
HUB
It is a simple and stupid device that can connect all devices in the same network. Although it does not have a complex structure, it can be connected via Ethernet, fiber, coaxial, or USB. Hub devices are usually named according to the number of ports on them.

There is a structure that connects all inputs and outputs to each other with a cable when it is necessary to think electronically. It does not have any ability to understand the transferred data and the type of data what is. It forwards the packet coming from a port to all ports as broadcast. It is the most primitive and cheapest device among network equipment.
BRIDGE

It is a device that acts as a bridge by connecting multiple local networks. When traffic on the local network is busy, packets can collide with each other, seriously reducing network efficiency and causing network traffic slowdowns. To solve this problem, the existing local network can be divided into multiple networks. The bridge can be used to connect these divided networks.

It is used to reduce the available traffic and to consider the data overlap rate. In structures with large topologies, it can cause packet looping and create problems in traffic. However, although this technology is not used much today, the problems experienced can be solved by creating virtual local networks.
SWITCH

It is the network equipment that enables devices in the local network to communicate with each other. Transmission is done with using MAC addresses. It has advanced technology and has a complex structure.
It has the ability to apply smart solutions on many issues such as the type of data to be sent, how to transport the data to be sent, or its security. The data to be migrated can be published independently of each other or in certain groups. The MAC addresses of the registered users facilitate the addressing of the next transmission.
ROUTER

Routers are devices used to communicate between two different networks. The device has a very powerful processor and memory. Modems with features that can go to the Internet, receive IP and assign IP to the local network side can also partially act as a kind of router. However, since modems can do tasks that more than one device can do, it is not correct to think of them only as routers.

The most important rule for the router working principle is that the two connecting networks must have the same protocols. Network Layer, which is the third layer of the OSI layers, is used for routing. Thanks to its routing table, it ensures that the packets to be transmitted from the source to the destination are forwarded to the correct addresses.
ACCESS POINT

They are devices that include users in a wired network using Wi-Fi and similar wireless access standards. At the same time, it provides to increases the connection distance and signal strength by spreading the same frequency range produced from the modem on itself. It communicates with the modem as an auxiliary device at points where the devices used as modems cannot reach and enables the user to perform certain operations by transmitting the same operations one-to-one. It provides ease of use in wide usage areas. It can also include non-wireless devices (such as printers) to the wireless network. Some models also have an Ethernet port for wired connection. It is produced resistant to certain conditions depending on the usage area. Thus, it helps common use.
SERVER

In computer networks, it is a kind of computer unit that contains resources that can be accessed, used and shared by users on the network. A network can have multiple servers. It can be positioned as a built-in or virtual device. For example, there are many servers in data centers to store information in a secure environment. Today, the energy consumed by the servers and the heat they produce is shown as a cause of global warming.
Servers must always be accessible to users and provide uninterrupted service. For this reason, it is kept in data centers with high security, redundancy, generator, and cooling measures. In order for the user to have access, there must be a strong internet connection 24 hours a day, 7 days a week. Servers, which have much more powerful hardware than personal computers, are designed to perform multiple operations at the same time and much faster.
FIREWALL

The firewall provides protection within the network by allowing the passage of packets that comply with the rules, depending on predefined rules, while preventing the passage of packets that do not comply with the predefined rules. Operating systems include software-based firewalls to protect devices against threats. Firewall devices are controlled packet traffic according to defined rules and are created by combining firewall software with appropriate hardware. In addition, when suspicious or dangerous situations are encountered, an alarm or information message can be transmitted to the network administrators by the firewall devices.

The main purpose of firewall devices is to create a firewall between the internet and the local network, to prevent possible malicious software from accessing the network, or to provide access to the network within the framework of the network administrator’s rules. Thus, firewall devices decide whether the incoming packets can be transmitted from the source to the destination, within the framework of the rules in which they are configured. There are multiple types of firewalls depending on the usage area and technologies.