Podchaser Logo
Home
What is a router?

What is a router?

Released Monday, 8th August 2011
Good episode? Give it some love!
What is a router?

What is a router?

What is a router?

What is a router?

Monday, 8th August 2011
Good episode? Give it some love!
Rate Episode

Episode Transcript

Transcripts are displayed as originally observed. Some content, including advertisements may have changed.

Use Ctrl + F to search

0:00

Brought to you by the reinvented two thousand twelve

0:02

Camray. It's ready. Are you

0:07

get in touch with technology? With tech

0:09

Stuff from how stuff works dot com.

0:16

Hello everyone, welcome to tech stuff.

0:19

My name is Chris Polette. I'm an editor at

0:21

how stuff works dot com, and as usual,

0:23

sitting across from me, I have senior writer Jonathan

0:26

Strickland. We're on a road to nowhere,

0:31

which just goes to show you that we're not a couple

0:33

of talking heads. That's right, Before

0:35

we get into this topic, we have actually

0:38

it's a two fur First, we have a little

0:40

listener mail. This

0:46

listener mail comes from Sam, and Sam says,

0:48

Hello, John and Chris. I really enjoy your show

0:50

and I appreciate all the wonderful information you provide

0:53

about various tech Keep up the good work, could

0:55

you, guys, perhaps to a podcast that covers how network

0:57

routers such as links Us and other's

0:59

work for and their role in office and home networks.

1:02

That'd be swell if you did. Thank you guys for making such

1:04

entertaining yet informative podcast. Cheers. PS.

1:06

Is there any chance that the old listener

1:09

mail audio clip might be played again?

1:11

You know, the one with the annoying alarm. I

1:13

like the new one, and I know it is stuck, but there are times where

1:15

I yearned to hear the old one. Sam.

1:19

This is for you. Everyone else, please

1:21

turn down the volume on your your

1:24

various playback devices. You

1:26

have been warned, and now that I have warned

1:28

you, here comes a little old

1:30

school sound effect for listener.

1:40

But on top of the listener mail that we just read from

1:42

Sam from Austin, Texas, we also had a little

1:44

Facebook feedback you be

1:47

This comes from Scott, who says, Hey, I was wondering if

1:49

you guys could do a podcast about routers, the

1:51

different uses for them and which is best for

1:54

gaming, streaming, video, etcetera. Thanks

1:56

so much. Your episode on I p V six

1:58

was great and the number of IP address as was

2:00

nuts. You're telling me, Scott, I'm still trying

2:02

to get my breath back. So we are going

2:05

to talk about routers. And before we get

2:07

too far into this, I want to say

2:09

we have some great articles on how stuff

2:11

works dot Com about routers, so if you want

2:14

to get more information, I recommend

2:16

checking out how routers work, also how network

2:18

address translation works. Both of those are going

2:20

to be important in this discussion. Um,

2:23

so let's talk about what a roller

2:25

is and what it does and why it's important,

2:28

yes, and talking about what

2:31

value it has to the Internet. Let's

2:33

just say there wouldn't be one without

2:36

routers because

2:38

you know, of course, the Internet

2:41

is a network of computers. It's

2:43

just networks. Yes, it's exactly.

2:46

It's a it's a basically, it's a vast system

2:49

of computers talking to one another via multiple

2:52

networks and protocols. So yes,

2:54

well yeah, they use the protocols to talk to us.

2:56

But yeah, I mean you have you might

2:58

have only one computer in your house and

3:01

it hooks up to you know, the networks

3:03

at the Internet service provider, and

3:05

then those go to other networks

3:08

and it just goes on and on and on. Or

3:10

you might even have multiple computers

3:12

in your house running on another network

3:15

which is attached to the other networks. That's

3:17

why they call it a cloud, because there's

3:19

no definite shape to the Internet.

3:21

It all. It all depends on what's on and what's

3:23

off at any given time, and

3:26

these routers make it possible, especially when you

3:28

do have one line coming into your

3:30

house and you have multiple computers. Yeah,

3:32

So what routers allow is the

3:34

transfer of information across different

3:37

layers of communication. Now,

3:39

what I mean by that is that the

3:41

Open Systems inter Connection or os

3:44

I model of communication divides

3:47

up communication into seven

3:49

layers. And uh, really

3:51

we're just going to be thinking about the first three layers

3:53

here. Actually now I'm thinking about seven layer bars.

3:56

Yeah, I'm thinking about seven layer dip so

3:58

um dip so.

4:01

The the the seven layers

4:03

are. This was a system that was proposed

4:05

by Charles Bachman of a Honeywell

4:07

Information Services. Honeywell, of

4:09

course, is one of those big names that's important

4:11

in uh in computer science. Yeah,

4:13

they they've done all kinds of technological

4:16

things. Yes, So the seven

4:18

layers are sort of as a

4:21

concepts so that you can break down

4:23

what sort of communication happens between various

4:26

components within a communication system.

4:28

And it's uh so that you can really figure out, all

4:30

right, well, how do we have these various

4:32

layers interact with one another, which ones

4:35

need to be, you know, segregated from

4:37

the rest and uh and just kind

4:39

of a way of defining it, at least from

4:41

an ideal perspective

4:43

as opposed to necessarily a physical one. But

4:46

layer one is what we call the bit layer

4:49

it's the physical layer of data communication.

4:51

So we're talking about physical elements such as

4:54

pens and uh the voltage,

4:56

it's act also electrical layout.

4:58

It's the voltage that you need it transfer

5:00

information. And really you're talking about

5:03

a single device communicating

5:06

through some sort of medium. So this

5:09

is where we were talking about one device.

5:11

We're not connecting it to anything else

5:13

at on a layer one layer of communication.

5:17

Layer two is where we start talking

5:19

about communication between devices,

5:22

and in this case we're talking about communication between

5:24

devices within a local area

5:26

network or land. All right,

5:28

so a land you do

5:30

not need a router. We actually

5:32

had another fellow right

5:35

in UM recently on

5:37

on our Facebook page, I posted a quiz

5:39

about routers, and he pointed

5:42

out that actually this is

5:44

Carl who said this is called me pedantic. But question

5:46

one, A home network does not require a router

5:49

to operate either. Carl is absolutely

5:51

correct. You do not need a router to allow

5:54

communication within a local area network.

5:56

You need a switch that can switch

5:58

the data back and forth, but you don't need a router.

6:01

Right, So this is layer to all that all that communication

6:04

within layer two within a local area network,

6:06

a single network can be uh

6:10

controlled through a switch. You don't have to worry

6:12

about a router at that point. Now, if

6:14

you want to communicate to a device,

6:17

it's on another network. This is where

6:19

the Internet comes in. The Internet

6:21

is that network of networks. So let's say I

6:23

want to visit a website and the

6:25

server that has that websites

6:28

information on it is not on my

6:30

local area network, but is on some other

6:32

network, possibly on the other

6:34

side of the world. That's when you need a

6:36

router, because what the router does is

6:38

it controls the the information

6:41

moving from your local area network to

6:44

the Internet so that it will

6:46

go to the proper place. And it also receives

6:48

information from the Internet and transfers

6:51

it to your local area network so that you can view

6:53

it or interact with it in whatever way.

6:56

So that's the basic purpose

6:59

of a router, uh And it's

7:01

you know, when you break it down that way,

7:03

it kind of it makes it easier to understand why

7:05

routers are important. Without a router, you

7:07

would not be able to have this

7:09

this data transfer between a

7:11

larger network or or a computer

7:14

on another network and your computer you would

7:16

just have You'd be able to have communication

7:18

through a local system, but not through a global

7:20

system. Unless you have a really

7:22

long cable. Yeah. That's especially

7:25

important for the Internet because

7:27

as as you will remember, or at

7:29

least as a long time listeners will remember,

7:32

Uh, traffic on the Internet goes in little

7:35

uh pieces or packets.

7:37

They're actually called packets, um,

7:39

and they're sent uh redundantly.

7:42

So you know, you might take a file, uh

7:45

say, an email and break it down into

7:48

a series of packets. Each of those

7:50

has some information that tells where

7:53

it's going, UM, where it's

7:55

coming from, and what piece

7:57

it is. It might be, you know, piece three of

7:59

packet three of forty, let's say,

8:02

um, so it tells uh the

8:04

network where to send it and how to reassemble it

8:06

when it gets there. On the other side, Well, the thing

8:08

is, uh, it might say, okay,

8:10

well, I'm going from uh computer

8:13

A to computer B, to computer C to computer

8:15

D. Well, all of a sudden,

8:17

there's a power failure at computer

8:19

C, so it goes from A to B. Oh

8:22

it's stuck. Well, in

8:24

the Internet, Uh, it's set up where

8:26

the packets can be sent and re routed

8:29

around computer C. So you might go to

8:31

computer F and then back to computer

8:33

D. Because they can be sent

8:35

at multiple directions. At the same time,

8:37

and then you know with the idea that one

8:40

set of packets will be reassembled into the

8:42

file on the other end. And the router

8:44

is crucial to making this happen. Yeah,

8:46

Routers have this thing called a routing

8:48

table, and routing table is essentially

8:52

a guide saying this

8:54

is where, this is the direction you need to send

8:56

packets in order for information to come

8:59

to go from to this machine and

9:01

get to that machine. So machine

9:03

A and machine beat will say, alright, So

9:05

a routing table will in general give

9:07

the fastest uh route.

9:10

Now, the fastest route is not necessarily

9:12

the shortest route, true,

9:14

And it's the same as if you live in a city.

9:17

All right, So let's say let's let's let's take the city

9:19

as a kind of a metaphor

9:21

here. We're gonna look at the city as an analog to

9:23

the internet. It's not it's

9:25

not entirely analogous, but

9:27

we're going to kind of make some jumps

9:29

here. So let's say you live in a city

9:32

and the city tends to have a lot of traffic

9:34

in it, and you may be at

9:37

your house and you want to go eat at a

9:39

popular restaurant that's across town. And

9:41

so you know three different

9:43

ways of getting to the place

9:46

across town. One of them takes the least

9:48

number of turns. It's it's the most direct

9:50

route, but it's also the most heavily traffic

9:52

route. So in other words, you could

9:55

go that way and you wouldn't have to

9:57

turn as frequently, but because of

9:59

the the number of cars on

10:01

that route, it will actually take you longer

10:03

to get there than if you took a slightly more circuitous

10:06

route that would have less traffic

10:08

on it. So in that case, you say, you know what, I know

10:10

that this is the direct path, but

10:12

I'm going to take this more out of the way path. This it's

10:15

it's a shortcut in time, but

10:17

not in distance. And the same thing

10:19

is true on the internet. You might be able to find

10:21

a route to push traffic

10:23

through that's going to be faster, even

10:26

though it's not as direct. By

10:28

the way, if you happen to live in Los Angeles,

10:30

I understand that this is a sport that

10:33

in Los Angeles, if you have a group

10:35

of people and you have all decided to go someplace,

10:38

the first hour of your travel

10:40

time will actually be taken up spending time

10:42

talking about the best way to get to where you're

10:44

going. Okay, yeah, very

10:47

little driving in LA so well that's it's.

10:50

What's required is that you and at least one

10:52

other person each in their own

10:54

vehicles, have to be going to a specific

10:57

place, leaving from the same location.

10:59

And at that point you have launched into

11:02

the game where then you say no,

11:04

no, no, you don't want to do that. That's going to take you on the

11:06

four oh five And haven't you heard of Carmageddon?

11:09

And um so, yeah, it's the

11:11

same sort of thing. Now. Granted, if if the city

11:14

were empty, then the direct route

11:16

would be the shortest, but the city is

11:18

never empty because the zombie apocalypse

11:20

hasn't happened yet, at least

11:22

at the time of the recording of this podcast. Yes

11:26

so, and by the way, if by

11:28

the zombie apocalypse has happened since

11:30

we record this podcast, I would like to have a

11:32

shout out to all of our new listeners with

11:34

BRAT. We're

11:37

great with the zombie demographic. Oh

11:41

I'm a little loopy today, Yeah you know, I

11:43

hadn't noticed. Yeah, so anyway, The routing

11:45

table is this list of essentially

11:47

rules that the router follows in order

11:50

to send packets across the network.

11:52

And you might say, well, that seems pretty

11:55

um stiff and and

11:57

and inflexible. What happens when

11:59

things change, Well, routing tables are

12:01

not static. They are dynamic.

12:03

They change all the time. And what's

12:05

happening is routers are actually

12:07

communicating with each other across

12:10

the Internet constantly updating

12:12

this information and changing it so that the

12:14

most uh, the most efficient

12:18

route is constantly being adjusted.

12:20

And they're doing this through various protocols.

12:23

Routing Information Protocol or r I p RIP

12:26

that would be the one

12:28

of the common protocols used. Another one is

12:31

the Open Shortest Path First or OSPF

12:34

protocol. These protocols

12:37

are what routers use in order to update

12:39

these routing tables so that data will

12:41

co go across the network, across

12:44

the Internet in the most efficient way

12:46

possible, the way that's got

12:48

the best guarantee that your information is going to get

12:50

to where it needs to be. And each

12:53

packet that Chris was talking about

12:55

earlier has data in it that allows

12:57

it to um

13:00

well, allows it to the system

13:02

to keep track of it. So let's say that you've sent

13:04

a file like let's say I'm sending a file to

13:06

Chris and Chris is on one network and I'm on

13:08

another network, and uh,

13:11

some of my packets don't get through. Well,

13:13

the system keeps track of that. The what

13:16

will happen is the information will come back to my

13:18

computer and it will say, hey, packets

13:21

three, seven, and twelve out

13:23

of the forty that you sent never made it to

13:25

Chris's machine. Then my machine will automatically

13:28

re send those packets so that

13:30

they will hopefully get to Chris's machine.

13:32

Now, granted, all this is happening at near the speed

13:35

of light, so you don't really notice

13:37

the delay unless something's really really

13:39

bad has happened. Um. And

13:42

so this is all happening in the blink of an

13:44

eye, but it's happening over and over

13:46

and over across the Internet, right,

13:51

um and and yes it's um just to

13:53

go back to protocols to the protocols are

13:55

basically, uh, languages

13:57

that the routers used to speak to one another. Um.

14:00

It's it enables people

14:03

multiple manufacturers to make devices

14:05

that will communicate with one another and

14:08

be interoperable, which is you know, we

14:10

talked about that actually on our podcast

14:13

about how the Internet works, and we

14:15

mentioned on some of the others. I think we probably did

14:17

on IPv six that, uh,

14:19

there are certain protocols that allow MC to

14:21

talk to a Linux box and the Linux box

14:23

to talk to a PC and etcetera. Right, they're

14:25

all they're all using the computer equivalent

14:28

of Esperanto. Yes, no,

14:32

anyway, Yeah, that's that's what that's what

14:34

our protocol is. And route routers do have those, uh,

14:36

protocols that are specific to routers, and that that

14:38

does help them balance the load somewhat on the Internet.

14:41

Yeah, we should should say, I guess that a router really

14:43

is a very specific computer. It's not

14:45

just this box that you buy and you know it's got lights

14:47

on it and when it's lit up, you know that the information

14:50

is going through it is actually a very specific

14:53

type of computer. Yeah, very specialized

14:55

device. And and a lot of the routers, like the home routers

14:57

that you purchase for your your home network,

15:00

whether it's wireless or wired, also

15:02

tend to act as a switch. And

15:04

what by by that, I mean that it allows

15:06

you to have your computers

15:08

talk to one another. So if you have

15:10

multiple computers at your house, you can

15:13

send files from one machine to another

15:15

machine without having to set up like some weird email

15:17

thing or whatever, you can actually send it directly

15:19

through your home network because your router

15:21

also can be a switch. It's not just a

15:24

router that sends information

15:26

from your network to the Internet and back. Um.

15:29

Also, when we were talking about information

15:31

going across the network and figuring out the

15:33

most efficient way, in the sense of

15:36

routers, what they do is they calculate

15:39

the cost of a

15:42

of any particular data transmission,

15:44

and cost does not mean

15:47

dollars. It means hops, alright,

15:50

So when a router sends information across

15:52

the network, information may go from one

15:54

router to another router to another router until

15:56

it finally gets to wherever it's going. All

15:58

right, Each time that information

16:00

goes from one route or to another, that's called

16:03

a hop, right now. Protocols,

16:05

certain protocols have a limited

16:07

number of hops that are built

16:10

into uh any sort

16:12

of data transference, and that information

16:14

is stored in the data packet. Okay,

16:16

So it's almost like I'm passing

16:18

a note in class, and the note

16:20

can only pass through three

16:23

other people before it gets to my destination.

16:25

It's one of them, the teacher. The teacher

16:28

accesses the the packet of information

16:31

it gets discarded, which is very much

16:33

like what happens on the internet. Actually, so,

16:35

so let's say that again. But now

16:38

we're talking about a classroom. So Chris is

16:40

sitting across the class from

16:42

from me. I'm on one side, he's on the

16:44

other side. I want to pass him a note

16:47

that says something like, uh, I don't

16:49

know the didn't the teacher wear that same outfit

16:51

yesterday? And so I'm trying to send the

16:53

the note across the class and it can only

16:56

pass through three other hands up

17:00

before it hits Chris. If it passes through more than

17:02

that, then whoever the fourth person

17:04

is is like, this is not worthwhile and just

17:06

tosses the note away. The

17:08

same thing is happening with hop counts if

17:11

I send a packet of information. If I'm

17:13

sending a file to Chris and it's going across

17:15

the Internet, there's a certain number of hops that

17:17

packet will go through before it

17:19

hits the maximum number of hop count. Now

17:21

that does not mean that the packet just automatically gets thrown

17:24

away. It means that the system says, you

17:26

know what, this packet has gone through this

17:28

kind of serpentine pathway

17:30

in order to get to where it's going. It's not getting

17:33

there efficiently. Chances are this packet

17:35

has already made it to the destination

17:37

through a fewer number

17:39

of hops. So I'm just going to toss the packet

17:41

aside because otherwise, because

17:44

the Internet is a redundant system,

17:46

and because it's meant to be robust,

17:48

and it's meant to get a packet of information

17:50

to the destination through whatever means

17:52

possible within the parameters of

17:55

the Internet. If you didn't have

17:57

these sort of uh discards

17:59

them is put into place, the Internet

18:02

would become overrun with packets. Yeah,

18:05

because you know, if I'm sending that file to Chris

18:07

and there's these duplicate packets going

18:09

across the network, what happens when

18:11

one packet gets to the destination and the

18:13

other packets are still out there trying to trying

18:16

to get to the destination. You're starting to clog

18:18

up the Internet with all of this data.

18:20

So these these fail safes

18:23

are in place in order to prevent

18:25

the Internet from just bogging down with

18:28

too much data. And they didn't

18:30

have to buy a like a digital router and

18:32

go in and yeah, we've got we've

18:34

got the routers, but not the routers router

18:37

routers. I had to call them once

18:40

it was did not go well, No, it's never

18:42

anyway. Um. So in order

18:44

to make all this work, in addition to your

18:47

router and your network, you also have

18:49

to have an address, a unique address for

18:52

each item on the network. And this we've talked

18:54

about in the I p V four

18:56

versus I p V six podcast. Ideally

19:00

you would have every single device

19:03

that connects to the Internet would have its own unique

19:07

address, so that whenever

19:09

I want to send something to another device

19:11

or receive information from another device,

19:14

it would always go to the same address.

19:16

And that way, it's just it's just efficient. It's a clean,

19:18

efficient system. But we don't

19:20

have enough addresses to do that,

19:23

right. But each item and

19:25

you may have actually seen this when you're going into your

19:28

computer or you know, other devices

19:30

like tablets and smartphones that use

19:32

Internet networks, or video game systems,

19:34

video game systems, uh, set top

19:36

boxes, TVs. There's a lot

19:38

of different devices that do it now, which is again

19:41

part of the problem. Yeah, that this is called

19:43

a MAC address. It's known as Media

19:45

Access control and it

19:47

doesn't look like well, actually, it kind

19:50

of resembles an IP address because

19:52

it has a series of letters and numbers

19:55

separated by by colon's

19:58

and that this is how you can identify I. Um,

20:00

you know, say you have been foolish

20:03

and have left your wireless

20:06

network open to the

20:08

public, and you

20:10

have let's say a computer and a tablet

20:13

and wait a minute, there are

20:16

three things on your network. Well,

20:18

then you can look at the MAC address on

20:21

your computer, and you can look at the MAC address and your

20:23

tablet and UH

20:25

by process of elimination, figure out what the

20:27

other device is and

20:30

maybe even get an idea. If you can access

20:32

the uh um

20:35

the routers information

20:37

page, you can you can see what what's

20:39

going on, how much traffic it's using, and hopefully

20:42

shut it down. You can even on on some

20:45

uh probably on most of them, I would guess.

20:47

I just don't want to be absolute um,

20:50

you know, restricted to certain Mac addresses,

20:52

so you can you can actually add you can

20:54

on mind on the device I

20:56

have at home. You can say,

20:58

you know, I'm adding this tablet,

21:00

I'm adding this game console, I'm adding

21:03

this uh smartphone, I actually

21:05

use WiFi calling on my smartphone,

21:07

you know, and things like that, and say, okay, I'm only

21:10

allowing MAC addresses

21:12

that I know to join this network. But

21:14

Basically, this is a way for um,

21:17

you know, local networks to identify

21:19

the devices and send the packets that go

21:21

to that device, so they know, um that

21:23

if you are reading how Stuff Works dot

21:26

Com and your spouse

21:28

is looking at a

21:31

news network and you know you

21:33

don't get the packets mixed up. It says, oh, well, these belong

21:35

to this address, these belong to that address, and

21:37

I'm going to be the traffic cop and send the

21:40

right packets to the right place, right.

21:42

Yeah. This this kind of ties into network

21:44

address translation, which I referred to at the beginning

21:46

of the podcast. We've also talked about

21:48

that in the I p V four versus I p V six.

21:51

Yes, it's one of the ways to address the problem

21:53

of having more devices in the world

21:56

than we have available IP

21:58

addresses for those devices to connect to

22:00

the Internet. Now, for information

22:03

to travel across the Internet, it means

22:05

that you have to have an Internet Protocol

22:07

address. This allows the information

22:11

to travel across it allows it

22:13

allows other computers to find you, and

22:15

allows your computer to send information to other

22:17

computers. Uh. Without the IP

22:19

addresses, you of course would have no way of knowing

22:22

how to get information from one machine

22:24

to another. It's kind of like in a

22:26

sense, it's kind of like a physical address or phone

22:28

number. If we didn't have phone numbers, if

22:30

it was all a party line, you would just have to pick

22:32

up the phone and hope that whomever you're trying

22:34

to contact is also on the phone at

22:37

that time, and everyone else will be able to hear

22:39

your conversation at the same time. And but in just

22:42

curious, have we ever talked about party

22:44

lines? I don't think, so that might

22:46

be fun. Then we can add that to the to do list.

22:48

So the network address

22:50

translation, this is a layer that, uh

22:53

that could be very useful in this sense.

22:55

You would have a router that would have a number

22:57

of static IP addresses, or

23:00

it possibly would have a number of addresses assigned

23:02

to it by the whatever your Internet

23:04

service provider is. Your

23:07

devices would not have static

23:09

IP addresses. They would have like some non

23:12

unique IP address and

23:15

dynamically assigned and and and

23:17

because they are non unique, that means

23:19

you can't just automatically tag

23:21

into the Internet and send stuff because if

23:24

it's a non unique address, I mean

23:26

some other devices out there on the Internet may

23:28

also have that same address, So anything

23:31

you request would be sent to all of them.

23:33

So what happens is your router acts as kind

23:35

of a postmaster. You have

23:37

this non unique address. You send

23:40

information to the you're trying to get,

23:42

uh, let's say again a website. I'm trying

23:44

to visit a website. Uh. That

23:46

request goes through to my router. My router

23:49

then replaces my non unique

23:51

address with a unique static

23:53

IP address and keeps track

23:56

of that relationship within the routing

23:58

table. When it's own pro re calls,

24:01

sends that request out to the internet. It

24:03

eventually gets to the server that I want.

24:05

The information comes back to the router. The routers

24:07

says, all right, this information is meant

24:10

for static IP address

24:12

whatever. Now it has to refer

24:14

to its table and see which of your devices

24:17

on your home network, your local area network

24:20

has temporarily been assigned that static

24:22

address. It then sends the information

24:24

to you. If if you are no longer part of that network,

24:27

or if it can identify it,

24:29

it gets dumped. It dumps that information

24:31

so it goes nowhere. Um.

24:34

Now, this is one of the things

24:36

that kind of it depending

24:39

on the type of engineer, it can really

24:41

irritate engineers because it's

24:43

a less efficient system and this is also

24:46

one of the issues with gaming routers

24:48

we talked about. You know, the request asked

24:50

about what kind of routers are best for gaming. Well,

24:53

because of the network address

24:55

translation, this can slow

24:58

down data trans mission

25:00

a little bit. I mean, there can also be some compatibility

25:03

issues, um, especially if

25:06

the router has to change these the

25:08

IP address for whatever the device is. Like,

25:10

if you've got a lot of devices that are connecting to this router,

25:13

there could be some complications and

25:15

complications when you're gaming. That's a bad

25:17

thing because it's going to affect how

25:19

fast that information is traveling to whichever device

25:22

you're using the game. It's complicated.

25:24

Yeah, well that can that can

25:26

mean that you will get lag in the game

25:28

you're playing. It means that you might get artifacts.

25:31

Uh, the game will not play as

25:33

well as you would want it to. So

25:36

any any device that's using

25:39

that you're that's one of the things

25:41

you gotta look at, like, well, how how

25:44

well rated is this router for that particular

25:47

function. Um. Also depending

25:49

on well, if you are a serious gamer,

25:52

you probably you probably want

25:54

a wired router. Uh. A

25:56

lot of the wireless routers also have wired connections

25:59

to them. Yeah, so

26:01

you probably want a wired connection, and the reason

26:04

for that is that it's more reliable than wireless.

26:07

You are less likely to have interference. Uh,

26:10

you're not going to find a dead spot. Like you

26:12

know, if you have your wireless network set

26:14

up in one room and you tend to game in

26:16

a different room and uh,

26:18

and there are certain materials

26:21

in your walls, it may end up

26:23

blocking some of the signal, which means that you may not have

26:25

a clear signal and that will affect your gaming.

26:28

So a wired connection tends to be best

26:31

if you want to go wireless. UH,

26:33

the IN protocol tends

26:35

to be the best. It's the fastest, and it has

26:38

a really good penetration as

26:40

far as various materials goes.

26:42

So if you have a wireless or other set up, it's

26:45

a it's a pretty good bet. G is

26:47

the next step. I would go with either

26:49

INN or G preferably. And now you have to

26:51

make sure that whatever devices you're using are compatible

26:54

with that particular protocol. Yes,

26:57

that's the eight O, two dot eleven. Yes,

26:59

proto a call with with the various flavors

27:02

A, B, G and yeah.

27:04

And so if you have a if you have a

27:06

device that is running

27:09

that it can accept G. I mean, these

27:11

are all different kinds of radio frequencies, but

27:13

it is designed for a G frequency

27:16

then G rated. Yeah,

27:19

and you have an N router, it's not gonna work.

27:21

They are not compatible. You have to have one

27:23

that can do I mean, they're

27:25

great. There are plenty of routers out there that will do multiple

27:29

frequencies, and there are plenty of

27:31

of UH wireless

27:34

chips out there that can do multiple frequencies

27:36

as well, But you want to make sure that you do

27:38

have that compatibility in there or else. You know,

27:40

you might have the fastest connection

27:43

with the router possible, but your device

27:46

is not compatible. Also keep in mind this

27:49

is also very heavily dependent upon what your

27:52

internet service provider plan is,

27:55

because if you're you can have the

27:57

if you have the fastest router, and you think of it

27:59

like a doorway, it could be a really really

28:01

wide doorway, but the path is really

28:04

narrow once you open the door, it

28:06

doesn't help you. You have to have that broadband connection

28:08

with a really good data transfer rate

28:10

for the router to even make a difference. Um,

28:13

if you don't have that high speed internet connection,

28:16

if your cable modem or or

28:18

however you're getting your your internet.

28:21

If that is a bottleneck, the router

28:23

is not gonna help. You have to have that too.

28:26

Yeah. Keep in mind too that if your I s

28:28

P caps data, you might

28:30

keep an eye on that. Yeah, I mean,

28:32

depending on what you're doing, it may not

28:34

make a difference. Most people never reach

28:37

their I s P S data cap, although

28:39

that's that's changing as people are getting more

28:41

into like consuming streaming video.

28:44

You know. So if you are watching some

28:46

streaming video service and you're

28:48

perhaps you have it on a couple of different televisions.

28:51

I mean it's not unusual now. You might have a Roku

28:54

box on one machine one television.

28:56

You might have a an Xbox three six yr

28:58

ps three on another one. You could potentially

29:01

have five or six different televisions

29:03

all consuming streaming video. That's gonna

29:05

that's gonna cause a pretty big bottleneck too. You've gotta

29:07

have a really good Internet connection and a decent router

29:10

for that to work. It's not impossible.

29:12

Um, it's impossible with my setup,

29:15

but because I have a I have a much slower

29:17

home network. Uh. But yeah, if

29:19

you don't, um, yeah, that's

29:21

that's possible, and then that could very quickly

29:24

run up against a data cap right.

29:27

Uh, did you want to touch on There's

29:30

one one issue I thought it might be interesting

29:32

to touch on. UM. That's in the

29:34

routers article on how stuff works dot com. And

29:36

that's what happens when

29:38

people intentionally try to clog

29:40

a network hit

29:44

me up with it. That would be a do OS

29:46

denial of a denial of service

29:48

attack. UM. And basically,

29:51

in these attacks, UH,

29:54

what happens is someone will

29:56

intentionally send as

29:58

many packets as possible to the

30:00

same spot. So basically,

30:03

remember we were talking just a few moments ago

30:05

about how

30:07

routers are aware of what else is going on

30:10

in the network, and they talk to one another

30:12

and they can they communicate. Well, if you know

30:14

where there is a specific router, uh.

30:16

And it leads to say,

30:18

say you're some someone who is who has

30:21

a grievance against the company, and you know where their

30:23

their router is, you can send

30:26

you know, billions of packets to it. Uh.

30:28

Someone's going to correct me and say they can't be that

30:30

many, but let's say lots and lots of packets

30:32

to it in an attempt to overwhelm

30:34

the router and give it so much traffic that it

30:36

cannot UM handle it, and it

30:38

will cause it to UH

30:41

have errors. Basically, it will become really

30:43

sluggish or possibly even

30:45

have it just shut down. Yeah,

30:48

it's certainly been known to happen in then variation

30:50

of this which is becoming more

30:52

common as the d d O S or distributed denial

30:54

of service attack, which happens a lot in a lot

30:57

of cases with UH bot nets

30:59

where people have UM installed

31:01

some kind of malware on their computer and someone

31:03

is running this attack to UH

31:05

you know, basically take over possibly

31:08

thousands of computers and have all of them

31:10

send an attack against one target

31:13

at the same time. Which, as you might

31:15

imagine, if you had thousands

31:17

of computers working on this problem

31:20

as it were sending sending requests

31:22

at the speed of light all to a single

31:24

target, it's it's very easy to overwhelm

31:26

a single router with that kind

31:28

of UH with that kind of traffic. So

31:31

UM when you when you hear about these attacks,

31:34

you can keep that in mind, that that there's

31:36

some router somewhere that it's doing its

31:38

level best to handle the traffic, but

31:40

it is just not keeping up with a flood

31:43

of UH packets swarming

31:45

at it. And also on

31:47

that same note, because a router

31:50

is essentially a computer. You can

31:52

install software on that

31:54

router so that it has its own

31:57

protections against such things.

31:59

So when you hear about people

32:01

talking about firewalls, there are various ways

32:03

you can have a firewall. You can a computer firewall,

32:06

you can have it as a software layer, you can have it as a

32:08

hardware layer. Well, routers kind of a hardware

32:10

layer level firewall. A lot of routers

32:12

come with a firewall system

32:15

in place that you can configure once you

32:17

set up your router, and this will help

32:19

protect your home network system from intrusions

32:22

from malware coming in, uh, from

32:25

unrequested data coming in,

32:27

so sort sort of a spam protector

32:29

as well. UM, and routers can also have other

32:32

kinds of software programmed into

32:34

them, things like encryption, UM,

32:37

intrusion detection, that kind of stuff. So,

32:40

uh, depending on the model of router,

32:43

that'll that'll tell you

32:45

what kind of protection is built into the system.

32:47

And uh, you know, it's not uncommon

32:50

to find routers come with firewall

32:53

software and pre installed in the router

32:55

itself, which is also very useful. It

32:57

do highly recommend that if you know, if you're

32:59

setting up a home area network and you want to uh,

33:02

you want to have a router there to connect to

33:04

the internet. Setting up a firewall is a

33:06

very good stuff. It's not just

33:09

like any other security system on the Internet.

33:11

I have to stress it's never

33:13

full proof. You're never going to have the perfect

33:16

security system because people are ingenious

33:19

at getting around uh

33:21

firewalls and other kind of barriers.

33:23

But it does mean that you're

33:25

going to prevent the

33:28

overwhelming percentage of attacks

33:30

from getting to you because most people are

33:33

also lazy, so they're gonna

33:35

aim for a wide array

33:37

of targets and they're gonna be happy if they just hit

33:39

a few of those targets. They're not necessarily

33:42

aiming directly for you, unless you're

33:44

some sort of important individual with

33:46

like a government or perhaps

33:48

a news agency or

33:50

something like that. If you have like a high profile

33:53

status, then you might have to worry

33:55

about more stringent security. But

33:57

for the average user, it doesn't. You know,

34:00

a decent viral wall is enough. Yeah,

34:04

Indecent fire walls are never enough. Well.

34:08

I think that's a good discussion on routers.

34:10

We really pretty much covered the basics there,

34:12

and like I said, if you want to learn more, visit how

34:15

stuff works dot com. Check out our articles

34:17

on how routers work and how network address

34:19

translation works. Um those

34:21

those articles are very helpful to understand

34:23

the ins and outs of how this data

34:26

goes across. There's also some great animations and everything

34:28

that show this in action. So if you have problems

34:30

visualizing it, check out the website. It

34:32

really does help. And guys, if you

34:34

have any requests that

34:37

you would like us to address uh

34:39

huh, you can let us know via

34:42

email our addresses, text stuff

34:44

at how stuff Works dot com,

34:46

or send us a little message on that Facebook

34:49

or Twitter thing. Both of those

34:51

places are handle is tech Stuff

34:53

hs W and Chris and I will talk

34:55

to you again really soon. Be

35:00

sure to check out our new video podcast, Stuff

35:02

from the Future. Join How Stuff Work staff

35:05

as we explore the most promising and perplexing

35:07

possibilities of tomorrow. The

35:10

How Stuff Works iPhone app has arrived. Download

35:12

it today on iTunes, brought

35:19

to you by the reinvented two thousand twelve camera.

35:21

It's ready, are you

Unlock more with Podchaser Pro

  • Audience Insights
  • Contact Information
  • Demographics
  • Charts
  • Sponsor History
  • and More!
Pro Features