Javatpoint Logo
Javatpoint Logo


The routers are used to transmit the data packets between different networks. These are the hardware devices, which are placed at gateways of two connected networks. For example, if we want to connect our LAN to our ISP, we can use the router. Using the router, we can connect our network with the internet.


Working of Routers

A router checks the IP address of the source and destination of each packet. After that, it will go to the routing table, which provides directions to transfer the data to the destination of a particular network and check the destination of the packet. Then it will route the packet to another router. This process will stop when the destination IP is reached and responded back. If we have many ways to go to the IP address of the destination, the router will select the most economical way. If the list of routing table does not contain the packet's destination IP address, the default router will get the packet. If the packet has no destination, the packet will be dropped.


Most routers have different ports so that they can connect the different devices to the internet simultaneously. The router uses the routing table to find out where the traffic is coming and where to send the data. Generally, ISP (Internet service provider) provides the router. The ISP assigns our router's IP address, and that IP address is the public IP address. Whenever we use the internet on our device, we are identified in the world using the public IP address. Routers keep our private IP addresses protected. Our laptop, TV media box, desktop, and network copier have different private IP addresses. If they don't have a different private IP address, the router will be unable to recognize the requesting device.

Importance of Router

The following are some importance of router:

  • Ethernet is the most commonly used network. Apart from that, we have many other networks like the Token ring and ATM. The network uses different methods to encapsulate the data or packets so that the data cannot directly communicate. Routers translate these packets, which are coming from different networks so that the packets can understand each other.
  • A broadcast storm is prevented by the routers. If we don't have a router, the broadcast will go to every device's every port and be processed by every device. If we have a large amount of broadcasts in the whole network, chaos can occur. A router sub-divides the network into more than one smaller network, and all that networks are connected by the router. A router would not allow the broadcast to flow between subnets.

Security features of Routers

The following are some security feature of the router:

  • We can prevent unauthorized access using password-protected networks.
  • The malware attack risk can be removed by the secured routers.
  • Secured routers are used to protect sensitive data.
  • Additional protection against DoS can be provided by the sophisticated routers.


In the event of an emergency, the firewall is used as a wall to block the fires. A network firewall is used to set a barrier between the internet and LAN (local area network). The purpose of a network firewall is to protect our private LAN. It is used to save our important data from leaking out. Without the firewall capability, the routers will blindly pass traffic between two different networks. A firewall is used to monitor the traffic and block the traffic, which is not authorized to go out. A network firewall separates the internet and the LAN. In the LAN, it also segments the ordinary data and the important data. Due to this, the internal invasion can be avoided. You will determine the amount of threats that are blocked by your firewall. By blocking, firewall prevents your private network from outside users. You need to create a Demilitarized Zone (DMZ) if you allow remote access from others to your network. Most of the firewall provided the DMZ option. It will designate a directory on the computer of a gateway, just like Demilitarized Zone. Virus protected is offered by some firewalls. It is recommended for every computer to install the anti-virus.


Working of Network Firewall

Some hardware firewalls allow you to define the blocking rules like UDP (User diagram protocol) or TCP (transmission control protocol) or by IP address. This helps you to forbidden the IP address and unwanted ports. Software applications and services define some other type of firewall. Such firewall acts like a proxy server, which is used to interconnect the two separate networks. The combination of a software firewall and a hardware firewall is more efficient and safer.

Importance of Firewall

  • Using the firewall, you can protect your home computer. To protect your network, you should use a hardware firewall if you have more than one computer. You should follow the policy of the network administrator if you are using a public computer.
  • A firewall is designed to protect the organization from cyber-attacks. Many internal programs that have potentially exploitable can be protected by firewall from danger by limiting the traffic that crosses the boundary of the network, which is available only for authorized traffic.
  • A firewall provides you a clear boundary between the outside and inside of your network. Firewall solution provides filtering, ensuring that the users inside your network can access the external services easily. It also prevents your internal computers from getting the connection from external computers until they meet specific access requirements.

Security features of the firewall

  • A hardware firewall is used to detect suspicious traffic.
  • Using the hardware firewall, the data packets, which seem suspicious, can be blocked.
  • Using the analyze content of the NGFW firewall, the leakage of data can be detected.
  • A firewall provides a secure network so that multiple persons can interact, for example, online video games.
  • A firewall is used to protect your private information like online banking credentials, social security numbers.

Youtube For Videos Join Our Youtube Channel: Join Now


Help Others, Please Share

facebook twitter pinterest

Learn Latest Tutorials


Trending Technologies

B.Tech / MCA