Image Credit: M2 Optics
Network transceivers connect network nodes and send and receive analog or digital signals. In Ethernet networks, they are called medium access units (MAU).
How Network Transceivers Work
Network transceivers apply signals onto a network wire and detect signals passing through the same wire. In local area networks (LAN), they may be used with networking repeaters, devices that regenerate or retime signals to ensure that these signals are transmitted through all network segments.
This diagram describes the role of transmitter-receivers in a Thick Ethernet network. Attachment unit interface (AUI) connections provide a path between each node's Ethernet interface and the MAU.
Image Credit: Telebyte
Types of Network Transceivers
There are three basic types of network receivers: chip, board, and module.
- Chip-style network transceivers are small in size and relatively easy to remove. They are sometimes classified as internal transmitter-receivers.
- Board-style devices are network interface cards (NIC) that plug-into a computer motherboard. They are more difficult to remove than chip-style devices, but also still classified as internal transmitter-receivers.
- Modular products are stand-alone devices. They are external network transmitter-receivers.
Product and Performance Specifications
The GlobalSpec SpecSearch database provides detailed information about network transceivers that use various network protocols (e.g., Ethernet, Token Ring). Industrial buyers should remember to specify the number of ports or channels through which the transceiver will connect to other devices. Additional product and performance specifications cover associated peripherals and the type of connection ports.
Features and Applications
Network transceivers that use industrial protocols such as CANbus are used both in automotive and general industrial applications. Features for network transmitter-receivers include low-power management and fault protection.
Related Products & Services
Network firewalls protect computer networks against unauthorized use or attack. They permit or deny access to private network devices and applications, and represent an important part of an organization's overall security policy. Firewalls may be software applications, hardware devices (such as routers), or a combination of both. They include turnkey products that are relatively easy to install as well as complex, multi-layer installations that require the expertise of a certified network administrator.
Network gateways interconnect networks with different, incompatible communication protocols. They perform a Layer-7 protocol-conversion to translate one set of protocols into another (for example, from TCP/IP to SNA or from TCP/IP to X.25).
Network hubs provide a central location for attaching wires to workstations. Often, these hardware devices include a network switch that controls how and where data is forwarded.
Network Repeaters and Extenders
Networking repeaters regenerate incoming electrical, wireless, or optical signals to preserve signal integrity and extend the distance over which data can travel. They are often used to connect cable segments in IEEE 802.3 networks.
Network routers are protocol-dependent devices that connect subnetworks, or that break down a large network into smaller subnetworks.
Network switches connect network devices to host computers and allow a large number of devices to share a limited number of ports. They increase network capacity and speed by examining and filtering data packets. Switches also regenerate forwarded packets, reducing collision rates and permitting the use of additional nodes.
VoIP and IP Telephony
VoIP and IP telephony allows PC users to make phone calls over the Internet or other packet networks via gateways and standard telephones.