amendment provides for backward compatibility and coexistence with legacy IEEE 802.11 devices in the 2.4 GHz, 5 GHz ...
  96. [96]
    IEEE 802.11be-2024 - IEEE SA
    Jul 22, 2025 · This amendment defines standardized modifications to both the IEEE Std 802.11 physical layers (PHY) and the Medium Access Control Layer (MAC)
  97. [97]
    Cisco Networking Academy Program
    Typically, a radio card, or NIC, and one or more access points provide the functions of the 802.11 standard. The MAC and PHY characteristics for wireless local ...
  98. [98]
    IEEE P802.11r
    IEEE P802.11r aims to develop a standard specifying fast BSS transitions. The standard was published in July 2008.
  99. [99]
    IEEE 802.11s-2011
    This standard defines one medium access control (MAC) and several physical layer (PHY) specifications for wireless connectivity for fixed, portable, and moving ...
  100. [100]
    [PPT] IEEE 802.11ax Tutorial
    It is the first 802.11 amendment to introduce OFDMA to wireless LAN. IEEE 802.11ax adds UL MU MIMO; Allows power save based on scheduled trigger frames. 30.
  101. [101]
  102. [102]
    Wireless Bridges Point-to-Point Link Configuration Example - Cisco
    Apr 27, 2006 · ... point-to-point connectivity ... Note: The Role in Radio Network parameter allows you to configure the wireless bridge in these ways:.
  103. [103]
  104. [104]
    Wireless Bridges - IEEE 802
    A network can have any number of interior wireless LANs. ▫ Every device in the bridged network with more than one port is a bridge. (Routers are beyond the ...
  105. [105]
    cnWave 60 GHz Fixed Wireless - Cambium Networks
    cnWave 60 GHz fixed wireless solutions deliver multiple Gbps of reliable connectivity and at a cost much lower than fiber.
  106. [106]
    [OpenWrt Wiki] Wi-Fi Extender/Repeater with WDS
    Jun 13, 2025 · WDS (Wireless Distribution System) is required to create a network connection over a wireless link between the access point and the repeater.
  107. [107]
  108. [108]
    What is a wireless distribution system (WDS)? - TechTarget
    Mar 13, 2023 · wireless distribution system (WDS) ... The IEEE 802.11 standard defines a distribution system as the infrastructure used to connect access points.
  109. [109]
    Best Wi-Fi Range Extenders 2025: Top Models for Speed and ...
    Aug 1, 2025 · Looking ahead, insiders anticipate Wi-Fi 7 integration in extenders by late 2025, promising even faster speeds and lower latency. ... News & ...
  110. [110]
  111. [111]
    A Survey on Occupancy and Activity Detection - IEEE Xplore
    Apr 24, 2023 · They use a 7-layer IoT infrastructure architecture and categorize the technologies as LoRa, ZigBee, WiFi, Bluetooth, UWB,. Wireless USB, and IR ...
  112. [112]
    A Survey on LoRa for Smart Agriculture - IEEE Xplore
    Abstract—This paper provides a survey on the adoption of LoRa in the agricultural field, and reviews state-of-the-art solutions for Smart Agriculture, ...
  113. [113]
    Systematic Approach for State-of-the-Art Architectures and System ...
    Feb 16, 2021 · The IoT devices embedded in the edge nodes are 32-bit or 64-bit microcontroller units (MCUs), which has versatile features in a single chip [9], ...
  114. [114]
    8 IoT Protocols and Standards Worth Exploring in 2024 | EMQ - EMQX
    Mar 20, 2024 · This article will introduce 8 popular IoT protocols, discussing their technical features and advantages, to help you choose the appropriate ...
  115. [115]
    IoT Security in 2025: Battling Breaches and Scaling Threats
    Oct 29, 2025 · Amidst an escalating IoT threat landscape fueled by billions of new connected devices, organizations must adopt zero-trust, AI-driven security, ...
  116. [116]
    IoT Security Statistics 2025–26: Threats, Trends & Safeguards
    Jul 1, 2025 · As of 2025, the global IoT ecosystem has surpassed 35 billion connected devices, and projections suggest it could reach over 50 billion by 2030.
  117. [117]
    IoT Security 2025: Why Billions of Devices Are a Threat
    Sep 10, 2025 · Explore why billions of IoT devices in 2025 pose major cyber risks and how CTEM, Zero-Trust, AI, and XDR can safeguard enterprises from ...
  118. [118]
    [PDF] Selecting the Optimal Battery for your Embedded Application
    In other words, if a dynamic system power demand bandwidth is five to six orders of magnitude (e.g., microwatts during “sleep-mode low-duty-cycle” and watts ...
  119. [119]
    [PDF] Power Consumption Measurements for IoT Applications
    The basic strategy to optimize battery lifetime is to keep the device in sleep mode as long as possible and activate it only for very short activity phases.Missing: microWatts | Show results with:microWatts
  120. [120]
    IoT Cybersecurity: 28 Billion Devices to Be Secured by 2028 Globally
    Feb 17, 2025 · Juniper Research found that the global number of IoT devices protected by cybersecurity solutions will reach 28 billion by 2028.
  121. [121]
    [PDF] OpenFlow Switch Specification - Open Networking Foundation
    ... matches supported by a flow table, for example an exact match table would not support wildcards for other flow entries but must support the table-miss flow ...
  122. [122]
    TCAMs and OpenFlow - What Every SDN Practitioner Must Know
    Jul 1, 2012 · TCAM naturally lends itself to being great for flow instantiation from an SDN controller to inject forwarding entries with a great deal of flexibility.
  123. [123]
    Software Defined Networking Flow Table Management of OpenFlow ...
    OpenFlow switches store forwarding rules in TCAM, which is designed for matching flexibility and high lookup performance. Moreover, as explained by [32], ...
  124. [124]
    Impact of TCAM size on power efficiency in a network of OpenFlow ...
    Nov 3, 2020 · In order to investigate the impact of TCAM size on network energy consumption, we take a network of OpenFlow switches into consideration and a ...
  125. [125]
    Edgecore deployed an OpenFlow-based global SDN in NCTU
    With white-box data center switches from Edgecore Networks, the promise of the Open Network Operating System is evident. SDN accelerates Internet and Cloud ...
  126. [126]
    IP Infusion, Edgecore, and SKT Complete Successful Live POC
    Jun 3, 2025 · The deployment features OcNOS-SP-PLUS SKUs paired with Edgecore whitebox hardware and 400G OpenZR+ QSFP-DD transceivers from leading industry ...
  127. [127]
    OpenDaylight Controller Overview
    The controller exposes open northbound APIs which are used by applications. ... The OpenDaylight controller starts with an OpenFlow 1.0 southbound plugin.Missing: ONOS | Show results with:ONOS
  128. [128]
    [PDF] Maturing of OpenFlow and Software Defined Networking through ...
    Aug 14, 2012 · The GENI initiative has been funding and enabling SDN deployments at Stanford and around the country. On the other hand, SDN deployments ...
  129. [129]
    Software Defined Networking Market Size & Share Analysis
    Jun 17, 2025 · Research finds that P4-based data planes outperform eBPF alternatives inside standalone 5G cores, particularly in high-throughput scenarios.
  130. [130]