A vro serves as the egress for communication between the entire network and the outside world and serves as a bridge connecting internal subnets. In the process of establishing a network, the purchase of a router is extremely important. Among all network devices, the price of routers is also very expensive, and it is the first scene of network equipment. Not like some Nic and hub functions and features
Similar performance, and the price is basically the same, users do not have to worry about the purchase. The performance of different routers varies a lot, and the price cannot be the same. Therefore, when purchasing a vro, you must pay attention to the various performance parameters and functions of the vro.
The current Broadband Router has many rich functions, such as ddns, Nat, and VPN. For some different users, these terms are just confusing. All the features of the Broadband Router must be clear before you can purchase them clearly. Otherwise, the purchased vro cannot meet the needs of the network, or the vro purchased at a high price has unnecessary high performance and functions. Therefore, it is enough to make the purchase. Of course, you need to understand the performance parameters of the router and the meanings of some functions in order to make it clear. The following describes some common performance parameters and functions of routers. It is expected to be helpful for consumers when purchasing products.
Main Performance Parameters of a Broadband Router
CPU
The vro processor is the core device of a vro, like a computer motherboard or vswitch. The quality of the processor directly affects the performance of the router. As the core part of a Broadband Router, the quality of the processor often determines the throughput of the Broadband Router, which is the most important parameter. Generally, if the processor clock speed is less than m, this type of Broadband Router is suitable for common household and SOHO users. M to M medium, more than M is a relatively high frequency. Suitable for Internet cafes, small and medium-sized enterprises, and branches of large enterprises.
In addition to the operating frequency, the bandwidth router's processor architecture should also be noted. The CPU of A Broadband Router is generally based on x86, ARM7, ARM9. The core processors of arm9-and MIPs are currently the mainstream, and the arm7-and RDC architectures have been eliminated. The performance of the processors using these two architectures is poor, and mainstream manufacturers are no longer using them.
Memory
A vro may contain multiple types of memory, such as flash and dram. The memory is used for storage configuration, router operating system, and routing protocol software. In the middle and low-end routers, the route table may be stored in the memory. Generally, the larger the vro memory, the better (regardless of the price ). However, similar to CPU capabilities, the memory does not directly reflect the performance and capabilities of the router. Because efficient algorithms and excellent software may greatly save memory.
In general, 1m--4m bytes is small, 8 M bytes is medium, 16 M bytes or above is large. In addition, it should be particularly noted that many dealers and even vendors only say how many MB of memory when talking about the memory, so be sure to ask whether it is byte or bit. Memory can be measured in bytes or bit. The difference between the two is eight times the difference in size (1 byte = 8 bit ). Generally, B is written in uppercase to indicate byte, and B is written in lowercase to indicate bit. People with ulterior motives will do their work here. Some do not mark unit, but also mark B as a byte that passes through the sea. You can go to the website of the chip manufacturer to find out. Some criminals even use polishing chips to fake the chip silk screen, so it is very important to choose honest and trustworthy factory products.
Throughput
Throughput refers to the packet forwarding capability of the entire device and is an important indicator of the device performance. The router selects routes based on IP headers or MPLS labels, so the performance indicator is the number of forwarding packets per second. The device throughput is generally less than the sum of the throughput of all ports on the vro.
The throughput indicates the amount of data that the router can process per second. For example, the router works like a post office package business. The Post Office sends parcels to the post office to send the items, senders, recipients, and other information to the post office. The post office packs the items, and paste the formatted package form, check the correctness and then deliver it to the destination. Package receiving is the opposite process. The vro is basically the same, but what you send and receive is data. Throughput is equivalent to the package processing capability in the post office unit time, which is an intuitive reflection of the router performance. Generally, the throughput is the test data obtained when Nat is enabled and the firewall is disabled. There are two ways to test the throughput: Smartbits test and chariot test. The results can be different.
Supported network protocols
Network protocols are rules for transmitting and managing information on networks (including the Internet. For example, communication between people must follow certain rules, and mutual communication between computers must comply with certain rules. These rules are called network protocols. Common protocols include TCP/IP, IPX/SPX, and netbeui. IPX/SPX is usually used in LAN. If you access the Internet, you must add the TCP/IP protocol to the network protocol.
Wire speed forwarding capability
The most basic and important function of a router is packet forwarding. Forwarding packets at the same port rate is the greatest test of the router packet forwarding capability. Full-duplex line rate forwarding refers to the minimum packet length (Ethernet 64 bytes, POS port 40 bytes) and minimum packet interval (in accordance with the Protocol) bidirectional transmission on the vro port does not cause packet loss. This indicator is an important indicator of vro performance. To put it simply, the amount of incoming traffic is the amount of outgoing traffic, which will not cause a decline in throughput due to problems such as device processing capabilities.
Number of hosts
The number of broadband routers is directly affected by the Network busy in the actual environment. The number of bandwidths varies greatly in different network environments. For example, in an Internet cafe, everyone is chatting online and playing games. Almost all data is sent over the WAN port, causing heavy router load. However, CEN often only a small number of people use the network at the same time, and most of the data flows inside the enterprise network, so the router load is very light.
In a vro with enough enterprise network performance for 200 pcs, it is often impossible to connect 50 PCs to an Internet cafe. Estimating the average data traffic of each PC in a network cannot be accurate. Therefore, a more objective statement should specify the type of network the number of hosts is for, and the scope is estimated based on typical situations.
The number of hosts is intuitive and understandable, but it is only an estimate and experience. You must pay attention to the mistakes mentioned above when referring to this data. At the same time, the credibility of the data provider should be evaluated.
Advanced features of broadband Routers
With the continuous development of technology, the functions of broadband routers are constantly expanding. Currently, most of the broadband routers in the market provide VPN, firewall, DMZ, on-demand dialing, support for virtual servers, Dynamic DNS, and other functions. Relevant experts suggested that the investment should be measured according to their own needs. When selecting a vro, you need to understand the various features of the Broadband Router and their application scenarios.
Mac function:
At present, most broadband carriers bind the NAC address with the user's ID and IP address to authenticate users online. A Broadband Router with the MAC address function can write the MAC address on the NIC, so that the server can pass the MAC address verification during access to obtain the broadband access authentication. In MAC address control, there are two main functional settings: one is the connection control settings, which can be used to set which computers are allowed or prohibited from accessing the router or Internet; the other is to bind the MAC address to the IP address to prevent users from changing the IP address at will, or enable users who use a MAC address to obtain the same IP address each time.
Dynamic Host Configuration Protocol (DHCP) Function
Dynamic Host Configuration Protocol (DHCP, Dynamic Host Configuration Protocol) is a protocol for dynamically assigning and configuring IP addresses to clients on TCP/IP networks. The configuration parameters provided by DHCP to the client computer in the TCP/IP network are composed of two basic parts: one is to send dedicated configuration information to the client, and the other is the IP address assigned to the client.
DHCP works in the customer/Server mode. In this mode, a dedicated computer called the DHCP server is responsible for transmitting network configuration parameters and assigning IP addresses to clients that require IP addresses, as shown in 3-17. The DHCP server manages the IP addresses used for Dynamic Allocation in the network in a unified manner, which not only solves the address conflict problem, but also frees the network administrator from the burden of manually setting and allocating IP addresses. DHCP can automatically allocate IP addresses to customer workstations that log on to the TCP/IP network. It provides secure, reliable, and simple network settings to avoid address conflicts. This is very important for family users.
VPN Function
Virtual Private Network (VPC) is a new network technology that provides us with a way to securely remotely access private networks within an enterprise through public networks. We know that a network connection usually consists of three parts: client, transmission medium, and server. VPN also consists of these three parts. The difference is that VPN connections use tunnels as transmission channels. VPN can use the Internet Public Network to establish a private network with autonomy. A secure vpn includes tunneling, encryption, authentication, access control, and review technology. For enterprise users, this function is very important, which not only saves money, but also ensures enterprise information security.
DMZ Functions
DMZ is the abbreviation of "demilitarized zone" in English. It is called "isolation zone" in Chinese, also known as "non-military zone ". It is a buffer zone between a non-security system and a security system to solve the problem that the external network cannot access the internal network server after the firewall is installed, this buffer zone is located in a small network area between the enterprise's internal network and the external network. Some public server facilities can be placed in this small network area, such as Enterprise Web servers, FTP servers, and forums. On the other hand, such a DMZ region is more effective in protecting the internal network, because such network deployment, compared with the general firewall solution, has another level for attackers.
DMZ is mainly used to reduce the risks caused by the provision of services to untrusted customers. DMZ can separate public hosts from local network facilities. Most broadband routers can only enable the DMZ function for a single PC, and some more functional broadband routers can set up multiple PCs to provide the DMZ function.
Ddns Functions
Ddns is a dynamic Domain Name Service that maps users' Dynamic IP addresses to a fixed domain name resolution server to bind IP addresses to a fixed domain name to complete domain name resolution tasks. Ddns can help you build a virtual host and publish information with your own domain name.
A dynamic domain name resolution system consists of two parts. The first part is the server program, which is located on the host of the service provider. The other part is the client program, which runs on the host of a large number of users. Each time the network is connected, the client program transmits the dynamic IP address of the host to the server program on the host of the service provider, the server program is responsible for providing the DNS service and implementing the dynamic domain name resolution service. After receiving the notification from the client, the server program immediately updates the data and binds the new IP address to the original fixed domain name, this completes the dynamic domain name resolution service. Other people can access your server through the domain name.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.