What Is A Wireless Router?: A.Chakrabarti ICT Sept Class 10
What Is A Wireless Router?: A.Chakrabarti ICT Sept Class 10
A router is a device that connects a number of devices together in a network, and routes data traffic between them. The only real difference between a wireless router and a standard network router (sometimes called an internet router) is that the wireless router has a radio antenna that can broadcast the same data that would otherwise travel over a network cable. A wireless router connects devices without wires, using radio signals transmitted between devices and the router. Even the earliest wireless routers supported broadband speeds of 1 Mbps or higher, so all WiFi routers are also wireless broadband routers. The latest and fastest standard is "Wireless N" (known also by it's technical name 802.11n) which supports speeds up to 600 Mbps. The Internet Service Provider controls the speed at which the local network can communicate with the Internet. A wireless adapter is a small radio receiver/transmitter that connects to a laptop or other device and communicates with wireless routers. Virtually every laptops, and most desktop computers, have a wireless networking adapter built into them these days. If not, you can buy a USB-compatible adapter. When you go shopping, ask for a "WiFi" adapter. (For all practical purposes, the terms "wireless" and "wifi" are interchangeable.) What Can You Do With a Wireless Router? In addition to getting your computers online, you can share files between computers, even share printers and other devices. Guests can bring their laptops and enjoy the Internet without carrying and plugging in cables. Wireless signals are needed for all those iPhones, iPods, iPads and other smartphones that wander in. Wireless printers can be placed anywhere, unrestricted by the length of a cable. Wireless game consoles, keyboards, joysticks, etc., make wireless gaming as effortless as couchsurfing. WiFi routers can connect any WiFi devices that come within their radio signals' range. Wireless internet routers enable public WiFi "hot spots," areas in which you can connect to the Internet with a laptop or other wifi device. Coffee shops, book stores, and other locations may provide WiFi hot spots. WiFi for mobile devices is built into many phones, and other gadgets like the iPod Touch and iPad. This is handy for devices that cannot make a 3G cellular connection, or in places where the cell signal is weak. The downside is that you have to stay near a wifi hot spot or lose the Internet connection. Wireless Routers on the Market Netgear's Wireless-N 300 WiFi router is an inexpensive, reliable, and can be easily set up. It includes wireless parental controls and a broadband usage meter. The meter alerts you when your bill is getting too large. Cisco Systems Valet and Valet Plus wireless routers are designed to be intuitively obvious to set up. The Plus model has a second radio antenna and a Gigabit Ethernet hardwire connector; both enable faster Wireless N speeds. How Does Bluetooth Work?
Bluetooth enables two devices, usually within a short range, to connect to each other without cables or wires. The obvious advantage of Bluetooth technology is that it reduces the clutter of wires! But it also enables people to be in contact with each other and carry on with their work even when they are on the move. Bluetooth technology can be applied to a wide range of devices in areas like medicine, software, and mobile communications. Bluetooth is simple to install, easy to use, and can be used in number of devices such as digital cameras, mobile laptops, phones, printers, PCs, and video game consoles over a globally unlicensed, secure, short-range radio frequency.
Two Bluetooth enabled devices can communicate with each other using low power radio waves, and to eliminate interfering with other Bluetooth enabled devices, the signal is kept
A.Chakrabarti ICT Sept Class 10
extremely weak. When two Bluetooth enabled devices come within the range of each another, they automatically form a network between themselves and start communicating with each other. Usually, a Bluetooth device can connect to another Bluetooth device only when it comes within a 10 meter radius (about 30 feet) of that device. Within this range, a Bluetooth enabled device can simultaneously connect with up to 8 devices. But to avoid
cluttering, Bluetooth uses a technology called spread-spectrum frequency hopping, which does not allow more than one device to transmit on the same frequency at the same time.
Where is Bluetooth Used? In practical usage, bluetooth enables wireless communication between a headset and a mobile phone, or a mouse and the computer. Bluetooth-enabled PDAs can wirelessly sync up to a desktop, and in automobiles the technology can be used to enable a GPS or cell phone to "broadcast" audio to your car speakers. The technology is also being used in game controllers, digital cameras and medical monitoring devices. The term "toothing" refers to the process of discovering other nearby Bluetooth enabled devices. A few years back, a hoax perpetrated the notion that toothing was being widely used to arrange random sexual encounters on trains and subways. Security in Bluetooth The automatic connection of Bluetooth devices enables people to send you data without your permission. To avoid this misuse, almost all the Bluetooth enabled devices carry an option that asks the users whether they wish to grant access to another Bluetooth enabled device that is trying to gain access to the user's device. The user can establish a list of trusted devices that can automatically gain access to his device. Other devices have to ask permission before they are granted access. Bluetooth Health Concerns Since Bluetooth uses the microwave radio frequency spectrum to establish communication with other devices, there are concerns about the effect of these frequencies on health. But studies have confirmed that the microwave frequency emitted by Bluetooth devices is within the permissible range and they do not cause any damage to the human tissues. Also, the microwave frequency emitted by Bluetooth devices is much lower than that of the mobile devices. All these factors make Bluetooth devices a safe and convenient device to use.
Wireless Taps? In the last few years, wireless home networks have exploded onto the scene, driven by inexpensive equipment and the desire to set up home networks quickly and easily to access broadband Internet connections. Wireless networks require no drilling and eliminate unsightly cables hanging from the ceiling or tangling under desks. However, many home users don't realize that by eliminating cables, they are exposing themselves to significant security risk. Cabled networks have an inherently secure feature; only computers physically attached to the network can access the data. Wireless networks, however, are often configured by default to allow access to any computer that attempts to connect to the network. In other words, anyone driving by with a laptop looking for stray wireless signals or anyone with a wireless network card in a neighboring house can use networks configured in that way. Since wireless networks are so easy to set up, users often don't realize that they are offering free bandwidth to anyone who wants to use it for any purpose. Obviously, most people would not want to allow their home network to be used for possibly illegal activity, like transmission of child pornography or spamming. But many don't know how to keep it from happening.
Wireless Security and Encryption Two wireless security encryption standards you can use. Wireless Encryption Protocol (WEP) has been supported by all routers and wireless adapters, and provides adequate security for home users. Newer routers and wireless adapters offer the even more secure WiFi Protected Access (WPA), the latest standard in wireless network encryption.
A.Chakrabarti ICT Sept Class 10
Configuring WEP and WPA Since there are many different router manufacturers, and they all have their own setup procedures, it's not possible to cover WEP/WPA configuration for all products. The first step is to configure your wireless router to use encryption. (Some routers are shipped with encryption turned off, and some are configured with default passwords that must be changed.) This requires connecting to the router physically (usually using a network cable or USB cable) and setting the security to WEP or WPA following the instructions that came with the router. (Trying to configure the network while connected wirelessly is difficult, because the computer loses connection immediately when the security change kicks in.) To connect with your router, you'll need to know its IP address. Open a Windows command prompt by clicking Start / Run, then enter CMD and press Enter. When the command prompt window appears, enter the IPCONFIG command. The address shown on the Default Gateway line is the one you want, and is usually 192.168.0.1 or 192.168.1.1 Your router's manual should tell you the address if you can't otherwise find it. Open your web browser and enter i.e.: http://192.168.0.1 (but use the correct address for YOUR router). After Encryption is ON provide a key (password) that any wireless computer will need to connect to your network. Remember, the screenshot above is just an example. If you have a different router, the screen will be somewhat different, but those are the basics. See the screenshot above for a D-Link DI614 router that supports the WEP standard. WPA networks require a password -- sometimes called a passphrase or Pre-Shared Key (PSK) -- that is used to authenticate computers attempting to connect to the network. I recommend that you make your WPA password at least thirty-two characters long and a mixture of uppercase letters, lowercase letters, and numbers to enhance the security of your network.
RADIUS security is for business networks and requires a separate server on the network to manage security.
Configuring Your Wireless Adapter Windows XP has greatly simplified making a wireless connection, so in most cases you will simply be prompted to enter the security password. Your wireless computers should now be able to connect to the network and share the Internet connection. IP Address Also known as an "IP number" or simply an "IP," this is a code made up of numbers separated by three dots that identifies a particular computer on the Internet. Every computer, whether it be a Web server or the computer you're using right now, requires an IP address to connect to the Internet. IP addresses consist of four sets of numbers from 0 to 255, separated by three dots. For example "66.72.98.236" or "216.239.115.148". Your Internet Service Provider (ISP), will assign you either a static IP address (which is always the same) or a dynamic IP address, (which changes everytime you log on). ISPs typically assign dial-up users a dynamic IP address each time they sign on because it reduces the number of IP addresses they must register. However, if you connect to the Internet through a network or broadband connection, it is more likely that you have a static IP address.
What is a static IP address/dynamic IP address? A static IP address is a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet. Computers use IP addresses to locate and talk to each other on the Internet, much the same way people use phone numbers to locate and talk to one another on the telephone. When you want to visit whatis.com, your computer asks a domain name system (DNS) server (think telephone information operator) for the correct dotted quad number (think phone number) for whatis.com and your computer uses the answer it receives to connect to the whatis.com server. A.Chakrabarti ICT Sept Class 10
It would be simple if every computer that connects to the Internet could have its own static IP number, but when the Internet was first conceived, the architects didn't foresee the need for an unlimited number of IP addresses. Consequently, there are not enough IP numbers to go around. To get around that problem, many Internet service providers limit the number of static IP addresses they allocate, and economize on the remaining number of IP addresses they possess by temporarily assigning an IP address to a requesting Dynamic Host Configuration Protocol (DHCP) computer from a pool of IP addresses. The temporary IP address is called a dynamic IP address for the duration of that Internet session or for some other specified amount of time. Once the user disconnects from the Internet, their dynamic IP address goes back into the IP address pool so it can be assigned to another user. Even if the user reconnects immediately, odds are they will not be assigned the same IP address from the pool. To keep our telephone telephone analogy going, using a dynamic IP address is similar to using a pay phone. Unless there is a reason to receive a call, the user does not care what number he or she is calling from. There are times, however, when users who connect to the Internet using dynamic IP wish to allow other computers to locate them. Perhaps they want to use CU-SeeMe or use a VoIP application to make long distance phone calls using their IP connection. In that case, they would need a static IP address. The user has two choices; they can contact their ISP and request a static IP address, or they can use a dynamic DNS service. Either choice will probably involve an additional monthly fee.
Streaming media Streaming media is video or audio content sent in compressed form over the Internet and played immediately, rather than being saved to the hard drive. With streaming media, a user does not have to wait to download a file to play it. Because the media is sent in a continuous stream of data it can play as it arrives. Users can pause, rewind or fast-forward, just as they could with a downloaded file, unless the content is being streamed live.
Here are some advantages of streaming media: Makes it possible for users to take advantage of interactive applications like video search and personalized playlists. Allows content deliverers to monitor what visitors are watching and how long they are watching it. Provides an efficient use of bandwidth because only the part of the file that's being transferred is the part thats being watched. Provides the content creator with more control over his intellectual property because the video file is not stored on the viewer's computer. Once the video data is played, it is discarded by the media player. Media is usually streamed from prerecorded files but can also be distributed as part of a live broadcast feed. In a live broadcast, the video signal is converted into a compressed digital signal and transmitted from a Web server as multicast, sending a single file to multiple users at the same time.
Streaming media is transmitted by a server application and received and displayed in realtime by a client application called a media player. A media player can be either an integral part of a browser, a plug-in, a separate program, or a dedicated device, such as an iPod. Frequently, video files come with embedded players. YouTube videos, for example, run in embedded Flash players. Streaming media technologies have improved significantly since the 1990s, when delivery was typically uneven. However, the quality of streamed content is still dependent upon the user's connection speed.
Wi-Fi is the technology used for wireless networking. If your computer has a wireless card, it is most likely WiFi compatible. The wireless card transmits to a wireless router, which is also based on the Wi-Fi standard. Wireless routers are often connected to a network, cable modem, or DSL modem, which provides Internet access to anyone connected to the wireless network. Bluetooth is the technology often used for wireless keyboards and mice, wireless printing, and wireless cell phone headsets. In order to use a device such as a Bluetooth keyboard or mouse, your computer must be Bluetooth-enabled or have a Bluetooth adapter installed. Computers may also use other wireless technologies aside from Wi-Fi and Bluetooth. Products such as remote controls and wireless mice may use infrared or other proprietary wireless technologies. Because of the many wireless options available, it is a good idea to check the system requirements of any wireless device you are considering buying. A.Chakrabarti ICT Sept Class 10
Cable Modem A cable modem is used for connecting to the Internet and is much faster than a typical dial-up modem. While a 56K modem can receive data at about 53 Kbps, cable modems support data transfer rates of up to 30 Mbps. That's over 500 times faster. However, most ISPs limit their subscribers' transfer rates to less than 6 Mbps to conserve bandwidth. Another important way that a cable modem is different than a dial-up modem is that it doesn't connect to a phone line. Instead, the cable modem connects to a local cable TV line, hence the term "cable modem." This allows cable modems to have a continuous connection to the Internet. Therefore, there is no need to dial your ISP every time you want to check your e-mail. Cable modems, which have a much more complex design than dial-up modems, are usually external devices, but some models can be integrated within a computer. Instead of connecting to a serial port like a external dial-up modem, cable modems attach to a standard Ethernet port so they can transfer data at the fastest speed possible. DSL (Digital Subscriber Line) Stands for "Digital Subscriber Line." It is medium for transferring data over regular phone lines and can be used to connect to the Internet. However, like a cable modem, a DSL circuit is much faster than a regular phone connection, even though the wires it uses are copper like a typical phone line. An asymmetric DSL (ADSL) connection allows download speeds of up to about 1.5 megabits (not megabytes) per second, and upload speeds of 128 kilobits per second. That is why it is called ADSL and not just DSL (because of the asymmetric speeds). There is also a "Symmetric Digital Subscriber Line" (SDSL) which is similar to ADSL, but allows data transfer speeds of 384 Kilobits per second in both directions. Theoretically, this type of connection allows download speeds of up to 9 megabits per second and upload speeds of up to 640 kilobits per second. The difficult part in establishing an DSL circuit is that it must be configured to connect two specific locations, unlike a regular phone line or cable modem. DSL is often seen as the new, better alternative to the older ISDN standard. Broadband booster (1) A device that improves traffic in a broadband network. Residing between the router and the WAN modem (cable, DSL, etc.), it typically adds a quality of service (QoS) function for voice and video by giving real-time streams a higher priority than email, Web and other data transfers. (2) A device that amplifies the antenna signal in a wireless network.
A.Chakrabarti
ICT
Sept
Class 10