ct logo wslogan

1 minute reading time (273 words)

Tech Term: Modems and Routers Defined

Tech Term: Modems and Routers Defined

The Internet is an amazing tool, only bolstered by our ability to access it wirelessly - but what do you know about the devices that allow us to access it, namely, modems and routers? Do you know what each does? For today’s tech term, we’ll dive into exactly that.

First, it is important to understand that these devices serve two different purposes, each critical to the end goal. By working together, the modem and the router create a usable network for you to leverage.

What Does a Modem Do?
A modem is what actually connects your local network to your Internet service provider, and therefore, the Internet. It allows information to pass over without any kind of filtering.

What Does a Router Do?
Your router is what bridges the gaps between the devices on your network and the Internet through either a wired or wireless connection. It also features protections like firewalls to thwart potential threats coming in from the Internet.

Despite this, it may not be entirely necessary for you to include a router, especially if you only want a particular device to have Internet access.

Combination Options
There is also the option to consolidate these two devices into a single one, although this doesn’t fit everyone’s needs. Using a modem/router combination limits what you can do with your network, and if your 2-in-1 device dies or is damaged, you lose all of your networking capability. Alternatively, a malfunctioning modem or router can be swapped out and replaced relatively easily, with less of a capital investment.

i-medIT can assist you in setting up a network that meets your business’ needs optimally. Call us at 630-549-6199 for more information.

 

Comments

Already Registered? Login Here
No comments made yet. Be the first to submit a comment

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Google Cloud Business Computing Hackers Backup Microsoft Innovation Malware Email Tech Term Internet Android Mobile Devices Data Network Security Small Business VoIP Cybercrime Ransomware Hardware Smartphones Windows Business Cloud Computing Efficiency Data Backup Software How To Browser Cybersecurity Smartphone Internet of Things Computers User Tips Business Management Network Social Engineering Communications Computer Data Recovery Chrome Upgrade Communication Business Continuity Automation Productivity Mobile Device Management Artificial Intelligence Money Router Collaboration Managed IT Services Hosted Solutions Law Enforcement Operating System Server Telephone Systems Social Media Disaster Recovery Alert Save Money Word Phishing App Bring Your Own Device BDR Data Breach Spam Data Security Data Protection Office 365 Two-factor Authentication Outsourced IT Gadgets Windows 10 Safety Connectivity Vulnerability Managed IT Services Bandwidth Saving Money Redundancy Facebook Content Management Avoiding Downtime Internet Exlporer Comparison Unsupported Software Miscellaneous Website Blockchain Quick Tips Applications Productivity Passwords Cleaning Wi-Fi Sports Microsoft Office Spam Blocking IT Services Remote Monitoring Gmail Identity Theft BYOD YouTube Managed IT Business Intelligence Apps Windows 10 Data Storage Data storage IT Support Physical Security Recovery Update Paperless Office Networking Windows 7 Virtualization The Internet of Things Infrastructure VPN Government IT Management Private Cloud Google Drive CES Downtime OneNote Password IT Plan Public Cloud Amazon Automobile Access Control Settings Google Docs Workplace Tips USB Supercomputer Data loss Robot Accountants Reputation Data Management NarrowBand Business Mangement Legal Wire Excel Telecommuting Tools Google Apps Thought Leadership Audit Laptop Apple Office Tips Scam NIST IT Consultant Hybrid Cloud Sync Amazon Web Services Work/Life Balance Authentication DDoS Budget Screen Mirroring End of Support Customer Wireless Technology Recycling Keyboard Smart Office Root Cause Analysis Files Tip of the week Remote Work PDF Employer-Employee Relationship HaaS Entertainment Computer Fan Touchpad iPhone Specifications Cryptocurrency Software Tips Monitor Online Shopping Nanotechnology Charger Office Voice over Internet Protocol HIPAA Big Data Servers Cast Internet exploMicrosoft Electronic Medical Records Practices Netflix Hacking Marketing eWaste Mobile Device Document Management Black Market History Windows Server 2008 Workers Holiday Addiction FENG Managed Service Provider Tech Support Safe Mode webinar Telephony Evernote Smart Tech Computer Care Windows 10s Relocation Human Resources HVAC Current Events Advertising Hosted Computing Criminal Meetings Credit Cards Conferencing Botnet Flexibility Cache Shadow IT HBO Millennials Digital Signature Virtual Assistant Skype Wireless Charging Samsung Multi-Factor Security Staff Enterprise Content Management Knowledge Outlook Fraud Hiring/Firing Inventory Chromecast Machine Learning IBM User Error Flash Emails Travel Password Manager Wireless Internet Health Frequently Asked Questions Workforce Encryption Telephone System Start Menu Cortana Devices Value Solid State Drive Uninterrupted Power Supply Going Green Trending Patch Management Password Management Network Congestion Humor Employer Employee Relationship Training Company Culture Webinar Wireless Politics Public Computer CrashOverride Computing Infrastructure Two Factor Authentication Techology Audiobook Loyalty How to Computer Accessories Vendor Management Instant Messaging Troubleshooting Managing Stress Bluetooth IT solutions Best Practice Thank You Twitter SaaS Transportation Users Experience Congratulations Information Technology IT Support Benefits Books Virtual Reality Save Time Worker Video Games Music Assessment Battery Firewall Emergency Worker Commute Rootkit WiFi Scalability Wearable Technology Mobility Risk Management Television Education Smart Technology Remote Computing Content Search