Sunday, February 8, 2009

Wireless Home Networking Simplified or IT Portfolio Management Step by Step

Wireless Home Networking Simplified

Author: James Doherty

Wireless Home Networking Simplified

 

  • The full-color, fully illustrated, simple guide to wireless home networking
  • Step-by-step instructions: Plan, install, secure, optimize, and troubleshoot your wireless network
  • Discover all the fun things you can do with your wireless network

 

Jim Doherty

Neil Anderson

 

 

Using today’s wireless networks, you can save money, become more productive, and even have more fun! Now, there’s an easy, fully illustrated step-by-step guide to wireless networking for your home: Wireless Home Networking Simplified.

 

This plain-English guide teaches you everything you need to know to set up a wireless network at home, even if you do not have a technical background. You’ll find simple, easy-to-follow guidance on selecting the right equipment, installing your network devices properly, connecting to the Internet, safeguarding your information, fixing problems, and much more.

 

  • Understand how wireless home networks work
  • Compare today’s wireless standards, and choose the right one for you
  • Design your wireless network for maximum convenience, reliability, and simplicity
  • Secure your network, step by step–and keep it secure
  • Troubleshootfailed connections, poor coverage, and slow performance
  • Temporarily allow guests onto your network without exposing your data
  • Use your network to listen to music, view video, and play video games anywhere in your home
  • Preview and prepare for tomorrow’s wireless technologies

 

Wireless Home Networking Simplified cuts through the confusion, demystifies the technologies, and helps you make the most of wireless… quickly, simply, painlessly.

 

This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems®.

 

Category: Networking

Covers: Home Networking

 

$24.99 USA / $29.99 CAN

 

Jim Doherty is the vice president of marketing at CipherOptics, where he leads the outbound marketing teams. Prior to joining the CipherOptics team Jim held leadership positions with Symbol Technologies and Cisco®. Jim has more than 15 years of technical marketing and engineering experience and has led various marketing campaigns for IP telephony, routing and switching, and network security solutions. Jim is the coauthor of the Networking Simplified series of books published by Cisco Press. Jim is a former Marine Corps sergeant; he holds a B.S. degree in electrical engineering from N.C. State University and an M.B.A. degree from Duke University.

 

Neil Anderson is the senior manager of enterprise systems engineering with Cisco. Neil has more than 20 years of broad engineering experience including public telephone systems, mobile phone systems, Internet, and home networking. At Cisco, Neil’s focus is on large corporate customers in the areas of routing and switching, wireless, security, and IP communications. Neil is the coauthor of the Networking Simplified series of books including Home Networking Simplified, Home Network Security Simplified, and Internet Phone Services Simplified. Neil holds a B.S. degree in computer science.

 



Table of Contents:
How Does It Work
How Wireless LANs Work     3
Why Wireless?     4
Before We Get to the Wireless Bit, What the Heck Is a LAN?     5
Okay, Now the Wireless Part     9
Challenges for Wireless Communication     9
The Solution     10
Putting It All Together     11
Summary     12
Where to Go for More Information     13
Wireless Standards: What the Letters Mean     15
The Standard 802.11 and the IEEE     16
802.11a     17
802.11b     18
802.11g     19
802.11n     20
Combinations     21
What Happened to the Other Letters?     21
Summary     22
Where to Go for More Information     22
Selecting the Right Wireless Standard for Your Network     23
What to Consider When Choosing Your Wireless Standard     24
Compatibility     24
Relationships Among Wireless Standards     25
Dual-Band Products     26
Proprietary Extensions     27
Speed     27
Range     28
Security     28
Cost     29
AdditionalConsiderations     29
Comparing the IEEE WLAN Standards     30
Recommendations     31
Summary     32
Where to Go for More Information     32
What You Should Know
Planning Your Wireless Network     35
Wireless Network Topologies     35
Sketching a Network Layout     37
Thinking Your Network Plan Through     39
Determining the Networking Capabilities of Your Computers     40
Looking for a Wired NIC     40
Looking for a Wireless NIC     40
Determining Your Immediate Needs to Create a Wireless Network     43
Completing Your Plan     44
Summary     45
Wireless Security: What You Need to Know     47
Why Should I Worry About Wireless Network Security?     47
What Do I Do to Secure My Wireless Network?     50
Don't Advertise Your Wireless Network     51
Scramble Your Signal     52
What Is Encryption?     52
Choosing an Encryption Key     53
Disable Ad Hoc Networking     54
Other Tips to Consider     55
Summary     55
Where to Go for More Information     55
What to Buy      57
Determining Network Readiness     57
Making Your List, Checking It Twice     61
Wireless Router Options     62
Wireless NIC Options     63
Gear for Travel Bugs and Road Warriors     65
Extra Stuff     66
Where to Buy Your Gear     67
Summary     69
Where to Go for More Information     69
How Do I Set It Up?
Wireless Router Setup     73
Connecting the Wireless Router     74
Configuring the Wireless Router     75
Using the Linksys Setup Wizard     77
Using an Internet Browser     84
Using Linksys EasyLink Advisor     91
Summary     98
Where to Go for More Information     98
Wireless NIC Setup     99
Installing the Wireless NIC     99
Installing a PCI Wireless Card in a Desktop Computer     101
Installing a PCMCIA Wireless Card in a Laptop Computer     102
Installing a USB Wireless NIC in a Computer     103
Associating the Wireless NIC to the Wireless Router     105
Wireless Profiles     106
Wireless Connection Managers     108
Using the Windows Wireless Network Connection Utility      109
Using Linksys WLAN Monitor     111
Using Linksys EasyLink Advisor     113
Summary     121
Where to Go for More Information     122
Wireless Security Setup     123
Setting Up Wireless Encryption     123
Tips Before We Start     125
If Only It Were That Easy     126
Manually Setting Up Wireless Encryption     127
Enabling WEP Encryption on the Wireless Router     128
Enabling WEP Encryption on the Wireless NIC     130
WPA Encryption Example     137
Setting Up Wireless Encryption with Linksys SecureEasySetup     142
Linksys SecureEasySetup on the Wireless Router     144
Linksys SecureEasySetup on the Wireless NIC     148
Setting Up Wireless Encryption with Linksys EasyLink Advisor     150
Linksys EasyLink Advisor on the Wireless Router     151
Using EasyLink Advisor to Add Encryption to Wireless NICs     156
More Wireless Security Steps     162
Stop Advertising Your Wireless Network     163
Turn On the Firewall     164
Prevent Unintentional Roaming     164
MAC Address Locking     166
Top Troubleshooting Tips for Wireless Encryption      167
Summary     167
Where to Go for More Information     168
"Honey, This Stupid Wireless Thing Is Not Working"
Troubleshooting: I Can't Connect at All     173
Steps to Connecting     174
Scanning     176
Matching     176
Associating     176
Securing the Connection     176
Obtaining an IP Address     177
Sending and Receiving     177
What Can Go Wrong     177
Problems During Scanning     178
Problems During Matching     179
Problems During Association     180
Problems Securing the Connection     180
Problems Obtaining an IP Address     180
Problems Sending and Receiving     180
Five Things to Look At First     181
How to Tell if You Do Not Have a Connection     181
Figuring Out Why It Will Not Connect     183
Scanning-Related Issues     184
Incompatible Wireless Standards     184
Wireless Turned Off     185
Poor Signal Strength     187
Matching-Related Issues     189
SSID Mismatch     189
SSID Broadcast     192
Association-Related Issues     193
Security- and Encryption-Related Issues     196
Encryption Type Mismatch     196
Encryption Key Mismatch     197
Windows XP Authentication Setting Mismatch     209
IP Address Assignment-Related Issues     210
Determining if an IP Address Is Assigned     211
Determining if IP Address Assignment Is Failing     212
Trying the Windows XP Repair Function     214
Checking the Router's DHCP Client Pool     215
Wireless Connection Made     216
Oops, How Embarrassing!     218
The 10-Minute Miracle     218
Summary     218
Where to Go for More Information     218
Troubleshooting: I Can Connect Sometimes     219
How Wireless Coverage Works     219
Tuning Your Wireless Coverage     221
Performing a Wireless Survey     221
Wireless Survey Using Windows XP     223
Wireless Survey Using Linksys WLAN Monitor     224
What to Conclude from Your Wireless Survey     226
What You Can Do to Improve Coverage     227
Improving the Location of the Wireless Router     227
Trying Different Channels     229
Trying Different Antenna Positions     234
Upgrading the Antenna     236
Using Wireless Range Extenders and Additional Access Points     236
Upgrading the Wireless Router     237
Summary     237
Where to Go for More Information     237
Troubleshooting: I Can Connect, but It's Slow     239
Is the Broadband Internet Connection the Bottleneck?     239
Checking the Broadband Connection     241
Testing Your Broadband Speed     243
Is the Wireless Network Too Slow?     244
Understanding Wireless Standards and Speeds     244
Verifying Wireless Network Speed     245
Is the Wireless Network Signal Getting Degraded?     248
Interference from Other Wireless Routers     248
Checking for Conflicting Wireless Routers     248
Determining Whether the Conflicting Wireless Router Is Causing an Issue     250
Correcting a Conflicting Wireless Router Situation     251
Interference from Cordless Phones and Other Devices     252
Determining Whether the Conflicting Cordless Phone Is Causing an Issue     252
Correcting a Conflicting Cordless Phone Issue     254
Summary     255
Where to Go for More Information      255
Bells and Whistles
Wireless Video and Entertainment     259
Wireless Video Cameras     259
Finding Uses for Wireless Video Cameras     261
Connecting the Video Camera to Your Wireless Network     263
Determining Who Can Access the Video Camera     268
Viewing Video from Within Your House     271
Viewing Video over the Internet     273
Setting Up the Wireless Router for Internet Camera Viewing     274
How to View the Camera over the Internet     276
Problems with Viewing Video over the Internet     277
Using the Video Camera as a Motion Detector     277
Wireless Online Gaming     279
Gaming Servers     280
Options for Online Gaming     280
How to Connect Video Game Consoles to Your Wireless Network     281
Setting Up the Wireless Game Adapter     282
Connecting a Video Game Console     284
Connecting to an Online Game Provider     285
Networking Your DVR     288
Typical DVR Setups Today     289
Reasons to Network Your DVR     289
Networking Your DVR     290
Using TiVoToGo     291
Summary     293
Where to Go for More Information     293
Wireless to Go     295
What Is a Wireless Hotspot?     295
How to Find Wireless Hotspots     297
Wireless Hotspot Options and Costs     298
Discovering and Connecting to Wireless Hotspots     299
Connecting to Hotspots Using Linksys WLAN Monitor     300
Connecting to Hotspots Using Windows XP     302
Connecting to Hotspots Using Boingo     305
Passing the Membership Test     305
Example: Connecting to a Free Service at Bear Rock Cafe     306
Example: Connecting to T-Mobile Service at Borders Book Stores     307
What Not to Do When Using a Wireless Hotspot     308
Setting Up Your Own Portable Hotspot     310
How Wireless Travel Routers Work     310
Setting Up a Wireless Travel Router     311
Setting Up Your Laptop to See the Travel Router     314
How to Use a Wireless Travel Router     315
Summary     316
Where to Go for More Information     316
The Future of Wireless Networking     317
Wireless Networks Will Be Faster     317
Wireless Networks Will Go Farther     319
Wireless Networks Will Be in More Places      319
Wireless Networks Will Move with You     320
More Devices Will Connect to Wireless Networks     321
Summary     321
Where to Go for More Information     321
Appendixes
MAC Address Filtering     325
802.1 In Wireless Channels     331
802.11 Additional Revisions     333
Glossary     335
Index     345

Look this: Moralemissionen im Geschäft: Eine Philosophische Annäherung

IT Portfolio Management Step-by-Step: Unlocking the Business Value of Technology

Author: Bryan Maizlish

Information technology (IT) provides inordinate value if applied properly. Identifying and implementing new value and revenue opportunities, while maximizing return based on existing investments is contingent on understanding the entire portfolio of information technology investments. Just as a financial investment portfolio requires constant monitoring and action, the investments a company has, or is making, in IT must constantly be evaluated. This need is evermore heightened in today's demanding regulatory environment. While silver bullet solutions do not exist for difficult problems, IT portfolio management provides a realistic approach to ensuring that investments in technology continue to support the needs of business.

Based on the authors' combined professional hands-on IT and financial experience of over thirty years, the unparalleled input and support from an army of individuals from the leading IT market research firm in the area of IT portfolio management, extensive research and case studies from many exemplar companies, IT Portfolio Management Step-By-Step provides the closest thing to a Holy Grail solution—the first complete book ever published that presents a proven, pragmatic, and non-technical approach to simplifying the process of achieving a rationalized and business-aligned IT portfolio.

IT Portfolio Management Step-By-Step encapsulates the essential ingredients novices and experts need to build or fortify an existing IT portfolio, including extensive coverage of:

  • The comprehensive five-level IT portfolio maturity model and portfolio metrics
  • Policies, principles, organizational roles, and other governance aspects of IT portfolio management, including linkages to Sarbanes-Oxley and CobiT
  • The IT life cycle and each IT sub-portfolio in their content and context
  • The eight detailed stages and specific tasks of building, step by step, the IT portfolio, replete with realities and lessons learned
  • Coverage of advanced IT portfolio management topics such as Monte Carlo Simulation, the Efficient Frontier curve, Real Options, Analytical Hierarchy Process, Earned Value Analysis, Balanced Scorecard, and Scenario Planning
  • Criteria for selecting an IT portfolio management tool vendor
  • Insight regarding the impact of future trends and technologies on IT portfolio management

What People Are Saying

David Mitchell
David Mitchell, President and CEO, webMethods, Inc.
IT Portfolio Management describes in great detail the critical aspects, know-how, practical examples, key insights, and best practices to improve operational efficiency, corporate agility, and business competitiveness. It eloquently illustrates the methods of building and integrating a portfolio of IT investments to ensure the realization of maximum value and benefit, and to fully leverage the value of all IT assets. Whether you are getting started or building on your initial success in IT portfolio management, this book will provide you information on how to build and implement an effective IT portfolio management strategy.


Peter Fingar
IT Portfolio Management details a comprehensive framework and process showing how to align business and IT for superior value. Maizlish and Handler have the depth of experience, knowledge, and insight needed to tackle the challenges and opportunities companies face in optimizing their IT investment portfolios. This is an exceptionally important book for executive leadership and IT business managers, especially those wanting to build a process-managed enterprise.
—(Peter Fingar, Executive Partner Greystone Group, coauthor of The Real-Time Enterprise and Business Process Management (BPM): The Third Wave)


John C. Reece
John C. Reece, Chairman and CEO, John C. Reece & Associates, LLC Former deputy commissioner for modernization and CIO of the IRS
Bryan Maizlish and Robert Handler bring their deep experience in IT 'value realization' to one of the most absent of all IT management practices—portfolio management. They capture the essence of universally proven investment practices and apply them to the most difficult of challenges—returning high strategic and dollar payoffs from an enterprise's IT department. The reader will find many new and rewarding insights to making their IT investments finally return market leading results.


Michael J. Montgomery
Michael J. Montgomery, President, Montgomery & Co.
I found IT Portfolio Management very easy to read, and it highlights many of the seminal aspects and best practices from financial portfolio management. It is an important book for executive, business, and IT managers.


Richard Max Maksimoski
Richard "Max" Maksimoski, Senior Director R&D, The Scotts Company
A must-read for the non-IT manager who needs to understand the complexity and challenges of managing an IT portfolio. The portfolio management techniques, analysis tools, and planning can be applied to any project or function.


Donavan R. Hardenbrook
Donavan R. Hardenbrook, New Product Development Professional, Intel Corporation
This book provides an excellent framework and real-world based approach for implementing IT portfolio management. It is a must-read for every CIO staff considering how to strategically and operationally impact their company's bottom line.




No comments:

Post a Comment