wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Routers

profile
harsh geete
Aug 28, 2022
0 Likes
0 Discussions
116 Reads

 Router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a specific geographic area. A LAN usually requires a single router.

A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations and companies that operate in multiple locations across the country, for instance, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches 

Think of a router as an air traffic controller and data packets as aircraft headed to different airports (or networks). Just as each plane has a unique destination and follows a unique route, each packet needs to be guided to its destination as efficiently as possible. In the same way that an air traffic controller ensures that planes reach their destinations without getting lost or suffering a major disruption along the way, a router helps direct data packets to their destination IP address.

In order to direct packets effectively, a router uses an internal routing table  a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path. ireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes data by converting packets from binary code into radio signals, then wirelessly broadcasts them using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless local area networks), which connect multiple devices using wireless communication.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a modem. It then uses separate cables to connect to one or more devices within the network, create a LAN, and link the devices within that network to the Internet. Core router: Unlike the routers used within a home or small business LAN, a core router is used by large corporations and businesses that transmit a high volume of data packets within their network. Core routers operate at the "core" of a network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-scale network, an edge router communicates with both core routers and external networks. Edge routers live at the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same function as a standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to establish primary and backup virtual routers, should one fail.


Comments ()


Sign in

Read Next

memory cache

Blog banner

CRISP-DM Methodology

Blog banner

India Digital Personal Data Protection Act, 2023

Blog banner

10 Unknown facts about India's Independence

Blog banner

DMZ: Your Secret Weapon for Data Security

Blog banner

Animal’s have my heart

Blog banner

GraphX:- A graph processing tool

Blog banner

Blog on Smartsheet.

Blog banner

Deadlock and Starvation

Blog banner

Modern Operating Systems

Blog banner

Elements and Principles of Photography

Blog banner

Operating system

Blog banner

Multiple processor scheduling

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

Cyber Forensics in a Ransomware Attack Recovery

Blog banner

geographic information system (GIS)

Blog banner

Os(Computer security threats)

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Topic: Sessions in Operating system

Blog banner

The Evolution of Operating Systems

Blog banner

Pooja Silver

Blog banner

Operating System Objectives and Functions

Blog banner

Modern operating system

Blog banner

How To Invest in Indian Stock Market For Beginners. ~ Tutorial 2 (NSDL And CSDL) Continued...

Blog banner

Memory management

Blog banner

Yahoo! mail

Blog banner

WAKE UP ITS FOOD o'CLOCK...!!!!!

Blog banner

Understanding the 4 Types of Learning Methods in Early Childhood

Blog banner

Deadlock and Starvation

Blog banner

Advanced Persistent Threats (APTs)

Blog banner

Man VS Nature

Blog banner

Operating system and overviews

Blog banner

virtual machines and virtualization

Blog banner

Deadlock and Starvation

Blog banner

Security issues

Blog banner

Memory Management

Blog banner

Threads

Blog banner

Modern Operating System

Blog banner

Deadlock

Blog banner

Why Oak Tree Hotel Is Arcadia’s Hidden Gem?

Blog banner

Importance of Website

Blog banner