wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Routers

profile
harsh geete
Aug 28, 2022
0 Likes
0 Discussions
116 Reads

 Router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a specific geographic area. A LAN usually requires a single router.

A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations and companies that operate in multiple locations across the country, for instance, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches 

Think of a router as an air traffic controller and data packets as aircraft headed to different airports (or networks). Just as each plane has a unique destination and follows a unique route, each packet needs to be guided to its destination as efficiently as possible. In the same way that an air traffic controller ensures that planes reach their destinations without getting lost or suffering a major disruption along the way, a router helps direct data packets to their destination IP address.

In order to direct packets effectively, a router uses an internal routing table  a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path. ireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes data by converting packets from binary code into radio signals, then wirelessly broadcasts them using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless local area networks), which connect multiple devices using wireless communication.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a modem. It then uses separate cables to connect to one or more devices within the network, create a LAN, and link the devices within that network to the Internet. Core router: Unlike the routers used within a home or small business LAN, a core router is used by large corporations and businesses that transmit a high volume of data packets within their network. Core routers operate at the "core" of a network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-scale network, an edge router communicates with both core routers and external networks. Edge routers live at the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same function as a standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to establish primary and backup virtual routers, should one fail.


Comments ()


Sign in

Read Next

Ransomware

Blog banner

PODIO

Blog banner

Hacking

Blog banner

Virtual Machine

Blog banner

IOT Hacking Techniques

Blog banner

Uniprocessor scheduling

Blog banner

SMARTSHEET MANAGEMENT SOFTWARE

Blog banner

How to Conquer Depression ?

Blog banner

The Laws of Karma

Blog banner

virtual machine

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

How covid-19 impacted Social media ad spend forecast globally

Blog banner

Top Career Paths After a B.Com Degree in Mumbai: What’s Next for You?

Blog banner

VIRUS

Blog banner

Art and Culture of Rajasthan

Blog banner

Zomato's Secret Digital Marketing Techniques!

Blog banner

Memory Management in Operating System

Blog banner

DATA SCIENCE IN BUSINESS AND MARKETING

Blog banner

Why Meal Maharaj Prioritises Seasonal Vegetables in Every Meal Box

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

File Management In OS

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

The Dark Web: A Breeding Ground for Cybercriminals – How to Guard Against Threats

Blog banner

Jira service Management

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Android Flashlight Application

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

What are Virtual Machines

Blog banner

Embedded Operating System

Blog banner

Is Social Media Marketing The Next Wave Of Digital Marketing?

Blog banner

Service design process in ITSM

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Cache memory

Blog banner

Virtual memory in os

Blog banner

Esri India launches Policy Maps.

Blog banner

Dal Bafla Recipe

Blog banner

Raid

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

I/O Management and Disk Scheduling

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

Secure Hypertext transfer protocol

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner