SBN

Security+: Technologies and Tools – Switches and Routers

Introduction

In any type of IT Infrastructure, the network component is of utmost importance. After all, it is at this level where all communications and data packet traffic transpires for employees and even individuals to access shared resources from a central server. There are many components that go into this, such as Firewalls, Routers, Switches, Hubs, Bridges, Virtual Private Networks, Network Amplifiers, etc.

However, in this article, we focus primarily on two specific devices, that you, the Security+ cert holder need to have a strong grasp of:

  • Routers
  • Switches

What a Router Is

A Router can be specifically defined as follows:

“A router is a device that directs data traffic along specific routes. A router sends information, such as email and the content of web pages, between your computer and the network server. A router is also the device that keeps single computers, or entire networks, connected to the internet.”

(SOURCE: https://www.digitalunite.com/guides/using-internet-0/connecting-internet/what-router)

Based from the definition, a Router essentially connects and communicates with all devices (such as the workstations, servers, and even the wireless devices) that are an in the internal network, such as the corporate intranet in an organization. From there, it also connects this intranet to the “outside world” so that network communications can transpire all over the world.

In a way, it is very similar to that of a network modem, which is very commonly used in home-based networks. For example, to get access to the Internet, the computer must be connected to this modem, whether it is hard-wired, or wireless. However, a Router is unique in the sense that it consists of other features that make it more sophisticated than that of the traditional network modem. For example:

  • It forwards the data packets to the correct TCP/IP address of the device (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/qah4whZKCz0/