Routing and Switching The Backbone of Networks
Routing and Switching The Backbone of Networks
Routing and Switching The Backbone of Networks
Switching
Routing
Key Differences
Together, switching and routing ensure that data packets are delivered
reliably and efficiently to their intended recipients across complex networks.
Routing Principles
Path Selection: Routers use algorithms to determine the optimal path for
data packets to travel from their source to their destination. This path is
typically chosen based on factors like distance, cost, and network
congestion.
Routing Protocols: Routers exchange information about networks and
routes using protocols like RIP, OSPF, and BGP. These protocols help
routers make informed decisions about path selection.
Autonomous Systems (ASes): Networks are often divided into ASes, which
are independently administered groups of networks. BGP is used to
exchange routing information between ASes.
Convergence: Routing protocols strive for convergence, which means that
all routers in a network agree on the optimal paths to reach different
destinations.
Switching Principles
Packet Switching: Data is broken down into smaller units called packets,
which are transmitted independently across the network. This allows for
efficient utilization of network resources.
Store-and-Forward: Switches typically store incoming packets before
forwarding them to the appropriate outgoing port. This ensures that the
entire packet is received before transmission.
Address Lookup: Switches use hardware-based address lookup tables to
quickly determine the outgoing port for a given packet.
Full Duplex: Most modern switches support full-duplex communication,
allowing data to be transmitted in both directions simultaneously.
Common Principles
Key Differences
Subnetting
Example:
Subnet Calculation:
11111111.11111111.11111111.11110000.
2. Count the consecutive 1s from the left: 24 bits.
Private IP Addresses: Used within private networks to isolate them from the
public internet. Examples include:
10.0.0.0/8
172.16.0.0/12
192.168.0.0/16
Key Differences
VLANs and VPNs can be used together to create a more secure and efficient
network environment. For example, VLANs can be used to segment a network
into different departments or functions, while VPNs can be used to provide
secure remote access to those segments.
Key Technologies
Wireless Networks
WLANs (Wireless Local Area Networks): Created using Wi-Fi access points
(APs) to provide wireless internet access in a limited area.
WPANs (Wireless Personal Area Networks): Used for short-range
connections between devices (e.g., Bluetooth).
WWANs (Wireless Wide Area Networks): Cellular networks that cover a
large geographic area.
Applications
Basic Components
Access Point (AP): A device that transmits and receives wireless signals.
Wireless Network Interface Card (WNIC): A component in a device that
enables it to connect to a wireless network.
Antenna: A device that transmits and receives electromagnetic waves.
Wireless Technologies
Frequency Bands
2.4 GHz: A popular frequency band for Wi-Fi, offering wider coverage but
potentially more interference.
5 GHz: A newer frequency band with less interference but shorter range.
Network Topologies
Wireless Security
Encryption: Using algorithms to scramble data, making it difficult for
unauthorized users to access.
Authentication: Verifying the identity of devices or users before granting
access.
MAC Address Filtering: Restricting access based on the device's unique
MAC address.
Applications
Home and Office Networks: Providing internet access and connectivity for
devices.
Mobile Devices: Connecting smartphones, tablets, and laptops to the
internet.
IoT (Internet of Things): Connecting everyday objects to the internet.
Public Wi-Fi: Offering internet access in public places.
Wi-Fi standards define the specifications for wireless networks, including data
rates, range, and compatibility. Over the years, Wi-Fi has evolved significantly,
with each new standard offering improved performance and features.
Bluetooth
Comparison
WPA
Introduced: 2003
Encryption: Temporal Key Integrity Protocol (TKIP)
Weaknesses: TKIP's encryption algorithm was later found to be vulnerable
to attacks.
WPA2
Introduced: 2004
Encryption: Counter Mode Cipher Block Chaining Message Authentication
Code Protocol (CCMP)
Advantages: CCMP offers significantly stronger security than TKIP.
Requirement: Most modern Wi-Fi devices support WPA2 and recommend
its use.
Key Differences
Use WPA2: Always choose WPA2 over WPA for stronger security.
Strong Passwords: Create long, complex passwords that are difficult to
guess.
Regular Updates: Keep your router's firmware and Wi-Fi devices updated
to address security vulnerabilities.
MAC Address Filtering: Restrict access to authorized devices.
Hidden SSID: Disable the broadcast of your network's SSID (name).
Avoid Public Wi-Fi: Be cautious when using public Wi-Fi networks, as they
may not be secure.
Additional Considerations
Security: Ensuring the security of IoT devices and data transmission over
5G networks is a critical challenge.
Interoperability: Ensuring compatibility between different IoT devices and
platforms is essential for a thriving IoT ecosystem.
Cost: The initial deployment and ongoing operation of 5G networks can be
costly.
Privacy: Protecting user privacy in a world of interconnected devices is a
major concern.