{"id":1239,"date":"2022-11-25T20:28:32","date_gmt":"2022-11-25T20:28:32","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1239"},"modified":"2022-11-25T20:28:32","modified_gmt":"2022-11-25T20:28:32","slug":"mang-hoat-dong-nhu-the-nao","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/","title":{"rendered":"M\u1ea1ng c\u01a1 b\u1ea3n: M\u1ea1ng ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">M\u1ea1ng l\u00e0 m\u1ed9t h\u1ec7 th\u1ed1ng c\u00e1c thi\u1ebft b\u1ecb \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi nhau \u0111\u1ec3 trao \u0111\u1ed5i th\u00f4ng tin nh\u1eb1m ho\u1ea1t \u0111\u1ed9ng \u0111\u00fang c\u00e1ch. \u0110i\u1ec1u n\u00e0y c\u00f3 th\u1ec3 bao g\u1ed3m m\u00e1y t\u00ednh x\u00e1ch tay, m\u00e1y ch\u1ee7, \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh v\u00e0 h\u01a1n th\u1ebf n\u1eefa. C\u00e1c thi\u1ebft b\u1ecb n\u00e0y giao ti\u1ebfp v\u1edbi nhau th\u00f4ng qua c\u00e1c m\u1ea1ng \u0111\u1eb7c bi\u1ec7t \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Router v\u00e0 Switch. Khi s\u1ed1 l\u01b0\u1ee3ng thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i v\u1edbi Internet ti\u1ebfp t\u1ee5c t\u0103ng, ch\u00fang ta c\u1ea7n hi\u1ec3u c\u00e1ch ch\u00fang giao ti\u1ebfp v\u1edbi nhau. Trong b\u00e0i vi\u1ebft n\u00e0y, ch\u00fang ta s\u1ebd xem x\u00e9t c\u00e1c th\u00e0nh ph\u1ea7n m\u1ea1ng kh\u00e1c nhau v\u00e0 c\u00e1ch ch\u00fang ph\u1ed1i h\u1ee3p \u0111\u1ec3 cho ph\u00e9p ch\u00fang ta duy\u1ec7t web, g\u1eedi email v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">C\u00f3 nhi\u1ec1u lo\u1ea1i m\u1ea1ng kh\u00e1c nhau, m\u1ed7i lo\u1ea1i c\u00f3 m\u1ee9c \u0111\u1ed9 ph\u1ee7 s\u00f3ng kh\u00e1c nhau. H\u00e3y b\u1eaft \u0111\u1ea7u kh\u00e1m ph\u00e1 c\u00e1c lo\u1ea1i m\u1ea1ng kh\u00e1c nhau:<\/span><\/p>\n<h2><b>C\u00e1c Lo\u1ea1i M\u1ea1ng:<\/b><\/h2>\n<h3><b>LAN \u2013 M\u1ea1ng C\u1ee5c B\u1ed9<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">LAN, hay Local Area Network, l\u00e0 m\u1ed9t lo\u1ea1i m\u1ea1ng nh\u1ecf h\u01a1n v\u00e0 \u0111\u01b0\u1ee3c gi\u1edbi h\u1ea1n trong m\u1ed9t t\u1ed5 ch\u1ee9c ho\u1eb7c gia \u0111\u00ecnh. V\u00ed d\u1ee5, s\u1ed1 l\u01b0\u1ee3ng thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i v\u1edbi m\u1ea1ng gia \u0111\u00ecnh c\u1ee7a b\u1ea1n b\u1ecb gi\u1edbi h\u1ea1n so v\u1edbi m\u1ed9t lo\u1ea1i m\u1ea1ng kh\u00e1c. M\u1ed9t m\u1ea1ng tr\u01b0\u1eddng h\u1ecdc, m\u1eb7c d\u00f9 l\u1edbn h\u01a1n m\u1ea1ng gia \u0111\u00ecnh, v\u1eabn \u0111\u01b0\u1ee3c coi l\u00e0 LAN v\u00ec n\u00f3 k\u1ebft n\u1ed1i nhi\u1ec1u thi\u1ebft b\u1ecb trong c\u00f9ng m\u1ed9t kh\u00f4ng gian v\u1eadt l\u00fd. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m m\u00e1y t\u00ednh, m\u00e1y ch\u1ee7, v.v.<\/span><\/p>\n<h3><b>MAN \u2013 Metropolitan Area Network<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">MAN l\u00e0 m\u1ed9t m\u1ea1ng l\u01b0\u1edbi m\u1edf r\u1ed9ng bao ph\u1ee7 to\u00e0n b\u1ed9 th\u00e0nh ph\u1ed1.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">B\u1eb1ng c\u00e1ch k\u1ebft h\u1ee3p v\u00e0 k\u1ebft n\u1ed1i nhi\u1ec1u m\u1ea1ng trong m\u1ed9t th\u00e0nh ph\u1ed1, ch\u00fang ta s\u1ebd t\u1ea1o th\u00e0nh m\u1ed9t m\u1ea1ng MAN ho\u1eb7c m\u1ea1ng khu v\u1ef1c \u0111\u00f4 th\u1ecb. Lo\u1ea1i m\u1ea1ng n\u00e0y to\u00e0n di\u1ec7n h\u01a1n v\u00e0 bao ph\u1ee7 to\u00e0n b\u1ed9 th\u00e0nh ph\u1ed1. M\u1ed9t lo\u1ea1i m\u1ea1ng cung c\u1ea5p t\u1ed1c \u0111\u1ed9 d\u1eef li\u1ec7u nhanh h\u01a1n t\u01b0\u01a1ng \u0111\u1ed1i so v\u1edbi k\u1ebft n\u1ed1i internet trung b\u00ecnh \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 M\u1ea1ng Khu v\u1ef1c \u0110\u00f4 th\u1ecb, hay MAN.<\/span><\/p>\n<h3><b>WAN \u2013 M\u1ea1ng di\u1ec7n r\u1ed9ng<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">WAN (wide area network) l\u00e0 m\u1ed9t m\u1ea1ng m\u00e1y t\u00ednh l\u1edbn k\u1ebft n\u1ed1i c\u00e1c m\u1ea1ng nh\u1ecf h\u01a1n, ch\u1eb3ng h\u1ea1n nh\u01b0 LAN (local area networks).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">WAN l\u00e0 m\u1ed9t m\u1ea1ng l\u01b0\u1edbi k\u1ebft n\u1ed1i nhi\u1ec1u th\u00e0nh ph\u1ed1 ho\u1eb7c qu\u1ed1c gia v\u1edbi nhau \u0111\u1ec3 m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng internet ho\u1eb7c giao ti\u1ebfp v\u1edbi nhau m\u1ed9t c\u00e1ch d\u1ec5 d\u00e0ng tr\u00ean m\u1ed9t di\u1ec7n t\u00edch r\u1ed9ng l\u1edbn. Khi nhi\u1ec1u LAN c\u1ee7a m\u1ed9t t\u1ed5 ch\u1ee9c \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i, n\u00f3 h\u00ecnh th\u00e0nh m\u1ed9t WAN.<\/span><\/p>\n<h3><b>WWAN<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">V\u1ec1 c\u01a1 b\u1ea3n, internet l\u00e0 m\u1ed9t m\u1ea1ng di\u1ec7n r\u1ed9ng to\u00e0n c\u1ea7u (WWAN).<\/span><\/p>\n<h3><b>WLAN \u2013 M\u1ea1ng LAN kh\u00f4ng d\u00e2y<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">M\u1ea1ng LAN kh\u00f4ng d\u00e2y, hay g\u1ecdi t\u1eaft l\u00e0 Wi-Fi, l\u00e0 m\u1ed9t m\u1ea1ng th\u01b0\u1eddng \u0111\u01b0\u1ee3c t\u1ea1o ra b\u1edfi b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn gia \u0111\u00ecnh c\u1ee7a ch\u00fang ta.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">WLAN l\u00e0 m\u1ed9t lo\u1ea1i LAN m\u00e0 ch\u00fang ta c\u00f3 th\u1ec3 k\u1ebft n\u1ed1i kh\u00f4ng d\u00e2y t\u1eeb \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh, m\u00e1y t\u00ednh b\u1ea3ng, m\u00e1y t\u00ednh x\u00e1ch tay ho\u1eb7c b\u1ea5t k\u1ef3 thi\u1ebft b\u1ecb n\u00e0o kh\u00e1c. M\u00f4i tr\u01b0\u1eddng kh\u00f4ng d\u00e2y, s\u1eed d\u1ee5ng s\u00f3ng v\u00f4 tuy\u1ebfn \u0111\u1ec3 truy\u1ec1n d\u1eef li\u1ec7u thay v\u00ec c\u00e1p ho\u1eb7c c\u00e1c ph\u01b0\u01a1ng ti\u1ec7n v\u1eadt l\u00fd kh\u00e1c, c\u00f3 nh\u1eefng \u0111\u1eb7c \u0111i\u1ec3m kh\u00e1c bi\u1ec7t so v\u1edbi m\u1ea1ng d\u1ef1a tr\u00ean c\u00e1p c\u00f3 d\u00e2y v\u1ec1 t\u1ed1c \u0111\u1ed9, b\u1ea3o m\u1eadt v\u00e0 ph\u1ea1m vi ph\u1ee7 s\u00f3ng. M\u1ed9t trong nh\u1eefng l\u1ee3i th\u1ebf t\u1ed1t nh\u1ea5t c\u1ee7a k\u1ebft n\u1ed1i kh\u00f4ng d\u00e2y l\u00e0 n\u00f3 r\u1ea5t linh ho\u1ea1t.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ngo\u00e0i c\u00e1c lo\u1ea1i m\u1ea1ng \u0111\u00e3 \u0111\u1ec1 c\u1eadp \u1edf tr\u00ean, c\u00f2n c\u00f3 c\u00e1c m\u1ea1ng kh\u00e1c v\u1edbi k\u00edch th\u01b0\u1edbc ho\u1eb7c m\u1ee5c \u0111\u00edch kh\u00e1c nhau. V\u00ed d\u1ee5,<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SAN- M\u1ea1ng khu v\u1ef1c l\u01b0u tr\u1eef.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">EPN \u2013 M\u1ea1ng ri\u00eang doanh nghi\u1ec7p.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">VPN \u2013 M\u1ea1ng ri\u00eang \u1ea3o.<\/span><\/li>\n<\/ul>\n<h2><b>M\u1ea1ng c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c bi\u1ec3u di\u1ec5n theo hai c\u00e1ch:<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">M\u1ea1ng th\u01b0\u1eddng \u0111\u01b0\u1ee3c bi\u1ec3u di\u1ec5n b\u1eb1ng \u201cc\u1ea5u tr\u00fac li\u00ean k\u1ebft m\u1ea1ng\u201d, \u0111\u1ec1 c\u1eadp \u0111\u1ebfn c\u00e1ch c\u00e1c thi\u1ebft b\u1ecb tr\u00ean m\u1ea1ng \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i. C\u00f3 hai lo\u1ea1i c\u1ea5u tr\u00fac li\u00ean k\u1ebft m\u1ea1ng ch\u00ednh: logic v\u00e0 v\u1eadt l\u00fd.<\/span><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft logic<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft logic minh h\u1ecda c\u00e1c kh\u00eda c\u1ea1nh logic c\u1ee7a m\u1ed9t m\u1ea1ng, ch\u1eb3ng h\u1ea1n nh\u01b0 \u0111\u1ecba ch\u1ec9 IP, k\u1ebft n\u1ed1i gi\u1eefa c\u00e1c thi\u1ebft b\u1ecb v\u00e0 c\u00e1c giao th\u1ee9c \u0111\u1ecbnh tuy\u1ebfn \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng.<\/span><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft v\u1eadt l\u00fd<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft v\u1eadt l\u00fd c\u1ee7a m\u1ed9t m\u1ea1ng l\u00e0 c\u00e1ch n\u00f3 \u0111\u01b0\u1ee3c s\u1eafp x\u1ebfp v\u1ec1 m\u1eb7t v\u1eadt l\u00fd. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m v\u1ecb tr\u00ed \u0111\u1eb7t c\u00e1c thi\u1ebft b\u1ecb, lo\u1ea1i c\u00e1p n\u00e0o \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng, c\u1ea7n bao nhi\u00eau c\u1ed5ng v\u00e0 m\u00e1y ch\u1ee7 s\u1ebd \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi c\u1ed5ng\/chuy\u1ec3n m\u1ea1ch n\u00e0o. C\u1ea5u tr\u00fac li\u00ean k\u1ebft v\u1eadt l\u00fd l\u00e0 m\u1ed9t s\u01a1 \u0111\u1ed3 cho th\u1ea5y v\u1ecb tr\u00ed v\u00e0 m\u1ee5c \u0111\u00edch c\u1ee7a thi\u1ebft b\u1ecb trong m\u1ea1ng.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tuy nhi\u00ean, m\u1ee5c \u0111\u00edch c\u1ee7a m\u1ed9t thi\u1ebft b\u1ecb s\u1ebd d\u1eabn \u0111\u1ebfn c\u00e1c c\u1ea5u tr\u00fac li\u00ean k\u1ebft m\u1ea1ng kh\u00e1c nhau.<\/span><\/p>\n<h2><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft m\u1ea1ng<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">C\u00f3 th\u1ec3 c\u00f3 nhi\u1ec1u c\u00e1ch \u0111\u1ec3 bi\u1ec3u di\u1ec5n c\u00e1c thi\u1ebft b\u1ecb trong m\u00f4i tr\u01b0\u1eddng m\u1ea1ng. Ch\u00fang c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c nh\u00f3m l\u1ea1i d\u1ef1a tr\u00ean c\u00e1c m\u1ee5c \u0111\u00edch kh\u00e1c nhau c\u1ee7a ch\u00fang.<\/span><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft ph\u1ed5 bi\u1ebfn nh\u1ea5t \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng cho LAN l\u00e0 C\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao. C\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao ho\u1ea1t \u0111\u1ed9ng t\u1ed1t nh\u1ea5t cho c\u00e1c m\u1ea1ng nh\u1ecf h\u01a1n, nh\u01b0 nh\u1eefng m\u1ea1ng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi c\u00e1c doanh nghi\u1ec7p nh\u1ecf.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">V\u00ed d\u1ee5, n\u1ebfu ch\u00fang ta ch\u1ec9 c\u1ea7n k\u1ebft n\u1ed1i m\u1ea1ng ho\u1eb7c truy c\u1eadp internet, ch\u00fang ta c\u00f3 th\u1ec3 nh\u00f3m c\u00e1c thi\u1ebft b\u1ecb trong m\u1ed9t c\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao. T\u1ea5t c\u1ea3 c\u00e1c m\u00e1y trong m\u1ea1ng n\u00e0y \u0111\u1ec1u \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi HUB trung t\u00e2m. N\u1ebfu b\u1ea5t k\u1ef3 n\u00fat n\u00e0o g\u1eb7p s\u1ef1 c\u1ed1, n\u00f3 kh\u00f4ng g\u00e2y h\u1ea1i ho\u1eb7c l\u00e0m h\u1ecfng to\u00e0n b\u1ed9 m\u1ea1ng v\u00ec ch\u00fang r\u1ea5t d\u1ec5 b\u1ea3o tr\u00ec v\u00e0 n\u00e2ng c\u1ea5p.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tuy nhi\u00ean, v\u1ea5n \u0111\u1ec1 v\u1edbi k\u1ecbch b\u1ea3n n\u00e0y l\u00e0 thi\u1ebfu s\u1ef1 d\u1ef1 ph\u00f2ng, \u0111i\u1ec1u c\u1ea7n thi\u1ebft cho m\u1ea1ng m\u00e1y t\u00ednh.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1240\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg\" alt=\"C\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao\" width=\"620\" height=\"310\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology.jpg 620w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/starlike-topology-300x150.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi l\u00e0 t\u1ed1t nh\u1ea5t cho m\u1ed9t m\u1ea1ng \u0111\u00e1ng tin c\u1eady, ch\u1eb3ng h\u1ea1n nh\u01b0 ISP \u2013 Nh\u00e0 cung c\u1ea5p d\u1ecbch v\u1ee5 Internet. V\u1edbi thi\u1ebft k\u1ebf n\u00e0y, m\u1ecdi th\u1ee9 \u0111\u1ec1u \u0111\u01b0\u1ee3c sao l\u01b0u. V\u00ec v\u1eady, n\u1ebfu c\u00f3 s\u1ef1 c\u1ed1 v\u1edbi c\u00e1p ho\u1eb7c chuy\u1ec3n m\u1ea1ch, c\u00f3 nh\u1eefng c\u00e1ch kh\u00e1c \u0111\u1ec3 truy c\u1eadp internet ho\u1eb7c b\u1ea5t c\u1ee9 n\u01a1i n\u00e0o b\u1ea1n \u0111ang c\u1ed1 g\u1eafng k\u1ebft n\u1ed1i. H\u00e3y nh\u1edb r\u1eb1ng s\u1ef1 d\u1ef1 ph\u00f2ng ho\u00e0n to\u00e0n c\u00f3 ngh\u0129a l\u00e0 b\u1ea1n s\u1ebd c\u1ea7n nhi\u1ec1u thi\u1ebft b\u1ecb h\u01a1n v\u00e0 c\u00e1p d\u00e0i h\u01a1n, \u0111\u1ed3ng ngh\u0129a v\u1edbi chi ph\u00ed cao h\u01a1n. M\u1ed9t c\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi \u0111\u1ea7y \u0111\u1ee7 th\u01b0\u1eddng t\u1ed1n nhi\u1ec1u chi ph\u00ed h\u01a1n \u0111\u1ec3 tri\u1ec3n khai so v\u1edbi c\u1ea5u tr\u00fac li\u00ean k\u1ebft h\u00ecnh sao.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">M\u1ed9t s\u1ed1 v\u00ed d\u1ee5 v\u1ec1 c\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi l\u00e0 Google Wi-Fi, Google Home ho\u1eb7c M\u1ea1ng trong c\u00e1c thi\u1ebft b\u1ecb qu\u00e2n s\u1ef1.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1241\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/mesh-topology.jpg\" alt=\"C\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi\" width=\"620\" height=\"310\" \/><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi m\u1ed9t ph\u1ea7n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft l\u01b0\u1edbi m\u1ed9t ph\u1ea7n l\u00e0 m\u1ed9t c\u1ea5u tr\u00fac li\u00ean k\u1ebft m\u1ea1ng c\u00f3 gi\u00e1 c\u1ea3 ph\u1ea3i ch\u0103ng h\u01a1n, ch\u1ec9 cung c\u1ea5p s\u1ef1 d\u1ef1 ph\u00f2ng cho m\u1ed9t s\u1ed1 chuy\u1ec3n m\u1ea1ch v\u00e0 ph\u1ea7n c\u1ee7a m\u1ea1ng. C\u00e1c chuy\u1ec3n m\u1ea1ch kh\u00e1c kh\u00f4ng c\u00f3 \u0111\u01b0\u1eddng d\u1eabn thay th\u1ebf.<\/span><\/p>\n<h3><b>C\u1ea5u tr\u00fac li\u00ean k\u1ebft Hub v\u00e0 Spoke<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">C\u1ea5u tr\u00fac li\u00ean k\u1ebft Hub v\u00e0 Spoke \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng th\u01b0\u1eddng xuy\u00ean trong thi\u1ebft k\u1ebf WAN (internet). Ba b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn trong c\u1ea5u tr\u00fac li\u00ean k\u1ebft n\u00e0y kh\u00f4ng quen bi\u1ebft nhau theo m\u1eb7c \u0111\u1ecbnh. \u0110\u1ec3 d\u1eef li\u1ec7u \u0111\u1ebfn \u0111\u00edch c\u1ee7a n\u00f3, c\u1ea3 R1 v\u00e0 R3 s\u1ebd ph\u1ea3i g\u1eedi l\u01b0u l\u01b0\u1ee3ng c\u1ee7a h\u1ecd \u0111\u1ebfn R2, ng\u01b0\u1eddi bi\u1ebft c\u00e1ch chuy\u1ec3n h\u01b0\u1edbng n\u00f3 m\u1ed9t c\u00e1ch ch\u00ednh x\u00e1c. V\u00ed d\u1ee5, n\u1ebfu R1 mu\u1ed1n g\u1eedi l\u01b0u l\u01b0\u1ee3ng \u0111\u1ebfn R3, h\u1ecd s\u1ebd l\u00e0m \u0111i\u1ec1u \u0111\u00f3 b\u1eb1ng c\u00e1ch g\u1eedi qua Hub (R2). Hub sau \u0111\u00f3 bi\u1ebft c\u00e1ch x\u1eed l\u00fd v\u00e0 chuy\u1ec3n h\u01b0\u1edbng l\u01b0u l\u01b0\u1ee3ng \u0111\u00f3.<\/span><\/p>\n<h2><b>Th\u00e0nh ph\u1ea7n m\u1ea1ng<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">C\u00e1c ph\u1ea7n k\u1ebft h\u1ee3p l\u1ea1i \u0111\u1ec3 t\u1ea1o th\u00e0nh m\u1ed9t m\u1ea1ng l\u00e0:<\/span><\/p>\n<h3><b>Thi\u1ebft b\u1ecb \u0111\u1ea7u cu\u1ed1i<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">B\u1ea5t k\u1ef3 thi\u1ebft b\u1ecb v\u1eadt l\u00fd n\u00e0o ch\u00fang ta s\u1eed d\u1ee5ng \u0111\u1ec3 k\u1ebft n\u1ed1i v\u1edbi internet \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 thi\u1ebft b\u1ecb \u0111\u1ea7u cu\u1ed1i. \u0110i\u1ec1u n\u00e0y bao g\u1ed3m PC, m\u00e1y t\u00ednh x\u00e1ch tay, \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh, m\u00e1y ch\u1ee7 v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa. K\u1ebft n\u1ed1i c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c th\u1ef1c hi\u1ec7n th\u00f4ng qua nhi\u1ec1u k\u00eanh, ch\u1eb3ng h\u1ea1n nh\u01b0 \u0111i\u1ec7n, xung \u00e1nh s\u00e1ng ho\u1eb7c s\u00f3ng v\u00f4 tuy\u1ebfn. Ch\u00fang ta c\u00f3 th\u1ec3 k\u1ebft n\u1ed1i v\u1edbi Internet kh\u00f4ng d\u00e2y t\u1eeb \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh, m\u00e1y t\u00ednh x\u00e1ch tay v\u00e0 PC c\u1ee7a m\u00ecnh. N\u1ebfu ch\u00fang ta \u0111ang s\u1eed d\u1ee5ng m\u00e1y t\u00ednh x\u00e1ch tay ho\u1eb7c PC, ch\u00fang ta c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1p m\u1ea1ng (UTP).<\/span><\/p>\n<h3><b>Chuy\u1ec3n m\u1ea1ch<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">M\u1ed9t chuy\u1ec3n m\u1ea1ch k\u1ebft n\u1ed1i nhi\u1ec1u thi\u1ebft b\u1ecb \u0111\u1ea7u cu\u1ed1i, nh\u01b0 m\u00e1y t\u00ednh v\u00e0 m\u00e1y in, trong m\u1ed9t m\u1ea1ng (LAN).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thi\u1ebft b\u1ecb n\u00e0y ph\u1ed5 bi\u1ebfn v\u00ec kh\u1ea3 n\u0103ng x\u1eed l\u00fd nhi\u1ec1u c\u1ed5ng, v\u1edbi t\u1ed1c \u0111\u1ed9 t\u1eeb 1 \u0111\u1ebfn 10 Gbps m\u1ed7i c\u1ed5ng. Chuy\u1ec3n m\u1ea1ch s\u1eed d\u1ee5ng \u0111\u1ecba ch\u1ec9 MAC \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c thi\u1ebft b\u1ecb \u0111\u1ea7u cu\u1ed1i k\u1ebft n\u1ed1i v\u1edbi m\u1ea1ng. \u0110i\u1ec1u n\u00e0y gi\u00fap b\u1ea1n d\u1ec5 d\u00e0ng theo d\u00f5i c\u00e1c thi\u1ebft b\u1ecb n\u00e0o \u0111ang k\u1ebft n\u1ed1i v\u1edbi m\u1ea1ng c\u1ee7a b\u1ea1n v\u00e0 \u0111\u1ea3m b\u1ea3o r\u1eb1ng ch\u1ec9 c\u00e1c thi\u1ebft b\u1ecb \u0111\u01b0\u1ee3c \u1ee7y quy\u1ec1n m\u1edbi c\u00f3 th\u1ec3 truy c\u1eadp d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n.<\/span><\/p>\n<h3><b>B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">M\u1ed9t b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn k\u1ebft n\u1ed1i nhi\u1ec1u m\u1ea1ng nh\u1ecf h\u01a1n (LAN) \u0111\u1ec3 t\u1ea1o th\u00e0nh m\u1ed9t m\u1ea1ng l\u1edbn (WAN- M\u1ea1ng di\u1ec7n r\u1ed9ng). B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn l\u00e0 m\u1ed9t thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i ch\u00fang ta v\u1edbi internet b\u1eb1ng c\u00e1ch x\u1eed l\u00fd vi\u1ec7c giao nh\u1eadn g\u00f3i tin t\u1eeb b\u1ea5t k\u1ef3 ngu\u1ed3n m\u1ea1ng n\u00e0o \u0111\u1ebfn b\u1ea5t k\u1ef3 m\u1ea1ng \u0111\u00edch n\u00e0o. B\u1ed9 \u0111\u1ecbnh tuy\u1ebfn s\u1eed d\u1ee5ng \u0111\u1ecba ch\u1ec9 IP \u0111\u1ec3 x\u00e1c \u0111\u1ecbnh c\u00e1c thi\u1ebft b\u1ecb g\u1eedi v\u00e0 nh\u1eadn d\u1eef li\u1ec7u. M\u1ed9t b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn th\u01b0\u1eddng c\u00f3 t\u1eeb 2 \u0111\u1ebfn 5 c\u1ed5ng, tr\u00e1i ng\u01b0\u1ee3c v\u1edbi m\u1ed9t chuy\u1ec3n m\u1ea1ch c\u00f3 th\u1ec3 c\u00f3 nhi\u1ec1u h\u01a1n. Ngo\u00e0i ra, c\u1ea3 hai thi\u1ebft b\u1ecb \u0111\u1ec1u c\u00f3 t\u1ed1c \u0111\u1ed9 t\u01b0\u01a1ng \u0111\u01b0\u01a1ng t\u1eeb 100 Mbps \u0111\u1ebfn 10 Gbps, t\u00f9y thu\u1ed9c v\u00e0o m\u00f4 h\u00ecnh.<\/span><\/p>\n<h3><b>T\u01b0\u1eddng l\u1eeda<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ch\u00fang ta \u0111\u01b0\u1ee3c trang b\u1ecb t\u1ed1t h\u01a1n \u0111\u1ec3 ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c \u0111\u1ed9t nh\u1eadp \u1ea3o c\u00f3 th\u1ec3 x\u1ea3y ra b\u1eb1ng c\u00e1ch c\u00f3 m\u1ed9t t\u01b0\u1eddng l\u1eeda.<\/span><\/p>\n<h3><b>Ph\u01b0\u01a1ng ti\u1ec7n truy\u1ec1n d\u1eabn<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ph\u01b0\u01a1ng ti\u1ec7n truy\u1ec1n d\u1eabn l\u00e0 ph\u01b0\u01a1ng ti\u1ec7n m\u00e0 th\u00f4ng tin \u0111\u01b0\u1ee3c truy\u1ec1n t\u1ea3i, v\u00ed d\u1ee5 nh\u01b0 qua c\u00e1p ho\u1eb7c kh\u00f4ng d\u00e2y.<\/span><\/p>\n<h2><b>M\u00e1y t\u00ednh giao ti\u1ebfp qua Internet nh\u01b0 th\u1ebf n\u00e0o?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">L\u01b0u l\u01b0\u1ee3ng ph\u1ea3i c\u00f3 m\u1ed9t \u0111\u1ecbnh danh duy nh\u1ea5t \u0111\u1ec3 giao ti\u1ebfp v\u1edbi c\u00e1c trang web nh\u01b0 Facebook v\u00e0 Google. \u0110i\u1ec1u n\u00e0y \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 IP ho\u1eb7c Giao th\u1ee9c Internet. IP, ho\u1eb7c Giao th\u1ee9c Internet, l\u00e0 c\u00e1ch ch\u00fang ta x\u00e1c \u0111\u1ecbnh m\u1ed9t thi\u1ebft b\u1ecb trong m\u1ea1ng ho\u1eb7c tr\u00ean internet. S\u1ed1 n\u00e0y ph\u1ea3i l\u00e0 duy nh\u1ea5t. B\u1ea1n kh\u00f4ng th\u1ec3 c\u00f3 hai \u0111\u1ecba ch\u1ec9 IP gi\u1ed1ng nhau tr\u00ean c\u00f9ng m\u1ed9t m\u1ea1ng ho\u1eb7c Internet v\u00ec n\u00f3 s\u1ebd t\u1ea1o ra xung \u0111\u1ed9t v\u00e0 k\u1ebft n\u1ed1i c\u1ee7a b\u1ea1n s\u1ebd kh\u00f4ng ho\u1ea1t \u0111\u1ed9ng ch\u00ednh x\u00e1c.<\/span><\/p>\n<h3><b>S\u1ef1 ph\u00e1t tri\u1ec3n c\u1ee7a Internet<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Trong nh\u1eefng n\u0103m g\u1ea7n \u0111\u00e2y, s\u1ed1 l\u01b0\u1ee3ng thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i tr\u00ean to\u00e0n th\u1ebf gi\u1edbi \u0111\u00e3 b\u00f9ng n\u1ed5. B\u1ea1n c\u00f3 bi\u1ebft r\u1eb1ng v\u00e0o n\u0103m 2020, c\u00f3 kho\u1ea3ng 50 t\u1ef7 thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i v\u1edbi internet kh\u00f4ng? V\u00e0 trong s\u1ed1 50 t\u1ef7 thi\u1ebft b\u1ecb \u0111\u00f3, m\u1ed9t s\u1ed1 l\u01b0\u1ee3ng ng\u00e0y c\u00e0ng cao l\u00e0 m\u1ed9t ph\u1ea7n c\u1ee7a Internet v\u1ea1n v\u1eadt (IoT).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Internet v\u1ea1n v\u1eadt (IoT) m\u00f4 t\u1ea3 c\u00e1c thi\u1ebft b\u1ecb c\u00f3 th\u1ec3 thu th\u1eadp d\u1eef li\u1ec7u t\u1eeb nhau v\u00e0 s\u1eed d\u1ee5ng internet \u0111\u1ec3 giao ti\u1ebfp. M\u1ed9t s\u1ed1 v\u00ed d\u1ee5 v\u1ec1 c\u00e1c thi\u1ebft b\u1ecb IoT ph\u1ed5 bi\u1ebfn bao g\u1ed3m c\u1ea3m bi\u1ebfn, thi\u1ebft b\u1ecb nh\u00e0 th\u00f4ng minh, thi\u1ebft b\u1ecb thanh to\u00e1n v\u00e0 thi\u1ebft b\u1ecb \u0111eo th\u00f4ng minh. Nh\u1eefng thi\u1ebft b\u1ecb n\u00e0y c\u0169ng c\u1ea7n ph\u1ea3i c\u00f3 m\u1ed9t \u0111\u1ecba ch\u1ec9 IP.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u0110\u1ecba ch\u1ec9 IP c\u00f3 hai lo\u1ea1i:<\/span><\/p>\n<h2><b>IP c\u00f4ng c\u1ed9ng VS IP ri\u00eang<\/b><\/h2>\n<h3><b>\u0110\u1ecba ch\u1ec9 IP c\u00f4ng c\u1ed9ng<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u0110\u00fang nh\u01b0 t\u00ean g\u1ecdi c\u1ee7a ch\u00fang, \u0111\u1ecba ch\u1ec9 IP c\u00f4ng c\u1ed9ng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 giao ti\u1ebfp qua internet. C\u00e1c t\u1ed5 ch\u1ee9c nh\u01b0 NIC (Trung t\u00e2m Th\u00f4ng tin M\u1ea1ng) v\u00e0 IANA \u0111\u0103ng k\u00fd \u0111\u1ecba ch\u1ec9 IP c\u00f4ng c\u1ed9ng, sau \u0111\u00f3 \u0111\u01b0\u1ee3c g\u00e1n cho c\u00e1c Nh\u00e0 cung c\u1ea5p D\u1ecbch v\u1ee5 Internet (ISP) ho\u1eb7c c\u00e1c nh\u00f3m kh\u00e1c.<\/span><\/p>\n<h3><b>\u0110\u1ecba ch\u1ec9 IP ri\u00eang<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">\u0110\u1ecba ch\u1ec9 IP ri\u00eang th\u01b0\u1eddng \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng trong M\u1ea1ng c\u1ee5c b\u1ed9 (LAN), nh\u01b0 m\u1ea1ng gia \u0111\u00ecnh ho\u1eb7c tr\u01b0\u1eddng h\u1ecdc. Do \u0111\u00f3, \u0111\u1ecba ch\u1ec9 IP ri\u00eang kh\u00f4ng th\u1ec3 \u0111\u01b0\u1ee3c t\u00ecm th\u1ea5y tr\u00ean Internet. \u0110\u1ec3 cho ph\u00e9p c\u00e1c m\u00e1y t\u00ednh giao ti\u1ebfp v\u1edbi nhau qua Internet, m\u1ed9t giao th\u1ee9c \u0111\u00e3 \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 NAT (D\u1ecbch \u0111\u1ecba ch\u1ec9 m\u1ea1ng). \u0110i\u1ec1u n\u00e0y chuy\u1ec3n \u0111\u1ed5i \u0111\u1ecba ch\u1ec9 IP ri\u00eang th\u00e0nh IP c\u00f4ng c\u1ed9ng.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">NAT c\u00f3 th\u1ec3 c\u1ea3i thi\u1ec7n b\u1ea3o m\u1eadt m\u1ea1ng c\u1ee7a ch\u00fang ta b\u1eb1ng c\u00e1ch l\u00e0m cho k\u1ebb t\u1ea5n c\u00f4ng kh\u00f3 truy c\u1eadp v\u00e0o \u0111\u1ecba ch\u1ec9 IP ri\u00eang.<\/span><\/p>\n<h2><b>T\u00f3m t\u1eaft<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Khi s\u1ed1 l\u01b0\u1ee3ng thi\u1ebft b\u1ecb k\u1ebft n\u1ed1i v\u1edbi internet ti\u1ebfp t\u1ee5c t\u0103ng, ch\u00fang ta ph\u1ea3i hi\u1ec3u c\u00e1ch ch\u00fang giao ti\u1ebfp v\u1edbi nhau. B\u00e0i vi\u1ebft n\u00e0y xem x\u00e9t c\u00e1c th\u00e0nh ph\u1ea7n m\u1ea1ng kh\u00e1c nhau v\u00e0 c\u00e1ch ch\u00fang ho\u1ea1t \u0111\u1ed9ng c\u00f9ng nhau \u0111\u1ec3 cho ph\u00e9p ch\u00fang ta duy\u1ec7t web, g\u1eedi email v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa. Ch\u00fang ta c\u0169ng \u0111\u00e3 xem x\u00e9t c\u00e1ch \u0111\u1ecba ch\u1ec9 IP \u0111\u00f3ng vai tr\u00f2 trong vi\u1ec7c x\u00e1c \u0111\u1ecbnh c\u00e1c thi\u1ebft b\u1ecb v\u00e0 l\u00fd do t\u1ea1i sao IP ri\u00eang \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng trong m\u1ea1ng c\u1ee5c b\u1ed9. Hi\u1ec3u c\u00e1ch c\u00e1c c\u00f4ng ngh\u1ec7 n\u00e0y ho\u1ea1t \u0111\u1ed9ng l\u00e0 quan tr\u1ecdng h\u01a1n khi ch\u00fang ta b\u01b0\u1edbc v\u00e0o m\u1ed9t th\u1ebf gi\u1edbi ng\u00e0y c\u00e0ng k\u1ebft n\u1ed1i.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>M\u1ea1ng l\u00e0 h\u1ec7 th\u1ed1ng c\u00e1c thi\u1ebft b\u1ecb \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i v\u1edbi nhau, trao \u0111\u1ed5i th\u00f4ng tin v\u1edbi nhau \u0111\u1ec3 ho\u1ea1t \u0111\u1ed9ng ch\u00ednh x\u00e1c. C\u00f3 th\u1ec3 bao g\u1ed3m m\u00e1y t\u00ednh x\u00e1ch tay, m\u00e1y ch\u1ee7, \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh, v.v. C\u00e1c thi\u1ebft b\u1ecb giao ti\u1ebfp v\u1edbi nhau\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">M\u1ea1ng c\u01a1 b\u1ea3n: M\u1ea1ng ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1239","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How do Internet and Networks Work | Security Briefing<\/title>\n<meta name=\"description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How do Internet and Networks Work | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-25T20:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2065\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Basic Networking: How do Networks Work\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"},\"wordCount\":1596,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"articleSection\":[\"Networks\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"url\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\",\"name\":\"How do Internet and Networks Work | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"datePublished\":\"2022-11-25T20:28:32+00:00\",\"description\":\"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg\",\"width\":2560,\"height\":2065,\"caption\":\"Basic Networking image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Basic Networking: How do Networks Work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet v\u00e0 M\u1ea1ng ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o | T\u00f3m t\u1eaft B\u1ea3o m\u1eadt","description":"B\u1ea1n c\u00f3 hi\u1ec3u c\u00e1ch internet ho\u1ea1t \u0111\u1ed9ng kh\u00f4ng? B\u00e0i vi\u1ebft n\u00e0y \u0111i s\u00e2u v\u00e0o c\u00e1c m\u1ea1ng, b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn, chuy\u1ec3n m\u1ea1ch v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/","og_locale":"vi_VN","og_type":"article","og_title":"How do Internet and Networks Work | Security Briefing","og_description":"Do you understand how the internet works? This article takes a deep dive into networks, routers, switches, and more.","og_url":"https:\/\/securitybriefing.net\/vi\/mang-luoi\/mang-hoat-dong-nhu-the-nao\/","og_site_name":"Security Briefing","article_published_time":"2022-11-25T20:28:32+00:00","og_image":[{"width":2560,"height":2065,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"8 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Basic Networking: How do Networks Work","datePublished":"2022-11-25T20:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"},"wordCount":1596,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","articleSection":["Networks"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","url":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/","name":"Internet v\u00e0 M\u1ea1ng ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o | T\u00f3m t\u1eaft B\u1ea3o m\u1eadt","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","datePublished":"2022-11-25T20:28:32+00:00","description":"B\u1ea1n c\u00f3 hi\u1ec3u c\u00e1ch internet ho\u1ea1t \u0111\u1ed9ng kh\u00f4ng? B\u00e0i vi\u1ebft n\u00e0y \u0111i s\u00e2u v\u00e0o c\u00e1c m\u1ea1ng, b\u1ed9 \u0111\u1ecbnh tuy\u1ebfn, chuy\u1ec3n m\u1ea1ch v\u00e0 nhi\u1ec1u h\u01a1n n\u1eefa.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_businessman-hand-working-with-the-new-computer-shows__142-scaled-2.jpg","width":2560,"height":2065,"caption":"Basic Networking image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/networks\/how-do-networks-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Basic Networking: How do Networks Work"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1239","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1239"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1239\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1245"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1239"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1239"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1239"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}