Learn more about wireless routers

Source: Internet
Author: User

This article mainly introduces the specific features and functions of the wireless router. I believe you will understand the wireless router after reading this article, now you only need one device to allow wireless networks and wired Ethernet users to share high-speed broadband Internet connections.

Wireless Broadband Router

The extended AP with routing is what we often call the Wireless Broadband Router Wireless Router). In addition to the basic AP functions, it also has several Ethernet Switching ports RJ45 interfaces, the vast majority of wireless broadband routers include a four-port switch, which can be used as a Wired Broadband Router), routing, NAT, DHCP, printing server, and other functions.

It has built-in Simple Virtual dialing software that can store user names and passwords for dial-up Internet access. It can provide automatic dialing functions for dial-up Internet access ADSL and CM, you do not need to manually dial up or use a computer as a server. In addition, wireless broadband routers generally provide more comprehensive security protection functions.

Advantages of wireless routers

The Wireless Broadband Router is suitable for ADSL, CM cat, and other users without routing, as well as ADSL and CM cats with routing. A Wireless Broadband Router combines multiple devices and is suitable for users who build their networks for the first time. Its integrated functions allow users to use only one device to meet all wired and wireless network needs.

In addition, even if the MODEM used already has the routing function, you should also select the preferred Wireless Broadband Router, most MODEM's built-in routing functions are simpler than those of wireless broadband routers. In addition, wireless broadband routers can be used not only for MODEM routing, but also for LAN access, such as long-width access and adsl lan access. If the price of such access mode is lower than that of MODEM, you certainly won't continue using the adsl modem or cacle modem. If you are using a wireless broadband router at that time, it will also provide you with a convenient LAN routing function, so that multiple machines can access the Internet easily.

The biggest difference between a Cable Broadband Router and a Wireless Broadband Router is that the Wireless Broadband Router has the function of a Wireless AP wireless switch, other features of Wired Broadband routing are similar to those of wireless broadband routers ). At present, the price of cable broadband routers is mostly around 200 yuan, while the price of wireless broadband routers is usually lower than that of some of the Yuan products). Therefore, high requirements are imposed, or wireless users may need to invest tens of dollars in investment, making it more cost-effective to own a Wireless Broadband Router first. In this way, it is also necessary to avoid repeated investment when upgrading to the wireless network. Wireless Network is the trend of the times.

Security Solution for wireless routers

The Wireless Broadband Router Security solution consists of two parts: the security of the Broadband Router and the security of wireless access. The most basic security of the Broadband Router is that the working principle of the Broadband Router is unique to the NAT network address to pull), through address translation to hide the IP address of the internal host, others include service port filtering, 802.1X user identity authentication, VPN, and well-known SPI status packet detection.
Wireless LAN generally has the following security measures:
1. WEP Wired Equivalent encryption ).
2. The identifier of the SSID service area.
3. filter the MAC address of the wireless client device on the user side.
4. Supports standard 802.1x Security Authentication Protocol
5. VPN. Encryption is generally used to accept authorized access, but encryption and decryption operations may consume a lot of resources and affect performance.
Below is a detailed explanation of the two common protocols:

About WEP Encryption

We know that due to the delay of wireless signals, we have to pay attention to its security. Otherwise, it will be easily intercepted or stolen during transmission. Therefore, we have a WEP Encryption Method Applied to wireless networks.
It mainly uses the shared key and RC4 encryption algorithm. Access Point AP) and all workstations connected to the access point must use the same shared key. The specific implementation process is as follows: for data packets sent in any direction, the transmitter checks and combines the data packet content with the data packet.

The WEP standard then requires the transmitter to create a packet-specific initialization vector IV), which is combined with the key for data packet encryption. The receiver generates its own matching data packet key and decrypts the data packet.
Theoretically, this method is better than an explicit policy that uses the shared private key separately, because it adds data specific to data packets, making it more difficult for the other party to crack.

The unit of the 64/128-bit trade-off is bit. When the number of BITs increases, the password becomes more complex and the risk of cracking is lower, therefore, we should try to adopt a high-bit encryption method.
About Wireless SSID

The wireless SSID is the Service Set Identifier of your wireless network. This item is case sensitive: Use uppercase and lowercase letters as shown in the SSID ). The Service Set Identifier (SSID) is used to control access to a given wireless network. The value "must" match the SSID of all access points you want to communicate.

If the value does not match, access to the system is not allowed. The SSID can contain up to 32 case-sensitive characters.
The wireless SSID broadcast control, in short, is that after the wireless router is set up, the wireless network card can be automatically detected, and the type of the Wireless Router does not need to be determined through the option in the wireless network card.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.