Saturday, November 27, 2010

Understand your home network

A home network is a very complex issue. Taking information from one place to another, which might not eve on the same continent is a pretty big deal. This article will not go into too much technical jargon, but it will be an in-depth answer to the general (and some complex) questions about networking, especially wireless networks. We see the most fundamental aspects of a wireless network in a question / answer format.

How does the signal get my computer to myrouter, Internet, and vice versa?

When a computer user is connected to the Internet are almost constantly sending signals to multiple locations. The way this is done from binary code. Any user is not divided and transmitted in binary code (in this case, wireless) to the router and then to the destination that you gave. In the case of a wireless connection, the card is sent to the wireless router using a protocol called CSMA / CA (CarrierSense Multiple Access with Collision Avoidance) that allows only one node (or computer) access to the router at once. If a computer uses the router and a second computer may also use the second system is sent a "busy signal" and must wait a certain period of time. When time expires, the request of the computer. For reference, a cable connection using CSMA / CD (Carrier Sense Multiple Access with Collision Detection), which allows the computer to sense whenanother node is using the router. In this way the request is sent in the first place.

This, of course, makes more sense, but it is not possible with a wireless connection, since there is no permanent connection to the router. Connections involving stops when the request is met, unlike the cable connection that is always the cable. The router is now based on the OSI 7-layer model (which is too large and sophisticated to fit in this article, but Google can andfriend) host.Basically to receive information to and from the destination, the router (which by the argument will run as a DNS server in this scenario) is the IP address assigned by Google and launches its request Google for their web server . The link is at the door 80 for accessing a Web page and then processed by a web server for Google. The signal is sent in the same way it was sent from the computer. When it comes toback, the user sees on the display of Google. This process is done very quickly if you see sometimes a matter of less than one second. If you live in the U.S. and the Web server in China (again, just for the sake of argument), the speed with which this happens is quite impressive to the uninitiated. This is a brief description of how the process works.

What protection is available for wireless networks?

There are some optionswireless encryption. Encryption is very useful because it helps to get people out of your wireless network, if they should not. This is basically a password protection for the connection. Some of the most popular choices are:

WEP (Wired Equivalent Privacy)

WEP uses a 128-bit encryption system using a series of 26 hexadecimal (base 16) characters. 256-bit is available, but historically it is quite unusual. This encryption method is a bit 'datedbut it is still used by some. This is replaced by safer WAP and WAP2 discussed below. The way in which a computer is checked by receiving a clear challenge to the router for encryption and the challenge of delivery.

WPA and WPA2 (Wi-Fi Protected Access)

WPA2 is preferred by many because it is probably the safest available for home users. A 256-bit key used to encrypt all network traffic. There are two types of WPA, TKIP and PSK. Let usdiscuss this a bit ':

TKIP

Temporal Key Integrity Protocol (TKIP) was designed originally designed to replace WEP WEP without replacing the hardware. The repaired many of the flaws of WEP, but has had its problems, including the ability to be decoded by others in short bursts. This was a problem with the WEP, which is passed, TKIP.

PSK

Pre-Shared Key mode (PSK) is designed for those who do not need sophisticated security, such as home users. A number of minorCompanies use this as well. It offers a password-protected security is in decent though not as strong as a large company can have. Many home users to implement this because of its ease of use. The only real weakness of this protocol that a user at home should be concerned about a weak password. weak passwords are the main reasons that sometimes lose some effectiveness.

Advice on network security

There are some things that the average home user can do to ensuretheir network and your computer from intruders. The network, set a strong password is essential. This should be placed at the top of someone. Second, by hiding the router Service Set Identifier (SSID) works very well. If the hacker can not find the network, can not penetrate the network. What if one of the personal computer, immediately change the Administrator account a different name. Hackers try this account most of the time, in order to gain administrative access onuser. If the user name is still responsible for the potential attacker has won half the battle. The only unknown is the password. However, if the FozzyBear administrator user name or user name or password is known and the attacker has to spend much more time and will probably just give up, even if they manage the network. As a side note, a good anti-virus and firewall are not forgotten. These are vital for information security generally.

If you havequestions, please contact me via my website below and I'll gladly answer.

Friends Link : Memory Module

No comments:

Post a Comment