Tech Term: Routers, Defined

Tech Term: Routers, Defined

With businesses relying more and more on portability and mobility, it should come as no surprise that businesses also have to devote more time to the proper management of their wireless network. A considerable portion of this management is reliant on the router the business uses, as without the router, the business simply couldn’t have a wireless connection.

For this week’s tech term, we’ll discuss the router in a little more depth.

What is a Router, Anyway?
The router got its start almost 50 years ago, developed under the name ‘Interface Message Processor’ by BBN at the end of the 1960s. Since then, routers have increased in utility, now serving to enable the user to communicate through a variety of different means - including data, video, and voice.

The router, or Interface Message Processor, was initially created to be used on the Internet’s predecessor, the ARPAnet. After years of development, Bill Yeager created the code that enabled the first multi-protocol router, which in turn led to the development of the first Local Area Network, or LAN, by Len Bosack and Sandy Lerner. This pair would go on to create Cisco Systems in 1984. Cisco has since grown to become the largest networking company anywhere in the world.

What Does a Router Do?
To greatly simplify the responsibilities of the router, it helps to imagine them as the exchange tubes that banks, and credit unions use in their drive-thru, and the funds they transport as the data that is exchanged through the router’s activity. The vacuum tube serves as the go-between between you in your car and the teller inside the bank, allowing you to communicate and exchange information.

Your router serves a very similar purpose to your network as the vacuum tube does to the bank, as your router establishes a connection between you and the Internet. Routers provide the connection between the Internet (or more literally, your Internet modem) and your devices. While many routers are described as wireless, this isn’t completely accurate. Any router will typically require a pair of connections - one to a power source, and the other to the modem.

How Does a Router Really Work?
Assuming that the necessary wires are properly connected, your router will send a signal out to the rest of your devices, so they can connect to the Internet. These signals will usually reach anywhere between 90 to 300 meters away, depending on the power of the router. Any device with a Wi-Fi connection built into it will connect, assuming that it has the proper credentials to do so. This number of devices will only grow as more consumer goods, like fitness wearables and other ‘smart’ accessories, are granted the ability to access the Internet as a part of their function.

At the very least, you will need to account for these connections when selecting a router. You should also do some research and identify any features that may be of particular use to you.

Some Options and Features
As is the case with any other piece of technology, a router gets better with every additional feature and capability it has. Routers are now able to leverage assorted features and capabilities that improve both their function, and their security.

  • Dual-band Wi-Fi - Since there are so many devices using the 2.4GHz frequency, now many wireless routers come with dual bands (2.4GHz and 5Ghz).
  • Wireless On/Off Toggle - For ease of use, having a dedicated on/off switch on the device is always practical.
  • Detachable Antennas - Today, a lot of the routers you’ll see don’t have external antennas, but if you can find a model with them, they will provide more coverage to your Wi-Fi connection - and can even be upgraded!
  • IPv6 Support - IPv4 addresses have been exhausted for some time, so every router you plan to have for a while has to support IPv6.

Computerware has technicians on staff that can help you build a successful wireless network. For more information, call us today at (703) 821-8200.

What Android Oreo Includes
Why the Internet of Things is Here to Stay


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, June 22, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Software Hackers Business Computing Managed Service Provider Backup Productivity Workplace Tips Data Hardware Business Saving Money Malware Email IT Support Hosted Solutions IT Services Network Security Google Small Business Smartphones Efficiency Quick Tips Gadgets Business Continuity User Tips Mobile Devices Computer Disaster Recovery Mobile Office Virtualization Network Microsoft Office Android Innovation Server VoIP Social Media Smartphone Mobile Device Management Windows 10 Upgrade Miscellaneous Ransomware Unified Threat Management Windows Remote Monitoring Operating System Holiday Passwords Mobile Computing Remote Computing Collaboration Communication Vendor Management Cybersecurity BYOD Apps WiFi Marketing Facebook Managed IT services The Internet of Things History Firewall IT Support Apple Users Analytics Data Backup Alert Internet of Things Data Recovery Data Management communications Automation Productivity IT Consultant Artificial Intelligence Outsourced IT Save Money Tech Term App Managed IT Services Phishing Bring Your Own Device Office Big data Bandwidth Spam BDR Content Filtering Going Green Mobile Device Health Gmail Wireless Technology Antivirus Browser Cybercrime Search Windows 8 Outlook Managed IT Cost Management Hiring/Firing Lithium-ion Battery Encryption Best Practice Maintenance Information Technology Hard Drives Printer Tech Support Budget Virus Help Desk Phone System Recovery Employer-Employee Relationship Update Hacking Money Office 365 Document Management IBM Computers Intranet Travel Education Government Website Training SaaS Administration Risk Management Hard Drive Law Enforcement It Management Save Time Business Technology Compliance Data storage Cloud Computing Humor Proactive IT Running Cable Legal Windows 10 Networking Saving Time Customer Service Two-factor Authentication Regulations VPN DDoS Paperless Office Telephone Systems Twitter Current Events Disaster Hosted Solution Access Control End of Support Word Robot Securty Password Cortana Avoiding Downtime Data Security Business Intelligence Mobility Solid State Drive Fax Server Digital Payment Downtime iPhone Patch Management Blockchain Hacker Social Engineering Black Market Data Loss Flexibility Comparison Tablet Company Culture Excel Laptop Business Growth Data Breach User Computer Repair Customer Relationship Management Social Networking Project Management Augmented Reality PowerPoint Wireless Start Menu Tech Terms Heating/Cooling Distributed Denial of Service YouTube Unified Communications Settings Webcam Vulnerabilities Sports Text Messaging Mobile Technology Storage Streaming Media Computing Software as a Service Public Cloud Healthcare User Error Uninterrupted Power Supply Co-managed IT Identity Theft Retail IT service Bitcoin eWaste Net Neutrality Inbound Marketing Google Maps Chrome Data Protection Value Applications Politics Lifestyle Virtual Reality Router Bluetooth Automobile Emails Processors Computer Accessories Pain Points Chromebook Cryptocurrency Scam USB Computing Infrastructure Hack Redundancy How To Trending Google Docs Presentation Private Cloud Mouse Experience Download Specifications Safety Cleaning Virtual Desktop Monitors Programming Social Statistics Office Tips Digital Telephony Network Congestion Websites Documents Machine Learning Gaming Console Taxes Data Warehousing Entertainment Reading Samsung Wireless Headphones Society Harddrive Teamwork Migration Connected Devices Displays Organize Debate Equifax Emergency Hard Drive Disposal G Suite Network Management Micrsooft GPS Access Employer Employee Relationship Analytic External Harddrive Microsoft Excel PDF Licensing Recycling Drones Computer Care Hacks Physical Security Device security Google Drive Windows Server 2008 Relocation Tablets Nanotechnology Best Available Keyboard Banking Botnet Desktop Finance Product Reviews Startup Read Permissions Language Thin CLient Vulnerability Sync Business Cards Service Level Agreement 3D Webinar Ebay Spyware Mobile Payment Domains File Sharing Smart Phones Unified Threat Management Backup and Disaster Recovery Electricity Printing Public Speaking Notifications CCTV Windows 7 Reliable Computing Screen Reader Device Management Music Shortcut Business Metrics Computer Malfunction Gamification switches Writing Smart Tech Content Management Leadership Entrepreneur In Internet of Things Piracy Upload Business Managemenet Upgrades Adminstration Pirating Information cache Television Troubleshooting LiFi Environment Fiber-Optic Database WannaCry Downloads HIPAA HTML Time Management Freedom of Information Electronic Payment Scalability Conferencing online Currency Best Practives Corporate Profile Competition Motion Sickness Mobile Security Messenger Tracking Multi-Factor Security Work/Life Balance Software License Trends Deep Learning Assessment SharePoint Business Owner Visible Light Communication Memory Microserver Tip of the week Fraud Tactics LinkedIn Google Calendar IP Address Rental Service Meetings Devices IT consulting Touchscreen News Human Resources Cabling Monitoring Upselling VoIP Application Web Server UTM Content Books Workers Legislation Archive Get More Done Knowledge Wi-Fi Administrator IT Plan Enterprise Resource Planning Skype Video Surveillance Consultation Evernote Accountants Advertising Flash Saving ZTime Turn Key Virtual Assistant email scam Addiction CIO Printer Server Technology Tips Supercomputer Windows XP Fake News Worker Management Staffing Google Wallet Trojan Audit Digital Signature Microchip Multi-factor Authentication Point of Contact Productuvuty Managing Stress CrashOverride 3D Printing Capital