{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"hur-fungerar-natverk","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/","title":{"rendered":"Grundl\u00e4ggande n\u00e4tverk: Hur fungerar n\u00e4tverk?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Ett n\u00e4tverk \u00e4r ett system av sammankopplade enheter som utbyter information med varandra f\u00f6r att fungera korrekt. Detta kan inkludera b\u00e4rbara datorer, servrar, smartphones och mer. Enheterna kommunicerar med varandra via speciella n\u00e4tverk k\u00e4nda som routrar och switchar. Eftersom antalet enheter som \u00e4r anslutna till internet forts\u00e4tter att \u00f6ka m\u00e5ste vi f\u00f6rst\u00e5 hur de kommunicerar med varandra. I den h\u00e4r artikeln ska vi titta p\u00e5 de olika n\u00e4tverkskomponenterna och hur de samarbetar f\u00f6r att l\u00e5ta oss surfa p\u00e5 webben, skicka e-post och mycket mer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Det finns olika typer av n\u00e4tverk, var och en med varierande t\u00e4ckningsgrad. L\u00e5t oss b\u00f6rja med att utforska de olika typerna av n\u00e4tverk:<\/span><\/p>\n<h2><b>N\u00e4tverkstyper:<\/b><\/h2>\n<h3><b>LAN - Lokalt n\u00e4tverk<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ett LAN, eller Local Area Network, \u00e4r en mindre n\u00e4tverkstyp som \u00e4r begr\u00e4nsad till en organisation eller ett hem. Till exempel \u00e4r antalet enheter som \u00e4r anslutna till ditt hemn\u00e4tverk begr\u00e4nsat j\u00e4mf\u00f6rt med en annan n\u00e4tverkstyp. Ett skoln\u00e4tverk, \u00e4ven om det \u00e4r st\u00f6rre \u00e4n ett hemn\u00e4tverk, betraktas fortfarande som ett LAN eftersom det sammankopplar m\u00e5nga enheter inom samma fysiska utrymme. Detta inkluderar datorer, servrar etc.<\/span><\/p>\n<h3><b>MAN - N\u00e4tverk f\u00f6r storstadsomr\u00e5den<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">MAN \u00e4r ett utbyggt n\u00e4tverk som t\u00e4cker hela staden.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Genom att kombinera och ansluta flera n\u00e4tverk inom en stad bildar vi ett MAN-n\u00e4tverk eller metropolitan area network. Den h\u00e4r typen av n\u00e4tverk \u00e4r mer omfattande och t\u00e4cker en hel stad. En typ av n\u00e4tverk som erbjuder relativt sett h\u00f6gre datahastigheter \u00e4n den genomsnittliga internetanslutningen kallas Metropolitan Area Network, eller MAN.<\/span><\/p>\n<h3><b>WAN - Wide area Network<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ett WAN (wide area network) \u00e4r ett stort datorn\u00e4tverk som kopplar samman mindre n\u00e4tverk, som LAN (local area network).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ett WAN \u00e4r ett n\u00e4tverk som kopplar samman m\u00e5nga st\u00e4der eller l\u00e4nder s\u00e5 att m\u00e4nniskor enkelt kan anv\u00e4nda internet eller kommunicera med varandra \u00f6ver ett stort omr\u00e5de. N\u00e4r flera LAN i en organisation \u00e4r sammankopplade bildar det ett WAN.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">I grund och botten \u00e4r internet ett v\u00e4rldsomsp\u00e4nnande n\u00e4tverk (WWAN).<\/span><\/p>\n<h3><b>WLAN - Tr\u00e5dl\u00f6st LAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ett tr\u00e5dl\u00f6st LAN, eller Wi-Fi som det f\u00f6rkortas, \u00e4r ett n\u00e4tverk som vanligtvis skapas av v\u00e5r hemrouter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ett WLAN \u00e4r en typ av LAN som vi kan ansluta till tr\u00e5dl\u00f6st fr\u00e5n v\u00e5ra smartphones, surfplattor, b\u00e4rbara datorer eller n\u00e5gon annan enhet. Den tr\u00e5dl\u00f6sa milj\u00f6n, som anv\u00e4nder radiov\u00e5gor f\u00f6r att \u00f6verf\u00f6ra data i st\u00e4llet f\u00f6r kablar eller andra fysiska medier, har andra egenskaper \u00e4n det kabelbaserade n\u00e4tverket n\u00e4r det g\u00e4ller hastighet, s\u00e4kerhet och t\u00e4ckning. En av de b\u00e4sta f\u00f6rdelarna med tr\u00e5dl\u00f6s anslutning \u00e4r att den \u00e4r mycket flexibel.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">F\u00f6rutom de n\u00e4tverkstyper som n\u00e4mns ovan finns det andra n\u00e4tverk av olika storlek eller med olika syften. Det kan till exempel vara<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN - Storage Area Network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN - Enterprise Private Network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN - Virtuellt privat n\u00e4tverk.<\/span><\/li>\n<\/ul>\n<h2><b>N\u00e4tverk kan representeras p\u00e5 tv\u00e5 s\u00e4tt:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">N\u00e4tverk representeras vanligtvis av en \"n\u00e4tverkstopologi\", som avser det s\u00e4tt p\u00e5 vilket enheterna i n\u00e4tverket \u00e4r anslutna. Det finns tv\u00e5 huvudtyper av n\u00e4tverkstopologier: logiska och fysiska.<\/span><\/p>\n<h3><b>Logiska topologier<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Logiska topologier illustrerar de logiska aspekterna av ett n\u00e4tverk, t.ex. IP-adresser, anslutningen mellan enheter och de routingprotokoll som anv\u00e4nds.<\/span><\/p>\n<h3><b>Fysisk topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Den fysiska topologin i ett n\u00e4tverk \u00e4r det s\u00e4tt p\u00e5 vilket det \u00e4r fysiskt arrangerat. Detta inkluderar var enheter placeras, vilken typ av kablar som anv\u00e4nds, hur m\u00e5nga portar som beh\u00f6vs och till vilka portar\/switchar servrar ska anslutas. Den fysiska topologin \u00e4r ett diagram som visar utrustningens placering och syfte i n\u00e4tverket.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Syftet med en enhet kommer dock att resultera i olika n\u00e4tverkstopologier.<\/span><\/p>\n<h2><b>N\u00e4tverkstopologier<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Det kan finnas flera olika s\u00e4tt att representera enheter i en n\u00e4tverksmilj\u00f6. De kan grupperas utifr\u00e5n sina olika syften.<\/span><\/p>\n<h3><b>Stj\u00e4rnlik topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Den mest popul\u00e4ra topologin som anv\u00e4nds f\u00f6r LAN \u00e4r stj\u00e4rntopologin. Stj\u00e4rntopologin fungerar b\u00e4st f\u00f6r mindre n\u00e4tverk, som de som anv\u00e4nds av sm\u00e5f\u00f6retag.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Om vi t.ex. bara beh\u00f6ver n\u00e4tverksanslutning eller internet\u00e5tkomst kan vi gruppera enheterna i en stj\u00e4rnliknande topologi. Alla maskiner i det h\u00e4r n\u00e4tverket \u00e4r anslutna till den centrala HUB:en. Om n\u00e5gon nod misslyckas skadar det inte hela n\u00e4tverket eftersom de \u00e4r mycket l\u00e4tta att underh\u00e5lla och gradera.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Problemet med detta scenario \u00e4r dock att det inte finns n\u00e5gon redundans, vilket \u00e4r en f\u00f6ruts\u00e4ttning f\u00f6r datorn\u00e4tverk.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"Stj\u00e4rnliknande topologi\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>Mesh-topologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En Mesh-topologi \u00e4r b\u00e4st f\u00f6r ett p\u00e5litligt n\u00e4tverk, som till exempel en ISP - Internet Service Provider. Med den h\u00e4r designen \u00e4r allt s\u00e4kerhetskopierat. S\u00e5 om n\u00e5got g\u00e5r fel med en kabel eller switch finns det andra s\u00e4tt att komma \u00e5t internet eller var du \u00e4n f\u00f6rs\u00f6ker ansluta. Kom ih\u00e5g att full redundans inneb\u00e4r att du beh\u00f6ver fler enheter och l\u00e4ngre kablar, vilket inneb\u00e4r h\u00f6gre kostnader. En fullst\u00e4ndig mesh-topologi kostar i allm\u00e4nhet mer att implementera \u00e4n en stj\u00e4rnliknande topologi.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">N\u00e5gra exempel p\u00e5 meshtopologi \u00e4r Google Wi-Fi, Google Home eller n\u00e4tverk i milit\u00e4ra enheter.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"mesh-topologi\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>Topologi f\u00f6r partiellt n\u00e4t<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Partial Mesh-topologin \u00e4r en mer prisv\u00e4rd n\u00e4tverkstopologi som endast ger redundans f\u00f6r vissa switchar och delar av n\u00e4tverket. De andra switcharna har inga alternativa v\u00e4gar.<\/span><\/p>\n<h3><b>Hub- och ekertopologi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Hub and Spoke-topologin anv\u00e4nds ofta i WAN-design (internet). De tre routrarna i den h\u00e4r topologin k\u00e4nner inte till varandra som standard. F\u00f6r att data ska komma fram till sin destination m\u00e5ste b\u00e5de R1 och R3 skicka sin trafik till R2, som vet hur den ska omdirigeras p\u00e5 r\u00e4tt s\u00e4tt. Om R1 t.ex. vill skicka trafik till R3 g\u00f6r de det genom att skicka den via hubben (R2). Hubben vet sedan hur trafiken ska behandlas och omdirigeras.<\/span><\/p>\n<h2><b>N\u00e4tverkskomponenter<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">De delar som tillsammans bildar ett n\u00e4tverk \u00e4r:<\/span><\/p>\n<h3><b>Slutenhet<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Varje fysisk enhet som vi anv\u00e4nder f\u00f6r att ansluta till internet kallas f\u00f6r en slutenhet. Detta inkluderar datorer, b\u00e4rbara datorer, smartphones, servrar och mycket mer. Anslutningen kan ske via flera olika kanaler, t.ex. elektricitet, ljusimpulser eller radiov\u00e5gor. Vi kan ansluta till Internet tr\u00e5dl\u00f6st fr\u00e5n v\u00e5ra smartphones, b\u00e4rbara datorer och datorer. Om vi anv\u00e4nder en b\u00e4rbar dator eller PC kan vi ocks\u00e5 anv\u00e4nda en n\u00e4tverkskabel (UTP).<\/span><\/p>\n<h3><b>V\u00e4xla<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En switch kopplar samman flera slutenheter, t.ex. datorer och skrivare, i ett n\u00e4tverk (LAN).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Den h\u00e4r enheten \u00e4r popul\u00e4r f\u00f6r sin f\u00f6rm\u00e5ga att hantera m\u00e5nga portar, med hastigheter mellan 1 och 10 Gbps per port. Switchen anv\u00e4nder MAC-adresser f\u00f6r att identifiera de slutenheter som \u00e4r anslutna till n\u00e4tverket. Detta g\u00f6r det enkelt f\u00f6r dig att sp\u00e5ra vilka enheter som ansluter till ditt n\u00e4tverk och s\u00e4kerst\u00e4ller att endast auktoriserade enheter kan komma \u00e5t dina data.<\/span><\/p>\n<h3><b>Router<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">En router kopplar samman flera mindre n\u00e4tverk (LAN) till ett stort n\u00e4tverk (WAN - Wide Area Network). Routern \u00e4r en enhet som ansluter oss till Internet genom att hantera paketleverans fr\u00e5n alla n\u00e4tverksk\u00e4llor till alla destinationsn\u00e4tverk. Routern anv\u00e4nder IP-adresser f\u00f6r att identifiera enheter som skickar och tar emot data. En router har vanligtvis mellan 2 och 5 portar, till skillnad fr\u00e5n en switch som kan ha m\u00e5nga fler. Dessutom har b\u00e5da enheterna j\u00e4mf\u00f6rbara hastigheter p\u00e5 100 Mbps- 10 Gbps, beroende p\u00e5 modell.<\/span><\/p>\n<h3><b>Brandv\u00e4gg<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Vi \u00e4r b\u00e4ttre rustade att stoppa eventuella virtuella intr\u00e5ng genom att ha en brandv\u00e4gg.<\/span><\/p>\n<h3><b>\u00d6verf\u00f6ringsmedium<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u00d6verf\u00f6ringsmediet \u00e4r det s\u00e4tt p\u00e5 vilket informationen \u00f6verf\u00f6rs, t.ex. via en kabel eller tr\u00e5dl\u00f6st.<\/span><\/p>\n<h2><b>Hur kommunicerar datorer \u00f6ver Internet?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Trafiken m\u00e5ste ha en unik identifierare f\u00f6r att kunna kommunicera med sajter som Facebook och Google. Detta kallas IP eller Internet Protocol. IP, eller Internet Protocol, \u00e4r hur vi identifierar en enhet antingen i ett n\u00e4tverk eller p\u00e5 internet. Detta nummer m\u00e5ste vara unikt. Du kan inte ha tv\u00e5 identiska IP-adresser i samma n\u00e4tverk eller p\u00e5 internet eftersom det skapar en konflikt och din anslutning inte kommer att fungera korrekt.<\/span><\/p>\n<h3><b>Internets tillv\u00e4xt<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Under de senaste \u00e5ren har antalet uppkopplade enheter i v\u00e4rlden exploderat. Visste du att det \u00e5r 2020 fanns cirka 50 miljarder enheter som var anslutna till internet? Och av dessa 50 miljarder enheter \u00e4r ett allt st\u00f6rre antal en del av Internet of Things (IoT).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internet of Things (IoT) beskriver enheter som kan samla in data fr\u00e5n varandra och anv\u00e4nda internet f\u00f6r att kommunicera. N\u00e5gra exempel p\u00e5 vanliga IoT-enheter \u00e4r sensorer, smarta hemenheter, betalterminaler och smarta wearables. Dessa enheter beh\u00f6ver ocks\u00e5 ha en IP-adress.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Det finns tv\u00e5 typer av IP-adresser:<\/span><\/p>\n<h2><b>Offentlig IP VS Privat IP<\/b><\/h2>\n<h3><b>Publika IP-adresser<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Precis som namnet antyder anv\u00e4nds publika IP-adresser f\u00f6r kommunikation \u00f6ver internet. Organisationer som NIC (Network Information Centre) och IANA registrerar publika IP-adresser, som sedan tilldelas Internetleverant\u00f6rer (ISP) eller andra grupper.<\/span><\/p>\n<h3><b>Privata IP-adresser<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Privata IP-adresser anv\u00e4nds normalt i lokala n\u00e4tverk (LAN), t.ex. hem- eller skoln\u00e4tverk. F\u00f6ljaktligen finns inte privata IP-adresser p\u00e5 Internet. F\u00f6r att datorer ska kunna kommunicera med varandra \u00f6ver Internet har man utvecklat ett protokoll som kallas NAT (Network Address Translation.) Det omvandlar privata IP-adresser till publika IP-adresser.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NAT kan f\u00f6rb\u00e4ttra s\u00e4kerheten i v\u00e5rt n\u00e4tverk genom att g\u00f6ra det sv\u00e5rare f\u00f6r en angripare att komma \u00e5t privata IP-adresser.<\/span><\/p>\n<h2><b>I korthet<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">I takt med att antalet enheter som \u00e4r anslutna till internet forts\u00e4tter att \u00f6ka m\u00e5ste vi f\u00f6rst\u00e5 hur de kommunicerar med varandra. Den h\u00e4r artikeln handlar om de olika n\u00e4tverkskomponenterna och hur de samverkar f\u00f6r att vi ska kunna surfa p\u00e5 webben, skicka e-post och mycket mer. Vi har ocks\u00e5 tittat p\u00e5 hur IP-adresser spelar en roll n\u00e4r det g\u00e4ller att identifiera enheter och varf\u00f6r privata IP-adresser anv\u00e4nds i lokala n\u00e4tverk. Att f\u00f6rst\u00e5 hur dessa tekniker fungerar blir allt viktigare i takt med att vi r\u00f6r oss in i en alltmer sammankopplad v\u00e4rld.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Ett n\u00e4tverk \u00e4r ett system av sammankopplade enheter som utbyter information med varandra f\u00f6r att fungera korrekt. Detta kan inkludera b\u00e4rbara datorer, servrar, smartphones och mer. Enheterna kommunicerar med varandra ... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/\">Continue reading <span class=\"screen-reader-text\">Grundl\u00e4ggande n\u00e4tverk: Hur fungerar n\u00e4tverk?<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/sv\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hur fungerar Internet och n\u00e4tverk | Security Briefing","description":"F\u00f6rst\u00e5r du hur internet fungerar? I den h\u00e4r artikeln g\u00f6r vi en djupdykning i n\u00e4tverk, routrar, switchar och mycket mer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/","og_locale":"sv_SE","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/sv\/natverk\/hur-fungerar-natverk\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skriven av":"security","Ber\u00e4knad l\u00e4stid":"8 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"Hur fungerar Internet och n\u00e4tverk | Security Briefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"F\u00f6rst\u00e5r du hur internet fungerar? I den h\u00e4r artikeln g\u00f6r vi en djupdykning i n\u00e4tverk, routrar, switchar och mycket mer.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"S\u00e4kerhetsgenomg\u00e5ng","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"S\u00e4kerhetsgenomg\u00e5ng","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"s\u00e4kerhet","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin \u00e4r en senior personalf\u00f6rfattare f\u00f6r Government Technology. Hon skrev tidigare f\u00f6r PYMNTS och The Bay State Banner och har en BA i kreativt skrivande fr\u00e5n Carnegie Mellon. Hon \u00e4r baserad utanf\u00f6r Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/sv\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/sv\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}