wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Routers

profile
harsh geete
Aug 28, 2022
0 Likes
0 Discussions
116 Reads

 Router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a specific geographic area. A LAN usually requires a single router.

A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations and companies that operate in multiple locations across the country, for instance, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches 

Think of a router as an air traffic controller and data packets as aircraft headed to different airports (or networks). Just as each plane has a unique destination and follows a unique route, each packet needs to be guided to its destination as efficiently as possible. In the same way that an air traffic controller ensures that planes reach their destinations without getting lost or suffering a major disruption along the way, a router helps direct data packets to their destination IP address.

In order to direct packets effectively, a router uses an internal routing table  a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path. ireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes data by converting packets from binary code into radio signals, then wirelessly broadcasts them using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless local area networks), which connect multiple devices using wireless communication.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a modem. It then uses separate cables to connect to one or more devices within the network, create a LAN, and link the devices within that network to the Internet. Core router: Unlike the routers used within a home or small business LAN, a core router is used by large corporations and businesses that transmit a high volume of data packets within their network. Core routers operate at the "core" of a network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-scale network, an edge router communicates with both core routers and external networks. Edge routers live at the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same function as a standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to establish primary and backup virtual routers, should one fail.


Comments ()


Sign in

Read Next

Indian Culture and Tradition

Blog banner

Education?

Blog banner

Expressing and Measuring Risk (Risk Management)

Blog banner

Process State

Blog banner

GraphQL

Blog banner

My First Dream Bike

Blog banner

Direct memory access

Blog banner

Dangers of Using Public WiFis

Blog banner

Memory Management

Blog banner

Life lesson

Blog banner

Introduction my self

Blog banner

File Allocation Methods

Blog banner

I/O Management and Disk Scheduling

Blog banner

Embracing the power of Modern Machine UNIX

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

Threat management

Blog banner

Mumbai local ......

Blog banner

Developments in Modern Operating Systems

Blog banner

Ethical Hacking

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Rock, Paper, Scissors Game in Common Lisp

Blog banner

Threats To Computer System

Blog banner

Evolution of operating system

Blog banner

Virtual memory

Blog banner

GOOGLE

Blog banner

 " Healing of Yoga "

Blog banner

Skills An Ethical Hacker Must Have

Blog banner

ProofHub

Blog banner

RAID

Blog banner

Install Ubuntu Easily

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

What is HTML?

Blog banner

Not anti-social, but pro-solitude

Blog banner

All you need to know about Cassandra

Blog banner

Go Daddy

Blog banner

BIRYANI ! The history you never knew about

Blog banner

ahh wait a min

Blog banner

Direct memory access (DMA)

Blog banner

Mumbaicha Dabbawalla

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Busted : Common Web Security Myths

Blog banner