A router is the main node device on the Internet. The router determines data forwarding through routing. The forwarding policy is called routing selection and the origin of the router name. the position and function of the router in the network determine that it must be able to interconnect multiple different networks. Different networks mean different network links, different network ports, and different network protocols.
I. Address ing: This function maps network-layer addresses and physical addresses of network devices. For example, the ing between IP addresses and MAC addresses is an important basis for routers to send protocol packets.
Ii. Grouping and restructuring: Because vrouters connect to different types of networks, the MTU rules for these different types of networks are different. vrouters need to group and reorganize packets.
3. Support for multiple routing protocols: the routing function is the most basic function of a router and the basis for network interconnection, however, different routing protocols may be used in different types of networks. Therefore, the router must have the effort to support multiple routing protocols to achieve correct route forwarding of packets between different networks.
4. protocol conversion: This is a required function of a multi-protocol router. A Router needs to convert different network-layer protocols, such as IP packets and IPX packets.
5. vrouters implement interconnection between different networks. With the development of networks and the deepening of applications, more and more restrictions on such network interconnection are required, in other words, we hope that the vro can achieve network interconnection with certain isolation capabilities to improve network security. Resource Access Management (RAM) is a simple and practical network isolation technology. It filters and controls packet forwarding by defining the access control list, only packets permitted in the access control list can be forwarded through the vro.
6. the access control list currently used in the vro can be used to control access to packets based on MAC addresses, protocol types, network addresses, and other methods to isolate the network. Some routers also have content-based context-related access control for packets. This function is similar to the firewall function.
VII. Access Control Technology achieves network isolation, limits mutual access between interconnected networks, and improves network security. This is a positive aspect. However, the extensive use of the access control list and firewall technology has a great impact on the speed and capability of the router to forward packets.
8. Because routers are usually used to connect the LAN to the WAN, when the LAN and WAN have a large amount of data communication, the router usually becomes the bottleneck of the entire data communication. Therefore, vrouters are required to have strong traffic control capabilities. On the one hand, when selecting a vro, we should consider the packet forwarding speed and buffer space of the vro as much as possible. At the same time, we should select an Optimized Routing Algorithm and adopt the Server Load balancer technology to effectively implement congestion control.
As the network scale continues to expand, it is obvious that the IP address resources are insufficient. Therefore, in the actual networking project, the network address translation in the router is usually used, that is, the NAT Function solves the problem of insufficient IP Address Resources, which is also an important feature of the router.