Free Essay

Setting Up Home Network

In: Computers and Technology

Submitted By srikanth4u59
Words 667
Pages 3
Setting up a Home Network
Srikanth Gunda
Wilmington University

1. Overview of wireless networking technology
There are various types of wireless network which are wireless Local Area Network (WLAN), Wireless personal Area Network (WPAN), Wireless mesh Network. Wireless networks are convenient in home network, small schools and offices. Wireless network are basically suitable to interconnect cell phones and computers, printers, TVs which helps in easy communication.
Wireless network uses radio frequency rather than wire to communicate. Clients unite their gadgets which helps to communicate Wireless access points. The speed is relative to distance between the transmitter and receiver due to the utilization of radio frequency; consequently, the closer the client is to the transmitter the more the speed is. 2. Advantages of wireless networking technology
Wireless networking technology gives various benefits to the household and office use, some of these benefits are below:- I. Most of the working class families have few computers which are arranged in various rooms. It is expensive, and time-consuming to introduce cables to a network that are situated in rooms which helps them to impart the broadband communication hence a wireless router resolves the issue. II. As the clients stay in the coverage of the signal, he/she can move their gadgets easily around the house. This protects hours of cable reconnection as the gadgets can get web by long wireless facility. III. A wireless network makes it conceivable to get file and printers from anyplace in the house in light of the fact that printers are associated with one of computers in the network which is imparted by all the computers. 1. Security issues of wireless networking technology
Wireless networks have safety issues on the grounds that they submit information through radio frequencies and are susceptible to hackers if they are not secured. Hackers caper this opportunity to steal or crush data, access to the system and begin assaults which connect network bandwidth and deny access to approved clients.
In spite of these issues, there are approaches to protect wireless networks. One common methodology is the utilization of access limitations at the access points. The limitations are encryption and look out for MAC address. 2. Description of home wireless networking solution
To setup a household network, the first step is to figure out which gadgets need to be associated and how they are joined. Majority of the gadgets will be hooked to the network through wired associations while others by wireless connection. 3. The architecture of the Home Network
The gadgets in a common home network are situated in various rooms and in this way in the proposed architecture we propose that gadgets inside the same room be interconnected by use Unshielded Twisted Pair (UTP) link CAT 5e, and interconnection way one room to alternate room be given by method of wireless connections. The network will be divided into five clusters relying upon their area. The description of the individual clusters is as per the following
Cluster A - The living room. This cluster will host the following devices * Television * Home Theater * Dish Network * Play station.
Cluster B – The Library or Home office
This cluster will host the following devices * Desktop PC * Printer * Network attached storage.
Cluster C- The Bedroom
This cluster will host the following devices * Television * Xbox360
Cluster D- Main wireless router
The devices in this cluster will give the association with the outside world and will incorporate an ADSL modem, a wireless router and a firewall.
The physical architecture of the network in Fig. 1 shows interconnection of the individual through wireless bridges and for security reasons the association with the web goes by means of a firewall.

Cluster E- Mobile wireless devices.
This cluster will have cell phones, for example Mobile phones Tablets, Laptop computers and any other WIFI versatile gadget.

Fig. 1: The architecture of the Home network
References:
Home Network, Wireless Network and Computer Networking Made Easy http://www.home-network-help.com/ Connected Home - Easy Home Networking Guide
http://www.connectedhome.infopint.com/

Similar Documents

Premium Essay

Mr. Chan

...and Netgear that are available for home/office use by regular users from just accessing Internet to playing games and running small home based business. Many of the Linksys SOHO, or small office/home office, routers offer an inexpensive way to add a powerful router/firewall to a small home or office network. Router- A device that forwards data packets along networks. Firewall- Software-based or hardware-based and is used to help keep a network secure SOHO- Small office/Home office. Almost all of the Linksys WRT54G are dual antenna 4 port wireless residential/small business router. From my configuration experience with routers, they all have a 16-32 MB or RAM and 2-8 MB FLASH memory that can be used for editing the firmware or upgrading the ROM to enable more updated features. All Linksys, netgear and D-link routers inter-operate with both 802.11b and 802.11g network protocols, and they are capable of 128 bit WEP, WPA, WPA2 encryption, MAC address filtering, IP address filtering and Internet services control. It allows web browser based configuration, and supports data throughput of up to54Mbps. Almost all time depending on Internet service provider. Security is very important when configuring home based routers. You don’t want to leave your home network venerable to unauthorized users. At all cost you have to protect your resources, assets and your network bandwidth. When you are setting up a wireless access point at your home, you will need to protect it......

Words: 1248 - Pages: 5

Premium Essay

Android Tutorial

...service 9 Setting your location preferences 10 Signing into your Google Account 11 Resetting your Google Account password 12 Additional accounts 12 Backing up and restoring your data 13 Finishing setup 15 Working with widgets 34 Optimizing battery life 35 Working with apps 37 Opening and switching apps 38 Managing how apps use memory 40 Managing downloads 44 Entering and editing text 45 Using the onscreen keyboard 46 Entering text by speaking 50 Editing text 52 Home and Android basics 17 Getting to know Home 18 Using the touchscreen 19 Using the Navigation buttons 20 Waking the tablet 21 Finding your apps 22 Monitoring your tablet’s status 23 Status icons 23 Notification icons 23 Managing notifications 24 Status Details and Quick Settings 26 Securing your tablet 29 Customizing Home screens 31 AUG-3.0-100 Connecting to networks and devices 55 Connecting to mobile networks 56 Connecting to Wi-Fi networks 58 Connecting to Bluetooth devices 62 Connecting to a Windows computer via USB 65 Connecting to a Macintosh computer via USB 66 Sharing your mobile data connection 68 Connecting to virtual private networks (VPNs) 72 Working with secure certificates 74 Google Search 77 Searching your tablet and the web 78 Android User’s Guide 4 Using Google Search tips and tricks 82 Changing Google Search settings 84 Searchable items settings 84 Google Search settings 84 Settings 119 Opening Settings 120 Wireless & networks settings 121 Wireless & Network......

Words: 25338 - Pages: 102

Premium Essay

Systems Administrator

...wireless networks? The following exert is from Douglas Schweitzer, a free lance writer in Nesconset, N.Y. “There's no denying that, whether you consider unauthorized use legal or not, leaving your wireless network unsecured is a reckless decision. Even if you don't mind the idea of unauthorized users gaining access to your network, you should be aware that any illegal activity they engage in could be traced back to your computer.” Most new laptop computers come equipped with a wireless network card installed. They are programmed to automatically detect a wireless network in range, making it easy to view available networks. Rather it is a wireless network from a business or a home wireless network, if precaution is not taken those networks can be viewed and or accessed. The lack of securing your network is a great cause for concern. Many people who have internet services in their homes and businesses really don’t know many of the risks that are out there. The world has grown tremendously from one computer in their homes and businesses having access to the internet via dial-up to many computers connected in a small network in our homes and much larger networks in our businesses. Not only are computers connected in a wired network fashion, but they are being connected wirelessly without any protection such as encryption. With the affordability of wireless routers with wired ports available, the wireless generation is here to stay. Not only is wireless available in......

Words: 1162 - Pages: 5

Premium Essay

Nexus 4guidebook

...Google+, and other trademarks are property of Google Inc. A list of Google trademarks is available at http://www. google.com/permissions/guidelines.html. LG and the LG logo are trademarks of LG electronics Inc. All other marks and trademarks are properties of their respective owners. The content of this guidebook may differ in some details from the product or its software. For best results, make sure you’re running the latest Android system update. To check, go to Settings > System > About phone > System updates. All information in this guidebook is subject to change without notice. For online help and support, visit support.google. com/nexus. NEXUS 4 GUIDEBOOK ii Table of contents Part One: Using Nexus 4 1. Get started Insert a SIM card Charge the battery Get around Browse & organize your Home screens Touch & type Type text by speaking Why use a Google Account? What’s New in Android 2 2 4 7 10 14 16 18 20 24 24 27 31 iv 2. Explore your phone Swipe up for Google Now Swipe down for notifications & settings Relax with Google Play NEXUS 4 GUIDEBOOK Use & customize the lock screen Try Face Unlock Share content with Android Beam Change the wallpaper Take a screenshot Connect to keyboards, mice, & other devices 35 38 39 41 42 43 47 47 49 51 52 54 59 59 63 65 3. Use the Phone app Make a phone call Answer or divert calls Work with the Call log Place an Internet (SIP) call Listen to your voicemail 4. Use the keyboard Enter & edit text Try Gesture......

Words: 23961 - Pages: 96

Premium Essay

Pencils

...Modification of Software SAMSUNG IS NOT LIABLE FOR PERFORMANCE ISSUES OR INCOMPATIBILITIES CAUSED BY YOUR EDITING OF REGISTRY SETTINGS, OR YOUR MODIFICATION OF OPERATING SYSTEM SOFTWARE. USING CUSTOM OPERATING SYSTEM SOFTWARE MAY CAUSE YOUR DEVICE AND APPLICATIONS TO WORK IMPROPERLY. YOUR CARRIER MAY NOT PERMIT USERS TO DOWNLOAD CERTAIN SOFTWARE, SUCH AS CUSTOM OS. IF YOUR CARRIER PROHIBITS THIS, IF YOU ATTEMPT TO DOWNLOAD SOFTWARE ONTO THE DEVICE WITHOUT AUTHORIZATION, YOU WILL BE NOTIFIED ON THE SCREEN THAT THE PHONE WILL NO LONGER OPERATE AND BE INSTRUCTED TO POWER DOWN THE DEVICE. YOU MUST THEN CONTACT YOUR CARRIER TO RESTORE THE DEVICE TO THE CARRIER AUTHORIZED SETTINGS. SAFE™ (Samsung Approved For Enterprise) SAFE™: "SAFE™" (Samsung for Enterprise) is a mark for a Samsung device which has been tested against Samsung's own internal criteria for interoperability with certain third party security-related solutions for MDM and VPN. The testing includes field testing with local network connection and menu tree testing which tests functionality of the solutions in conjunction with the Samsung device. During the testing, the device is tested with the security solutions to see if the solutions work with the device as described by the third party security solution providers. The testing, for example, includes field testing with local network connection and menu tree testing which tests functionality of the solutions in conjunction with the Samsung device. For more ...

Words: 55362 - Pages: 222

Premium Essay

Nokia

...Personalisation Profiles Change your theme Home screen Organise your applications Telephone Call a phone number Search for a contact Call a contact Make a video call Make a conference call Use speed dial Use your voice to call a contact Make calls over the internet Call the last dialled number Record a phone conversation Turn to silence View your missed calls Call your voice mailbox Divert calls to your voice mailbox or another phone number Prevent making or receiving calls Allow calls only to certain numbers Video sharing Contacts About Contacts Save phone numbers and mail addresses Save a number from a received call or message Contact your most important people quickly Set a ringing tone for a specific contact 31 31 31 33 33 34 34 37 37 37 37 38 38 40 41 41 42 42 43 43 43 44 44 44 45 46 47 47 47 48 48 49 Contents Safety 5 Get started 7 Keys and parts 7 Change the volume of a call, song, or video 9 Lock or unlock the keys and screen 9 Insert or remove the SIM card 10 Insert or remove the memory card 12 Charging 13 Antenna locations 15 Attach the wrist strap 16 Headset 16 Switch the device on or off 16 Nokia account and Nokia's Ovi services 17 Copy contacts or pictures from your old device 17 Device set-up 18 Use the in-device user guide 19 Install Nokia Ovi Suite on your PC Explore Nokia's Ovi internet services Ovi by Nokia About Ovi Mail About Ovi Maps About Ovi Music About Ovi Store Basic use Touch screen actions Interactive home screen elements Switch between open......

Words: 29227 - Pages: 117

Premium Essay

Lensway

...Your HTC Desire User guide Before you do anything else, please read this Charge the battery The battery in your phone hasn’t been charged yet. While your phone is charging, it’s important that you do not remove the battery pack. Doing so can damage your phone. Also, please don’t try to take your phone apart. (If you do, it may invalidate your warranty.) Choose a rate plan wisely Your phone can use up a lot of Internet bandwidth really quickly. Before you use your phone, we strongly recommend that you talk to your mobile operator about data rates. If you’re on a standard data plan, the costs could really add up. Switching to a flat-rate plan could be a lot cheaper. Know about privacy laws Some countries have strict laws about how and when you can record phone conversations. For example, you may need to tell the person you’re speaking to before you start recording. It’s a good idea to find out what the laws are where you live before you use your phone’s recording feature. And finally, a few important words from our legal team (LIMITATION OF DAMAGES) To the maximum extent permitted by applicable law, in no event shall HTC or its affiliates be liable to you, any user, or third party for any indirect, special, consequential, incidental or punitive damages of any kind, arising in contract, tort, or otherwise, including, but not limited to, injury, loss of revenue, loss of goodwill, loss of business opportunity, loss of data, and/or loss of profits, regardless of the......

Words: 52151 - Pages: 209

Free Essay

Bolly

...Your T-Mobile myTouch 4G User guide Before you do anything else, please read this Charge the battery The battery in your phone hasn’t been charged yet. While your phone is charging, it’s important that you do not remove the battery pack. Doing so can damage your phone. Also, please don’t try to take your phone apart. (If you do, it may invalidate your warranty.) Choose a rate plan wisely Your phone can use up a lot of Internet bandwidth really quickly. Before you use your phone, we strongly recommend that you talk to T-Mobile about data rates. If you’re on a standard data plan, the costs could really add up. Switching to a flat-rate plan could be a lot cheaper. Know about privacy laws Some countries have strict laws about how and when you can record phone conversations. For example, you may need to tell the person you’re speaking to before you start recording. It’s a good idea to find out what the laws are where you live before you use your phone’s recording feature. And finally, a few important words from our legal team (LIMITATION OF DAMAGES) To the maximum extent permitted by applicable law, in no event shall HTC or its affiliates be liable to you, any user, or third party for any indirect, special, consequential, incidental or punitive damages of any kind, arising in contract, tort, or otherwise, including, but not limited to, injury, loss of revenue, loss of goodwill, loss of business opportunity, loss of data, and/or loss of profits, regardless of the...

Words: 46880 - Pages: 188

Free Essay

Ththt

...Microsoft Signature ® Start here for a refreshing PC experience. Contents Section 1: Setting up your new PC........................4-15 Section 2: Setting up your Windows Live ID.........16-23 Section 3: A quick overview of your new PC........24-28 Section 4: Information and support....................29-31 3 Setting up your new PC Use this guide to get up and running in nine simple steps. 4 Microsoft Engineers have spent time carefully tuning your Microsoft Signature PC to help achieve maximum performance, as well as, including software that makes it really fly. For you, that translates to a uniquely enjoyable experience. Your new computer is modified for even more reliability and streamlined to be as fast as it can be. And with Windows LiveTM Essentials, Internet Explorer® 9, Zune® music software, Microsoft® Security Essentials, and more, it’s loaded with features that are in perfect step with your lifestyle. With Microsoft Signature your computer’s contents and settings may differ somewhat from those of the manufacturer. Therefore, you should use this guide to set up your new PC. You’ll be off and running in just a few minutes. To get started, follow the simple steps beginning on the next page. 5 Step 1: Assign a name First things first. Power on your new computer, and you’ll be prompted to create a user name and computer name. 6 Step 2: Create a password It’s a good idea to create a password for your account. You can enter one......

Words: 1339 - Pages: 6

Free Essay

Gt-I8730T User Manual

...technological expertise. This user manual is specially designed to detail the device’s functions and features. • lease read this manual before using the device to ensure safe and proper use. P • escriptions are based on the device’s default settings. D • mages and screenshots may differ in appearance from the actual product. I • ontent may differ from the final product, or from software provided by service providers C or carriers, and is subject to change without prior notice. For the latest version of the manual, refer to the Samsung website, www.samsung.com. • ontent (high quality content) that requires high CPU and RAM usage will affect the C overall performance of the device. Applications related to the content may not work properly depending on the device’s specifications and the environment that it is used in. • vailable features and additional services may vary by device, software, or service A provider. • pplications and their functions may vary by country, region, or hardware specifications. A Samsung is not liable for performance issues caused by applications from any provider other than Samsung. • amsung is not liable for performance issues or incompatibilities caused by edited S registry settings or modified operating system software. Attempting to customise the operating system may cause the device or applications to work improperly. • oftware, sound sources, wallpapers, images, and other media provided with this......

Words: 19810 - Pages: 80

Premium Essay

Nt1330

...Unit 1 Assignment Windows 2008 Network Services DNS and DHCP are two important aspects in in any network setting. DNS convers URL’s to IP addresses so that we can just remember a URL instead of an entire IP address for whatever site that we want to access. DHCP is a network protocol that automatically assigns IP addresses to computers and other devices that are connected to any particular network. DHCP is useful no matter how large or small of a network you are on. The decision of whether or not you should configure DHCP for your home network would depend on how many devices are accessing your network and whether or not it is worth the time and effort. Personally if I only had my computer and phone as well as someone else’s devices accessing my network I would go through the trouble of configuring my DHCP, but if I were in a small business or large family with 15 or more nodes on my network I would then set up my DHCP. While setting up DHCP for your home network may not be one hundred percent necessary I believe that it is still a good idea so that you don’t have to preconfigure your IP addresses on your devices. As far as the larger application of a business I think that setting up your DHCP is crucial. Especially in a large business with users who are less knowledgeable as far as computers are designed. If you allowed these users to configure their own IP addresses the results could be disastrous and take a while to fix. Which is why setting up your DHCP is crucial. This......

Words: 292 - Pages: 2

Free Essay

S Examining the Major Characteristics of Mesopotamian (1) and Greco-Roman (2) Culture.

...Microsoft Signature ® Start here for a refreshing PC experience. Contents Section 1: Setting up your new PC........................4-15 Section 2: Setting up your Windows Live ID.........16-23 Section 3: A quick overview of your new PC........24-28 Section 4: Information and support....................29-31 3 Setting up your new PC Use this guide to get up and running in nine simple steps. 4 Microsoft Engineers have spent time carefully tuning your Microsoft Signature PC to help achieve maximum performance, as well as, including software that makes it really fly. For you, that translates to a uniquely enjoyable experience. Your new computer is modified for even more reliability and streamlined to be as fast as it can be. And with Windows LiveTM Essentials, Internet Explorer® 9, Zune® music software, Microsoft® Security Essentials, and more, it’s loaded with features that are in perfect step with your lifestyle. With Microsoft Signature your computer’s contents and settings may differ somewhat from those of the manufacturer. Therefore, you should use this guide to set up your new PC. You’ll be off and running in just a few minutes. To get started, follow the simple steps beginning on the next page. 5 Step 1: Assign a name First things first. Power on your new computer, and you’ll be prompted to create a user name and computer name. 6 Step 2: Create a password It’s a good idea to create a password for your account. You can enter one......

Words: 1339 - Pages: 6

Premium Essay

Linux Users, Groups, Files, and Directories

...no idea what to write about in relation to being a Unix Administration. After looking at the topics I chose “configuration of users, group, and file/directory permissions for several reasons. The first is that I did spend some time many years ago setting up an active directory infrastructure so I am hoping to relate how to set up users in Linux to mirror that structure; if that is at all possible. The second reason is that one of the first thing an server administrator would have to do after booting and loading a file system would be to define permissions’ to allow people to get access to either the application or data on the server. I suspect that a lot of thought would have to be put into doing this, if it is not done correctly it will be ad hoc or have to be redone multiple times to get it right. Having to redo it might require all of the users to lose access while it is being redone. I think explaining how to set up the file/directory permissions relating to the access capabilities of the user/groups will also be interesting to learn. Finally the other reason that I chose this topic is that it has the most words so I in my thinking if it took that long to describe the topic hopefully there will be enough material to fill up a research paper. My goal in doing the research is to gain an understanding on these topics and pass that information on to anyone that is as clueless as I currently am on Linux. I will accomplish this by separating the two topics into......

Words: 1954 - Pages: 8

Premium Essay

Technical Analysis of Gt-6312

...standards and technological expertise. This user manual is specially designed to detail the device’s functions and features. • lease read this manual before using the device to ensure safe and proper use. P • escriptions are based on the device’s default settings. D • mages and screenshots may differ in appearance from the actual product. I • ontent may differ from the final product, or from software provided by service providers C or carriers, and is subject to change without prior notice. For the latest version of the manual, refer to the Samsung website, www.samsung.com. • ontent (high quality content) that requires high CPU and RAM usage will affect the C overall performance of the device. Applications related to the content may not work properly depending on the device’s specifications and the environment that it is used in. • vailable features and additional services may vary by device, software, or service A provider. • pplications and their functions may vary by country, region, or hardware specifications. A Samsung is not liable for performance issues caused by applications from any provider other than Samsung. • amsung is not liable for performance issues or incompatibilities caused by edited S registry settings or modified operating system software. Attempting to customise the operating system may cause the device or applications to work improperly. • oftware, sound sources, wallpapers, images, and other media provided with this device S are......

Words: 16611 - Pages: 67

Premium Essay

Internet Privacy

...Internet privacy xbis / 219 may 18, 2013 Internet Privacy My expectations of using the internet in different settings differ depending on the setting. When I am at home using the internet I would except to have a higher level of security and Privacy. I have developed my own network at home so that I have good security on my network And on the information that is on my computer. I have personal things on them that I do not want Other people to have access to. Using the internet in a public setting such as a library or public café or using a wireless Hotspot in the same setting, my expectations are much lower. I do not know anything about the Security settings on these networks, so I would not look up personal information there. Many People are connected to these networks at the same time as I would be, and there are people out There that could easily get to your personal information. With these networks, no one should Assume that they are getting privacy, and/or good security on the pages that they are visiting. I have a neighbor that does not secure their wireless network and I could easily use their Network. By not securing their network they could easily set themselves up for someone hacking Their computers. I do not believe it is legal, or ethical to use another person’s wireless network Without getting permission. This is the same as stealing from your neighbor, because they are Paying for those services. I would not want anyone......

Words: 314 - Pages: 2