What is Repeater, Hub and Bridge | Networking Devices Explained | Working of Repeater, Hub & Bridge

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 ต.ค. 2024
  • Welcome to another exciting episode from Cyberwings Security!
    Repeater, hub, and bridge are all network devices that are used to connect different devices together. However, they operate at different layers of the OSI model and have different functions.
    Repeater
    A repeater is a layer-1 device that operates at the physical layer of the OSI model. It works by receiving a signal and then retransmitting it at a higher amplitude. This is useful for extending the range of a network or for improving the signal quality on a long cable run.
    Hub
    A hub is a multi-port repeater. It works by receiving a signal on one port and then retransmitting it out of all of the other ports. This allows multiple devices to be connected to a single network cable. However, hubs do not filter traffic, so all devices on the network will receive all of the traffic, even if it is not intended for them. This can lead to performance problems and network congestion.
    Bridge
    A bridge is a layer-2 device that operates at the data link layer of the OSI model. It works by filtering traffic based on the MAC addresses of the source and destination devices. This allows bridges to segment a network into multiple smaller networks, which can improve performance and security.
    Connect with me:
    📷 Instagram: / rahulkumar_2620
    💼 LinkedIn: / rahul-kumar-b35794165
    📟 Join me on WhatsApp: whatsapp.com/c...
    🌐 Website: cws.net.in/
    📡 Telegram Channel: - t.me/Channel_CWS
    👍 If you find this video helpful, don't forget to give it a thumbs up and share it with your network. Subscribe to our channel for more insightful content on ethical hacking, digital forensics, and penetration testing.
    🔔 Hit the notification bell to stay updated whenever we release new videos! Have questions or ideas for future topics? Drop them in the comments below.
    #cybersecurity #ethicalhacking #digitalforensics #penetrationtesting #CyberwingsSecurity #InfoSec #OnlineSafety #DataProtection #CyberAwareness #CybersecurityExplained #TechTips #LearnCybersecurity #HackerSkills #CyberEducation #CyberTech #SecurityTools #CyberLearning #ITSecurity #CyberThreats #cybersecuritycareers #cybersecuritytips #cybersecurityforbeginners

ความคิดเห็น • 7