CLOSE
Updated on 01 Mar, 202613 mins read 18 views

From Theory to Reality

Until now, networking has been mostly conceptual:

  • Layers
  • Protocols
  • Encapsulation
  • Models

But networks are not abstract

They are built from physical devices.

A real packet traveling across the Internet passes through:

  • Network cards
  • Switches
  • Routers
  • Firewalls
  • Access points
  • Servers

The Core Principle

Each networking device is designed to operate at specific layers of the OSI model.

Higher-layer devices understand more information.

Lower-layer devices move data faster but think less.

Device vs Layer Overview

DevicePrimary Layer
RepeaterLayer 1
HubLayer 1
Network Interface Card (NIC)Layer 1–2
SwitchLayer 2
RouterLayer 3
FirewallLayer 3–7
Load BalancerLayer 4–7
ProxyLayer 7

1 Repeater – The Signal Booster (Layer 1)

Problem

Electric signals weaken over distance.

This causes transmission errors.

Solution

A repeater:

Receives weak signals and regenerates them.

It does NOT understand data.

It only restores signal strength.

Characteristics

  • Reads bits only
  • No addressing awareness
  • No filtering

Think of it as a microphone amplifier.

2 Hub –  The Shared Medium Creater (Layer 1)

A hub works like:

One cable split into multiple connectors.

How Hub Works

If a frame arrives on one port:

It broadcasts to ALL ports.

Device A -> Hub -> Everyone receives

Problems:

  • Collisions occur
  • No device identification
  • Bandwidth shared
  • Inefficient

Hubs are now obsolete.

Key Insight

Hub creates one collision domain.

Only one device can talk at a time.

3 Network Interface Card (NIC) – The Network Identity

Every device connects using a NIC.

Examples:

  • Ethernet card
  • Wi-Fi adapter

Responsibilities

Layer 1:

  • Signal transmission

Layer 2:

  • MAC addressing
  • Frame creation

Each NIC has a unique:

MAC Address

Example:

00:1A:2B:3C:4D:5E

This identifies devices locally.

4 Switch – The Smart Traffic Directory (Layer 2)

Switches replaced hubs.

A switch understands MAC addresses.

How a Switch Works

It builds a table:

MAC AddressPort
APort 1
BPort 2

When data arrives:

Switch sends it only to the correct port.

Result:

  • No unnecessary broadcasting
  • Fewer collisions
  • Better performance

Learning Process

Switch learns automatically:

  1. Reads source MAC
  2. Stores mapping
  3. Use it later

Called:

CAM Table (MAC Address Table)

Collision Domains

Each switch port = separate collision domain.

Huge improvement over hubs.

5 Router – The Internet Navigator (Layer 3)

Switches work inside a network.

Routers connect different networks.

Router Responsibilities

  • Reads IP addresses
  • Chooses best path
  • Forwards packets between networks

Example

Home Network -> ISP -> Internet -> Server Network

Routers exist between each segment.

Routing Decision

Router checks:

Destination IP
↓
Routing Table
↓
Next Hop

Routers ignore MAC addresses for routing decisions.

They care about IP.

Why Routers Make the Internet Possible

Without routers:

Every device would need direct connections to every other device.

Impossible at global scale.

Routers enable:

Network of networks = Internet

6 Firewall – The Security Guard (Layer 3-7)

A firewall inspects traffic and decides:

Allow or Block?

Inspection Levels

Layer 3 - IP filtering
Layer 4 - Port fintering
Layer 7 - Application inspection

Example rules:

  • Block port 23 (Telnet)
  • Allow HTTPS only
  • Block malicious payloads

Firewalls add intelligence beyond routing.

7 Load Balancer – Traffic Distributor (Layer 4-7)

Used in large services.

Example:

One website -> many servers

Function

Distributes incoming requests:

     Client Requests
           ↓
     Load Balancer
     ↙     ↓      ↘
Server1 Server2 Server3

Benefits:

  • Scalability
  • High availability
  • Performance optimization

8 Proxy Server – Application-Level Gateway (Layer 7)

A proxy acts on behalf of a client.

Client -> Proxy -> Internet

Uses

  • Caching
  • Content filtering
  • Privacy
  • Monitoring

Proxy understands application protocols like HTTP.

Buy Me A Coffee

Leave a comment

Your email address will not be published. Required fields are marked *

Your experience on this site will be improved by allowing cookies Cookie Policy