Home and Small Office Networking Guide

Home and Small Office Networking Guide
So what is a network? A network supports the interconnection of numerous devices and a protocol to ensure that they can communicate with each other more efficiently. The best way to understand how the network is View each network element as a layer on top of each other. The conceptual model that describes this layered model is known as the OSI reference model, which has seven layers. All network professionals use this in their day to day and design engineering work.For our purposes we can simplify in three layers, going from bottom to top is: 1 The physical layer - the cable between the machines (usually called 100BaseT, uses four pairs), the card in the back of your machine (802.3 Ethernet NIC) or wireless network cards (802.11n, etc.) etc. 2 levels of data link, network and transport -. Responsible for the management of the addressing, routing and packaging of data around the network includes the Internet Protocol (TCP / IP), games, and file transfer protocols based on, for example. UDP), and networks from home to your office VPN (PPTP and IPSec) 3 and the Session, Presentation and Application - file sharing and database access in the office (NetBIOS, Named Pipes, NFS), web browsing (HTTP , DNS), email (MIME, SMTP, POP3) and Internet banking or shopping security (SSL / TLS) is breaking off in layers like this helps us to understand when we buy software or hardware layer (s) and then works to Provide for us what we can. is providing the connectivity, access to another network WAN (Wide Area, namely for the Internet), security or access to my local area network (LAN, or for access to a printer). It 's very useful when diagnosing problems with the networks. Network AddressingIn order to send a letter to your friend in a nearby city or a country halfway around the world requires that the postal system to address that matures through the levels from country to address the number of restricting exactly where your friend What life mailbox and the postman should fall within the letter of Digital Networks at work in a similar manner except that instead of moving mail around moving digital data addresses packets.MAC - The Media Access Control address identifies a single piece of hardware on the physical network and is a pattern with a long number designed to be globally unique. And 'set in the hardware at the factory. An example of a MAC address is 1A-1D-2F-9C-7A-3C (Layer 2). IP Address - The IP address uniquely identifies all network interfaces that are typically endpoints on the Internet or your local network IP based (in office) Within the local or global (internet) address space The IP address must be unique, otherwise '. IP routing protocol do not know where to send the packet. An IP address is mapped to a physical address through MAC as described above, the mapping takes place in the routing tables of the router network hardware. An IP address of the sample is 192 168 .0.1 (Layer 4). The addresses are divided into each Class A, B and C with a larger address space for larger organizational needs. small offices and addresses are almost always national and class C network is reserved 192.168.0.nnn anyone to use on any small private network.DNS name (and server) - Server-based addresses and domain names are just names , with dots to indicate the level of uniqueness that we all know with the Internet domain names sought in the resource box like ours .. The 'DNS name in this case is the element' cryopc 'full address of the DNS server to store all of these host names and IP addresses that map the network security The home hub / routers usually come with security features , including the following: .. MAC identification - .. Using the MAC address of hardware such as a list of hardware authorized to access the network its base, a good precaution, but unfortunately a dedicated hacker can spoof a MAC address and know if they really want is access only stops the opportunists. WEP and WPA - are the most common forms of encryption available on the network security and wireless without WEP or WPA wireless network is unusable foreigners WEP is now considered rather weak, as hackers have proved demo modes of rupture with some urgency , and once .. cracked its not safer. WPA is more secure because the system is more difficult to decipher (it has a much longer passphrase) and once broke his silence only leaves a small window of opportunity for exploitation as a figure derived for each package that is constantly changing. Use TLS encryption, just like the internet checkout lock Yet the network is always and only as secure as the passphrase used to protect, then choose a dark one.VPN, SSL / TLS and IPsec -. Most of us do not even know we are using these technologies, but they all work similarly. They use sophisticated encryption and robust to ensure private information sent over a public network is not visible to snoopers. SSL / TLS is used more widely and recognize it as a checkout lock, or encryption used when typing in your credit card when shopping.NAT Internet - Network Address Translation is not really security at all, but to save the rapidly diminishing availability of IPv4 addresses on the Internet, but do not protect your private network addresses from the outside, creating the impression that only a single Internet address (your router's public address) is access to the Internet from the network. This means ad hoc access to the local network from the outside is much more difficult without the safety net internal initiation of a first connection (and thus creating a NAT) Typical segment of network devices -. a segment is not really a device is a single network cable connected to potentially more machines, but sometimes only a single machine can be useful to think. of how a device in its own right as the cable itself imposes limits, requests for resources and capabilities on network.Router - maps of addresses to a single address space to another to another across the tables and routing protocols that are stored on device, usually in the memory. Hub / Switch - Most of the hubs are known as switching hub as each network port on the functions of the hub, as its own LAN segment is able to Malthus Use the bandwidth of the connection and do not share with all on the same LAN . Firewall -. It can be software or dedicated hardware-based latter being widely considered the best of Windows has a firewall and several home hub / router then have them pre-configured and built-in firewall rules my deterministic what traffic you want to get out, and. the network. They are usually preconfigured to release only connections initiated internally (for preventable attacks ad hoc) and to return in traffic on a few known ports considered safe, such as those commonly used for internet, http and ftp. games can sometimes have problems with firewalls as you want to use other ports will need to create ad hoc customized rules to get around this Access Point. problem.Wireless - Wireless networks are effectively plane segment of the network access point serves as an access point, as well. Protects the network as discussed above in the security section. In a small network often makes sense to combine many network devices in a single physical device. That's why most small office routers also have firewall access, hubs and wireless access point built in. However, in a medium sized organization or enterprise devices have large individual needs to have more reliability, capacity and safety and thus tend to be devices dedicated to a single purpose. A firewall, for example, can cost U.S. $ 100 with an integrated router and hub or a government department web site could cost $ 40,000 as a single appliance Advantages of different types of network cable-based networking -. 802.3 Ethernet, which typically supports 100 Mbit / s data (CAT5) or 1 Gbit / s (CAT5e cable) and higher speed if you are reasonably up-to-Most network devices are compatible. and fall at the speed of the slowest device on the network. Cable is the best for reliability speed.Wireless Networking - E 'defined by the standard 802.11a, b, g, and N (draft 2.0 to the stage at the time of this writing) offers a flexible wireless, roaming, but the convenience of quality. reception can be very large or complex buildings of the patch and this affects the connectivity and the connection speed. In addition to the rules of MIMO (Multiple-Input Multiple-Output) uses multiple antennas to increase signal strength and quality, increasing variety and bandwidth.Broadband available, ADSL and cable - all the local cable telephony and the use optical fiber trunks to provide homes and small businesses with access to high-speed Internet relatively Each uses a different technology standard for the implementation and need to buy the router or the modem correctly .. Configure your home or small office network based on the information provided above is necessary to decide what you need. If you start with nothing, then a good quality mix hub 802.11n router / device is the best solution. Now I'm more or less pre-configured out of the box and only require an Internet connection. access to mobile devices, laptops and desktops can be provided by the Wi-Fi for fixed desktop or network cable and switch port. Do not forget to enable WPA security with a good mix alphanumeric and non-alphanumeric passphrase. For added protection to limit access to only the MAC addresses it knows. Solve problems related to my network there are a number of low-level tools that are very easy to use that to help network engineers to diagnose problems with the network. It pays dividends to familiarize yourself with them. To use these tools yourself to run the Windows command line interpreter cmd.exe (type cmd after Start-> Run), then simply enter the command in.ping -. using a hostname or address it 'bounces' a packet off the network endpoint A bit' like a submarine with sonar, then 'ping' the name that generates status information to confirm whether it was able to reach the end point or. and how long the took.ipconfig return - return all network information for all network adapters on your PC including wireless, cable, MAC address (physical address), IP address, the ' Gateway address (router), subnet (address class), host names, connection status. etc.tracert - shows the path through the network or a data packet will take to reach a host It can help provide indications that a connection may be slow or does not indicate where the network is blocked. How to ping so it reports the time taken to travel the path. [ABSTRACT] So what is a network? The network supports the networking of many devices, and a protocol to ensure that they can communicate with one another more effectively. The best way to understand how networks work is to view each element of the network as a layer on top of each other. The conceptual model that describes this layered model, as the OSI reference model has seven layers known. All network professionals use them everyday in their design and engineering work.For our purposes we can simplify in three levels, namely from the bottom up there. 1 The physical layer - the cable between the machine (usually called 100BaseT uses four pairs), the map in the back of the unit (802.3 Ethernet NIC) or wireless network adapter (802.11n, etc.) etc. 2 data link , Network and Transport Layer -. for the administration of addressing, the routing and packaging of data throughout the network includes the Internet Protocol (TCP / IP), games and file-transfer-based protocols, for example. UDP) and from home to office VPN (PPTP and IPSec) 3 and, Presentation Session and Application Layer -. File-sharing and access to the database in the office (NetBIOS, Named Pipes, NFS), surf the Internet (HTTP, DNS) allows Internet banking E-mail (MIME, SMTP, POP3), secure or shopping (SSL / TLS interruptions) from it to understand how these levels in us when we buy software or hardware, which level (s) on it and works so that they can provide for us. It is the connectivity, access to another network WAN (wide area, ie the Internet), security or access to my local network (LAN, or for access to a printer). It 's very useful when diagnosing problems with the network. Network AddressingIn a letter to your friend in the nearest town or country to send across the world, the place needs an address at the bottom close aggravated with the address moves from country to house number, exactly where your friend lives, and what the letter into the mailbox for the postman Digital networks work similarly must move as a drop-mail addresses to switch to digital data packets.MAC - The Media Access Control address identifies a single piece of hardware on physical network is a system with a long series designed to be unique in the world. It is the hardware manufacturer to the point of the group. An example of a MAC address is 1A-1D-2F-9C-7A-3C (layer 2). IP Address - The IP address to uniquely identify all network interfaces, which usually ends on the Internet or your local IP-based network (in an office) in the context of local or global (Internet) space IP addresses must be unique, otherwise '. IP routing protocol does not know where to send the packet. An IP address is assigned to a physical address of the MAC, as described above, mapping is done in the routing tables of the router on the network instead of hardware. An IP address 192 168 .0.1 (Layer 4). The addresses are divided into Class A, B and C, each with a larger address space needs for larger organizations. Small offices and addresses are almost always national and class C network 192.168.0.nnn is reserved for anyone to use any small private network.DNS name (and server) - Server-based addresses and domain names are just names, points with levels of the uniqueness we all called Internet domain names such as ours in the resource box .. DNS names in this case, the element 'cryopc' the full address of the DNS servers store all of these host names and IP addresses assigned to them will go to your home security network hub / router usually in security features, including have constructed the following: .. MAC identification - .. The MAC address of the hardware, such as a list of approved hardware access network is a good basic care, but unfortunately a dedicated hacker, a known MAC address and you get access to false if they really want to hear simply opportunists. WEP and WPA - are the most common forms of encryption and security of your wireless network without the WEP or WPA for your wireless network is unusable for strangers to WEP now considered quite weak because of the ways hackers cracking showed fairly quickly, and on .. cracked its not safer. WPA is more secure, because it is more difficult to decipher (which has a much longer passphrase) and once broken leaves only a small window of opportunity for exploitation, as she leads a code for each package that is evolving . You use TLS encryption, just like the internet checkout lock But the network is only as safe as used, to protect his sentence, so choose a dark one.VPN, SSL / TLS and IPsec -. Most of us do not know, we use these technologies, but they all work the same way. They use sophisticated encryption and robust to ensure your private information over a public network is not visible to the spies sent. SSL / TLS is used more frequently, and you will be there as the cashier recognized lock, or the encryption used when entering credit card information shopping.NAT Internet - Network Address Translation is not really security at all, but the savings rapid decrease in the availability of IPv4 Internet addresses, but it does protect your private network addresses from the outside to give the impression to the internet that only a single address (address on the router) will be access to the Internet from the network. This means ad-hoc access to the local network from the outside is much more difficult, no internal network equipment initiating a first connection (and thus a translation NAT) Typical segment of network equipment -. a segment is not really a device, there is a single network cable can be connected to several machines, but sometimes only a single machine may be worth considering. of how a device in its own right, as cable is limited, resource requirements and capabilities imposes on network.Router - maps an address in one address space to another to another to be stored routing tables and protocols on the device, usually in the memory. Hub / Switch - works like most of the hubs switching hubs, like any network port on the hub as a separate segment of the LAN so that you can use the full bandwidth of the connection and does not share with everyone on same LAN. Firewall note - this special hardware or software can be based largely considered the best Windows has a built-in firewall, and most home hub / router and have it pre-configured and built-in firewall rules specify what you want to rent Perhaps, and inside. Your network. They are usually pre-configured to only allow internal connections (to prevent attacks on ad hoc) and have started, back in traffic only to specific known safer havens such as used frequently on the Internet, HTTP and FTP. The games can be sometimes. Problems with firewalls as other ad hoc ports you must use to create custom rules to get this problem.Wireless Access Point - Wireless networks are effective in air segments of the network, the access point acts as an entry point, as well. protects the network as discussed in the previous section of safety. In a small network, it is often useful to combine many network devices on a single physical device. This is why smaller office router and a firewall access, hubs and wireless access point within but in a medium-sized enterprises or large companies have built individual devices to improve the reliability, capacity and safety, and therefore tend to devices to be dedicated to one purpose. A firewall, for example, $ 100 with integrated hub and a router or a government department web site could cost € 40,000 to support a single unit cost of different types of network cable-based networking - .. 802.3 Ethernet, which typically supports 100 Mbit / s (CAT5) or 1 Gbit / s (CAT5e cable) and a higher speed if it is reasonably up to date, most network devices are backward compatible and will fall at a rate of slowest device on the network. The cable is the best for reliability speed.Wireless Networking -. It is defined by the standard 802.11a, b, g and n (Draft 2.0 on stage at the time of writing this article) Wireless offers flexibility, roaming, convenience, but the quality of reception can be very large or complex buildings in the patch and this affects connectivity and connection speed. In addition to standard MIMO (Multiple-Input Multiple-Output) uses multiple antennas to signal strength and quality to increase, greater range and available bandwidth.Broadband, ADSL and cable -. provide all local telephone trunks and use fiber optic cable to households and small businesses with access to high speed internet relatively Each uses a different standard technology for the implementation and need to buy the right router or modem. Configure your home or small office network to the information provided to determine what you need, as needed. If you start with nothing, then a good quality connection 802.11n router / hub device is the best solution. Now I'm more or less pre-configured out of the box and only need the Internet. Combine access to mobile devices, laptops and desktops can be provided by the Wi-Fi network port for fixed or desktop switch and cable. Do not forget to enable WPA security with a well-mixed alphanumeric and non-alphanumeric passphrase. For added protection, the only access to the device MAC addresses, you know. Troubleshooting my network there are a number of low-level tools that are very easy to use that network engineers to help diagnose problems with the network. It is worth familiarizing yourself with them. These tools for Windows, use the command interpreter cmd.exe (cmd after the type of running in Start->), then simply enter the command in.ping - through a host name or address, bounce "a packet of network from the end point, rather like a submarine sonar, hence the name "Ping" We have information to verify if it was able to reach the point of arrival or no .. and how long the return took.ipconfig - provides the information for all network adapters on your PC with wireless, cable, MAC address (physical address), IP address, gateway address (router), subnet (Class of address), the host name, was etc.tracert connection - .. route signals through the network, which requires a data packet to reach a host, it can help, because it alludes to a connection might be slow or not working at all by indicating, where it is anchored in table also shows the network as a time to walk the path.

Newer Post Older Post

Leave a Reply