事物指的是什么| 浑水摸鱼是什么意思| 什么一现| 马齿苋与什么食物相克| 女性黄体期是什么时候| 坏血病的症状是什么| 飞机杯什么感觉| 胆固醇高是什么病| 儿童看小鸡挂什么科| 气血不足吃什么补最快| 轻度肠上皮化生是什么意思| 孩子不长个子是什么原因| 皮草是什么意思| 胸闷挂什么科室| 田七蒸瘦肉有什么功效| 刮痧是什么| 孕吐一般什么时候开始| 口干舌燥是什么原因引起的| 820是什么意思| 小暑是什么| bml是什么意思| ff是什么牌子| 为什么不孕不育| 早教是什么| 舌头上有裂纹是什么原因| 女人小肚子疼是什么原因| 茄子是什么形状| 产物是什么意思| 11月16日是什么星座| 医院面试一般会问什么| 不应期是什么| 咳嗽吃什么药最好| 阴枣是什么| 心慌吃什么药| 三点水一个前读什么| 女性尿急憋不住尿是什么原因| 吃什么降血糖最快| 尿黄吃什么药| 刘邦为什么怕吕后| 儿童坐动车需要带什么证件| 手足口病是什么病| 惊为天人是什么意思| 乙肝两对半挂什么科| 容易脸红的人是什么原因| 什么是地震| 头三个月保胎喝什么汤| 眼皮发肿是什么原因| 孕妇为什么不能吃山楂| 解脲脲原体阳性是什么| gmail是什么邮箱| 孕妇吃什么会流产| 梅毒吃什么药最好| 带状疱疹可以吃什么水果| 珩是什么意思| 鼠的本命佛是什么佛| 小姨子是什么关系| 兵痞是什么意思| 2月7日什么星座| 地委书记是什么级别| 疖肿是什么意思| 为什么会得静脉曲张| vogue是什么意思| 男人都是大猪蹄子是什么意思| 夸父为什么要追赶太阳| 什么人不能吃玉米| otc属于什么药| 养什么能清理鱼缸粪便| 腔梗是什么病| 手足口病疫苗什么时候打| 舌质是什么| 中性粒细胞高是什么原因| 睡觉起来头晕什么原因| 城镇户口是什么意思| 跟着好人学好人下句是什么| 意境是什么意思| 为什么眼皮会一直跳| 葡萄糖什么意思| 子夜是指什么时间| 燃气灶什么牌子好| 四肢发达是什么生肖| 为什么吃火龙果会拉肚子| 喝什么茶最养胃| 雅典娜是什么神| 阴虱用什么药最有效| 骨头疼是什么原因| 为什么感冒吃冰棒反而好了| 天网是什么| 胎儿双顶径是什么意思| 闪回是什么意思| 球镜是什么| 丹参的功效与作用是什么| 什么是热病| 什么菜降血压效果最好| 木命人五行缺什么| 教师的职责是什么| 圆房是什么意思| 检点是什么意思| 人格独立是什么意思| 线性骨折是什么意思| 衣带渐宽终不悔是什么意思| 肝脓肿是什么病严重吗| 荷尔蒙是什么东西| 手指僵硬暗示什么疾病| 女人吃藕有什么好处| 710是什么意思| 什么是遗精| 有代沟是什么意思| 淋巴细胞减少说明什么| 什么运动瘦脸| 梦见自己流鼻血是什么预兆| 结扎什么意思| 早上出虚汗是什么原因| 2.25是什么星座| eagle是什么意思| 腔梗是什么意思| 打耳洞不能吃什么| 手上掉皮什么原因| 白雪什么| 角化型脚气用什么药最好| champion什么意思| 电器火灾用什么灭火器| 产生幻觉是什么原因| 流鼻涕吃什么药| 披靡是什么意思| 阴部痒是什么原因| 嘴唇起白皮是什么原因| 打磨工为什么没人干| 肝火旺盛是什么原因引起的| 为什么8到10周容易胎停| 牛肚是牛的什么部位| 嗓子吞咽疼痛吃什么药| imf是什么意思| 胚芽米是什么米| 肌酐偏低是什么意思| 唐伯虎是什么生肖| 慢性心肌炎有什么症状| 什么时候吃苹果最好| 梦到火是什么意思| 神经性头疼是什么原因造成的| 甜五行属什么| 吃什么减肥效果最好最快| 刀伤用什么药愈合最快| 结节病变是什么意思| 什么东西好消化| 恰如其分是什么意思| 尿素偏低是什么原因| 狗牯脑茶属于什么茶| 带状疱疹一般长在什么地方| 相声海清是什么意思| 手术后为什么要平躺6小时| 医共体是什么意思| 窦性心律过缓什么意思| 奥利司他排油是什么油| 天子是什么生肖| 蒙古古代叫什么| 什么是冬虫夏草| 松字五行属什么| 支气管病变什么意思| 老婆子是什么意思| hbcab阳性是什么意思| 空是什么生肖| 怄气是什么意思| 女人舌苔厚白吃什么药| 9月11号是什么星座| 股票pb是什么意思| 阴骘是什么意思| 为什么会尿道感染| 鸡咳嗽吃什么药| 打开心扉是什么意思| 胎菊泡水喝有什么功效| 衣字旁的字和什么有关| 梦见母亲去世预示什么| 无家可归是什么生肖| 什么时候减肥效果最快最好| 暖手宝里面是什么| 呆小症是缺乏什么激素| 心脏跳得快是什么原因| 吃什么药能快速降血压| 凉茶是什么茶| 麾下是什么意思| 阳历10月是什么星座| 心脏t波改变是什么意思| 属羊的跟什么属相犯冲| 喝什么茶去湿气最好| 16年属什么生肖| 中性粒细胞数目偏高是什么意思| 近亲结婚有什么危害| 九月五日是什么节日| 为什么的拼音怎么写| 意气用事是什么意思| 球蛋白偏高说明什么| 声音有磁性是什么意思| 苯海拉明是什么药| 寄生虫感染吃什么药| 蒸蒸日上什么意思| 后悔是什么意思| claire是什么意思| 口若悬河是指什么生肖| 为什么小腿皮肤瘙痒| 牛奶洗脸有什么好处| 和风对什么| 周杰伦的粉丝叫什么| 落叶像什么飘落下来| 广西狗肉节是什么时候| 什么是上升星座| 入党有什么用| ym是什么衣服品牌| 宫内暗区是什么意思| 八月二十六是什么星座| 小t是什么意思| 什么直跳| 屎忽鬼是什么意思| club monaco是什么牌子| 腋下淋巴结挂什么科| 公历是什么意思| 宫颈炎吃什么药效果最好| 银杯子喝水有什么好处| 螃蟹跟什么不能一起吃| 吃什么补充黄体酮| 血糖高的人吃什么| 心脏挂什么科| 按摩头皮有什么好处| 高压氧治疗有什么作用| 小孩小便红色是什么原因| 能够握紧的就别放了是什么歌| 洗衣机什么牌子最好| 环比增长什么意思| 斯德哥尔摩综合征是什么| 腹胀是什么病的前兆| s.m是什么意思| 抗核抗体是检查什么病| 男人吃荔枝有什么好处| 吃什么补胰腺最好| 扫把星代表什么生肖| 姨妈提前是什么原因| 曲拉是什么| 胃不舒服挂什么科| 贾赦和贾政是什么关系| 关节痛去医院挂什么科| 爱被蚊子咬是什么原因| 左室舒张功能减低吃什么药| 永垂不朽是什么意思| 女性得乙肝有什么症状| 湿气重看中医挂什么科| 一字马是什么意思| 植树节是什么季节| 办理暂住证需要什么材料| 一什么荷花| 9月份是什么季节| 医德是什么| 孕晚期白细胞高是什么原因| 基因病是什么意思| 热得像什么| 献血和献血浆有什么区别| 盆浴是什么意思| 小鸭吃什么| 肺结核吃什么食物好| 碳酸氢钠是什么东西| 小姑子是什么关系| 老人说胡话是什么征兆| 过敏忌口不能吃什么| 息肉样增生是什么意思| 为难的难是什么意思| 痔疮吃什么药好得快| 百度

厦门女大学生身陷裸贷自杀亡 校园裸贷如何叫停?

百度 其实归根结底,还是目前诸多国产动画电影的剧本太差,文创团队的创作意愿和动力不强,最后呈现出的动画电影,要么是“小儿科”和“爱说教”成通病,要么是动画电影夹杂着一些“少儿不宜”的恶俗梗,只能让坐在电影院里的孩子大人都尴尬。

A router[a] is a computer and networking device that forwards data packets between computer networks, including internetworks such as the global Internet.[2][3][4]

Rack containing a service-provider–class router connected to multiple networks
A home–class router with wireless capabilities; many home routers like this example combine router, wireless access point, switch and modem into one single unit (see also residential gateway)

Routers perform the "traffic directing" functions on the Internet. A router is connected to two or more data lines from different IP networks. When a data packet comes in on a line, the router reads the network address information in the packet header to determine the ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Data packets are forwarded from one router to another through an internetwork until it reaches its destination node.[5]

The most familiar type of IP routers are home and small office routers that forward IP packets between the home computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks to powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone.

Routers can be built from standard computer parts but are mostly specialized purpose-built computers. Early routers used software-based forwarding, running on a CPU. More sophisticated devices use application-specific integrated circuits (ASICs) to increase performance or add advanced filtering and firewall functionality.

History

edit
 
The first ARPANET router, the Interface Message Processor, was delivered to UCLA August 30, 1969, and went online October 29, 1969.

The concepts of a switching node using software and an interface computer were first proposed by Donald Davies in 1966 for the NPL network.[6][7][8] The same idea was conceived by Wesley Clark the following year for use in the ARPANET, which were named Interface Message Processors (IMPs).[9] The first interface computer was implemented at the National Physical Laboratory in the United Kingdom in early 1969, followed later that year by the IMPs at the University of California, Los Angeles, the Stanford Research Institute, the University of California, Santa Barbara, and the University of Utah School of Computing in the United States.[10][11][12][13] All were built with the Honeywell 516. These computers had fundamentally the same functionality as a router does today.

The idea for a router (called a gateway at the time) initially came about through an international group of computer networking researchers called the International Network Working Group (INWG).[14] These gateway devices were different from most previous packet switching schemes in two ways. First, they connected dissimilar kinds of networks, such as serial lines and local area networks. Second, they were connectionless devices, which had no role in assuring that traffic was delivered reliably, leaving that function entirely to the hosts.[15] This particular idea, the end-to-end principle, was contained in the work of Donald Davies.[16][17]

The concept was explored in practice by various groups, with the intention to produce a working system for internetworking. There were three notable contemporaneous programs. The first was an implementation directed by Louis Pouzin of the CYCLADES network, which was designed and developed during 1972-3.[18][19][20] The second was program at Xerox PARC to explore new networking technologies, which produced the PARC Universal Packet system. Some time after early 1974, the first Xerox routers became operational. Due to corporate intellectual property concerns, it received little attention outside Xerox for years.[21][22] The third was a DARPA-initiated program, which began during 1973-4. This drew on the work of the other two programs,[23] expanded significantly, and went on to create the TCP/IP architecture in use today.[24][25] University College London (UCL) provided a gateway between British research groups and the ARPANET from 1973 until the late 1980s, latterly using SATNET.[26][27][28]

The first true IP router was developed by Ginny Travers at BBN, as part of that DARPA-initiated effort, during 1975–1976.[29][30] By the end of 1976, three PDP-11-based routers were in service in the experimental prototype Internet.[31] Mike Brecia, Ginny Travers, and Bob Hinden received the IEEE Internet Award for early IP routers in 2008.[32]

The first multiprotocol routers were independently created by staff researchers at MIT and Stanford in 1981 and both were also based on PDP-11s. Stanford's router program was led by William Yeager and MIT's by Noel Chiappa.[33][34][35][36] Virtually all networking now uses TCP/IP, but multiprotocol routers are still manufactured. They were important in the early stages of the growth of computer networking when protocols other than TCP/IP were in use. Modern routers that handle both IPv4 and IPv6 are multiprotocol but are simpler devices than ones processing AppleTalk, DECnet, IPX, and Xerox protocols.

From the mid-1970s and in the 1980s, general-purpose minicomputers served as routers. Modern high-speed routers are network processors or highly specialized computers with extra hardware acceleration added to speed both common routing functions, such as packet forwarding, and specialized functions such as IPsec encryption. There is substantial use of Linux and Unix software-based machines, running open source routing code, for research and other applications. The Cisco IOS operating system was independently designed. Major router operating systems, such as Junos and NX-OS, are extensively modified versions of Unix software.

Operation

edit

When multiple routers are used in interconnected networks, the routers can exchange information about destination addresses using a routing protocol. Each router builds up a routing table, a list of routes, between two computer systems on the interconnected networks.[37][38]

The software that runs the router is composed of two functional processing units that operate simultaneously, called planes:[39]

  • Control plane: A router maintains a routing table that lists which route should be used to forward a data packet, and through which physical interface connection. It does this using internal pre-configured directives, called static routes, or by learning routes dynamically using a routing protocol. Static and dynamic routes are stored in the routing table. The control-plane logic then strips non-essential directives from the table and builds a forwarding information base (FIB) to be used by the forwarding plane.
  • Forwarding plane: This unit forwards the data packets between incoming and outgoing interface connections. It reads the header of each packet as it comes in, matches the destination to entries in the FIB supplied by the control plane, and directs the packet to the outgoing network specified in the FIB.

Applications

edit
 
A home or small office DSL router showing the telephone socket (left, white) to connect it to the internet using ADSL, and Ethernet jacks (right, yellow) to connect it to home computers and printers
 
A carrier class router with 10G/40G/100G interfaces and redundant processor/power/fan modules

A router may have interfaces for multiple types of physical layer connections, such as copper cables, fiber optic, or wireless transmission. It can also support multiple network layer transmission standards. Each network interface is used to enable data packets to be forwarded from one transmission system to another. Routers may also be used to connect two or more logical groups of computer devices known as subnets, each with a unique network prefix.

Routers may provide connectivity within enterprises, between enterprises and the Internet, or between internet service providers' (ISPs') networks, they are also responsible for directing data between different networks.[40] The largest routers (such as the Cisco CRS-1 or Juniper PTX) interconnect the various ISPs, or may be used in large enterprise networks.[41] Smaller routers usually provide connectivity for typical home and office networks.

All sizes of routers may be found inside enterprises.[42] The most powerful routers are usually found in ISPs, academic and research facilities. Large businesses may also need more powerful routers to cope with ever-increasing demands of intranet data traffic. A hierarchical internetworking model for interconnecting routers in large networks is in common use.[43] Some routers can connect to Data service units for T1 connections[44][45][46] via serial ports.[47][48]

Access, core and distribution

edit
 
A screenshot of the LuCI web interface used by OpenWrt. This page configures Dynamic DNS.

The hierarchical internetworking model divides enterprise networks into three layers: core, distribution, and access.

Access routers, including small office/home office (SOHO) models, are located at home and customer sites such as branch offices that do not need hierarchical routing of their own. Typically, they are optimized for low cost. Some SOHO routers are capable of running alternative free Linux-based firmware like Tomato, OpenWrt, or DD-WRT.[49]

Distribution routers aggregate traffic from multiple access routers. Distribution routers are often responsible for enforcing quality of service across a wide area network (WAN), so they may have considerable memory installed, multiple WAN interface connections, and substantial onboard data processing routines. They may also provide connectivity to groups of file servers or other external networks.[50]

In enterprises, a core router may provide a collapsed backbone interconnecting the distribution tier routers from multiple buildings of a campus, or large enterprise locations. They tend to be optimized for high bandwidth but lack some of the features of edge routers.[51]

Security

edit

External networks must be carefully considered as part of the overall security strategy of the local network. A router may include a firewall, VPN handling, and other security functions, or they may be handled by separate devices. Routers also commonly perform network address translation which restricts connections initiated from external connections but is not recognized as a security feature by all experts.[52] Some experts argue that open source routers are more secure and reliable than closed source routers because errors and potentially exploitable vulnerabilities are more likely to be discovered and addressed in an open-source environment.[53][54]

Routing different networks

edit

Routers are also often distinguished on the basis of the network in which they operate. A router in a local area network (LAN) of a single organization is called an interior router. A router that is operated in the Internet backbone is described as exterior router. While a router that connects a LAN with the Internet or a wide area network (WAN) is called a border router, or gateway router.[55]

Internet connectivity and internal use

edit

Routers intended for ISP and major enterprise connectivity usually exchange routing information using the Border Gateway Protocol (BGP). RFC 4098 defines the types of BGP routers according to their functions:[56]

  • Edge router or inter-AS border router: Placed at the edge of an ISP network, where the router is used to peer with the upstream IP transit providers, bilateral peers through IXP, private peering (or even settlement-free peering) through Private Network Interconnect (PNI) via the extensive use of Exterior Border Gateway Protocol (eBGP).[57]
  • Provider Router (P): A Provider router is also called a transit-router, it sits in an MPLS network and is responsible for establishing label-switched paths between the PE routers.[58]
  • Provider edge router (PE): An MPLS-specific router in the network's access layer that interconnects with customer edge routers to provide layer 2 or layer 3 VPN services.[58]
  • Customer edge router (CE): Located at the edge of the subscriber's network, it interconnects with the PE router for L2VPN services, or direct layer 3 IP hand-off in the case of Dedicated Internet Access, if IP Transit services are provided through an MPLS core, the CE peers with the PE using eBGP with the public ASNs of each respective network. In the case of L3VPN services the CE can exchange routes with the PE using eBGP. It is commonly used in both service provider and enterprise or data center organizations.[58]
  • Core router: Resides within an Autonomous System as a backbone to carry traffic between edge routers.[59]
  • Within an ISP: In the ISP's autonomous system, a router uses internal BGP to communicate with other ISP edge routers, other intranet core routers, or the ISP's intranet provider border routers.
  • Internet backbone: The Internet no longer has a clearly identifiable backbone, unlike its predecessor networks. See default-free zone (DFZ). The major ISPs' system routers make up what could be considered to be the current Internet backbone core.[60] ISPs operate all four types of the BGP routers described here. An ISP core router is used to interconnect its edge and border routers. Core routers may also have specialized functions in virtual private networks based on a combination of BGP and Multiprotocol Label Switching protocols.[61]
  • Port forwarding: In some networks, that rely on legacy IPv4 and NAT, routers (often labeled as NAT boxes) are also used for port forwarding configuration between RFC1918 address space and their publicly assigned IPv4 address.[42]
  • Voice, data, fax, and video processing routers: Commonly referred to as access servers or gateways, these devices are used to route and process voice, data, video and fax traffic on the Internet. Since 2005, most long-distance phone calls have been processed as IP traffic (VOIP) through a voice gateway. Use of access server-type routers expanded with the advent of the Internet, first with dial-up access and another resurgence with voice phone service.
  • Larger networks commonly use multilayer switches, with layer-3 devices being used to simply interconnect multiple subnets within the same security zone, and higher-layer switches when filtering, translation, load balancing, or other higher-level functions are required, especially between zones.

Wi-Fi routers

edit

Wi-Fi routers combine the functions of a router with those of a wireless access point. They are typically devices with a small form factor, operating on the standard electric power supply for residential use. Connected to the Internet as offered by an Internet service provider, they provide Internet access through a wireless network for home or office use.

Forwarding

edit

The main purpose of a router is to connect multiple networks and forward packets destined either for directly attached networks or more remote networks. A router is considered a layer-3 device because its primary forwarding decision is based on the information in the layer-3 IP packet, specifically the destination IP address. When a router receives a packet, it searches its routing table to find the best match between the destination IP address of the packet and one of the addresses in the routing table. Once a match is found, the packet is encapsulated in the layer-2 data link frame for the outgoing interface indicated in the table entry. A router typically does not look into the packet payload,[62] but only at the layer-3 addresses to make a forwarding decision, plus optionally other information in the header for hints on, for example, quality of service (QoS). For pure IP forwarding, a router is designed to minimize the state information associated with individual packets.[63] Once a packet is forwarded, the router does not retain any historical information about the packet.[b]

The routing table itself can contain information derived from a variety of sources, such as a default or static routes that are configured manually, or dynamic entries from routing protocols where the router learns routes from other routers. A default route is one that is used to route all traffic whose destination does not otherwise appear in the routing table; it is common – even necessary – in small networks, such as a home or small business where the default route simply sends all non-local traffic to the Internet service provider. The default route can be manually configured (as a static route); learned by dynamic routing protocols; or be obtained by DHCP.[c][64]

A router can run more than one routing protocol at a time, particularly if it serves as an autonomous system border router between parts of a network that run different routing protocols; if it does so, then redistribution may be used (usually selectively) to share information between the different protocols running on the same router.[65]

Besides deciding to which interface a packet is forwarded, which is handled primarily via the routing table, a router also has to manage congestion when packets arrive at a rate higher than the router can process. Three policies commonly used are tail drop, random early detection (RED), and weighted random early detection (WRED). Tail drop is the simplest and most easily implemented: the router simply drops new incoming packets once buffer space in the router is exhausted. RED probabilistically drops datagrams early when the queue exceeds a pre-configured portion of the buffer, until reaching a pre-determined maximum, when it drops all incoming packets, thus reverting to tail drop. WRED can be configured to drop packets more readily dependent on the type of traffic.

Another function a router performs is traffic classification and deciding which packet should be processed first. This is managed through QoS, which is critical when Voice over IP is deployed, so as not to introduce excessive latency.[66]

Yet another function a router performs is called policy-based routing where special rules are constructed to override the rules derived from the routing table when a packet forwarding decision is made.[67]

Some of the functions may be performed through an application-specific integrated circuit (ASIC) to avoid the overhead of scheduling CPU time to process the packets. Others may have to be performed through the CPU as these packets need special attention that cannot be handled by an ASIC.[68]

See also

edit

Notes

edit
  1. ^ Pronounced /?ru?t?r/ in British English, /?ra?t?r/ in American and Australian English.[1]
  2. ^ In some router implementations, the forwarding action can increment a counter associated with the routing table entry for the collection of statistical data.
  3. ^ A router can serve as a DHCP client or as a DHCP server.

References

edit
  1. ^ "router". Oxford English Dictionary (Online ed.). Oxford University Press. (Subscription or participating institution membership required.)
  2. ^ "A Router is a Computer". Cisco Network Academy. Archived from the original on 2025-08-07.
  3. ^ Medhi, Deepankar; Ramasamy, Karthik (2007). Network Routing: Algorithms, Protocols, and Architectures. Elsevier. p. 19. ISBN 9780120885886.
  4. ^ Kundu, Sudakshina (2009). Fundamentals of Computer Networks, 2nd Ed. New Delhi: PHI Learning. pp. 85–86, 124. ISBN 9788120334526.
  5. ^ "Overview Of Key Routing Protocol Concepts: Architectures, Protocol Types, Algorithms and Metrics". Tcpipguide.com. Archived from the original on 20 December 2010. Retrieved 15 January 2011.
  6. ^ Davies, D. W. (1966). "Proposal for a Digital Communication Network" (PDF).
  7. ^ Roberts, Dr. Lawrence G. (May 1995). "The ARPANET & Computer Networks". Archived from the original on 24 March 2016. Retrieved 13 April 2016. Then in June 1966, Davies wrote a second internal paper, "Proposal for a Digital Communication Network" In which he coined the word packet,- a small sub part of the message the user wants to send, and also introduced the concept of an interface computer to sit between the user equipment and the packet network.
  8. ^ Pelkey, James (2007). Entrepreneurial Capitalism & Innovation: A History of Computer Communications 1968 - 1988. Retrieved 2025-08-07. paper dated June 1966 ... introduced the concept of an "interface computer" to sit between the user equipment and the packet network.
  9. ^ Pelkey, James. "4.7 Planning the ARPANET: 1967-1968 in Chapter 4 - Networking: Vision and Packet Switching 1959 - 1968". The History of Computer Communications. Archived from the original on December 23, 2022. Retrieved May 9, 2023.
  10. ^ John S, Quarterman; Josiah C, Hoskins (1986). "Notable computer networks". Communications of the ACM. 29 (10): 932–971. doi:10.1145/6617.6618. S2CID 25341056. The first packet-switching network was implemented at the National Physical Laboratories in the United Kingdom. It was quickly followed by the ARPANET in 1969.
  11. ^ Scantlebury, Roger (2001). A Brief History of the NPL Network. Symposium of the Institution of Analysts & Programmers 2001. Archived from the original on 2025-08-07. Retrieved 2025-08-07. The system first went 'live' early in 1969
  12. ^ Haughney Dare-Bryan, Christine (June 22, 2023). Computer Freaks (Podcast). Chapter Two: In the Air. Inc. Magazine. 35:55 minutes in. Leonard Kleinrock: Donald Davies ... did make a single node packet switch before ARPA did
  13. ^ Hempstead, C.; Worthington, W., eds. (2005). Encyclopedia of 20th-Century Technology. Routledge. pp. 573–5. ISBN 9781135455514. Retrieved 2025-08-07.
  14. ^ Davies, Shanks, Heart, Barker, Despres, Detwiler and Riml, "Report of Subgroup 1 on Communication System", INWG Note No. 1.
  15. ^ Edmondson-Yurkanan, Chris (2007). "SIGCOMM's archaeological journey into networking's past". Communications of the ACM. 50 (5): 63–68. doi:10.1145/1230819.1230840. ISSN 0001-0782. INWG#1: Report of Subgroup 1 on Communication System Requirements by Davies, Shanks, Heart, Barker, Despres, Detwiler, and Riml. They wrote: "It was agreed that interworkingbetween packet switching networks should not add complications to the hosts, considering that networks will probably be different and thus gateways between networks will be required. These gateways should be as uncomplicated as possible, whilst allowing as much freedom as possible for the design of individual networks". INWG#1 clarified that gateways and simplicity were accepted concepts when INWG was formed.
  16. ^ Davies, Donald; Bartlett, Keith; Scantlebury, Roger; Wilkinson, Peter (October 1967). A Digital Communication Network for Computers Giving Rapid Response at remote Terminals (PDF). ACM Symposium on Operating Systems Principles. Archived (PDF) from the original on 2025-08-07. Retrieved 2025-08-07. It is thought that all users of the network will provide themselves with some kind of error control and that without difficulty this could be made to show up a missing packet. Because of this, loss of packets, if it is sufficiently rare, can be tolerated.
  17. ^ Pelkey, James. "8.3 CYCLADES Network and Louis Pouzin 1971–1972". Entrepreneurial Capitalism and Innovation: A History of Computer Communications 1968–1988. The inspiration for datagrams had two sources. One was Donald Davies' studies. He had done some simulation of datagram networks, although he had not built any, and it looked technically viable. The second inspiration was I like things simple. I didn't see any real technical motivation to overlay two levels of end-to-end protocols. I thought one was enough.
  18. ^ Russell, Andrew L.; Schafer, Valérie (2014). "In the Shadow of ARPANET and Internet: Louis Pouzin and the Cyclades Network in the 1970s". Technology and Culture. 55 (4): 880–907. doi:10.1353/tech.2014.0096. ISSN 0040-165X. JSTOR 24468474.
  19. ^ Green, Lelia (2010). The internet: an introduction to new media. Berg new media series. Berg. p. 31. ISBN 978-1-84788-299-8. OCLC 504280762. The original ARPANET design had made data integrity part of the IMP's store-and-forward role, but Cyclades end-to-end protocol greatly simplified the packet switching operations of the network. ... The idea was to adopt several principles from Cyclades and invert the ARPANET model to minimise international differences.
  20. ^ Bennett, Richard (September 2009). "Designed for Change: End-to-End Arguments, Internet Innovation, and the Net Neutrality Debate" (PDF). Information Technology and Innovation Foundation. pp. 7, 9, 11. Retrieved 11 September 2017. Two significant packet networks preceded the TCP/IP Internet: ARPANET and CYCLADES. The designers of the Internet borrowed heavily from these systems, especially CYCLADES ... The first end-to-end research network was CYCLADES, designed by Louis Pouzin at IRIA in France with the support of BBN's Dave Walden and Alex McKenzie and deployed beginning in 1972.
  21. ^ Taylor, Bob (October 11, 2008), "Oral History of Robert (Bob) W. Taylor" (PDF), Computer History Museum Archive, CHM Reference number: X5059.2009: 28
  22. ^ David Boggs, John Shoch, Edward Taft, Robert Metcalfe, "Pup: An Internetwork Architecture", IEEE Transactions on Communications, Volume 28, Issue 4, April 1980, pp. 612- 624.
  23. ^ Cerf, V.; Kahn, R. (1974). "A Protocol for Packet Network Intercommunication" (PDF). IEEE Transactions on Communications. 22 (5): 637–648. doi:10.1109/TCOM.1974.1092259. ISSN 1558-0857. The authors wish to thank a number of colleagues for helpful comments during early discussions of international network protocols, especially R. Metcalfe, R. Scantlebury, D. Walden, and H. Zimmerman; D. Davies and L. Pouzin who constructively commented on the fragmentation and accounting issues; and S. Crocker who commented on the creation and destruction of associations.
  24. ^ Ethics and the Internet. January 1989. doi:10.17487/RFC1087. RFC 1087. At great human and economic cost, resources drawn from the U.S. Government, industry and the academic community have been assembled into a collection of interconnected networks called the Internet.
  25. ^ 30 Years of RFCs. 7 April 1999. doi:10.17487/RFC2555. RFC 2555. Reflections - Joyce K. Reynolds: A very long time ago when I was dabbling in IP network number and protocol parameter assignments with Jon Postel, gateways were still "dumb", the Exterior Gateway Protocol (EGP) was in its infancy and TOPS-20 was in its heyday.
  26. ^ Kirstein, P.T. (1999). "Early experiences with the Arpanet and Internet in the United Kingdom". IEEE Annals of the History of Computing. 21 (1): 38–44. doi:10.1109/85.759368. S2CID 1558618.
  27. ^ Routing and Access Control in UK to US Services. IEN 190.
  28. ^ Kirstein, P. T. (December 1984). "The University College London International Computer Communications Interconnection Service" (PDF). Internal Working Paper.
  29. ^ "Virginia Travers". Internet Hall of Fame. Retrieved 2025-08-07.
  30. ^ "Ms. Ginny Strazisar". IT History Society. 21 December 2015. Archived from the original on 1 December 2017. Retrieved 21 November 2017.
  31. ^ Craig Partridge, S. Blumenthal, "Data networking at BBN"; IEEE Annals of the History of Computing, Volume 28, Issue 1; January–March 2006.
  32. ^ "IEEE INTERNET AWARD RECIPIENTS" (PDF).
  33. ^ Valley of the Nerds: Who Really Invented the Multiprotocol Router, and Why Should We Care? Archived 2025-08-07 at the Wayback Machine, Public Broadcasting Service, Accessed August 11, 2007.
  34. ^ Router Man Archived 2025-08-07 at the Wayback Machine, NetworkWorld, Accessed June 22, 2007.
  35. ^ David D. Clark, "M.I.T. Campus Network Implementation", CCNG-2, Campus Computer Network Group, M.I.T., Cambridge, 1982; pp. 26.
  36. ^ Pete Carey, "A Start-Up's True Tale: Often-told story of Cisco's launch leaves out the drama, intrigue", San Jose Mercury News, December 1, 2001.
  37. ^ "Cisco Networking Academy's Introduction to Routing Dynamically". Cisco. Archived from the original on October 27, 2015. Retrieved August 1, 2015.
  38. ^ "What Is Routing?". Cisco. 2025-08-07. Retrieved 2025-08-07. Routing tables can be created manually and "learned" by software as it observes network traffic, or they can be built according to routing protocols.
  39. ^ H. Khosravi & T. Anderson (November 2003). Requirements for Separation of IP Control and Forwarding. doi:10.17487/RFC3654. RFC 3654.
  40. ^ "Which networking component is responsible for directing data between different networks - ITEagers". ITEagers. Retrieved 2025-08-07.
  41. ^ "Setting uo Netflow on Cisco Routers". MY-Technet.com date unknown. Archived from the original on 14 July 2011. Retrieved 15 January 2011.
  42. ^ a b "Windows Home Server: Router Setup". Microsoft Technet 14 Aug 2010. Archived from the original on 22 December 2010. Retrieved 15 January 2011.
  43. ^ Oppenheimer, Pr (2004). Top-Down Network Design. Indianapolis: Cisco Press. ISBN 978-1-58705-152-4.
  44. ^ Beasley, Jeffrey S.; Nilkaew, Piyasat (5 November 2012). A Practical Guide to Advanced Networking. Pearson Education. ISBN 978-0-13-335400-3.
  45. ^ Lawson, Wayne (8 February 2001). Configuring Cisco AVVID. Elsevier. ISBN 978-0-08-047673-5.
  46. ^ "Computerworld". 23 January 1995.
  47. ^ "Serial Interface Cards".
  48. ^ "Serial Network Modules".
  49. ^ "SOHO Network Requirements Planning and Implementation". ExamCollection. Retrieved 2025-08-07.
  50. ^ "How Do WiFi Extenders Work? Repeater, Booster, Extender?". ISP Family. 2025-08-07. Retrieved 2025-08-07.
  51. ^ "Hierarchical Network Design Overview (1.1) > Cisco Networking Academy Connecting Networks Companion Guide: Hierarchical Network Design | Cisco Press". www.ciscopress.com. Retrieved 2025-08-07.
  52. ^ "Security Considerations Of NAT" (PDF). University of Michigan. Archived from the original (PDF) on October 18, 2014.
  53. ^ "Global Internet Experts Reveal Plan for More Secure, Reliable Wi-Fi Routers - and Internet" (Press release). 14 October 2015. Archived from the original on 2025-08-07.
  54. ^ "Is Open Source Software More Secure than Proprietary Products?". GovTech. 2025-08-07. Retrieved 2025-08-07.
  55. ^ Tamara Dean (2009). Network+ Guide to Networks. Cengage Learning. p. 272. ISBN 9781423902454.
  56. ^ H. Berkowitz; et al. (June 2005). Terminology for Benchmarking BGP Device Convergence in the Control Plane. doi:10.17487/RFC4098. RFC 4098.
  57. ^ "What is the primary role of a router placed at the edge of an ISP network engaging in peering with upstream IP transit providers through eBGP - ITEagers". ITEagers. Retrieved 2025-08-07.
  58. ^ a b c Rekhter, Yakov; Rosen, Eric C. (February 2006). BGP/MPLS IP Virtual Private Networks (VPNs) (Report). Internet Engineering Task Force.
  59. ^ "M160 Internet Backbone Router" (PDF). Juniper Networks. Archived (PDF) from the original on 20 September 2011. Retrieved 15 January 2011.
  60. ^ "Virtual Backbone Routers" (PDF). IronBridge Networks, Inc. September, 2000. Archived (PDF) from the original on 16 July 2011. Retrieved 15 January 2011.
  61. ^ E. Rosen; Y. Rekhter (April 2004). BGP/MPLS VPNs.
  62. ^ "Packet Forwarding and Routing on IPv4 Networks - System Administration Guide: IP Services". docs.oracle.com. Retrieved 2025-08-07.
  63. ^ Roberts, Lawrence (22 July 2003). "The Next Generation of IP - Flow Routing". Archived from the original on 4 April 2015. Retrieved 22 February 2015.
  64. ^ David Davis (April 19, 2007). "Cisco administration 101: What you need to know about default routes". Archived from the original on June 25, 2014. Retrieved June 5, 2014.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  65. ^ Diane Teare (March 2013). Implementing Cisco IP Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334.
  66. ^ Donahue, Gary A. (2025-08-07). Network Warrior. "O'Reilly Media, Inc.". ISBN 978-0-596-10151-0.
  67. ^ Diane Teare (March 2013). "Chapter 5: Implementing Path Control". Implementing Cisco IP-Routing (ROUTE): Foundation Learning Guide. Cisco Press. pp. 330–334.
  68. ^ Schudel, Gregg; Smith, David (2025-08-07). Router Security Strategies: Securing IP Network Traffic Planes. Pearson Education. ISBN 978-0-13-279673-6.
edit
一个虫一个合读什么 喉炎雾化用什么药 黑户是什么意思 毛豆不能和什么一起吃 金火什么字
肺动脉流的是什么血 什么是牙槽骨突出图片 什么鱼没有刺 diff是什么意思 耐受性是什么意思
lov是什么意思 心脏造影是什么 鼻子闻不到味道是什么原因 家宴是什么意思 脚底痛挂什么科
大德是什么意思 谜底是什么意思 bell什么意思 殳是什么意思 重庆的市花是什么
附睾炎吃什么药最有效cl108k.com 胃疼胃胀吃什么药hcv9jop5ns0r.cn 肾结石是由什么原因引起的hcv9jop3ns5r.cn 鳞状上皮内低度病变是什么意思hcv7jop9ns1r.cn 球迷是什么意思hcv8jop1ns9r.cn
什么是破窗效应hcv8jop5ns9r.cn 尿蛋白质阳性什么意思hcv9jop7ns1r.cn 腔梗和脑梗有什么区别hcv9jop3ns6r.cn 合加龙是什么字hcv7jop7ns3r.cn 永加日念什么hcv8jop7ns0r.cn
无缘无故吐血是什么原因96micro.com 血燥吃什么好hcv9jop0ns9r.cn 榨菜炒什么好吃hcv8jop3ns2r.cn 喉咙看什么科hcv8jop2ns4r.cn 身先士卒是什么意思hcv7jop5ns2r.cn
颞下颌关节紊乱挂什么科hcv7jop7ns3r.cn 梦见好多水是什么预兆hcv9jop1ns6r.cn 前列腺增大是什么意思hcv8jop4ns1r.cn 退休是什么意思hcv8jop8ns4r.cn 智能眼镜有什么功能hcv9jop5ns9r.cn
百度