{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"cum-functioneaza-retelele","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/","title":{"rendered":"Re\u021belistic\u0103 de baz\u0103: Cum func\u021bioneaz\u0103 re\u021belele"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">O re\u021bea este un sistem de dispozitive interconectate care fac schimb de informa\u021bii \u00eentre ele pentru a func\u021biona corect. Acestea pot include laptopuri, servere, smartphone-uri \u0219i altele. Dispozitivele comunic\u0103 \u00eentre ele prin intermediul unor re\u021bele speciale cunoscute sub numele de routere \u0219i switch-uri. Pe m\u0103sur\u0103 ce num\u0103rul de dispozitive conectate la internet continu\u0103 s\u0103 creasc\u0103, trebuie s\u0103 \u00een\u021belegem cum comunic\u0103 \u00eentre ele. \u00cen acest articol, vom analiza diferitele componente ale re\u021belei \u0219i modul \u00een care acestea func\u021bioneaz\u0103 \u00eempreun\u0103 pentru a ne permite s\u0103 navig\u0103m pe internet, s\u0103 trimitem e-mailuri \u0219i multe altele.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Exist\u0103 diferite tipuri de re\u021bele, fiecare cu grade variate de acoperire. S\u0103 \u00eencepem prin a explora diferitele tipuri de re\u021bele:<\/span><\/p>\n<h2><b>Tipuri de Re\u021bea:<\/b><\/h2>\n<h3><b>LAN \u2013 Re\u021bea Local\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">O LAN, sau Local Area Network, este un tip de re\u021bea mai mic\u0103 \u0219i este limitat\u0103 la o organiza\u021bie sau la o locuin\u021b\u0103. De exemplu, num\u0103rul de dispozitive conectate la re\u021beaua de acas\u0103 este restric\u021bionat \u00een compara\u021bie cu un alt tip de re\u021bea. O re\u021bea \u0219colar\u0103, chiar dac\u0103 este mai mare dec\u00e2t o re\u021bea de acas\u0103, este tot considerat\u0103 o LAN deoarece interconecteaz\u0103 multe dispozitive \u00een acela\u0219i spa\u021biu fizic. Aceasta include computere, servere etc.<\/span><\/p>\n<h3><b>MAN \u2013 Metropolitan Area Network<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">MAN este o re\u021bea extins\u0103 care acoper\u0103 \u00eentreaga ora\u0219.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prin combinarea \u0219i conectarea mai multor re\u021bele \u00eentr-un ora\u0219, am forma o re\u021bea MAN sau re\u021bea metropolitan\u0103. Acest tip de re\u021bea este mai cuprinz\u0103tor \u0219i acoper\u0103 \u00eentregul ora\u0219. Un tip de re\u021bea care ofer\u0103 viteze de date relativ mai rapide dec\u00e2t conexiunea medie la internet se nume\u0219te Metropolitan Area Network sau MAN.<\/span><\/p>\n<h3><b>WAN \u2013 Re\u021bea de arie larg\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Un WAN (wide area network) este o re\u021bea mare de calculatoare care conecteaz\u0103 re\u021bele mai mici, cum ar fi LAN-uri (local area networks).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Un WAN este o re\u021bea care conecteaz\u0103 multe ora\u0219e sau \u021b\u0103ri \u00eempreun\u0103, astfel \u00eenc\u00e2t oamenii s\u0103 poat\u0103 utiliza internetul sau s\u0103 comunice u\u0219or \u00eentre ei pe o suprafa\u021b\u0103 mare. C\u00e2nd mai multe LAN-uri ale unei organiza\u021bii sunt interconectate, se formeaz\u0103 un WAN.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Practic, internetul este o re\u021bea de arie larg\u0103 mondial\u0103 (WWAN).<\/span><\/p>\n<h3><b>WLAN \u2013 LAN f\u0103r\u0103 fir<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">O re\u021bea LAN f\u0103r\u0103 fir, sau Wi-Fi pe scurt, este o re\u021bea creat\u0103 de obicei de routerul nostru de acas\u0103.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O WLAN este un tip de LAN la care ne putem conecta f\u0103r\u0103 fir de pe smartphone-uri, tablete, laptopuri sau orice alt dispozitiv. Mediul wireless, care folose\u0219te unde radio pentru a transmite date \u00een loc de cabluri sau alte medii fizice, are caracteristici diferite fa\u021b\u0103 de re\u021beaua pe baz\u0103 de cablu \u00een termeni de vitez\u0103, securitate \u0219i acoperire. Unul dintre cele mai mari avantaje ale conectivit\u0103\u021bii wireless este flexibilitatea sa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00cen plus fa\u021b\u0103 de tipurile de re\u021bele men\u021bionate mai sus, exist\u0103 \u0219i alte re\u021bele de dimensiuni sau scopuri diferite. De exemplu,<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN - Re\u021bea de Arie de Stocare.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN \u2013 Re\u021bea Privat\u0103 de \u00centreprindere.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN \u2013 Re\u021bea Virtual\u0103 Privat\u0103.<\/span><\/li>\n<\/ul>\n<h2><b>Re\u021belele pot fi reprezentate \u00een dou\u0103 moduri:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Re\u021belele sunt de obicei reprezentate printr-o \u201ctopologie de re\u021bea\u201d, care se refer\u0103 la modul \u00een care dispozitivele din re\u021bea sunt conectate. Exist\u0103 dou\u0103 tipuri principale de topologii de re\u021bea: logice \u0219i fizice.<\/span><\/p>\n<h3><b>Topologii logice<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Topologiile logice ilustreaz\u0103 aspectele logice ale unei re\u021bele, cum ar fi adresele IP, conexiunea \u00eentre dispozitive \u0219i protocoalele de rutare utilizate.<\/span><\/p>\n<h3><b>Topologie fizic\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Topologia fizic\u0103 a unei re\u021bele este modul \u00een care aceasta este aranjat\u0103 fizic. Aceasta include unde sunt plasate dispozitivele, ce tip de cabluri sunt utilizate, c\u00e2te porturi sunt necesare \u0219i la ce porturi\/comutatoare vor fi conectate serverele. Topologia fizic\u0103 este un diagram\u0103 care arat\u0103 loca\u021bia \u0219i scopul echipamentelor \u00een re\u021bea.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Totu\u0219i, scopul unui dispozitiv va rezulta \u00een topologii de re\u021bea diferite.<\/span><\/p>\n<h2><b>Topologii de re\u021bea<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Pot exista multiple moduri de a reprezenta dispozitivele \u00eentr-un mediu de re\u021bea. Ele pot fi grupate \u00een func\u021bie de scopurile lor diferite.<\/span><\/p>\n<h3><b>Topologie \u00een stea<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Cea mai popular\u0103 topologie utilizat\u0103 pentru LAN-uri este Topologia \u00een Stea. Topologia \u00een stea func\u021bioneaz\u0103 cel mai bine pentru re\u021bele mai mici, cum ar fi cele utilizate de \u00eentreprinderile mici.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">De exemplu, dac\u0103 avem nevoie doar de conectivitate de re\u021bea sau acces la internet, putem grupa dispozitivele \u00eentr-o topologie \u00een stea. Toate ma\u0219inile din aceast\u0103 re\u021bea sunt conectate la HUB-ul central. Dac\u0103 un nod e\u0219ueaz\u0103, nu d\u0103uneaz\u0103 sau nu afecteaz\u0103 \u00eentreaga re\u021bea deoarece sunt foarte u\u0219or de \u00eentre\u021binut \u0219i extins.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Totu\u0219i, problema cu acest scenariu este lipsa redundan\u021bei, care este esen\u021bial\u0103 pentru re\u021belele de calculatoare.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"Topologie \u00een stea\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>Topologie mesh<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">O Topologie Mesh este cea mai bun\u0103 pentru o re\u021bea de \u00eencredere, cum ar fi un ISP \u2013 Furnizor de Servicii de Internet. Cu acest design, totul este sus\u021binut. Deci, dac\u0103 ceva nu merge bine cu un cablu sau un comutator, exist\u0103 alte modalit\u0103\u021bi de a accesa internetul sau oriunde \u00eencerci s\u0103 te conectezi. Re\u021bine c\u0103 redundan\u021ba complet\u0103 \u00eenseamn\u0103 c\u0103 vei avea nevoie de mai multe dispozitive \u0219i cabluri mai lungi, ceea ce se traduce \u00een costuri mai mari. O Topologie Mesh complet\u0103 cost\u0103, \u00een general, mai mult de implementat dec\u00e2t o Topologie \u00een Stea.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">C\u00e2teva exemple de Topologie Mesh sunt Google Wi-Fi, Google Home sau Re\u021belele \u00een dispozitivele militare.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"topologie mesh\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>Topologie Mesh par\u021bial\u0103<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Topologia Mesh Par\u021bial\u0103 este o topologie de re\u021bea mai accesibil\u0103 care ofer\u0103 redundan\u021b\u0103 doar pentru unele dintre comutatoare \u0219i p\u0103r\u021bi ale re\u021belei. Celelalte comutatoare sunt l\u0103sate f\u0103r\u0103 c\u0103i alternative.<\/span><\/p>\n<h3><b>Topologie Hub \u0219i Spoke<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Topologia Hub \u0219i Spoke este utilizat\u0103 frecvent \u00een designul WAN (internet). Cele trei routere din aceast\u0103 topologie nu se cunosc \u00eentre ele \u00een mod implicit. Astfel \u00eenc\u00e2t datele s\u0103 ajung\u0103 la destina\u021bie, at\u00e2t R1 c\u00e2t \u0219i R3 vor trebui s\u0103 trimit\u0103 traficul lor c\u0103tre R2, care \u0219tie cum s\u0103-l redirec\u021bioneze corect. De exemplu, dac\u0103 R1 dore\u0219te s\u0103 trimit\u0103 trafic c\u0103tre R3, o va face trimi\u021b\u00e2ndu-l prin Hub (R2). Hub-ul \u0219tie apoi cum s\u0103 proceseze \u0219i s\u0103 redirec\u021bioneze acel trafic.<\/span><\/p>\n<h2><b>Componentele re\u021belei<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Piesele care se reunesc pentru a forma o re\u021bea sunt:<\/span><\/p>\n<h3><b>Dispozitiv final<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Orice dispozitiv fizic pe care \u00eel folosim pentru a ne conecta la internet este cunoscut ca dispozitiv final. Acestea includ PC-uri, laptopuri, smartphone-uri, servere \u0219i altele. Conexiunea poate fi realizat\u0103 prin mai multe canale, cum ar fi electricitatea, impulsurile de lumin\u0103 sau undele radio. Ne putem conecta la Internet f\u0103r\u0103 fir de pe smartphone-uri, laptopuri \u0219i PC-uri. Dac\u0103 folosim un laptop sau PC, putem folosi \u0219i un cablu de re\u021bea (UTP).<\/span><\/p>\n<h3><b>Comutator<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Un Comutator interconecteaz\u0103 multiple dispozitive finale, cum ar fi computerele \u0219i imprimantele, \u00eentr-o re\u021bea (LAN).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Acest dispozitiv este popular pentru capacitatea sa de a gestiona multe porturi, cu viteze \u00eentre 1 \u0219i 10 Gbps pe port. Comutatorul folose\u0219te adrese MAC pentru a identifica dispozitivele finale conectate la re\u021bea. Acest lucru face u\u0219or pentru tine s\u0103 urm\u0103re\u0219ti care dispozitive se conecteaz\u0103 la re\u021beaua ta \u0219i asigur\u0103 c\u0103 doar dispozitivele autorizate pot accesa datele tale.<\/span><\/p>\n<h3><b>Router<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Un router conecteaz\u0103 mai multe re\u021bele mai mici (LAN-uri) pentru a forma o re\u021bea mare (WAN - Re\u021bea de Arie Larg\u0103). Routerul este un dispozitiv care ne conecteaz\u0103 la internet gestion\u00e2nd livrarea pachetelor de la orice surs\u0103 de re\u021bea la orice re\u021bea de destina\u021bie. Routerul folose\u0219te adrese IP pentru a identifica dispozitivele care trimit \u0219i primesc date. Un Router are de obicei \u00eentre 2 \u0219i 5 porturi, spre deosebire de un Comutator care poate avea mult mai multe. \u00cen plus, ambele dispozitive au viteze comparabile de 100 Mbps - 10 Gbps, \u00een func\u021bie de model.<\/span><\/p>\n<h3><b>Firewall<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Suntem mai bine echipa\u021bi s\u0103 oprim posibilele intruziuni virtuale av\u00e2nd un firewall.<\/span><\/p>\n<h3><b>Mediu de transmisie<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Mediul de transmisie este mijlocul prin care informa\u021bia este transmis\u0103, de exemplu, printr-un cablu sau f\u0103r\u0103 fir.<\/span><\/p>\n<h2><b>Cum comunic\u0103 computerele prin Internet?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Traficul trebuie s\u0103 aib\u0103 un identificator unic pentru a comunica cu site-uri precum Facebook \u0219i Google. Acesta se nume\u0219te IP sau Protocol Internet. IP, sau Protocol Internet, este modul \u00een care identific\u0103m un dispozitiv fie \u00eentr-o re\u021bea, fie pe internet. Acest num\u0103r trebuie s\u0103 fie unic. Nu po\u021bi avea dou\u0103 adrese IP identice \u00een aceea\u0219i re\u021bea sau pe Internet, deoarece va crea un conflict \u0219i conexiunea ta nu va func\u021biona corect.<\/span><\/p>\n<h3><b>Cre\u0219terea Internetului<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u00cen ultimii ani, num\u0103rul de dispozitive conectate la nivel mondial a explodat. \u0218tiai c\u0103 \u00een 2020, existau aproximativ 50 de miliarde de dispozitive conectate la internet? \u0218i din aceste 50 de miliarde de dispozitive, un num\u0103r din ce \u00een ce mai mare face parte din Internetul Lucrurilor (IoT).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internetul Lucrurilor (IoT) descrie dispozitivele care pot colecta date unele de la altele \u0219i pot folosi internetul pentru a comunica. C\u00e2teva exemple de dispozitive IoT comune includ senzori, dispozitive inteligente pentru acas\u0103, terminale de plat\u0103 \u0219i dispozitive inteligente purtabile. Aceste dispozitive trebuie s\u0103 aib\u0103, de asemenea, o adres\u0103 IP.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adresele IP sunt de dou\u0103 feluri:<\/span><\/p>\n<h2><b>IP Public VS IP Privat<\/b><\/h2>\n<h3><b>Adrese IP publice<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A\u0219a cum sugereaz\u0103 \u0219i numele lor, adresele IP publice sunt utilizate pentru comunicarea prin internet. Organiza\u021bii precum NIC (Centrul de Informa\u021bii de Re\u021bea) \u0219i IANA \u00eenregistreaz\u0103 adresele IP publice, care sunt apoi atribuite Furnizorilor de Servicii de Internet (ISP) sau altor grupuri.<\/span><\/p>\n<h3><b>Adrese IP private<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Adresele IP private sunt utilizate \u00een mod normal \u00een Re\u021belele Locale (LAN-uri), cum ar fi re\u021belele de acas\u0103 sau de la \u0219coal\u0103. \u00cen consecin\u021b\u0103, adresele IP private nu pot fi g\u0103site pe Internet. Pentru a permite computerelor s\u0103 comunice \u00eentre ele prin Internet, a fost conceput un protocol cunoscut sub numele de NAT (Network Address Translation). Acesta converte\u0219te adresele IP private \u00een IP-uri publice.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NAT poate \u00eembun\u0103t\u0103\u021bi securitatea re\u021belei noastre f\u0103c\u00e2nd dificil pentru un atacator s\u0103 acceseze adresele IP private.<\/span><\/p>\n<h2><b>Pe scurt<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Pe m\u0103sur\u0103 ce num\u0103rul de dispozitive conectate la internet continu\u0103 s\u0103 creasc\u0103, trebuie s\u0103 \u00een\u021belegem cum comunic\u0103 ele \u00eentre ele. Acest articol analizeaz\u0103 diferitele componente ale re\u021belei \u0219i modul \u00een care acestea func\u021bioneaz\u0103 \u00eempreun\u0103 pentru a ne permite s\u0103 navig\u0103m pe web, s\u0103 trimitem e-mailuri \u0219i altele. De asemenea, am analizat cum joac\u0103 un rol adresele IP \u00een identificarea dispozitivelor \u0219i de ce sunt utilizate IP-urile private \u00een re\u021belele locale. \u00cen\u021belegerea modului \u00een care func\u021bioneaz\u0103 aceste tehnologii este mai important\u0103 pe m\u0103sur\u0103 ce ne \u00eendrept\u0103m c\u0103tre o lume din ce \u00een ce mai interconectat\u0103.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>O re\u021bea este un sistem de dispozitive interconectate care fac schimb de informa\u021bii \u00eentre ele pentru a func\u021biona corect. Aceasta poate include laptopuri, servere, smartphone-uri \u0219i multe altele. Dispozitivele comunic\u0103 \u00eentre ele... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/\">Continue reading <span class=\"screen-reader-text\">Re\u021belistic\u0103 de baz\u0103: Cum func\u021bioneaz\u0103 re\u021belele<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cum func\u021bioneaz\u0103 Internetul \u0219i re\u021belele | Informare de securitate","description":"\u00cen\u021belegi cum func\u021bioneaz\u0103 internetul? Acest articol exploreaz\u0103 \u00een detaliu re\u021belele, routerele, switch-urile \u0219i altele.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/","og_locale":"ro_RO","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/ro\/retele\/cum-functioneaza-retelele\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"8 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"Cum func\u021bioneaz\u0103 Internetul \u0219i re\u021belele | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"\u00cen\u021belegi cum func\u021bioneaz\u0103 internetul? Acest articol exploreaz\u0103 \u00een detaliu re\u021belele, routerele, switch-urile \u0219i altele.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}