Joke Collection Website - Bulletin headlines - What is the name of the manufacturer that produces JCG routers? Corporate philosophy? A friend who knows the answer.
What is the name of the manufacturer that produces JCG routers? Corporate philosophy? A friend who knows the answer.
[Edit this paragraph] principle
Wireless router is like an extension product, which combines simple wireless AP and broadband router. It not only has all the functions of a simple wireless AP, such as supporting DHCP client, VPN, firewall, WEP encryption and so on. , including network address translation (NAT) function, which can support LAN users to enjoy network connection. It can realize the Internet connection and wireless access between ADSL and residential broadband in the home wireless network. The wireless router can be directly connected with all ADSL MODEM or CABLE MODEM connected with Ethernet, and can also be accessed through local area networks such as switches/hubs and broadband routers. Built-in simple virtual dialing software can store user name and password to dial the Internet, and can provide automatic dialing function for ADSL, CM, etc. No need to dial manually or occupy the computer as a server. In addition, wireless routers generally have relatively perfect security protection functions.
[Edit this paragraph] Wireless router security settings
Wireless settings 1. SSID SSID (Service Set Identifier) is the abbreviation of "Service Set Identifier", which is the identifier of wireless network and used to identify the identity of wireless devices found on a specific wireless network. All workstations and access points must communicate with each other using the same SSID. The SSID is a 32-bit data whose value is case-sensitive. It can be the physical location identification of WLAN, your name, company name, company name and department, preferred advertising language and other characters you like. 2. Channel channel, also called "channel", is a data signal transmission channel with wireless signal as transmission medium. Wireless broadband routers can operate on many channels. Various wireless network devices located nearby must be located on different channels, otherwise signal interference will occur. If you only have one device, the default channel value of 6 may be the most appropriate. Unless you need to change channels for special reasons (such as interference from Bluetooth, microwave oven, cell phone tower or other access points in the area), please use the factory default values. If there are multiple wireless routers and wireless access points on the network, it is recommended to stagger the channels used by each device. For example, the 802. 1 1g and 802.1/b wireless standards have 1 1 channels, but only three channels do not overlap (channel 65438). Compared with wired network, wireless router security settings are more vulnerable to eavesdropping when sending and receiving data through wireless LAN. When designing a perfect wireless LAN system, encryption and authentication are security factors that need to be considered. The most fundamental purpose of applying encryption technology in wireless LAN is to make wireless business reach the same security level as wired business. Aiming at this goal, IEEE802. 1 1 standard adopts WEP (Wired Equivalent Privacy) protocol to establish a special security mechanism to encrypt traffic and authenticate nodes. Mainly used for the security of link layer information data in wireless LAN. WEP adopts symmetric encryption mechanism, and data encryption and decryption use the same key and encryption algorithm. WEP uses encryption keys (also called WEP keys) to encrypt the data part of each packet exchanged on the 802.6438+0 1 network. After enabling encryption, two 802. 1 1 devices must enable encryption and have the same encryption key before they can communicate. By default, WEP encryption is disabled, that is, it is not encrypted. Wireless security parameters are optional and generally have three parameters, namely: (1)WEP key format: hexadecimal number; ASCII character (2)WEP encryption level: disable encryption function; 40(64) bit encryption; 128 bit encryption. The default is to disable encryption. (3)WEP key value: set by the user. The wireless router, together with the wireless network card supporting encryption function, can encrypt data transmission, making it difficult for others to steal your information halfway. There are two levels of WEP encryption: 40(64) bits and 128 bits. It is safer to use 128 bit encryption. WEP keys can be a set of randomly generated hexadecimal numbers or ASCII characters selected by users themselves. Generally, we choose the latter and enter it manually. Each wireless broadband router and wireless workstation must use the same key to communicate. However, encryption is optional, and the default value of most wireless routers is to disable encryption. Encryption may affect transmission efficiency. To enable encryption, select the WEP key format of ASCII characters, and select a 40(64)-bit or 128-bit WEP key under WEP encryption method (mode). With 40(64) bit encryption, you can enter four different WEP keys, but you can only select one at a time. Each key consists of 10 hexadecimal characters. Save in the wireless broadband router. By default, one of the four keys is selected for use. When using 128-bit encryptor, please enter 26 hexadecimal characters as WEP key. In this case, only one key can be entered. Some wireless network cards can only use 40(64) bit encryption method, so you may want to choose a lower encryption level. If all your clients support 128-bit encrypted communication, please select 128-bit; If the client can only support 40(64) bit encrypted communication, please select 40(64) bit. To enable encryption, select the encryption type and WEP key for all wireless routers, access points and workstations on the network. In order to increase network security, the key can be changed frequently. When changing the keys used by wireless devices, remember to change the keys of all wireless devices and access points on the network at the same time. Basically, these are the security settings of wireless routers, and I think everyone should have a comprehensive understanding.
[Edit this paragraph] Related parameters
protocol standard
At present, the mainstream protocol standards supported by wireless router products are IEEE 802. 1 1g, which is backward compatible with 802.438+05438+0b. Here, we must first understand the meaning of this standard. "IEEE", which begins with the agreement, is an international wireless standard organization, and is responsible for the standard formulation of electronic and electrical equipment, test methods, original devices, symbols, definitions and test methods. In the field of wireless routers, in addition to the above two protocols, there is actually an IEEE802. 1 1a standard, but it has not been popularized due to poor compatibility. However, IEEE802. 1 1b and 802.1/g standards are compatible, and the biggest difference between them is that they support different transmission rates. The former can only support 1 1M, while the latter can support 54M. The new 802. 1 1g+ standard can support the wireless transmission rate of 108M, and the transmission speed can be basically the same as that of wired networks. To sum up, if you build a wireless network with frequent data transmission and certain transmission rate requirements, then the wireless router supporting IEEE802. 1 1g standard is the first choice; If you are new to wireless network, you can choose products that support IEEE802. 1 1b, and the price is relatively low.
rate of data signalling
The emergence of wireless router is similar to wired network, and the transmission rate of wireless network refers to its ability to receive and send data under certain network standards. However, in wireless networks, this performance has a great relationship with the environment. Because in wireless networks, data is transmitted by signals, the actual use environment will cause certain interference to the transmitted signals. The actual situation is that the actual transmission speed of WLAN can only reach less than half of the nominal maximum transmission speed of the product; For example, the theoretical maximum speed of 802. 1 1b is11m. According to the author's test, it takes about 3 minutes to transmit a 100MB file in a good wireless network environment. In the same environment, if you switch to a product that supports 802. 1 100g, it only takes about 30 seconds to transfer a file of 100MB, so when purchasing the product, you should consider floating on the basis of the transfer rate you need.
Signal cover
That is, the "effective working distance" mentioned in the parameters of the example router is also one of the important parameters of the wireless router; As the name implies, other computers can only connect wirelessly within the signal coverage of the wireless router. "indoor 100 meters, outdoor 400 meters" is also an ideal value, which will vary with different network environments; Generally, indoor wireless signals can be within 50 meters, and outdoor wireless signals can only reach about 100-200 meters. The signal strength of wireless routers is also greatly influenced by the environment.
Working frequency
I won't say much about this parameter because it involves some professional electronic knowledge. We can simply understand it as follows: compare the wireless router to the daily communication tool-mobile phone, the frequency used by mobile phone is generally between 800-2000 MHz, while the working frequency of wireless router and mobile phone is similar, both of which are 2.4GHz.
[Edit this paragraph] Gain antenna
In wireless networks, antennas can enhance wireless signals, which can be understood as amplifiers of wireless signals. Antennas have different radiation or reception capabilities in different directions in space. According to different directionality, antennas can be omnidirectional or directional. Omni-directional antenna: On the horizontal plane, an antenna with no maximum radiation and receiving direction is called an omni-directional antenna. Omni-directional antenna is often used in the central station of point-to-multipoint communication because it has no directivity. For example, if you want to establish a wireless connection between two adjacent buildings, you can choose this antenna. Directional antenna: An antenna with maximum radiation and reception capacity in one or more directions is called a directional antenna. Directional antenna has concentrated energy and higher gain than omnidirectional antenna, which is suitable for long-distance point-to-point communication. At the same time, because of its directivity, it has strong anti-interference ability. For example, in a residential area, you can choose this antenna when you need to establish wireless connection across several buildings.
[Edit this paragraph] fuselage interface
Common wireless routers generally have an RJ45 port as a WAN port, that is, the interface between the uplink and the external network, and the other 2-4 ports are LAN ports, which are used to connect the ordinary LAN. There is a network switching chip inside to handle the information exchange between LAN interfaces. Generally, NAT (Network Address Translation) is used as the routing method between WAN port and LAN. Therefore, in fact, wireless routers can also be used as wired routers.
[Edit this paragraph] Other information
In addition to the common parameters introduced above, you can generally see the router processor type, memory capacity and other parameters on the product packaging. 1, processor routers, like computers, all contain a central processing unit (CPU). Whether it is a low-end or high-end router, CPU is the core of the router. At present, the processors used by wireless routers are generally ARM9 type. 2. There are many kinds of memories in the storage router, which are used to store configuration, router operating system, routing protocol software, etc. Theoretically, the larger the router memory, the better, but the memory can not directly reflect the performance and ability of a wireless router. In addition, we can also see "VPN support, built-in firewall function, built-in print server, 64-bit and 128-bit WEP encryption" on the parameter table, and these parameters will vary according to the product price and positioning; Some products also have USB interface. In terms of security, everyone should pay more attention to the types of encryption supported by products. The more types supported, the higher the security. At the same time, the more functions supported, the higher the performance price, and the specific selection requirements must of course be based on their own reality.
[Edit this paragraph] Configuration
Before configuring the wireless router, the PC and the wireless router must be connected through a network cable, and the other end of the network cable should be connected to the LAN port of the wireless router. After the physical connection is installed, if you want to configure the wireless router, you must also know two parameters, one is the user name and password of the wireless router; Another parameter is the management IP of the wireless router. The default management IP of a general wireless router is 192. 168. 1 92.168.0.1(or other), and the user name and password are admin. If you want to configure the wireless router, you must make the IP address of the PC and the management IP of the wireless router in the same network segment, and the subnet mask is the default of the system, and the gateway does not need to be set. At present, most wireless routers only support web configuration mode, not Telnet and other configuration modes. Enter the management IP of the wireless router in the browser, and a login interface will pop up on the desktop. After filling in the user name and password, we will enter the configuration interface of the wireless router. After entering the configuration interface of the wireless router, a "Setup Wizard" will automatically pop up. In the setup wizard, the system only provides the setting of WAN port. Users are advised to ignore the "Setup Wizard" and go directly to the "Network Parameter Settings" option. In the part of network parameter setting, the parameters of LAN port and WAN port must be set in the network parameter setting of wireless router. In practical application, many users only set the WAN port, and the setting of the LAN port keeps the default state of the wireless router. In order to keep the wireless router in an efficient and stable working state, in addition to the necessary settings for the wireless router, necessary safety precautions should be taken. Users buy wireless routers for their own convenience. If the wireless router is an open network access point, other users can enjoy it. In this case, will the user's network speed be stable? For the security of wireless router, users must clear the default LAN settings of wireless router. For example, if there is a wireless router, the default LAN address is192.168.1.1. In order to prevent others from invading, the local area network address can be changed to192.168.1.254, and the subnet mask remains unchanged. After setting the LAN port address, click "Save" and the restart dialog box will pop up. After setting the network parameters of the LAN port and configuring the relevant information of the LAN port, configure the WAN port. Before configuring the WAN port, you need to know what kind of access your broadband belongs to, fixed IP, dynamic IP, PPPoE virtual dialing, PPTP, L2TP, 802. 1x+ dynamic IP, or 802. 1x+ static IP. I use ADSL broadband with fixed IP, so I choose "static IP" as the connection type of WAN port, and then fill in the IP address, subnet mask, gateway and DNS server address. [ 1]
[Edit this paragraph] Wireless router brand
Cisco's brand of data communication equipment in home and soho market
Linksys is a division of Cisco Systems, which sells network products for families and small businesses. Linksys was originally founded in 1988 and was acquired by Cisco in 2003. Although Linksys is best known for its broadband and wireless routers,
Signs; emblem
But there are also Ethernet switching and VoIP devices and many other products. WRT54G Perhaps the most famous product produced by Linksys is WRT54G. In order to reduce costs, Linksys decided to use firmware based on Linux operating system. The consumer router includes a central processing unit and an operating system, and most functions are realized by software coding to keep physical hardware to a minimum and save production costs. However, known consumer routers are unreliable because they rely on software to provide functions, and software-based routers without fast processors may slowly point to network traffic. WRT54G is famous for its fast processor, but its firmware is incomplete and it lacks high-end functions.
JCG
"JCG" (Chinese abbreviation: Jiexi) is a brand trademark registered and held by Shenzhen Chenyi Technology Development Co., Ltd., and its product range includes Jiexi intelligent network equipment. Has the title of "Intelligent Wireless Network Expert". The company is headquartered in Futian District, Shenzhen, and its factory is located in the second industrial zone of Xilihonghualing, Nanshan District, Shenzhen. It has a standard industrial workshop of/kloc-0.5 million square meters, equipped with production equipment such as mounter. Product system JCG network products include intelligent wireless router, wireless USB network card, wireless MINI PCI network card, wireless PCI-E network card, wireless Cardbus network card, wireless AP, switch, network card, modem, ADSL, Power Cat and other product models. Among them, the chips used in the wireless product series mainly include Atheros scheme and Lei Ling scheme, and the performance of its intelligent wireless router is leading in the world, selling well overseas 10 years. The company has 15 years of experience in foreign markets, and its product network covers America, Western Europe, India, Middle East, Southeast Asia, Africa and other countries and regions, and has set up representative offices and agents in Germany, Russia, Brazil, Vietnam, Morocco, Hong Kong and other countries and regions. Our products enjoy a high reputation in the international market, and we are determined to provide high-quality and valuable network products for the people of China.
D-link
Xun You Group (D-Link), founded in 1986, was listed on the Taiwan Stock Exchange in June, 1994. It is the first publicly listed network company in Taiwan Province Province, and its own D-Link brand is used to sell computer network products in more than 0/00 countries all over the world. As the world's leading brand network equipment manufacturer, Xun You is committed to the research, development, production and marketing of local area network, broadband network, wireless network, voice network and related network equipment. In 2003, the global turnover was $728 million. There are more than 100 marketing points in 22 countries, with products in more than 100 countries and many world-class influential customers in the United States and Japan. It is one of the top five network equipment manufacturers in the world. In the latest IT Top 100 ranking published by Business Weekly recently, while the ranking of many IT giants has dropped sharply, D-Link has sprung up suddenly, jumping from the last 100 to the 84th, and its core competitiveness of "quickness, innovation and cost" has been fully reflected. As a leading brand in the global network communication equipment industry, D-Link is committed to the research, development, production and marketing of local area network, broadband network, wireless network, voice network, network security, network storage, network monitoring and related network equipment; There are R&D centers in the United States, Chinese mainland, China, Taiwan Province Province and India, with products all over the world and many world-class customers in the United States, Japan and Russia. In 2006, the global turnover was US$ 65.438+26.6 million, with a growth rate of 654.38+05%. It ranked among the top four global consumer network products, SOHO broadband routers, traditional switches and gigabit traditional switches, and was once again selected as the top IT 100 of Business Week, and its core competitiveness of "quickness, innovation and cost" was fully reflected. In 2007, DLink achieved another success, with annual revenue of NT$ 3,3231billion, operating gross profit of RMB 65.438+38.6 billion, after-tax income of RMB 3.339 billion and after-tax income of RMB 6. 10 yuan per share, an increase of 32% over the previous year and a record high.
TP-link
The full name of TP-LINK is Shenzhen Pulian Technology Co., Ltd., which was established in 1996. TP-Link is a mainstream manufacturer specializing in R&D, manufacturing and marketing of network and communication terminal equipment, and one of the few enterprises with completely independent R&D and manufacturing capabilities in China, and has built a well-known network and communication brand: TP-LINK. Is a national high-tech enterprise in the process of rapid development and internationalization. The company is headquartered in Shenzhen High-tech Industrial Park.
h3c
Hangzhou H3C Communication Technology Co., Ltd. (H3C for short) is committed to the research, development, production, sales and service of intellectual property technologies and products. In 2006, H3C's sales revenue was US$ 765,438+02 million, maintaining a year-on-year growth of about 70% for three consecutive years, and paying various taxes of RMB 250 million. It has branches in 34 provinces and cities across the country. At present, the company has 4800 employees, of which R&D personnel account for 55%. H3C spends more than 65,438+05% of its sales on R&D every year, with R&D institutions in Beijing, Hangzhou and Shenzhen in China and Bangalore in India, and product evaluation and testing centers in Beijing and Hangzhou. At present, H3C has applied for more than 1 100 patents, of which 80% are invention patents. H3C adheres to the development trend of "openness and integration" and puts forward the concept of IToIP, which integrates and optimizes network resources, computing resources and storage resources through middleware, builds a dynamic IT architecture centered on business applications for users, and organically integrates IP and IT. Under the innovative IToIP architecture, H3C has formed a full range of IP products and solutions, including network products of full-line routers and Ethernet switches, network security, IP storage, IP monitoring, voice and video, WLAN, SOHO and software management systems. , which has achieved a strategic leap from a network equipment supplier to an IToIP overall solution supplier and established a solid market leading position. At present, H3C ranks second in China's switch and low-end router market, third in security products, first in the Asia-Pacific market share of IP storage, and the world leader in IP monitoring technology, making it the first brand in China's safe city. Rooted in China, H3C's wide Satan law is widely used to serve users such as party and government, public security, taxation, education, finance, electric power, energy, transportation, water conservancy, operators, manufacturing, public enterprises and small and medium-sized enterprises. Serving the whole world, H3C expands the international market through cooperation with 3Com, Huawei, NEC and other companies. At present, H3C's products and solutions have covered more than 90 countries and regions around the world. At present, its parent company has been acquired by HP and entered the integration of HP product line. More than 50 years have passed, and the old brand has quietly ended.
- Previous article:Jiaxing promotes the banner of garbage classification.
- Next article:Service slogan of administrative service center
- Related articles
- Is the junior high school textbook in Wuji County Shijiazhuang Education Edition or Hebei Education Edition?
- 50 interesting advertisements are humorous and vivid.
- Want to lose weight slowly for a long time, what good diet method is there? ...
- Common wedding slogans
- Anti-cult warning propaganda slogan
- What do you mean by nano science and nano world?
- The principal¡¯s opening ceremony speech (5 general articles)
- Funny slogans for fruits such as; Dear! Can you hold on to an apple that's so crispy to the bone? Is there anything else? It¡¯s best to be more detailed.
- How to Cultivate Primary School Students' Mathematical Cognitive Ability
- Create national civilized city promotion slogans and banners