Solved

UPnP on routers - what does it do?

Posted on 2006-10-25
4
1,109 Views
Last Modified: 2012-05-05
Hi,

What difference does UPnP make on a router. Ive a small workgroup.

Thanks
0
Comment
Question by:worded
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
rennocb earned 500 total points
ID: 17805163
When a device is added to the network, the UPnP discovery protocol allows that device to advertise its services to control points on the network. Similarly, when a control point is added to the network, the UPnP discovery protocol allows that control point to search for devices of interest on the network.

For everything you might possibly want to know about Upnp, look here...

http://en.wikipedia.org/wiki/Upnp
0
 

Author Comment

by:worded
ID: 17808062


Do you think it would have a negative effect speed wise on a wireless network? Is it a drain?
0
 
LVL 8

Expert Comment

by:x86fix
ID: 17809348
I don't like it.  It makes users aware of the router and gives them an icon to click on and try to login to it.  I turn it off.  i know the ip address and how to get to it.  I don't want others to try to access the router.
0
 
LVL 1

Expert Comment

by:rennocb
ID: 17813262
I don't know of any affect on performance. Have run it both ways and didn't notice any difference on my network.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

631 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question