facebook linkedin twitter

Tech Term: Routers, Defined

Tech Term: Routers, Defined

With businesses relying more and more on portability and mobility, it should come as no surprise that businesses also have to devote more time to the proper management of their wireless network. A considerable portion of this management is reliant on the router the business uses, as without the router, the business simply couldn’t have a wireless connection.

For this week’s tech term, we’ll discuss the router in a little more depth.

What is a Router, Anyway?
The router got its start almost 50 years ago, developed under the name ‘Interface Message Processor’ by BBN at the end of the 1960s. Since then, routers have increased in utility, now serving to enable the user to communicate through a variety of different means - including data, video, and voice.

The router, or Interface Message Processor, was initially created to be used on the Internet’s predecessor, the ARPAnet. After years of development, Bill Yeager created the code that enabled the first multi-protocol router, which in turn led to the development of the first Local Area Network, or LAN, by Len Bosack and Sandy Lerner. This pair would go on to create Cisco Systems in 1984. Cisco has since grown to become the largest networking company anywhere in the world.

What Does a Router Do?
To greatly simplify the responsibilities of the router, it helps to imagine them as the exchange tubes that banks, and credit unions use in their drive-thru, and the funds they transport as the data that is exchanged through the router’s activity. The vacuum tube serves as the go-between between you in your car and the teller inside the bank, allowing you to communicate and exchange information.

Your router serves a very similar purpose to your network as the vacuum tube does to the bank, as your router establishes a connection between you and the Internet. Routers provide the connection between the Internet (or more literally, your Internet modem) and your devices. While many routers are described as wireless, this isn’t completely accurate. Any router will typically require a pair of connections - one to a power source, and the other to the modem.

How Does a Router Really Work?
Assuming that the necessary wires are properly connected, your router will send a signal out to the rest of your devices, so they can connect to the Internet. These signals will usually reach anywhere between 90 to 300 meters away, depending on the power of the router. Any device with a Wi-Fi connection built into it will connect, assuming that it has the proper credentials to do so. This number of devices will only grow as more consumer goods, like fitness wearables and other ‘smart’ accessories, are granted the ability to access the Internet as a part of their function.

At the very least, you will need to account for these connections when selecting a router. You should also do some research and identify any features that may be of particular use to you.

Some Options and Features
As is the case with any other piece of technology, a router gets better with every additional feature and capability it has. Routers are now able to leverage assorted features and capabilities that improve both their function, and their security.

  • Dual-band Wi-Fi - Since there are so many devices using the 2.4GHz frequency, now many wireless routers come with dual bands (2.4GHz and 5Ghz).
  • Wireless On/Off Toggle - For ease of use, having a dedicated on/off switch on the device is always practical.
  • Detachable Antennas - Today, a lot of the routers you’ll see don’t have external antennas, but if you can find a model with them, they will provide more coverage to your Wi-Fi connection - and can even be upgraded!
  • IPv6 Support - IPv4 addresses have been exhausted for some time, so every router you plan to have for a while has to support IPv6.

Computerware has technicians on staff that can help you build a successful wireless network. For more information, call us today at (703) 821-8200.

What Android Oreo Includes
Why the Internet of Things is Here to Stay


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, January 19, 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Software Business Computing Hackers Business Management Microsoft Data Workplace Tips Managed Service Provider Backup Productivity Hardware Business Network Security Saving Money Malware Email IT Services Hosted Solutions Efficiency IT Support Google Small Business Computer Quick Tips Mobile Devices User Tips Smartphones Gadgets Business Continuity Innovation Disaster Recovery Microsoft Office Android Social Media Mobile Office Virtualization Network VoIP Data Backup Collaboration Communication Server Smartphone Mobile Device Management Miscellaneous Productivity Data Recovery Upgrade Ransomware Tech Term Windows 10 Windows IT Support Unified Threat Management Holiday communications Passwords Remote Monitoring Facebook Operating System Vendor Management Apps Mobile Computing Cybersecurity Managed IT services BYOD Remote Computing Phishing BDR Users WiFi Mobile Device Analytics Automation Marketing The Internet of Things Firewall Outsourced IT History Apple Data Management Alert Artificial Intelligence Internet of Things Browser Save Money Managed IT Services IT Consultant Big data Encryption App Content Filtering Going Green Office Bring Your Own Device Bandwidth Gmail Antivirus Maintenance Spam Printer Health Cost Management Saving Time Best Practice Information Technology Lithium-ion Battery Office 365 Budget Windows 8 Outlook Two-factor Authentication Help Desk Business Technology Wireless Technology Managed IT Search Tech Support Hiring/Firing Cybercrime Virus Windows 10 Hard Drives Cloud Computing Computers Hacking Phone System VPN Travel Access Control IBM Update Training Blockchain Money Recovery Document Management Employer-Employee Relationship Regulations Intranet Twitter Education SaaS Information It Management Risk Management Customer Service Law Enforcement Save Time Compliance Healthcare Administration Website Data storage Humor Government Hard Drive Applications Mobility Running Cable Proactive IT Managed Service Networking Legal Hacker Current Events Excel Paperless Office Sports Disaster Computing Customer Relationship Management Hosted Solution Augmented Reality End of Support Machine Learning User Data Security Telephone Systems Robot PowerPoint Securty Fax Server Social Wireless Patch Management Business Intelligence Data Loss DDoS Digital Payment Solid State Drive Scam Router Downtime File Sharing Black Market Flexibility Data Breach Google Maps Comparison Tablet Cryptocurrency Company Culture Laptop Word Avoiding Downtime Computer Repair Business Growth Digital Social Engineering Project Management Password Cortana iPhone Websites Social Networking Value Start Menu Tech Terms Computing Infrastructure Hack Programming Office Tips Conferencing Statistics Pain Points Network Congestion Mobile Technology How To Download YouTube Processors Software as a Service Private Cloud Uninterrupted Power Supply Co-managed IT Vendor User Error Monitoring USB Unified Communications Settings Streaming Media Presentation Telephony Microchip Taxes Bitcoin Data Protection Distributed Denial of Service Specifications Safety Management Virtual Desktop Gaming Console Lifestyle Net Neutrality IT service Text Messaging Chrome Documents Webcam Vulnerabilities Public Cloud Entertainment Heating/Cooling Identity Theft Storage Bluetooth Computer Accessories Redundancy Virtual Reality Retail Google Docs Inbound Marketing Evernote Politics Trending Experience Emails Mouse eWaste Automobile Chromebook Monitors Cleaning Organize Mobile Security Health IT Troubleshooting CIO Data Warehousing Messenger Tracking Telephone System Processing Entrepreneur Advertising Flash Point of Contact HIPAA Staffing Google Wallet Access Rental Service Multi-Factor Security Meetings Cost Managed IT Service Environment Windows XP Emergency Hard Drive Disposal Software License Trends Computer Care Devices Web Server Bookmark Electronic Payment Displays Microsoft Excel Fraud Tactics Cabling Competition Society Wi-Fi UTM Administrator Content Business Owner Micrsooft Google Drive Windows Server 2008 Books Workers Google Play Upselling Enterprise Resource Planning Analytic IP Address Drones Video Surveillance Spyware Mobile Payment Legislation Supercomputer Error Processor Recycling Webinar Vulnerability IT Plan Electricity Printing Accountants A.I. Browsers Human Resources Saving ZTime email scam Addiction Worker Product Reviews Application Multi-factor Authentication User Tip Read Windows 7 Reading Samsung Security Cameras Permissions Language Migration G Suite Connected Devices Debate cache Television Wireless Headphones Employer Employee Relationship Telephone Navigation Harddrive Music GPS WannaCry Downloads Hacks Equifax Physical Security Fleet Tracking Data Analysis Device Management switches Writing Network Management Licensing Digital Signature Corporate Profile Banking Device security Botnet MSP Content Management Upgrades External Harddrive Best Practives Time Management Freedom of Information Relocation Tablets GDPR Teamwork Business Managemenet Desktop Sync Finance Assessment SharePoint Nanotechnology Social Network Tech LiFi 3D Ebay Microserver Google Calendar Notifications Startup CCTV Asset Tracking Fileless Malware online Currency PDF Thin CLient Tip of the week Business Cards Service Level Agreement VoIP Business Metrics Computer Malfunction Username Proxy Server Deep Learning Smart Phones Touchscreen News Unified Threat Management Reliable Computing Backup and Disaster Recovery Modem Best Available Keyboard Work/Life Balance Knowledge In Internet of Things Gamification Electronic Medical Records Domains Get More Done Consultation Screen Reader Customer Resource management Term LinkedIn Visible Light Communication Memory Public Speaking Adminstration Pirating Information Turn Key Technology Tips Smart Tech Distribution Directions IT consulting Leadership Printer Server Virtual Assistant Piracy Upload Audit HTML Motion Sickness Dark Web Archive Trojan Fake News Fiber-Optic Scalability Database SSID Skype Shortcut Managing Stress Productuvuty Regulation Cooperation Medical IT Printers CrashOverride 3D Printing Capital