13.01.2013 Views

Wireless Home Networking - Index of

Wireless Home Networking - Index of

Wireless Home Networking - Index of

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

32<br />

Part I: <strong>Wireless</strong> <strong>Networking</strong> Fundamentals<br />

Transmission Control Protocol/Internet Protocol (TCP/IP) is the most common<br />

protocol for transmitting packets around a network. Every computer on a<br />

TCP/IP network must have its own IP address, which is a 32-bit numeric<br />

address that’s written as four groups <strong>of</strong> numbers separated by periods<br />

(for example, 192.168.1.100). Each number <strong>of</strong> these four sets <strong>of</strong> numbers is<br />

known as an octet, which can have a value from 0 to 255. The Internet transmits<br />

packets by using the TCP/IP protocol. When you use the Internet, the<br />

Internet service provider (ISP) — such as AOL, EarthLink, or your cable or<br />

DSL provider — assigns a unique TCP/IP number to your computer. For the<br />

period that your computer is connected, your computer “leases” this unique<br />

address and uses it like a postal address to send and receive information<br />

over the Internet to and from other computers.<br />

A router with the Network Address Translation (NAT) feature also helps to<br />

protect the data on your computers from intruders. The NAT feature acts as<br />

a protection because it hides the real network addresses <strong>of</strong> networked computers<br />

from computers outside the network. Many WAN routers also have<br />

additional security features that more actively prevent intruders from gaining<br />

unauthorized access to your network through the Internet. This type <strong>of</strong> protection<br />

is sometimes described generically as a firewall. Good firewall s<strong>of</strong>tware<br />

usually <strong>of</strong>fers a suite <strong>of</strong> tools that not only block unauthorized access<br />

but also help you to detect and monitor suspicious computer activity. In<br />

addition, these tools provide you with ways to safely permit computers on<br />

your network to access the Internet.<br />

Internet gateways<br />

These days, you can get a device that really does it all: a wireless Internet gateway.<br />

These devices combine all the features <strong>of</strong> an access point, a router, and<br />

a broadband modem (typically, cable or DSL, but this could also be a fiberoptic<br />

connection such as Verizon’s FiOS or even another wireless connection).<br />

Some wireless Internet gateways even include a print server (which<br />

enables you to connect a printer directly to the gateway and use it from any<br />

networked PC), a dial-up modem, and even some Ethernet ports for computers<br />

and devices that connect to your network with wires.<br />

For example, the Motorola Netopia MiAVo Series Gateways (www.netopia.com)<br />

include a built-in DSL modem, a router, a wireless access point, and other networking<br />

features such as a firewall and an easy-to-use graphical user interface<br />

(GUI) for configuring and setting up the gateway.<br />

Not many <strong>of</strong> these devices are on the market; you can’t buy many <strong>of</strong> them <strong>of</strong>fthe-shelf,<br />

but you can get them directly from your broadband service provider.<br />

The term gateway gets used a lot by different folks with different ideas about<br />

what such a device is. Although our definition is the most common (and, in<br />

our opinion, correct), you may see some vendors selling devices that they<br />

call Internet gateways that don’t have all the functions we describe. For

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!