Extract from http://en.wikipedia.org/wiki/Computer_networking_device
Common basic networking devices:
Gateway: device sitting at a network node for interfacing with another network that uses different protocols. Works on OSI layers 4 to 7.
Router: a specialized network device that determines the next network point to which to forward a data packet toward its destination. Unlike a gateway, it cannot interface different protocols. Works on OSI layer 3.
Bridge: a device that connects multiple network segments along the data link layer. Works on OSI layer 2.
Switch: a device that allocates traffic from one network segment to certain lines (intended destination(s)) which connect the segment to another network segment. So unlike a hub a switch splits the network traffic and sends it to different destinations rather than to all systems on the network. Works on OSI layer 2.
Hub: connects multiple Ethernet segments together making them act as a single segment. When using a hub, every attached device shares the same broadcast domain and the same collision domain. Therefore, only one computer connected to the hub is able to transmit at a time. Depending on the network topology, the hub provides a basic level 1 OSI model connection among the network objects (workstations, servers, etc.). It provides bandwidth which is shared among all the objects, compared to switches, which provide a dedicated connection between individual nodes. Works on OSI layer 1.
Repeater: device to amplify or regenerate digital signals received while setting them from one part of a network into another. Works on OSI layer 1.
Some hybrid network devices:
Multilayer Switch: a switch which, in addition to switching on OSI layer 2, provides functionality at higher protocol layers.
Protocol Converter: a hardware device that converts between two different types of transmissions, such as asynchronous and synchronous transmissions.
Bridge Router(Brouter): Combine router and bridge functionality and are therefore working on OSI layers 2 and 3.
Digital media receiver: Connects a computer network to a home theatre
Hardware or software components that typically sit on the connection point of different networks, e.g. between an internal network and an external network:
Proxy: computer network service which allows clients to make indirect network connections to other network services
Firewall: a piece of hardware or software put on the network to prevent some communications forbidden by the network policy
Network Address Translator: network service provide as hardware or software that converts internal to external network addresses and vice versa
Other hardware for establishing networks or dial-up connections:
Multiplexer: device that combines several electrical signals into a single signal
Network Card: a piece of computer hardware to allow the attached computer to communicate by network
Modem: device that modulates an analog "carrier" signal (such as sound), to encode digital information, and that also demodulates such a carrier signal to decode the transmitted information, as a computer communicating with another computer over the telephone network
ISDN terminal adapter (TA): a specialized gateway for ISDN
Line Driver: a device to increase transmission distance by amplifying the signal. Base-band networks only.
Network Device Connectivity
Web Hosting and Internet Connection
Wednesday, June 30, 2010
Network equipment manufacturers, their roles in modern communication
Network equipment manufacturers (NEMs) play an ever-increasing role in helping communications service providers (CSPs) to run their networks more efficiently and cost-effectively. They have invested in their services and software organisation to help offset the pricing pressures they face in the hardware market. The global market for network management systems (NMSs) was worth USD4.6 billion in 2008 and will grow at a CAGR of 3% to reach USD5.5 billion in 2013. This growth will be led by NMSs for residential broadband, the market for which is forecast to grow at a 5% CAGR. Mobile NMS spending will grow more slowly, at a 4% CAGR, although it will remain the largest NMS market. Growth in spending on business services NMS will also be slighly lower, with a 3% CAGR. Maintenance will account for almost all PSTN NMS spending, which will decline at a –9% CAGR.
The NMS market is dominated by the large NEMs Alcatel-Lucent, Ericsson and Nokia Siemens Networks (NSN), which had a combined share of 65% of the market in 2008. Huawei continues to grow rapidly, and is now a solid fourth-place player. Motorola and Nortel Networks both managed to remain in the top six. Ericsson leads in mobile NMS, Alcatel-Lucent leads in residential broadband NMS and Cisco Systems leads in business services.
This 83-page report provides a detailed five-year forecast for NMS by service (mobile, residential broadband, business services and PSTN) and region (North America; the Caribbean and Latin America; Europe, the Middle East and Africa; and the rest of the world). It also provides forecasts for telecoms software professional services: business consulting, telecoms software consulting, systems integration, outsourced operations and managed or hosted services. The report includes market shares for the leading suppliers overall and in each of the service areas. It also provides definitions and deployment scenarios for NMSs within a CSP environment, and includes analysis of the market drivers and inhibitors for growth in all segments.
This report is an extract from http://www.analysysmason.com/Research/Content/Reports/Network-equipment-manufacturers-strategies-market-review-/
The NMS market is dominated by the large NEMs Alcatel-Lucent, Ericsson and Nokia Siemens Networks (NSN), which had a combined share of 65% of the market in 2008. Huawei continues to grow rapidly, and is now a solid fourth-place player. Motorola and Nortel Networks both managed to remain in the top six. Ericsson leads in mobile NMS, Alcatel-Lucent leads in residential broadband NMS and Cisco Systems leads in business services.
This 83-page report provides a detailed five-year forecast for NMS by service (mobile, residential broadband, business services and PSTN) and region (North America; the Caribbean and Latin America; Europe, the Middle East and Africa; and the rest of the world). It also provides forecasts for telecoms software professional services: business consulting, telecoms software consulting, systems integration, outsourced operations and managed or hosted services. The report includes market shares for the leading suppliers overall and in each of the service areas. It also provides definitions and deployment scenarios for NMSs within a CSP environment, and includes analysis of the market drivers and inhibitors for growth in all segments.
This report is an extract from http://www.analysysmason.com/Research/Content/Reports/Network-equipment-manufacturers-strategies-market-review-/
Monday, June 28, 2010
Mobile Packects GPRS, MMS, GSM
GPRS (General Packet Radio Service) offers high speed data services in GSM network. It uses Packet Mode Technique to transfer data and provides connectivity to Internet. Users will be able to browse Internet using handsets supporting Internet browsing. They will also be able use their e-mail accounts as is being done through landline Internet access. Also browsing of Internet from Laptops and Desktop computers is possible by connecting the computer with the GPRS enabled mobile handset through a data cable or Infrared connectivity.
Using GPRS you can download in your mobile the following:
• Polyphonic ring tones
• MP3 tones
• Color logos
• Wallpapers
• Videos
• Animations
• Games
• E-mails and more...
Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages). Presently MMS can be exchanged among CellOne numbers in Eastern Zone only. MMS is combination of
• Text
• Picture
• Video
• Speech
• Animation
• Music
WAP (Wireless Application Protocol)
It provides a standardized way of linking the Internet to mobile phones. WAP is an application communication protocol. WAP is used to access services and information. It is inherited from Internet standards. It is used for handheld devices such as mobile phones and PDAs. It is a protocol designed for micro browsers. It enables the creating of web applications for mobile devices
WAP uses the mark-up language called WML instead of regular HTML.
The WAP facility is available over CSD & GPRS for the CellOne customers.
MMS ( Multimedia Messaging Service )
Mobile Messaging is evolving beyond SMS text messaging with the introduction of MMS (Multimedia Messaging Service). MMS delivers a total communication experience, allowing personalized multimedia content such as images, audio, text, video and combinations of these.
Multimedia Messaging Service (MMS) is a store and forward messaging service that allows mobile subscribers to exchange multimedia messages with other mobile subscribers. As such it can be seen as an evolution of SMS, with MMS supporting the transmission of additional media types:
MMS is an important emerging service, which allows the sending of multiple media in a single message, and the ability to send a message to multiple recipients.
The originator can easily create a Multimedia Message, either using a built-in or accessory camera, or can use images and sounds stored previously in the phone (and possibly downloaded from a web site).
Even if the recipient phone is not switched on, the Multimedia Message will be stored and sent to the recipient as soon as they switch on their phone. If the recipient has not subscribed to the MMS service, still he/she can view the MMS through internet based on the SMS notification he/she gets.
A number of Multimedia Messages can be stored in the users handset and reviewed or forwarded at a later date.
source: http://www.punjab.bsnl.co.in/about_gprs.html
Using GPRS you can download in your mobile the following:
• Polyphonic ring tones
• MP3 tones
• Color logos
• Wallpapers
• Videos
• Animations
• Games
• E-mails and more...
Moreover, GPRS enables the users to send and receive MMS (Multimedia Messages). Presently MMS can be exchanged among CellOne numbers in Eastern Zone only. MMS is combination of
• Text
• Picture
• Video
• Speech
• Animation
• Music
WAP (Wireless Application Protocol)
It provides a standardized way of linking the Internet to mobile phones. WAP is an application communication protocol. WAP is used to access services and information. It is inherited from Internet standards. It is used for handheld devices such as mobile phones and PDAs. It is a protocol designed for micro browsers. It enables the creating of web applications for mobile devices
WAP uses the mark-up language called WML instead of regular HTML.
The WAP facility is available over CSD & GPRS for the CellOne customers.
MMS ( Multimedia Messaging Service )
Mobile Messaging is evolving beyond SMS text messaging with the introduction of MMS (Multimedia Messaging Service). MMS delivers a total communication experience, allowing personalized multimedia content such as images, audio, text, video and combinations of these.
Multimedia Messaging Service (MMS) is a store and forward messaging service that allows mobile subscribers to exchange multimedia messages with other mobile subscribers. As such it can be seen as an evolution of SMS, with MMS supporting the transmission of additional media types:
MMS is an important emerging service, which allows the sending of multiple media in a single message, and the ability to send a message to multiple recipients.
The originator can easily create a Multimedia Message, either using a built-in or accessory camera, or can use images and sounds stored previously in the phone (and possibly downloaded from a web site).
Even if the recipient phone is not switched on, the Multimedia Message will be stored and sent to the recipient as soon as they switch on their phone. If the recipient has not subscribed to the MMS service, still he/she can view the MMS through internet based on the SMS notification he/she gets.
A number of Multimedia Messages can be stored in the users handset and reviewed or forwarded at a later date.
source: http://www.punjab.bsnl.co.in/about_gprs.html
Who is the webhosting reseller giant??
I have asked my self this question several times considering many criteria for measuring which company offers the best reseller web-hosting options in terms of cost, support and sever availability.
Someone refereed me to a site I which to share because this site has good criteria for measuring different hosting companies that offers different types of reseller packages.
http://www.hosting-review.com/hosting-directory/top-10-lists/Top-10-Reseller-Hosting-Companies.shtml
I am compiling a list based on my observations and personal contacts and research on other companies.
I will post my report here soon.. so do check back for more info on the best reseller hosting provider.
Someone refereed me to a site I which to share because this site has good criteria for measuring different hosting companies that offers different types of reseller packages.
http://www.hosting-review.com/hosting-directory/top-10-lists/Top-10-Reseller-Hosting-Companies.shtml
I am compiling a list based on my observations and personal contacts and research on other companies.
I will post my report here soon.. so do check back for more info on the best reseller hosting provider.
Monday, June 21, 2010
Internet connetion and Mobile dongles
Getting online and being able to connect with friends, family, news, and the office is more important now than ever, but what happens if you're one of the millions of Americans without access to traditional broadband like cable or DSL, stuck in a hotel without WiFi, or cruising at 65mph down the highway in your Winebago?
The answer is mobile broadband! EVDO, or Evolution Data Only/Evolution Data Optimized, is a 3G mobile broadband technology used by Verizon, Sprint, and Alltel that provides typical speeds of 600-1400kbps download (with bursts up to 2000kbps) and 500-800kbps upload completely wirelessly. You take the internet with you and surf the web in your car, on the train, in the airport, at a convention, on the road in your RV... you can even share the connection with multiple computers using a 3G router, just like you would with your broadband connection at home!
Looking for information on HSPA, the 3G mobile broadband technology used by AT&T? Click here!
What is EVDO? Just the Basics:
•EV-DO - Evolution Data Optimized
•Personal broadband wireless service for a wide range of customers, from business people to students
•Always on - - similar to DSL (wherever 3G capability is available)
•Rides on CDMA signal- 1x data capability available everywhere CDMA voice service available
•Up to 10 times the peak data rate of the next best public wireless solution - 800 - 1,000 Kbps (kilobits per second) average download speeds, comparable to DSL speeds
•Allows the user to be connected herever they are are not only for email, but for downloads, large files, photos, spreadsheets, etc.
•Advantages over WiFi:
◦Always on with seamless roaming!
◦Signal can travel on same cell sites as cell phones
◦No 300-ft range from the cell tower or "hotspot"
◦Customers can access their corporate VPN (virtual private network) anywhere they can get a cellular signal via a secure, encrypted signal
◦Can download and run video clips in real time
◦Can provide service to customers outside of cable-modem or DSL areas
•Relatively low cost with high capacity - allows rich web browsing and application usage
•1xRTT: 50Kbps - 100Kbps Upload and Download (bursts to 144Kbps)
•EVDO Rev 0: 400kbps-1000kbps Download (bursts up to 2.0Mbps), 50kbps-100kbps Upload (bursts to 144Kbps)
•EVDO Rev A: 600Kbps-1,400Kbps Download (bursts to 3.1Mbps), 500Kbps-800Kbps Upload (bursts to 1.8Mbps)
How does it work?
EVDO works similarly to the way your cell phone operates in that it relies on signal from a wireless tower rather than a physical connection like a phone line or cable. An EVDO modem (often referred to as an "aircard") receives the signal and allows you to connect to the internet - it's as simple as that! EVDO modems come in several formats: USB dongle, ExpressCard, and PCMCIA card and you can use them either directly in your computer OR in a 3G router.
Of course, like your cell phone, the modem alone doesn't provide internet access - you must subscribe to the service from an EVDO provider. Verizon and Sprint both offer EVDO service for $59.99/mo with a 5GB per month allowance, and both charge overage fees for usage exceeding 5GB. For most people, 5GB is plenty of data for surfing the web, emailing, and the occassional YouTube video. For more information on what you can do with 5GB, read this article .
Who uses EVDO?
There are countless reasons to use EVDO and we have helped customers get set up for a huge variety of applications! Below are just a few common ways people use EVDO:
•Mobile applications: Cars, trucks, RV's, commercial service/fleet vehicles, shuttles, carpool/vanpool, transit (busses, trains, ferries), taxis/limos, private/commercial vessels
•Portable uses: Mobile work teams, trade shows, conferences, conventions, vacations, commute access, emergency response setup
•Fixed-location customers: Backup to cable/DSL/T-1, dial-up alternative, satellite alternative
Who offers EVDO?
Verizon Wireless and Sprint are currently the leading providers for EVDO coverage. There are multiple EVDO cards in PCMCIA, Expresscard, USB and 'portable hotspot' formats available. Check out http://www.EVDOinfo.com/devices for the current offerings.
ALL of the currently available modems from both Verizon and Sprint are Rev-A capable and most feature external antenna ports where you can add an antenna or amplifier. Most of them are compatible with at least one 3G router. We have performed extensive tests on all of the modems and can confirm that there is NEGLIGIBLE difference in performance between the available form factors; the various form factors simply provide options for different preferences. You can read more about why there is no performance difference between form factors here.
In the early days of EVDO, Mac users were often "left out in the cold" as companies failed to provide support for their computers. Here at EVDOinfo and our sister site, 3Gstore.com, we have been providing tips and support for using EVDO with Mac computers since the beginning - even when Sprint and Verizon said it wouldn't work! Now, most new devices are Mac-compatible right out of the box, but support for Mac users is still weak. We are proud to offer comprehensive support to our Mac-loving customers! For more information on EVDO and Macs, read this article.
Is there EVDO service at my home/office/destination?
Both Verizon and Sprint offer EVDO in many areas of the USA, Puerto Rico, Canada, and Mexico (note: using EVDO in Canada and Mexico requires specific devices and plans). To check coverage at your location, you can enter your zip code on 3Gstore's coverage tool and compare Sprint's and Verizon's coverage.
If EVDO is NOT available in a particular location, 1xRTT (aka "National Access"), may be available. National Access is the 2G mobile broadband technology used by Sprint and Verizon that can provide average upload and download speeds of about 50Kbps - 100Kbps with bursts up to 144kbps, slightly faster than a standard 56K dial-up connection. In areas where EVDO is not available, your EVDO-enabled device (including aircards, USB modems, ExpressCards, phones, or embedded devices) will attempt to connect to the 1xRTT network. Generally, if your carrier has cell phone coverage in a particular area, there should be 1xRTT coverage even if EVDO has not yet arrived there.
Another excellent resource is EVDOmaps.com, a free service hosted by the EVDOinfo experts that compiles actual test results from EVDO users around the country. This is NOT a coverage map but a place where users can post actual speed test results and descriptions of their gear, so that others can see what service was like at that moment in time, from that user's location.
How fast is EVDO?
EVDO Rev A has a peak data rate of 3,000 kbps, but realistic speeds average around 600Kbps-1,400Kbps Download with bursts to 2.0Mbps and 500Kbps-800Kbps Upload with bursts to 1.8Mbps.
Here is a real-world speedtest done using a USB760 on Verizon's network in Dallas, Tx with a very strong signal:
The answer is mobile broadband! EVDO, or Evolution Data Only/Evolution Data Optimized, is a 3G mobile broadband technology used by Verizon, Sprint, and Alltel that provides typical speeds of 600-1400kbps download (with bursts up to 2000kbps) and 500-800kbps upload completely wirelessly. You take the internet with you and surf the web in your car, on the train, in the airport, at a convention, on the road in your RV... you can even share the connection with multiple computers using a 3G router, just like you would with your broadband connection at home!
Looking for information on HSPA, the 3G mobile broadband technology used by AT&T? Click here!
What is EVDO? Just the Basics:
•EV-DO - Evolution Data Optimized
•Personal broadband wireless service for a wide range of customers, from business people to students
•Always on - - similar to DSL (wherever 3G capability is available)
•Rides on CDMA signal- 1x data capability available everywhere CDMA voice service available
•Up to 10 times the peak data rate of the next best public wireless solution - 800 - 1,000 Kbps (kilobits per second) average download speeds, comparable to DSL speeds
•Allows the user to be connected herever they are are not only for email, but for downloads, large files, photos, spreadsheets, etc.
•Advantages over WiFi:
◦Always on with seamless roaming!
◦Signal can travel on same cell sites as cell phones
◦No 300-ft range from the cell tower or "hotspot"
◦Customers can access their corporate VPN (virtual private network) anywhere they can get a cellular signal via a secure, encrypted signal
◦Can download and run video clips in real time
◦Can provide service to customers outside of cable-modem or DSL areas
•Relatively low cost with high capacity - allows rich web browsing and application usage
•1xRTT: 50Kbps - 100Kbps Upload and Download (bursts to 144Kbps)
•EVDO Rev 0: 400kbps-1000kbps Download (bursts up to 2.0Mbps), 50kbps-100kbps Upload (bursts to 144Kbps)
•EVDO Rev A: 600Kbps-1,400Kbps Download (bursts to 3.1Mbps), 500Kbps-800Kbps Upload (bursts to 1.8Mbps)
How does it work?
EVDO works similarly to the way your cell phone operates in that it relies on signal from a wireless tower rather than a physical connection like a phone line or cable. An EVDO modem (often referred to as an "aircard") receives the signal and allows you to connect to the internet - it's as simple as that! EVDO modems come in several formats: USB dongle, ExpressCard, and PCMCIA card and you can use them either directly in your computer OR in a 3G router.
Of course, like your cell phone, the modem alone doesn't provide internet access - you must subscribe to the service from an EVDO provider. Verizon and Sprint both offer EVDO service for $59.99/mo with a 5GB per month allowance, and both charge overage fees for usage exceeding 5GB. For most people, 5GB is plenty of data for surfing the web, emailing, and the occassional YouTube video. For more information on what you can do with 5GB, read this article .
Who uses EVDO?
There are countless reasons to use EVDO and we have helped customers get set up for a huge variety of applications! Below are just a few common ways people use EVDO:
•Mobile applications: Cars, trucks, RV's, commercial service/fleet vehicles, shuttles, carpool/vanpool, transit (busses, trains, ferries), taxis/limos, private/commercial vessels
•Portable uses: Mobile work teams, trade shows, conferences, conventions, vacations, commute access, emergency response setup
•Fixed-location customers: Backup to cable/DSL/T-1, dial-up alternative, satellite alternative
Who offers EVDO?
Verizon Wireless and Sprint are currently the leading providers for EVDO coverage. There are multiple EVDO cards in PCMCIA, Expresscard, USB and 'portable hotspot' formats available. Check out http://www.EVDOinfo.com/devices for the current offerings.
ALL of the currently available modems from both Verizon and Sprint are Rev-A capable and most feature external antenna ports where you can add an antenna or amplifier. Most of them are compatible with at least one 3G router. We have performed extensive tests on all of the modems and can confirm that there is NEGLIGIBLE difference in performance between the available form factors; the various form factors simply provide options for different preferences. You can read more about why there is no performance difference between form factors here.
In the early days of EVDO, Mac users were often "left out in the cold" as companies failed to provide support for their computers. Here at EVDOinfo and our sister site, 3Gstore.com, we have been providing tips and support for using EVDO with Mac computers since the beginning - even when Sprint and Verizon said it wouldn't work! Now, most new devices are Mac-compatible right out of the box, but support for Mac users is still weak. We are proud to offer comprehensive support to our Mac-loving customers! For more information on EVDO and Macs, read this article.
Is there EVDO service at my home/office/destination?
Both Verizon and Sprint offer EVDO in many areas of the USA, Puerto Rico, Canada, and Mexico (note: using EVDO in Canada and Mexico requires specific devices and plans). To check coverage at your location, you can enter your zip code on 3Gstore's coverage tool and compare Sprint's and Verizon's coverage.
If EVDO is NOT available in a particular location, 1xRTT (aka "National Access"), may be available. National Access is the 2G mobile broadband technology used by Sprint and Verizon that can provide average upload and download speeds of about 50Kbps - 100Kbps with bursts up to 144kbps, slightly faster than a standard 56K dial-up connection. In areas where EVDO is not available, your EVDO-enabled device (including aircards, USB modems, ExpressCards, phones, or embedded devices) will attempt to connect to the 1xRTT network. Generally, if your carrier has cell phone coverage in a particular area, there should be 1xRTT coverage even if EVDO has not yet arrived there.
Another excellent resource is EVDOmaps.com, a free service hosted by the EVDOinfo experts that compiles actual test results from EVDO users around the country. This is NOT a coverage map but a place where users can post actual speed test results and descriptions of their gear, so that others can see what service was like at that moment in time, from that user's location.
How fast is EVDO?
EVDO Rev A has a peak data rate of 3,000 kbps, but realistic speeds average around 600Kbps-1,400Kbps Download with bursts to 2.0Mbps and 500Kbps-800Kbps Upload with bursts to 1.8Mbps.
Here is a real-world speedtest done using a USB760 on Verizon's network in Dallas, Tx with a very strong signal:
Saturday, June 19, 2010
4 steps to set up your home wireless network
You can use a wireless network to surf the web while you're sitting on your couch or in your yard. Plus, it's easier to install than you think.
Note: The following instructions apply to all editions of Windows 7. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Although the service pack is not required for wireless networking, it does make things much easier and helps protect you against hackers, worms, and other Internet intruders.
Looking to share files, printers, and more? Learn how to set up a home network.
1. Choose your wireless equipment
The first step is to make sure that you have the equipment you need. As you're looking for products in stores or on the Internet, you might notice that you can choose equipment that supports three different wireless networking technologies: 802.11a, 802.11b, and 802.11g. We recommend 802.11g, because it offers excellent performance and is compatible with almost everything.
Shopping list
•Broadband Internet connection
•Wireless router
•A computer with built-in wireless networking support or a wireless network adapter
A wireless router
The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Be sure to get a wireless router, and not a wireless access point.
A wireless network adapter
Network adapters wirelessly connect your computer to your wireless router. If you have a newer computer you may already have wireless capabilities built in. If this is the case, then you will not need a wireless network adapter. If you need to purchase an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.
Note: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from D-Link, Netgear, Linksys, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port to plug the wireless network adapter into. If you don't have any open USB ports, buy a hub to add additional ports.
--------------------------------------------------------------------------------
2. Connect your wireless router
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Please click here to read the full article
Note: The following instructions apply to all editions of Windows 7. For Windows Vista users, we recommend installing Windows Vista Service Pack 2 before setting up your wireless network. For Windows XP users, we recommend installing Windows XP Service Pack 3. Although the service pack is not required for wireless networking, it does make things much easier and helps protect you against hackers, worms, and other Internet intruders.
Looking to share files, printers, and more? Learn how to set up a home network.
1. Choose your wireless equipment
The first step is to make sure that you have the equipment you need. As you're looking for products in stores or on the Internet, you might notice that you can choose equipment that supports three different wireless networking technologies: 802.11a, 802.11b, and 802.11g. We recommend 802.11g, because it offers excellent performance and is compatible with almost everything.
Shopping list
•Broadband Internet connection
•Wireless router
•A computer with built-in wireless networking support or a wireless network adapter
A wireless router
The router converts the signals coming across your Internet connection into a wireless broadcast, sort of like a cordless phone base station. Be sure to get a wireless router, and not a wireless access point.
A wireless network adapter
Network adapters wirelessly connect your computer to your wireless router. If you have a newer computer you may already have wireless capabilities built in. If this is the case, then you will not need a wireless network adapter. If you need to purchase an adapter for a desktop computer, buy a USB wireless network adapter. If you have a laptop, buy a PC card-based network adapter. Make sure that you have one adapter for every computer on your network.
Note: To make setup easy, choose a network adapter made by the same vendor that made your wireless router. For example, if you find a good price on a Linksys router, choose a Linksys network adapter to go with it. To make shopping even easier, buy a bundle, such as those available from D-Link, Netgear, Linksys, Microsoft, and Buffalo. If you have a desktop computer, make sure that you have an available USB port to plug the wireless network adapter into. If you don't have any open USB ports, buy a hub to add additional ports.
--------------------------------------------------------------------------------
2. Connect your wireless router
Since you'll be temporarily disconnected from the Internet, print these instructions before you go any further.
First, locate your cable modem or DSL modem and unplug it to turn it off.
Next, connect your wireless router to your modem. Your modem should stay connected directly to the Internet. Later, after you've hooked everything up, your computer will wirelessly connect to your router, and the router will send communications through your modem to the Internet.
Please click here to read the full article
How to secure a wireless Network for secured communication
----------------------------------------------
This is an extract from PC World
==============================================
Almost all of us have jumped onto someone else's unsecured Wi-Fi network. There's little harm in that if you're just an honest soul looking for an Internet connection.
But if you're the owner of an unsecured network, you should be aware that the world's not made up entirely of honest souls--and it's not hard for the dishonest ones to see exactly what you're doing on your network. Sound scary? Here's how to fix the problem.
Q. What are WEP and WPA encryption, and which should I use?
A. The first line of defense for your Wi-Fi network is encryption, which encodes the data transmitted between your PC and your wireless router. Unfortunately, most routers ship with encryption turned off, and many users don't turn it on, leaving themselves completely exposed. If you haven't already, enable your router's encryption, and use the strongest form supported by your network. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).
Go with WPA or WPA2 if at all possible, since WEP is relatively easy to crack. (You have to use the same form on all devices on your network; you can't mix WEP and WPA.) The keys used by WPA and WPA2 change dynamically, which make them nearly impossible to hack. Use a strong password for your encryption key, such as a combination of letters and numbers of 14 characters or more.
If you have an older router that supports WEP only, you'll be safest if you use 128-bit WEP keys--but also check the manufacturer's Web site for a firmware update that will add WPA support. If it doesn't look like an update is likely, consider replacing old adapters and routers with newer models that support WPA. Look for a router that supports the hybrid WPA + WPA2 mode, which lets you use the stronger WPA2 encryption with adapters that support it, while still maintaining compatibility with WPA adapters.
Make sure you change the default network name and password on your router. Doing so will make it much more difficult for hackers to break into your router and commandeer its settings.
Q. If my router has a firewall, why do I need these added security measures?
A. The firewall built into your router prevents hackers on the Internet from getting access to your PC. But it does nothing to stop people in range of your Wi-Fi signal from getting onto your network--and with the latest high-performance equipment, your Wi-Fi signal could reach clear down the block. Without encryption and other protective measures, anyone can use readily available tools to see all your Wi-Fi traffic.
For extra protection, you should run software firewalls on the individual PCs on your network. Some good options are Zone Labs' ZoneAlarm, available as a free download or in the ZoneAlarm Internet Security Suite 2006, and Agnitum's Outpost Firewall Free.
Q. How can I secure my notebook at public Wi-Fi hotspots?
A. Since public hotspots generally don't use encryption, you should assume that anyone can see your Internet traffic unless you take precautions.
•Make sure it's a legitimate hotspot: Nefarious types have been known to set up pirate routers with familiar SSID names like "wayport" or "t-mobile," and then use them to capture unsuspecting users' log-on information and other private data.
•Verify that your PC's software firewall is turned on, and that Windows' file-sharing feature is off; it's off by default in Windows XP with Service Pack 2. To check this setting, open Control Panel and choose Windows Firewall (you may have to click Security Center first in XP or Security in Vista). In XP, select the Exceptions tab, and look in the Programs and Services to make sure "File and Printer Sharing" is unchecked. In Vista, click Change settings, then select the Exceptions tab and follow the instructions for XP.
•Never send bank passwords, credit card numbers, confidential e-mail, or other sensitive data unless you're sure you're on a secure site: Look for the lock icon in the bottom-right corner of your browser, as well as a URL in the address bar that begins with https. Such sites build in their own encryption.
•Always turn your Wi-Fi radio off when you're not at a hotspot: Hackers can use it to create peer-to-peer Wi-Fi connections with your computer and access it directly.
•For better security, consider signing up for a paid subscription to a hotspot network such as Boingo or T-Mobile. Both companies provide connection software that encrypts your sessions automatically.
Q. What's a VPN, and how do I get one?
A. The best way to protect a public wireless link is by using a virtual private network, or VPN. VPNs keep your communications safe by creating secure "tunnels" through which your encrypted data travels. Many companies provide VPN service to their mobile and offsite workers, so check with your IT department for connection instructions.
You can also use a paid service such as Boingo's Personal VPN (free trial with Boingo subscription, $30 to keep), JiWire Hotspot Helper (10-day free trial, $25 per year) or Witopia personalVPN ($40 per year). All three of the services are simple to install and use.
You have one more security option: If you don't mind connecting through your home or office PC, you can log in to a public hotspot securely by using such remote-access programs as LogMeIn or GoToMyPC.
This is an extract from PC World
==============================================
Almost all of us have jumped onto someone else's unsecured Wi-Fi network. There's little harm in that if you're just an honest soul looking for an Internet connection.
But if you're the owner of an unsecured network, you should be aware that the world's not made up entirely of honest souls--and it's not hard for the dishonest ones to see exactly what you're doing on your network. Sound scary? Here's how to fix the problem.
Q. What are WEP and WPA encryption, and which should I use?
A. The first line of defense for your Wi-Fi network is encryption, which encodes the data transmitted between your PC and your wireless router. Unfortunately, most routers ship with encryption turned off, and many users don't turn it on, leaving themselves completely exposed. If you haven't already, enable your router's encryption, and use the strongest form supported by your network. The Wireless Protected Access (WPA) protocol and more recent WPA2 have supplanted the older and less-secure Wireless Encryption Protocol (WEP).
Go with WPA or WPA2 if at all possible, since WEP is relatively easy to crack. (You have to use the same form on all devices on your network; you can't mix WEP and WPA.) The keys used by WPA and WPA2 change dynamically, which make them nearly impossible to hack. Use a strong password for your encryption key, such as a combination of letters and numbers of 14 characters or more.
If you have an older router that supports WEP only, you'll be safest if you use 128-bit WEP keys--but also check the manufacturer's Web site for a firmware update that will add WPA support. If it doesn't look like an update is likely, consider replacing old adapters and routers with newer models that support WPA. Look for a router that supports the hybrid WPA + WPA2 mode, which lets you use the stronger WPA2 encryption with adapters that support it, while still maintaining compatibility with WPA adapters.
Make sure you change the default network name and password on your router. Doing so will make it much more difficult for hackers to break into your router and commandeer its settings.
Q. If my router has a firewall, why do I need these added security measures?
A. The firewall built into your router prevents hackers on the Internet from getting access to your PC. But it does nothing to stop people in range of your Wi-Fi signal from getting onto your network--and with the latest high-performance equipment, your Wi-Fi signal could reach clear down the block. Without encryption and other protective measures, anyone can use readily available tools to see all your Wi-Fi traffic.
For extra protection, you should run software firewalls on the individual PCs on your network. Some good options are Zone Labs' ZoneAlarm, available as a free download or in the ZoneAlarm Internet Security Suite 2006, and Agnitum's Outpost Firewall Free.
Q. How can I secure my notebook at public Wi-Fi hotspots?
A. Since public hotspots generally don't use encryption, you should assume that anyone can see your Internet traffic unless you take precautions.
•Make sure it's a legitimate hotspot: Nefarious types have been known to set up pirate routers with familiar SSID names like "wayport" or "t-mobile," and then use them to capture unsuspecting users' log-on information and other private data.
•Verify that your PC's software firewall is turned on, and that Windows' file-sharing feature is off; it's off by default in Windows XP with Service Pack 2. To check this setting, open Control Panel and choose Windows Firewall (you may have to click Security Center first in XP or Security in Vista). In XP, select the Exceptions tab, and look in the Programs and Services to make sure "File and Printer Sharing" is unchecked. In Vista, click Change settings, then select the Exceptions tab and follow the instructions for XP.
•Never send bank passwords, credit card numbers, confidential e-mail, or other sensitive data unless you're sure you're on a secure site: Look for the lock icon in the bottom-right corner of your browser, as well as a URL in the address bar that begins with https. Such sites build in their own encryption.
•Always turn your Wi-Fi radio off when you're not at a hotspot: Hackers can use it to create peer-to-peer Wi-Fi connections with your computer and access it directly.
•For better security, consider signing up for a paid subscription to a hotspot network such as Boingo or T-Mobile. Both companies provide connection software that encrypts your sessions automatically.
Q. What's a VPN, and how do I get one?
A. The best way to protect a public wireless link is by using a virtual private network, or VPN. VPNs keep your communications safe by creating secure "tunnels" through which your encrypted data travels. Many companies provide VPN service to their mobile and offsite workers, so check with your IT department for connection instructions.
You can also use a paid service such as Boingo's Personal VPN (free trial with Boingo subscription, $30 to keep), JiWire Hotspot Helper (10-day free trial, $25 per year) or Witopia personalVPN ($40 per year). All three of the services are simple to install and use.
You have one more security option: If you don't mind connecting through your home or office PC, you can log in to a public hotspot securely by using such remote-access programs as LogMeIn or GoToMyPC.
Subscribe to:
Comments (Atom)