wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Routers

profile
harsh geete
Aug 28, 2022
0 Likes
0 Discussions
116 Reads

 Router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a specific geographic area. A LAN usually requires a single router.

A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations and companies that operate in multiple locations across the country, for instance, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches 

Think of a router as an air traffic controller and data packets as aircraft headed to different airports (or networks). Just as each plane has a unique destination and follows a unique route, each packet needs to be guided to its destination as efficiently as possible. In the same way that an air traffic controller ensures that planes reach their destinations without getting lost or suffering a major disruption along the way, a router helps direct data packets to their destination IP address.

In order to direct packets effectively, a router uses an internal routing table  a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path. ireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes data by converting packets from binary code into radio signals, then wirelessly broadcasts them using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless local area networks), which connect multiple devices using wireless communication.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a modem. It then uses separate cables to connect to one or more devices within the network, create a LAN, and link the devices within that network to the Internet. Core router: Unlike the routers used within a home or small business LAN, a core router is used by large corporations and businesses that transmit a high volume of data packets within their network. Core routers operate at the "core" of a network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-scale network, an edge router communicates with both core routers and external networks. Edge routers live at the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same function as a standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to establish primary and backup virtual routers, should one fail.


Comments ()


Sign in

Read Next

virtual machine

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

Ethical Hacking

Blog banner

Hey Aryan here

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

How to Build an Effective Digital Campaign

Blog banner

Cache memory

Blog banner

GIS REMOTE SENSING

Blog banner

THE ACTORS LIFE

Blog banner

OS Assignment-3

Blog banner

Best password managers: Reviews of the top products

Blog banner

Dr. Venkadavarahan

Blog banner

THE DESIRE OF MANY

Blog banner

Types of threads

Blog banner

Short note on expert system

Blog banner

Supervised and unsupervised learning

Blog banner

Building a Better You: Fitness Tips and Inspiration.

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Traveling

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

I/O buffer and its techniques

Blog banner

Article on different management system

Blog banner

Data Mining

Blog banner

Fault Tolerance in an Operating System

Blog banner

10 Reasons why Monica and Chandler are the best couple ever.!!!

Blog banner

Worms, viruses and Bots

Blog banner

Cyber Security in Data Breaching

Blog banner

Uniprocessor Scheduling

Blog banner

OS Assignment 3

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

LINUX

Blog banner

Why home remedies don’t work for Hangover?

Blog banner

Different types of scam Fraud

Blog banner

'Positivity in life'

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

PHONE TECHNOLOGY

Blog banner

Rain

Blog banner

Answer

Blog banner

Cache Memory in Operating Systems

Blog banner

Women Empowerment

Blog banner