Solved

UPnP on routers - what does it do?

Posted on 2006-10-25
4
1,108 Views
Last Modified: 2012-05-05
Hi,

What difference does UPnP make on a router. Ive a small workgroup.

Thanks
0
Comment
Question by:worded
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 1

Accepted Solution

by:
rennocb earned 500 total points
ID: 17805163
When a device is added to the network, the UPnP discovery protocol allows that device to advertise its services to control points on the network. Similarly, when a control point is added to the network, the UPnP discovery protocol allows that control point to search for devices of interest on the network.

For everything you might possibly want to know about Upnp, look here...

http://en.wikipedia.org/wiki/Upnp
0
 

Author Comment

by:worded
ID: 17808062


Do you think it would have a negative effect speed wise on a wireless network? Is it a drain?
0
 
LVL 8

Expert Comment

by:x86fix
ID: 17809348
I don't like it.  It makes users aware of the router and gives them an icon to click on and try to login to it.  I turn it off.  i know the ip address and how to get to it.  I don't want others to try to access the router.
0
 
LVL 1

Expert Comment

by:rennocb
ID: 17813262
I don't know of any affect on performance. Have run it both ways and didn't notice any difference on my network.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question