fbpx
Wikipedia

Router (computing)

A router[a] is a networking device that forwards data packets between computer networks.[2][3] Routers perform the traffic directing functions between networks and on the global Internet. Data sent through a network, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination node.[4]

Rack containing a service-provider–class router connected to multiple networks

A router is connected to two or more data lines from different IP networks, as opposed to a network switch, which connects data lines from one single network. When a data packet comes in on one of the lines, the router reads the network address information in the packet header to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey.

The most familiar type of IP routers are home and small office routers that simply forward IP packets between the home computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone.

A carrier class router with 10G/40G/100G interfaces and redundant processor/power/fan modules

Routers can be built from standard computer parts but are mostly specialized purpose-built computers. Early routers used software-based forwarding, running on a CPU. More sophisticated devices use application-specific integrated circuits (ASICs) to increase performance or add advanced filtering and firewall functionality.

Operation edit

When multiple routers are used in interconnected networks, the routers can exchange information about destination addresses using a routing protocol. Each router builds up a routing table, a list of routes, between two computer systems on the interconnected networks.[5]

The software that runs the router is composed of two functional processing units that operate simultaneously, called planes:[6]

  • Control plane: A router maintains a routing table that lists which route should be used to forward a data packet, and through which physical interface connection. It does this using internal pre-configured directives, called static routes, or by learning routes dynamically using a routing protocol. Static and dynamic routes are stored in the routing table. The control-plane logic then strips non-essential directives from the table and builds a forwarding information base (FIB) to be used by the forwarding plane.
  • Forwarding plane: This unit forwards the data packets between incoming and outgoing interface connections. It reads the header of each packet as it comes in, matches the destination to entries in the FIB supplied by the control plane, and directs the packet to the outgoing network specified in the FIB.

Applications edit

 
A typical home or small office DSL router showing the telephone socket (left, white) to connect it to the internet using ADSL, and Ethernet jacks (right, yellow) to connect it to home computers and printers.

A router may have interfaces for multiple types of physical layer connections, such as copper cables, fiber optic, or wireless transmission. It can also support multiple network layer transmission standards. Each network interface is used to enable data packets to be forwarded from one transmission system to another. Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a unique network prefix.

Routers may provide connectivity within enterprises, between enterprises and the Internet, or between internet service providers' (ISPs') networks, they are also responsible for directing data between different networks.[7] The largest routers (such as the Cisco CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise networks.[8] Smaller routers usually provide connectivity for typical home and office networks.

All sizes of routers may be found inside enterprises.[9] The most powerful routers are usually found in ISPs, academic and research facilities. Large businesses may also need more powerful routers to cope with ever-increasing demands of intranet data traffic. A hierarchical internetworking model for interconnecting routers in large networks is in common use.[10] Some routers can connect to Data service units for T1 connections[11][12][13] via serial ports.[14][15]

Access, core and distribution edit

 
A screenshot of the LuCI web interface used by OpenWrt. This page configures Dynamic DNS.

The hierarchical internetworking model divides enterprise networks into three layers: core, distribution, and access.

Access routers, including small office/home office (SOHO) models, are located at home and customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost. Some SOHO routers are capable of running alternative free Linux-based firmware like Tomato, OpenWrt, or DD-WRT.[16]

Distribution routers aggregate traffic from multiple access routers. Distribution routers are often responsible for enforcing quality of service across a wide area network (WAN), so they may have considerable memory installed, multiple WAN interface connections, and substantial onboard data processing routines. They may also provide connectivity to groups of file servers or other external networks.[17]

In enterprises, a core router may provide a collapsed backbone interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth, but lack some of the features of edge routers.[18]

Security edit

External networks must be carefully considered as part of the overall security strategy of the local network. A router may include a firewall, VPN handling, and other security functions, or they may be handled by separate devices. Routers also commonly perform network address translation which restricts connections initiated from external connections but is not recognized as a security feature by all experts.[19] Some experts argue that open source routers are more secure and reliable than closed source routers because open-source routers allow mistakes to be quickly found and corrected.[20]

Routing different networks edit

Routers are also often distinguished on the basis of the network in which they operate. A router in a local area network (LAN) of a single organisation is called an interior router. A router that is operated in the Internet backbone is described as exterior router. While a router that connects a LAN with the Internet or a wide area network (WAN) is called a border router, or gateway router.[21]

Internet connectivity and internal use edit

Routers intended for ISP and major enterprise connectivity usually exchange routing information using the Border Gateway Protocol (BGP). RFC 4098 defines the types of BGP routers according to their functions:[22]

  • Edge router or inter-AS border router: Placed at the edge of an ISP network, where the router is used to peer with the upstream IP transit providers, bilateral peers through IXP, private peering (or even settlement-free peering) through Private Network Interconnect (PNI) via the extensive use of Exterior Border Gateway Protocol (eBGP).[23]
  • Provider Router (P): A Provider router is also called a transit-router, it sits in an MPLS network and is responsible for establishing label switched paths between the PE routers.[24]
  • Provider edge router (PE): An MPLS-specific router in the network's access layer that interconnects with customer edge routers to provide layer 2 or layer 3 VPN services.[24]
  • Customer edge router (CE): Located at the edge of the subscriber's network, it interconnectswith the PE router for L2VPN services, or direct layer 3 IP hand-off in the case of Dedicated Internet Access, if IP Transit services are provided through an MPLS core, the CE peers with the PE using eBGP with the public ASNs of each respective network. In the case of L3VPN services the CE can exchange routes with the PE using eBGP. It is commonly used in both service provider and enterprise/Data centre organizations.[24]
  • Core router: Resides within an Autonomous System as a backbone to carry traffic between edge routers.[25]
  • Within an ISP: In the ISP's autonomous system, a router uses internal BGP to communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet provider border routers.
  • Internet backbone: The Internet no longer has a clearly identifiable backbone, unlike its predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make up what could be considered to be the current Internet backbone core.[26] ISPs operate all four types of the BGP routers described here. An ISP core router is used to interconnect its edge and border routers. Core routers may also have specialized functions in virtual private networks based on a combination of BGP and Multiprotocol Label Switching protocols.[27]
  • Port forwarding: In some networks, that rely on legacy IPv4 and NAT, routers (often labelled as NAT boxes) are also used for port forwarding configuration between RFC1918 address space and their publicly assigned IPv4 address.[9]
  • Voice, data, fax, and video processing routers: Commonly referred to as access servers or gateways, these devices are used to route and process voice, data, video and fax traffic on the Internet. Since 2005, most long-distance phone calls have been processed as IP traffic (VOIP) through a voice gateway. Use of access server-type routers expanded with the advent of the Internet, first with dial-up access and another resurgence with voice phone service.
  • Larger networks commonly use multilayer switches, with layer-3 devices being used to simply interconnect multiple subnets within the same security zone, and higher-layer switches when filtering, translation, load balancing, or other higher-level functions are required, especially between zones.

Wi-Fi routers edit

Wi-Fi routers combine the functions of a router with those of a wireless access point. They are typically devices with a small form factor, operating on the standard electric power supply for residential use. Connected to the Internet as offered by an Internet service provider, they provide Internet access through a wireless network for home or office use.

History edit

 
The first ARPANET router, the Interface Message Processor, was delivered to UCLA August 30, 1969, and went online October 29, 1969.

The concept of an interface computer was first proposed by Donald Davies for the NPL network in 1966.[28] The same idea was conceived by Wesley Clark the following year for use in the ARPANET.[29] Named Interface Message Processors (IMPs), these computers had fundamentally the same functionality as a router does today. The idea for a router (called gateway at the time) initially came about through an international group of computer networking researchers called the International Network Working Group (INWG). Set up in 1972 as an informal group to consider the technical issues involved in connecting different networks, it became a subcommittee of the International Federation for Information Processing later that year.[30] These gateway devices were different from most previous packet switching schemes in two ways. First, they connected dissimilar kinds of networks, such as serial lines and local area networks. Second, they were connectionless devices, which had no role in assuring that traffic was delivered reliably, leaving that function entirely to the hosts. This particular idea, the end-to-end principle, had been previously pioneered in the CYCLADES network.[31]

The idea was explored in more detail, with the intention to produce a prototype system as part of two contemporaneous programs. One was the initial DARPA-initiated program, which created the TCP/IP architecture in use today.[32] The other was a program at Xerox PARC to explore new networking technologies, which produced the PARC Universal Packet system; due to corporate intellectual property concerns it received little attention outside Xerox for years.[33] Some time after early 1974, the first Xerox routers became operational. The first true IP router was developed by Ginny Strazisar at BBN, as part of that DARPA-initiated effort, during 1975–1976.[34] By the end of 1976, three PDP-11-based routers were in service in the experimental prototype Internet.[35]

The first multiprotocol routers were independently created by staff researchers at MIT and Stanford in 1981 and both were also based on PDP-11s. Stanford's router program was led by William Yeager and MIT's by Noel Chiappa.[36][37][38][39] Virtually all networking now uses TCP/IP, but multiprotocol routers are still manufactured. They were important in the early stages of the growth of computer networking when protocols other than TCP/IP were in use. Modern routers that handle both IPv4 and IPv6 are multiprotocol but are simpler devices than ones processing AppleTalk, DECnet, IPX, and Xerox protocols.

From the mid-1970s and in the 1980s, general-purpose minicomputers served as routers. Modern high-speed routers are network processors or highly specialized computers with extra hardware acceleration added to speed both common routing functions, such as packet forwarding, and specialized functions such as IPsec encryption. There is substantial use of Linux and Unix software-based machines, running open source routing code, for research and other applications. The Cisco IOS operating system was independently designed. Major router operating systems, such as Junos and NX-OS, are extensively modified versions of Unix software.

Forwarding edit

The main purpose of a router is to connect multiple networks and forward packets destined either for directly attached networks or more remote networks. A router is considered a layer-3 device because its primary forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address. When a router receives a packet, it searches its routing table to find the best match between the destination IP address of the packet and one of the addresses in the routing table. Once a match is found, the packet is encapsulated in the layer-2 data link frame for the outgoing interface indicated in the table entry. A router typically does not look into the packet payload,[40] but only at the layer-3 addresses to make a forwarding decision, plus optionally other information in the header for hints on, for example, quality of service (QoS). For pure IP forwarding, a router is designed to minimize the state information associated with individual packets.[41] Once a packet is forwarded, the router does not retain any historical information about the packet.[b]

The routing table itself can contain information derived from a variety of sources, such as a default or static routes that are configured manually, or dynamic entries from routing protocols where the router learns routes from other routers. A default route is one that is used to route all traffic whose destination does not otherwise appear in the routing table; it is common – even necessary – in small networks, such as a home or small business where the default route simply sends all non-local traffic to the Internet service provider. The default route can be manually configured (as a static route); learned by dynamic routing protocols; or be obtained by DHCP.[c][42]

A router can run more than one routing protocol at a time, particularly if it serves as an autonomous system border router between parts of a network that run different routing protocols; if it does so, then redistribution may be used (usually selectively) to share information between the different protocols running on the same router.[43]

Besides deciding to which interface a packet is forwarded, which is handled primarily via the routing table, a router also has to manage congestion when packets arrive at a rate higher than the router can process. Three policies commonly used are tail drop, random early detection (RED), and weighted random early detection (WRED). Tail drop is the simplest and most easily implemented: the router simply drops new incoming packets once buffer space in the router is exhausted. RED probabilistically drops datagrams early when the queue exceeds a pre-configured portion of the buffer, until reaching a pre-determined maximum, when it drops all incoming packets, thus reverting to tail drop. WRED can be configured to drop packets more readily dependent on the type of traffic.

Another function a router performs is traffic classification and deciding which packet should be processed first. This is managed through QoS, which is critical when Voice over IP is deployed, so as not to introduce excessive latency.[44]

Yet another function a router performs is called policy-based routing where special rules are constructed to override the rules derived from the routing table when a packet forwarding decision is made.[45]

Some of the functions may be performed through an application-specific integrated circuit (ASIC) to avoid overhead of scheduling CPU time to process the packets. Others may have to be performed through the CPU as these packets need special attention that cannot be handled by an ASIC.[46]

See also edit

Notes edit

  1. ^ Pronounced /ˈrtər/ in British English, /ˈrtər/ in American and Australian English.[1]
  2. ^ In some router implementations, the forwarding action can increment a counter associated with the routing table entry for the collection of statistical data.
  3. ^ A router can serve as a DHCP client or as a DHCP server.

References edit

  1. ^ "router". Oxford English Dictionary (Online ed.). Oxford University Press. (Subscription or participating institution membership required.)
  2. ^ Medhi, Deepankar; Ramasamy, Karthik (2007). Network Routing: Algorithms, Protocols, and Architectures. Elsevier. p. 19. ISBN 9780120885886.
  3. ^ Kundu, Sudakshina (2009). Fundamentals of Computer Networks, 2nd Ed. New Delhi: PHI Learning. pp. 85–86, 124. ISBN 9788120334526.
  4. ^ "Overview Of Key Routing Protocol Concepts: Architectures, Protocol Types, Algorithms and Metrics". Tcpipguide.com. from the original on 20 December 2010. Retrieved 15 January 2011.
  5. ^ "Cisco Networking Academy's Introduction to Routing Dynamically". Cisco. from the original on October 27, 2015. Retrieved August 1, 2015.
  6. ^ H. Khosravi & T. Anderson (November 2003). Requirements for Separation of IP Control and Forwarding. doi:10.17487/RFC3654. RFC 3654.
  7. ^ "Which networking component is responsible for directing data between different networks - ITEagers". ITEagers - Prepare youself. Retrieved 2024-02-27.
  8. ^ "Setting uo Netflow on Cisco Routers". MY-Technet.com date unknown. from the original on 14 July 2011. Retrieved 15 January 2011.
  9. ^ a b "Windows Home Server: Router Setup". Microsoft Technet 14 Aug 2010. from the original on 22 December 2010. Retrieved 15 January 2011.
  10. ^ Oppenheimer, Pr (2004). Top-Down Network Design. Indianapolis: Cisco Press. ISBN 978-1-58705-152-4.
  11. ^ Beasley, Jeffrey S.; Nilkaew, Piyasat (5 November 2012). A Practical Guide to Advanced Networking. Pearson Education. ISBN 978-0-13-335400-3.
  12. ^ Lawson, Wayne (8 February 2001). Configuring Cisco AVVID. Elsevier. ISBN 978-0-08-047673-5.
  13. ^ "Computerworld". 23 January 1995.
  14. ^ "Serial Interface Cards".
  15. ^ "Serial Network Modules".
  16. ^ "SOHO Network Requirements Planning and Implementation". ExamCollection. Retrieved 2021-03-25.
  17. ^ "How Do WiFi Extenders Work? Repeater, Booster, Extender?". ISP Family. 2021-02-25. Retrieved 2021-03-25.
  18. ^ "Hierarchical Network Design Overview (1.1) > Cisco Networking Academy Connecting Networks Companion Guide: Hierarchical Network Design | Cisco Press". www.ciscopress.com. Retrieved 2021-03-21.
  19. ^ (PDF). University of Michigan. Archived from the original (PDF) on October 18, 2014.
  20. ^ "Global Internet Experts Reveal Plan for More Secure, Reliable Wi-Fi Routers - and Internet" (Press release). 14 October 2015. from the original on 2015-10-20.
  21. ^ Tamara Dean (2009). Network+ Guide to Networks. Cengage Learning. p. 272. ISBN 9781423902454.
  22. ^ H. Berkowitz; et al. (June 2005). Terminology for Benchmarking BGP Device Convergence in the Control Plane. doi:10.17487/RFC4098. RFC 4098.
  23. ^ "What is the primary role of a router placed at the edge of an ISP network engaging in peering with upstream IP transit providers through eBGP - ITEagers". ITEagers - Prepare youself. Retrieved 2024-02-27.
  24. ^ a b c Rekhter, Yakov; Rosen, Eric C. (February 2006). BGP/MPLS IP Virtual Private Networks (VPNs) (Report). Internet Engineering Task Force.
  25. ^ "M160 Internet Backbone Router" (PDF). Juniper Networks. (PDF) from the original on 20 September 2011. Retrieved 15 January 2011.
  26. ^ "Virtual Backbone Routers" (PDF). IronBridge Networks, Inc. September, 2000. (PDF) from the original on 16 July 2011. Retrieved 15 January 2011.
  27. ^ E. Rosen; Y. Rekhter (April 2004). BGP/MPLS VPNs.
  28. ^ Roberts, Dr. Lawrence G. (May 1995). "The ARPANET & Computer Networks". from the original on 24 March 2016. Retrieved 13 April 2016. Then in June 1966, Davies wrote a second internal paper, "Proposal for a Digital Communication Network" In which he coined the word packet,- a small sub part of the message the user wants to send, and also introduced the concept of an interface computer to sit between the user equipment and the packet network.
  29. ^ Pelkey, James. . The History of Computer Communications. Archived from the original on December 23, 2022. Retrieved May 9, 2023.
  30. ^ Davies, Shanks, Heart, Barker, Despres, Detwiler and Riml, "Report of Subgroup 1 on Communication System", INWG Note No. 1.
  31. ^ Bennett, Richard (September 2009). "Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate" (PDF). Information Technology and Innovation Foundation. pp. 7, 11. Retrieved 11 September 2017.
  32. ^ Vinton Cerf, Robert Kahn, "A Protocol for Packet Network Intercommunication", IEEE Transactions on Communications, Volume 22, Issue 5, May 1974, pp. 637 - 648.
  33. ^ David Boggs, John Shoch, Edward Taft, Robert Metcalfe, "Pup: An Internetwork Architecture" 2008-09-11 at the Wayback Machine, IEEE Transactions on Communications, Volume 28, Issue 4, April 1980, pp. 612- 624.
  34. ^ "Ms. Ginny Strazisar". IT History Society. 21 December 2015. from the original on 1 December 2017. Retrieved 21 November 2017.
  35. ^ Craig Partridge, S. Blumenthal, "Data networking at BBN"; IEEE Annals of the History of Computing, Volume 28, Issue 1; January–March 2006.
  36. ^ Valley of the Nerds: Who Really Invented the Multiprotocol Router, and Why Should We Care? 2016-03-03 at the Wayback Machine, Public Broadcasting Service, Accessed August 11, 2007.
  37. ^ Router Man 2013-06-05 at the Wayback Machine, NetworkWorld, Accessed June 22, 2007.
  38. ^ David D. Clark, "M.I.T. Campus Network Implementation", CCNG-2, Campus Computer Network Group, M.I.T., Cambridge, 1982; pp. 26.
  39. ^ Pete Carey, "A Start-Up's True Tale: Often-told story of Cisco's launch leaves out the drama, intrigue", San Jose Mercury News, December 1, 2001.
  40. ^ "Packet Forwarding and Routing on IPv4 Networks - System Administration Guide: IP Services". docs.oracle.com. Retrieved 2021-03-25.
  41. ^ Roberts, Lawrence (22 July 2003). "The Next Generation of IP - Flow Routing". from the original on 4 April 2015. Retrieved 22 February 2015.
  42. ^ David Davis (April 19, 2007). . Archived from the original on June 25, 2014. Retrieved June 5, 2014.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  43. ^ Diane Teare (March 2013). Implementing Cisco IP Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334.
  44. ^ Donahue, Gary A. (2007-06-21). Network Warrior. "O'Reilly Media, Inc.". ISBN 978-0-596-10151-0.
  45. ^ Diane Teare (March 2013). "Chapter 5: Implementing Path Control". Implementing Cisco IP-Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334.
  46. ^ Schudel, Gregg; Smith, David (2007-12-29). Router Security Strategies: Securing IP Network Traffic Planes. Pearson Education. ISBN 978-0-13-279673-6.

External links edit

router, computing, this, article, about, network, device, woodworking, tool, router, woodworking, router, networking, device, that, forwards, data, packets, between, computer, networks, routers, perform, traffic, directing, functions, between, networks, global. This article is about the network device For the woodworking tool see Router woodworking A router a is a networking device that forwards data packets between computer networks 2 3 Routers perform the traffic directing functions between networks and on the global Internet Data sent through a network such as a web page or email is in the form of data packets A packet is typically forwarded from one router to another router through the networks that constitute an internetwork e g the Internet until it reaches its destination node 4 Rack containing a service provider class router connected to multiple networksA router is connected to two or more data lines from different IP networks as opposed to a network switch which connects data lines from one single network When a data packet comes in on one of the lines the router reads the network address information in the packet header to determine the ultimate destination Then using information in its routing table or routing policy it directs the packet to the next network on its journey The most familiar type of IP routers are home and small office routers that simply forward IP packets between the home computers and the Internet More sophisticated routers such as enterprise routers connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone A carrier class router with 10G 40G 100G interfaces and redundant processor power fan modulesRouters can be built from standard computer parts but are mostly specialized purpose built computers Early routers used software based forwarding running on a CPU More sophisticated devices use application specific integrated circuits ASICs to increase performance or add advanced filtering and firewall functionality Contents 1 Operation 2 Applications 2 1 Access core and distribution 2 2 Security 2 3 Routing different networks 2 4 Internet connectivity and internal use 2 5 Wi Fi routers 3 History 4 Forwarding 5 See also 6 Notes 7 References 8 External linksOperation editWhen multiple routers are used in interconnected networks the routers can exchange information about destination addresses using a routing protocol Each router builds up a routing table a list of routes between two computer systems on the interconnected networks 5 The software that runs the router is composed of two functional processing units that operate simultaneously called planes 6 Control plane A router maintains a routing table that lists which route should be used to forward a data packet and through which physical interface connection It does this using internal pre configured directives called static routes or by learning routes dynamically using a routing protocol Static and dynamic routes are stored in the routing table The control plane logic then strips non essential directives from the table and builds a forwarding information base FIB to be used by the forwarding plane Forwarding plane This unit forwards the data packets between incoming and outgoing interface connections It reads the header of each packet as it comes in matches the destination to entries in the FIB supplied by the control plane and directs the packet to the outgoing network specified in the FIB Applications edit nbsp A typical home or small office DSL router showing the telephone socket left white to connect it to the internet using ADSL and Ethernet jacks right yellow to connect it to home computers and printers A router may have interfaces for multiple types of physical layer connections such as copper cables fiber optic or wireless transmission It can also support multiple network layer transmission standards Each network interface is used to enable data packets to be forwarded from one transmission system to another Routers may also be used to connect two or more logical groups of computer devices known as subnets each with a unique network prefix Routers may provide connectivity within enterprises between enterprises and the Internet or between internet service providers ISPs networks they are also responsible for directing data between different networks 7 The largest routers such as the Cisco CRS 1 or Juniper PTX interconnect the various ISPs or may be used in large enterprise networks 8 Smaller routers usually provide connectivity for typical home and office networks All sizes of routers may be found inside enterprises 9 The most powerful routers are usually found in ISPs academic and research facilities Large businesses may also need more powerful routers to cope with ever increasing demands of intranet data traffic A hierarchical internetworking model for interconnecting routers in large networks is in common use 10 Some routers can connect to Data service units for T1 connections 11 12 13 via serial ports 14 15 Access core and distribution edit nbsp A screenshot of the LuCI web interface used by OpenWrt This page configures Dynamic DNS The hierarchical internetworking model divides enterprise networks into three layers core distribution and access Access routers including small office home office SOHO models are located at home and customer sites such as branch offices that do not need hierarchical routing of their own Typically they are optimized for low cost Some SOHO routers are capable of running alternative free Linux based firmware like Tomato OpenWrt or DD WRT 16 Distribution routers aggregate traffic from multiple access routers Distribution routers are often responsible for enforcing quality of service across a wide area network WAN so they may have considerable memory installed multiple WAN interface connections and substantial onboard data processing routines They may also provide connectivity to groups of file servers or other external networks 17 In enterprises a core router may provide a collapsed backbone interconnecting the distribution tier routers from multiple buildings of a campus or large enterprise locations They tend to be optimized for high bandwidth but lack some of the features of edge routers 18 Security edit External networks must be carefully considered as part of the overall security strategy of the local network A router may include a firewall VPN handling and other security functions or they may be handled by separate devices Routers also commonly perform network address translation which restricts connections initiated from external connections but is not recognized as a security feature by all experts 19 Some experts argue that open source routers are more secure and reliable than closed source routers because open source routers allow mistakes to be quickly found and corrected 20 Routing different networks edit Routers are also often distinguished on the basis of the network in which they operate A router in a local area network LAN of a single organisation is called an interior router A router that is operated in the Internet backbone is described as exterior router While a router that connects a LAN with the Internet or a wide area network WAN is called a border router or gateway router 21 Internet connectivity and internal use edit Routers intended for ISP and major enterprise connectivity usually exchange routing information using the Border Gateway Protocol BGP RFC 4098 defines the types of BGP routers according to their functions 22 Edge router or inter AS border router Placed at the edge of an ISP network where the router is used to peer with the upstream IP transit providers bilateral peers through IXP private peering or even settlement free peering through Private Network Interconnect PNI via the extensive use of Exterior Border Gateway Protocol eBGP 23 Provider Router P A Provider router is also called a transit router it sits in an MPLS network and is responsible for establishing label switched paths between the PE routers 24 Provider edge router PE An MPLS specific router in the network s access layer that interconnects with customer edge routers to provide layer 2 or layer 3 VPN services 24 Customer edge router CE Located at the edge of the subscriber s network it interconnectswith the PE router for L2VPN services or direct layer 3 IP hand off in the case of Dedicated Internet Access if IP Transit services are provided through an MPLS core the CE peers with the PE using eBGP with the public ASNs of each respective network In the case of L3VPN services the CE can exchange routes with the PE using eBGP It is commonly used in both service provider and enterprise Data centre organizations 24 Core router Resides within an Autonomous System as a backbone to carry traffic between edge routers 25 Within an ISP In the ISP s autonomous system a router uses internal BGP to communicate with other ISP edge routers other intranet core routers or the ISP s intranet provider border routers Internet backbone The Internet no longer has a clearly identifiable backbone unlike its predecessor networks See default free zone DFZ The major ISPs system routers make up what could be considered to be the current Internet backbone core 26 ISPs operate all four types of the BGP routers described here An ISP core router is used to interconnect its edge and border routers Core routers may also have specialized functions in virtual private networks based on a combination of BGP and Multiprotocol Label Switching protocols 27 Port forwarding In some networks that rely on legacy IPv4 and NAT routers often labelled as NAT boxes are also used for port forwarding configuration between RFC1918 address space and their publicly assigned IPv4 address 9 Voice data fax and video processing routers Commonly referred to as access servers or gateways these devices are used to route and process voice data video and fax traffic on the Internet Since 2005 most long distance phone calls have been processed as IP traffic VOIP through a voice gateway Use of access server type routers expanded with the advent of the Internet first with dial up access and another resurgence with voice phone service Larger networks commonly use multilayer switches with layer 3 devices being used to simply interconnect multiple subnets within the same security zone and higher layer switches when filtering translation load balancing or other higher level functions are required especially between zones Wi Fi routers edit Main article Wireless router Wi Fi routers combine the functions of a router with those of a wireless access point They are typically devices with a small form factor operating on the standard electric power supply for residential use Connected to the Internet as offered by an Internet service provider they provide Internet access through a wireless network for home or office use History edit nbsp The first ARPANET router the Interface Message Processor was delivered to UCLA August 30 1969 and went online October 29 1969 The concept of an interface computer was first proposed by Donald Davies for the NPL network in 1966 28 The same idea was conceived by Wesley Clark the following year for use in the ARPANET 29 Named Interface Message Processors IMPs these computers had fundamentally the same functionality as a router does today The idea for a router called gateway at the time initially came about through an international group of computer networking researchers called the International Network Working Group INWG Set up in 1972 as an informal group to consider the technical issues involved in connecting different networks it became a subcommittee of the International Federation for Information Processing later that year 30 These gateway devices were different from most previous packet switching schemes in two ways First they connected dissimilar kinds of networks such as serial lines and local area networks Second they were connectionless devices which had no role in assuring that traffic was delivered reliably leaving that function entirely to the hosts This particular idea the end to end principle had been previously pioneered in the CYCLADES network 31 The idea was explored in more detail with the intention to produce a prototype system as part of two contemporaneous programs One was the initial DARPA initiated program which created the TCP IP architecture in use today 32 The other was a program at Xerox PARC to explore new networking technologies which produced the PARC Universal Packet system due to corporate intellectual property concerns it received little attention outside Xerox for years 33 Some time after early 1974 the first Xerox routers became operational The first true IP router was developed by Ginny Strazisar at BBN as part of that DARPA initiated effort during 1975 1976 34 By the end of 1976 three PDP 11 based routers were in service in the experimental prototype Internet 35 The first multiprotocol routers were independently created by staff researchers at MIT and Stanford in 1981 and both were also based on PDP 11s Stanford s router program was led by William Yeager and MIT s by Noel Chiappa 36 37 38 39 Virtually all networking now uses TCP IP but multiprotocol routers are still manufactured They were important in the early stages of the growth of computer networking when protocols other than TCP IP were in use Modern routers that handle both IPv4 and IPv6 are multiprotocol but are simpler devices than ones processing AppleTalk DECnet IPX and Xerox protocols From the mid 1970s and in the 1980s general purpose minicomputers served as routers Modern high speed routers are network processors or highly specialized computers with extra hardware acceleration added to speed both common routing functions such as packet forwarding and specialized functions such as IPsec encryption There is substantial use of Linux and Unix software based machines running open source routing code for research and other applications The Cisco IOS operating system was independently designed Major router operating systems such as Junos and NX OS are extensively modified versions of Unix software Forwarding editFurther information Routing and IP routing The main purpose of a router is to connect multiple networks and forward packets destined either for directly attached networks or more remote networks A router is considered a layer 3 device because its primary forwarding decision is based on the information in the layer 3 IP packet specifically the destination IP address When a router receives a packet it searches its routing table to find the best match between the destination IP address of the packet and one of the addresses in the routing table Once a match is found the packet is encapsulated in the layer 2 data link frame for the outgoing interface indicated in the table entry A router typically does not look into the packet payload 40 but only at the layer 3 addresses to make a forwarding decision plus optionally other information in the header for hints on for example quality of service QoS For pure IP forwarding a router is designed to minimize the state information associated with individual packets 41 Once a packet is forwarded the router does not retain any historical information about the packet b The routing table itself can contain information derived from a variety of sources such as a default or static routes that are configured manually or dynamic entries from routing protocols where the router learns routes from other routers A default route is one that is used to route all traffic whose destination does not otherwise appear in the routing table it is common even necessary in small networks such as a home or small business where the default route simply sends all non local traffic to the Internet service provider The default route can be manually configured as a static route learned by dynamic routing protocols or be obtained by DHCP c 42 A router can run more than one routing protocol at a time particularly if it serves as an autonomous system border router between parts of a network that run different routing protocols if it does so then redistribution may be used usually selectively to share information between the different protocols running on the same router 43 Besides deciding to which interface a packet is forwarded which is handled primarily via the routing table a router also has to manage congestion when packets arrive at a rate higher than the router can process Three policies commonly used are tail drop random early detection RED and weighted random early detection WRED Tail drop is the simplest and most easily implemented the router simply drops new incoming packets once buffer space in the router is exhausted RED probabilistically drops datagrams early when the queue exceeds a pre configured portion of the buffer until reaching a pre determined maximum when it drops all incoming packets thus reverting to tail drop WRED can be configured to drop packets more readily dependent on the type of traffic Another function a router performs is traffic classification and deciding which packet should be processed first This is managed through QoS which is critical when Voice over IP is deployed so as not to introduce excessive latency 44 Yet another function a router performs is called policy based routing where special rules are constructed to override the rules derived from the routing table when a packet forwarding decision is made 45 Some of the functions may be performed through an application specific integrated circuit ASIC to avoid overhead of scheduling CPU time to process the packets Others may have to be performed through the CPU as these packets need special attention that cannot be handled by an ASIC 46 See also editMobile broadband modem Modem Residential gateway Switch virtual interface Wireless routerNotes edit Pronounced ˈ r uː t er in British English ˈ r aʊ t er in American and Australian English 1 In some router implementations the forwarding action can increment a counter associated with the routing table entry for the collection of statistical data A router can serve as a DHCP client or as a DHCP server References edit router Oxford English Dictionary Online ed Oxford University Press Subscription or participating institution membership required Medhi Deepankar Ramasamy Karthik 2007 Network Routing Algorithms Protocols and Architectures Elsevier p 19 ISBN 9780120885886 Kundu Sudakshina 2009 Fundamentals of Computer Networks 2nd Ed New Delhi PHI Learning pp 85 86 124 ISBN 9788120334526 Overview Of Key Routing Protocol Concepts Architectures Protocol Types Algorithms and Metrics Tcpipguide com Archived from the original on 20 December 2010 Retrieved 15 January 2011 Cisco Networking Academy s Introduction to Routing Dynamically Cisco Archived from the original on October 27 2015 Retrieved August 1 2015 H Khosravi amp T Anderson November 2003 Requirements for Separation of IP Control and Forwarding doi 10 17487 RFC3654 RFC 3654 Which networking component is responsible for directing data between different networks ITEagers ITEagers Prepare youself Retrieved 2024 02 27 Setting uo Netflow on Cisco Routers MY Technet com date unknown Archived from the original on 14 July 2011 Retrieved 15 January 2011 a b Windows Home Server Router Setup Microsoft Technet 14 Aug 2010 Archived from the original on 22 December 2010 Retrieved 15 January 2011 Oppenheimer Pr 2004 Top Down Network Design Indianapolis Cisco Press ISBN 978 1 58705 152 4 Beasley Jeffrey S Nilkaew Piyasat 5 November 2012 A Practical Guide to Advanced Networking Pearson Education ISBN 978 0 13 335400 3 Lawson Wayne 8 February 2001 Configuring Cisco AVVID Elsevier ISBN 978 0 08 047673 5 Computerworld 23 January 1995 Serial Interface Cards Serial Network Modules SOHO Network Requirements Planning and Implementation ExamCollection Retrieved 2021 03 25 How Do WiFi Extenders Work Repeater Booster Extender ISP Family 2021 02 25 Retrieved 2021 03 25 Hierarchical Network Design Overview 1 1 gt Cisco Networking Academy Connecting Networks Companion Guide Hierarchical Network Design Cisco Press www ciscopress com Retrieved 2021 03 21 Security Considerations Of NAT PDF University of Michigan Archived from the original PDF on October 18 2014 Global Internet Experts Reveal Plan for More Secure Reliable Wi Fi Routers and Internet Press release 14 October 2015 Archived from the original on 2015 10 20 Tamara Dean 2009 Network Guide to Networks Cengage Learning p 272 ISBN 9781423902454 H Berkowitz et al June 2005 Terminology for Benchmarking BGP Device Convergence in the Control Plane doi 10 17487 RFC4098 RFC 4098 What is the primary role of a router placed at the edge of an ISP network engaging in peering with upstream IP transit providers through eBGP ITEagers ITEagers Prepare youself Retrieved 2024 02 27 a b c Rekhter Yakov Rosen Eric C February 2006 BGP MPLS IP Virtual Private Networks VPNs Report Internet Engineering Task Force M160 Internet Backbone Router PDF Juniper Networks Archived PDF from the original on 20 September 2011 Retrieved 15 January 2011 Virtual Backbone Routers PDF IronBridge Networks Inc September 2000 Archived PDF from the original on 16 July 2011 Retrieved 15 January 2011 E Rosen Y Rekhter April 2004 BGP MPLS VPNs Roberts Dr Lawrence G May 1995 The ARPANET amp Computer Networks Archived from the original on 24 March 2016 Retrieved 13 April 2016 Then in June 1966 Davies wrote a second internal paper Proposal for a Digital Communication Network In which he coined the word packet a small sub part of the message the user wants to send and also introduced the concept of an interface computer to sit between the user equipment and the packet network Pelkey James 4 7 Planning the ARPANET 1967 1968 in Chapter 4 Networking Vision and Packet Switching 1959 1968 The History of Computer Communications Archived from the original on December 23 2022 Retrieved May 9 2023 Davies Shanks Heart Barker Despres Detwiler and Riml Report of Subgroup 1 on Communication System INWG Note No 1 Bennett Richard September 2009 Designed for Change End to End Arguments Internet Innovation and the Net Neutrality Debate PDF Information Technology and Innovation Foundation pp 7 11 Retrieved 11 September 2017 Vinton Cerf Robert Kahn A Protocol for Packet Network Intercommunication IEEE Transactions on Communications Volume 22 Issue 5 May 1974 pp 637 648 David Boggs John Shoch Edward Taft Robert Metcalfe Pup An Internetwork Architecture Archived 2008 09 11 at the Wayback Machine IEEE Transactions on Communications Volume 28 Issue 4 April 1980 pp 612 624 Ms Ginny Strazisar IT History Society 21 December 2015 Archived from the original on 1 December 2017 Retrieved 21 November 2017 Craig Partridge S Blumenthal Data networking at BBN IEEE Annals of the History of Computing Volume 28 Issue 1 January March 2006 Valley of the Nerds Who Really Invented the Multiprotocol Router and Why Should We Care Archived 2016 03 03 at the Wayback Machine Public Broadcasting Service Accessed August 11 2007 Router Man Archived 2013 06 05 at the Wayback Machine NetworkWorld Accessed June 22 2007 David D Clark M I T Campus Network Implementation CCNG 2 Campus Computer Network Group M I T Cambridge 1982 pp 26 Pete Carey A Start Up s True Tale Often told story of Cisco s launch leaves out the drama intrigue San Jose Mercury News December 1 2001 Packet Forwarding and Routing on IPv4 Networks System Administration Guide IP Services docs oracle com Retrieved 2021 03 25 Roberts Lawrence 22 July 2003 The Next Generation of IP Flow Routing Archived from the original on 4 April 2015 Retrieved 22 February 2015 David Davis April 19 2007 Cisco administration 101 What you need to know about default routes Archived from the original on June 25 2014 Retrieved June 5 2014 a href Template Cite web html title Template Cite web cite web a CS1 maint bot original URL status unknown link Diane Teare March 2013 Implementing Cisco IP Routing ROUTE Foundation Learning Guide Cisco Press pp 330 334 Donahue Gary A 2007 06 21 Network Warrior O Reilly Media Inc ISBN 978 0 596 10151 0 Diane Teare March 2013 Chapter 5 Implementing Path Control Implementing Cisco IP Routing ROUTE Foundation Learning Guide Cisco Press pp 330 334 Schudel Gregg Smith David 2007 12 29 Router Security Strategies Securing IP Network Traffic Planes Pearson Education ISBN 978 0 13 279673 6 External links edit nbsp Wikimedia Commons has media related to Network routers nbsp Wikibooks has a book on the topic of Communication Networks Routing nbsp Look up router in Wiktionary the free dictionary Retrieved from https en wikipedia org w index php title Router computing amp oldid 1212877134, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.