Installing Wireless and SOHO Networks

Similar documents
A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Security SSID Selection: Broadcast SSID:

Networking. Prof. Abdul Hameed

Networking Jamie Tees

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 9 Networking Practices

It is the process of sharing data, programs, and information between two or more computers.

Digital Entertainment. Networking Made Easy

802.11N Wireless Broadband Router

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

Wireless (Select Models Only) User Guide

Discovering Computers Chapter 9 Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Chapter 5 Local Area Networks. Computer Concepts 2013

UIP1869V User Interface Guide

Computer to Network Connection

WNRT-627. Data Sheet. Europe/ ETSI: 2.412~2.472GHz (13 Channels) Japan/ TELEC: 2.412~2.484GHz (14 Channels) RF Power.

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

ITP 140 Mobile Applications Technologies. Networks

4G/LTE VoIP Wireless Router Z-LTE9322

Wireless Router at Home

AplombTech Smart Router Manual

802.11N Wireless ADSL Router

A5500 Configuration Guide

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Internet Architecture

Wireless-G Router User s Guide

DHP-W313AV. PowerLine AV500 Wireless AC600 Starter Kit. Product Release

A Guide to Routers. Connectivity Type. ADSL (Telephone Type)

Section 3 - Configuration. Enable Auto Channel Scan:

ITP 140 Mobile Applications Technologies. Networks

COPYRIGHTED MATERIAL. Index

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Chapter 1: introduction

LevelOne WBR User s Manual. 11g Wireless ADSL VPN Router. Ver

Change NETGEAR USB Control Center Settings

A Division of Cisco Systems, Inc. GHz g. Wireless-G. User Guide. Access Point WIRELESS. WAP54G v2. Model No.

User Manual. AC ac Wireless Access Point/Router. Model WAC124. NETGEAR, Inc.

Wireless (Select Models Only) User Guide

The Internet and the World Wide Web

JNR1010v2 N150 Wireless Router User Manual

AC1600 Wireless Dual Band Gigabit VoIP VDSL/ADSL Modem Router

CSC Introduction to Computers and Their Applications. Background

AC750 WiFi Range Extender Model EX6100 User Manual

The Applications and Gaming Tab - Port Range Forward

Access Connections 5.1 for Windows Vista: User Guide

WIRELESS ROUTER N150. User Manual. F9K1009v1 8820zb01125 Rev.B00

Chapter 6 The Internet

Chapter 1: Introduction

ADSL User Manual. Wireless-N BROADBAND ROUTER : Introduction

User Manual. Rev:

CSC Introduction to Computers and Their Applications

WRT300N-DD User Manual

AC1200. Dual-band OpenWRT WiFi Router KW6515. Highlights. High Speed 300Mbps on 2.4GHz + 900Mbps on 5GHz totals 1200Mbps Wi-Fi

Wireless (Select Models Only) User Guide

LKR Port Broadband Router. User's Manual. Revision C

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Communications and Networks

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

1. Press "Speed Test" to find out your actual uplink and downlink speed.

DVA-G3340S High-Speed 2.4 GHz Wireless ADSL VOIP Router. Manual

LevelOne User Manual WBR g Wireless ADSL2+ Router

SAGEMCOM 5355 GATEWAY

5 Tips to Fortify your Wireless Network

11g Wireless Broadband Router

802.11b/g/n SOHO Router 2.4GHz 300Mbps 11N AP/Router

User Manual DIR-850L. Wireless AC1200 Dual Band Gigabit Router.

MARQUE: GARMIN REFERENCE: EX FRS CODIC: NOTICE

NZQA unit standard version 2 Page 1 of 6. Demonstrate basic knowledge of telecommunications concepts

300M Wireless-N Broadband Router User Manual

CSIS Frequency Division Multiplexing. Basic Types of Multiplexing. Frequency Division Multiplexing. Frequency Division Multiplexing.

802.11ac Wireless Access Point Model WAC104

Module 11. OSI Model, Network Devices, and Network Standards

BR-6428HPn User Manual

Configuring the network clients

Chapter 9 Introduction to Networks

Wireless Printing Updated 10/30/2008 POLICY. The use of Wireless Networking is not permitted at any site for full client/server networking of Taxwise.

CONTENTS IN DETAIL INTRODUCTION

User Manual. TOTOLINK Wireless-N Router

Designing AirPort Extreme n Networks

TABLE OF CONTENT 1. ABOUT THIS GUIDE Overview of the User s Guide INTRODUCTION Overview Features...

CONTENTS. L600N - Dual Band Wireless Router

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

Wireless Attacks and Countermeasures

The Administration Tab - Diagnostics

AC1200M/MS. User Manual

Chapter 4 Advanced Settings and Features

Taking the Mystery out of Wi-Fi Larry Cooper

AP699GEC2.FW97-5 Router. User Manual

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

DC-228. ADSL2+ Modem/Router. User Manual. -Annex A- Version: 1.0

D-Link AirPlus G DI-524

Connecting to the NBN network

ESR300H / ESR150H V N X-TRA RANGE Wireless Router. [ pg. 1]

Copyright and Trademarks. How to Use This User Guide

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Wireless 450N Dual-Band Gigabit Router 450 Mbps Wireless a/b/g/n, GHz, 3T3R MIMO, QoS, 4-Port Gigabit LAN Switch Part No.

300Mbps Wi-Fi Router. Expand Wi-Fi Coverage. TL-WR820N 300Mbps Easy Setup IPTV IPv6

Ayrstone AyrMesh Router Setup

Computer Networking Introduction

Transcription:

Installing Wireless and SOHO Networks Wifi networking standards and encryption types Standards 802.11 a/b/g/n/ac Speeds, distances and frequencies Encryption types WEP, WPA, WPA2, TKIP, AES Wireless/wired settings in a router Channels Port forwarding, Port triggering DHCP (on,off) DMZ NAT / DNAT Basic QoS Firmware UPnP

Installing and Configuring a SOHO A typical SOHO wireless router is ready to provide open (unencrypted) connections for your network. However, an unsecure network is vulnerable to misuse and could even be taken over by unauthorized users. The SSID (service set identifier) identifies the wireless network By default, the SSID is preset at the factory, typically identifying the manufacturer and sometimes the router model as well. Change it to a name that does not identify your router, your location, or your family/company for better security. SSID Broadcast By disabling SSID broadcast, you make your wireless network harder to detect by casual snoopers. Wireless encryption Enable wireless encryption to protect your network from being used by unauthorized users. Select WPA2 (also known as WPA with AES encryption) for the best protection.

Firewall Enable the firewall feature in your router for additional protection against unauthorized traffic from outside the network. MAC address filtering By creating a list of authorized MAC addresses (each network device has a unique MAC address), you block casual snoopers from connecting to your network. Wireless channel Although 2.4 GHz wireless networks have 11 available channels, in actuality only 3 (1, 6, and 11) have minimal overlap. To help determine which channel is used least in your area use a program or wireless device to view existing wireless networks and their frequencies. 5GHz wireless networks have many more channels to choose from and their frequencies don t overlap.

DHCP This feature provides IP address, gateway, and DNS server information to wireless clients on the network. Leave it enabled if you have devices that join your network temporarily, such as tablets or smart phones. However, if you need to use port forwarding, port triggering, or DMZ, consider configuring devices that are always on the network with static IP addresses that are in the range of addresses supported by your router. Adjust your DHCP range to cover only those devices you know will regularly connect to your network both wired and wireless. Use a non default IP range. 192.168.0.x or 192.168.1.x are extremely common. Refer to the private IP addresses available to make it more difficult to guess one of you IP s If at all possible do not used DHCP

Port forwarding This feature sends specified types of traffic to a specified IP address. Use port forwarding if you host some type of server on your network. Example remote desktop connection to your home system Port triggering Enabling this feature allows a computer with a dynamic IP address to open a port or range of ports on demand. NAT Network Address Translation enables a single IP address assigned to the router to take care of multiple devices connected to the router and it helps protect computers whose addresses are translated by the router from being attacked by remote systems. DNAT Destination network address translation (DNAT) is a technique for transparently changing the destination IP address of an end route packet and performing the inverse function for any replies. Any router situated between two endpoints can perform this transformation of the packet. DNAT is commonly used to publish a service located in a private network on a publicly accessible IP address. This use of DNAT is also called port forwarding, or DMZ when used on an entire server, which becomes exposed to the WAN, becoming analogous to an undefended military demilitarized zone (DMZ).

DMZ Demilitarized zone is a feature that enables a router to permit traffic on all TCP and UDP ports to flow to and from a single computer. The computer using DMZ is as vulnerable as if it had a direct connection to the Internet. This feature is used sometimes for gaming, and a computer in the DMZ should have its own firewall. WPS Wi-Fi protected setup is an easy-to-use setup feature supported by some late-model routers and wireless adapters. Push a button on the router and the router is set up with encryption. WPS-compatible network adapters use special setup software with a virtual push button or a place to enter a PIN on the router to complete the configuration process.

Basic QoS Basic quality of service configures streaming real-time services such as Voice over IP (VoIP) or streaming media to have a higher priority than other types of traffic. When Basic QoS is enabled in the router, all devices on the network also need to have QoS enabled. Dynamic look up service Should you wish to use a SOHO system as a server of some sort.. For remote.. ftp.. Web etc you should look at registering for this type of service. ISPs will dynamically assign your IP address which making connection to your home or office system difficult specially with a DSL type of connection (frequent changes to IP) A dynamic lookup service will work with your router to update the current IP address and resolve it to a name of your choosing.

Firmware Software used to run the hardware of your router. Its purpose is to give access to features and options within your router. These options are mentioned in previous slides. There is the default firmware that is designed by the manufacturer of your router but there are also other open source options Dd Wrt Tomato Firmware Openwrt Freewrt Gargoyle UPnP UPnP (Universal Plug'n'Play) is a protocol that enables programs running on a host to automatically configure port forwarding on the NAT-Router. Devices may dynamically add themselves to a network without the need for user intervention or configuration.

Internet Connection Types Internet connection types Cable DSL Dial up Fiber Satellite ISDN Cellular Tethering Mobile Hotspot Line of sight wireless

Cable Cable Internet service is built upon the network used for digital cable provided by most cable TV vendors. Almost all cable modems are external devices that plug into a computer s 10/100/1000 Ethernet (RJ-45) or USB port Download speeds range from 10Mbps up depending on infrastructure Runs via a specification known as Data Over Cable Service Internet Specification (DOCSIS). Shared connection, similar to LAN. For this security becomes an issue as well the more people on the LAN the less bandwidth you will get

DSL Digital subscriber line is a popular alternative to cable Internet. It is provided by the telephone company and requires the use of a high-quality telephone line that can carry a digital signal Speeds can vary based on market, provider, and distance between a location that wants DSL service and the central office (CO) or central switch. The longer the distance, the slower the DSL service offerings available. One of the first methods of broadband Internet DSL uses existing phone line infrastructure DSL piggybacks a digital signal on the line used for analog communication There are distance limitations. You must be within 2 to 5 Km of the main switching station Many phone lines in older homes and neighborhoods may not be up to par. Connections to DSL are made through a DSL modem properly called a DSL endpoint. Keep in mind though that the digital signal from your computer is not converted to an analog signal

Dial-up Connection with POTS made with a modem installed in or connected to your computer. You also must connect your home phone line to the line port on your modem. Then you must configure software on your computer known as a dialer. A dialer is a special program that initiates the connection with the ISP Most versions of Windows have a built-in dialer known as dial-up networking. Other ISPs may have their own dialer program that they give you on disk or CD-ROM when you sign up for their service.

Fiber Fiber-to-the-home (FTTH) is one member of the Fiber-to-the-x (FTTx) family that includes Fiber-to-the-building or basement (FTTB), Fiber-to-thepremises (FTTP), Fiber-to-the-desk (FTTD), Fiber-to-the-curb (FTTC), and Fiber-to-the-node (FTTN). These methods all bring data closer to the end user on optical fibers. The differences between the methods have mostly to do with just how close to the end user the delivery on fiber comes. All of these delivery methods are similar to hybrid fiber-coaxial (HFC) systems used to provide cable Internet access. The use of optical fiber offers much higher data rates over relatively longer distances. Most high-capacity Internet and cable television backbones already use fiber optic technology, with data switched to other technologies (DSL, cable, POTS) for final delivery to customers.

Satellite Uses satellite dish to received data from a satellite and relay station that is connected to the Internet. Two types of satellite connection: unidirectional and bidirectional. Unidirectional used only to download information Request for information is made typically via dialup (POTS) Bidirectional uses satellite for both uploads and downloads. Problems occur additionally due to weather and satellite alignment. Dishes must have line of site to the satellite. If anything gets in the way signals can be lost.

ISDN A digital, point-to-point network capable of maximum transmission speeds of about 2Mbps, although speeds of 128Kbps are more common. ISDN uses the same UTP wiring as POTS, but it can transmit data at much higher speeds. ISDN has been mostly superseded by DSL Allows for digital connections to the POTS system

Cellular (Mobile Hotspot) Some smart phones can share their GSM (Global System for Mobile Communications) data connection with other devices via Wi-Fi. 3G provides a maximum download speed of 56Mbps, and 4G provides a maximum download speed of 100Mbps. Limitations are based on how much you want to spend for your data plan Mobile Hotspot. A small personal device that creates a small area of Wi-Fi coverage allowing nearby Wi-Fi devices to connect to the Internet. In other words, the device serves as a link between nearby Wi-Fi devices and a cellular data network. In the context of cell phones, tethering is connecting your phone to a laptop or similar data device using a data cable, usually for the purpose of connecting to the Internet on the laptop, via the phone's wireless connection to the cell phone network.

Line of sight wireless Outdoor Wireless Networks line of Sight (LOS) is important. When designing an outdoor Wireless network one of the first questions to ask is what is between point A (antenna 1) and point B (antenna 2). The path between two antennas is referred to as the Line of Sight.

Bluetooth A standard for the short-range wireless interconnection of cellular phones, computers, and other electronic devices. Bluetooth is a wireless technology standard for exchanging data over short distances (using short-wavelength UHF radio waves in the ISM band from 2.4 to 2.485 GHz) from fixed and mobile devices, and building personal area networks (PANs). The 10 meter figure for class 2 devices (of which the iphone is an example) is very much a guideline. The range of a Bluetooth device is limited by many real world factors. The 2.4 GHz radio frequency used by Bluetooth is strongly absorbed by water.

Infra Red connection IR wireless is the use of wireless technology in devices or systems that convey data through infrared (IR) radiation. Infrared is electromagnetic energy at a wavelength or wavelengths somewhat longer than those of red light. Infrared is a line-of-sight wireless technology that uses a beam of invisible light to transmit information. This means that the infrared ports of both devices must be nearby and aimed at each other for a connection to succeed. Infrared is the same technology used in most remote controls for home A/V gear such as TVs.

Networking Practical

Networking in Windows XP

Naming the PC XP Right click my computer, select properties Select the computer name tab Click change This area has not greatly changed since XP through to 7

Setting up your IP Open network connections Select the network interface you wish to adjust Right click the adapter and select properties to get into the TCP/IP area to modify.

With the properties open you are able to adjust TCP/IP file and print sharing as well as the network card. These areas in Vista and 7 have had some changes and additions

Adjust your network settings

Sharing Resources Pick what you want to share How do you want to share it To whom do you want to share it What level of security do you want to use Full control Modify Read

Sharing at the advanced level Sharing applet We need to determine Share name Visible or hidden share Number of users we want to be able to connect to the share point Permissions on the share point

Setting security.. Security on the folder Security on the file/s Inheritance rights from parent etc Can get extremely confusing First check your rights You will notice that you don t have as many rights as I have listed here why?

Connecting to a share point Now that we have something share how do we connect to it? Well firstly it depends on how the resource is shared out? Does everyone have full rights to see and use it brows your network nabourhood (note everyone must be on the same work group) If rights are limited then you must manually connect to it.

Note that the share we just created is now visible. Clicking this share point will give you access to it given you have sufficient rights

Note the network information that comes up.. Also listed is our share point Click on the + next to the sharing on XP-box

Listing your shares

Note we see shares, printers

Sharing is the folder we created

Mapping If you wish to map a network drive click tools, map network drive

Mapping (cont) Clicking browse will let you browse the network but should rights be limited you may not see all share points

Select the drive letter you wish to use Type in the computer name and share point name \\XP-Box\share Determine if you want to re connect every time Click finish You may be asked for credentials

If you have to connect with different credentials than what you have logged in under click on different user name You will then be given the Connect as window

Problems / Trouble shooting What do we do if we cant connect to a share? How do we trouble shoot the problem?

Printer sharing area

Sharing printers Works the same as folders

Sharing printers (cont)

Sharing printers (rights)

Networking in Windows 7 The category View of windows 7 networking will allow for a simplified interface to networking options If you are comfortable with windows XP you will see some additions to options and locations for networking in W7

Network and Sharing Center Through this interface you will have more options to change and configure your network For this network we have public network selected. Public, Work and home network selections will give you different option within your firewall and sharing options To change this network to a different option click public network and you will be given options to change to an alternate configuration You can also manage adapter setting, wireless if equipped etc

Selecting network Selecting network type will allow for the listed networks to be configured Home or Work Choose one of these locations for home or small office networks when you know and trust the people and devices on the network. Network discovery, which allows you to see other computers and devices on a network and allows other network users to see your computer, is on by default. Public place Choose this location for networks in public places (such as coffee shops or airports). This location is designed to keep your computer from being visible to other computers around you and to help protect your computer from any malicious software from the Internet. Network discovery is turned off for this location. If there s only one computer on your network and you know you won t need to share files or printers, the safest choice is Public place. Choosing "Private" permanently changes the firewall configuration to allow communication. This can be a security risk

Windows 7 firewall Unlike windows XP, 7s firewall is very complex. Take the time to do some reading online and learn how to use/configure it. How Windows Firewall affects network locations The Public place location blocks certain programs and services from running, to help protect your computer from unauthorized access while you are connected to a network in a public place. If you are connected to a "Public place" network and Windows Firewall is turned on, some programs or services might ask you to unblock them so that they work properly. When you unblock a program, Windows Firewall unblocks it for every network with the same location type as the network you are currently connected to. If you connect to a network in a coffee shop and choose "Public place" as the location type and then you unblock an instant messaging program, that program will be unblocked for all networks in the "Public place" location. If you unblock multiple programs while you're connected to a public network, consider changing the network location to "Home" or "Work." It might be safer to change this one network than affect every public network you connect to. But remember that if you make that change, your computer will be visible to others on the network.

Network Map Network map will allow you to see a graphical layout of your network. This option may or may not list all computer and or devices correctly but may give you an idea of your layout.

Rights Oh no not Rights. Share rights, file rights, inheritance rights Sharing to groups Sharing to users