facebook linkedin twitter

Tech Term: Routers, Defined

Tech Term: Routers, Defined

With businesses relying more and more on portability and mobility, it should come as no surprise that businesses also have to devote more time to the proper management of their wireless network. A considerable portion of this management is reliant on the router the business uses, as without the router, the business simply couldn’t have a wireless connection.

For this week’s tech term, we’ll discuss the router in a little more depth.

What is a Router, Anyway?
The router got its start almost 50 years ago, developed under the name ‘Interface Message Processor’ by BBN at the end of the 1960s. Since then, routers have increased in utility, now serving to enable the user to communicate through a variety of different means - including data, video, and voice.

The router, or Interface Message Processor, was initially created to be used on the Internet’s predecessor, the ARPAnet. After years of development, Bill Yeager created the code that enabled the first multi-protocol router, which in turn led to the development of the first Local Area Network, or LAN, by Len Bosack and Sandy Lerner. This pair would go on to create Cisco Systems in 1984. Cisco has since grown to become the largest networking company anywhere in the world.

What Does a Router Do?
To greatly simplify the responsibilities of the router, it helps to imagine them as the exchange tubes that banks, and credit unions use in their drive-thru, and the funds they transport as the data that is exchanged through the router’s activity. The vacuum tube serves as the go-between between you in your car and the teller inside the bank, allowing you to communicate and exchange information.

Your router serves a very similar purpose to your network as the vacuum tube does to the bank, as your router establishes a connection between you and the Internet. Routers provide the connection between the Internet (or more literally, your Internet modem) and your devices. While many routers are described as wireless, this isn’t completely accurate. Any router will typically require a pair of connections - one to a power source, and the other to the modem.

How Does a Router Really Work?
Assuming that the necessary wires are properly connected, your router will send a signal out to the rest of your devices, so they can connect to the Internet. These signals will usually reach anywhere between 90 to 300 meters away, depending on the power of the router. Any device with a Wi-Fi connection built into it will connect, assuming that it has the proper credentials to do so. This number of devices will only grow as more consumer goods, like fitness wearables and other ‘smart’ accessories, are granted the ability to access the Internet as a part of their function.

At the very least, you will need to account for these connections when selecting a router. You should also do some research and identify any features that may be of particular use to you.

Some Options and Features
As is the case with any other piece of technology, a router gets better with every additional feature and capability it has. Routers are now able to leverage assorted features and capabilities that improve both their function, and their security.

  • Dual-band Wi-Fi - Since there are so many devices using the 2.4GHz frequency, now many wireless routers come with dual bands (2.4GHz and 5Ghz).
  • Wireless On/Off Toggle - For ease of use, having a dedicated on/off switch on the device is always practical.
  • Detachable Antennas - Today, a lot of the routers you’ll see don’t have external antennas, but if you can find a model with them, they will provide more coverage to your Wi-Fi connection - and can even be upgraded!
  • IPv6 Support - IPv4 addresses have been exhausted for some time, so every router you plan to have for a while has to support IPv6.

Computerware has technicians on staff that can help you build a successful wireless network. For more information, call us today at (703) 821-8200.

What Android Oreo Includes
Why the Internet of Things is Here to Stay
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, October 19, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Business Computing Software Hackers Microsoft Backup Managed Service Provider Workplace Tips Productivity Data Hardware Saving Money Business Email Malware Network Security IT Services IT Support Hosted Solutions Efficiency Google Small Business User Tips Computer Smartphones Gadgets Quick Tips Mobile Devices Business Continuity Disaster Recovery Innovation Virtualization Network Android Microsoft Office Mobile Office Social Media Mobile Device Management VoIP Server Collaboration Communication Smartphone Miscellaneous Upgrade Ransomware Windows 10 Data Backup Unified Threat Management Windows Data Recovery IT Support Remote Monitoring Tech Term Passwords Operating System Mobile Computing Vendor Management Managed IT services BYOD Remote Computing Holiday Facebook Cybersecurity communications WiFi Productivity Apps BDR The Internet of Things Analytics Marketing Apple Users Automation History Firewall Data Management Phishing Managed IT Services Outsourced IT Mobile Device Internet of Things Alert App Artificial Intelligence IT Consultant Browser Save Money Maintenance Content Filtering Big data Going Green Spam Health Bandwidth Gmail Bring Your Own Device Antivirus Encryption Office Cost Management Lithium-ion Battery Printer Best Practice Information Technology Tech Support Virus Office 365 Budget Hiring/Firing Two-factor Authentication Hard Drives Help Desk Wireless Technology Managed IT Search Cybercrime Windows 8 Outlook Update Hacking IBM Cloud Computing Money Business Technology Document Management Phone System Computers Recovery Saving Time VPN Employer-Employee Relationship Travel Training Legal Networking Regulations Humor Hard Drive Risk Management Access Control SaaS Save Time It Management Customer Service Law Enforcement Running Cable Proactive IT Compliance Government Website Administration Data storage Windows 10 Intranet Education Password Cortana iPhone File Sharing Hacker Paperless Office Business Intelligence Excel Mobility Sports Social Engineering Computing Disaster Digital Payment End of Support Downtime User Customer Relationship Management Data Security Hosted Solution Information Augmented Reality Robot PowerPoint Patch Management Blockchain Securty Comparison Tablet Company Culture Data Loss Wireless Computer Repair Current Events Solid State Drive DDoS Social Networking Flexibility Data Breach Machine Learning Black Market Applications Telephone Systems Word Project Management Laptop Twitter Avoiding Downtime Fax Server Business Growth Monitors Conferencing Streaming Media Value Start Menu Tech Terms Cleaning Identity Theft Mobile Technology Office Tips Software as a Service Pain Points Vendor YouTube Monitoring Uninterrupted Power Supply Google Maps Net Neutrality Processors USB Politics Unified Communications Settings Chrome Virtual Reality Bitcoin Emails Presentation Automobile Chromebook Management Router Data Protection Virtual Desktop Computer Accessories Specifications Safety Computing Infrastructure Hack Social IT service Vulnerabilities Gaming Console How To Download Healthcare Private Cloud Trending Documents Heating/Cooling Webcam Scam Mouse Text Messaging Co-managed IT Redundancy Telephony Bluetooth Storage User Error Taxes Programming Statistics Network Congestion Cryptocurrency Distributed Denial of Service Retail Digital Google Docs Inbound Marketing Websites Lifestyle Experience Public Cloud Managed Service eWaste Telephone System Analytic Shortcut Leadership Relocation Tablets Mobile Security Recycling Adminstration Pirating Information Banking Data Warehousing Botnet Multi-Factor Security Cost Product Reviews Entrepreneur Emergency Hard Drive Disposal Advertising Flash Software License Trends Troubleshooting Best Practives Bookmark Access CIO Sync Environment Notifications Microsoft Excel Windows XP CCTV Fraud Tactics Read HIPAA Computer Care Staffing Google Wallet Devices Windows Server 2008 Computer Malfunction Displays Competition Microserver Reliable Computing Society UTM Content Electronic Payment Google Drive Business Metrics Legislation Error Vulnerability IT Plan Device Management Enterprise Resource Planning Business Owner Browsers Spyware Mobile Payment In Internet of Things Micrsooft email scam Addiction Content Management Get More Done IP Address Upselling User Tip Electricity Printing Drones Accountants A.I. Business Managemenet Windows 7 Motion Sickness Application Turn Key Scalability Multi-factor Authentication Printer Server Human Resources Video Surveillance Wireless Headphones Telephone Saving ZTime Messenger Permissions Tracking Language Migration Connected Devices online Currency Trojan cache Television Organize Rental Service Meetings Network Management WannaCry Downloads Equifax Fleet Tracking Time Management Freedom of Information switches Web Server Writing Digital Signature Harddrive Corporate Profile Music Cabling Device security MSP LinkedIn Debate Nanotechnology Social Network Teamwork Books Workers Desktop Finance Entertainment GPS Assessment Wi-Fi SharePoint Administrator Upgrades External Harddrive Tip of the week LiFi Supercomputer Business Cards Service Level Agreement Archive Proxy Server Google Calendar Startup Asset Tracking Skype Touchscreen Microchip News Unified Threat Management Backup and Disaster Recovery Electronic Medical Records VoIP Worker Username PDF Webinar Screen Reader Point of Contact Customer Resource management Best Available Keyboard Thin CLient Knowledge Reading Samsung Work/Life Balance Gamification 3D Ebay Consultation Evernote Deep Learning Smart Phones Virtual Assistant Visible Light Communication Employer Employee Relationship Memory Piracy Upload Domains Dark Web Technology Tips G Suite Smart Tech Distribution Hacks Fake News IT consulting Physical Security Fiber-Optic Database Public Speaking Health IT Audit Licensing HTML Managing Stress Productuvuty Regulation Data Analysis Printers CrashOverride 3D Printing Capital

toner1