Wireless Home Networking Simplified
Author: James Doherty
Wireless Home Networking Simplified
- The full-color, fully illustrated, simple guide to wireless home networking
- Step-by-step instructions: Plan, install, secure, optimize, and troubleshoot your wireless network
- Discover all the fun things you can do with your wireless network
Jim Doherty
Neil Anderson
Using today’s wireless networks, you can save money, become more productive, and even have more fun! Now, there’s an easy, fully illustrated step-by-step guide to wireless networking for your home: Wireless Home Networking Simplified.
This plain-English guide teaches you everything you need to know to set up a wireless network at home, even if you do not have a technical background. You’ll find simple, easy-to-follow guidance on selecting the right equipment, installing your network devices properly, connecting to the Internet, safeguarding your information, fixing problems, and much more.
- Understand how wireless home networks work
- Compare today’s wireless standards, and choose the right one for you
- Design your wireless network for maximum convenience, reliability, and simplicity
- Secure your network, step by step–and keep it secure
- Troubleshootfailed connections, poor coverage, and slow performance
- Temporarily allow guests onto your network without exposing your data
- Use your network to listen to music, view video, and play video games anywhere in your home
- Preview and prepare for tomorrow’s wireless technologies
Wireless Home Networking Simplified cuts through the confusion, demystifies the technologies, and helps you make the most of wireless… quickly, simply, painlessly.
This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems®.
Category: Networking
Covers: Home Networking
$24.99 USA / $29.99 CAN
Jim Doherty is the vice president of marketing at CipherOptics, where he leads the outbound marketing teams. Prior to joining the CipherOptics team Jim held leadership positions with Symbol Technologies and Cisco®. Jim has more than 15 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching, and network security solutions. Jim is the coauthor of the Networking Simplified series of books published by Cisco Press. Jim is a former Marine Corps sergeant; he holds a B.S. degree in electrical engineering from N.C. State University and an M.B.A. degree from Duke University.
Neil Anderson is the senior manager of enterprise systems engineering with Cisco. Neil has more than 20 years of broad engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is on large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is the coauthor of the Networking Simplified series of books including Home Networking Simplified, Home Network Security Simplified, and Internet Phone Services Simplified. Neil holds a B.S. degree in computer science.
Table of Contents:
How Does It Work
How Wireless LANs Work 3
Why Wireless? 4
Before We Get to the Wireless Bit, What the Heck Is a LAN? 5
Okay, Now the Wireless Part 9
Challenges for Wireless Communication 9
The Solution 10
Putting It All Together 11
Summary 12
Where to Go for More Information 13
Wireless Standards: What the Letters Mean 15
The Standard 802.11 and the IEEE 16
802.11a 17
802.11b 18
802.11g 19
802.11n 20
Combinations 21
What Happened to the Other Letters? 21
Summary 22
Where to Go for More Information 22
Selecting the Right Wireless Standard for Your Network 23
What to Consider When Choosing Your Wireless Standard 24
Compatibility 24
Relationships Among Wireless Standards 25
Dual-Band Products 26
Proprietary Extensions 27
Speed 27
Range 28
Security 28
Cost 29
AdditionalConsiderations 29
Comparing the IEEE WLAN Standards 30
Recommendations 31
Summary 32
Where to Go for More Information 32
What You Should Know
Planning Your Wireless Network 35
Wireless Network Topologies 35
Sketching a Network Layout 37
Thinking Your Network Plan Through 39
Determining the Networking Capabilities of Your Computers 40
Looking for a Wired NIC 40
Looking for a Wireless NIC 40
Determining Your Immediate Needs to Create a Wireless Network 43
Completing Your Plan 44
Summary 45
Wireless Security: What You Need to Know 47
Why Should I Worry About Wireless Network Security? 47
What Do I Do to Secure My Wireless Network? 50
Don't Advertise Your Wireless Network 51
Scramble Your Signal 52
What Is Encryption? 52
Choosing an Encryption Key 53
Disable Ad Hoc Networking 54
Other Tips to Consider 55
Summary 55
Where to Go for More Information 55
What to Buy 57
Determining Network Readiness 57
Making Your List, Checking It Twice 61
Wireless Router Options 62
Wireless NIC Options 63
Gear for Travel Bugs and Road Warriors 65
Extra Stuff 66
Where to Buy Your Gear 67
Summary 69
Where to Go for More Information 69
How Do I Set It Up?
Wireless Router Setup 73
Connecting the Wireless Router 74
Configuring the Wireless Router 75
Using the Linksys Setup Wizard 77
Using an Internet Browser 84
Using Linksys EasyLink Advisor 91
Summary 98
Where to Go for More Information 98
Wireless NIC Setup 99
Installing the Wireless NIC 99
Installing a PCI Wireless Card in a Desktop Computer 101
Installing a PCMCIA Wireless Card in a Laptop Computer 102
Installing a USB Wireless NIC in a Computer 103
Associating the Wireless NIC to the Wireless Router 105
Wireless Profiles 106
Wireless Connection Managers 108
Using the Windows Wireless Network Connection Utility 109
Using Linksys WLAN Monitor 111
Using Linksys EasyLink Advisor 113
Summary 121
Where to Go for More Information 122
Wireless Security Setup 123
Setting Up Wireless Encryption 123
Tips Before We Start 125
If Only It Were That Easy 126
Manually Setting Up Wireless Encryption 127
Enabling WEP Encryption on the Wireless Router 128
Enabling WEP Encryption on the Wireless NIC 130
WPA Encryption Example 137
Setting Up Wireless Encryption with Linksys SecureEasySetup 142
Linksys SecureEasySetup on the Wireless Router 144
Linksys SecureEasySetup on the Wireless NIC 148
Setting Up Wireless Encryption with Linksys EasyLink Advisor 150
Linksys EasyLink Advisor on the Wireless Router 151
Using EasyLink Advisor to Add Encryption to Wireless NICs 156
More Wireless Security Steps 162
Stop Advertising Your Wireless Network 163
Turn On the Firewall 164
Prevent Unintentional Roaming 164
MAC Address Locking 166
Top Troubleshooting Tips for Wireless Encryption 167
Summary 167
Where to Go for More Information 168
"Honey, This Stupid Wireless Thing Is Not Working"
Troubleshooting: I Can't Connect at All 173
Steps to Connecting 174
Scanning 176
Matching 176
Associating 176
Securing the Connection 176
Obtaining an IP Address 177
Sending and Receiving 177
What Can Go Wrong 177
Problems During Scanning 178
Problems During Matching 179
Problems During Association 180
Problems Securing the Connection 180
Problems Obtaining an IP Address 180
Problems Sending and Receiving 180
Five Things to Look At First 181
How to Tell if You Do Not Have a Connection 181
Figuring Out Why It Will Not Connect 183
Scanning-Related Issues 184
Incompatible Wireless Standards 184
Wireless Turned Off 185
Poor Signal Strength 187
Matching-Related Issues 189
SSID Mismatch 189
SSID Broadcast 192
Association-Related Issues 193
Security- and Encryption-Related Issues 196
Encryption Type Mismatch 196
Encryption Key Mismatch 197
Windows XP Authentication Setting Mismatch 209
IP Address Assignment-Related Issues 210
Determining if an IP Address Is Assigned 211
Determining if IP Address Assignment Is Failing 212
Trying the Windows XP Repair Function 214
Checking the Router's DHCP Client Pool 215
Wireless Connection Made 216
Oops, How Embarrassing! 218
The 10-Minute Miracle 218
Summary 218
Where to Go for More Information 218
Troubleshooting: I Can Connect Sometimes 219
How Wireless Coverage Works 219
Tuning Your Wireless Coverage 221
Performing a Wireless Survey 221
Wireless Survey Using Windows XP 223
Wireless Survey Using Linksys WLAN Monitor 224
What to Conclude from Your Wireless Survey 226
What You Can Do to Improve Coverage 227
Improving the Location of the Wireless Router 227
Trying Different Channels 229
Trying Different Antenna Positions 234
Upgrading the Antenna 236
Using Wireless Range Extenders and Additional Access Points 236
Upgrading the Wireless Router 237
Summary 237
Where to Go for More Information 237
Troubleshooting: I Can Connect, but It's Slow 239
Is the Broadband Internet Connection the Bottleneck? 239
Checking the Broadband Connection 241
Testing Your Broadband Speed 243
Is the Wireless Network Too Slow? 244
Understanding Wireless Standards and Speeds 244
Verifying Wireless Network Speed 245
Is the Wireless Network Signal Getting Degraded? 248
Interference from Other Wireless Routers 248
Checking for Conflicting Wireless Routers 248
Determining Whether the Conflicting Wireless Router Is Causing an Issue 250
Correcting a Conflicting Wireless Router Situation 251
Interference from Cordless Phones and Other Devices 252
Determining Whether the Conflicting Cordless Phone Is Causing an Issue 252
Correcting a Conflicting Cordless Phone Issue 254
Summary 255
Where to Go for More Information 255
Bells and Whistles
Wireless Video and Entertainment 259
Wireless Video Cameras 259
Finding Uses for Wireless Video Cameras 261
Connecting the Video Camera to Your Wireless Network 263
Determining Who Can Access the Video Camera 268
Viewing Video from Within Your House 271
Viewing Video over the Internet 273
Setting Up the Wireless Router for Internet Camera Viewing 274
How to View the Camera over the Internet 276
Problems with Viewing Video over the Internet 277
Using the Video Camera as a Motion Detector 277
Wireless Online Gaming 279
Gaming Servers 280
Options for Online Gaming 280
How to Connect Video Game Consoles to Your Wireless Network 281
Setting Up the Wireless Game Adapter 282
Connecting a Video Game Console 284
Connecting to an Online Game Provider 285
Networking Your DVR 288
Typical DVR Setups Today 289
Reasons to Network Your DVR 289
Networking Your DVR 290
Using TiVoToGo 291
Summary 293
Where to Go for More Information 293
Wireless to Go 295
What Is a Wireless Hotspot? 295
How to Find Wireless Hotspots 297
Wireless Hotspot Options and Costs 298
Discovering and Connecting to Wireless Hotspots 299
Connecting to Hotspots Using Linksys WLAN Monitor 300
Connecting to Hotspots Using Windows XP 302
Connecting to Hotspots Using Boingo 305
Passing the Membership Test 305
Example: Connecting to a Free Service at Bear Rock Cafe 306
Example: Connecting to T-Mobile Service at Borders Book Stores 307
What Not to Do When Using a Wireless Hotspot 308
Setting Up Your Own Portable Hotspot 310
How Wireless Travel Routers Work 310
Setting Up a Wireless Travel Router 311
Setting Up Your Laptop to See the Travel Router 314
How to Use a Wireless Travel Router 315
Summary 316
Where to Go for More Information 316
The Future of Wireless Networking 317
Wireless Networks Will Be Faster 317
Wireless Networks Will Go Farther 319
Wireless Networks Will Be in More Places 319
Wireless Networks Will Move with You 320
More Devices Will Connect to Wireless Networks 321
Summary 321
Where to Go for More Information 321
Appendixes
MAC Address Filtering 325
802.1 In Wireless Channels 331
802.11 Additional Revisions 333
Glossary 335
Index 345
Look this: Moralemissionen im Geschäft: Eine Philosophische Annäherung
IT Portfolio Management Step-by-Step: Unlocking the Business Value of Technology
Author: Bryan Maizlish
Information technology (IT) provides inordinate value if applied properly. Identifying and implementing new value and revenue opportunities, while maximizing return based on existing investments is contingent on understanding the entire portfolio of information technology investments. Just as a financial investment portfolio requires constant monitoring and action, the investments a company has, or is making, in IT must constantly be evaluated. This need is evermore heightened in today's demanding regulatory environment. While silver bullet solutions do not exist for difficult problems, IT portfolio management provides a realistic approach to ensuring that investments in technology continue to support the needs of business.
Based on the authors' combined professional hands-on IT and financial experience of over thirty years, the unparalleled input and support from an army of individuals from the leading IT market research firm in the area of IT portfolio management, extensive research and case studies from many exemplar companies, IT Portfolio Management Step-By-Step provides the closest thing to a Holy Grail solutionthe first complete book ever published that presents a proven, pragmatic, and non-technical approach to simplifying the process of achieving a rationalized and business-aligned IT portfolio.
IT Portfolio Management Step-By-Step encapsulates the essential ingredients novices and experts need to build or fortify an existing IT portfolio, including extensive coverage of:
- The comprehensive five-level IT portfolio maturity model and portfolio metrics
- Policies, principles, organizational roles, and other governance aspects of IT portfolio management, including linkages to Sarbanes-Oxley and CobiT
- The IT life cycle and each IT sub-portfolio in their content and context
- The eight detailed stages and specific tasks of building, step by step, the IT portfolio, replete with realities and lessons learned
- Coverage of advanced IT portfolio management topics such as Monte Carlo Simulation, the Efficient Frontier curve, Real Options, Analytical Hierarchy Process, Earned Value Analysis, Balanced Scorecard, and Scenario Planning
- Criteria for selecting an IT portfolio management tool vendor
- Insight regarding the impact of future trends and technologies on IT portfolio management
What People Are Saying
David Mitchell
David Mitchell, President and CEO, webMethods, Inc.
IT Portfolio Management describes in great detail the critical aspects, know-how, practical examples, key insights, and best practices to improve operational efficiency, corporate agility, and business competitiveness. It eloquently illustrates the methods of building and integrating a portfolio of IT investments to ensure the realization of maximum value and benefit, and to fully leverage the value of all IT assets. Whether you are getting started or building on your initial success in IT portfolio management, this book will provide you information on how to build and implement an effective IT portfolio management strategy.
Peter Fingar
IT Portfolio Management details a comprehensive framework and process showing how to align business and IT for superior value. Maizlish and Handler have the depth of experience, knowledge, and insight needed to tackle the challenges and opportunities companies face in optimizing their IT investment portfolios. This is an exceptionally important book for executive leadership and IT business managers, especially those wanting to build a process-managed enterprise.
(Peter Fingar, Executive Partner Greystone Group, coauthor of The Real-Time Enterprise and Business Process Management (BPM): The Third Wave)
John C. Reece
John C. Reece, Chairman and CEO, John C. Reece & Associates, LLC Former deputy commissioner for modernization and CIO of the IRS
Bryan Maizlish and Robert Handler bring their deep experience in IT 'value realization' to one of the most absent of all IT management practicesportfolio management. They capture the essence of universally proven investment practices and apply them to the most difficult of challengesreturning high strategic and dollar payoffs from an enterprise's IT department. The reader will find many new and rewarding insights to making their IT investments finally return market leading results.
Michael J. Montgomery
Michael J. Montgomery, President, Montgomery & Co.
I found IT Portfolio Management very easy to read, and it highlights many of the seminal aspects and best practices from financial portfolio management. It is an important book for executive, business, and IT managers.
Richard Max Maksimoski
Richard "Max" Maksimoski, Senior Director R&D, The Scotts Company
A must-read for the non-IT manager who needs to understand the complexity and challenges of managing an IT portfolio. The portfolio management techniques, analysis tools, and planning can be applied to any project or function.
Donavan R. Hardenbrook
Donavan R. Hardenbrook, New Product Development Professional, Intel Corporation
This book provides an excellent framework and real-world based approach for implementing IT portfolio management. It is a must-read for every CIO staff considering how to strategically and operationally impact their company's bottom line.