You are on page 1of 5

BHARATHIAR UNIVERSITY ARTS & SCIENCE COLLEGE VALPARAI

ASSISGNMENT 1 NAME ROLL NO, REG. NO. CLASS SUBJECT TOPIC DATE : : : : : : : MUNEESWARI K 09UGBCA34 0922J2583 B.C.A. III YEAR COMPUTER NETWORK INTRODUCTION TO ROUTER 15.07.2011

SUBMITTED TO

SUBMITTED BY

Introduction to Router Routers are even smaller than bridges and switches. But routers operate on the Network layer, which is a higher level in the OSI conceptual model. While bridges and switches operate on the Data Link layer. Like switches, routers use a combination of software and hardware, but it is used to route data from its source to its destination. Routers actually have a sophisticated OS that allows them to configure various connection ports. You can setup a router to route data packets from different network protocol stacks, which include TCP/IP, IPX/SPX and AppleTalk. Routers are used to segment LANs that have become so large that data traffic has become congested. Routers are also used to connect remote LANs together using different WAN technologies. But, when a router has become large, the large network is divided into logical segments called subnets. This division of the network is based on the addressing scheme related to a particular subnet is kept local. The router only forwards data that is meant for the subnets on the extended network. This routing of network data helps conserve network bandwidth. Routers also help to decide how to forward data packets to their destination based on the routing table. The protocols built into the router's operating system is used to identify neighboring routers and their network addresses. This allows routers to build a routing table.

Networking Routers Networking routers are regarded as the network devices that provide internetwork connectivity between different networks and make intelligent packet forwarding possible. Basically there are two categories if we are talking about networking routers, i.e. networking routers deployed at the large scale enterprise networking infrastructure and networking wireless routers that are common to home network. private corporate network. The following configuration diagram describes the use of networking Networking routers are regarded as the network devices that provide internetwork connectivity between different networks and make intelligent packet forwarding possible. Basically there are two categories if we are talking about networking routers, i.e. networking routers deployed at the large scale enterprise

networking infrastructure and networking wireless routers that are common to home network. Networking Routers for Enterprise Networking routers for enterprise network are used to connect to WAN services and can optionally provide basic network security through packet filtering (extended access-lists). The choice of router is critical in provisioning WAN connections, enabling advanced network services and performing network management. The configuration diagram of the networking routers for large scale enterprise network commonly consists of the routers (as the first defense of security protection against any public un-trusted network threats) and the firewall with optional DMZ as the transition between the public network and the private corporate network. The following configuration diagram describes the use of networking routers for the enterprise.

Networking Routers Diagram for corporate network Traffic from the public network to the corporate network will be filtered by networking routers firstly either permitted or denied based on the rule base policy defined in the extended access-list. The second filter is done by the firewall to determine what packets will be permitted or denied. We can define the rule base policy in the firewall for example to allow the public users access only to the Web servers located at the DMZ but never be allowed to access the corporate network. See also the firewall security standards here.

For travelling users or tele-workers that would like to access the corporate network via public network, usually the company installs special VPN appliance or define the rule based in the firewall. The business firewall-VPN appliance is common device to deploy within small business to enterprise network. Traffic flows from the teleworkers is defined within the networking routers as well as the firewall in order to allow remote access to the private network. Networking wireless routers Unlike networking routers designed for enterprise, networking wireless routers are designed specifically for home network users. The manufacturers ship the Networking wireless routers with multi-functions packed in a single box that includes the function of router, firewall with NAT and SPI functions, network LAN Switch (commonly 4 LAN ports), and a wireless access point function. The networking wireless routers are very popular today and since the target are home users, the vendors embed the technologies to allow users easily install and setup the networking wireless routers and yet secure. Wireless connection is susceptible to eavesdropping by people at the coverage area. They can be picked up as far as 1,000 feet outside of the premises with a laptop and a hi-gain adapter with dish directional antenna. This makes wireless local area networks (WLANs) inherently vulnerable to interception. But the recent wireless security encryption industrial standards are widely embedded to mostly the wireless-N routers. Hundreds of networking wireless routers you can purchase available at the marketplace today with different wireless standards ranging from legacy wireless 802.11b routers, well-knows wireless 802.11g routers, and the most recent the future wireless technology draft 802.11n wireless routers. The wireless 802.11g routers are very popular until today, but with the introductions of the future technology (draft 802.11n) shipped by the manufacturers into the market today (such as Linksys WRT610N dual-band router) wireless-G devices will soon be regarded as legacy devices.

You might also like