Make full use of home routers to get out of purchase mistakes

Source: Internet
Author: User
Tags secure vpn

This article describes how to select a vro, which parameters should be taken into account, and what problems should be paid attention, I hope this article will help you.

What is vro:

First, you must understand what a router is. The so-called "routing" refers to the act of transmitting data information from the source location to the target location through a interconnected network. The router is a tool for carrying out such transmission behaviors, it is a network device used to connect multiple networks or CIDR blocks. Routers can concatenate and translate data from different networks or CIDR blocks so that these different networks or CIDR blocks can read and understand each other's data, thus, a larger network can be formed to achieve interconnection between different networks or network segments.

Vro appearance:

Through the above introduction, presumably we have a preliminary understanding of the router, then we take the TP-LINK router as an example, to look at the real look at the appearance of the router, in order to have a more intuitive understanding of the router. At present, the common routers on the market are generally plastic casings, the models are relatively simple, the fuselage is divided into the front panel and rear panel. The front panel displays the indicators used to indicate the working status of the device. The indicators are M1, M2, and four LAN ports and WAN port indicators from left to right.

The rear panel of the fuselage provides a 10/100 M Adaptive Ethernet (WAN) interface for connecting to the upper-level network devices, and Four 10/100 M Adaptive Ethernet (LAN) interfaces for connecting to computers in the network.

Main Performance Parameters of the router:

Since its launch in early 1980s, vrouters have gradually developed so far, and their functions and performance have been greatly expanded and enhanced. At present, vrouters have more and more functions, such as DDNS, NAT, and VPN. For some users who are familiar with vrouters, reading these terms is simply reading tianshu. How can we make the purchased vrouters play their expected performance? Below I will introduce some common performance parameters of the vro to the readers, hoping to help users who first know the vro.

CPU

Like a computer, a router also contains a central processor, that is, a CPU, which is the core component of a router. Vrouters of different generations and models have different CPUs. The performance of the processor directly affects the throughput (route table query time) and route computing capability (network route convergence time) of the router ). Generally, if the processor clock speed is less than m, such a low-end router is suitable for ordinary households and SOHO users. M to M is a medium frequency, and m or above is a relatively high frequency, suitable for Internet cafes, small and medium enterprises users and branches of large enterprises.

Memory

Vro may have multiple types of memory. Currently, vrouters generally use read-only memory (ROM), random access memory (RAM), non-volatile memory (NVRAM), and Flash Memory (Flash) four different types of memory, each of which assists the router in different ways. The memory is used for storage configuration, router operating system, and routing protocol software. In the middle and low-end routers, the route table may be stored in the memory. Generally, the larger the vro memory, the better. However, efficient algorithms and excellent software can greatly save the memory.

The memory can be measured in bytes or Bit, but the memory size is 8 times different (1 Byte = 8 Bit ). In the current vro memory, 1 MB to 4 MB Bytes is low, 8 Mb Bytes is medium, and 16 MB Bytes or above is large memory.

Throughput

Data in the network is composed of data packets, which consume resources to process each data packet. Throughput refers to the number of packets passed per unit time without packet loss, that is, the ability of the device to forward data packets, and is an important indicator of the device performance. Vro throughput represents the amount of data that the vro can process per second, which is an intuitive reflection of the vro performance.

Network protocols supported

Just as people speak in a language, there is also a language between various computers on the network. This is the network protocol, different computers must abide by the same network protocol to communicate with each other. Common protocols include TCP/IP, IPX/SPX, and NetBEUI. IPX/SPX is usually used in LAN. If you access the Internet, you must add the TCP/IP protocol to the network protocol.

Wire speed forwarding capability

When the maximum rate of a port is reached, no packet loss occurs in the data transmitted by the router. The most basic and important feature of a router is packet forwarding. packet forwarding at the same port rate is the biggest test of the router packet forwarding capability, full-duplex line rate forwarding refers to the minimum packet length (Ethernet 64 bytes, POS port 40 bytes) and minimum packet interval (in accordance with the Protocol) bidirectional transmission on the vro port does not cause packet loss. Line rate Forwarding is an important indicator of vro performance. Simply put, the amount of incoming traffic is the amount of outgoing traffic, and the throughput will not decrease due to the processing capability of the device.

Number of hosts

It is easy to understand the number of computers that can be loaded by routers. On the performance parameter table introduced by the manufacturer, you can often see that your own vro can take 200 pcs and 300 PCs, however, in many cases, the performance of the router differs greatly from the nominal value. This is because the number of vrouters is directly affected by the Network busy in the actual environment, and the number of vrouters varies greatly in different network environments.

For example, in Internet cafes, almost all people chat online, play games, and watch online movies at the same time. The data must pass through the WAN port, causing heavy load on routers. While on the enterprise network, only a small number of people are using the network at the same time, and the router load is very light. Therefore, if you place a vro in a CEN with 200 pcs in an Internet cafe, 50 PCs may not be moved. Estimating the average data traffic of each PC in a network cannot be accurate.

Advanced router functions:

Currently, most vrouters on the market have extended VPN, firewall, DMZ, support for virtual servers, support for Dynamic DNS, and other advanced functions, next, let's take a look at the functions of these advanced vrouters.

MAC address

The MAC address is the physical address in the serial EEPROM of the NIC, also known as the hardware address or link address. It is written in the hardware when produced by the network device manufacturer. The MAC address is independent of the network. It is physically consistent with the hardware to a certain extent, facilitating the specific identification. A vro with the MAC address function can write the MAC address on the NIC so that the server can pass the MAC address verification during access to obtain broadband access authentication.

MAC address settings are mainly used in two aspects. You can use them to set which computers are allowed or prohibited from accessing the vro or Internet. You can also use the MAC address function to bind an IP address, each time a user logs on to the network, the same IP address is obtained.

Dynamic Host Configuration Protocol (DHCP) Function

Dynamic Host Configuration Protocol (DHCP) is a communication protocol that enables network administrators to centrally manage and automatically allocate IP network addresses. In an IP network, each device connected to the Internet must be assigned a unique IP address. When the computer is connected to different locations in the network, DHCP enables the network administrator to monitor and assign the IP address of the computer from the center and automatically send its new IP address. DHCP can automatically allocate IP addresses to customer workstations that log on to the TCP/IP network. The Dynamic Host Configuration Protocol function provides secure, reliable, and simple network settings to avoid address conflicts.

VPN Function

A Virtual Private Network is a technology used to establish a private network on a public network. To put it simply, a virtual private network provides users with a way to securely remotely access private networks within an enterprise through a public network. VPN can use the Internet Public Network to establish a private network with autonomy. A secure VPN includes tunneling, encryption, authentication, access control, and review technology. This function is very important to ensure the information security of enterprise users.

DMZ Functions

DMZ is the abbreviation of "demilitarized zone" in English. It is called "isolation zone" in Chinese, also known as "non-military zone ". It can be understood as a special feature different from the Internet or intranet.

Network Area, used to place some public servers without confidential information, such as Web, Mail, FTP, etc. In this way, visitors from the Internet can access services in DMZ, but they cannot access company secrets or private information stored in the intranet. Even if the DMZ server is damaged, the confidential information in the Intranet is not affected. At present, most vrouters on the market can only enable DMZ for a single PC, and some vrouters with relatively complete functions can enable DMZ for multiple PCs. You can purchase an instance based on your actual needs.

DDNS is short for dynamic domain name services. DDNS maps users' Dynamic IP addresses to a fixed domain name resolution service, the client program transmits the dynamic IP address of the host to the server program on the host of the service provider. The service project program is responsible for providing DNS services and implementing dynamic domain name resolution. The main function of DDNS is that, on the one hand, most broadband carriers only provide dynamic IP addresses. DDNS can capture the IP addresses that users change each time and then correspond to the domain name, in this way, other online users can communicate with users through domain names. On the other hand, DDNS can help users build virtual hosts in their own companies or homes and publish information with their own domain names.

Firewall functions

The so-called "firewall" refers to a method to separate intranets from public access networks (such as the Internet). It is actually an isolation technology. A firewall is an access control scale executed during communication between two networks. It allows people and data that you "agree" to access your network, at the same time, we will reject people and data that you disagree with, and prevent hackers from accessing your network to the maximum extent. In other words, people inside the company cannot access the Internet without passing through the firewall, and people on the Internet cannot communicate with people inside the company.

The firewall function of the vro can scan the network data of the vro to filter out attack information and disable ports that are not frequently used to reduce the possibility of hacker attacks. In addition, the firewall can also disable outbound information of specific ports and prohibit access from special sites.

Summary:

Based on the above introduction, I believe that you have some knowledge and knowledge about vrouters. Please note that users should not blindly pursue various extensions of vrouters for energy supply, make sure to select the desired vro based on your actual situation. Only in this way can the performance of the router be maximized.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.