18.08.2013 Views

upgrading and repairing PCs technicians ... - 400 Bad Request

upgrading and repairing PCs technicians ... - 400 Bad Request

upgrading and repairing PCs technicians ... - 400 Bad Request

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

284<br />

Chapter 11—Networking<br />

Wireless Network Configuration <strong>and</strong> Selection Issues<br />

Wireless NICs require an IRQ <strong>and</strong> I/O port address range, just as<br />

conventional NICs do. Other configuration <strong>and</strong> product selection<br />

issues include the following:<br />

• NIC Card Type—With most wireless networks, you can<br />

choose PCI-based NICs for desktop computers <strong>and</strong> PC Card—<br />

based NICs for notebook computers. Although the speed of<br />

current wireless networks also permits the use of ISA cards,<br />

you should avoid these because this 16-bit card design is<br />

obsolete.<br />

• Network Security <strong>and</strong> Encryption—For maximum security,<br />

select wireless network products that support either of<br />

these features:<br />

• A seven-digit security code called an ESSID; wireless<br />

devices without this code can’t access the network<br />

• A list of authorized MAC numbers (each NIC has a<br />

unique MAC); a wireless device not on the MAC list<br />

can’t access the network<br />

These features must be enabled to be effective. Also, use the<br />

strongest data encryption your network supports. Many of the early<br />

versions of IEEE 802.11b network devices supported only the<br />

“weak” 40-bit encryption when introduced, but installable updates<br />

to “strong” 128-bit encryption should be available later. You should<br />

switch to strong encryption as soon as possible to provide another<br />

layer of network security.<br />

TCP/IP Network Protocol Settings<br />

TCP/IP is taking over the computing world, replacing the hodgepodge<br />

of competing protocols used earlier in networking<br />

(NetBIOS, NetBEUI, <strong>and</strong> IPX/SPX). TCP/IP is the st<strong>and</strong>ard protocol<br />

of the World Wide Web, as well as of the latest network operating<br />

systems from Novell (NetWare 5) <strong>and</strong> Microsoft (Windows 2000).<br />

Even though it’s used by both dial-up (modem) users <strong>and</strong> LAN<br />

workstations, the typical configurations in these situations have<br />

virtually nothing in common. Use Table 11.13 as a guide to what<br />

must be set, <strong>and</strong> remember to record the settings your TCP/IP connections<br />

use.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!