MERIT Solutions Blog

MERIT Solutions has been serving the Chesapeake area since 1982, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tech Term: Router

Tech Term: Router

The more that people depend on mobile devices and portable computers to get work done, the more businesses have to consider how to manage their organization’s wireless network. The router is the piece of hardware that makes the wireless network possible. Today, we will talk a little bit about the router and how its configuration can dictate the strength, reliability, and security of your business’ wireless network.

An Introduction to the Router
It’s been nearly 50 years since the router was developed. Today’s router technology has matured to become an integral component in all types of communications. From data to voice to video, the router is a core piece of technology for almost everyone.

The first router was developed by BBN in the late 1960s. Called the Interface Message Processor, it was built for use on the ARPAnet, which was an early predecessor of the Internet. It was quickly improved upon and in 1981, Bill Yeager, of the Stanford Knowledge System Laboratory, developed the code behind the first multiple-protocol router. Interest in Yeager’s concept led Len Bosack and Sandy Lerner to develop the first Local Area Network (LAN) and in 1984 the pair launched Cisco Systems, which is currently the largest networking company in the world.

What Is a Router?
The simplest definition of a router is: a device that acts as a tunnel to the other devices on a network, supplying them with the means to communicate with each other. Today, most routers have wireless capabilities allowing this to be done without connecting the machines to the router.

Despite being called a wireless router, there are typically two wires that will always be connected to it. One is obviously the power cord, while the second comes from the modem. The modem, of course, is the piece of hardware that allows connection to the Internet.

How Does It Work?
Once all the wires are connected, your router will emit a signal that usually travels between 90 and 300 meters; it is device-dependent. When you connect a device to a Wi-Fi connection, the signal is sent from the router. Many products, including smartphones, laptops, and tablets have Wi-Fi connections built in, but more than that, these days a lot of consumer goods now come with connectivity. Internet of Things devices continue to grow in number, so when picking a router, you’ll likely have to take that into account.

Options and Features
Like every other piece of technology, the more features and options a router has, the better it is. Here are a few options and features that modern routers have aboard that can make a difference for your data dissemination and protection.

    1. Dual-band Wi-Fi - Today most wireless routers have dual-band Wi-Fi, since the traditional 2.4GHz frequency is used in so many places that it can be a problem. Today’s routers come with both 2.4 and 5GHz.
    2. Wireless On/Off Toggle - There may be times when you have to disable your Wi-Fi network (i.e. troubleshooting interference) and having a dedicated on/off button can come in handy.
    3. Detachable antennas - Many routers come without visible antennas, instead opting for internal antennae. Sometimes you need more range, however. That’s why buying one with detachable antennas give you more flexibility and signal coverage.
    4. IPv6 Support - The Internet’s supply of IPv4 addresses has been exhausted, so having support for IPv6 sites is mandatory if you plan on keeping your router for any length of time.

If you are looking for help with your organization's wireless network, start by calling the IT professionals at MERIT Solutions at (757) 420-5150.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, June 22 2018

Captcha Image

Tag Cloud

Security Tip of the Week Technology Best Practices Cloud Privacy Business Computing Network Security Hackers Malware Software Internet Productivity Hosted Solutions Backup Business Management google Managed IT Services Computer Disaster Recovery Mobile Devices Outsourced IT Microsoft communications VoIP Business Continuity Business Windows 10 IT Support Hardware Innovation Cybersecurity Email User Tips IT Services Data Backup Cybercrime Efficiency Data Recovery Managed IT Saving Money Server Mobile Device Management Ransomware Small Business Tech Term Apps Windows Mobility Smartphone Operating System Data Productivity browser Law Enforcement Internet of Things Android Office 365 Virtualization BDR Telephone Systems Save Money Phishing Money Passwords Data Security Cloud Computing Smartphones Hosted Solution Quick Tips Chrome Microsoft Office Communication BYOD Automation VPN Managed Service Provider Information Technology Password Holiday Recovery App Google Drive Hacking Avoiding Downtime Vulnerability Alert Two-factor Authentication Health Miscellaneous Wireless Facebook Computers Government Data Breach Risk Management Unsupported Software Best Practice Update Social Media Gadgets Budget Data Management Work/Life Balance Collaboration Cost Management IT Support Network Wi-Fi upgrade Social Application Current Events Audit search Wireless Technology Compliance Personal Information Spam Telephony Politics User Error Managed IT Services Cleaning USB Applications Private Cloud Save Time Office tips History Gmail Remote Computing Proactive IT Identity Theft The Internet of Things Workplace Tips Artificial Intelligence Flexibility Shortcut Data Protection Employer-Employee Relationship Social Engineering Firewall Streaming Media Tech Support Antivirus Content Filtering Hacker WiFi Project Management Internet Exlporer Cortana Battery Solid State Drive Patch Management Going Green HaaS Windows 10 Bandwidth eWaste iPhone Automobile Wireless Charging Excel Mobile Computing Value Transportation Data Storage Saving Time Management OneNote Robot Blockchain Office Phone System Computer Care End of Support Legal Mobile Security Users Data Loss Encryption Devices Marketing IT solutions Google Docs Google Assistant DDoS Humor Disaster Big Data Fraud Television Education Router Sports Vendor Management Redundancy Apple SaaS Commerce Samsung Unified Threat Management Lithium-ion battery Tablets Smart Tech Root Cause Analysis Administrator domain Gamification Entertainment Websites Training FAQ Upgrades Electronic Medical Records NFL Connectivity Relocation Augmented Reality Access MSP Touchscreen remote Lifestyle Point of Sale Memory Business Intelligence HIPAA Outlook Data Theft Yahoo Company Culture Charger Consultant Safety Word Black Market Content Filter Running Cable intranet Server 2008 Smart Technology Legislation Students PDF Managed IT Service Avoid Downtime Computing iOS Ali Rowghani Windows Ink Trending Shadow IT Monitoring IT budget Comparison Document Management Unified Communications Text Messaging Evernote Experience Regulation Analysis Computer Fan Google Maps Maintenance Screen Mirroring server installation dvd "cannot install required files" Specifications Financial Networking Sync Video Games App store Dark Web stock Software as a Service Virtual Reality Financial Technology Meetings Device Security Cast Identities Laptop Emails Uninterrupted Power Supply Scam Sales Workers Music Adobe tweet Printing Settings IoT Touchpad calculator Employer Employee Relationship Retail Updates Analytics Licensing Identity Reputation WannaCry Twitter control Keyboard Instant Messaging Advertising Spyware HBO Language Webinar Computer Accessories Conferencing Worker Commute Microsoft Word Mobile Data Privacy WSJ Mobile Device Data storage Exchange Microsoft Excel Managing Stress Computer Forensics Remote Monitoring Distributed Denial of Service IT solutions altivista Gifts Books Professional Services Scalability Hard Drive Administration Chromecast Edge SBS Hiring/Firing File Sharing PowerPoint IT Management Virus Windows 10s compaq Travel How To Chromebook Colocation Nanotechnology Ciminal Benefits Storage Wireless Internet Hard Drives Wearable Technology WIndows Server 2008 Proactive Hard Disk Drive hp Files Credit Cards Emergency CrashOverride Thank You Worker Congratulations Cache Monitors

Mobile? Grab this Article!

QR-Code dieser Seite

Recent Comments

Anna Jackson 5 SEO Tools To Get a Google-Eye View of Your Website
15 September 2017
Hello Randall! I was doing very important work but due to your subject I felt better to stay at you...
David Miller Not all project-management tools are right for all businesses
25 August 2017
All the points depicted by you in this blog is v.apt. I love the title of this blog because it says ...