Concepts of Routing

Home > Blogs > CompTIA > Concepts of Routing

Concepts of Routing

Like This Blog 0Mark Jacob
Added by June 3, 2019

This content is from our CompTIA Network + Video Certification Training Course. Start training today!


In this lesson, we look at how routers do their job.

Router:

  • Moves Packets
  • Leans Network Information

Routers move packets. We’ll illustrate this as we did previously with switches.

 

We have bits – layer 1, then frames (that’s where we have switches) – layer 2. Now packets – layer 3. Routers move packets, switches move frames.

Another distinguishing feature is that MAC addresses are considered hardware addresses, whereas, the packets are IP addresses. Routers move IP, which is a logical piece of information, whereas a MAC address is considered a physical piece of information.

Similar to a switch, it does learn based on what arrives at its interfaces. Let’s take a look at that in greater detail.

How routers move packets? For example, we have a host, let’s give it a name of IP a on one side and IP b on the other.

This is a direct connect.

In other words, whatever the network is, they both have to be in it. That’s one of the interesting things about routers.

If we have an actual IP address such as 10.1.1.1.

If we try to put 10.1.1.2 on other side of the router, the router will reject that command.

You may also like:  How to Get Your Start into IT – Video by Spike Xavier

The router is saying, “Wait a minute, these guys are in the same network. 10.1.1.1. You can’t do that.”

In fact, from the standpoint of the router, it could ask you this question and be justified in doing so, “If these interfaces are in the same network, what do you need me for?” The whole point of having a router is to move information between networks.

This is considered one network, and would be considered a different network.

Turns out that IP b this host, cannot directly reach that host because they’re in different networks.

Even if there was a switch here, switches cannot move information between networks, hence that’s why we need this the router in the middle.

It turns out, you could imagine it like if you want to mail a letter to somebody who lives in another state. You hand the letter to the letter carrier because you intend that the post office is going to take that letter and take it to your friend that lives in another state. How would you feel if you handed a letter to the mailman and he said, “Thank you,” and tears it open? You’re like, “Wait a minute, that’s not for you.”

It’s the same concept here. If IP b wants to talk to IP a, IP b hands it to the router. The router realizes it’s not for it and hands it over to the destination. The router has a routing table and as it’s connected and if it’s big enough, there’ll be multiple routers. This router could have various pieces of information in its routing table.

You may also like:  CompTIA Series: A+ 900 Acronyms

As soon as it gets something from B, it’s going to check the destination and say, “Do I know how to get to A?” In this case, yes, it does. It’s directly connected but the concept still follows. The router checks, “Do I know how to route this packet to its destination? If I do, I send it.”

Interesting, to note, if a router doesn’t know how to route a packet, it drops it. Don’t waste any more time on it. Let it go.

That’s a brief look into how routers move packets.

Until next time….

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Video Certification Training: CompTIA Network +

 

Videos You May Like

Agile Methodology in Project Management

0 100 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 373 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

3 390 3

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.