wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Routers

profile
harsh geete
Aug 28, 2022
0 Likes
0 Discussions
116 Reads

 Router is a device that connects two or more packet-switched networks or subnetworks. It serves two primary functions managing traffic between these networks by forwarding data packets to their intended IP addresses, and allowing multiple devices to use the same Internet connection.
There are several types of routers, but most routers pass data between LANs (local area networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to a specific geographic area. A LAN usually requires a single router.

A WAN, by contrast, is a large network spread out over a vast geographic area. Large organizations and companies that operate in multiple locations across the country, for instance, will need separate LANs for each location, which then connect to the other LANs to form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple routers and switches 

Think of a router as an air traffic controller and data packets as aircraft headed to different airports (or networks). Just as each plane has a unique destination and follows a unique route, each packet needs to be guided to its destination as efficiently as possible. In the same way that an air traffic controller ensures that planes reach their destinations without getting lost or suffering a major disruption along the way, a router helps direct data packets to their destination IP address.

In order to direct packets effectively, a router uses an internal routing table  a list of paths to various network destinations. The router reads a packet's header to determine where it is going, then consults the routing table to figure out the most efficient path to that destination. It then forwards the packet to the next network in the path. ireless router: A wireless router uses an Ethernet cable to connect to a modem. It distributes data by converting packets from binary code into radio signals, then wirelessly broadcasts them using antennae. Wireless routers do not establish LANs; instead, they create WLANs (wireless local area networks), which connect multiple devices using wireless communication.
Wired router: Like a wireless router, a wired router also uses an Ethernet cable to connect to a modem. It then uses separate cables to connect to one or more devices within the network, create a LAN, and link the devices within that network to the Internet. Core router: Unlike the routers used within a home or small business LAN, a core router is used by large corporations and businesses that transmit a high volume of data packets within their network. Core routers operate at the "core" of a network and do not communicate with external networks.
Edge router: While a core router exclusively manages data traffic within a large-scale network, an edge router communicates with both core routers and external networks. Edge routers live at the "edge" of a network and use the BGP (Border Gateway Protocol) to send and receive data from other LANs and WANs.
Virtual router: A virtual router is a software application that performs the same function as a standard hardware router. It may use the Virtual Router Redundancy Protocol (VRRP) to establish primary and backup virtual routers, should one fail.


Comments ()


Sign in

Read Next

HubSpot

Blog banner

Celebrate Diwali the Delicious Way with Meal Maharaj Catering

Blog banner

Different types of e-commerce platforms or advantages and disadvantages

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Fudgy Tahini Date Chocolate Bars

Blog banner

Deadlock

Blog banner

Kernel in Operating System

Blog banner

Banaras

Blog banner

All you need to know about Cassandra

Blog banner

Article on team management software

Blog banner

LIMITED EDITION

Blog banner

Big Data Architecture

Blog banner

Virtualization

Blog banner

Power of words

Blog banner

Memory Management

Blog banner

Man VS Nature

Blog banner

Random Forests

Blog banner

Zero Trust Security Model: Revolutionizing Cybersecurity in the Digital Age

Blog banner

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

STARVATION

Blog banner

MENDELEY

Blog banner

Data Visualization – Importance and tools (Tableau, Power BI)

Blog banner

BUFFER OVERFLOW_142

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Pro-Tips On How To Keep your Foot Healthy

Blog banner

Data Lake

Blog banner

Rain

Blog banner

Memory management and virtual memory

Blog banner

Decoding Confusion Matrix

Blog banner

Navigation With Indian Constellation(NavIC) by ISRO in Geographic Information Systems

Blog banner

Data Mining

Blog banner

Data Science in Healthcare: Predicting Diseases

Blog banner

Service Operation

Blog banner

What is Amazon?

Blog banner

Virtual Machine's

Blog banner

MPL and how its effects?

Blog banner

38_Exploring The Honeynet Project

Blog banner

Ransomware

Blog banner

TRELLO

Blog banner

Super Garlicky Tomato Soup with Smashed White Beans

Blog banner

Artical on FreshBooks

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner