Before we talk about wireless network security, we must first understand how a wireless network operates.  
For most home and small business users, a wireless network   is basically a set of devices that enable all of the personal  computers  in your location to use a broadband internet connection  simultaneously.  
Wireless networks  don't use cables for connections, but instead  use radio waves, like  cordless phones. Also known as Wi-Fi, or Wireless  Fidelity, wireless  networks allow you to use your networked computers or  laptops anywhere  in an office or home.    
Wireless networking is also available in public "hotspots," like coffee shops, hotel rooms and lobbies, and airports.   
You may have heard the term "Internet Cafe".   This refers  to a place of business (most often, a coffee shop) which  offers wireless  network access for anyone who wants to bring in a  laptop equipped with a  wireless network card. The wireless network card  picks up the wireless  network signal and the two communicate over that  signal. Here's a web page which talks about the wireless network security risks of using Internet Cafes, if you are interested.  
But,  just as with a cell phone, a wireless network (and any  computer you  have connected to it) can be hacked, especially if it isn't  secured.   
CAVEAT and Disclaimer:   Wireless networks are inherently unsafe and cannot be completely   secured, as there are hackers who will always be one step ahead of the   commercial security vendors.    
So  I, Ellen Davis, do not guarantee that your wireless network  security  will be impenetrable after completing the steps offered on  this site.  
However,  in my opinion, the majority of hackers are going after  bigger fish,  and don't have much interest in your wireless home network,  except  maybe to use it for free internet access.  
So  unless you are storing hundreds of credit card numbers on your   computers for some reason, or you have some kind of important   information that can be sold on the black market, or you make some   hacker mad, applying the steps below will help ensure your wireless network security is at least better than it would be if you did nothing.  
Let's take a closer look at setting up a wireless network and the best practices for building in wireless network security.  
First, here’s a list of components needed to build a basic home or small office wireless network: 
- Windows based personal computers, and/or personal laptops with Windows XP SP2 installed. (Windows XP SP2 is compatible with WPA2 Personal encryption, which is what I recommend using).
- WPA2 enabled wired or wireless network adapters, which should be (or may already be) installed in each of your computers. If you aren't sure whether Windows XP and the network cards installed on your computer are enabled for WPA2, here's an excellent page that walks you through how to upgrade Windows XP, routers and network cards to WPA2.
- Ethernet cables, also known as CAT 5 cables. They come in 3, 6, 10, 25, and 50 foot lengths. Desktop and laptop computers won’t need a cable if a wireless network card in installed.
- A wireless router that supports WPA and WPA2 encryption. There are many different brands, but I use Linksys wireless routers because they are reliable and easy to set up. They cost around $60 in the big office supply or computer stores.
- A broadband internet connection.
- The wireless network security steps below.
Second, you need steps on how to secure a wireless network. I've included the details on how to implement reliable wireless network security below: (I'm   assuming that we are in your home or small business office, and that   you have a desktop PC wired into your broadband box and that you will be   using a new Linksys router):  
- First, you must have either a regular or wireless network card in all of the computers in your house.    For most wireless networks, a desktop computer nearest to the   broadband jack will be connected via a wired network card and cable.   Laptops or any other computer not close to the router will be connected   via wireless card (or long CAT 5 cable).  IMPORTANT Note:    If you have older network cards, they may not be compatible with the   new WPA2 security protocol. Upgrade the drivers or the cards if you    have to, because relying on any other security protocol like WEP is just   not as good when it comes to wireless security.  
 You may also need to upgrade Windows XP SP2 to be compatible with WPA2 security. Here's the Microsoft page to do this.
 
- If you haven’t done so already, place an order for a broadband (aka high speed) internet service installation with your local internet service provider. (This can be a cable company, the telephone company or a wireless tower provider – shop around for the best deal).
- Purchase a wireless router and install it. NOTE: Be careful about buying used routers; the previous owner could install malicious software on them that could hurt your computer. New is better if you don’t know how to clean them up.
- Following the instructions that come with the router, set it up next to the computer that is plugged into the broadband connection box.
- IMPORTANT!! SECURE your  wireless  router. Follow each of these steps to make sure your wireless  network  security is reliable and your network is safe from outside  intrusion: - Change the default wireless network name or SSID to something unique but not personal (no social security numbers or house addresses). The name you choose can be up to 32 characters long and you need to be able to remember it. Linksys sets the default name to Linksys on their routers and every hacker in the world knows that, so don’t leave it unchanged.
- Change the default password. Linksys sets a default password of admin, and every hacker knows that too. Change it to a password that includes both letters and numbers. Avoid using words that can be found in a dictionary. Also, make sure you either remember it or note it somewhere secure. You will need if you want to access your router later to make changes.
- Enable Encryption. Linksys routers offer several kinds of  security protocols – WPA, WPA2 and WEP are the major types.    The  newest and most secure kind of encryption is WPA2.  Both WEP  and  WPA  have already been cracked by hackers.  WPA2 is the most secure, so I   would implement it over the other choices.  
 When the router setup asks you to choose a wireless security encryption method, choose security mode "WPA2 Personal". Then choose algorithms "TKIP+AES". Choose a strong password for your encryption key, such as a combination of letters and numbers. It can be from 8 to 63 characters, I would use at least 14 characters. Leave the key renewal interval as it is, and save the setting. Make sure you can remember the key. I hate to tell you to write it down, but if you must, you must.
 Later, when you try to connect your wireless clients to your network, the card utility should automatically ask you for the preshared key. Enter it twice and you should get connected. If not, please check that the wireless card in the computer is actually compatible with WPA/WPA2.
 Note: If you have an older router that supports WEP only, and you don't want to upgrade it, please remember that WEP is very easy to crack, so your wireless network won't be as secure. You'll be at least safer if you use 128-bit WEP keys, but I would recommend that you check the router manufacturer's website for a firmware upgrade that will add WPA support.
- DON'T turn off SSID Broadcasting.  A wireless  router can  broadcast its SSID name by sending out a continuous radio  ping.  This  is convenient for people trying to connect to it, because  they don’t  have to remember the name of the network.  It seems like it  would be  good to turn that off, but on Windows XP, it isn't a good idea.      Windows XP, by default, always tries to connect to the first   broadcasted wireless network.  If you turn off SSID broadcasting,   Windows XP won't connect to your network first if it finds a   broadcasting network in close enough range.  That's not good wireless   network security, for sure. So it's best to continue broadcasting while   implementing WPA2 encryption instead.  
 Plus you won't have to choose to connect to "nonbroadcasting networks" on your computers, and then type in the name of the network to connect to it.
- You have now successfully implemented wireless network security on your router that should keep your data relatively safe (see caveat above for more info).
 
- Change the network card settings in each of your PCs to match the router settings. Pay particular attention to the SSID, the type of encryption, and the key you used when you set up the router. You’ll need to know this info when are ready to connect any wireless PCs or laptops. Wired computers will get the information they need automatically, as long as the network card is set up to use DHCP, which basically means the network card goes out and gets what it needs from the network automatically.
- If you have a laptop with a wireless card, check to make sure the wifi capabilities are on. NOTE: On some laptops, there is a switch or button on the laptop that turns the wireless network card on or off. If you are having trouble "seeing" the wireless network, you may have to "turn on" your wireless network card.
- Once your computer network cards have the network information that matches the router, they will connect and you’ll be able to connect to the internet, with confidence that your wireless network security is set up correctly.
- Note: Look for the wireless signal strength in  the system  tray located in the bottom right hand corner of your Windows  desktop.   It will look a bunch of colored bars.    Green means the signal is strong, yellow is weaker, and red means no signal at all.   Walk around your house with your laptop and see how good the signal is in each room.   
 Being able to work anywhere in your house depends on how big your house is, and where your wireless router is located. As you walk around, you’ll see the signal strength icon in the Windows system tray changed.
 Very quickly, you’ll find out the best places to be for full network speed. It's makes working on your computer kind of fun, and now you have the peace of mind that your wireless network security is keeping your computers safe. All done! You now know the best steps for setting up a wireless network and configuring strong wireless network security. I hope this information helps you keep your computers and your data safe.
Choosing the Best Computer Network
Choosing the Best Computer Network
Your  business is growing. Is it time for a computer network? You've  added 2  new staff members in the past year, and all 5 employees are   complaining about the increasing difficulty of sharing files. Your   billing database is on a computer which can only be accessed by your   administrative assistant and you are concerned about not having a   centralized backup of the files being saved on each employee's computer.    If all this sounds familiar, it may be time to implement a computer   network
Network Basics
Networks  begin when two or more computers are  connected so that information can  be shared.  In order to connect to any  kind of network, a computer  requires a network card and CAT5 or CAT6  cables.  (If the computer has a  "wireless" network card, radio signals  can be used in place of the  cables.)  A network also requires a piece of  equipment called a switch,  which acts as a central routing "hub" for  the information being  shared.  A switch is kind of like a mail room in a  large company.  It  makes sure the addressed messages get to the right  recipient.
You  may have heard the term LAN or WAN.  LAN stands for  Local Area  Network, and usually denotes a network of computers which  are fairly  close together, say in the same building or office.  WAN  stands for  Wide Area Network. WANs usually connect local area networks  which are  separated by great distances. (For example, a larger company  may have  an office LAN in Seattle, and an office LAN in Boston. These  two LANs  could be connected via a WAN data line.)
Peer to Peer Networks
The most basic type of network is a called a peer to peer network.    This type of network consists of several computers which are  connected  to each other.  The "network" consists of shared folders  located on  computers within the network.  
These  folders are set to a  "shared" status, so that other people connected  to the network can  access them.  Each shared folder is accessed by the  users of the  network, who set up a certain drive letter (say H:) as a  "pointer" to  the shared folders on other computers. In addition, any  printers  connected to any computer can be shared to other network  users.  
  Here's an example. Susan and Joe work together in a small office and   need to look at files on each other's computers.  Susan creates a folder   called "SusansFiles" on her computer and sets it up as a shared  folder.   Joe can then use the network connections to "see" the folder  called  "SusansFiles".  
He sets up a  permanent shortcut called "H:" drive to  the folder called  "SusansFiles".  Now when he turns his computer on,  Windows Explorer  will show the folders on his computer's C: drive, the  CDROM D: drive  and the shared H: drive as his available file locations.   Susan can do  the same with a folder that Joe shares out from his  computer.
Benefits of a Peer to Peer Network:
- A peer to peer network is inexpensive to set up. It uses the built in networking capabilities of Windows XP Professional (or Vista Business), so no special software is needed. It allows for file and printer sharing, and can be an adequate choice for a very small office.
Limits of a Peer to Peer Network
- Peer to peer networks are dependent upon the computer knowledge of each employee, as certain rules must be followed in order to minimize network interruptions. If a user shuts down his machine in the middle of the day, other users on the network lose access to the files in that machine's shared folder. In the picture provided above, the laptop might only connect to the network when an employee is not traveling. Any files stored on that laptop are not available (and may not be backed up) when that employee is out of the office.
- Network and data security are weak.
- Files are not centralized, so getting a back up of all critical files is more difficult.
- Ongoing tasks like anti-virus scanning and Windows updates are localized on each machine. Updating virus definitions and patches has to be done manually at each machine, which is time consuming.
.
Client Server Networks
A more common type of network is called a client server network.    This type of network uses a central server and specialized network   software. The server is dedicated and is only used to store files and   run server tasks. The computers which connect to the server are called   clients and these are the machines the company staff would use. 
The   server acts as the "hub" of the network, and does most of the "behind   the scenes" maintenance and storage. Common server network operating   systems include Windows Small Business Server 2003 or 2008, Windows   Server or Linux.
Benefits of a Client Server Network
Benefits of a Client Server Network
- The server stores all of the shared files for each user.
- The server runs the file backups which can be scheduled in the middle of the night, minimizing network interruptions.
- The server manages user security, and insures that all users who access the network are authorized to do so.
- The server manages printer sharing and acts as a central repository for the printer drivers and settings.
- The server manages other common tasks such as internet access, email routing, Windows updating and anti-virus definition management.
- The server can also share software applications out to multiple users.
- The server can also provide for an "Intranet", an internal website which holds shared company information such as news announcements, HR policies, training documents, and more. In short, a client server network provides for easier network administration, and provides a much more robust environment in which provide secure and manageable access to company data.
 Limitations of a Client Server Computer Network
The benefits of a client server computer network are substantial, but there are some limitations.
- A server based computer network is more expensive to implement. Server computers are powerful machines with built-in redundancy and other hardware to provide data safety. Hence, they cost much more than a simple desktop computer.
- The server network software is also much more powerful, complicated, and must be installed correctly to run all of the required tasks, and so the cost is higher for both the software and installation charges.
- The server is a critical point of failure. If it goes down, the entire network comes to a halt. This drawback can be minimized with the installation of redundant drives in the server (so that if one fails, the others will still be working), and even a second server that can take over if the primary server fails completely. Cost then becomes the only issue.
Which Computer Network is Best For Your Business?
Peer to peer computer networks   are reliant upon the computer users, so employee behavior is a major   factor.  Peer to peer networking could work for your business if you   have the following:
- Computer savvy employees whom you trust.
- Low employee turnover.
- Five or less employees.
- Newer desktop or laptop machines with lots of memory and hard drive space.
- A large capacity portable data storage unit for backing up files and taking them off site.
- Time and motivation to keep the computer patches and maintenance up to date.
A client server computer network is more secure, easier to manage, and would be a better solution for your business if the following is true:
- You want to secure your company data and provide access to certain files and folders to only a few employees.
- Your business experiences high employee turnover.
- You have more than 5 employees.
- A secure, complete backup of all of your critical business data is needed.
- A central information repository for your employees would be helpful.
- You want to have a cohesive email solution using a single domain address (i.e., jack@yourcompany.com, megan@yourcompany.com).
Think  of the cost of implementing a  network as an investment in your  business.  As your business grows,  implementing a computer network will  help your employees share  information and resources, and in the long  run, will play a major role  in the successful growth of your business. 
For enterprise solutions, there are a number of network assessment services that provide complete needs analysis and can create a custom solution to meet business objectives.
Networking Devices
Networking Devices
Computer network devices  also known as communication devices                      and they  constitute a data communication network.  These                       devices are routers, switches, hubs, LAN cards, gateway, modems,                       hardware firewall, CSU/DSU, ISDN terminals and  transceivers.                       In an Ethernet or WAN network, the  data communication cannot                      be performed without  these devices.  Being an IT professional                      or a  network administrator, you must have the good understanding                       of these devices.  
Based  on your business requirements, you have the select                       the best devices for your network and before selection, make                       sure that they are compatible with each other.  It is                       recommended that you select all the devices for your IT  infrastructure                      from the same vendor. 
The  top vendors are Cisco, D-Link, LinkSys, Baynet, RealTek,                       3Com, NetGear, Intel, Nortel, and Lucent etc.  A well                       designed IT infrastructure with the proper placement of the                       routers, servers, gateway and switches can reduce the  operational                      cost and enhances the overall  performance dramatically.
Routers
A  router is a communication device that is used to connect                       two logically and physically different networks, two LANs,                       two WANs and a LAN with WAN.  The main function of the                       router is to sorting and the distribution of the data  packets                      to their destinations based on their IP  addresses. Routers                      provides the connectivity  between the enterprise businesses,                      ISPs and in the  internet infrastructure, router is a main                      device.   Cisco routers are widely used in the world.                       Every  router has routing software, which is known as IOS.                        Router operates at the network layer of the OSI model.                        Router does not broadcast the data packets.
Switches
Like  the router, a switch is an intelligent device that maps                       the IP address with the MAC address of the LAN card.                        Unlike the hubs, a switch does not broadcast the data to all                       the computers, it sends the data packets only to the  destined                      computer.  Switches are used in the LAN,  MAN and WAN.                       In an Ethernet network, computers are  directly connected with                      the switch via twisted  pair cables.  In a network, switches                      use the three  methods to transmit the data i.e. store and                       forward, cut through and fragment free.
Hubs
The  central connecting device in a computer network is known                       as a hub.  There are two types of a hub i.e. active hub                       and passive hub.  Every computer is directly connected                       with the hub.  When data packets arrives at hub, it  broadcast                      them to all the LAN cards in a network  and the destined recipient                      picks them and all other  computers discard the data packets.                       Hub has five,  eight, sixteen and more ports and one port is                       known as uplink port, which is used to connect with the next                       hub.
Modems
A  modem is a communication device that is used to provide                       the connectivity with the internet.  Modem works in two                       ways i.e. modulation and demodulation. It coverts the digital                       data into the analog and analog to digital
LAN Cards
LAN  cards or network adapters are the building blocks of                       a computer network. No computer can communicate without a                       properly installed and configured LAN card. Every LAN card                       is provided with a unique IP address, subnet mask,  gateway                      and DNS (if applicable).  An UTP/STP cable  connects a                      computer with the hub or switch.  Both  ends of the cable                      have the RJ-45 connectors one is  inserted into the LAN card                      and one in the  hub/switch.  LAN cards are inserted into                      the  expansion slots inside the computer.  Different LAN                       cards support different speed from 10/100 to 10/1000.
Multiplexer
Multiplexer is a device that is used to combining the several                    electrical signals into one signal.
Computer Networks ++++
Computer Networks
Networks   are collections of computers, software, and hardware that are all   connected to help their users work together.  A network connects   computers by means of cabling systems, specialized software, and devices   that manage data traffic.  A network enables users to share files and   resources, such as printers, as well as send messages electronically   (e-mail) to each other.
Computer networks fall into two main types: client/server networks and peer-to-peer   networks.  A client/server network uses one or more dedicated machines   (the server) to share the files, printers, and applications.  A   peer-to-peer network allows any user to share files with any other user   and doesn’t require a central, dedicated server.
The most common networks are Local Area Networks or LANs   for short.  A LAN connects computers within a single geographical   location, such as one office building, office suite, or home.  By   contrast, Wide Area Networks (WANs) span different cities or even countries, using phone lines or satellite links.
Networks  are often categorized in other ways, too.   You can refer to a network  by what sort of circuit boards the  computers use to link to each other –  Ethernet and Token-Ring  are the most popular choices.   You can also refer to a network by how  it packages data for  transmission across the cable, with terms such as TCP/IP (Transmission Control Protocol/Internet Protocol) and IPX/SPX (Internet Package eXchnage/Sequenced Package eXchange).
Steps to Setting-Up a Network.
  All networks go through roughly the same steps in terms of design, rollout, configuration, and management.
Designing Your Network
 
Designing Your Network
Plan  on the  design phase to take anywhere from one to three working days,  depending  on how much help you have ad how big your network is.
Here are the key tasks:
- Settle on a peer-to-peer network or a client/server network.
- Pick you network system software.
- Pick a network language.
- Figure out what hardware you need.
- Decide on what degree of information security you need.
- Choose software and hardware solutions to handle day-to-day management chores.
   Rolling Out Your Network
 
Rolling out your network requires the following steps:
- Run and test network cables.
- Install the server or servers if you’re setting up a client/server network. (If you are setting up a peer-to-peer network, you typically don’t have to worry about any dedicated servers.)
- Set up the workstation hardware.
- Plug in and cable the Network Interface Cards (NICs – these connect the network to the LAN).
- Install the hub or hubs (if you are using twisted-pair cable).
- Install printers.
- Load up the server software (the NOS, or Network Operating System) if your network is a client/server type.
- Install the workstation software.
- Install modem hardware for remote dail-up (if you want the users to be able to dial into the network).
- Install the programs you want to run (application software).
   Configuring Your Network
Network configuration means customizing the network for your own use.
- Creating network accounts for your users (names, passwords, and groups).
- Creating areas on shared disk drives for users to share data files.
- Creating areas on shared disk drives for users to share programs (unless everyone runs programs from their own computer).
- Setting up print queues (the software that lets users share networked printers).
- Installing network support on user workstations, so they can "talk" to your network.
 Managing Your Network 
The work you do right after your LAN is up and running and configured can save you huge amounts of time in the coming months.
- Mapping your network for easier management and troubleshooting.
- Setting up appropriate security measures to protect against accidential and intentional harm.
- Tuning up your LAN so that you get the best possible speed from it.
- Creating company standards for adding hardware and software, so you don’t have nagging compatibility problems later.
- Putting backup systems in place so that you have copies of data and programs if your hardware fails.
- Installing some monitoring and diagnostic software so that you can check on your network’s health and get an early warning of implending problems.
- Figuring out how you plan to handle troubleshooting – educating your LAN administrator, setting up a support contract with a software vendor, and so on.
   Smooth Setup
 
  One key advantage of a peer-to-peer  network is that it’s easy to  setup.  With the simplest sort of  peer-to-peer network, you just use  the built-in networking that comes  with your operating system (Windows  98, Windows 95, MacOS, and so on)  and you have very little software to  set up – even less if you have  computers that have the operating system  preinstalled, as most computers  do these days.
For Windows 95 and Windows 98, the basic steps to setting up a peer-to-peer network are as follows:
- Sketch out your workgroup map.
- Figure out a naming convention (set rules for naming individual computers).
- Go to the first computer on your network and click Start – Settings – Control Panel.
- Double-click the Network icon to display the Network dialog box.
- Click the Configuration tab (if it isn’t already in the foreground).
- Click the File and Print Sharing button.
- Click both checkboxes so that they appear checked, and then click OK.
- Click the Identification tab.
- Make the computer a member of the workgroup by typing the workgroup name in the Workgroup: text box.
- Give the computer a unique name in the Computer name: text box.
- Repeat Steps 3-10 for each workstation in your new workgroup.
- Teach all the network users how to share files, directories, and printers.
Another  key advantage of peer-to-peer networking  is that you don’t have to buy  a computer that nobody can use as a client  workstation (something that  client/server networking requires).   Peer-to-peer networking offers  other cost advantages:
- The software is usually free. It either comes bundled with the workstation operating system or it is an inexpensive addition.
- The software is simple. You don’t have to spend the money and time required training someone to learn a complex, full-featured Network Operating System.
- Administartion is easy. Each user is a small-scale network administrator, responsible for whatever that user’s computer shares on the network.
Networking 101: Concepts and Definitions
Individual  computers provide  opportunities for tremendous productivity gains, but  they become many  times more powerful when they're connected to one  another in data  networks that give them the ability to share data and  processing  resources. With a network, five colleagues can read and edit  an evolving  document from their own computer with minimal effort and  coordination.  Without a network, these colleagues have to share time on  the same  computer or work out a process for exchanging removable  storage media  (for example, floppy diskette or USB drive). In a similar  fashion,  networks let us all realize economies of scale by running   resource-hungry applications on high-power hardware
In  this article we'll discuss some of  the basic concepts and definitions  underlying modern networks. In this  article's companion piece: Networking 101: Evaluating Your Needs and Options,   we'll define and describe the basic hardware components that   organizations need to acquire and install in order to build a network.   That article also contains a list of further resources that you can   consult for a more detailed, comprehensive explanation of networking   concepts and technologies.
What Is a Computer Network?
In  the broadest sense, a network is any  interconnected group of people or  things capable of sharing meaningful  information with one another. In a  technology context, network is  usually short for "computer network" or  "data network" and implies that  computers are the things sharing the  meaningful information. At a  conceptual level, all data networks  consist of nodes, which refers to any computer or digital device using the network and links, the physical connections (either wired or wireless) that carry messages between nodes.
Data  networks are important to all  contemporary organizations because they  provide faster, easier access to  any message or data that can be  represented and stored in digital  format. For example, when your  colleagues and predecessors research an  issue relevant to your  organization and share their data and conclusions  with you in a data  format your computer recognizes, you can copy key  information from  their report into your own, saving yourself significant  amounts of time  (of course, you're always sure to give credit where  it's due). If the  colleague whose work you're relying on works in the  same cubicle as you  and they remember where they've stored the relevant  report, a network  may not offer significant advantages since you can  turn to him or he  and ask for the file on a CD or USB flash drive.  However, in many  organizations, large distances separate co-workers, and  data sharing  becomes a significant logistical problem in the absence of  a network.
In  addition to data sharing, computer  networks also enable resource  sharing, an important consideration in all  budget-conscious  organizations. Rather than buying one printer for  every employee and  replacing them when they wear out, an organization  with a network can  buy a single printer, connect it to the network, and  configure it in  such a way that every computer user in the organization  can print to  it. The initial cost of a networked printer is usually more  than the  cost of a single desktop printer, but when considering costs  on a  per-user basis, the average cost of the networked printer is often  much  less than the cost of buying a printer for every employee. While  some  networked devices such as printers, scanners, and fax machines have   predetermined, specialized functions, you can also network and share   generic, unspecialized computing power in the form of servers. Servers   are large, powerful computers that can handle resource-intensive tasks   more efficiently than desktop computers. As with the networked printer,   the initial outlay for a server is more than that for a desktop   computer, but across the organization, it's often cheaper to run the   server-based version of a program since individual users won't need   expensive, high-performance desktop and laptop computers. Servers can   also deploy software to other networked machines at a lower cost. For   more information on this topic, read A Field Guide to Servers and Networks 101: An Introduction to Server Applications.
Roles and Responsibilities
Networks  also vary considerably in  terms of the roles and responsibilities of  the computers on that network  and the relationships that tie those  machines together. A computer  totally disconnected from other devices  is typically referred to as a  standalone machine.
When  several computers are  interconnected, but no computer occupies a  privileged position, the  network is usually referred to as a peer-to-peer network.   In this type of network, every computer can communicate with all the   other machines on the network, but in general each one stores its own   files and runs its own applications.
With a client-server network,   one or more servers will perform critical functions on behalf of the   other machines (the clients) on the network. These functions might   include user authentication, data storage, and the running of large,   shared, resource-intensive applications such as databases and client   relationship management (CRM) software. Typically, both peer-to-peer and   client-server networks rely on a shared Internet connection for access   to external resources of these basic network structures.
Another type of network that's been rapidly gaining in popularity over the past decade is the cloud-based network.   In this model, an organization pays a third-party vendor to host data,   applications and other resources on servers and manages those  resources  via a web browser. A cloud-dependent network can be simpler,  cheaper,  and greener than a client-server network since you aren't  buying,  maintaining and powering your own servers. However, it’s not  necessarily  the right solution for every organization – particularly  those that  handle and store sensitive client data or health records.  Learn more  about cloud computing for your nonprofit or library on TechSoup's cloud page.
Standards and Protocols
Protocols,  also known as standards, are  essential parts of many modern  technologies. In essence, they're  consensus-based documents that  describe guidelines for vendors,  manufacturers, and other stakeholders  in order to ensure quality and  interoperability in a diverse,  competitive marketplace. Most networking  protocols are fairly obscure  and you only need to worry about them if  something goes wrong. However a  few standards are so widely adopted that  every decision-maker and  accidental techie needs to know their names  and basic functions.  Discussing networking without implicit or explicit  reference to  Ethernet and TCP/IP protocols is like discussing American  law and  politics without reference to the Constitution and the Bill of  Rights.
Furthermore,  adopting widely-accepted  protocols (also known as de facto standards)  has benefits in all aspects  of technology, since it's a form of  future-proofing. When you need to  repair, replace, or upgrade  networking equipment years from now, you can  safely predict that  products and services compatible with today's  widely-adopted standards  will still be available. Therefore, you can  replace a few pieces of  outdated equipment without building a new  network from scratch. Also,  you'll be able to find technicians and  consultants who still understand  these protocols.
After  several decades of struggle  amongst competing network protocols (each  with a different corporate  sponsor), three sets of network protocols  emerged as de facto standards  for local networks by the late 1990s. In  local area networks, Ethernet  over twisted pair (also known as 10 BASE  T, twisted-pair Ethernet, or  IEEE 802.3) is the accepted standard for  wired networking while  802.11b/g/n (or WiFi) is the accepted standard  for wireless networks.  The TCP/IP protocol stack is a standard  component of almost all modern  networks, especially when those networks  expect to communicate on the  Internet where TCP/IP is the lingua  franca. In wide area networking,  there still exists a large degree of  diversity and competition among  networking protocols. However, at the  local network level, any  networking technology your organization adopts  should be compatible with  the three standards mentioned above.
Further Resources
Cisco  provides a number of educational  resources about networking online and  in print that range from basic to  advanced. For a fairly gentle  overview of basic networking topics, read Networking Basics on Cisco’s site or Cisco Networking Simplified. Lantronix’s Ethernet Tutorial is another good introduction-level overview of networking.
For a more in-depth discussion of network design and related topics, check out Cisco’s Internetwork Design Guide. CompTIA Network 2009 In Depth   and other exam prep guides for the Network+ certification also offer   thorough yet readable coverage of fundamental networking topics.
Conclusion
Networking  offers a variety of  advantages for many nonprofits and libraries over  standalone machines,  but they’re not necessarily needed for every  office or work scenario.  Continue reading the other parts of our  Networks 101 series to better  assess your needs and see what options  are out there to fit them.
Change DNS Settings in Windows XP
Change DNS Settings in Windows XP
Sometimes you may want to override the default DNS (Domain Name Server) settings on your computer so you can specify which DNS server is used, or which IP address should be used for a particular domain. There are two ways to do this: Specify the DNS and map IP addresses.(1) Specify the DNS to be Used
This method tells your computer which DNS to use for all your internet browsing. Most home users have this set to "automatic" and the DNS is provided by the user's ISP, but you can use any DNS you like (you can even make your own DNS if you're keen).Before you start you will need to know the IP address of the DNS to use - if you don't know this you'll need to ask your system administrator or ISP.
To set your DNS, you need to find the Internet Protocol window.
- For Users on a Dial-up Connection:
- Go to My Computer>Dialup Networking.
- Right-click your internet connection and select Properties.
- A window will open - click the Server Types tab. Click TCP/IP Settings.
- For All Other Users:
- Go to Control Panel>Network Connections and select your local network.
- Click Properties, then select Internet Protocol (TCP/IP).
- Click Properties.
(2) Map IP Addresses
This method allows you to create settings for individual domains without altering your main DNS preferences. This is useful if you don't have access to a DNS or if you want to specify the location of a single domain without interfering with any of your other online activities.Open the following file in a plain text editor such as Notepad:
C:\WINDOWS\system32\drivers\etc\hosts
The file looks like the one below. At the end of the file (in this case, under the localhost entry), enter the IP and domain you wish to specify. When your browser attempts to access a domain it refers to this file first - if the domain is found here then the specified IP address will be used. If the domain is not found here, then the normal DNS server (as specified above) will be used.
Wireless Network Security
The Popularity of WiFi
Wireless  networking has experienced a huge increase in  popularity over the last  couple of years. The necessary hardware is  widely available to  consumers, it is very affordable, and relatively  easy to install and  configure. Gateway devices, common called "routers"  or "firewalls" by  consumers, that allow users to share a broadband  connection with and  protect multiple computers on a home network have  been around for a  while. The addition of wireless capabilities to these  gateway devices  gives the user the convenience of taking a computer  anywhere in the  house, and not have to worry about running wires through  walls and  crawl spaces and attics to connect computers in various parts  of the  house. Industrial-strength high-performance versions have been  around  even longer in company environments, allowing employees to roam  between  offices, cubes, and conference rooms with laptops without ever  losing  connectivity.
It  is a great technology that offers many benefits. As the saying  goes,  however, with privilege comes responsibility. A responsibility  that is  unfortunately much too often ignored by the person implementing  it. A  wireless network needs to be properly secured as it poses a number  of  extremely serious risks and dangers if left wide open and exposed,   which many users are unaware of.
Why secure a wireless network?
If  you are thinking right now that you have nothing important on your   network and that you have no need to secure your wireless network, I   guarantee you that you will reconsider your opinion after reading the   next few paragraphs. Consider the following dangers of having an   unsecured wireless network. 
Bandwidth Parasite
  In a "best" case scenario, all the intruder does is use the victim's   broadband connection to get online without paying. Maybe just to surf   the web, maybe to download pirated music or software. This does not   cause any direct harm to the compromised network, but it can slow down   Internet or network access for the victim, the legitimate user of the   network, if an intruder leeches off his bandwidth. This could mean   substantial additional ISP cost for the victim if the ISP meters used   bandwidth and charges for actual usage.   
Masking criminal activity
An  unauthorized user could abuse the victim's connection for  malicious  purposes like hacking, launching a DoS attack, or distributing  illegal  material. Since the intruder is a part of the private network  and sits  behind its gateway device, any traffic between him and the  Internet  will appear to be coming from the public IP address the ISP  assigned to  the victim. The ISP has no idea how many computers are  behind the  gateway, who they belong to, and what they are used for. If  the  criminal activity is discovered and investigated, the origin of the   attack will be traced back to the victim's broadband account. It is a   pretty safe bet that nobody wants to be accused of and go to jail for   distributing child pornography or hacking into restricted company or   government networks (just to mention a few examples) if the crime was in   reality committed by a cracker from behind an innocent victim's   network. Reviewing ISP's Terms of Service usually reveals a clause that   not only allows the ISP to reveal customer information to the   authorities to assist with legitimate criminal investigations, but also   holds the customer responsible for any activities the connection is   (ab)used for.
Free access to private data
A  wireless network is also a direct backdoor into the victim's  private  network - literally. Instead of intruding from the public side  of the  gateway device, the intruder connects directly to the network on  the  private side of the gateway device, completely bypassing any  hardware  firewall between the private network and the broadband modem.  Most  people assume that since they are behind a gateway device with a   built-in firewall their private network is safe, hence letting down   their guard, sharing drives, and being generally careless. The intruder   can completely take advantage of this by snooping around undisturbed  and  getting access to confidential data. This could be in form of  personal  information such as financial data, tax records, wills, and  more that  can be abused for identity theft for example, or in form of  work-related  information such as confidential specs, development  information, trade  secrets, and more that the victim has brought home  from the office. By  employing a sniffer an intruder can even sniff  email or FTP user names  and passwords because they are usually  transmitted in cleartext, and use  that information to gain unauthorized  access to email accounts or web  servers without the victim's  knowledge.
Backdoor into corporate networks
In  addition, a wireless network could also be an indirect backdoor  into a  corporate network. An intruder can specifically target an  employee of a  company whose confidential information is valuable to him  for monetary  or competitive reasons. If that employee establishes a VPN  connection  either permanently from his gateway or from a machine behind  his  gateway to the company network, the intruder can then piggyback on  the  VPN tunnel and gain unauthorized access to company resources, a  serious  security breach and every network administrator's nightmare.
That's why
   By now the danger should be pretty clear: Unsecured wireless networks   are unacceptable due to the extremely high risks involved. Yet there  are  countless unsecured wireless networks out there. A train ride  through  the Silicon Valley East Bay area revealed about 60 wireless  networks, 40  of them wide open and insecure. A drive around a  residential  neighborhood covering just a few blocks revealed over 30  wireless  networks, 20 of them wide open and insecure.  
What  is even scarier is that it does not take any skill to discover  and  gain unauthorized access to wireless networks. One does not have to  be a  programmer, Linux expert, or network specialist. All it takes is a   laptop with a wireless network card, and some software (also available   for Windows) that can be easily downloaded for free from the Internet.   Armed with these basic tools anybody can drive around, detect open   wireless networks, and connect to them. With a Linux machine, additional   software, some advanced knowledge, and some time and patience it is   even possible to break into wireless networks that use encryption.
Home Network Setup - Setting up a Local Area Network
Home Network Setup - Setting up a Local Area Network
 - By Alex "crazygerman" Byron - 
  With computers getting cheaper and cheaper these days, it is not   uncommon for a household to have more than one PC. If that describes   you, then you have probably found yourself in the situation where you   wished you could access the other PC to retrieve a file, use the printer   attached to the other PC, play multi-player computer games, or most   importantly share your broadband Internet access such as cable or DSL   modem with the other PC. 
 To  accomplish this all you need is a home network where you connect two  or  more PCs. There are several ways of doing this with the main   difference being cost, security, and reliability. Let's first look at   the different scenarios. 
Your current setup 
  Most likely, your current configuration looks like this: 
  Your cable/DSL modem plugs straight into the computer. The computer is   exposed to the public Internet (indicated by the color red). There is  no  connection for more than one computer. You only have one IP address   from your ISP.  
 Option #1: Multiple IP addresses  
   An easy way of getting the second PC online is to install a network  card  in it, buy a hub, plug both PCs and the cable/DSL modem into the  hub,  call your ISP and get a second IP address and configure the second  PC  accordingly. 
 It is what your ISP most likely will try to talk you into doing. 
 Advantages: 
- the two PCs are independent from each other
- relatively easy setup
 Disadvantages: 
- Both PCs are exposed to public Internet
- Enabling file sharing adds security risk
- Higher monthly ISP cost for additional IP addresses
 Option #2: Internet Connection Sharing via Software 
   In this scenario, you install a second network card in the computer  that  is connected to the Internet, install a network card in the second  PC,  connect them via a CAT5 cable. You configure the connection  between PC 1  and PC 2 as a private network, then install and configure  Internet  Connection Sharing software (ICS) on PC 1, lastly configure PC  2 to  access the Internet via PC 1. 
 Probably the cheapest solutions of them all, but also the least reliable one. 
 Advantages: 
- cheap, only requires 2 network cards and Cat5 cable
- ICS software is available for free with newer versions of Windows or online as freeware
- No additional ISP cost
 Disadvantages: 
- One PC is exposed to public Internet
- Can be difficult to configure
- If PC 1 is shut down or broken, PC 2 cannot get online
- Can be unreliable
- Limited number of PCs
 Option #3: Using a hardware router/gateway/firewall device 
   In this scenario, you install a hardware router/gateway/firewall  device,  connect the public side to your cable/DSL modem, connect the  private  side to a hub, connect all PCs to the hub, configure all PCs  for your  private network. 
 While the costliest solution, by far the safest, most reliable, and most scalable one. Highly recommended. 
 Advantages: 
- All PCs are protected by firewall (indicated by the color green)
- File sharing between PCs is safe
- No additional ISP cost
- Connect many PCs to home network without additional cost
- Easy PC configuration due to DHCP server in gateway device
- Optional additional functionality with gateway-integrated wireless access point, print server, DMZ, content filtering, and more
 Disadvantages: 
- Can cost several hundred dollars depending on gateway device and features
- Somewhat of a learning curve
  As you have probably figured out by now, option #3 is the most  desirable  solution because it gives you a protected private network, it  is a very  stable solution, it is easily and extremely expandable, and  it gives  you the most features. 
  Note: This article assumes that your cable/DSL modem uses an Ethernet   connection, NOT a USB connection because it will eliminate options #1   and #3. If your ISP gives you a choice, insist on getting the modem with   an Ethernet connection
 
  
This article is a complete guidance to learn everything about wireless security. I read and understood a lot with the help of this post. I even shared the link to this article with all my friends too.
ردحذفelectronic signature