Tech Term: Routers, Defined

Tech Term: Routers, Defined

With businesses relying more and more on portability and mobility, it should come as no surprise that businesses also have to devote more time to the proper management of their wireless network. A considerable portion of this management is reliant on the router the business uses, as without the router, the business simply couldn’t have a wireless connection.

For this week’s tech term, we’ll discuss the router in a little more depth.

What is a Router, Anyway?
The router got its start almost 50 years ago, developed under the name ‘Interface Message Processor’ by BBN at the end of the 1960s. Since then, routers have increased in utility, now serving to enable the user to communicate through a variety of different means - including data, video, and voice.

The router, or Interface Message Processor, was initially created to be used on the Internet’s predecessor, the ARPAnet. After years of development, Bill Yeager created the code that enabled the first multi-protocol router, which in turn led to the development of the first Local Area Network, or LAN, by Len Bosack and Sandy Lerner. This pair would go on to create Cisco Systems in 1984. Cisco has since grown to become the largest networking company anywhere in the world.

What Does a Router Do?
To greatly simplify the responsibilities of the router, it helps to imagine them as the exchange tubes that banks, and credit unions use in their drive-thru, and the funds they transport as the data that is exchanged through the router’s activity. The vacuum tube serves as the go-between between you in your car and the teller inside the bank, allowing you to communicate and exchange information.

Your router serves a very similar purpose to your network as the vacuum tube does to the bank, as your router establishes a connection between you and the Internet. Routers provide the connection between the Internet (or more literally, your Internet modem) and your devices. While many routers are described as wireless, this isn’t completely accurate. Any router will typically require a pair of connections - one to a power source, and the other to the modem.

How Does a Router Really Work?
Assuming that the necessary wires are properly connected, your router will send a signal out to the rest of your devices, so they can connect to the Internet. These signals will usually reach anywhere between 90 to 300 meters away, depending on the power of the router. Any device with a Wi-Fi connection built into it will connect, assuming that it has the proper credentials to do so. This number of devices will only grow as more consumer goods, like fitness wearables and other ‘smart’ accessories, are granted the ability to access the Internet as a part of their function.

At the very least, you will need to account for these connections when selecting a router. You should also do some research and identify any features that may be of particular use to you.

Some Options and Features
As is the case with any other piece of technology, a router gets better with every additional feature and capability it has. Routers are now able to leverage assorted features and capabilities that improve both their function, and their security.

  • Dual-band Wi-Fi - Since there are so many devices using the 2.4GHz frequency, now many wireless routers come with dual bands (2.4GHz and 5Ghz).
  • Wireless On/Off Toggle - For ease of use, having a dedicated on/off switch on the device is always practical.
  • Detachable Antennas - Today, a lot of the routers you’ll see don’t have external antennas, but if you can find a model with them, they will provide more coverage to your Wi-Fi connection - and can even be upgraded!
  • IPv6 Support - IPv4 addresses have been exhausted for some time, so every router you plan to have for a while has to support IPv6.

Computerware has technicians on staff that can help you build a successful wireless network. For more information, call us today at (703) 821-8200.

What Android Oreo Includes
Why the Internet of Things is Here to Stay


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, August 16, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Microsoft Hackers Backup Managed Service Provider Productivity Workplace Tips Data Hardware Saving Money Business Malware Email IT Support IT Services Hosted Solutions Network Security Google Small Business Efficiency Smartphones User Tips Quick Tips Gadgets Business Continuity Mobile Devices Computer Disaster Recovery Microsoft Office Mobile Office Virtualization Network Innovation Android VoIP Social Media Mobile Device Management Server Smartphone Miscellaneous Ransomware Windows 10 Upgrade Unified Threat Management Windows Operating System Remote Monitoring Collaboration Communication Data Backup Holiday BYOD Remote Computing Managed IT services Data Recovery Mobile Computing Passwords IT Support WiFi Tech Term Vendor Management Apps Facebook Cybersecurity The Internet of Things communications Marketing History Apple BDR Firewall Analytics Users Automation Alert Productivity Data Management Internet of Things Artificial Intelligence Managed IT Services App IT Consultant Save Money Mobile Device Phishing Outsourced IT Gmail Bandwidth Office Health Content Filtering Big data Going Green Spam Bring Your Own Device Maintenance Virus Tech Support Search Managed IT Browser Cybercrime Encryption Lithium-ion Battery Best Practice Information Technology Cost Management Outlook Windows 8 Hiring/Firing Hard Drives Budget Wireless Technology Antivirus Printer Travel Recovery Employer-Employee Relationship Update Phone System Hacking IBM Money Office 365 Document Management Help Desk Two-factor Authentication Computers VPN Hard Drive Law Enforcement Intranet Compliance Website Education Government Data storage Access Control Cloud Computing Risk Management It Management Business Technology Networking Legal Save Time Regulations Training Proactive IT SaaS Running Cable Windows 10 Humor Saving Time Customer Service Administration Wireless Securty Twitter DDoS Mobility Solid State Drive Social Engineering Avoiding Downtime Flexibility Black Market iPhone Word Laptop Applications Current Events Data Security Business Intelligence Password Cortana Business Growth Excel Digital Payment Patch Management Blockchain Hacker Downtime Data Loss Customer Relationship Management Machine Learning Comparison Tablet Augmented Reality Paperless Office Fax Server Telephone Systems Data Breach Company Culture PowerPoint User Computing Computer Repair Disaster End of Support Social Networking Project Management Hosted Solution Robot File Sharing IT service Network Congestion Documents Start Menu Tech Terms Heating/Cooling Mobile Technology Google Maps Vulnerabilities Politics Storage Software as a Service Healthcare Virtual Reality Emails Bluetooth Streaming Media Automobile Inbound Marketing Uninterrupted Power Supply Chromebook Retail Bitcoin Cryptocurrency Computing Infrastructure Hack Google Docs Net Neutrality Pain Points How To eWaste Data Protection User Error Download Value Co-managed IT Private Cloud Experience Chrome Monitors Cleaning Office Tips Telephony Router Taxes Processors Scam Computer Accessories USB YouTube Redundancy Lifestyle Distributed Denial of Service Sports Trending Presentation Gaming Console Unified Communications Settings Monitoring Public Cloud Mouse Virtual Desktop Webcam Digital Specifications Safety Text Messaging Statistics Websites Programming Management Identity Theft Social Migration Connected Devices Notifications CCTV Digital Signature Data Warehousing Point of Contact Wireless Headphones Business Metrics Computer Malfunction Teamwork Thin CLient Access switches Writing Equifax Fleet Tracking Reliable Computing Entertainment 3D Ebay Emergency Hard Drive Disposal Music Network Management Get More Done Smart Phones Computer Care Upgrades Device security MSP Printer Server Microsoft Excel Turn Key In Internet of Things Recycling Desktop Finance Trojan Google Drive Windows Server 2008 LiFi Analytic Nanotechnology PDF Motion Sickness Best Available Keyboard Leadership Spyware Mobile Payment Product Reviews Startup Asset Tracking Organize Scalability Adminstration Pirating Information Vulnerability Business Cards Service Level Agreement Electricity Printing Deep Learning Username Messenger Tracking Domains Work/Life Balance Read Unified Threat Management Backup and Disaster Recovery Gamification Rental Service Meetings Public Speaking Windows 7 Visible Light Communication Memory Screen Reader Upload Web Server Shortcut cache Television IT consulting Smart Tech Distribution Cabling Device Management Piracy Entrepreneur WannaCry Downloads Business Managemenet HTML Managed Service Webinar Books Workers Troubleshooting Content Management Fiber-Optic Database Wi-Fi Administrator CIO Mobile Security Supercomputer HIPAA Upselling Time Management Freedom of Information Advertising Flash Conferencing Environment Corporate Profile Software License Trends Microchip Competition Assessment SharePoint Windows XP Multi-Factor Security Cost Worker Electronic Payment Video Surveillance Staffing Google Wallet online Currency Saving ZTime Google Calendar Displays Devices Reading Samsung Business Owner Tip of the week Society Fraud Tactics Micrsooft LinkedIn UTM Content Employer Employee Relationship IP Address Touchscreen News G Suite VoIP IT Plan Enterprise Resource Planning Best Practives Hacks Physical Security Application Harddrive Consultation Evernote Legislation Error Licensing Human Resources Debate Knowledge Drones Botnet Technology Tips Skype Accountants A.I. Relocation Tablets GPS Virtual Assistant Archive email scam Addiction Banking Audit Multi-factor Authentication Information Fake News Permissions Language Microserver Sync External Harddrive Productuvuty 3D Printing Managing Stress CrashOverride Regulation Capital