Wireless networksecurity should be your first priority as your setting up a router. An unsecured wireless network is an open invitation to trouble. Your neighbors, nearby businesses, even a stranger parked out in the street can access your network if it’s not secured. Wireless Networking Security Basics
Securing your wireless network is easy with these tips:
• Don’t leave defaults. Your router or access point is set up via a Web page that connects directly to the device. If you haven’t done so already, change the administration username and password. Hackers that know the login defaults will have an easy time configuring your network to be an open book.
• Get cryptic. Wireless network equipment can scramble the data that passes between computers on the network. Make sure to turn on the strongest encryption that all of your computers will support. It is crucial that all computers use the same type of encryption, or they won’t be able to communicate with each other. WPA and WEP are common encryption standards.
• Be picky. All network cards and hardware have unique identifiers called MAC addresses. Your router can be configured to only allow access to certain MAC addresses through a function called MAC Address Filtering. Turn this on and input the MAC addresses of all the network devices (cards, access points, etc.) that should have access to your wireless network.
To find the MAC address of your wireless card, use the following procedure:
◦ From the Windows Start menu, select Run
◦ Type in the command cmd and press return
◦ In the new window, enter the command ipconfig /all
◦ The MAC address (sometimes called the physical address) will be listed as a series of letters and number in the form—XX-XX-XX-XX-XX-XX
◦ Record the MAC address and close the window
◦ Note: you can add the MAC address of visiting PCs, but don’t forget to remove them from you filter list later.
• Wall yourself in. Make sure that firewall wireless network security software is enabled on all computers and routers in the network. Firewall software is designed to block unauthorized access to hardware. This is added level of security is a simple step toward a more secure network
Although a wireless transmitter is limited in its range, wireless extension points can be installed to boost its signal and make the range of the network much larger. These wireless extension points are commonly known as repeaters.
Several companies have started to manufacture wireless repeaters, despite the fact that these devices are not part of the wireless standard. Wireless repeaters are designed to resolve certain problems with wireless coverage. The further away you are from where the wireless signal originates, the weaker the signal becomes. Eventually, you can't receive the signal at all, regardless of what equipment you have. The problem is sometimes addressed by running wires out as far as the network coverage is desired, and then have it 'break out' into wireless every now and then using a wireless access point. This is generally more trouble than it is worth, since the idea behind a wireless network is to avoid installing wires! Wireless repeaters resolve the problem in a much better way.
Wireless repeaters work as a relay, taking existing wireless signals and making them stronger. This makes the range of a signal bigger each time. If the repeaters are placed correctly, you can move computers a considerable distance from the wired portion of the network, the router or access point, for example, without failure. The single requirement of this arrangement is that the extension points must overlap; a repeater can't repeat signals that it doesn't receive. Since wireless networking signals are essentially radio signals, repeaters take all the radio signals they receive on a specific frequency and use their power to amplify the signals and rebroadcast them. The signal is not degraded in this process, so it can be repeated as many time as required.
Theoretically, wireless repeaters could be placed in a line for several miles, extending the network out that far, and because these extension points don't need complicated computer technology to operate, they are much cheaper than routers or access points. Some companies combine repeaters and direction antennas to link to LANs that are several miles apart. This is a cheaper method than worrying about connecting over the Internet or installing their own underground lines. In the future, repeater technology could create wireless networks that cover entire cities.
As a consumer, you are currently limited to getting your repeater from large manufacturing firms such as Linksys and D-Link. These companies call their repeaters by different names, including Linksys' Range Expander and D-Link's Range Extender. There are several issues to consider when buying a wireless extension point. The most important is to make sure that it is compatible with the equipment you have. Because there is no standard for wireless extension points, you're better off staying with the same company that makes the rest of your equipment or at least investigate whether any new equipment will work with your system. You should also find out whether an extension point has any Ethernet ports. While it isn't necessary that this is included, it is useful if you want to connect the extension to a wired network. This issue arises basically if you want to connect two LANs in a wireless manner.
If you subscribe to DSL or cable internet service the chances are good that you are using a wireless router. How secure is your wireless router? I will explain in this article what steps to you need to take to insure that you have the most secure home network that's possible. Have you ever gone to "My Network Places" in Windows and viewed all your neighbors' wireless network connections? You will notice that some say secure and some say unsecure. Well you want to make sure that yours' says secure. This is the first step in securing your wireless network connection.
Your first line of defensive is your wireless routers' data encryption. Basically your router takes your data and encodes it so that no one else can intercept your data. Usually the manufactures' default encryption setting is set to off.
The first thing to do is to log into your wireless router (see instruction guide for your router) and go to wireless settings and turn on encryption. There are two forms of encryption WEP which is older and easy to crack and WPA which is the more secure encryption. If your router has a WPA2 encryption then use this one as it is the most recent version. Always use a strong password for your encryption key. A combination of upper and lower case letters and numbers will do the job nicely.
As an added security precaution always use your router's built in firewall. Refer to your router owner's manual on the various settings that are offered. What a firewall will do is prevent any unauthorized internet hackers from accessing your pc. As an added precaution you can also add a software base firewall which will offer many advance settings that may not be found in your router's firewall.
As an added precaution whenever you are not using your computer you can disconnect from the internet by right clicking on windows network icon connection in the bottom right of your task bar and select disable. If you have firewall software installed on your pc, your software will have a similar feature.
One more topic I want to cover and that is public Wi-Fi Hotspots. Whenever you are in a public area like an airport, bus terminal, public library or any place where there may be a Wi-Fi Hotspot you need to take some precautions.
Make sure that your pc's software firewall is turned on and that your windows file sharing is turned off. Never use the internet to log into your bank account or any other service that requires the use of passwords. You need to take this precaution to make sure your Wi-Fi connection is not being monitored to record your keystrokes.
Always turn off your Wi-Fi radio when you are not at a Wi-Fi hotspot. This will prevent hackers from using your pc to create a peer-to-peer Wi-Fi connection and accessing it directly.If you follow these few simple steps you will have a much more secure pc connection and less of a chance of being hacked into and having personal information stolen. As always nothing is 100% secured but these steps will give you much better security than what you had.
One of the fastest growing and most exciting technologies these days is devices that use some sort of wireless network. Wireless networking has allowed almost anyone to use many different devices in a way that not too long ago was unheard of. The most exciting thing about wireless networking is that the development of new technologies is only just beginning.
A new wireless protocol, 802.11N, should be released later this year, which will allow wireless networks to connect over longer distances, and at faster speeds. With this new advancement companies will be able to allow all of their users to connect to the network wirelessly.
This new protocol, coupled with recent advancements in secure connections to wireless networks, will allow businesses to perform tasks wirelessly that they have never been able to do before. Companies utilizing this new protocol will also be able to save quite a bit of money trying to hard wire their offices, by using less wireless routers to do the same task that wired routers did in the past.
Wireless networks have become a very important part of many businesses, because you can construct a wireless network that is separate from your main network that only allows visitors access to the internet and not to any of your precious information. This will also allow you to setup places for visitors to connect to the internet that do not require a desk to be setup or a dedicated computer setup for their access. Instead you can utilize a sitting area and a laptop to achieve the same functionality, without the security risks of someone connecting directly into your network.
Many of the reasons why wireless networks were a faux pas in the past have been addressed and now wireless networks are looked at more and more as a viable alternative to a hard wired network. The best thing about wireless networks is that many new technologies are being released every year that extend the functionality and availability of this fascinating new technology.
The new technologies that are available to construct, and connect to wireless networks is unbelievable. You can connect to a wireless network with a laptop through Wi-Fi, GSM, and even through satellite data cards. Many businesses are creating free hotspots that allow their patrons access to the internet to conduct business, or just send a friend an email.
Many car manufacturers are now offering satellite broadband internet access from within a certain distance of the car, so that people can get an internet connection while they are traveling. Many new types of cell phones and PDAs will allow you to check your email, get your contacts, your calendar, and even access certain web pages right from the phone.
Right now many web pages are not easily viewed, or fully functional on a cell phone or PDA, but many programmers and web designers are working on making their web sites more accessible from all forms of wireless devices.
Many other forms of wireless devices are now being developed that will allow information to be obtained in real-time over great distances. RFID has revolutionized process chain management, because now businesses can track their product from manufacturing to delivery, and everywhere in between. New technologies have been developed recently that allow RFID wireless networks to be formed that can calculate distances between the different devices contained within the network. This will allow a sort of "smart" network to be formed that will allow the devices to "know" when one is on the move, or if one has been lost.
Another very important development in recent years is the use of GPS tracking and navigation. Now we have the ability to know exactly where our products are, and where they are going so we can ensure shipment delivery in a timely manner. When all of these wireless networks are tied together an efficient and productive business can be sure to follow. Wireless networks are a must in this new on-demand world that we live in. If you do not keep up with the times, then you will be quickly left behind.
In this world of modern technology, most people prefer not to connect computers with Ethernet cables because excessive cables scattered throughout their office or home is unsightly. You can choose to install a wireless network to avoid excessive cabling. For a wireless network, there is no need to use Ethernet cables to connect your computers to the DSL or router.
Usually, a wireless network broadcast signal uses one or more wireless routers or wireless access points. The access points or router are provided with an aerial and an Ethernet port. The Ethernet port in the access point must be connected to the modem which is provided by your internet service provider, if you need internet access. If you have to move the wireless network to another place, you can simply transfer and install it in your new location easily.
You can also make a combination of wired and wireless connections with an access point or wireless router. The access point functions as the receiver and radio frequency transmitter and can interact with computers, IP Phones, PDAs and other access points having 802.11 wireless adapters. IEEE 802.11 standard of wireless transmission is utilized in a wireless local area network (WLAN). Certain other wireless networking standards such as Bluetooth are available now. However, 802.11 standard is considered as the most effectual networking solution. Actually, the aim of the developers of this network interface was to connect computers through a local area network. However, it has now been changed and a wireless network interface is also used for Voice over Internet Protocol (VoIP) and internet access.
Based on the surveys conducted so far, it is clear that you can stay connected in your network for a long period each day. If you have a laptop with a wireless connection, you can walk around your office with your laptop without losing the connection. Nowadays, certain emergency services are transferring their confidential data through a wireless network. We can consider this as an evidence for the data security which is provided by wireless network. You can send and share data quickly through a wireless network. This is the main reason why businesses and people prefer this network interface for their data sharing. Another important fact regarding wireless networks is that you can connect to the network easily even from the regions which have poor telecom infrastructure.
Some of the main reasons which make the wireless network interface popular include:
i) Convenience as you can use this network interface at home, the office or anywhere else without hassle. ii) WLANs are available anywhere in the world at an affordable cost. iii) If you are moving to a new location, you can transfer the interface and install it at your new location easily. iv) There is no need for an Ethernet cable to connect computers to each other.
For a business, one of the main advantages in setting up a wireless network is savings. You can access the changes in your business in a short period of time after installing the wireless network. There is no need to spend money on cables and other equipments. The cost of maintaining a wireless network is also less when compared to other network interfaces.
Nowadays, you can buy wireless routers at an affordable cost. Also having a wireless network can increase productivity and improve the working environment in your office.
One of the main drawbacks of this network interface is that it may cause health and environmental hazards. Recent researches reported that the constant use of wireless network interfaces may lead to memory loss, poor concentration, premature senility, nausea and even the hazardous disease named cancer. Some environmental hazards that may occur due the constant usage of this interface are also reported. These hazards occur due to electromagnetic radiation coming out of wireless networks.
When you use a wireless network at home, range and performance can be influenced by a lot of factors. The location of your wireless router as well as the location of your PC and/or laptop can make a lot of difference. Concrete walls also have a strong influence on Wi-Fi signals, so too many concrete walls in between the communication devices will reduce the signal strength, and as a result, the performance. But range and obstacles are not the only possible problems with wireless networks. What about your neighbors? If they are using a wireless network, chances are, you are both using the same frequency, which would cause interference and again loss of signal quality. Since wireless internet access is so common these days, it's better to check that too.
Here's How You Can Improve Your Wi-Fi Network! Depending on the location of your equipment, you can try to change the direction of your antennas. If your router has a built-in antenna, consider hanging it on a wall instead of placing it horizontally on a cabinet to change antenna direction. Most routers will come with instructions on best positioning for maximum range. If you want to further optimize the range and performance of your wireless network, you might need to change the frequency of your WiFi communication. There is a dedicated bandwidth for WiFi networks, in which multiple channels are defined. The problem is that many vendors configure their hardware to use a default channel. Typically this is channel 6, since it is the middle of the range (1 to 11 in the US, up to 13 for Europe).
To find out if you need to change your wireless network frequency, you need to know what channel you are using and if the other channels are better. There are many tools available for this, and one of them is called NetStumbler. The current version is 0.4. The program can be installed with the default options. Once you start the application, it will automatically start a scan of the wireless networks in your surroundings. In the results pane, you can see all detected networks grouped by MAC address, SSID or channel. The colored icon in front of the MAC address indicates the signal strength. Using these details, you can first check how many networks are using the same channel as you are. You will need to know your SSID of course (either printed at the bottom of your wireless router, if it came from your ISP, or check the network settings on your computer's wireless card).
Ideally, there should not be (too) many wireless networks on the same channel, but if there are, you want to make sure they have low signal strength. If there are too many wireless networks on the same channel, try changing the channel to improve your wireless network range and performance. This needs to be done in the wireless router or access point. The hardware will come with instructions on how to change the WiFi channel. Your laptop or PC's wireless card will automatically switch to the new channel. If you are using a laptop, you can also use the program to see where your signal strength is best. Move around with the laptop and see which location in your house has the best signal strength. You can use the colored icon as well as the 'signal' columns to assess the network quality. Make sure the network scanning is active to ensure the values are updated while you move around.
Using these Wi-Fi tips, you can easily improve your wireless internet access speed, or solve problems with your wireless internet connection.
While living in a growing age of technology, having at least one computer in the home is just as common as having a refrigerator. Most homes today will have some sort of computer equipment for either personal use or business use. With today's wireless-equipped laptops, a wireless router and, if you need one, a wireless adapter card, even the technically-challenged can create a network in a heartbeat. This discussion isn't about Bluetooth technology, nor does it relate to Macs.
The First StepWorkstations, printers, and laptops need a wireless adapter card installed. They're easy to install--sometimes they're already built in. If so, your equipment will say it's wireless network capable. If not, remove the case from your desktop computer, follow the adapter card's directions, and you'll easily identify the slot the card fits into. On a laptop, the card slot is on one of the outside edges of the keyboard half. The card only fits in one way and installs in two seconds, no problem. Once the adapter is set into its slot, Windows' setup wizard steps you through installing the driver. You'll get the familiar message, "Windows found new hardware." Follow the prompts. The current wireless protocol is 802.11. Wireless cards costs between $20 and $130. They can be found at any computer store or online outlet. The $20 card should be adequate. For a few dollars, weak-kneed users can get a pro to install the card and drivers.
Buying Your Wireless Router Going in search of wireless routers at an office supply megastore, you'll find them from $39 and up. They come with 4 Ethernet ports plus a wireless access point. The Ethernet ports are sockets for setting up a "wired" network, but since you're going wireless, you won't use them. The wireless access point is the sort of radio thing on the router that talks to your computer to make the wireless connection. It doesn't require you to plug anything in. Spending extra money buys more speed between router and computer, but for home use, on a small network, it's not really relevant. Usually, a router that transfers data at 100 megabits per second is fast enough. The package will tell you the speed.
Safeguard Your Stuff By the way, an important fact about wireless routers is that they act as "firewalls." A firewall is software or hardware that prevents hackers from hacking into your system. The router puts an extra layer of security between you and them. Some people claim the protection is negligible but a techie friend of this writer, with every piece of security known to man, tried to hack my network to demonstrate how feeble the router's protection was. He said, "In 10 minutes, I'll have your data." Three hours later, cussing a blue streak, he threw in the towel. Good security.
Wireless - Continued To install the router, rely on manufacturer's directions. All routers are slightly different. For example, you'll plug your basic Netgear router into an electrical outlet, go back to your computer and navigate to Control Panel -- Network Connections. The wireless network connection icon should say you have succeeded and are connected. Your router is now talking to your computer. That's it. Next, choose enable encryption, which is a way to assigning a security key, like a password, to the network's access to keep neighbors or anyone else from using your network. Gurus encourage everyone to do this. It's not difficult to figure out. The manual directs you to type 192.168.0.1 into the address bar of InternetExplorer. Every user manual has a similar IP address (Web address) to an administrative program for each router. It's easy to follow menu selections on the page that comes us next. The help files are generally user-friendly and tech support is available by phone as well.
Hooking Up With your new network set up, you add security cameras, printers, shared storage or anything else that can accept an adapter card or comes with network capability. Each item added -- printer, camera, computer -- needs wireless capability or a card and each shows up on the network with a name you give it - like, "new photo printer" or "Joe's laptop." The best part of the whole set up is that the wireless signal goes through most walls, allowing you to work almost anywhere in your home, sans the yards of black spaghetti that used to connect you. Take your laptop n front of the fireplace. Recliner chair becomes your desk. Sip some hot buttered rum and be the envy of the neighborhood.
Just a few years ago I was clueless about why I should secure my wireless network. I didn’t care if other people used my wireless signal to surf the internet, and I thought it was too much hassle to figure out how to encrypt my network. What I didn’t realize, is that computer criminals rely on people like me to carry out their crimes. All they had to do was sit outside of my house and run some nifty software while they collected all of my personal data and all that it cost them was gas and time. It took me getting my credit card number stolen and my credit rating destroyed before I finally decided to take network security and the security of my data seriously. I hope this story isn’t too familiar to any of you out there but if it is I have just the guide for you.
Recently I was asked by the wonderful staff here at TechwareLabs to write a little guide on securing your home network, and explain a little bit of the techno-babble associated with network security encryption. I hope this guide finds you well and saves you from the mistakes so many like myself make. We will make this guide as easy to understand as possible so that everyone from the novice to the expert can tighten down the latches on their home and business security.
If you don’t think you have the time to secure your network all you have to remember is that it only takes one penetration of your data to cost you anywhere from hundreds to thousands of dollars. Getting ready to contact your credit card companies and maybe even a lawyer to start rebuilding your credit. We hope you aren’t planning on buying anything on credit any time soon.
First, let’s take a look at the most common hardware that consumers use to create wireless networks for their homes and small businesses. Knowing what you have is the first step to locking down unauthorized access.
We left off last time with a discussion of challenges that crop up when trying to design a WLAN for a high-density environment. Using a traditional multi-cell architecture, the main challenge is tuning the power of the APs appropriately so that there can be many small coverage cells. The trick is making sure users have plenty of aggregate capacity to share while avoiding the co-channel interference that lurks when lots of APs occupy a relatively small space. Now, what about single-channel and array architectures?
You likely know that Meru offers a single-channel architecture approach. The upside of this setup, whereby all APs in a shared domain are tuned to a single channel, is that the WLAN controller coordinates client-to-AP associations. It determines which client transmits when and for how long and when the AP transmits and for how long. With this kind of “big picture” control, it’s easier to avoid the interference problem.
However, Meru APs run at full power, which means that fewer APs are used in a manufacturer-recommended network design than with a multi-cell design. Thus a high degree of uplink and downlink transmission coordination is necessary in order to deal with a high-density client environment.
Devin Akin, CTO at Wi-Fi training and certification company CWNP, recommends appropriately spacing out APs on the same channel to create multiple collision domains so that the aggregate system bandwidth shared by users remains abundant.
Finally, there’s the “array” approach to covering high-density environments. Xirrus makes a 16-radio controller with an integrated directional antenna array, which provides a ton of capacity. It avoids co-channel interference by the fact that the antennas concentrate and focus their energy in wedged directions of about 20 to 25 degrees each. Each wedge can get the full 54Mbps connect rate of 802.11g or 300Mbps connect rate of 802.11n.
Meru makes some arrays, too, the AP440 (802.11n) and the RS4000 (802.11a/b/g) in which radio 1 represents one layer tuned to one channel, radio 2 represents a second layer tuned to another channel, and so forth. However, these arrays use omnidirectional antennas. As such, they emit RF energy that overlaps, so you need to test the systems to see whether interference arises simply from the physical proximity of the radios, antennas and power.
A similar issue would likely arise if you attempted to deploy more than one Xirrus 16-radio array within a given coverage area, because at that point, those radios, too, would start to overlap in the directions that they send RF energy.
Wireless lags can be problematic in various situations. This includes during multimedia streams, live feeds but also gaming. This wireless problem can range from stutters to serious connection problems and even drops. This is causes by a service in Windows XP and Windows Vista that is regularly looking for new wireless networks. The service is called Wireless Zero Configuration in Windows XP and WLAN Auto Config in Windows Vista. The easiest way to check if the problem exists on a computer system is to ping a service for some time to see if there are any wireless lags.
To do that open a Windows command prompt with the shortcut [Windows R] [cmd] [enter] and type in the command ping -t www.google.com. This will ping Google and display the time it takes. If you see spikes like in the screenshot below you are experiencing wireless lags.
The easiest way to fix wireless lags is by downloading and running Wireless Zero Shutdown when running Windows XP or Vista Anti Lag when running Windows Vista.
Running either of the software programs will stop the Windows service from scanning for new wireless networks regularly as soon as a wireless connection has been established.