Network Systems and Protocols
MindNode Diagram of Chapter
Unit Details
1.1. Types of network
- Based on Size
- Based on Topology
- Network Access Methods
- How internet works ?
- Basic Client Server Architecture
- Network models
- OSI Model,
- TCP/IP Model
1.2 Network protocols and standards
- Types of Network protocols and standards
- TCP/IP
- AppleTalk
- UDP
- 802.2
- 802.3
- FDDI
- 802.5
- Wireless technologies
- 802.11
- Infrared
- Bluetooth
- 3G
- Factors Affecting range and speed of wireless technologies
1.3 Application layer protocols
- HTTP
- DNS
- DHCP
- FTP
- SMTP
What is a Network ?
A computer network, or data network, is a digital telecommunications network which allows nodes to share resources. In computer networks, networked computing devices exchange data with each other using a data link.
What is an internet and how it works ?
Client Server Architecture
- Client
- Server
- Request
- Response
Types of network
Based on Size
- Personal Area Network (PAN)
- Local Area Network (LAN)
- Metropolitan Area Network (MAN)
- Wide area network (WAN)
- Internet
Based on Topology
- Star Topology
- Bus Topology
- Ring Topology
- Mesh Topology
- Tree Topology
Network Access Methods
1. Carrier Sensing Multiple Access (CSMA)
Carrier sense multiple access (CSMA) is a media access control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared transmission medium. A transmitter attempts to determine whether another transmission is in progress before initiating a transmission using a carrier sense mechanism. That is, it tries to detect the presence of a carrier signal from another node before attempting to transmit. If a carrier is sensed, the node waits for the transmission in progress to end before initiating its own transmission.
- Node listens for traffice on network.
- If traffic is not heard, node releases packet onto network.
- If two nodes release packets at the same time, the packets hit each other and collision occurs.
- A collision causes a power spike heard by all nodes.
- A collision destroys the data contained in the two packets.
- If no collision then the transmission was successful.
- Network is now freed up for another node to transmit.
2. Token Passing
In network communication, token passing is a channel access method where a signal called a token is passed between nodes that authorizes the node to communicate. It uses Round-robin scheduling algorithms. The advantage over other channel access method is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy. The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency.
Network models
- OSI Model
- TCP/IP Mode
OSI Model
1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer
1. Application Layer
- Contains variety of protocols that are commonly used.
- One widely used application protocol is HTTP (HyperText Transfer Protocol)
- Which is the basis for the World Wide Web.
- When a browser wants a Web page, it sends the name of the page it wants to the server hosting the page using HTTP. The server then sends the page back.
- Other application protocols are used for
- DNS (Domain Name System)
- DHCP (Dynamic Host Configuration Protocol)
- FTP (File Transfer Protocol)
- SMTP (Simple Mail Transfer Protocol)
2. Presentation Layer
- Unlike the lower layers, which are mostly concerned with moving bits around, the presentation layer is concerned with the syntax and semantics of the information transmitted.
- In order to make it possible for computers with different internal data representations to communicate, the data structures to be exchanged can be defined in an abstract way, along with a standard encoding to be used ‘‘on the wire.’’
- Manages these abstract data structures
- Allows higher-level data structures (e.g., banking records) to be defined and exchanged.
3. Session Layer
- The session layer allows users on different machines to establish sessions between them.
- Sessions offer various services, such as:
- Dialog control (keeping track of whose turn it is to transmit),
- Token management (preventing two parties from attempting the same critical operation simultaneously), and
- Synchronization (checkpointing long transmissions to allow them to pick up from where they left off in the event of a crash and subsequent recovery).
- Examples
- Session Maintenance in Banking Transactions
- E-commerce (Carts Data/info)
- User Sessions (Facebook)
4. Transport Layer
- The basic function of the transport layer is
- to accept data from above it,
- split it up into smaller units if need be,
- pass these to the network layer, and
- ensure that the pieces all arrive correctly at the other end.
- This must be done efficiently and in a way that isolates the upper layers from the inevitable changes in the hardware technology over the course of time.
- The transport layer also determines
- what type of service to provide to
- the session layer, and,
- ultimately, to the users of the network.
- what type of service to provide to
- The most popular type of transport connection is
- an error-free point-to-point channel that delivers messages or bytes &
- in the order in which they were sent.
- However, other possible kinds of transport service exist, such as the transporting of isolated messages with no guarantee about the order of delivery, and the broadcasting of messages to multiple destinations.
- The type of service is determined when the connection is established.
- (As an aside, an error-free channel is completely impossible to achieve; what people really mean by this term is that the error rate is low enough to ignore in practice.)
- The transport layer is a true end-to-end layer;
- it carries data all the way from the source to the destination.
- In other words, a program on the source machine carries on a conversation with a similar program on the destination machine, using the message headers and control messages. In the lower layers, each protocols is between a machine and its immediate neighbors, and not between the ultimate source and destination machines, which may be separated by many routers.
- The difference between layers 1 through 3, which are chained, and layers 4 through 7, which are end-to-end.
5. Network Layer
- The network layer controls the operation of the subnet.
- A key design issue is determining how packets are routed from source to destination. Routes can be based on static tables that are ‘‘wired into’’ the network and rarely changed, or more often they can be updated automatically to avoid failed components.
- They can also be determined at the start of each conversation, for example, a terminal session, such as a login to a remote machine.
- Finally, they can be highly dynamic, being determined anew for each packet to reflect the current network load.
- If too many packets are present in the subnet at the same time, they will get in one another’s way, forming bottlenecks.
- Handling congestion is also a responsibility of the network layer, in conjunction with higher layers that adapt the load they place on the network. More generally, the quality of service provided (delay, transit time, jitter, etc.) is also a network layer issue.
- When a packet has to travel from one network to another to get to its destination, many problems can arise.
- The addressing used by the second network may be different from that used by the first one.
- The second one may not accept the packet at all because it is too large. The protocols may differ, and so on.
- It is up to the network layer to overcome all these problems to allow heterogeneous networks to be interconnected.
- In broadcast networks, the routing problem is simple, so the network layer is often thin or even nonexistent.
6. Data Link Layer
- The main task of the data link layer is to transform a raw transmission facility into a line that appears free of undetected transmission errors.
- It does so by masking the real errors so the network layer does not see them.
- It accomplishes this task by having the sender break up the input data into data frames (typically a few hundred or a few thousand bytes) and transmit the frames sequentially.
- If the service is reliable, the receiver confirms correct receipt of each frame by sending back an acknowledgement frame.
- Another issue that arises in the data link layer (and most of the higher layers as well) is how to keep a fast transmitter from drowning a slow receiver in data.
- Some traffic regulation mechanism may be needed to let the transmitter know when the receiver can accept more data.
- Broadcast networks have an additional issue in the data link layer: how to control access to the shared channel.
- A special sublayer of the data link layer, the medium access control sublayer, deals with this problem.
7. Physical Layer
- The physical layer is concerned with transmitting raw bits over a communication channel.
- The design issues have to do with making sure that when one side sends a 1 bit it is received by the other side as a 1 bit, not as a 0 bit.
- Typical questions here are
- what electrical signals should be used to represent a 1 and a 0,
- how many nanoseconds a bit lasts,
- whether transmission may proceed simultaneously in both directions,
- how the initial connection is established,
- how it is torn down when both sides are finished,
- how many pins the network connector has, and what each pin is used for.
- These design issues largely deal with mechanical, electrical, and timing interfaces, as well as the physical transmission medium, which lies below the physical layer.
TCP/IP Model
1. Application Layer
2. Transport Layer
3. Network Layer
4. Physical Layer
1. Application Layer
- The TCP/IP model does not have session or presentation layers.
- No need for them was perceived. Instead, applications simply include any session and presentation functions that they require.
- Experience with the OSI model has proven this view correct: these layers are of little use to most applications.
- On top of the transport layer is the application layer.
- It contains all the higher- level protocols. Such As:
- DNS (Domain Name Server) - Protocol
- DHCP (Dynamic Host Control Protocol)
- HTTP (Hyper Text Transfer Protocol)
- FTP (File Transfer Protocol)
- SMTP (Simple Mail Transfer Protocol)
2. Transport Layer
- The layer above the internet layer in the TCP/IP model is now usually called the transport layer.
- It is designed to allow peer entities on the source and destination hosts to carry on a conversation, just as in the OSI transport layer.
- Two end-to-end transport protocols have been defined here.
- The first one, TCP (Transmission Control Protocol), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.
- It segments the incoming byte stream into discrete messages and passes each one on to the internet layer.
- At the destination, the receiving TCP process reassembles the received messages into the output stream.
- TCP also handles flow control to make sure a fast sender cannot swamp a slow receiver with more messages than it can handle.
- The second protocol in this layer, UDP (User Datagram Protocol), is
- an unreliable,
- connectionless protocol for applications that do not want TCP’s sequencing or flow control and wish to provide their own.
- The first one, TCP (Transmission Control Protocol), is a reliable connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.
- It is also widely used for one-shot, client-server-type request-reply queries and applications in which prompt delivery is more important than accurate delivery, such as transmitting speech or video.
3. Internet/Network Layer
- The internet layer holds the whole architecture together.
- It roughly corresponds to the OSI network layer.
- Its job is to permit hosts to inject packets into any network and have them travel independently to the destination (potentially on a different network).
- They may even arrive in a completely different order than they were sent, in which case it is the job of higher layers to rearrange them, if in-order delivery is desired.
- Note that ‘‘internet’’ is used here in a generic sense, even though this layer is present in the Internet.
- The analogy here is with the (snail) mail system.
- A person can drop a sequence of international letters into a mailbox in one country, and with a little luck, most of them will be delivered to the correct address in the destination country.
- The letters will probably travel through one or more international mail gateways along the way, but this is transparent to the users.
- Furthermore, that each country (i.e., each network) has its own stamps, preferred envelope sizes, and delivery rules is hidden from the users.
- The internet layer defines an official packet format and protocol called IP
- (Internet Protocol), plus a companion protocol called ICMP (Internet Control Message Protocol) that helps it function.
- The job of the internet layer is to deliver IP packets where they are supposed to go. Packet routing is clearly a major issue here, as is congestion (though IP has not proven effective at avoiding congestion).
4. Physical Layer
- All these requirements led to the choice of a packet-switching network based on a connectionless layer that runs across different networks.
- The lowest layer in the model, the link layer describes what links such as serial lines and classic Ethernet must do to meet the needs of this connectionless internet layer.
- It is not really a layer at all, in the normal sense of the term, but rather an interface between hosts and transmission links.
- Early material on the TCP/IP model has little to say about it.
<!– - Simplex - Simplex is one direction. A good example would be your keyboard to your CPU. The CPU never needs to send characters to the keyboard but the keyboard always sends characters to the CPU. In many cases, Computers almost always send characters to printers, but printers usually never send characters to computers (there are exceptions, some printers do talk back). Simplex requires only one lane (in the case of serial).
- Duplex
- Half Duplex
- Half-Duplex is like the dreaded “one lane” road you may have run into at construction sites. Only one direction will be allowed through at a time. Railroads have to deal with this scenario more often since it’s cheaper to lay a single track. A dispatcher will hold a train up at one end of the single track until a train going the other direction goes through. The only example I could think of for Half-Duplex is actually a Parallel interface. Even though parallel is eight lanes, data travels through the lanes in the same direction at the same time but never in both directions at the same time. The IEEE-1284 allows printers to send messages to the computer. The printer cannot send these messages while the computer is sending characters but when the computer stops sending characters, then the printer can send messages back. It’s kind of like some roads that head into downtown. In the morning, they’re one way roads, allowing traffic to go into downtown. In the evening their one way roads, allowing traffic to head out of downtown. The only advantage that Half-Duplex would have is the single lane or single track is cheaper then the double lane or double track.
- Full Duplex
- Full-Duplex is like the ordinary two-lane highway. In some cases, where traffic is heavy enough, a railroad will decide to lay a double track to allow trains to pass in both directions. In communications, this is most common with networking. Our fiber optic hubs have two connectors on each port, one for each lane of a two-lane roadway. Full-Duplex fiber is two cables bundled or tied together to form the two-lane roadway. In 100Base-TX, the two lanes are housed in the same jacket. RS232 was also designed to handle Full-Duplex but some of our short haul modems and converters give the user the option to go Half-Duplex or Simplex to reduce the number of conductors needed to connect between them. –>
- Half Duplex
Network protocols and standards:
- Types {eg:}
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- TCP/IP is the basic communication language or protocol of the Internet.
- It can also be used as a communications protocol in a private network (either an intranet or an extranet).
- When you are set up with direct access to the Internet, your computer is provided with a copy of the
- TCP/IP program just as every other computer that you may send messages to or get information from also has a copy of TCP/IP.
- AppleTalk
- AppleTalk was a proprietary suite of networking protocols developed by Apple Inc. for their Macintosh computers.
- AppleTalk includes a number of features that allow local area networks to be connected with no prior setup or the need for a centralized router or server of any sort.
- Connected AppleTalk-equipped systems automatically assign addresses, update the distributed namespace, and configure any required inter-networking routing.
- It is a plug-n-play system.
- AppleTalk was released in 1985, and was the primary protocol used by Apple devices through the 1980s and 1990s.
- Versions were also released for the IBM PC and compatibles and the Apple IIGS. AppleTalk support was also available in most networked printers (especially laser printers), some file servers, and a number of routers.
- UDP
- 802.2,
- 802.3,
- FDDI,
- 802.5;
- TCP/IP (Transmission Control Protocol/Internet Protocol)
- wireless technologies eg
- 802.11, infrared,
- Bluetooth,
- 3G;
-
factors affecting range and speed of wireless technologies
- WAN technologies
- Frame relay
- MPLS
- What is MPLS?
- Multi-Protocol Label Switching is a method of ensuring packets of data get where they’re supposed to, via a sensible route, and that packets are prioritised appropriately.
- Packets are labelled with one or more labels. As each packet passes through the MPLS network, labels may be added, replaced or stripped off. The network distributes information so that each switch knows what it is supposed to do if it encounters a particular label.
- The Benefits of MPLS Networks
- Improve Uptime
- by sending data over an alternative path in less than 50 milliseconds (if one exists). MPLS also reduces the amount of manual intervention your network provider has to do to create a WAN, reducing the likelihood of human error bringing down your circuit.
- Create Scalable IP VPNs
- with MPLS it’s easy to add an additional site to the VPN. There is no need to configure a complex mesh of tunnels, as is common with some traditional approaches.
- Improve User Experience
- by prioritising time-sensitive traffic such as VoIP. Multi-Protocol Label Switching offers multiple Classes of Service, enabling you to apply separate settings to different types of traffic.
- Improve Bandwidth Utilisation
- by putting multiple types of traffic on the same link, you can let high priority traffic borrow capacity from lower priority traffic streams whenever required. Conversely, when the lower priority traffic needs to burst beyond its usual amount of bandwidth, it can use any capacity that’s not being used by higher priority services.
- Hide Network Complexity
- an MPLS connection between two sites can be configured to act like a long ethernet cable, with the hops involved hidden from view. This is sometimes known as VPLS (Virtual Private LAN Service).
- Reduce Network Congestion
- Sometimes the shortest path between two locations isn’t the best one to take, as congestion has made it less attractive (at least for the time being). MPLS offers sophisticated traffic engineering options that enable traffic to be sent over non-standard paths. This can reduce latency (the delay in sending/receiving data). It also reduces congestion on the paths that have just been avoided as a result of traffic engineering.
- Improve Uptime
- MPLS is particularly well suited for use in Carrier Networks and corporate Wide Area Networks
- The technology is particularly well-suited to use in corporate Wide Area Networks
- Multi-Protocol Label Switching is particularly useful for situations where…
- multiple types of traffic share a data connection, with some types of traffic requiring priority over others
- uptime is important, key locations have multiple connections so that alternative paths always exist
- network congestion occurs sometimes on some connections
- new sites will need to be able to connect to many different locations, while being entirely invisible to many other sites on the network.
- This is why MPLS is widely used by the major telecoms companies. It’s also very popular with organisations that need a scalable WAN that can carry both voice (phone calls) and data.
- What is MPLS?
- ATM
- ATM (asynchronous transfer mode) is a dedicated-connection switching technology that organizes digital data into 53-byte cell units and transmits them over a physical medium using digital signal technology.
- Individually, a cell is processed asynchronously relative to other related cells and is queued before being multiplexed over the transmission path.
- Because ATM is designed to be easily implemented by hardware (rather than software), faster processing and switch speeds are possible.
- The prespecified bit rates are either 155.520 Mbps or 622.080 Mbps.
- Speeds on ATM networks can reach 10 Gbps.
- Along with Synchronous Optical Network (SONET) and several other technologies, ATM is a key component of broadband ISDN (BISDN).
- Network access methods
- CSMA
- Token passing;
Application layer protocols
- HTTP
- DNS
- DHCP
- FTP
- SMTP
1. HTTP (Hyper Text Transfer Protocol)
- HTTP Methods
- GET
- PUT
- POST
- PATCH
- DELETE
- HTTP Response Code
- 1XX - Informational
- 2XX - Success
- 3XX - Redirection
- 4XX - Client Errors
- 5XX - Server Errors
2. DNS (Domain Name Server) - Protocol
- DNS - PieterExplainsTech
- A Taxi-cab Analogy
- Imagine yourself going to a taxi-cab and asking the taxi driver to take you to your home without mentioning your home’s address. What will happen ?
- Imagine yourself going to a taxi-cab and asking the taxi driver to take you to your home without mentioning your home’s address. What will happen ?
- DNS Server Levels
- Root Domain Servers
- Top Level Domain (TLD) Servers
- Authoratitive Name Servers
- DNS Lookup Process
- Your computer asks your router for a DNS Record
- Your router asks your ISP for a DNS Record
- Your ISP asks the Root Name server for the Name Server.
- The Root server gives your ISP the Name server.
- Your ISP asks the Name server for a DNS record.
- The Name server gives you ISP the DNS Record.
- Your ISP gives your Router the DNS Record.
- Your Router gives your computer the DNS Record.
- DNS Management
- DNS management controls Domain Name System (DNS) server clusters. DNS data is typically deployed on multiple physical servers. The main purposes of DNS management software are: to reduce human error when editing complex and repetitive DNS data.
- DNS Flavours
- Generic
- .com, .edu, .gov, .org, .net
- Countries
- .np, .in, .uk, .pk
DNS Spoofing
- Generic
3. DHCP (Dynamic Host Control Protocol)
- DHCP - PieterExplainsTech
- DHCP Server
- A DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks.
- Issue:
- An issue that arises with automatic assignment of IP addresses from a pool is for how long an IP address should be allocated.
- If a host leaves the network and does not return its IP address to the DHCP server, that address will be permanently lost.
- After a period of time, many addresses may be lost.
- To prevent that from happening, IP address assignment may be for a fixed period of time, a technique called leasing.
- Just before the lease expires, the host must ask for a DHCP renewal.
- If it fails to make a request or the request is denied, the host may no longer use the IP address it was given earlier.
- DHCP Lookup
- DHCP Discover
- DHCP Offer
- DHCP Request
- DHCP Acknowledgment
4. FTP (File Transfer Protocol)
5. SMTP (Simple Mail Transfer Protocol)
Mailing Process on Internet
Parties Involved in Email System
- MUA = Mail User Agent
- MTA = Mail Transfer Agent
- MDA = Mail Delivery Agent
Protocols Involved in Email System
- SMTP = Simple Mail Transfer Protocol
- IMAP = Internet Message Access Protocol
- POP3 = Post Office Protocol V3
Sender (MUA) uses SMTP Protocol to send email to its nearest email server (MTA). It then sends the email over bunch of other email servers (MTA). Finally when the emails reach to the destination email server (MDA) the server then notifies the client (MUA). The client visits his/her inbox and finds the email.
Transport Layer Protocols
- TCP
- UDP
TCP
UDP
Internet Layer Protocols
- IP
- ICMP
IP Classes
IP addresses are divided into 5 classes[A-E].
Intranet & Extranet
Unicast, Broadcast and Multicast
Common port numbers
The Internet Assigned Numbers Authority (IANA) is responsible for the global coordination of the DNS Root, IP addressing, and other Internet protocol resources. This includes the registration of commonly used port numbers for well-known Internet services.
The port numbers are divided into three ranges: the well-known ports the registered ports, and the dynamic or private ports.
The well-known ports (also known as system ports) are those from 0 through 1023. The requirements for new assignments in this range are stricter than for other registrations examples include:
- 21: File Transfer Protocol (FTP)
- 22: Secure Shell (SSH)
- 23: Telnet remote login service
- 25: Simple Mail Transfer Protocol (SMTP)
- 53: Domain Name System (DNS) service
- 80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web
- 110: Post Office Protocol (POP3)
- 119: Network News Transfer Protocol (NNTP)
- 123: Network Time Protocol (NTP)
- 143: Internet Message Access Protocol (IMAP)
- 161: Simple Network Management Protocol (SNMP)
- 194: Internet Relay Chat (IRC)
- 443: HTTP Secure (HTTPS)
The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535.
Three Types of Communication Channel
- Simplex
- Half duplex
- Full duplex
1) Simplex
A simplex communication channel only sends information in one direction. For example, a radio station usually sends signals to the audience but never receives signals from them, thus a radio station is a simplex channel. It is also common to use simplex channel in fiber optic communication. One strand is used for transmitting signals and the other is for receiving signals. But this might not be obvious because the pair of fiber strands are often combined to one cable. The good part of simplex mode is that its entire bandwidth can be used during the transmission.
2) Half duplex
In half duplex mode, data can be transmitted in both directions on a signal carrier except not at the same time. At a certain point, it is actually a simplex channel whose transmission direction can be switched. Walkie-talkie is a typical half duplex device. It has a “push-to-talk” button which can be used to turn on the transmitter but turn off the receiver. Therefore, once you push the button, you cannot hear the person you are talking to but your partner can hear you. An advantage of half-duplex is that the single track is cheaper than the double tracks.
3) Full duplex
A full duplex communication channel is able to transmit data in both directions on a signal carrier at the same time. It is constructed as a pair of simplex links that allows bidirectional simultaneous transmission. Take telephone as an example, people at both ends of a call can speak and be heard by each other at the same time because there are two communication paths between them. Thus, using the full duplex mode can greatly increase the efficiency of communication.
Bridging Devices on Network
When computers, network devices or other networks are required to be connected, hubs, switches and routers are the bridges to link them together. All the three types of devices can perform the same function, and technicians sometimes may use the terms interchangeably. However, this will make people confuse whether they are the same thing or different from each other.
- Hub
- Switch
- Router
Hub
A hub is to sent out a message from one port to other ports. For example, if there are three computers of A, B, C, the message sent by a hub for computer A will also come to the other computers. But only computer A will respond and the response will also go out to every other port on the hub. Therefore, all the computers can receive the message and computers themselves need to decide whether to accept the message.

Switch
A switch is able to handle the data and knows the specific addresses to send the message. It can decide which computer is the message intended for and send the message directly to the right computer. The efficiency of switch has been greatly improved, thus providing a faster network speed.

Router
Router is actually a small computer that can be programmed to handle and route the network traffic. It usually connects at least two networks together, such as two LANs, two WANs or a LAN and its ISP network. Routers can calculate the best route for sending data and communicate with each other by protocols.

What Is the Difference?
Hub Vs. Switch
A hub works on the physical layer (Layer 1) of OSI model while Switch works on the data link layer (Layer 2). Switch is more efficient than the hub. A switch can join multiple computers within one LAN, and a hub just connects multiple Ethernet devices together as a single segment. Switch is smarter than hub to determine the target of the forwarding data. Since switch has a higher performance, its cost will also become more expensive.
Switch Vs. Router
In the OSI model, router is working on a higher level of network layer (Layer 3) than switch. Router is very different from the switch because it is for routing packet to other networks. It is also more intelligent and sophisticated to serve as an intermediate destination to connect multiple area networks together. A switch is only used for wired network, yet a router can also link with the wireless network. With much more functions, a router definitely costs higher than a switch.
Hub Vs. Router
As mentioned above, a hub only contains the basic function of a switch. Hence, differences between hub and router are even bigger. For instance, hub is a passive device without software while router is a networking device, and data transmission form in hub is in electrical signal or bits while in router it is in form of packet.