RoutersRouters connect devices and networks together by forwarding traffic. This is how traffic gets from one place to another on a network such as the internet.
SwitchesSwitches connect devices to a network by forwarding traffic. For example, the computers in an office might be connected to switches as a means of creating a local area network.
HubsA simple type of switch that forwards all traffic to every connected device.
BridgesNetwork bridges create a single network from multiple networks.
GatewaysDevices that provide an interface between different types of networks. Essentially translates between different types of signal and/or protocol. server is a computer that provides a service to other computers. For example, a web server that provides web pages to client devices.
Load BalancersDevices that distribute work to servers to allow services to horizontally scale. clients to be a server that is really forwarding requests to servers. A reverse proxy may perform services such as load balancing, encryption and security.
EthernetA family of standards for networking that include various cable technologies and compatible computing devices, switches, hubs and routers.
Wireless Access PointsHardware that allows wireless devices to connect to a wired network. Typically provides a wifi service.High capacity cables that are used to create large networks including internet backbones, global area networks, wide area networks, metropolitan area networks and campus area networks. It is also common for network endpoints to be connected with optical fiber.
RepeatersA device that receives a signal and retransmits it. Often required to transmit data great distances.
Optical AmplifierA device that is similar to a repeater for fiber optics. Increases the strength of an optical signal directly without converting to an electrical signal.
InterconnectsFacilities where networks connect to each other to exchange traffic.
FirewallsA firewall controls network traffic based on a set of rules. A basic tool for network security.
Intrusion Detection SystemsServices that monitor network traffic for malicious activity or policy violations.
Intrusion Prevention SystemsServices that monitor network traffic to detect and prevent vulnerability exploits.
Identity & Access ManagementPlatforms for managing authorization and authentication.
Key ManagementTools for managing encryption keys.
Certificate AuthorityServices that publish certificates that describe organizations and their public encryption keys. Basic infrastructure for encryption on the internet such as SSL and TLS.
DNSThe domain name system, or DNS, is a global distributed system for translating domain names to IP addresses.
DHCPDynamic host configuration protocol, or DHCP, is a service that automatically assigns IP addresses to devices.
SMTPSimple mail transfer protocol, or SMTP, is a type of service that delivers email.
VoIPTechnologies for voice communications over internet protocol. For example, software that allows you to make long distance phone calls using an internet connection.
VPNVirtual private network, or VPN, are services for securely connecting to a private network over an untrusted network such as the internet. For example, VPN software that allows an employee to connect to an office local area network from home.from a data center that is close to each user to reduce latency.
Network Management SystemTools for operating, managing and deploying network devices.
|Overview: Network Infrastructure