COMPTIA Security+ Tutorial: Module 01,Part 02 – Routers

Routers

Routers

Next we will understand what exactly the routers are? When we need to move the data packets between the computer network,we would need  Routers. It facilitates the delivery of data packets based on the IP Address. One thing important with the routers is that they should be properly configured without which we will face the congestion of data. Routers can be automatically or manually configured.

But there are chances that the router security can also be challenged and hence, It should be password protected which may otherwise allow others to use your network without permission.

 

A router works in two different stages that include:

Control Plane

Forwarding Plane

The control plane diverts or strips the non-essential directives from the Routing Information Base and the ones that are essential are sent to the Forwarding Information Base from where it will be used by the forwarding plane.

There are  different types of Routers that vary depending on their applications. The powerful routers are found in the academic and research facilities. The router passwords should be kept secret. It should make use of a secure protocol for authentication and data encryption.

Switches

Next we should know about a device, called Switch, that will allow the networked device to talk to each other.We have two categories of controllers that  include a) Managed Switches, and b) Unmanaged Switches.

We need to understand the difference between a switch and a router?

A Switch creates a network, whereas the Routers connects these networks. The routers use the internet to connect with the computer and dispatch information choosing the best path to make the travel quickly.

Whereas,the Switches are the devices that facilitate the packet delivery based on the MAC address (unique identification of the computer) of the device at the port.

The MAC address is the 48 bit address expressed in hexadecimal that never changes, unlike the IP address that changes from time to time. The MAC address is a more reliable way to identify both the receiver and the sender of the data on the network.

Load Balancers

We need a device to balance the traffic or the load on the servers to prevent system crash and hence we make use of Load Balancers.