What is the difference between using an industrial wireless router and a DTU
Posted by PABLO MA
Terminal equipment data access interface is different
The wireless router provides a network interface for data access. The terminal device only needs to use the IP address of the network port as the gateway. The terminal device must use the specified IP address or the address in the specified IP address range to communicate with the specified The server host with the IP address or the server host in the IP address segment performs data exchange, and all other addresses that are not set cannot communicate with each other.
The data access of DTU generally also provides serial port or network interface, but their purpose is to dial up, not to be used as a gateway in the true sense. For example, after the DTU with serial interface finishes dialing in the access terminal device, As a new network device of the terminal device, the address of the terminal device uses the address bound to the new network device; and the DTU of the network interface is similar to the ADSL of telecom to access the Internet, and generally requires the device to complete a dial-up action.
Wireless access security
The data exchange using the wireless router uses the secure tunnel established between the wireless router and the communication server. All data exchange can only be end (terminal device) to end (server), and any other intermediate-to-end data cannot be effectively carried out. communication, which means that the wireless network provider cannot enter any system at the two ends of the communication.
The data exchange using DTU uses the data exchange process inside the wireless network provider, so that the wireless network provider can easily enter any system at the two ends of the communication.
Transmission Security for End Devices
The terminal device using the wireless router must use the specified IP address, and any other address cannot communicate; after the data of the terminal device passes through the wireless router, the encrypted content is transmitted through the wireless network, and the content in the wireless network is intercepted. The transmitted data generally cannot be decrypted, and the encrypted data can only be correctly decrypted by the designated communication server; at the same time, all data has a unique corresponding serial number and other key processing to ensure that the terminal device data will not be replayed or resent.
The IP address used by the terminal equipment using DTU has no such restrictions, so as long as the IP address can be assigned, it can communicate with the server system. After the data of the terminal equipment passes through the DTU, the content transmitted using the wireless network is generally only through the IP. Header processing, intercepting the data transmitted in the wireless network, as long as the header information is simply removed, the transmitted data can be displayed; at the same time, the data is not processed accordingly, which may lead to rebroadcasting or retransmission of wireless data, which will lead to system abnormalities , resulting in a security risk.
Anti-jamming of terminal equipment
The core system of the wireless router uses an embedded operating system, which only provides very few data ports that can be used. There is only one routing relationship with the terminal device, so the terminal device cannot reach other terminal devices, and cannot access other devices even of the same type. For terminal devices, even if one terminal device is controlled by a virus or an outsider, it will only affect this terminal device, and the others will not be affected.
Terminal devices using DTU have a certain relationship with DTU, and can easily access other terminal devices. If a terminal device is controlled by a virus or an outsider, all terminal devices and the central server system will be seriously threatened.
Processing of exchanged data
The communication server is the core of the wireless router, so the central server must be equipped with a host for the wireless router to communicate with, and all data exchanged by the devices must be encrypted, decrypted, verified, and routed by it.
There is no other intermediate server when using DTU, but a direct connection to the central server.
TAGS:
SHARE: