{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"hvordan-fungerer-netvaerk","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/","title":{"rendered":"Grundl\u00e6ggende netv\u00e6rk: Hvordan fungerer netv\u00e6rk?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Et netv\u00e6rk er et system af sammenkoblede enheder, der udveksler information med hinanden for at fungere korrekt. Dette kan omfatte b\u00e6rbare computere, servere, smartphones og mere. Enhederne kommunikerer med hinanden over specielle netv\u00e6rk kendt som routere og switches. Efterh\u00e5nden som antallet af enheder, der er forbundet til internettet, forts\u00e6tter med at vokse, er det vigtigt at forst\u00e5, hvordan de kommunikerer med hinanden. I denne artikel ser vi n\u00e6rmere p\u00e5 de forskellige netv\u00e6rkskomponenter, og hvordan de arbejder sammen for at give os mulighed for at surfe p\u00e5 nettet, sende e-mails og mere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Der findes forskellige typer netv\u00e6rk, som hver is\u00e6r har forskellig d\u00e6kningsgrad. Lad os begynde med at udforske de forskellige typer af netv\u00e6rk:<\/span><\/p>\n<h2><b>Netv\u00e6rkstyper:<\/b><\/h2>\n<h3><b>LAN - Lokalt netv\u00e6rk<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Et LAN, eller Local Area Network, er en mindre netv\u00e6rkstype og er begr\u00e6nset til en organisation eller et hjem. For eksempel er antallet af enheder, der er forbundet til dit hjemmenetv\u00e6rk, begr\u00e6nset i forhold til en anden netv\u00e6rkstype. Selv om et skolenetv\u00e6rk er st\u00f8rre end et hjemmenetv\u00e6rk, betragtes det stadig som et LAN, fordi det forbinder mange enheder inden for samme fysiske omr\u00e5de. Det omfatter computere, servere osv.<\/span><\/p>\n<h3><b>MAN - Metropolitan Area Network<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">MAN er et udvidet netv\u00e6rk, der d\u00e6kker hele byen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ved at kombinere og forbinde flere netv\u00e6rk i en by danner vi et MAN- eller storbynetv\u00e6rk. Denne type netv\u00e6rk er mere omfattende og d\u00e6kker en hel by. En type netv\u00e6rk, der tilbyder relativt hurtigere datahastigheder end den gennemsnitlige internetforbindelse, kaldes et Metropolitan Area Network eller MAN.<\/span><\/p>\n<h3><b>WAN - Wide area netv\u00e6rk<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Et WAN (wide area network) er et stort computernetv\u00e6rk, der forbinder mindre netv\u00e6rk som LAN'er (local area networks).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Et WAN er et netv\u00e6rk, der forbinder mange byer eller lande med hinanden, s\u00e5 folk nemt kan bruge internettet eller kommunikere med hinanden p\u00e5 tv\u00e6rs af et stort omr\u00e5de. N\u00e5r flere LAN'er i en organisation er forbundet med hinanden, danner det et WAN.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Dybest set er internettet et verdensomsp\u00e6ndende netv\u00e6rk (WWAN).<\/span><\/p>\n<h3><b>WLAN - Tr\u00e5dl\u00f8st LAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Et tr\u00e5dl\u00f8st LAN, eller kort sagt Wi-Fi, er et netv\u00e6rk, der typisk oprettes af vores hjemmerouter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Et WLAN er en type LAN, som vi kan oprette tr\u00e5dl\u00f8s forbindelse til fra vores smartphones, tablets, b\u00e6rbare computere eller andre enheder. Det tr\u00e5dl\u00f8se milj\u00f8, som bruger radiob\u00f8lger til at overf\u00f8re data i stedet for kabler eller andre fysiske medier, har andre egenskaber end det kabelbaserede netv\u00e6rk med hensyn til hastighed, sikkerhed og d\u00e6kning. En af de bedste fordele ved tr\u00e5dl\u00f8s forbindelse er, at den er meget fleksibel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ud over de netv\u00e6rkstyper, der er n\u00e6vnt ovenfor, findes der andre netv\u00e6rk af forskellig st\u00f8rrelse eller med forskellige form\u00e5l. For eksempel,<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN - Storage Area Network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN - Enterprise Private Network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN - Virtuelt privat netv\u00e6rk.<\/span><\/li>\n<\/ul>\n<h2><b>Netv\u00e6rk kan repr\u00e6senteres p\u00e5 to m\u00e5der:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Netv\u00e6rk repr\u00e6senteres typisk af en \"netv\u00e6rkstopologi\", som henviser til den m\u00e5de, enhederne p\u00e5 netv\u00e6rket er forbundet p\u00e5. Der er to hovedtyper af netv\u00e6rkstopologier: logiske og fysiske.<\/span><\/p>\n<h3><b>Logiske topologier<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Logiske topologier illustrerer de logiske aspekter af et netv\u00e6rk, f.eks. IP-adresser, forbindelsen mellem enheder og de anvendte routingprotokoller.<\/span><\/p>\n<h3><b>Fysisk topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Et netv\u00e6rks fysiske topologi er den m\u00e5de, det fysisk er arrangeret p\u00e5. Det omfatter, hvor enhederne er placeret, hvilken type kabler der bruges, hvor mange porte der er brug for, og hvilke porte\/switche serverne skal forbindes til. Den fysiske topologi er et diagram, der viser udstyrets placering og form\u00e5l i netv\u00e6rket.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Men form\u00e5let med en enhed vil resultere i forskellige netv\u00e6rkstopologier.<\/span><\/p>\n<h2><b>Netv\u00e6rkstopologier<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Der kan v\u00e6re flere m\u00e5der at repr\u00e6sentere enheder p\u00e5 i et netv\u00e6rksmilj\u00f8. De kan grupperes ud fra deres forskellige form\u00e5l.<\/span><\/p>\n<h3><b>Stjernelignende topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Den mest popul\u00e6re topologi, der bruges til LAN, er stjernetopologien. Stjernetopologi fungerer bedst til mindre netv\u00e6rk, som dem, der bruges af sm\u00e5 virksomheder.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hvis vi f.eks. kun har brug for netv\u00e6rksforbindelse eller internetadgang, kan vi gruppere enhederne i en stjernelignende topologi. Alle maskinerne i dette netv\u00e6rk er forbundet til den centrale HUB. Hvis en node fejler, skader det ikke hele netv\u00e6rket, fordi de er meget nemme at vedligeholde og klassificere.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Problemet med dette scenarie er imidlertid manglen p\u00e5 redundans, som er afg\u00f8rende for computernetv\u00e6rk.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"Stjernelignende topologi\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>Mesh-topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En Mesh-topologi er bedst til et p\u00e5lideligt netv\u00e6rk, som f.eks. en ISP - internetudbyder. Med dette design er alt sikkerhedskopieret. S\u00e5 hvis der g\u00e5r noget galt med et kabel eller en switch, er der andre m\u00e5der at f\u00e5 adgang til internettet p\u00e5, eller hvor du end fors\u00f8ger at oprette forbindelse. Husk, at fuld redundans betyder, at du skal bruge flere enheder og l\u00e6ngere kabler, hvilket er ensbetydende med h\u00f8jere omkostninger. En fuld Mesh-topologi koster generelt mere at implementere end en stjernetopologi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nogle eksempler p\u00e5 mesh-topologi er Google Wi-Fi, Google Home eller netv\u00e6rk i milit\u00e6re enheder.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"Mesh-topologi\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>Topologi med delvist net<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Partial Mesh-topologien er en mere overkommelig netv\u00e6rkstopologi, der kun giver redundans til nogle af switchene og dele af netv\u00e6rket. De andre switche har ingen alternative veje.<\/span><\/p>\n<h3><b>Topologi med nav og eger<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hub and Spoke-topologien bruges ofte i WAN-design (internet). De tre routere i denne topologi kender som standard ikke hinanden. For at data kan n\u00e5 frem til deres destination, skal b\u00e5de R1 og R3 sende deres trafik til R2, som ved, hvordan den skal omdirigeres korrekt. Hvis R1 f.eks. vil sende trafik til R3, g\u00f8r de det ved at sende den gennem hubben (R2). Hub'en ved s\u00e5, hvordan den skal behandle og omdirigere trafikken.<\/span><\/p>\n<h2><b>Netv\u00e6rkskomponenter<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">De brikker, der tilsammen udg\u00f8r et netv\u00e6rk, er:<\/span><\/p>\n<h3><b>Slut-enhed<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Enhver fysisk enhed, vi bruger til at oprette forbindelse til internettet, kaldes en slutenhed. Det omfatter pc'er, b\u00e6rbare computere, smartphones, servere og meget mere. Forbindelsen kan skabes gennem flere kanaler, f.eks. elektricitet, lysimpulser eller radiob\u00f8lger. Vi kan oprette tr\u00e5dl\u00f8s forbindelse til internettet fra vores smartphones, b\u00e6rbare computere og pc'er. Hvis vi bruger en b\u00e6rbar computer eller pc, kan vi ogs\u00e5 bruge et netv\u00e6rkskabel (UTP).<\/span><\/p>\n<h3><b>Skift<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En switch forbinder flere slutenheder, f.eks. computere og printere, i et netv\u00e6rk (LAN).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Denne enhed er popul\u00e6r p\u00e5 grund af dens evne til at h\u00e5ndtere mange porte med hastigheder p\u00e5 mellem 1 og 10 Gbps pr. port. Switchen bruger MAC-adresser til at identificere de slutenheder, der er tilsluttet netv\u00e6rket. Det g\u00f8r det nemt for dig at spore, hvilke enheder der er forbundet til dit netv\u00e6rk, og sikrer, at kun autoriserede enheder har adgang til dine data.<\/span><\/p>\n<h3><b>Router<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En router forbinder flere mindre netv\u00e6rk (LAN'er) til \u00e9t stort netv\u00e6rk (WAN - Wide Area Network). Routeren er en enhed, der forbinder os med internettet ved at h\u00e5ndtere pakkelevering fra en hvilken som helst netv\u00e6rkskilde til et hvilket som helst destinationsnetv\u00e6rk. Routeren bruger IP-adresser til at identificere enheder, der sender og modtager data. En router har typisk mellem 2 og 5 porte i mods\u00e6tning til en switch, som kan have mange flere. Derudover har begge enheder sammenlignelige hastigheder p\u00e5 100 Mbps - 10 Gbps, afh\u00e6ngigt af modellen.<\/span><\/p>\n<h3><b>Firewall<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Vi er bedre rustet til at stoppe mulige virtuelle indbrud ved at have en firewall.<\/span><\/p>\n<h3><b>Transmissionsmedium<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Transmissionsmediet er det middel, hvormed information overf\u00f8res, f.eks. gennem et kabel eller tr\u00e5dl\u00f8st.<\/span><\/p>\n<h2><b>Hvordan kommunikerer computere over internettet?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Trafikken skal have en unik identifikation for at kunne kommunikere med sider som Facebook og Google. Dette kaldes IP eller internetprotokol. IP, eller Internet Protocol, er den m\u00e5de, vi identificerer en enhed p\u00e5, enten i et netv\u00e6rk eller p\u00e5 internettet. Dette nummer skal v\u00e6re unikt. Du kan ikke have to identiske IP-adresser p\u00e5 det samme netv\u00e6rk eller internet, for det vil skabe en konflikt, og din forbindelse vil ikke fungere korrekt.<\/span><\/p>\n<h3><b>V\u00e6kst p\u00e5 internettet<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I de seneste \u00e5r er antallet af forbundne enheder p\u00e5 verdensplan eksploderet. Vidste du, at der i 2020 var ca. 50 milliarder enheder forbundet til internettet? Og ud af de 50 milliarder enheder er et stadig st\u00f8rre antal en del af tingenes internet (IoT).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internet of Things (IoT) beskriver enheder, der kan indsamle data fra hinanden og bruge internettet til at kommunikere. Nogle eksempler p\u00e5 almindelige IoT-enheder er sensorer, smart home-enheder, betalingsterminaler og smart wearables. Disse enheder skal ogs\u00e5 have en IP-adresse.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Der findes to slags IP-adresser:<\/span><\/p>\n<h2><b>Offentlig IP VS privat IP<\/b><\/h2>\n<h3><b>Offentlige IP-adresser<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ligesom navnet antyder, bruges offentlige IP-adresser til kommunikation over internettet. Organisationer som NIC (Network Information Centre) og IANA registrerer offentlige IP-adresser, som derefter tildeles internetudbydere (ISP'er) eller andre grupper.<\/span><\/p>\n<h3><b>Private IP-adresser<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Private IP-adresser bruges normalt i lokale netv\u00e6rk (LAN), f.eks. hjemme- eller skolenetv\u00e6rk. Derfor kan man ikke finde private IP-adresser p\u00e5 internettet. For at computere kan kommunikere med hinanden over internettet, har man udviklet en protokol, der hedder NAT (Network Address Translation). Den konverterer private IP-adresser til offentlige IP-adresser.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NAT kan forbedre vores netv\u00e6rks sikkerhed ved at g\u00f8re det vanskeligt for en angriber at f\u00e5 adgang til private IP-adresser.<\/span><\/p>\n<h2><b>Kort fortalt<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">I takt med at antallet af enheder, der er forbundet til internettet, forts\u00e6tter med at vokse, m\u00e5 vi forst\u00e5, hvordan de kommunikerer med hinanden. Denne artikel ser p\u00e5 de forskellige netv\u00e6rkskomponenter, og hvordan de arbejder sammen for at give os mulighed for at surfe p\u00e5 nettet, sende e-mails og meget mere. Vi har ogs\u00e5 set p\u00e5, hvordan IP-adresser spiller en rolle i forbindelse med identifikation af enheder, og hvorfor private IP'er bruges i lokalnetv\u00e6rk. Det er vigtigt at forst\u00e5, hvordan disse teknologier fungerer, efterh\u00e5nden som vi bev\u00e6ger os ind i en stadig mere sammenkoblet verden.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Et netv\u00e6rk er et system af sammenkoblede enheder, der udveksler information med hinanden for at fungere korrekt. Det kan v\u00e6re b\u00e6rbare computere, servere, smartphones og meget mere. Enhederne kommunikerer med hinanden... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/\">Read more <span class=\"screen-reader-text\">Grundl\u00e6ggende netv\u00e6rk: Hvordan fungerer netv\u00e6rk?<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/da\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e5dan fungerer internet og netv\u00e6rk | Sikkerhedsbriefing","description":"Forst\u00e5r du, hvordan internettet fungerer? Denne artikel dykker dybt ned i netv\u00e6rk, routere, switche og meget mere.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/","og_locale":"da_DK","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/da\/netvaerk\/hvordan-fungerer-netvaerk\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"security","Estimeret l\u00e6setid":"8 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"S\u00e5dan fungerer internet og netv\u00e6rk | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"Forst\u00e5r du, hvordan internettet fungerer? Denne artikel dykker dybt ned i netv\u00e6rk, routere, switche og meget mere.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sikkerhed","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin er seniorskribent for Government Technology. Hun har tidligere skrevet for PYMNTS og The Bay State Banner og har en BA i kreativ skrivning fra Carnegie Mellon. Hun bor uden for Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/da\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}