create encrypted tunnels across untrusted networks (like the internet). A VPN client encapsulates and encrypts the entire IP packet, then adds a new outer header addressed to a VPN server. This provides confidentiality (encryption), data integrity (hashing), and authentication. Modern implementations often use IPsec (Internet Protocol Security) or TLS (Transport Layer Security).
are translators. They convert digital signals from a computer into analog signals suitable for telephone lines (DSL), cable television systems (cable modem), or fiber-optic terminals (ONT - Optical Network Terminal). While their role has diminished in pure fiber networks, they remain essential for bridging legacy infrastructure with modern digital equipment. The Logical Glue: Protocols and Addressing Hardware provides the physical paths, but protocols provide the rules of the road. Without standardized protocols, a device from one manufacturer would be unable to communicate with another, and packets would be lost in a chaotic storm of bits. data connectivity components
, largely obsolete, were simple repeaters. They operated at the physical layer, blindly broadcasting any signal received on one port to all other ports. This led to constant collisions and security risks. The switch (or bridging hub) revolutionized LANs. Operating at the data link layer, a switch learns the MAC addresses of devices on each port and builds a forwarding table. It intelligently sends frames only to the port where the destination device resides, creating isolated collision domains and dramatically increasing efficiency. Modern switches also support Virtual LANs (VLANs), which logically partition a physical switch into multiple isolated broadcast domains, enhancing security and traffic management. create encrypted tunnels across untrusted networks (like the