In any type of IT Infrastructure, the network component is of utmost importance. After all, it is at this level where all communications and data packet traffic transpires for employees and even individuals to access shared resources from a central server. There are many components that go into this, such as Firewalls, Routers, Switches, Hubs, Bridges, Virtual Private Networks, Network Amplifiers, etc.
However, in this article, we focus primarily on two specific devices, that you, the Security+ cert holder need to have a strong grasp of:
Routers Switches What a Router IsA Router can be specifically defined as follows:
“A router is a device that directs data traffic along specific routes. A router sends information, such as email and the content of web pages, between your computer and the network server. A router is also the device that keeps single computers, or entire networks, connected to the internet.”
( SOURCE: https://www.digitalunite.com/guides/using-internet-0/connecting-internet/what-router )
Based from the definition, a Router essentially connects and communicates with all devices (such as the workstations, servers, and even the wireless devices) that are an in the internal network, such as the corporate intranet in an organization. From there, it also connects this intranet to the “outside world” so that network communications can transpire all over the world.
In a way, it is very similar to that of a network modem, which is very commonly used in home-based networks. For example, to get access to the Internet, the computer must be connected to this modem, whether it is hard-wired, or wireless. However, a Router is unique in the sense that it consists of other features that make it more sophisticated than that of the traditional network modem. For example:
It forwards the data packets to the correct TCP/IP address of the device in question; a Routing Table is used for this very purpose. It provides network traffic segmentation, and also segregates amongst different multiple broadcast domains. This simply means that the Router can be used as an effective tool to divide up a complex network structure. It defines network layer addressing subnets. A subnet is a uniquely identifiable segment in an entire network. It also acts as a “Gateway;” meaning, it can connect the various subnets to together, and even be used to connect to a specific network that is outside of the internal network. It facilitates communications with another network that are non-Ethernet based, such as those that are based upon serial interfaces, DSL connections, and other forms of WAN connectivity. It can also act as a sophisticated Firewall, in that it examines for all incoming data packets. If any of them appear to be malformed or suspicious, it will discard them immediately before they can penetrate the corporate Intranet.An example of a wireless Router can be seen below:

An example of a Router being used as a Gateway is illustrated below:

The Routing Table
As mentioned, one of the most critical functions of the Router is to send the network communications and its associated data packets to the proper device. This is done via the “Routing Table.” It can be technically defined as follows:
“A routing table is a datafile that acts as a map and is often installed on a router. The routing table contains information about various routes between devices to present the most efficient paths for data packets.”
(SOURCE: https://www.techopedia.com/definition/15720/routing-table ).
To illustrate this point, suppose that Company ABC is connected to the outside internet, and is located at Point A. A remote office is located at Point B, thousands of miles away. The remote employee at this location wishes to send a file to a co-worker at Point A. Once this message has been sent at arrives at the perimeter of Company ABC’s network, the Router will first inspect the data packets to make sure that there are no malformed or malicious ones.
If there are none, it will then accept these data packets that constitute the file and look up the destination TCP/IP Address of the recipient in the Routing Table. Once that has been determined, the Router will then transmit those data packets to the right device so that the file can appropriately receive and safely opened.
An example of a Routing Table as seen through the Command Line Interface is illustrated below:

What a Switch Is
A Switch can be technically defined as follows:
“Anetwork switchis anetworking devicethat connects devices together on acomputer networkby usingpacket switchingto receive, process, and forward data to the destination device.”
(SOURCE: https://en.wikipedia.org/wiki/Network_switch )
In this regard, a Switch can be considered as a subcomponent to that of the Router. For example, it is the Router that connects Wide Area Networks (WANs) together, and it is the Switch that connects the Local Area Networks (LANs) together, and all the devices that reside in them.
To further illustrate, suppose that Company ABC has remote offices all over the world. These remote offices will be on a WAN that is different from the WAN that Company ABC is on. It is the Router that connects these separate WANs together.
Further, within a WAN, there will be smaller network segments (as mentioned, it is the subnet that uniquely identifies these segments) known as LAN’s. It is on the LAN that the various devices are networked amongst each other and communicate.
In our previous example, although the Router can send the file directly to the recipient based from the Routing Table, it will be much more efficient from a network optimization perspective to send to forward it to the Switch. Then from there, the Switch can then transmit that file to the correct recipient.
This is exemplified in the illustration below:

As can be seen, it is the switch that creates the network. From there, it is then the Router that connects the network by linking up the two servers together which are located in different WANs. It is important to note that a Switch should not be confused with a “Hub.”
In our previous illustration, the Hub would actually send that specific file to all of the devices that interlinked together in the same LAN. However, it is the Switch that can intelligently decide as to where the file needs to be forwarded (or sent) to a specific device. In this regard, a Switch is often referred to as an “Intelligent Device.”
In this regard, a Switch can also “learn” over time the Media Control Address (MAC) Addresses of each device that is networked to. A MAC Address is the actual physical address of the device in question, and the TCP/IP Address is the network address of it . The MAC Address is stor