629198
5
Zoom out
Zoom in
Previous page
1/84
Next page
-5-
Technology Introduction
Introduction to Broadband Router Technology
A router is a device that forwards data packets from a source to a
destination. Routers forward data packets using IP addresses and not a
MAC address. A router will forward data from the Internet to a particular
computer on your LAN.
The information that makes up the Internet gets moved around using
routers. When you click on a link on a web page, you send a request to a
server to show you the next page. The information that is sent and
received from your computer is moved from your computer to the server
using routers. A router also determines the best route that your
information should follow to ensure that the information is delivered
properly.
A router controls the amount of data that is sent through your network by
eliminating information that should not be there. This provides security for
the computers connected to your router, because computers from the
outside cannot access or send information directly to any computer on
your network. The router determines which computer the information
should be forwarded to and sends it. If the information is not intended for
any computer on your network, the data is discarded. This keeps any
unwanted or harmful information from accessing or damaging your
network.
Introduction to Firewalls
A firewall is a device that sits between your computer and the Internet that
prevents unauthorized access to or from your network. A firewall can be a
computer using firewall software or a special piece of hardware built
specifically to act as a firewall. In most circumstances, a firewall is used to
prevent unauthorized Internet users from accessing private networks or
corporate LAN’s and Intranets.
A firewall watches all of the information moving to and from your network
and analyzes each piece of data. Each piece of data is checked against a
set of criteria that the administrator configures. If any data does not meet
the criteria, that data is blocked and discarded. If the data meets
the
criteria, the data is passed through. This method is called packet filtering.
A firewall can also run specific security functions based on the type of
application or type of port that is being used. For example, a firewall can
be
configured to work with an FTP or Telnet server. Or a firewall can be
configured to work with specific UDP or TCP ports to allow certain
applications or games to work properly over the Internet.
5


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for D-Link VDI-604 at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of D-Link VDI-604 in the language / languages: English as an attachment in your email.

The manual is 6,34 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info