Routers and Switches

Hans-Peter Dommel, Santa Clara University

Introduction

Principles of Routing and Switching

Routers and Switches in a Nutshell

How Routers Work

How Switches Work

Router and Switch Security

Best Practices in Securing Routers and Switches

Router Vulnerabilities and Attacks

Switch Vulnerabilities and Attacks

Case Studies

Conclusion

Glossary

Cross References

References

INTRODUCTION

Communication networks are systems in hardware and software to facilitate information exchange in a broader arrangement than a single point-to-point link. The telephone network is the most familiar and ubiquitous communication network, designed primarily for voice transmission. A computer network is a communication infrastructure between computing devices in different locations to enable digital information exchange and sharing of resources such as messages, software, compute time, storage space, or peripherals. Finding efficient ways to share communication links is one of the main problems in designing networks. Network design traditionally seeks to optimize several criteria at the same time: minimizing the cost of deployment; maximizing the aggregate bandwidth between two end-points; avoiding “hot spots” where a small number of network nodes and links handle a large percentage of the total traffic; minimizing the latency between any sender and receiver, and maximizing scalability, that is, performance should scale with the number of nodes in the network.

Routers and switches are the ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.