SlideShare a Scribd company logo
1 of 8
Download to read offline
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 1/8
A Cisco ASM/2-32EM router
deployed at CERN in 1987
Router (computing)
A router[a] is a networking device that forwards data packets between
computer networks. Routers perform the traffic directing functions on
the Internet. Data sent through the internet, such as a web page or
email, is in the form of data packets. A packet is typically forwarded
from one router to another router through the networks that constitute
an internetwork (e.g. the Internet) until it reaches its destination node.[2]
A router is connected to two or more data lines from different IP
networks.[b] When a data packet comes in on one of the lines, the router
reads the network address information in the packet header to determine
the ultimate destination. Then, using information in its routing table or
routing policy, it directs the packet to the next network on its journey.
The most familiar type of IP routers are home and small office routers
that simply forward IP packets between the home computers and the
Internet. More sophisticated routers, such as enterprise routers, connect
large business or ISP networks up to the powerful core routers that forward data at high speed along the optical
fiber lines of the Internet backbone.
Operation
Applications
Access, core and distribution
Security
Routing different networks
Internet connectivity and internal use
History
Forwarding
See also
Notes
References
External links
When multiple routers are used in interconnected networks, the routers can exchange information about
destination addresses using a routing protocol. Each router builds up a routing table listing the preferred routes
between any two computer systems on the interconnected networks.[3]
A router has two types of network element components organized onto separate processing planes:[4]
Contents
Operation
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 2/8
A typical home or small office DSL
router showing the telephone socket
(left, white) to connect it to the
internet using ADSL, and Ethernet
jacks (right, yellow) to connect it to
home computers and printers.
A screenshot of the LuCI web
interface used by OpenWrt. This
page configures Dynamic DNS.
Control plane: A router maintains a routing table that lists which route should be used to forward a
data packet, and through which physical interface connection. It does this using internal pre-
configured directives, called static routes, or by learning routes dynamically using a routing
protocol. Static and dynamic routes are stored in the routing table. The control-plane logic then
strips non-essential directives from the table and builds a forwarding information base (FIB) to be
used by the forwarding plane.
Forwarding plane: The router forwards data packets between incoming and outgoing interface
connections. It forwards them to the correct network type using information that the packet
header contains matched to entries in the FIB supplied by the control plane.
A router may have interfaces for different types of physical layer
connections, such as copper cables, fiber optic, or wireless
transmission. It can also support different network layer transmission
standards. Each network interface is used to enable data packets to be
forwarded from one transmission system to another. Routers may also
be used to connect two or more logical groups of computer devices
known as subnets, each with a different network prefix.
Routers may provide connectivity within enterprises, between
enterprises and the Internet, or between internet service providers'
(ISPs') networks. The largest routers (such as the Cisco CRS-1 or
Juniper PTX) interconnect the various ISPs, or may be used in large
enterprise networks.[5] Smaller routers usually provide connectivity for
typical home and office networks.
All sizes of routers may be found inside enterprises.[6] The most
powerful routers are usually found in ISPs, academic and research facilities. Large businesses may also need
more powerful routers to cope with ever-increasing demands of intranet data traffic. A hierarchical
internetworking model for interconnecting routers in large networks is in common use.[7]
Access routers, including small office/home office (SOHO) models, are
located at home and customer sites such as branch offices that do not
need hierarchical routing of their own. Typically, they are optimized for
low cost. Some SOHO routers are capable of running alternative free
Linux-based firmware like Tomato, OpenWrt or DD-WRT.[8]
Distribution routers aggregate traffic from multiple access routers.
Distribution routers are often responsible for enforcing quality of
service across a wide area network (WAN), so they may have
considerable memory installed, multiple WAN interface connections,
and substantial onboard data processing routines. They may also
provide connectivity to groups of file servers or other external
networks.
In enterprises, a core router may provide a collapsed backbone interconnecting the distribution tier routers from
multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth, but
lack some of the features of edge routers.[9]
Applications
Access, core and distribution
Security
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 3/8
External networks must be carefully considered as part of the overall security strategy of the local network. A
router may include a firewall, VPN handling, and other security functions, or these may be handled by separate
devices. Routers also commonly perform network address translation which restricts connections initiated from
external connections but is not recognized as a security feature by all experts.[10] Some experts argue that open
source routers are more secure and reliable than closed source routers because open-source routers allow
mistakes to be quickly found and corrected.[11]
Routers are also often distinguished on the basis of the network in which they operate. A router in a local area
network (LAN) of a single organisation is called an interior router. A router that is operated in the Internet
backbone is described as exterior router. While a router that connects a LAN with the Internet or a wide area
network (WAN) is called a border router, or gateway router.[12]
Routers intended for ISP and major enterprise connectivity usually exchange routing information using the
Border Gateway Protocol (BGP). RFC  4098 (https://tools.ietf.org/html/rfc4098) defines the types of BGP
routers according to their functions:[13]
Edge router (also called a provider edge router): Placed at the edge of an ISP network. The
router uses Exterior Border Gateway Protocol (EBGP) to routers at other ISPs or large enterprise
autonomous systems.
Subscriber edge router (also called a customer edge router): Located at the edge of the
subscriber's network, it also uses EBGP to its provider's autonomous system. It is typically used
in an (enterprise) organization.
Inter-provider border router: A BGP router for interconnecting ISPs that maintains BGP sessions
with other BGP routers in ISP Autonomous Systems.
Core router: Resides within an Autonomous System as a back bone to carry traffic between edge
routers.[14]
Within an ISP: In the ISP's autonomous system, a router uses internal BGP to communicate with
other ISP edge routers, other intranet core routers, or the ISP's intranet provider border routers.
Internet backbone: The Internet no longer has a clearly identifiable backbone, unlike its
predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make up
what could be considered to be the current Internet backbone core.[15] ISPs operate all four types
of the BGP routers described here. An ISP core router is used to interconnect its edge and border
routers. Core routers may also have specialized functions in virtual private networks based on a
combination of BGP and Multi-Protocol Label Switching protocols.[16]
Port forwarding: Routers are also used for port forwarding between private Internet-connected
servers.[6]
Voice, data, fax, and video processing routers: Commonly referred to as access servers or
gateways, these devices are used to route and process voice, data, video and fax traffic on the
Internet. Since 2005, most long-distance phone calls have been processed as IP traffic (VOIP)
through a voice gateway. Use of access server type routers expanded with the advent of the
Internet, first with dial-up access and another resurgence with voice phone service.
Larger networks commonly use multilayer switches, with layer-3 devices being used to simply
interconnect multiple subnets within the same security zone, and higher-layer switches when
filtering, translation, load balancing or other higher-level functions are required, especially
between zones.
Routing different networks
Internet connectivity and internal use
History
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 4/8
The first ARPANET router,
the Interface Message
Processor was delivered to
UCLA August 30, 1969, and
went online October 29, 1969
The concept of an Interface computer was first proposed by Donald Davies
for the NPL network in 1966.[17] The same idea was conceived by Wesley
Clark the following year for use in the ARPANET. Named Interface Message
Processors (IMPs), these computers had fundamentally the same functionality
as a router does today. The idea for a router (called gateways at the time)
initially came about through an international group of computer networking
researchers called the International Networking Working Group (INWG). Set
up in 1972 as an informal group to consider the technical issues involved in
connecting different networks, it became a subcommittee of the International
Federation for Information Processing later that year.[18] These gateway
devices were different from most previous packet switching schemes in two
ways. First, they connected dissimilar kinds of networks, such as serial lines
and local area networks. Second, they were connectionless devices, which had
no role in assuring that traffic was delivered reliably, leaving that entirely to
the hosts. This particular idea, the end-to-end principle, had been previously
pioneered in the CYCLADES network.
The idea was explored in more detail, with the intention to produce a
prototype system as part of two contemporaneous programs. One was the
initial DARPA-initiated program, which created the TCP/IP architecture in
use today.[19] The other was a program at Xerox PARC to explore new
networking technologies, which produced the PARC Universal Packet system;
due to corporate intellectual property concerns it received little attention
outside Xerox for years.[20] Some time after early 1974, the first Xerox
routers became operational. The first true IP router was developed by Ginny
Strazisar at BBN, as part of that DARPA-initiated effort, during 1975–
1976.[21] By the end of 1976, three PDP-11-based routers were in service in
the experimental prototype Internet.[22]
The first multiprotocol routers were independently created by staff researchers at MIT and Stanford in 1981;
the Stanford router was done by William Yeager, and the MIT one by Noel Chiappa; both were also based on
PDP-11s.[23][24][25][26] Virtually all networking now uses TCP/IP, but multiprotocol routers are still
manufactured. They were important in the early stages of the growth of computer networking when protocols
other than TCP/IP were in use. Modern Internet routers that handle both IPv4 and IPv6 are multiprotocol but
are simpler devices than routers processing AppleTalk, DECnet, IP and Xerox protocols.
From the mid-1970s and in the 1980s, general-purpose minicomputers served as routers. Modern high-speed
routers are network processors or highly specialized computers with extra hardware acceleration added to speed
both common routing functions, such as packet forwarding, and specialized functions such as IPsec encryption.
There is substantial use of Linux and Unix software-based machines, running open source routing code, for
research and other applications. The Cisco IOS operating system was independently designed. Major router
operating systems, such as Junos and NX-OS, are extensively modified versions of Unix software.
The main purpose of a router is to connect multiple networks and forward packets destined either for directly-
attached networks or more remote networks. A router is considered a layer-3 device because its primary
forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address.
When a router receives a packet, it searches its routing table to find the best match between the destination IP
address of the packet and one of the addresses in the routing table. Once a match is found, the packet is
encapsulated in the layer-2 data link frame for the outgoing interface indicated in the table entry. A router
typically does not look into the packet payload, but only at the layer-3 addresses to make a forwarding decision,
Forwarding
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 5/8
plus optionally other information in the header for hints on, for example, quality of service (QoS). For pure IP
forwarding, a router is designed to minimize the state information associated with individual packets.[27] Once
a packet is forwarded, the router does not retain any historical information about the packet.[c]
The routing table itself can contain information derived from a variety of sources, such as a default or static
routes that are configured manually, or dynamic entries from routing protocols where the router learns routes
from other routers. A default route is one that is used to route all traffic whose destination does not otherwise
appear in the routing table; this is common – even necessary – in small networks, such as a home or small
business where the default route simply sends all non-local traffic to the Internet service provider. The default
route can be manually configured (as a static route), or learned by dynamic routing protocols, or be obtained by
DHCP.[d][28]
A router can run more than one routing protocol at a time, particularly if it serves as an autonomous system
border router between parts of a network that run different routing protocols; if it does so, then redistribution
may be used (usually selectively) to share information between the different protocols running on the same
router.[29]
Besides making a decision as to which interface a packet is forwarded to, which is handled primarily via the
routing table, a router also has to manage congestion when packets arrive at a rate higher than the router can
process. Three policies commonly used in the Internet are tail drop, random early detection (RED), and
weighted random early detection (WRED). Tail drop is the simplest and most easily implemented; the router
simply drops new incoming packets once the length of the queue exceeds the size of the buffers in the router.
RED probabilistically drops datagrams early when the queue exceeds a pre-configured portion of the buffer,
until a pre-determined max, when it becomes tail drop. WRED requires a weight on the average queue size to
act upon when the traffic is about to exceed the pre-configured size so that short bursts will not trigger random
drops.
Another function a router performs is to decide which packet should be processed first when multiple queues
exist. This is managed through QoS, which is critical when Voice over IP is deployed, so as not to introduce
excessive latency.
Yet another function a router performs is called policy-based routing where special rules are constructed to
override the rules derived from the routing table when a packet forwarding decision is made.[30]
Router functions may be performed through the same internal paths that the packets travel inside the router.
Some of the functions may be performed through an application-specific integrated circuit (ASIC) to avoid
overhead of scheduling CPU time to process the packets. Others may have to be performed through the CPU as
these packets need special attention that cannot be handled by an ASIC.
DECbit
Mobile broadband modem
Modem
Residential gateway
Switch virtual interface
TCAM Content addressable memory (hardware acceleration of route-search)
Wireless router
a. Pronounced /ˈruːtər/ in British English, but /ˈraʊtər/ in American and Australian English.[1]
b. As opposed to a network switch, which connects data lines from one single network
See also
Notes
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 6/8
c. In some router implementations, the forwarding action can increment a counter associated with
the routing table entry for the collection of statistical data.
d. A router can serve as a DHCP client or as a DHCP server.
1. "router" (http://oed.com/search?searchType=dictionary&q=router). Oxford English Dictionary (3rd
ed.). Oxford University Press. September 2005. (Subscription or UK public library membership (https://
www.oed.com/public/login/loggingin#withyourlibrary) required.)
2. "Overview Of Key Routing Protocol Concepts: Architectures, Protocol Types, Algorithms and
Metrics" (http://www.tcpipguide.com/free/t_OverviewOfKeyRoutingProtocolConceptsArchitectures
P.htm). Tcpipguide.com. Archived (https://web.archive.org/web/20101220111345/http://tcpipguide.
com/free/t_OverviewOfKeyRoutingProtocolConceptsArchitecturesP.htm) from the original on 20
December 2010. Retrieved 15 January 2011.
3. "Cisco Networking Academy's Introduction to Routing Dynamically" (http://www.ciscopress.com/ar
ticles/article.asp?p=2180210&seqNum=4). Cisco. Archived (https://web.archive.org/web/2015102
7133937/http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=4) from the original
on October 27, 2015. Retrieved August 1, 2015.
4. H. Khosravi & T. Anderson (November 2003). Requirements for Separation of IP Control and
Forwarding (https://tools.ietf.org/html/rfc3654). doi:10.17487/RFC3654 (https://doi.org/10.17487%
2FRFC3654). RFC 3654 (https://tools.ietf.org/html/rfc3654).
5. "Setting uo Netflow on Cisco Routers" (http://my-technet.com/index.php/cisco/setting-up-netflow-
on-cisco-routers/). MY-Technet.com date unknown. Archived (https://web.archive.org/web/201107
14141500/http://my-technet.com/index.php/cisco/setting-up-netflow-on-cisco-routers/) from the
original on 14 July 2011. Retrieved 15 January 2011.
6. "Windows Home Server: Router Setup" (http://social.technet.microsoft.com/wiki/contents/articles/
windows-home-server-router-setup.aspx). Microsoft Technet 14 Aug 2010. Archived (https://web.
archive.org/web/20101222175405/http://social.technet.microsoft.com/wiki/contents/articles/windo
ws-home-server-router-setup.aspx) from the original on 22 December 2010. Retrieved
15 January 2011.
7. Oppenheimer, Pr (2004). Top-Down Network Design. Indianapolis: Cisco Press. ISBN 978-1-
58705-152-4.
8. "Windows Small Business Server 2008: Router Setup" (http://social.technet.microsoft.com/wiki/co
ntents/articles/windows-small-business-server-2008-router-setup.aspx). Microsoft Technet Nov
2010. Archived (https://web.archive.org/web/20101230185508/http://social.technet.microsoft.com/
wiki/contents/articles/windows-small-business-server-2008-router-setup.aspx) from the original on
30 December 2010. Retrieved 15 January 2011.
9. "Core Network Planning" (https://technet.microsoft.com/en-us/library/dd894458%28WS.10%29.a
spx). Microsoft Technet May 28, 2009. Archived (https://web.archive.org/web/20101002044633/ht
tp://technet.microsoft.com/en-us/library/dd894458(WS.10).aspx) from the original on 2 October
2010. Retrieved 15 January 2011.
10. "Security Considerations Of NAT" (https://web.archive.org/web/20141018184244/http://www.safec
omputing.umich.edu/protect-personal/download/nat_security.pdf) (PDF). University of Michigan.
Archived from the original (http://www.safecomputing.umich.edu/protect-personal/download/nat_s
ecurity.pdf) (PDF) on October 18, 2014.
11. "Global Internet Experts Reveal Plan for More Secure, Reliable Wi-Fi Routers - and Internet" (htt
p://www.businesswire.com/news/home/20151014005564/en). Archived (https://web.archive.org/w
eb/20151020003515/http://www.businesswire.com/news/home/20151014005564/en) from the
original on 2015-10-20.
12. Tamara Dean (2009). Network+ Guide to Networks. Cengage Learning. p. 272.
ISBN 9781423902454.
13. H. Berkowitz; et al. (June 2005). Terminology for Benchmarking BGP Device Convergence in the
Control Plane (https://tools.ietf.org/html/rfc4098). doi:10.17487/RFC4098 (https://doi.org/10.1748
7%2FRFC4098). RFC 4098 (https://tools.ietf.org/html/rfc4098).
References
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 7/8
14. "M160 Internet Backbone Router" (http://www.juniper.net/techpubs/qrc/m160-qrc.pdf) (PDF).
Juniper Networks. Archived (https://web.archive.org/web/20110920213215/http://www.juniper.net/
techpubs/qrc/m160-qrc.pdf) (PDF) from the original on 20 September 2011. Retrieved 15 January
2011.
15. "Virtual Backbone Routers" (http://www.telecomsportal.com/Assets_papers/Routers_&_Netman/Ir
onbridge_Virt_Bbone_Route.pdf) (PDF). IronBridge Networks, Inc. September, 2000. Archived (ht
tps://web.archive.org/web/20110716203325/http://www.telecomsportal.com/Assets_papers/Route
rs_%26_Netman/Ironbridge_Virt_Bbone_Route.pdf) (PDF) from the original on 16 July 2011.
Retrieved 15 January 2011.
16. E. Rosen; Y. Rekhter (April 2004). BGP/MPLS VPNs.
17. Roberts, Dr. Lawrence G. (May 1995). "The ARPANET & Computer Networks" (http://www.packe
t.cc/files/arpanet-computernet.html). Archived (https://web.archive.org/web/20160324032800/htt
p://www.packet.cc/files/arpanet-computernet.html) from the original on 24 March 2016. Retrieved
13 April 2016. "Then in June 1966, Davies wrote a second internal paper, "Proposal for a Digital
Communication Network" In which he coined the word packet,- a small sub part of the message
the user wants to send, and also introduced the concept of an "Interface computer" to sit between
the user equipment and the packet network."
18. Davies, Shanks, Heart, Barker, Despres, Detwiler and Riml, "Report of Subgroup 1 on
Communication System", INWG Note No. 1.
19. Vinton Cerf, Robert Kahn, "A Protocol for Packet Network Intercommunication" (http://ieeexplore.i
eee.org/iel5/8159/23818/01092259.pdf), IEEE Transactions on Communications, Volume 22,
Issue 5, May 1974, pp. 637 - 648.
20. David Boggs, John Shoch, Edward Taft, Robert Metcalfe, "Pup: An Internetwork Architecture" (htt
p://ieeexplore.ieee.org/iel5/8159/23925/01094684.pdf) Archived (https://web.archive.org/web/200
80911135408/http://ieeexplore.ieee.org/iel5/8159/23925/01094684.pdf) 2008-09-11 at the
Wayback Machine, IEEE Transactions on Communications, Volume 28, Issue 4, April 1980, pp.
612- 624.
21. "Ms. Ginny Strazisar" (http://www.ithistory.org/honor-roll/ms-ginny-strazisar). IT History Society.
Archived (https://web.archive.org/web/20171201034131/http://www.ithistory.org/honor-roll/ms-gin
ny-strazisar) from the original on 1 December 2017. Retrieved 21 November 2017.
22. Craig Partridge, S. Blumenthal, "Data networking at BBN" (http://ieeexplore.ieee.org/iel5/85/3368
7/01603444.pdf); IEEE Annals of the History of Computing, Volume 28, Issue 1; January–March
2006.
23. Valley of the Nerds: Who Really Invented the Multiprotocol Router, and Why Should We Care? (ht
tps://www.pbs.org/cringely/pulpit/1998/pulpit_19981210_000593.html) Archived (https://web.archi
ve.org/web/20160303172753/http://www.pbs.org/cringely/pulpit/1998/pulpit_19981210_000593.ht
ml) 2016-03-03 at the Wayback Machine, Public Broadcasting Service, Accessed August 11,
2007.
24. Router Man (http://www.networkworld.com/supp/2006/anniversary/032706-routerman.html?t5)
Archived (https://web.archive.org/web/20130605195255/http://www.networkworld.com/supp/2006/
anniversary/032706-routerman.html?t5) 2013-06-05 at the Wayback Machine, NetworkWorld,
Accessed June 22, 2007.
25. David D. Clark, "M.I.T. Campus Network Implementation", CCNG-2, Campus Computer Network
Group, M.I.T., Cambridge, 1982; pp. 26.
26. Pete Carey, "A Start-Up's True Tale: Often-told story of Cisco's launch leaves out the drama,
intrigue", San Jose Mercury News, December 1, 2001.
27. Roberts, Lawrence (22 July 2003). "The Next Generation of IP - Flow Routing" (http://www.packe
t.cc/files/FlowPaper/NextGenerationofIP-FlowRouting.htm). Archived (https://web.archive.org/we
b/20150404030549/http://www.packet.cc/files/FlowPaper/NextGenerationofIP-FlowRouting.htm)
from the original on 4 April 2015. Retrieved 22 February 2015.
16/09/2020 Router (computing) - Wikipedia
https://en.wikipedia.org/wiki/Router_(computing) 8/8
Retrieved from "https://en.wikipedia.org/w/index.php?title=Router_(computing)&oldid=978125071"
This page was last edited on 13 September 2020, at 02:00 (UTC).
Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this
site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia
Foundation, Inc., a non-profit organization.
28. David Davis (April 19, 2007). "Cisco administration 101: What you need to know about default
routes" (https://www.techrepublic.com/article/cisco-administration-101-what-you-need-to-know-ab
out-default-routes). Archived (https://web.archive.org/web/20131617133200/http://www.techrepub
lic.com/article/cisco-administration-101-what-you-need-to-know-about-default-routes/) from the
original on December 19, 2017.
29. Diane Teare (March 2013). Implementing Cisco IP Routing (ROUTE): Foundation Learning
Guide. Cisco Press. pp. 330–334.
30. Diane Teare (March 2013). "Chapter 5: Implementing Path Control". Implementing Cisco IP
Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334.
External links

More Related Content

What's hot

Network switch : Notes
Network switch : NotesNetwork switch : Notes
Network switch : NotesSubhajit Sahu
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)Siddique Ibrahim
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Khondoker Sadia
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)howare
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf Vignesh kumar
 
Basic network
Basic networkBasic network
Basic networkAshok R
 
Network Basics
Network BasicsNetwork Basics
Network Basicstmavroidis
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPTJw Media
 
A Report on Routers
A Report on RoutersA Report on Routers
A Report on RoutersNilesh Patel
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologiesevelyn
 

What's hot (20)

Network switch : Notes
Network switch : NotesNetwork switch : Notes
Network switch : Notes
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Advance hardware devices
Advance hardware devicesAdvance hardware devices
Advance hardware devices
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
Networking devices(siddique)
Networking devices(siddique)Networking devices(siddique)
Networking devices(siddique)
 
Network Adapter
Network AdapterNetwork Adapter
Network Adapter
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317Class work 1 computer networks-cse-317
Class work 1 computer networks-cse-317
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Neetika (ppt)
Neetika (ppt)Neetika (ppt)
Neetika (ppt)
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Router Full Concept pdf
Router Full Concept pdf Router Full Concept pdf
Router Full Concept pdf
 
Network devices
Network devicesNetwork devices
Network devices
 
Basic network
Basic networkBasic network
Basic network
 
Network Basics
Network BasicsNetwork Basics
Network Basics
 
compo 131_banalnal
compo 131_banalnalcompo 131_banalnal
compo 131_banalnal
 
ROUTER PPT
ROUTER PPTROUTER PPT
ROUTER PPT
 
A Report on Routers
A Report on RoutersA Report on Routers
A Report on Routers
 
important network terminologies
important network terminologiesimportant network terminologies
important network terminologies
 

Similar to Router (computing) : Notes

What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesDigitalThinkerHelp
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-Icsk selva
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan Singh
 
Computer network
Computer networkComputer network
Computer networkMd Saylab
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptxSankalpThaware
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSamiteshg
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesVamsi Krishna Kalavala
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Routers.ppt
Routers.pptRouters.ppt
Routers.pptkirbadh
 

Similar to Router (computing) : Notes (20)

Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Presentation on router
Presentation on routerPresentation on router
Presentation on router
 
What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with Examples
 
Final isp
Final ispFinal isp
Final isp
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network architecture - part-I
Network architecture - part-INetwork architecture - part-I
Network architecture - part-I
 
Basic Networking
Basic NetworkingBasic Networking
Basic Networking
 
Chandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......routerChandan singh seminar report pdf.......router
Chandan singh seminar report pdf.......router
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
Computer network
Computer networkComputer network
Computer network
 
Various Network Devices.pptx
Various Network Devices.pptxVarious Network Devices.pptx
Various Network Devices.pptx
 
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLSBASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
BASIC OF ROUTERS,ROUTER IOS AND ROUTING PROTOCOLS
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 
Computer network
Computer networkComputer network
Computer network
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Routers.ppt
Routers.pptRouters.ppt
Routers.ppt
 

More from Subhajit Sahu

DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTES
DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTESDyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTES
DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTESSubhajit Sahu
 
Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Subhajit Sahu
 
A Dynamic Algorithm for Local Community Detection in Graphs : NOTES
A Dynamic Algorithm for Local Community Detection in Graphs : NOTESA Dynamic Algorithm for Local Community Detection in Graphs : NOTES
A Dynamic Algorithm for Local Community Detection in Graphs : NOTESSubhajit Sahu
 
Scalable Static and Dynamic Community Detection Using Grappolo : NOTES
Scalable Static and Dynamic Community Detection Using Grappolo : NOTESScalable Static and Dynamic Community Detection Using Grappolo : NOTES
Scalable Static and Dynamic Community Detection Using Grappolo : NOTESSubhajit Sahu
 
Application Areas of Community Detection: A Review : NOTES
Application Areas of Community Detection: A Review : NOTESApplication Areas of Community Detection: A Review : NOTES
Application Areas of Community Detection: A Review : NOTESSubhajit Sahu
 
Community Detection on the GPU : NOTES
Community Detection on the GPU : NOTESCommunity Detection on the GPU : NOTES
Community Detection on the GPU : NOTESSubhajit Sahu
 
Survey for extra-child-process package : NOTES
Survey for extra-child-process package : NOTESSurvey for extra-child-process package : NOTES
Survey for extra-child-process package : NOTESSubhajit Sahu
 
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTER
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTERDynamic Batch Parallel Algorithms for Updating PageRank : POSTER
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTERSubhajit Sahu
 
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...Subhajit Sahu
 
Fast Incremental Community Detection on Dynamic Graphs : NOTES
Fast Incremental Community Detection on Dynamic Graphs : NOTESFast Incremental Community Detection on Dynamic Graphs : NOTES
Fast Incremental Community Detection on Dynamic Graphs : NOTESSubhajit Sahu
 
Can you fix farming by going back 8000 years : NOTES
Can you fix farming by going back 8000 years : NOTESCan you fix farming by going back 8000 years : NOTES
Can you fix farming by going back 8000 years : NOTESSubhajit Sahu
 
HITS algorithm : NOTES
HITS algorithm : NOTESHITS algorithm : NOTES
HITS algorithm : NOTESSubhajit Sahu
 
Basic Computer Architecture and the Case for GPUs : NOTES
Basic Computer Architecture and the Case for GPUs : NOTESBasic Computer Architecture and the Case for GPUs : NOTES
Basic Computer Architecture and the Case for GPUs : NOTESSubhajit Sahu
 
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDES
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDESDynamic Batch Parallel Algorithms for Updating Pagerank : SLIDES
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDESSubhajit Sahu
 
Are Satellites Covered in Gold Foil : NOTES
Are Satellites Covered in Gold Foil : NOTESAre Satellites Covered in Gold Foil : NOTES
Are Satellites Covered in Gold Foil : NOTESSubhajit Sahu
 
Taxation for Traders < Markets and Taxation : NOTES
Taxation for Traders < Markets and Taxation : NOTESTaxation for Traders < Markets and Taxation : NOTES
Taxation for Traders < Markets and Taxation : NOTESSubhajit Sahu
 
A Generalization of the PageRank Algorithm : NOTES
A Generalization of the PageRank Algorithm : NOTESA Generalization of the PageRank Algorithm : NOTES
A Generalization of the PageRank Algorithm : NOTESSubhajit Sahu
 
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...Subhajit Sahu
 
Income Tax Calender 2021 (ITD) : NOTES
Income Tax Calender 2021 (ITD) : NOTESIncome Tax Calender 2021 (ITD) : NOTES
Income Tax Calender 2021 (ITD) : NOTESSubhajit Sahu
 
Youngistaan Foundation: Annual Report 2020-21 : NOTES
Youngistaan Foundation: Annual Report 2020-21 : NOTESYoungistaan Foundation: Annual Report 2020-21 : NOTES
Youngistaan Foundation: Annual Report 2020-21 : NOTESSubhajit Sahu
 

More from Subhajit Sahu (20)

DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTES
DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTESDyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTES
DyGraph: A Dynamic Graph Generator and Benchmark Suite : NOTES
 
Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)Shared memory Parallelism (NOTES)
Shared memory Parallelism (NOTES)
 
A Dynamic Algorithm for Local Community Detection in Graphs : NOTES
A Dynamic Algorithm for Local Community Detection in Graphs : NOTESA Dynamic Algorithm for Local Community Detection in Graphs : NOTES
A Dynamic Algorithm for Local Community Detection in Graphs : NOTES
 
Scalable Static and Dynamic Community Detection Using Grappolo : NOTES
Scalable Static and Dynamic Community Detection Using Grappolo : NOTESScalable Static and Dynamic Community Detection Using Grappolo : NOTES
Scalable Static and Dynamic Community Detection Using Grappolo : NOTES
 
Application Areas of Community Detection: A Review : NOTES
Application Areas of Community Detection: A Review : NOTESApplication Areas of Community Detection: A Review : NOTES
Application Areas of Community Detection: A Review : NOTES
 
Community Detection on the GPU : NOTES
Community Detection on the GPU : NOTESCommunity Detection on the GPU : NOTES
Community Detection on the GPU : NOTES
 
Survey for extra-child-process package : NOTES
Survey for extra-child-process package : NOTESSurvey for extra-child-process package : NOTES
Survey for extra-child-process package : NOTES
 
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTER
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTERDynamic Batch Parallel Algorithms for Updating PageRank : POSTER
Dynamic Batch Parallel Algorithms for Updating PageRank : POSTER
 
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...
Abstract for IPDPS 2022 PhD Forum on Dynamic Batch Parallel Algorithms for Up...
 
Fast Incremental Community Detection on Dynamic Graphs : NOTES
Fast Incremental Community Detection on Dynamic Graphs : NOTESFast Incremental Community Detection on Dynamic Graphs : NOTES
Fast Incremental Community Detection on Dynamic Graphs : NOTES
 
Can you fix farming by going back 8000 years : NOTES
Can you fix farming by going back 8000 years : NOTESCan you fix farming by going back 8000 years : NOTES
Can you fix farming by going back 8000 years : NOTES
 
HITS algorithm : NOTES
HITS algorithm : NOTESHITS algorithm : NOTES
HITS algorithm : NOTES
 
Basic Computer Architecture and the Case for GPUs : NOTES
Basic Computer Architecture and the Case for GPUs : NOTESBasic Computer Architecture and the Case for GPUs : NOTES
Basic Computer Architecture and the Case for GPUs : NOTES
 
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDES
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDESDynamic Batch Parallel Algorithms for Updating Pagerank : SLIDES
Dynamic Batch Parallel Algorithms for Updating Pagerank : SLIDES
 
Are Satellites Covered in Gold Foil : NOTES
Are Satellites Covered in Gold Foil : NOTESAre Satellites Covered in Gold Foil : NOTES
Are Satellites Covered in Gold Foil : NOTES
 
Taxation for Traders < Markets and Taxation : NOTES
Taxation for Traders < Markets and Taxation : NOTESTaxation for Traders < Markets and Taxation : NOTES
Taxation for Traders < Markets and Taxation : NOTES
 
A Generalization of the PageRank Algorithm : NOTES
A Generalization of the PageRank Algorithm : NOTESA Generalization of the PageRank Algorithm : NOTES
A Generalization of the PageRank Algorithm : NOTES
 
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...
ApproxBioWear: Approximating Additions for Efficient Biomedical Wearable Comp...
 
Income Tax Calender 2021 (ITD) : NOTES
Income Tax Calender 2021 (ITD) : NOTESIncome Tax Calender 2021 (ITD) : NOTES
Income Tax Calender 2021 (ITD) : NOTES
 
Youngistaan Foundation: Annual Report 2020-21 : NOTES
Youngistaan Foundation: Annual Report 2020-21 : NOTESYoungistaan Foundation: Annual Report 2020-21 : NOTES
Youngistaan Foundation: Annual Report 2020-21 : NOTES
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Aerocity ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 

Router (computing) : Notes

  • 1. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 1/8 A Cisco ASM/2-32EM router deployed at CERN in 1987 Router (computing) A router[a] is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node.[2] A router is connected to two or more data lines from different IP networks.[b] When a data packet comes in on one of the lines, the router reads the network address information in the packet header to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. The most familiar type of IP routers are home and small office routers that simply forward IP packets between the home computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Operation Applications Access, core and distribution Security Routing different networks Internet connectivity and internal use History Forwarding See also Notes References External links When multiple routers are used in interconnected networks, the routers can exchange information about destination addresses using a routing protocol. Each router builds up a routing table listing the preferred routes between any two computer systems on the interconnected networks.[3] A router has two types of network element components organized onto separate processing planes:[4] Contents Operation
  • 2. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 2/8 A typical home or small office DSL router showing the telephone socket (left, white) to connect it to the internet using ADSL, and Ethernet jacks (right, yellow) to connect it to home computers and printers. A screenshot of the LuCI web interface used by OpenWrt. This page configures Dynamic DNS. Control plane: A router maintains a routing table that lists which route should be used to forward a data packet, and through which physical interface connection. It does this using internal pre- configured directives, called static routes, or by learning routes dynamically using a routing protocol. Static and dynamic routes are stored in the routing table. The control-plane logic then strips non-essential directives from the table and builds a forwarding information base (FIB) to be used by the forwarding plane. Forwarding plane: The router forwards data packets between incoming and outgoing interface connections. It forwards them to the correct network type using information that the packet header contains matched to entries in the FIB supplied by the control plane. A router may have interfaces for different types of physical layer connections, such as copper cables, fiber optic, or wireless transmission. It can also support different network layer transmission standards. Each network interface is used to enable data packets to be forwarded from one transmission system to another. Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a different network prefix. Routers may provide connectivity within enterprises, between enterprises and the Internet, or between internet service providers' (ISPs') networks. The largest routers (such as the Cisco CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise networks.[5] Smaller routers usually provide connectivity for typical home and office networks. All sizes of routers may be found inside enterprises.[6] The most powerful routers are usually found in ISPs, academic and research facilities. Large businesses may also need more powerful routers to cope with ever-increasing demands of intranet data traffic. A hierarchical internetworking model for interconnecting routers in large networks is in common use.[7] Access routers, including small office/home office (SOHO) models, are located at home and customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost. Some SOHO routers are capable of running alternative free Linux-based firmware like Tomato, OpenWrt or DD-WRT.[8] Distribution routers aggregate traffic from multiple access routers. Distribution routers are often responsible for enforcing quality of service across a wide area network (WAN), so they may have considerable memory installed, multiple WAN interface connections, and substantial onboard data processing routines. They may also provide connectivity to groups of file servers or other external networks. In enterprises, a core router may provide a collapsed backbone interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth, but lack some of the features of edge routers.[9] Applications Access, core and distribution Security
  • 3. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 3/8 External networks must be carefully considered as part of the overall security strategy of the local network. A router may include a firewall, VPN handling, and other security functions, or these may be handled by separate devices. Routers also commonly perform network address translation which restricts connections initiated from external connections but is not recognized as a security feature by all experts.[10] Some experts argue that open source routers are more secure and reliable than closed source routers because open-source routers allow mistakes to be quickly found and corrected.[11] Routers are also often distinguished on the basis of the network in which they operate. A router in a local area network (LAN) of a single organisation is called an interior router. A router that is operated in the Internet backbone is described as exterior router. While a router that connects a LAN with the Internet or a wide area network (WAN) is called a border router, or gateway router.[12] Routers intended for ISP and major enterprise connectivity usually exchange routing information using the Border Gateway Protocol (BGP). RFC  4098 (https://tools.ietf.org/html/rfc4098) defines the types of BGP routers according to their functions:[13] Edge router (also called a provider edge router): Placed at the edge of an ISP network. The router uses Exterior Border Gateway Protocol (EBGP) to routers at other ISPs or large enterprise autonomous systems. Subscriber edge router (also called a customer edge router): Located at the edge of the subscriber's network, it also uses EBGP to its provider's autonomous system. It is typically used in an (enterprise) organization. Inter-provider border router: A BGP router for interconnecting ISPs that maintains BGP sessions with other BGP routers in ISP Autonomous Systems. Core router: Resides within an Autonomous System as a back bone to carry traffic between edge routers.[14] Within an ISP: In the ISP's autonomous system, a router uses internal BGP to communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet provider border routers. Internet backbone: The Internet no longer has a clearly identifiable backbone, unlike its predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make up what could be considered to be the current Internet backbone core.[15] ISPs operate all four types of the BGP routers described here. An ISP core router is used to interconnect its edge and border routers. Core routers may also have specialized functions in virtual private networks based on a combination of BGP and Multi-Protocol Label Switching protocols.[16] Port forwarding: Routers are also used for port forwarding between private Internet-connected servers.[6] Voice, data, fax, and video processing routers: Commonly referred to as access servers or gateways, these devices are used to route and process voice, data, video and fax traffic on the Internet. Since 2005, most long-distance phone calls have been processed as IP traffic (VOIP) through a voice gateway. Use of access server type routers expanded with the advent of the Internet, first with dial-up access and another resurgence with voice phone service. Larger networks commonly use multilayer switches, with layer-3 devices being used to simply interconnect multiple subnets within the same security zone, and higher-layer switches when filtering, translation, load balancing or other higher-level functions are required, especially between zones. Routing different networks Internet connectivity and internal use History
  • 4. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 4/8 The first ARPANET router, the Interface Message Processor was delivered to UCLA August 30, 1969, and went online October 29, 1969 The concept of an Interface computer was first proposed by Donald Davies for the NPL network in 1966.[17] The same idea was conceived by Wesley Clark the following year for use in the ARPANET. Named Interface Message Processors (IMPs), these computers had fundamentally the same functionality as a router does today. The idea for a router (called gateways at the time) initially came about through an international group of computer networking researchers called the International Networking Working Group (INWG). Set up in 1972 as an informal group to consider the technical issues involved in connecting different networks, it became a subcommittee of the International Federation for Information Processing later that year.[18] These gateway devices were different from most previous packet switching schemes in two ways. First, they connected dissimilar kinds of networks, such as serial lines and local area networks. Second, they were connectionless devices, which had no role in assuring that traffic was delivered reliably, leaving that entirely to the hosts. This particular idea, the end-to-end principle, had been previously pioneered in the CYCLADES network. The idea was explored in more detail, with the intention to produce a prototype system as part of two contemporaneous programs. One was the initial DARPA-initiated program, which created the TCP/IP architecture in use today.[19] The other was a program at Xerox PARC to explore new networking technologies, which produced the PARC Universal Packet system; due to corporate intellectual property concerns it received little attention outside Xerox for years.[20] Some time after early 1974, the first Xerox routers became operational. The first true IP router was developed by Ginny Strazisar at BBN, as part of that DARPA-initiated effort, during 1975– 1976.[21] By the end of 1976, three PDP-11-based routers were in service in the experimental prototype Internet.[22] The first multiprotocol routers were independently created by staff researchers at MIT and Stanford in 1981; the Stanford router was done by William Yeager, and the MIT one by Noel Chiappa; both were also based on PDP-11s.[23][24][25][26] Virtually all networking now uses TCP/IP, but multiprotocol routers are still manufactured. They were important in the early stages of the growth of computer networking when protocols other than TCP/IP were in use. Modern Internet routers that handle both IPv4 and IPv6 are multiprotocol but are simpler devices than routers processing AppleTalk, DECnet, IP and Xerox protocols. From the mid-1970s and in the 1980s, general-purpose minicomputers served as routers. Modern high-speed routers are network processors or highly specialized computers with extra hardware acceleration added to speed both common routing functions, such as packet forwarding, and specialized functions such as IPsec encryption. There is substantial use of Linux and Unix software-based machines, running open source routing code, for research and other applications. The Cisco IOS operating system was independently designed. Major router operating systems, such as Junos and NX-OS, are extensively modified versions of Unix software. The main purpose of a router is to connect multiple networks and forward packets destined either for directly- attached networks or more remote networks. A router is considered a layer-3 device because its primary forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address. When a router receives a packet, it searches its routing table to find the best match between the destination IP address of the packet and one of the addresses in the routing table. Once a match is found, the packet is encapsulated in the layer-2 data link frame for the outgoing interface indicated in the table entry. A router typically does not look into the packet payload, but only at the layer-3 addresses to make a forwarding decision, Forwarding
  • 5. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 5/8 plus optionally other information in the header for hints on, for example, quality of service (QoS). For pure IP forwarding, a router is designed to minimize the state information associated with individual packets.[27] Once a packet is forwarded, the router does not retain any historical information about the packet.[c] The routing table itself can contain information derived from a variety of sources, such as a default or static routes that are configured manually, or dynamic entries from routing protocols where the router learns routes from other routers. A default route is one that is used to route all traffic whose destination does not otherwise appear in the routing table; this is common – even necessary – in small networks, such as a home or small business where the default route simply sends all non-local traffic to the Internet service provider. The default route can be manually configured (as a static route), or learned by dynamic routing protocols, or be obtained by DHCP.[d][28] A router can run more than one routing protocol at a time, particularly if it serves as an autonomous system border router between parts of a network that run different routing protocols; if it does so, then redistribution may be used (usually selectively) to share information between the different protocols running on the same router.[29] Besides making a decision as to which interface a packet is forwarded to, which is handled primarily via the routing table, a router also has to manage congestion when packets arrive at a rate higher than the router can process. Three policies commonly used in the Internet are tail drop, random early detection (RED), and weighted random early detection (WRED). Tail drop is the simplest and most easily implemented; the router simply drops new incoming packets once the length of the queue exceeds the size of the buffers in the router. RED probabilistically drops datagrams early when the queue exceeds a pre-configured portion of the buffer, until a pre-determined max, when it becomes tail drop. WRED requires a weight on the average queue size to act upon when the traffic is about to exceed the pre-configured size so that short bursts will not trigger random drops. Another function a router performs is to decide which packet should be processed first when multiple queues exist. This is managed through QoS, which is critical when Voice over IP is deployed, so as not to introduce excessive latency. Yet another function a router performs is called policy-based routing where special rules are constructed to override the rules derived from the routing table when a packet forwarding decision is made.[30] Router functions may be performed through the same internal paths that the packets travel inside the router. Some of the functions may be performed through an application-specific integrated circuit (ASIC) to avoid overhead of scheduling CPU time to process the packets. Others may have to be performed through the CPU as these packets need special attention that cannot be handled by an ASIC. DECbit Mobile broadband modem Modem Residential gateway Switch virtual interface TCAM Content addressable memory (hardware acceleration of route-search) Wireless router a. Pronounced /ˈruːtər/ in British English, but /ˈraʊtər/ in American and Australian English.[1] b. As opposed to a network switch, which connects data lines from one single network See also Notes
  • 6. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 6/8 c. In some router implementations, the forwarding action can increment a counter associated with the routing table entry for the collection of statistical data. d. A router can serve as a DHCP client or as a DHCP server. 1. "router" (http://oed.com/search?searchType=dictionary&q=router). Oxford English Dictionary (3rd ed.). Oxford University Press. September 2005. (Subscription or UK public library membership (https:// www.oed.com/public/login/loggingin#withyourlibrary) required.) 2. "Overview Of Key Routing Protocol Concepts: Architectures, Protocol Types, Algorithms and Metrics" (http://www.tcpipguide.com/free/t_OverviewOfKeyRoutingProtocolConceptsArchitectures P.htm). Tcpipguide.com. Archived (https://web.archive.org/web/20101220111345/http://tcpipguide. com/free/t_OverviewOfKeyRoutingProtocolConceptsArchitecturesP.htm) from the original on 20 December 2010. Retrieved 15 January 2011. 3. "Cisco Networking Academy's Introduction to Routing Dynamically" (http://www.ciscopress.com/ar ticles/article.asp?p=2180210&seqNum=4). Cisco. Archived (https://web.archive.org/web/2015102 7133937/http://www.ciscopress.com/articles/article.asp?p=2180210&seqNum=4) from the original on October 27, 2015. Retrieved August 1, 2015. 4. H. Khosravi & T. Anderson (November 2003). Requirements for Separation of IP Control and Forwarding (https://tools.ietf.org/html/rfc3654). doi:10.17487/RFC3654 (https://doi.org/10.17487% 2FRFC3654). RFC 3654 (https://tools.ietf.org/html/rfc3654). 5. "Setting uo Netflow on Cisco Routers" (http://my-technet.com/index.php/cisco/setting-up-netflow- on-cisco-routers/). MY-Technet.com date unknown. Archived (https://web.archive.org/web/201107 14141500/http://my-technet.com/index.php/cisco/setting-up-netflow-on-cisco-routers/) from the original on 14 July 2011. Retrieved 15 January 2011. 6. "Windows Home Server: Router Setup" (http://social.technet.microsoft.com/wiki/contents/articles/ windows-home-server-router-setup.aspx). Microsoft Technet 14 Aug 2010. Archived (https://web. archive.org/web/20101222175405/http://social.technet.microsoft.com/wiki/contents/articles/windo ws-home-server-router-setup.aspx) from the original on 22 December 2010. Retrieved 15 January 2011. 7. Oppenheimer, Pr (2004). Top-Down Network Design. Indianapolis: Cisco Press. ISBN 978-1- 58705-152-4. 8. "Windows Small Business Server 2008: Router Setup" (http://social.technet.microsoft.com/wiki/co ntents/articles/windows-small-business-server-2008-router-setup.aspx). Microsoft Technet Nov 2010. Archived (https://web.archive.org/web/20101230185508/http://social.technet.microsoft.com/ wiki/contents/articles/windows-small-business-server-2008-router-setup.aspx) from the original on 30 December 2010. Retrieved 15 January 2011. 9. "Core Network Planning" (https://technet.microsoft.com/en-us/library/dd894458%28WS.10%29.a spx). Microsoft Technet May 28, 2009. Archived (https://web.archive.org/web/20101002044633/ht tp://technet.microsoft.com/en-us/library/dd894458(WS.10).aspx) from the original on 2 October 2010. Retrieved 15 January 2011. 10. "Security Considerations Of NAT" (https://web.archive.org/web/20141018184244/http://www.safec omputing.umich.edu/protect-personal/download/nat_security.pdf) (PDF). University of Michigan. Archived from the original (http://www.safecomputing.umich.edu/protect-personal/download/nat_s ecurity.pdf) (PDF) on October 18, 2014. 11. "Global Internet Experts Reveal Plan for More Secure, Reliable Wi-Fi Routers - and Internet" (htt p://www.businesswire.com/news/home/20151014005564/en). Archived (https://web.archive.org/w eb/20151020003515/http://www.businesswire.com/news/home/20151014005564/en) from the original on 2015-10-20. 12. Tamara Dean (2009). Network+ Guide to Networks. Cengage Learning. p. 272. ISBN 9781423902454. 13. H. Berkowitz; et al. (June 2005). Terminology for Benchmarking BGP Device Convergence in the Control Plane (https://tools.ietf.org/html/rfc4098). doi:10.17487/RFC4098 (https://doi.org/10.1748 7%2FRFC4098). RFC 4098 (https://tools.ietf.org/html/rfc4098). References
  • 7. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 7/8 14. "M160 Internet Backbone Router" (http://www.juniper.net/techpubs/qrc/m160-qrc.pdf) (PDF). Juniper Networks. Archived (https://web.archive.org/web/20110920213215/http://www.juniper.net/ techpubs/qrc/m160-qrc.pdf) (PDF) from the original on 20 September 2011. Retrieved 15 January 2011. 15. "Virtual Backbone Routers" (http://www.telecomsportal.com/Assets_papers/Routers_&_Netman/Ir onbridge_Virt_Bbone_Route.pdf) (PDF). IronBridge Networks, Inc. September, 2000. Archived (ht tps://web.archive.org/web/20110716203325/http://www.telecomsportal.com/Assets_papers/Route rs_%26_Netman/Ironbridge_Virt_Bbone_Route.pdf) (PDF) from the original on 16 July 2011. Retrieved 15 January 2011. 16. E. Rosen; Y. Rekhter (April 2004). BGP/MPLS VPNs. 17. Roberts, Dr. Lawrence G. (May 1995). "The ARPANET & Computer Networks" (http://www.packe t.cc/files/arpanet-computernet.html). Archived (https://web.archive.org/web/20160324032800/htt p://www.packet.cc/files/arpanet-computernet.html) from the original on 24 March 2016. Retrieved 13 April 2016. "Then in June 1966, Davies wrote a second internal paper, "Proposal for a Digital Communication Network" In which he coined the word packet,- a small sub part of the message the user wants to send, and also introduced the concept of an "Interface computer" to sit between the user equipment and the packet network." 18. Davies, Shanks, Heart, Barker, Despres, Detwiler and Riml, "Report of Subgroup 1 on Communication System", INWG Note No. 1. 19. Vinton Cerf, Robert Kahn, "A Protocol for Packet Network Intercommunication" (http://ieeexplore.i eee.org/iel5/8159/23818/01092259.pdf), IEEE Transactions on Communications, Volume 22, Issue 5, May 1974, pp. 637 - 648. 20. David Boggs, John Shoch, Edward Taft, Robert Metcalfe, "Pup: An Internetwork Architecture" (htt p://ieeexplore.ieee.org/iel5/8159/23925/01094684.pdf) Archived (https://web.archive.org/web/200 80911135408/http://ieeexplore.ieee.org/iel5/8159/23925/01094684.pdf) 2008-09-11 at the Wayback Machine, IEEE Transactions on Communications, Volume 28, Issue 4, April 1980, pp. 612- 624. 21. "Ms. Ginny Strazisar" (http://www.ithistory.org/honor-roll/ms-ginny-strazisar). IT History Society. Archived (https://web.archive.org/web/20171201034131/http://www.ithistory.org/honor-roll/ms-gin ny-strazisar) from the original on 1 December 2017. Retrieved 21 November 2017. 22. Craig Partridge, S. Blumenthal, "Data networking at BBN" (http://ieeexplore.ieee.org/iel5/85/3368 7/01603444.pdf); IEEE Annals of the History of Computing, Volume 28, Issue 1; January–March 2006. 23. Valley of the Nerds: Who Really Invented the Multiprotocol Router, and Why Should We Care? (ht tps://www.pbs.org/cringely/pulpit/1998/pulpit_19981210_000593.html) Archived (https://web.archi ve.org/web/20160303172753/http://www.pbs.org/cringely/pulpit/1998/pulpit_19981210_000593.ht ml) 2016-03-03 at the Wayback Machine, Public Broadcasting Service, Accessed August 11, 2007. 24. Router Man (http://www.networkworld.com/supp/2006/anniversary/032706-routerman.html?t5) Archived (https://web.archive.org/web/20130605195255/http://www.networkworld.com/supp/2006/ anniversary/032706-routerman.html?t5) 2013-06-05 at the Wayback Machine, NetworkWorld, Accessed June 22, 2007. 25. David D. Clark, "M.I.T. Campus Network Implementation", CCNG-2, Campus Computer Network Group, M.I.T., Cambridge, 1982; pp. 26. 26. Pete Carey, "A Start-Up's True Tale: Often-told story of Cisco's launch leaves out the drama, intrigue", San Jose Mercury News, December 1, 2001. 27. Roberts, Lawrence (22 July 2003). "The Next Generation of IP - Flow Routing" (http://www.packe t.cc/files/FlowPaper/NextGenerationofIP-FlowRouting.htm). Archived (https://web.archive.org/we b/20150404030549/http://www.packet.cc/files/FlowPaper/NextGenerationofIP-FlowRouting.htm) from the original on 4 April 2015. Retrieved 22 February 2015.
  • 8. 16/09/2020 Router (computing) - Wikipedia https://en.wikipedia.org/wiki/Router_(computing) 8/8 Retrieved from "https://en.wikipedia.org/w/index.php?title=Router_(computing)&oldid=978125071" This page was last edited on 13 September 2020, at 02:00 (UTC). Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. 28. David Davis (April 19, 2007). "Cisco administration 101: What you need to know about default routes" (https://www.techrepublic.com/article/cisco-administration-101-what-you-need-to-know-ab out-default-routes). Archived (https://web.archive.org/web/20131617133200/http://www.techrepub lic.com/article/cisco-administration-101-what-you-need-to-know-about-default-routes/) from the original on December 19, 2017. 29. Diane Teare (March 2013). Implementing Cisco IP Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334. 30. Diane Teare (March 2013). "Chapter 5: Implementing Path Control". Implementing Cisco IP Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334. External links