Router

A router is a computer networking device that forwards data packets across an internetwork toward their destinations, through a process known as routing. Routing occurs at layer 3 (the Network layer) of the OSI seven-layer model.

In non-technical terms, a router acts as a junction between two networks to transfer data packets among them. A router is essentially different from a switch that connects devices to form a Local Area Network (LAN). One easy illustration for the different functions of routers and switches is to think of switches as neighborhood streets, and the router as the intersections with the street signs. Each house on the street has an address within a range on the block. In the same way, a switch connects various devices each with their own IP address(es) on a LAN. However, the switch knows nothing about IP addresses except its own management address. Routers connect networks together the way that onramps or major intersections connect streets to both highways and freeways, etc. The street signs at the intersection (routing table) show which way the packets need to flow.

So for example, a router at home connects the Internet Service Provider’s network (usually on an Internet address) together with the LAN in the home (typically using a range of private IP addresses) and a single broadcast domain. The switch connects devices together to form the LAN. Sometimes the switch and the router are combined together in one single package sold as a multiple port router.

In order to route packets, a router communicates with other routers using routing protocols and using this information creates and maintains a “routing table”. The routing table stores the best routes to certain network destinations, the “routing metrics” associated with those routes, and the path to the next hop router. See the routing article for a more detailed discussion of how this works.

Routing is most commonly associated with the Internet Protocol, although other less-popular routed protocols remain in use.

From Wikipedia Router article.

Tags: , , , , , , , , , ,

Comments

Microsoft announces support for open source Firefox browser on Live.com

For the first time Microsoft has admitted that Firefox has sufficient market share to warrant its support.

Live.com is Microsoft’s new “Web 2.0″ service, bringing together various information sources across the net.

However, the Microsoft programmers have clearly yet to get to grips with Firefox. Microsoft admits there is a bug in search tabs, which ‘look strange but are functional’ with the promise it will be fixed soon too. Similarly, a search for Excel using Internet Explorer and Firefox will come up with different results.

Live.com blog

Tags: , , , , , , , ,

Comments

Clean your computer from spyware with Ad-Aware

From LavaSoft.com:
With the ability to scan your RAM, registry, hard drives, and external storage devices for known data-mining, advertising, and tracking components, Ad-aware SE easily can clean your system, allowing you to maintain a higher degree of privacy while you surf the Web.

Ad-aware SE Personal Edition boasts a number of improvements. Extended memory scanning now scans all modules loaded by a process. Scanning uses the all- new CSI (Code Sequence Identification) technology to identify new and unknown variants of known targets. Extended registry scanning now scans registry branches of multiple-user accounts and performs additional smart checks to detect dynamically created references. Scanning speed is noticeably faster, and this version offers an Extended Scanning mode for known and unknown/possible browser hijackers.

New in version 1.06: Disk-scan is approximately 30% faster. CSI scan is now more efficient. Added “Scan for low-risk threats” option, to scan for targets with low TAC index. Ad-Watch CSI engine performance highly improved; using less CPU and Memory as well as having a smaller footprint. GUI adapted to use the new TAC.

  • Scans fixed and removable drives, memory and Windows registry
  • Detects known and unknown variants of malware by using the Code Sequence Identification (CSI) technology
  • Removes aggressive spyware and malicious content
  • Takes advantage of a fully featured quarantine support
  • Logs information about scans and malicious content removals
  • Users of Ad-Aware Personal can efficiently remove behaviour-tracking spyware; thus protecting your privacy on the Internet
  • Enhances your computer’s performance by protecting against bandwidth stealing programs
  • Provides greater computer security by removing keyloggers and other programs which put passwords, credit card numbers, and other vulnerable data at risk online
  • Allows you to stay abreast of spyware, not just a step behind, thanks to the Code Sequence Identification (CSI) technology

Ad-Aware SE Personal is available free of charge.

Tags: , , , , , ,

Comments (1)

Global Spyware Pandemic

The threat of spyware continues to grow, according to the latest State of Spyware report issued by Webroot today.

The report claims that average home computer in the UK is infected with 18.1 instances of spyware, giving the UK the highest concentration of spyware infections in Europe, and puts it third on a global scale, behind the US, with 24.4 infections on average, and Thailand, with 18.7.

The survey showed that an average of 72 per cent of home computers were infected, down sequentially from the previous quarter’s 83 per cent and last year’s high of 92 per cent.

Calling the problem a global pandemic, Webroot notes that 48% of enterprise PCs are infected with adware. Although the actual percentage of infected PCs has, according to Webroot, has remained roughly stable, the scale of the infections has grown. The company found that the average enterprise PC had 3.9 adware infections in the third quarter of this year, up from 3.6 in the previous quarter.

References:
Webroot Software State of Spyware report

Tags: , , , , , , ,

Comments

Cisco Set To Launch Wireless Mesh Solution

Mesh networking is a way to route data, voice and instructions between nodes. It allows for continuous connections and reconfiguration around blocked paths by “hopping” from node to node until a connection can be established.

Mesh networks are self-healing: the network can still operate even when a node breaks down or a connection goes bad. As a result, a very reliable network is formed. Applicable to wireless networks, wired networks, and software interaction.

Wireless mesh networking is mesh networking implemented over a Wireless LAN.

According to CRN, Cisco is getting into the wireless mesh networking arena next week with a line of outdoor mesh products aimed at reducing the deployment costs involved in setting up indoor and outdoor networks.

References:
Wireless Mesh Network

Tags: , , , , , ,

Comments

« Previous entries · Next entries »