— Blogs —
—Products—
WhatsApp:+8615367865107
Address:Room 102, District D, Houhu Industrial Park, Yuelu District, Changsha City, Hunan Province, China
Product knowledge
Time:2021-12-26 12:41:12 Popularity:687
What is the difference between industrial wireless router and DTU
1.The terminal device data access interface is different:
The wireless router provides a network interface for data access. The terminal device only needs to use the IP address of the network port as the gateway. The terminal device must use the designated IP address or the address in the designated IP address range to communicate with the designated The server host of the IP address or the server host in the IP address segment performs data exchange, and communication cannot be carried out between all other addresses that are not set.
DTU data access generally also provides a serial port or network interface, but their purpose is to dial, not to be a gateway in the real sense, for example, after the DTU of the serial interface completes the dialing in the access terminal device, As a new network device as a terminal device, the address of the terminal device uses the address bound by the new network device; and the DTU of the network interface is similar to the telecommunications ADSL Internet access, and generally requires the device to complete a dialing action.
2.Wireless access security:
Data exchange using wireless routers uses a secure tunnel established between the wireless router and the communication server. All data exchanges can only be end-to-end (server), and any other intermediate-to-end data cannot be carried out effectively. Communication, which means that the wireless network provider cannot enter any system at both ends of the communication.
Using DTU data exchange uses the internal data exchange process of the wireless network provider, so that the wireless network provider can easily enter any system at both ends of the communication.
3.Transmission security of terminal equipment:
The terminal device using the wireless router must use the designated IP address, and any other addresses cannot communicate; after the data of the terminal device passes through the wireless router, what is transmitted using the wireless network is the encrypted content, intercepting the wireless network Generally, the transmitted data cannot be decrypted. The encrypted data can only be correctly decrypted by the designated communication server; at the same time, all data has a unique corresponding serial number and other key processing to ensure that the terminal device data will not be rebroadcast or retransmitted.
There is no such restriction on the IP address used by the terminal device using DTU, so as long as the IP address can be allocated, it can communicate with the server system. After the data of the terminal device passes through the DTU, the content transmitted using the wireless network is generally only through the IP Header processing, intercepting the data transmitted in the wireless network, as long as simply removing the header information, the transmitted data can be displayed; at the same time, the data is not processed accordingly, which may cause the rebroadcast or retransmission of the wireless data and cause the system to be abnormal , Thus there is a safety hazard.
4.Exchange data processing:
The communication server is the core of the wireless router, so the central server must be installed with a host for the wireless router to communicate, and all data exchanged by the device must be encrypted, decrypted, verified, and routed by it.
5.Anti-interference of terminal equipment:
The core system of the wireless router adopts an embedded operating system, which provides only a few data ports that can be used, and there is only one routing relationship with the terminal device, so the terminal device cannot reach other terminal devices, and cannot access other devices of the same type. A terminal device, even if one terminal device is controlled by a virus or an outsider, it only affects this terminal device, and the others are not affected.
There is a certain relationship between the terminal equipment using DTU and DTU, which can easily access other terminal equipment. If a terminal equipment is controlled by a virus or by outsiders, all terminal equipment and the central server system will be seriously threatened.
There is no other intermediate server when using DTU, but it directly connects to the central server.
Related recommendations
Related products
Screenshot, WhatsApp to identify the QR code
WhatsApp number:+8615367865107
(Click on WhatsApp to copy and add friends)