Join Mike Chapple for an in-depth discussion in this video Routers, switches, and bridges, part of CompTIA Security+ (SY0-501) Cert Prep: 2 Technologies and Tools.
- [Instructor] Networks carry all types of data over distances short and far. Whether it's a transatlantic video conference or an email across the room, many different networks carry the ones and zeros that make communications work. Routers, switches, and bridges are the core building blocks of these networks. Network engineers use switches to create networks. These are simple-looking devices such as the switch shown here that contain a large number of network ports. Switches may be very small with eight or fewer ports, or they can be quite large with 500 or more ports.
The switch shown here is a typical 48-port switch. Switches are normally hidden away inside wiring closets and other secure locations. Each switch port is connected to one end of a network cable. Those cables then disappear into special pipes known as conduits for distribution around a building. When the cable reaches the final destination, it usually terminates in a neat-looking wall face plate like the one shown here. This provides an easy way for users and technicians to connect and disconnect computers from the network without damaging the cables inside the wall, or having unsightly unused wires lying around the room.
Some devices directly connect to switch ports through the use of wired networks. Many other devices don't use wires, but instead depend upon radio-based wireless networks. These networks are created by wireless access points like the one shown here. These APs, as they're called, contain radios that send and receive network signals to mobile devices. The AP itself has a wired connection back to the switch, allowing wireless devices to connect to the rest of the network. Switches do create networks, but they're limited to creating local networks.
Switches generally operate at Layer 2 of the OSI model, the Data Link layer, where they work with Mac addresses only. Some switches have the capability to perform limited functions at Layer 3 of the OSI model, the Network layer, where they can interpret IP addresses. In those cases, switches are beginning to take on the functions of routers. Routers play a higher-level role, connecting networks together by serving as a central aggregation point for network traffic heading to or from a large network.
The router serves as the air traffic controller of the network, making decisions about the best paths for traffic to follow as it travels to its final destination. Routers also perform some security functions using access control lists to limit the traffic that may enter or leave a network based upon the organization's security policies. This type of filtering using access control lists does not pay attention to connection state, and is known as stateless inspection. In the next video, you'll learn how firewalls extend this capability with stateful inspection.
Let's briefly talk about two other network devices that you should be familiar with for the exam. Bridges, like switches, are Layer 2 devices, but they perform a very limited function. Bridges connect two networks together. They learn the MAC addresses present on each network, and then forward traffic between the networks as appropriate. Media gateways perform a similar function, interconnecting networks that use different standards. You'll most often hear the term media gateway in connection with telecommunications networks such as 3G, 4G, LTE, PBX, and Voice over IP communication systems.
Together, routers, switches, bridges, and media gateways make possible the interconnected nature of modern networking.
- IP addresses
- Routers, switches, and bridges
- VPNs and VPN concentrators
- Network intrusion detection and prevention
- Managing secure networks
- Tuning and configuring SIEMs
- Troubleshooting digital certificates
- Personnel, host, and mobile device security
- Mobile device management and tracking
- Securing common protocols
Skill Level Beginner
IT Security Foundations: Core Conceptswith Lisa Bock1h 13m Beginner
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Appropriate for all
1. TCP/IP Suite
2. Network Security Devices
3. Managing Secure Networks
4. Wireless Networking
5. Security and Monitoring Technologies
6. Security Assessment Tools
7. Security Troubleshooting
8. Personnel Security
9. Host Security
10. Mobile Device Security
11. Securing Protocols
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.