Showing posts with label SSA Integrate. Show all posts
Showing posts with label SSA Integrate. Show all posts

Monday, April 1, 2024

Will Lora replace 4G LTE in IoT

Will Lora replace 4G LTE in IoT 

LoRa (Long Range) and 4G LTE (Long-Term Evolution) are both used in the Internet of Things (IoT) space, but they cater to different requirements and use cases. Whether LoRa will replace 4G LTE in IoT depends on the specific needs of the IoT application. Here are some key considerations:

Range and Power Consumption:

LoRa: LoRa is known for its long-range capabilities and low power consumption. It is suitable for applications where devices are spread out over a wide area and need to communicate over long distances with minimal power usage.

4G LTE: LTE is designed for higher data rates and is well-suited for applications that require faster communication speeds. However, LTE may consume more power compared to LoRa.

Data Rate:

LoRa: Offers relatively low data rates suitable for applications with sporadic and small data transmission requirements, such as sensor readings and status updates.

4G LTE: Provides higher data rates, making it suitable for applications with more frequent and data-intensive communication needs.

Infrastructure and Cost:

LoRa: Typically has a lower infrastructure cost, making it a cost-effective choice for large-scale deployments where devices are spread out over a wide area.

4G LTE: Requires more extensive infrastructure and may involve higher costs, but it offers faster and more reliable connectivity.

Application Requirements:

LoRa: Commonly used in scenarios like agriculture, smart cities, and industrial IoT where long-range communication and low power consumption are critical.

4G LTE: Preferred for applications requiring higher bandwidth, mobility support, and faster data transfer, such as connected vehicles or video surveillance.

Conclusions

In many cases, these technologies can complement each other within an IoT ecosystem. Hybrid solutions that leverage both LoRa for low-power, long-range communication and 4G LTE for higher bandwidth and mobility are not uncommon.

Ultimately, the choice between LoRa and 4G LTE in IoT depends on the specific needs and priorities of the application, including factors such as range, data rate, power consumption, and cost.

The following is a list of top 10 countries/territories by 4G LTE coverage as measured by OpenSignal.com in February/March 2019:

The LoRa Alliance is an open, non-profit association whose stated mission is to support and promote the global adoption of the LoRaWAN standard for massively scaled IoT deployments, as well as deployments in remote or hard-to-reach locations.

Saturday, March 16, 2024

How to Splice Security Camera Wires

How to Splice Security Camera Wires

Splicing cables or wires is the act of combining two wires together, and it’s an indispensable skill for someone who owns or manages properties that use security cameras. You might need to do this to repair wires, lengthen wires, or combine two different wires together. 

There are two main types of security camera wires: ethernet cables and RG59 cables. Even an amateur can learn how to splice either type, and the process is relatively simple once you get some practice under your belt. 

Here, we’ll show you how to splice both ethernet and RG59 cables.

Can I Splice Security Camera Wires? 

By following simple instructions and tutorials, most people can splice security camera wires themselves. You’ll need some simple tools, such as wire cutters, wire strippers, electrical tape, and heat shrink tubing. Depending on how your wires are set up, you might also be able to splice wires together using a coupler, which makes the job even easier. 

It’s also important to note that while you can splice security camera wires together, that doesn’t always mean you should. Splicing cables could decrease the quality of your security footage, so when possible, it might be a better idea to run a new continuous cable. 

How Do You Splice Security Camera Wires? 

Before you can begin splicing your security camera wires, you need to know what type of wires you’re working with. 

If you have an IP security camera system, you’re likely working with Cat5 or Cat6 ethernet cables. These cables will consist of four twisted wire pairs encased in insulation. 

If you have a CCTV security camera system, you’re likely working with RG59 cables. This is an older type of cable, but it’s still used in many buildings. These cables will consist of copper wire encased in various layers of insulation and shielding. 

The Easiest Method for Splicing Security Camera Wires

Before you begin splicing, take a look at your wires. If they already have connectors on the ends, you’re in luck. Both ethernet cables and RG59 cables might already have connectors on the ends, and in that case, it’s easy to splice the cables. 

Simply find a compatible coupler and either insert or screw the ends of the cables into the coupler. With RG59 cables, it’s a good idea to wrap the connection with electrical tape after you’re done connecting the two cables.

How to Splice Security Camera Wires 

If your cables don’t already have connectors attached, you can still splice the wires together, but it will be a bit more complicated. The process will be different depending on whether you have ethernet cables or RG59 cables.

Splicing Security Camera Wires with Ethernet Cables 

Ethernet cables consist of small, fine wires, so it’s important to be very gentle and intentional when working with these wires. Follow these steps to splice ethernet security camera cables:

  1. First, use wire strippers to remove the outer insulation, which looks like a plastic coating on each wire you need to splice. Make sure you leave enough wire exposed to work with. 
  2. Put heat shrink tubing on only one of the wires. You’ll need this later when you’re finishing up. 
  3. Expose the inner core of each of the eight inner wires by carefully stripping off the outer layer. You’ll want to expose about a half inch of wire so you have enough to work with. Repeat this on each cable you need to splice.
  4. Combine each of the eight wires individually using a butt crimp. 
  5. Tape each of the eight connections with electrical tape. This helps strengthen the connection you’ve made. 
  6. Before sealing up your cables, it’s a good idea to test the connection to make sure it works. 
  7. When you’re done combining each wire, cover all of the connections with your heat shrink tubing. Use a heat gun to activate and shrink your tubing. 

When you’re finished, you should have a working ethernet cable. 

Splicing Security Camera Wires with RG59 Cables 

You’ll follow a relatively similar process when you splice RG59 cables. The main differences are the number of layers you need to work through and the number of wires you need to splice. Follow these steps to splice RG59 security camera cables: 

1.   Use wire strippers to remove the outer insulation on each end you need to splice. This will look like a plastic coating. Make sure you leave enough wire exposed to work with. 

2.   Put heat shrink tubing on only one of the cables. You’ll need this later when you’re finishing up. 

3.   Pull back the braided mesh, which is the next layer you’ll find in an RG59 cable.

4.   Cut and strip back the shielding and additional insulation layer; these are the next two layers you’ll find before you get to the wire. When removing these last two layers, be careful not to cut too deeply so you don’t damage the core. 

5.   Add another piece of heat shrink tubing that you’ll use once you have your connection made. 

6.   Use a butt crimp to connect the core on each end. 

7.   Wrap your connection with electrical tape. 

8.   Put the heat shrink tubing over your connection. Use a heat gun to activate and shrink your tubing. 

9.   Put a larger butt crimp over the braided mesh. 

10.Pull the heat shrink tubing over this connection. Again, use a heat gun to activate and shrink your tubing. 

11.Wrap your connection in electrical tape again. 

Depending on the type of cable you’re working with, you might have additional wires to connect when you get to the core. Some cables have additional wires for sound and to power a tilt and pan camera. If you find additional wires in the middle, follow the same process to connect those wires. 

When you’re finished, you should have a single working RG59 cable.

Why Do You Need To Splice Security Camera Wires? 

It might seem like quite a hassle to splice security camera wires, and it definitely takes time and effort. However, it’s good to know what to do in case you have a break in your wires and need to repair them quickly to get your security cameras back up and running. 

You also might need to splice wires to lengthen a cable, move a camera, or add additional security cameras. A good splice job can save you from needing to buy new cables.


Sunday, December 3, 2023

6 Reasons your business needs gates and barriers

6 Reasons your Business Needs Gates & Barriers 

Although the onset of the coronavirus saw a significant decrease in crime rates across the India due to enforced lockdown, there are very few reasons for businesses to take this as a sign of things to come. Indeed businesses should take this time to consider their security protocols and begin to address any shortcomings in good time as restrictions lift. Here we will look at some of the benefits of two of our most popular forms of perimeter security: gates and barriers.
1 – Barriers and gates are strong deterrents against crime
Time and time again we hear stories of criminals that have acted on opportunity when committing a crime. A broken fence, unlocked door, insufficient lighting, the list goes on. Having outdated, broken or a complete lack of perimeter security almost guarantees you to be viewed as an easy target by criminal gangs. Barriers and gates are the first port of call for many perimeter security overhauls because they actively send out a message that your business is not going to be easy pickings.
 
2 – Barriers and gates allow you to control movement
While tools like CCTV are a great way to monitor the flow of traffic and pedestrians throughout your site, they do nothing to act on it. One of the main shortfalls of CCTV is that it simply takes a record of actions. The job of dealing with any issues is left to others. With barriers and gates, you can proactively limit entry to your site. With the use of pin pads, tokens, and fingerprint recognition you can reduce the need for manpower to administer front-of-house duties.
 
3 – Real-time savings
This brings us to our next reason to invest in gates and barriers. Perimeter security is essentially an investment in your future. These enhancements protect you from the disasters that follow on from a serious crime. Businesses that are victims of serious crimes like theft, burglary, vandalism, and arson can face significant losses in several different ways. The initial impact of stock loss or damage, losses from downtime for your business, and an impact on your customer relationships or reputation are all very real consequences. They can be successfully averted by investing in your security needs before the worst happens.

 
4 – Curb appeal
Gates and barriers are often the first thing that visitors to your site or passers-by will see. A high-quality installation will provide a level of professionalism to your company brand and reputation and show that you care about the safety of your employees, assets, and visitors.
 
5 – Privacy
For businesses that operate in sensitive areas or highly competitive fields, privacy is often high on their agendas. Gates and barriers extend your footprint to the far exterior of your property and mean that the only people who can approach your site are those who you have given explicit authorisation to do so.

6 – Restrict vehicular access
Smash and grab type crimes are on the rise. This is when a perpetrator uses a vehicle to approach their target quickly, commits their crime, and then escapes again before the police arrive. By utilising gates and barriers you can effectively shut down the chances of a speedy approach or escape and thwart their plans.
 
No matter the size or nature of your businesses, we can provide you with a free, no-obligation quotation and feasibility survey to assess the security requirements of your organization. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us on ssaintegrate@gmail.com


Wednesday, August 16, 2023

Difference Between CCTV and Surveillance Cameras?

Difference Between CCTV and Surveillance Cameras?

When it comes to matters of security, there is a great deal of misunderstanding regarding the distinction between closed-circuit television and surveillance cameras. In spite of the fact that many people use these phrases synonymously, there is a significant difference between the two.

In this article, we will go over the key distinctions between closed-circuit television (CCTV) systems and surveillance cameras, and then we will assist you in selecting the system that is most suited to meet your requirements and how to Select The Right CCTV System.

What Is CCTV?

A CCTV system consists of a number of cameras to record activity, a digital video recorder (DVR) to store footage, and a monitor to view the recordings. You can also add security features like motion detectors and alarms.

Most people install CCTV systems for security purposes. They deter burglars and can help identify criminals after the fact. But they have other uses too. For example, you can use them to keep an eye on employees or children.

CCTV systems come in all shapes and sizes. They can be as simple as a single camera connected to a DVR, or they can be more complex with multiple cameras, different types of storage, and remote viewing capabilities. The type of system you need depends on your specific needs.

Installing a CCTV system can be a great way to improve security at your home or business. But it’s important to make sure you understand all the ins and outs before making any decisions.

What Is A Security Camera?

The word “security camera” is often used, although many people have no idea what they are. Monitoring and recording activity in a certain area is the primary function of security cameras.

They’re commonly found in public locations like shops, banks, and other establishments of a commercial nature. The usage of security cameras to discourage criminals and safeguard families is becoming more common.

There are a wide variety of security cameras to choose from. Small enough to fit in your hand, yet with a wide range of size options.

The region you want to keep an eye on will dictate the kind of camera you require. In order to watch your front entrance, you’ll need a different kind of camera than you’ll need to monitor your backyard, for instance.

Wireless and wired security cameras are available. A cable connects a wired camera to a recorder, such as a DVR. Wi-Fi is a common method of transmitting footage from wireless cameras.

Wireless cameras are preferred by many people since they are easy to set up and can be put anywhere in your house or company.

Analog and digital security cameras are two of the most common varieties. Analog cameras record footage using an analogue signal. Unlike digital cameras, this sort of camera is older and less prevalent.

What is The Main Differences Between CCTV and Security Camera

CCTV cameras, or closed-circuit television cameras, are a type of security camera that is typically used in public places in order to deter crime.

Security cameras, on the other hand, can be used in both public and private settings and are often used in homes in order to provide extra security. Here are five main differences between CCTV cameras and security cameras:

-CCTV cameras typically have a wider field of view than security cameras.

-CCTV cameras are usually mounted on ceilings or high up on walls, while security cameras can be placed anywhere that provides an adequate view.

-CCTV footage is usually monitored by security personnel in a separate location, while many home security systems allow users to monitor their own footage remotely.

-CCTV cameras typically record footage continuously, while security cameras can be set to record only when motion is detected.

-CCTV cameras are usually larger and more noticeable than security cameras.

Both CCTV cameras and security cameras serve an important purpose in terms of security. It’s important to choose the right type of camera for your needs in order to ensure that you’re getting the most out of your investment.

Comparison Table Between CCTV and Security Camera

CCTV

Security Camera

CCTV stands for ‘closed-circuit television’ 

Security cameras are also known as IP cameras; Internet Protocol Cameras.

As wired network cords, CCTV cameras utilize

Power over Ethernet (POE) is used by security cameras to reduce the requirement for electrical cables.

CCTV systems have a lesser video quality and image quality than security cameras.

Security cameras provide greater video quality and pixel density than CCTV cameras.

A television is used to transmit feeds from CCTV cameras.

Wi-Fi, LAN, or cellular networks are used to link security cameras.

CCTV is not wirelessly accessible and can be disarmed easily.

Security or IP cams are much more efficient and can be controlled wirelessly regardless of distance.

How To Select The Right CCTV System

When it comes to choosing a CCTV system, there are many things to consider in order to find the right one for your needs. Here are a few tips on how to select the right CCTV system:

-First, you need to determine what type of coverage you need. Are you looking for indoor or outdoor coverage?

-Second, you need to decide on the features that are important to you. Do you need night vision or motion detection?

-Third, you should consider the size and placement of the cameras. You will need to make sure that they are placed in strategic locations in order to get the best coverage possible.

-Fourth, you will need to choose a system that is compatible with your existing security system. If you don’t have a security system, you will need to choose one that is easy to install and use.

-Finally, you will need to decide on a budget. There are many different CCTV systems on the market, so you will need to find one that fits your needs and budget.

When it comes to choosing a CCTV system, there are many things to consider. With these tips in mind, you should be able to find the perfect system for your needs!

How To Select The Right Security Camera

It’s important to do your research when selecting a security camera. You want to make sure you’re getting a high-quality product that will be effective in protecting your home or business. Here are a few things to keep in mind when making your selection:

– The type of camera you need will depend on the area you’re trying to monitor. Indoor cameras are typically small and unobtrusive, while outdoor cameras need to be weatherproof and durable.

– Resolution is an important factor to consider. Higher resolutions mean better image quality, but they also require more storage space and processing power.

– Night vision is another key feature to look for. Many cameras now come with infrared LEDs that allow them to see in low-light conditions.

– Some cameras come with additional features like motion detection and two-way audio. These can be useful in certain situations, but they’re not essential for everyone.

Take your time to compare different security cameras and find the one that’s right for you. With so many options on the market, there’s sure to be a perfect match for your needs.

Conclusion

Make sure you’re getting exactly what you want with SSA INTEGRATE’s services.
We ensure that the solutions we are implementing will meet your demands now and in the future by going through our clients’ requirements.

No matter how many cameras you need, our team can manage all the design, estimating, specifications, equipment use and new equipment installation along with the necessary training and maintenance. We are not recommended to install HikVision, Dahua & Huawei.

It is our goal to give the best possible customer service prior to and following the installation. Regardless of the situation, customers can always rely on our knowledge and team.

Saturday, July 1, 2023

AI, Cloud and Cybersecurity Open New Opportunities for Integrators

AI, Cloud and Cybersecurity Open New Opportunities for Integrators 

I was recently asked which technologies are going to have the most significant impact on the physical security industry in the next few years. With the rapid pace of change in technology today, there is no simple answer to this question.

One thing that is certain is that companies are under pressure to become more efficient, secure and operationally aware. That, in turn, is driving the need for real-time data capturing and processing from every part of their business, including security.

We are just beginning to see how emerging technologies and concepts such as artificial intelligence (AI), Cloud computing and cybersecurity are impacting our industry. As companies plan for the future, budgets are increasingly focused on innovative solutions that can help to process the growing amount of data being captured and consumed.

Manufacturers and systems integrators that understand this shift have been quick to identify opportunities to win new business through the introduction of value-added applications or new services capable of generating recurring monthly revenue.

We explore some of those technologies and opportunities below.


Artificial intelligence and analytics

AI analytics is the product of automating data analysis—a traditionally time-consuming and people-intensive task—using the power of today's artificial intelligence and machine learning technologies.

AI analytics refers to a subset of business intelligence that uses machine learning techniques to discover insights, find new patterns and discover relationships in the data. In practice, AI analytics is the process of automating much of the work that a data analyst would normally perform.

Customers are looking to AI and data analytics to gain better insight into their operations. These offerings can enable security-related intelligence or operational and customer insights. The key to AI is self-learning algorithms that, over time, get better at identifying certain targeted behaviors or transactions and reducing false positives.

We have also begun to see several chip manufacturers introduce next generation processors with AI built into the core firmware. As a result, systems integrators can expect to see many product innovations in 2018 focused on advanced video analytics, data integrations and application software.

The challenge for their customers will be clearly defining which data is most valuable to them, who will have access to it, and how to best manage it. Systems integrators can play a key role in this process by having those discussions with customers up front and encouraging a proof-of-concept phase before fully rollouts are undertaken.

 

Cloud-based services

Cloud based services provide information technology (IT) as a service over the Internet or dedicated network, with delivery on demand, and payment based on usage. Cloud based services range from full applications and development platforms, to servers, storage, and virtual desktops.

In addition to AI and data analytics capabilities, we are seeing demand from customers for Security-as-a-Service (SaaS) offerings. The combination of low, upfront capital costs and outsourced services has made Cloud-based video and access control popular, especially in the hospitality and small-to-medium enterprise markets. Examples of SaaS cloud service providers include Dropbox, G Suite, Microsoft Office 365, and Slack. In each of these applications, users can access, share, store, and secure information in “the cloud.”

As technology providers add more sophisticated applications and services to further drive customer insight and efficiencies, expect enterprise retail customers to begin moving to this model as well in 2018. For systems integrators, SaaS solutions can represent a recurring revenue stream and a great opportunity to generate new business.

 

Cybersecurity impacts

Cyber attacks can cause electrical blackouts, failure of military equipment, and breaches of national security secrets. They can result in the theft of valuable, sensitive data like medical records. They can disrupt phone and computer networks or paralyze systems, making data unavailable.

Cybersecurity is crucial because it safeguards all types of data against theft and loss. Sensitive data, protected health information (PHI), personally identifiable information (PII), intellectual property, personal information, data, and government and business information systems are all included.

The sheer scope and size of the data breaches we saw in 2017 – Equifax being one of the most notable – has heightened concerns over cyber-preparedness. Increasingly, customers are evaluating their own level of cybersecurity preparedness, as well as that of their suppliers.

There’s no doubt that our industry is taking cybersecurity seriously, however there is still work to be done, and both systems integrators and their manufacturer partners need to be prepared. Information technology (IT) departments will continue to play an expanded role in approving products for deployment on corporate networks. The use of third-party cybersecurity audits will also become more commonplace, which will significantly impact how products are developed and deployed.

In addition to ensuring that their products are secure, manufacturers and system integrators will also need to improve their own organizational security. For video solution providers, that could mean demonstrating how they protect their software code and architect their software, and how compliant their solutions are with data privacy standards in North America and globally.

The need to bolster cyber defenses will also create demand for new equipment and software upgrades as the vulnerabilities of customers’ legacy equipment are exposed.

Cybersecurity will be a challenge for some systems integrators, but a great business opportunity for others. Customers will increasingly look for integrators that can meet their cybersecurity standards and possibly pass a cyber audit. If there’s a weak link in the chain – from product design to installation or service – then everyone loses. System Integrators know major China manufacturers like Dahua, Hikvision, Uniview are not impacted, from everything we have seen. We executed the proof of concept code from the disclosure on multiple devices and were unable to gain access using the backdoor. The backdoor primarily impacts devices using HiSilicon SOC with Xiongmai software, which is dozens of small OEM manufacturers, using minimally modified OEM firmware, Open Source OS and drivers, and enabling telnet on port 9530.

So it’s important that integrators and manufacturers work closely together and ensure that they share the same high cybersecurity standards. Integrators should also demand that their manufacturer partners be diligent about educating them on products and keeping software up to date to reduce potential vulnerabilities.

 

Knowing your market

Many of today’s leading system integrators have begun investing in the additional resources needed to educate staff and align their organizations so they can successfully adopt and provide these new capabilities to their customers.

It’s important that your organization have conversations with both your end user customers and your technology providers so you can take advantage of new opportunities while also helping to clarify what’s possible today and what’s still on the horizon.

As integrators move from equipment sales to consultative solution sales, it is important to understand the unique business problems of the customers in your target market. While this concept is not new, a growing number of integrators are putting vertical market initiatives in place to concentrate their expertise.

The top five business challenges of yesterday may no longer be the top five challenges of tomorrow. Integrators need to understand what those unique challenges are for each vertical they play in, and work with manufacturers that can provide proven solutions for specific markets.

Thursday, September 15, 2022

The 5 D’s Of Outdoor Perimeter Security For Business

The 5 D’s Of Outdoor Perimeter Security For Business 

When it comes to your business, you must ensure that every inch of it is protected. Many people ignore the outdoor perimeter of their establishment and focus on the inside. However, the outdoor security of your business is equally important. To protect your building’s entire structure, there is a key security principle that you can use: The five D’s. They are Deter, Detect, Deny, Delay and Defend. Each plays a specific role in securing your business’ exterior.

Deter

Your first line of defence is deterrence. In order to keep criminals away, you have to deter them from even thinking about setting foot on your property. To create a shield of deterrence, you need to start simple with signs. Put up signs that say “No Trespassing,” “Property Under Surveillance,” “We review CCTV footage Everyday”, “Guard Dog on Premises” and “Security Personnel On Duty 24-7.” You may not have a guard dog but the suggestion of one could be enough to keep criminals at bay. Another line of deterrence is to have surveillance technology. Having CCTV security cameras visible will discourage criminals.

Detect

Protect your building’s perimeter with equipment that can detect trespassers. Surveillance cameras, motion sensors, and other security equipment that can sense movement are all must-haves to ensure that anything out of the ordinary is detected.

Deny

To keep your perimeter secure while letting authorized personnel come and go, you need to deny those who aren’t supposed to be there. With a manned security gate at the main point of entry, anyone who isn’t supposed to be coming and going will be stopped immediately. Another way to deny criminals entrance to your property is with card access. This is an added security measure that ensures that even when people are in the building they need to use an access card to get into certain areas. You can even have your employees scan their cards at the manned security gate.

Delay

A delay system should be in place in case something should go wrong with your security system and an intruder is able to penetrate the building’s perimeter. This can be done through interior locking doors and barriers. By having a delay system you give your security team and the police enough time to respond to the intrusion and the criminal cannot get away.

Defend

To defend your perimeter against intruders you will need the help of local law enforcement and your security personnel. This involves having a protocol in place for making sure a criminal is being watched during the time period after they’ve been apprehended by your security personnel, and the time law enforcement arrives scene.

Creating optimal outdoor perimeter security requires planning. However, once you have the Five D’s in place, you can rest assured that your business is safe.

For, free suggestion consultancy about security alarm system can contact SSA Integrate via mail ssaintegrate@gmail.com 


Tuesday, February 1, 2022

Difference between Hub and Switch

Difference between Hub and Switch 

Network devices, or networking hardware, are physical devices that are required for communication and interaction between hardware on a TCP/IP network.

Here is the common network device list:

·        Hub

·        Switch

·        Router

·        Bridge

·        Gateway

·        Modem

·        Repeater

·        Access Point

In 2006 The Network Hub is invented at Vancouver, British Columbia, Canada. A hub is a device that connects multiple Ethernet devices on one network and makes them act together as a single network. A hub does not gather information and input in one port results as an output in all ports on the network. A switch is a networking device that performs the same job as the hub but are considered as a more intelligent hub as it gathers information about the data packets it receives and forwards it to only the network that it was intended for. A Hub is a layer-1 device and operates only in the physical network of the OSI Model.

Hubs and switches are devices that are used in data networking on the internet. These devices are used in order to connect two or more networking ports in order to transfer data along the connection. Though the primary job of hubs and switches are the same, to forward data to different networks, they work in different ways.

A hub, also known as Ethernet hub, active hub, network hub, repeater hub or multiport repeater, is a device that connects multiple Ethernet devices on one network and makes them act together as a single network. A hub has multiple input/output (I/O) ports, in which an input in one port results in it being an output in all the other ports, except the port where it was input. In layman’s terms, a hub connects many networks into one, where a data packet that is sent by one networks, is copied and pasted to all network ports, making it so that every port can see that data packet. A hub works on the physical layer or layer 1 of the Open Systems Interconnection (OSI) model. It also works as a data collision detector, sending a jamming signal to all ports if it detects collisions at one port.

It is a simple device that does not examine the data it receives or sends, while just duplicating the data and making it visible for all. The receiving port that has to decide if the data packet is actually intended for it by checking the address on the packet, before passing it on further. Since hubs only have one collision domain, constant collisions occur. Unnecessary traffic is sent to all devices on the network. Originally hubs were popular due to the high price of switches, but switches are not so expensive these days. Hubs are slowly becoming obsolete in many practices, but are still used in special circumstances.

A switch is a networking device that performs the same job as the hub; it connects network segments or devices making them act as a single network. Switches are commonly referred to as a multi-port network bridge that process and routes data on a data link layer or layer of the OSI model. Switches can also process data at the network layer (layer 3) or higher layers and are known as multilayer switches.

Switches are considered as a more intelligent hub as it gathers information about the data packets it receives and forwards it to only the network that it was intended for. When a switch receives a data packet, it examines the data address, the sender and the receiver and stores the memory, after which it then sends the data to the device that the data is meant for.

Most modern Ethernet Local Area Networks (LANs) operate on switches. Small offices and residential devices commonly use single layer switch, while bigger applications require multilayer switches. The switches use a bridge or a router in order to split a larger collision domain to smaller collision domains, resulting in lesser collisions.  Each port has an individual collision domain, allowing computers to maintain dedicated bandwidth.

Hub

Switch

Definition

A hub is a connection point for different segments of a LAN. It contains multiple ports and when it receives a packet of information at one port, it copies this packet to all segments of the LAN so that it can be viewed by all ports.

A switch is multi-port networking device that connects network devices together. A switch operates at the data link layer (layer 2) of the OSI model. A switch filters and then forwards data packets between networks.

Layer

Physical Layer (Layer 1)

Data Link Layer (Layer 2)

Spanning-Tree

No Spanning-Tree

It allows many Spanning-Trees to take place.

Type of Transmission

Broadcast

Broadcast, Uni-cast & Multicast.

Table

No MAC table. Hubs cannot learn MAC address.

Stores MAC address and maintains address.

Used in

LAN (Local Area Networks)

LAN (Local Area Networks)

No of Ports

4

24-48 depending on type of switch.

Collision

Occurs

No collision occurs

Collision Domain

One collision domain

Every port has its own collision domain.

Transmission Mode

Half duplex

Full duplex

Types of Hub

There are three types of the hub that are given below:

1.  Passive Hub

2.  Active Hub

3.  Intelligent Hub

Passive Hub: The passive hubs are the connection point for wires that helps to make the physical network. It is capable of determining the bugs and faulty hardware. Simply, it accepts the packet over a port and circulates it to all ports. It includes connectors (10base-2 port and RJ-45) that can be applied as a standard in your network. This connector is connected to all local area network (LAN) devices. Additionally, the advanced passive hubs have AUI ports, which are connected as the transceiver according to the network design.

Active Hub: As compared to a passive hub, it includes some additional features. It is able to monitor the data sent to the connected devices. It plays an important role between the connected devices with the help of store technology, where it checks the data to be sent and decides which packet to send first.

It has the ability to fix the damaged packets when packets are sending, and also able to hold the direction of the rest of the packets and distribute them. If a port receives a weak signal, but still it is readable, then the active hub reconstructs the weak signal into a stronger signal before its sending to other ports. It can boost the signal if any connecting device is not working in the network. Therefore, it helps to make the continuity of services in LAN.

Intelligent Hub: It is a little smarter than passive and active hubs. These hubs have some kinds of management software that help to analyze the problem in the network and resolve them. It is beneficial to expend the business in networking; the management can assign users that help to work more quickly and share a common pool efficiently by using intelligent hubs. However, it offers better performance for the local area network. Furthermore, with any physical device, if any problem is detected, it is able to detect this problem easily.

The important applications of a hub are given below:

·        Hub is used to create small home networks.

·        It is used for network monitoring.

·        They are also used in organizations to provide connectivity.

·        It can be used to create a device that is available thought out of the network.

Advantages of Hub

1. It provides support for different types of Network Media.

2.  It can be used by anyone as it is very cheap.

3.  It can easily connect many different media types.

4.  The use of a hub does not impact on the network performance.

5.  Additionally, it can expand the total distance of the network.

Disadvantages of Hub

1. It has no ability to choose the best path of the network.

2.  It does not include mechanisms such as collision detection.

3.  It does not operate in full-duplex mode and cannot be divided into the Segment.

4.  It cannot reduce the network traffic as it has no mechanism.

5.  It is not able to filter the information as it transmits packets to all the connected segments.

6.  Furthermore, it is not capable of connecting various network architectures like a ring, token, and ethernet, and more.