13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

218<br />

Part IV: Using a <strong>Wireless</strong> Network<br />

address. Similarly, when your router connects to the Internet, it’s assigned<br />

its own public IP address: that is, its own identifying location on the Internet.<br />

Traffic flowing to and from your house uses this public IP address to find its<br />

way. After the traffic (which can be gaming data, an e-mail, a Web page, whatever)<br />

gets to the router, the NAT function <strong>of</strong> the router figures out to which<br />

PC (or other device) in the house to send that data.<br />

One important feature <strong>of</strong> NAT is that it provides firewall functionality for your<br />

network. NAT knows which computer to send data to on your network<br />

because that computer has typically sent a request over the Internet for that<br />

bit <strong>of</strong> data. For example, when a computer requests a Web page, your NAT<br />

router knows which computer made the request so that when the Web page<br />

is downloaded, it gets sent to the right PC. If no device on the network has<br />

made a request — meaning that an unrequested bit <strong>of</strong> data shows up at your<br />

public IP address — NAT doesn’t know where to send it. This process provides<br />

a security firewall function for your network because it keeps this unrequested<br />

data (which could be some sort <strong>of</strong> security risk) <strong>of</strong>f your network.<br />

NAT is a cool thing because it lets multiple computers share a single public IP<br />

address and Internet connection and helps keep the bad guys <strong>of</strong>f your network.<br />

NAT can, however, cause problems with some applications that may require<br />

this unrequested data to work properly. For example, if you have a Web server<br />

on your network, you would rightly expect that people would try to download<br />

and view Web pages without your PC sending them any kind <strong>of</strong> initial request.<br />

After all, your Web server isn’t clairvoyant. (At least ours isn’t!)<br />

Gaming can also rely on unrequested connections to work properly. For<br />

example, you may want to host a game on your PC with your friends, which<br />

means that their PCs will try to get through your router and connect directly<br />

with your PC. Even if you’re not hosting the game, some games send chunks<br />

<strong>of</strong> unrequested data to your computer as part <strong>of</strong> the game play. Other applications<br />

that may do this include audio- and videoconferencing programs<br />

(such as Windows Messenger) and remote control programs (such as<br />

pcAnywhere).<br />

To get these games (or other programs) to work properly over your wireless<br />

home network and through your router, you need to get into your router’s<br />

configuration program and punch some holes in your firewall by setting up<br />

NAT port forwarding.<br />

Of the many routers out there, they don’t all call this process port forwarding.<br />

Read your manual. (Really, we mean it. Read the darn thing. We know it’s<br />

boring, but it can be your friend.) Look for terms such as special applications<br />

support or virtual servers.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!