pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Routers

Routing achieved commercial popularity in the mid-1980s – at a time when large-scale internetworking began to replace the fairly simple, homogeneous environments that had been the norm hitherto. Routing is the act of moving information across an internetwork from a source to a destination. It is often contrasted with bridging, which performs a similar function. The primary difference between the two is that bridging occurs at Layer 2 (the link layer) of the OSI reference model, whereas routing occurs at Layer 3 (the network layer). This distinction provides routing and bridging with different information to use in the process of moving information from source to destination, so the two functions accomplish their tasks in different ways.

Network

Routers use information within each packet to route it from one LAN to another, and communicate with each other and share information that allows them to determine the best route through a complex network of many LANs. To do this, routers build and maintain routing tables, which contain various items of route information – depending on the particular routing algorithm used. For example, destination/next hop associations tell a router that a particular destination can be gained optimally by sending the packet to a particular router representing the next hop on the way to the final destination. When a router receives an incoming packet, it checks the destination address and attempts to associate this address with a next hop.

Filed Under: Networking

Latest Articles

LCD Resolution and Scaling

LCDs follow a different set of rules than CRT displays offering advantages in terms of bulk, power consumption and flicker, as well as "perfect" geometry. They have the disadvantage of a much higher price, a poorer viewing angle and less accurate colour performance. While CRTs are … [Read More...]

How to Charge Your iPhone Faster

Yes it is a First World problem, but it is very frustrating to find your iPhone dead when you are getting ready to go out. You may see that dreaded red bar on your iphone and come to the realization that you have less than 20% of power and are going to be away from a charging station for a long … [Read More...]

Peer to Peer Network Architecture

In a Peer-to-peer networking architecture each computer (workstation) has equivalent capabilities and responsibilities. There is no server, and computers simply connect with each other in a workgroup to share files, printers, and Internet access. … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Redditors Talk About the Impact of AI on Freelance Writers

AI technology has had a huge impact on our lives. A 2023 survey by Pew Research found that 56% of people use AI at least once a day or once a week. … [Read More...]

11 Most Popular Books on Perl Programming

Perl is not the most popular programming language. It has only one million users, compared to 12 million that use Python. However, it has a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How to Remove System Protection Tools

System Protection Tools System Protection Tools is a false antivirus client that is made to look like the real antivirus client from Microsoft. The … [Read More...]

Safely Overwrite the Deleted Files: Cipher and Eraser

When someone deletes files on their PC, Windows users knew it wasn’t really gone and it can be recovered.  The deleted files are still there on your … [Read More...]

Cordless Input Devices

Following on from the introduction of the optical mouse, the logical progression was to combine the precision of optical technology with the freedom … [Read More...]

[footer_backtotop]

Copyright © 2025 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors