Home
- All IT eBooks
Contents
1. c 0s secsecssoveseceecccrcnvsescecccctccssssserccuccesssssecseucsevssecsesescuensees 28 nl e ERE M 29 Swilches ccu cele cane RIED a MUNDUS COSI S OD IDEET EC IEEE 30 www allitebooks com INSERERE DER m GeceeteanSech wean a AEE 31 Bridges arid ROUTERS 2 epe teet etr ebrei eios tee A e aKa NENE pre Muret eunt tre deus 32 Combination Boxes sisis repr pb nep pr C bb et pee Reese ace ge edic e du eS ea antes 33 A HOW COMPUTER NETWORKS ARE ORGANIZED 35 TCP ZIP Networks uetus center erro N ER DR ERER RR Te ER ER EU Een RUN SEE ga EU ere ei p Eres 36 Naimes and Addresses i arcos eta eaae ets uses che sen ehe eee desea 36 NEM 41 a EUER 41 ifconfig mt B OA 43 PING E E T AS 43 Une E 44 5 DESIGNING YOUR NETWORK 47 Identifying Current and Future Nodes ssssses eee 48 Wrxe gofecgccm ER 50 Hame RUM WARING m 51 Trunks and Branches Using Secondary Switches 53 What AboUt WII 2 05 2 cgasesaceacaseascessecscriedcs sadsdenrapancadacbaedesndebaneaenaaapnedeenabenectdeaondes 54 6 INSTALLING THE NETWORK CONTROL CENTER AND ETHERNET CABLES 55 Connectors Wall Plates and Surface Boxes es e 55 Ethernet Cale m 56 Pushing Cable Through Walls sess 57 The Control Center 58 AG POWER ERU L 61 Modems Routers and Switches sseseeseee eene 62 Adding a DSL or
2. x cw aw Figure 12 1 Use the Folder Options window to turn Simple File Sharing on or off In the Advanced Settings box scroll down to the bottom 5 To turn Simple File Sharing on or off click the Use simple file sharing Recommended checkbox The file sharing function is active when you see a checkmark in the checkbox 6 Click OK to save your setting and close the Folder Options window In spite of its name Simple File Sharing offers five access levels which you might consider more complicated than simple However each of the five levels is useful in certain situations Level 1 My Documents Files are only accessible to the file private owner Level 2 My Documents Files are accessible to the file owner default and administrators Level 3 Locally shared Other users on this computer have documents read only access the file owner and administrators have full access Level 4 Read only shared Local and network users have read documents only access the file owner and admini strators have full access Level 5 Read and write All users have full read and write access WARNING f you want to restrict access to any of your files be sure to protect your Windows user account with a password Level 1 The owner of Level 1 files and folders is the only person who can read them All the files in a Level 1 folder are also private Level 1 files and folders are only possible within your user profile the My
3. HUBS SWITCHES AND ROUTERS nodes it must have some way to connect any pair of nodes Large networks can have very complicated structures with many branches and extensions but the core of every network can be reduced to just a few patterns The simplified layout of a network is known as its topology The most common network topologies are a big loop known as a ring a hub system with everything connected to a central core called a star a common path not a loop that connects nodes using a time sharing method and a mesh in which there s a direct connection from every node to every other node Figure 3 1 shows simplified diagrams of each network topology In a loop network such as IBM s old token ring design data moves around the loop until it reaches its destination In the much more common hub system each data packet travels to a central location where a control device reads the address and sends it back out to the right destination Ethernet networks which include most small LANs are hub systems 28 Desktop computer computer Desktop computer Desktop computer NP ptop computer computer IN di Desktop computer Desktop computer Figure 3 1 Every network uses a specific topology Mesh topology is not common in small home or office networks but the wide area networks that connect your small network to the Internet often use mesh designs This chapter describes the equip
4. 5 Turn on your equipment in this order modem first router next and then the computer Leave the game console turned off for the moment 6 Confirm that the computer can detect the LAN and the Internet just as it did before you added the game console 7 Turn on the Xbox 360 console and make sure there is not a disc in the disc tray The Xbox Dashboard will display the Xbox Live area 8 Assuming you have already configured things like time and language the Gamer Profile screen will appear If you already have an Xbox Live membership in another location select Migrate your Xbox LIVE account If you re setting up a new account select Join Xbox LIVE 9 Follow the onscreen instructions to supply your contact information and gamer profile and to create or transfer an account Connecting Home Appliances to Your Network Chapter 15 They re not widely used today nor in many people s opinions useful enough to justify the added cost but home appliances with Internet connections are available and more will probably come along in the next few years Networked connections can allow you to control your household TV refrigerator micro wave oven and other appliances through the Internet or from a mobile telephone even when you re away from home Combined with built in diagnostic modules a network connection will also make it possible to identify problems and notify a service bureau that can either send back a software fix or dispat
5. Data Networks and What You Can Do with Them Chapter 1 The alternative to sneakernet is a network consisting of physical links that connect two or more computers and related equipment These links can use wires radio signals or a combination of both to move computer data and any other information that can be converted to and from computer data between any pair of network nodes Every computer connected to a network sends and receives data through a connector or radio antenna Depending on the data transfer speed and the network s specific requirements the computer might use a parallel port a serial port an Ethernet port a USB or FireWire port or a Wi Fi antenna Because these connectors and antennas move data in both directions they are input output ports or I O ports but that term is more often used to describe the computer s serial and parallel data connectors After you connect your computers together you will discover that you can do many things through the network that you may not have expected By the time you have lived with the network for a few weeks you won t think much about it but you ll use it all the time File Sharing When you connect your computer to a network you can allow other people to read and write files that are located on your computer s hard drives and other storage media and you can open and store files from other computers File sharing is one of the most common and the most convenient uses
6. Read amp execute A user with permissions to Read amp execute can view the contents of a file and run a program file but can t make changes or delete the file Read A user with Read permissions can view the contents of a data file but can t make any changes or delete the file Write A user with Write permissions can make changes but can t delete the file Special permissions Special permissions are administrative controls that most users don t need Click the Advanced button to set these options 7 Obviously some of these permissions overlap so if for example you allow full control you will also allow permission to modify read and write to the file To save your choices and close the Properties dialog click OK Printer Sharing The Network and Sharing Center also controls printer sharing Chapter 14 explains how to use this feature Password Protected Sharing Password protection assigns one more level of security to shared files When password protected sharing is turned on you can t open or edit files without a user account and password on that computer Media Sharing Media sharing in Windows Vista transmits music still pictures or videos through your network to a digital media receiver DMR such as a game console or a compatible home theater receiver Chapter 15 explains how to use media sharing File Sharing on a Macintosh Starting with OS X 10 2 the Macintosh operating system supports Windows file
7. c a M B LJ o Q Appearance Desktop amp Dock Expos amp International Security Spotlight Screen Saver Spaces Hardware Q Lal A Bluetooth CDs amp DVDs Displays Energy Keyboard amp Print amp Fax Sound Saver Mouse Internet amp Network A Mac QuickTime Sharing System gm b oO u u o Q LIES a b Accounts Date amp Time Parental Software Speech Startup Disk Time Machine Universal Controls Update Access Other NetUpdate Figure 11 10 Use the System Preferences window to set up your network connection Click the Network icon in the Internet amp Network group The Network window shown in Figure 11 11 will appear with detailed information about your network connection If your network has a DHCP server providing IP addresses the settings will automatically appear in the Network window Location Automatic Hd Built in Ethernet Connected Status Connected Built in Ethernet is currently active and has Bluetooth Q the IP address 192 168 1 103 Not Connected Built in FireWire gt re al 8 x Connected 2 Configure Using DHCP e Ama A IP Address 192 168 1 103 n T Subnet Mask 255 255 255 0 Router 192 168 1 1 DNS Server 64 255 237 242 64 255 237 243 Search Domains domain actdsitmp amp Click the lock to make changes Assist me C Revert Apply Figure 11 11 The Network window shows the current network conn
8. 1 Turn on both TVs and go to the destination player s Now Playing List The other DVR will appear at the bottom of the list of available programs Highlight the name of the distant DVR and press Select That DVR s Now Playing List will appear Choose the name of the show you want to transfer to this DVR and press Select The Getting Program screen will appear To watch the show while you re transferring it select Start playing on the Getting Program screen When the transfer is complete the name of the show will appear in this DVR s Now Playing List Other Things You Can Connect to Your Network 217 218 Chapter 15 Playing Video on a Computer Several of the same programs that play music on a computer can also handle video files Windows Media Player RealPlayer and QuickTime include both audio and video decoders Others such as VideoLAN hitp www videolan org and MPlayer are optimized for video Like other networked files you can use a player program on a client computer to view a video file from a server In most cases one or more video player programs automatically take control of specific file types so almost all video files will automatically load into an appropriate player when you select a file from an onscreen directory or file folder Connecting a TV to Your Network In rooms where you have a television set but no computer it s often possible to use a game console or other adapter to view movies and other di
9. 10 0 0 0 to 10 255 255 255 169 254 0 0 to 169 254 255 255 172 16 0 0 to 172 31 255 255 192 168 0 0 to 192 168 255 255 Fixed and Dynamic Address Assignments DHCP The computers and other nodes in your LAN can obtain their numeric IP addresses in one of two ways The person who sets up the network connection can assign a permanent address or a router or other network control device can automatically assign an address every time the device connects to the network A permanent assignment is called a fixed or static IP address an automatic assignment is a dynamic address How Computer Networks Are Organized 37 38 NOTE Chapter 4 Another LAN 103 75 201 47 Desktop computer 192 168 0 101 WAN 103 75 201 0 LAN side 192 168 0 1 WAN side 103 75 201 48 Another LAN 103 75 201 50 Printer 192 168 0 105 Figure 4 1 A router presents separate IP addresses to each network The method for assigning dynamic IP addresses is called Dynamic Host Configuration Protocol DHCP so the device that makes the assignments is a DHCP server In a LAN the DHCP server uses numbers from the reserved range on the Internet the servers use numbers from a range provided to your ISP by IANA Both fixed and dynamic IP address assignments can work equally well but all the devices on the network must use the same system otherwise more than one device might use the same number at the same time If your LAN incl
10. 174 184 175 178 181 types of 16 78 79 Wireless Network Connection programs 87 87 89 88 wireless settings 86 pigtails 85 printer servers 194 Wi Fi Alliance 79 Wi Fi Protected Access WPA encryption 54 78 90 91 136 160 174 176 179 181 182 183 194 217 Wii 220 221 WiMAX networks 174 Windows backup files 100 103 101 103 104 Backup or Restore Wizard 101 101 102 computer connections 22 computer to network connections 117 118 118 124 119 120 121 122 123 INDEX 265 Windows continued configuring for VPN 165 172 166 172 file servers 94 96 96 file sharing in Vista 131 136 143 137 142 file sharing in XP 131 132 132 136 134 135 firewalls 154 159 155 158 Home Server 95 96 96 208 215 infrared ports 21 IP addresses 111 111 112 Live Messenger 234 285 237 Media Audio 210 Media Center 208 Media Player 208 211 218 network adapters 73 74 Network Problem Solver 245 247 247 248 network profiles 118 Network Setup Wizard 118 122 119 120 121 network to Internet connections 111 111 112 772 115 OpenVPN for 173 Remote Desktop 226 remote desktop programs 226 229 227 228 servers 163 164 215 TCP IP 35 36 123 123 126 158 text commands for 43 44 troubleshooting info 247 updates and patches 185 188 186 187 Vista Home Premium 226 VPN servers for 162 165 165 Wi Fi control programs 87 87 88 88 Windows to Mac remote access 226 wired eq
11. DSL or video and several data outlets along with your modem router and switch 60 Chapter 6 AC Power Your modem router and switches will all need some kind of electric power If you re using a plywood panel as your control center attach an AC power strip with enough outlets for all your devices and at least one spare to the side of the panel closest to the nearest AC outlet near the bottom The control panel should be close enough to an outlet that the cable attached to the power strip can reach it without an extension cord In order to protect your equipment from damage caused by lightning strikes or other power surges use a power strip with a built in surge protector Many network devices use plug in transformers or power converters sometimes called wall warts that are bigger than a simple AC power plug so you will want a power strip that provides extra space between outlets like the one shown in Figure 6 4 This particular model also includes surge protection for a DSL telephone line Photo courtesy of APC Figure 6 4 This power strip is designed for oversize plug in power supplies As an alternative to a power strip consider using an uninterruptible power supply UPS that will provide backup power from a battery when your AC power fails A UPS is not a replacement for a generator but it will keep your network alive during short power disruptions Network control devices don t use as much power as a compu
12. purpose internal computer processor For example as Figure 2 12 shows a printer server could be a computer with a printer attached to it or a printer with an internal or external network adapter connected directly to the network Printer server Printer Printer server Printer Figure 2 12 A printer server can be either a computer with a printer connected to it or a dedicated printer server In a small network it s not unusual for the same computer to double as a client and a server For example in a home network the family s printer might be located in the kitchen where Mom has a computer on which she keeps the family s financial records and looks up recipes on the Internet The kitchen computer is the network s printer server When others in the house want to print something they instruct their own computer to send it to the printer through the network to the computer in the kitchen The computers operating systems know how to handle such print requests without interrupting other programs running on the printer server Clients and servers are important because they are essential network building blocks A client and server structure is often the very best way to add services to a network because it s an efficient way to share expensive hardware and software and it makes those services equally accessible to everybody For more details about adding and using servers see Chapter 9 Types of Network Connections 25
13. s private files The exception is a system administrator account that provides access and control to almost all files Passwords Passwords are the first line of defense against unwanted access to a com puter or a network If a would be intruder can t get the computer to start the operating system opening data files or using the network is a lot more difficult but not impossible a determined intruder with enough time and resources can often get around a password to open and read unencrypted files You may be tempted to set up your computer without a startup password but that completely defeats most of the computer s security features and those of the network connected to it Unless you re absolutely certain that no strangers will ever get close enough to turn on your computer or gain access through a wired or wireless network and you trust everybody else in the house or office to respect your privacy it s worth the extra time needed to enter a password every time you turn on the computer or connect to it through a network An effective password should be difficult to guess and long enough to make it hard to find with a brute force program a program that applies massive computing resources to trying one password after another until it stumbles upon the right one Too many people use one of these items as a password e Your own first name or middle name e The name of your spouse child or pet e Your mother s maiden n
14. ssssssssseee eee 89 WEE SOUT Ry oett e eM ede aeree ne e ve ba susie vals eee PESE de AADA 89 9 FILE SERVERS 93 Choosing a Computer to Use as a File Server 94 Windows Mac Linux or isses eee here ee eere e eene a i 94 Using a Serverfor File Storage 5 e rtr rer ee nr OP tre HEROS 96 Using Network Attached Storage een emnes 97 USB Device Servers ssssssseessssee eene m nm eeenen enne 99 Apple s AirPort Extreme oerte lect recette tete teet tested aiu 99 Backing Up Files to Server ix eodein tp erc Rr to dece PEL RR E een 100 The Windows Backup Program sese 101 Macintosh Backup Programs ssssee eee 103 Linux sand Unix Backups scissione an cest eter e rite etes 104 Using a Serysr at Home e Cera reete tre arte Ceci e pel tee 105 10 CONNECTING YOUR NETWORK TO THE INTERNET 107 The Internet From the Cloud to You sss 108 The MOdem 3 5 rette reset e odere eue cree ens dee ge Pres rre and 108 The Gateway ROUET n dcr ioter D Pe EE EE SERO UR RR ER ERR Hn 109 Individual Computers eo crier ta eoe eee fe ere te to tn ee tegunt pes 110 Configuring the Network Gateway see eem eene 115 NIU d 115 11 CONNECTING YOUR COMPUTER TO A NETWORK 117 Connecting Your Windows Computer to a Network sss 118 Creating a New Network Profile sss 118 Changing Your Computer s Network Settings 122 Connecting Your Maci
15. t work unless you use a numeric IP address to identify a destination DNS servers perform what seems like a simple task but this task is more complicated than it first appears because millions of domain names are out there and new ones are added all the time Every DNS server in the world has to keep up with all the adds moves changes and deletions It accomplishes this through a system of root servers that are continuously www allitebooks com updated If a local DNS server doesn t recognize a name it consults the root server that keeps up with that name s top level domain NOTE There s actually a hierarchy of DNS servers so a root server might end up consulting yet another server and so on up the line if it can t handle a name request itself When you set up your computer for access to the Internet you must specify the DNS servers that the computer will use to convert domain names to numeric IP addresses In most cases your Internet service provider or network manager will give you the numeric address of one or more nearby DNS servers If your primary DNS server is not accessible your computer will look for an alternate server if you have provided an alternate address It s generally best to use the DNS server address supplied by your ISP because the server with this address is probably closer to your own computer than any other server and the system works best when total demand for DNS service is spread among as many se
16. File and Printer Sharing for Microsoft Networks must be active for you to share access to a printer Click OK to save your settings and close the Properties window Instructing the Computer Acting as a Printer Server to Share the Printer Follow these steps to share a printer From the Control Panel select Printers and Faxes in Windows XP or Printers in Windows Vista A window that contains links to all of the printers and virtual printers connected to this computer will open Right click the printer you want to share with the network A pop up menu will appear 3 Select Sharing from the pop up menu The Properties dialog for that printer will open with the Sharing tab visible as shown in Figure 14 4 2 x amp Samsung ML 1740 Series Properties General Sharing Ports Advanced Color Management Security Printer About 1 9 You can share this printer with other users on your network To SS enable sharing for this printer click Share this printer Windows Firewall ts already configured to allow the shanng of printers with other computers on the network C Do not share this printer gt Share this printer Share name Don s Printer r Drivers If this printer is shared with users running different versions of Windows you may want to install additional drivers so that the users do not have to find the print driver when they connect to the shared printer Additional Drivers Figu
17. It s particularly important to label the wall outlets in a network without a control center Years from now when other people try to use your network after you ve moved away they ll need to know where the cable connected to each data outlet goes You can also use a small Ethernet switch to use more than one network device in the same room For example if there s a data outlet in a teenager s bedroom you could connect a four port switch to the wall outlet and connect a computer a game controller and an Internet radio to the household network through that switch ETHERNET NETWORK INTERFACES Every computer on a network uses some kind of internal or external connector to send and receive data to and from other com puters This connector along with the hardware that controls it is called a network adapter or network interface because it s the point of contact between the computer and the network In a small home or business network the network interface can be either an Ethernet port that communicates with the network through a cable or a wireless transmitter and receiver that exchanges radio signals with a Wi Fi base station This chapter describes the most common wired Ethernet network interfaces Chapter 8 provides similar information about connecting your computer to a network through a wireless interface 70 Built into the Motherboard Chapter 7 Every modern wired Ethernet interface has an eight pin socket
18. SSIDs and passwords for your Wi Fi network e The telephone numbers and other contact information for your ISP and the telephone company or cable service that supplies your physical Internet connection e Instruction manuals for each modem router access point or other net work device e A list of your network s users including names telephone numbers and logins e A diagram that shows how each computer and other device connects to the network e Passwords for each network server e Account names and passwords for your email service e A list of rooms that have wall mounted network outlets and the label on the other end of each cable e A log of adds moves changes and deletions to your network e A log of repairs including e The date and time each problem appeared e Adescription of each problem e What you did to fix the problem e The time and date of each call to a technical support center e The name and telephone number of each technical support person you talk to e The trouble ticket number or case number assigned to the problem by each support center WARNING Your network notebook might contain confidential information such as passwords and information about user accounts Therefore you should to keep it in a secure location such as a locked cabinet or drawer Viruses and Other Nasties If you can t find an obvious solution to a network problem it never hurts to run a complete scan for viruses worms Trojan ho
19. Settings Network Connections a Internet e Internet Explorer LY Mele E mail jf This Computer Mozilla Thunderbi Microsoft Word E Plata Control Panel Set Program fA FuliShot99 access and Defa ec America Online Connect To A Sound Fi x Dial up Connection Sk i Internet via MSN a A dacity Printers and Faxes Show all connections t E Notepad Ee 4 Search AllPrograms Run E Log Off Turn Off Computer Figure 11 1 Select the Show all connections option to open the Network Connections window From the Network Connections window select Network Setup Wizard The wizard s Welcome screen will appear From the Welcome screen click Next The Wizard will remind you to install and turn on all the computers and other components in your network Click Next again The wizard will look for a network connection and ask what kind of connection you re making as shown in Figure 11 2 INetwork Setup Wizard Select a connection method Figure 11 2 Select the Other option to add this computer to your LAN Select Other and click Next The Wizard will ask for more details as shown in Figure 11 3 Network Setup Wizard Other Internet connection methods Figure 11 3 Select the This computer connects to the Internet directly or through a network hub option to connect to your LAN Connecting Your Computer to a Network 119 120 NOTE Chapter 11 Select the Th
20. The Number of DHCP Users setting defines the highest number in the address range in this case 192 168 1 149 In some systems the server asks for a range of numbers instead of the starting number and the number of users In either case allow for more DHCP users than the number of machines currently connected to the network so the server can continue to support your network after you add more devices Subnet Masks The subnet mask setting specifies which part of the IP address changes for each device connected to the network Unless you have a reason to use a different mask set the subnet mask to 255 255 255 0 If the network uses DHCP to assign IP addresses you don t have to enter a subnet mask on each client device For most of us the subnet mask is another of those settings that we have to enter correctly to make the network work properly but we really don t need to know what it means In a large or complex network however you can use subnet masking to separate the network into smaller subsidiary networks or subnets Computers and other network nodes within the same subnet can exchange data more quickly because they don t have to go all the way out to the larger WAN or the Internet and back again to locate one another As you know numeric IP addresses are divided into four groups of numbers each of them within the range from 0 to 255 One part of the address identifies the network and the other identifies a specific com pu
21. and servers are no exception If you re resuscitating an old computer to use as a file server you might be able to salvage the original operating system that ran on that computer but connecting anything earlier than Windows 2000 or Mac OS X to your network could cause more trouble than it s worth If you have some experience with Unix or Linux or if you re willing to learn one of these operating systems might be a better choice because they have up to date features and functions and they won t demand as much processing power or memory as a newer version of Windows a good intro ductory book will help get you started If cost is an issue is cost ever not an issue many Linux and Unix distri butions are available online as free if time consuming downloads or on low cost CDs and DVDs from distributors such as LinuxCD hitp www linuxcd org and The Linux Store hitp www thelinuxstore ca Several versions including CentOS and FreeBSD include server applications along with the core operating system and desktop programs FreeNAS available from hitp www freenas org is also worth considering if you want a simple file server On the other hand if you haven t used Linux or Unix before you might not want to deal with the distractions involved in installing and learning a new operating system at the same time that you re trying to set up a new network Microsoft s Windows Server family and similar products from Apple a
22. operating systems For descriptions and links to additional versions go to hitp www linux com feature 43 1065 MaxiVista Adding a Screen MaxiVista is a slick set of network tools for Windows that allows you to extend your computer s display to one or more additional computers connected to the first computer through your network or to operate two or more computers with the same mouse and keyboard It can also allow you to use the Windows clipboard across two or more computers through the network These tools Other Network Applications 229 230 Chapter 16 aren t for everybody but under certain conditions an extended keyboard or shared controls can be hugely convenient MaxiVista is available in a free demo version from http www maxivista com MaxiVista comes as two programs a server program that runs on the main computer and a client program that runs on each of the secondary machines Except for the network connections that are already in place MaxiVista doesn t require any special hardware All of MaxiVista s controls are on the server the only setting on each client turns the program on or off The server automatically detects each active client and includes controls that you can use to select either an extended desktop or remote control of client computers Multiple Monitors Extending the size of your screen display by adding an additional monitor is one of those things that sounds extravagant but just about everybody
23. re using a plywood panel as your control center mount one or two rows of outlet blocks along the top of the panel or along the side opposite the power strip Keep the outlets evenly spaced and allow enough space to add more outlets in the future Terminate the wires in each network cable on a terminal block with an eight pin RJ 45 socket be sure to follow the color codes and attach a tag to the cable that identifies the location of the cable s other end Use a marking pen or the label supplied with the terminal block to identify each cable on the cover of the block Your goal is to be able to figure out at a glance which terminal block connects to what destination There are two different standard color codes for connecting Ethernet cables to plugs and sockets Use one of the standard color codes T568A or T568B to connect each wire in the cable to the socket inside the terminal block Table 6 2 shows the correct connections It doesn t matter which of the two standards you use as long as both ends of each cable follow the same standard The best approach is to choose a standard and wire every socket in your network to that standard Table 6 2 Wiring for Ethernet Cables and Sockets E AOLLCLLILLLLLLLAALLLULLCGLLCELLLLSL L C amp LLL ULUA ZOLL OUODCZIG LnLILLAULLULLLUUESZIXLLILGSALLAALELGAGGOULIAEL US AA Ou GU ZA Color T568A Pin Number T568B Pin Number Blue Blue White 4 5 Orange 6 Orange White 3 Green 2 Green White 1 8
24. window shown in Figure 12 12 will appear 000 Accounts lt gt Ls 1 Name My Account Short Name ontrols Password Other Acco Mr B gt Admit Verify brd Password Hint Optional C Allow user to administer this computer _ Cancel Create Account 3 ress Book Card Open v Allow user to administer this computer f Login Options tr M id Click the lock to prevent further changes Figure 12 12 Create a new account using this window 4 Type the name and a short name for the new account The short name should be identical to the user s Windows or Linux Unix username 5 Type the user s password in the appropriate field In OS X 10 2 check the Allow user to log in from Windows checkbox and then click OK 7 Close the System Preferences window When an existing user wants to connect to a Mac the user s computer should automatically set up the link in versions later than OS X 10 8 but sometimes you have to instruct the Mac to accept the link This is always required in OS X 10 2 Follow these steps to allow a user to log in from a Windows network l From the Apple menu select System Preferences 2 Select View Accounts 3 Select the account you want to authorize If the computer requests a password type it in the appropriate field 5 Check the Allow user to log in from Windows checkbox The system will instruct you to reset your password 6 Enter you
25. 129 128 129 CUPS printer control program 199 file servers 94 95 96 98 215 file sharing 131 147 150 148 150 firewalls 154 159 155 158 network adapters 73 74 network to Internet connections 115 OpenVPN for 173 remote desktop programs 229 text commands for 43 44 troubleshooting info 247 VPN clients for 172 173 VPN servers for 164 wireless control programs 87 Unlicensed National Information Infra structure U NII 79 updates and patches 185 188 186 187 UPS uniterruptible power supply 61 USB adapters 72 device servers 99 99 100 flash drives 121 ports 4 16 21 70 73 99 192 194 195 201 205 211 212 216 Wi Fi adapters 83 84 84 85 US CERT United States Computer Emergency Readiness Team 189 user accounts 152 c V VGA connectors 218 displays 220 231 video cables 65 66 conferencing 205 237 files 203 205 215 220 messaging 237 outlets 48 49 50 51 output drivers 219 scaling 219 220 servers 7 8 215 VideoLAN 218 Virtual Network Computing VNC 226 229 Virtual Private Network Consortium VPNC 162 Virtual Private Networks VPNs built in support 164 165 165 client software for 165 173 166 172 configuring servers for 163 164 configuring Windows for 165 172 166 172 data tunnels 159 161 functions of 90 159 161 160 161 messaging through 236 methods 161 162 OpenVPN 164 173 overview of and examples 78 90 91 159 174 160 161
26. 13 19 Use the Automatic Updates tab in System Properties to turn on Windows Update 3 Choose an option to set the way your computer will handle new updates In most cases the Automatic option is the best choice but if you re using this computer for programs that require most of the system s processing power such as sound or video recording select the Notify me but don t automatically download or install them option instead 4 Click OK to save your settings and close the System Properties window Automatic Updates loads changes that somebody at Microsoft has flagged as essential to the computer s performance or security but it ignores many others including new versions of device drivers and updates that add or improve other features for Windows and some related programs To find and select these programs follow these steps l Ifyou aren t already connected to the Internet connect your computer now 2 From the Start menu choose Windows Update You can also find a link to this command in Internet Explorer s Tools menu 3 After the Update website confirms that it has installed the software it uses to scan your computer the site displays the Welcome screen shown in Figure 13 20 Click the Custom button 186 Chapter 13 zox 7 x Google XX amp 9 Microsoft Update Search Microsoft com for Microsoft Update Welcome Automatic Home Update E Turned Keep your computer up to date Options Check to see if y
27. 140ms TTL 48 Reply from 72 32 92 4 bytes 32 time 99ms TTL 48 Reply from 72 32 92 4 bytes 32 time 99ms TTL 48 Reply from 72 32 92 4 bytes 32 time 97ms TTL 48 Ping statistics for 72 32 92 4 Packets Sent 4 Received 4 Lost 0 0 loss Approximate round trip times in milli seconds Minimum 97ms Maximum 140ms Average 108ms Listing 4 3 The ping command sends a series of echo requests to a designated address Many books and people will tell you that ping is an acronym for Packet InterNet Groper but Mike Muuss who wrote the original program always insisted that he chose the name to imitate the sound of a sonar system How Computer Networks Are Organized 43 44 Chapter 4 00000 aboard a submarine the sonar system makes an audible ping when an echo pulse returns from a target ping has several uses It can confirm that the distant computer is alive and that your computer s connection is working properly It can also provide a rough idea of the network s performance less time means higher speed ping is also useful for finding a DNS problem if you get a successful ping echo when you enter the target s numeric IP address but not when you enter the domain name the glitch is almost certainly someplace in the DNS system In Listing 4 3 it took about one tenth of a second 100 ms for each test to go from Seattle to San Francisco and back That s a perfectly reasonable amount of time But if one or
28. 165 166 167 168 169 170 171 172 via public networks 173 174 servers 161 162 165 165 167 169 168 viruses troubleshooting 245 VNC Virtual Network Computing 226 229 Voice over Internet Protocol VoIP 54 VPNC Virtual Private Network Consortium 162 VPN Masquerade 164 VPNs See Virtual Private Networks VPNs W wall mounted outlets 59 wall plates 49 49 50 52 55 56 56 67 WANS See wide area networks WANs WAV files 209 210 210 211 web browsers 24 174 webcams cameras 8 204 204 205 237 web hosting services 105 WEP wired equivalent privacy encryption 90 91 174 175 176 179 182 181 183 217 WIA interface 201 wide area networks WANs computer to network connections 117 connections to 24 network to Internet connections 108 109 113 115 overview of 31 32 32 45 Wi Fi wireless fidelity hotspots 77 78 89 links 19 20 194 211 213 215 215 217 224 networks access points 16 53 55 62 80 81 81 85 86 87 90 99 111 113 174 antennas 4 80 82 84 85 configuring 85 86 connection programs 85 87 89 control programs 85 86 87 88 88 designing planning for 54 enhanced extreme systems 78 79 firewalls for 154 159 155 158 172 hybrid wireless networks 89 network interface adapters 81 85 82 83 84 85 87 network standards 78 78 79 operating channels 79 80 80 86 overview of 16 77 78 planning for 50 security methods 54 89 92
29. 17 28 29 47 50 53 54 56 69 75 71 72 125 outlets 53 ports 4 70 74 71 85 97 193 201 216 switches 30 53 53 55 62 80 193 INDEX 255 256 INDEX Exact Audio Copy 208 Extensible Authentication Protocol EAP 182 external controllers 204 205 external printer servers 792 192 193 extreme systems 78 79 F faxing devices 199 201 200 F connectors 218 fiber optic links 6 field replaceable unit FRU 82 File and Printer Sharing for Microsoft Networks 196 196 file servers backup files 100 104 101 103 104 choosing 94 home usage of 105 NAS network attached storage devices 93 95 97 98 98 100 108 overview of 24 93 94 sharing permissions 96 97 97 software systems for 94 96 96 97 99 98 99 storing files on 96 97 USB device servers 99 99 100 file sharing compatibility issues 131 computer to network connections 120 dialogs 140 140 Linux 131 147 150 148 150 Macintosh OS X 131 134 135 143 147 144 146 media sharing 143 overview of 5 5 131 132 passwords and privacy 133 136 134 143 permission levels 141 143 printer sharing 7 143 196 196 199 198 199 Server Message Block SMB protocol 131 143 145 147 146 150 Simple File Sharing 752 132 133 136 Unix 131 147 150 148 150 usernames 140 141 145 Windows Vista 131 136 143 137 142 Windows XP 131 132 132 136 134 135 file storage servers 96 97 file synchronization 232 File
30. 255 0 Gateway address 192 168 0 1 apog Figure 11 16 Use the Gnome network Properties window to configure a network connection without a DHCP server Figures 11 17 and 11 18 show the KDE Control Module utility included with PC BSD To change the configuration settings select the adapter connected to the network and click the Configure button Configure KDE Control Module Changes in this section requires root access Click the Administrator Mode button to allow modifications Devices DSL PPPoE Local Network Adapters Ej xl0 3Com 3c905C TX Fast Etherlink XL v Display system tray icon Configure Device Status Address IP 192 168 1 102 Netmask 255 255 255 0 MAC Address 00 01 03 30 54 0b Status active System wide configuration settings DNS 2 Gateway is IPv6 gateway Administrator Mode bd Figure 11 17 The KDE Control Module utility includes network settings for each network adapter xlo configuration e amp General Advanced Info Network address configuration O Obtain IP automatically DHCP Assign static IP address let Netmask 255 255 255 0 C Disable this network device OK Apply Close Figure 11 18 The KDE configuration window for each network adapter includes settings for DHCP IP address and the subnet mask Netmask Other desktop environments might use different configuration utili
31. 400 GHz 2 483 GHz Figure 8 1 Wi Fi signals use 11 separate overlapping channels Notice that channels 1 6 and 11 do not interfere with each other Access Points Chapter 8 Every Wi Fi network must have at least one access point Wi Fi access points or base stations are radio transmitter receivers transceivers that send and receive data by radio and exchange that data with a wired Ethernet network You can think of an access point as a router between a Wi Fi network and a wired LAN Most access points have one or two short antennas attached to the back panel some also have a connector that can mate with a cable from a separate antenna Separate antennas are useful because they can increase the access point s signal strength and sensitivity but they re usually not necessary in small indoor home or small business networks There s more about antennas later in this chapter Wi Fi access points are often combined in a single unit with cable or DSL modems gateway routers or Ethernet switches If your network includes both wired and wireless connections you might want to consider a combined device which is often less costly than two separate boxes Figure 8 2 shows a combined access point Ethernet switch and router Indicator lights on the front of this device show power wireless activity and data moving to or from each wired network node A single 802 11g or 802 11n base station should provide more than enough signal coverag
32. 5of5 network connections either do not have Windows Firewall enabled oc they are enabled with exceptions Firewall What Result det t d 9 Automatic Updates are automatically downloaded and installed on this computer Updates What L File All hard drives 4 are using the NTFS file system System What Result det Ld Restrict Computer is properly restricting anonymous access Anonymous Administrators No more than 2 Administrators were found on this computer Additional System Information Score Issue Result udting Enable auditing for specific events like logon logoff Be sure to monitor your event log to watch for unauthorized access sees Some potentially unnecessary services are installed 9 Shares 16 share s are present on your computer zi Print this report D Copy to clipboard o _oK Figure 13 22 Microsoft Baseline Security Analyzer finds potential security problems and offers instructions for fixing them Controlling Your Own Users As manager of your home or business network remember that you re responsible for the security of the whole network and all the computers connected to it Whenever it s practical do whatever you can to encourage all your users to pay attention to security Even if it seems easier to run their computers wide open without proper security measures you are responsible for convincing them to keep their computers safe Denial of Service Attacks A denial of service Do
33. 7 Brown N 0 00 0o NORA Brown White Follow these steps to connect a CAT5 CAT5e or CAT6 cable to an Ethernet socket 1 Allow about a foot of slack and cut off the excess cable 2 Remove about two inches of the cable s outer jacket Be sure you don t nick any of the internal wires with your stripping tool 3 Separate the four pairs of wires that extend beyond the jacket but don t untwist the individual wires 4 Follow the instructions supplied with the connector to direct each wire to the correct slot Be sure the jacket extends into the back of the connector 5 Use a punch down tool to insert the two wires closest to the back of the connector into their respective slots 6 Insert the wires from the other three pairs into the correct slots Don t untwist the pairs any more than is necessary 7 Double check to confirm that each wire is in the correct slot according to the color code you are using 8 Ifyour punch down tool doesn t automatically cut off excess wire use a wire cutter to trim each wire 9 Ifthe RJ 45 socket came with a dust cover snap it into place over the wires 10 Insert the socket into the terminal block or the wall plate from the inside of the block or case Adding a Telephone When you re trying to solve a problem with your network connection it s often helpful to have a telephone next to the control panel so you can talk to a technical support person while you re l
34. 92 174 184 175 178 181 sniffers 178 179 249 topologies 27 28 28 webcams 205 wiring methods 16 18 Network Setup Wizard 118 122 119 120 121 Network Stumbler 179 Network window 125 Newegg com 57 Nintendo Wii 220 221 NIST Cerberus 173 NNTP network news 158 nodes 14 48 50 noise 13 17 nondirectional antennas 85 Novell 95 null modems 19 79 numeric IP addresses 36 37 42 109 110 0 OEM original equipment manufacturer 85 95 Ogg Vorbis files 270 omnidirectional antennas 85 ones and zeroes 10 10 See also Internet Protocol IP addresses online virus scans 245 OpenBSD 159 164 173 OpenDNS 41 114 open source operating systems 96 OpenVPN 164 173 Opera 24 operating channels Wi Fi 79 80 80 86 org 40 original equipment manufacturer OEM 85 95 outlet blocks 59 60 60 outlets cable TV 48 49 data 48 56 56 57 59 60 67 68 electrical 48 50 49 52 52 55 56 59 Ethernet 53 telephone wall 48 49 51 video 48 49 50 51 wall mounted 59 P Packet Filter PF 159 Packet Internet Gopher 43 packets 11 13 72 Panda ActiveScan 245 parallel ports 4 16 192 792 194 parallel signals 10 parity bits 13 passwords 90 133 136 134 148 152 154 154 205 patch cords 56 57 patches and updates 185 188 186 188 PC card adapters 82 83 83 PC Express Cards 82 83 PCI expansion cards 72 72 84 204 PCMCIA sockets 73 82 peer
35. 96 kHz per second WAV files so you ll have to play them in another program such as Audacity or Sound Forge Converting from Analog Sources If you want to distribute music and other recordings from LPs and other analog media such as cassettes old 78 rpm discs and reel to reel tape through your network you must convert them to digital audio files first This conversion is more time consuming than ripping CDs but it can be rewarding if you have some great old records that are not available in any other format If you plan to transfer a lot of analog media to digital files it s worth the extra cost to use a better analog to digital converter than the one built into your computer Professional studio quality converters can cost hundreds or thousands of dollars but less expensive devices such as the ones made by E Mu M Audio and Edirol among others will give you considerably better performance than consumer grade sound interfaces Remember that the sound of your digital copy won t be any better than the sound coming from the analog original Before you make a copy be sure to clean the dust and grit from your LP and make sure the needle on your record player is in good condition Use alcohol or some other head cleaner to remove the gunk from the face of the heads before you try to play cassettes or reel to reel tapes Audio Clients In a home network the other half of a music distribution system is a music client or audio clie
36. 98 159 164 172 173 BSSID 177 179 builtin Ethernet window 725 builtin printer servers 194 bulk cables 56 C cable modems 110 cables bulk 56 CAT5 CAT5e CAT6 data 50 56 57 66 coaxial 17 65 for combination boxes 33 DVI 219 220 Ethernet 15 47 53 56 60 60 66 66 77 192 jumper 56 overview of 33 56 RG6 U 65 troubleshooting 242 twisted pair 15 15 video 65 66 cable TV connections 32 64 99 outlets 48 49 cameras webcams 8 204 204 205 237 CardBus 73 Carrier Sense Multiple Access with Colli sion Detection CSMA CD 14 CAT5 CAT5e CAT6 data cables 50 56 57 66 CBS 3 CDs music 208 209 211 CentOS 95 CHA 1 Connected Home Appliances standard 223 chatrooms 237 checksums 13 Cisco 161 164 client firewall programs 157 158 159 clients audio 211 212 213 clients and servers 23 25 25 clones 100 coaxial cables 17 65 collisions 14 18 com 39 40 combination boxes 33 commands See network commands communication channels 3 11 complete images 100 compressed audio files 209 Computer Supported Cooperative Work 233 computer to network connections See network connections conferencing remote 205 237 Connected Home Appliances CHA 1 standard 223 control centers See networks control centers controller cards 204 conversions audio 206 207 209 211 converters analog 206 207 209 211 212 audio 206 207 209 211 power 61 TV video 219 coop 40
37. Cable Connection ssssssse ee 64 Terminating the Network Cables sss 66 Pe SDN m 67 Tabletop Control Centers for Small Networks sss 67 7 ETHERNET NETWORK INTERFACES 69 Builtinto the Motherboard 5 orte locet teo ee slb ous Fosb be ce aea 70 Setting the BIOS Utility esses eme 71 Adding a Network Interface to an Old Computer sss 72 Internal Expansion Cards sess eene 72 USB Adapters 2 eter tee ertet en ae carva costae ene pate 73 Network Adapters for Laptops 73 Finding the Driver Software for Your Adapter 74 Status Lights on Network Adapters sss 75 Vill Contents in Detail www allitebooks com 8 WI FI NETWORKS 77 Types of Wi Fi Networks me eee nene 78 Operating Channels 24 1 5 Hardt tees t b ele Han oerte eto Perd erbe gta 79 f rrsidel cc LEE 80 Network Interface Adapters ccccecseecseeeseeeeeecseeeseseseeereeseseseseeereeeteeeeseseeeeeeeees 81 Adapters Built into Laptops esss ee 81 pereo m PME 82 USB Adapters 1 c coepere nep d ekle e ue eni pee tee s 83 uela n cM 84 Antennas erede iiti Meas vans PORE E PE Er eee h Reg de ERAT e eee IE e e ee es 84 WiFi Control Programs 3 2 ente petet e EG QU D PPAR Ee Ms 85 Access Point Configuration Programs sssssssseee ee 85 Wireless Connection Programs sse eme eem ens 87 Hybrid Wired Wireless Networks
38. Classic Start Menu select Settings Network Connections The Network Connections window shown in Figure 11 7 will open Network Connections 5 xl File Edit View Favorites Tools Advanced Help QBack 7 Ov 7 P Search i Folders i gt gt X 9 3 Address s Network Connections e a ei Network New 1394 America Setup Connecti Connection Online Wizard i i 91 Dial up Internetvia Local Area Connection MSN Connection 1 7 objects Z Figure 11 7 The Network Connections window shows all of your computer s network profiles 2 Your wired connection profile is the one called Local Area Connection and sometimes includes a number The number is usually 1 as shown in Fig ure 11 7 but if you have added or deleted additional profiles some other number might be used If you re using a Wi Fi or other wireless network connection the network profile will be called Wireless Network Connection Open the Local Area Connection and click the Properties button or open the Wireless Network Connection profile and click Change Advanced Settings A status window similar to the one shown in Figure 11 8 will open Local Area Connection 1 Propane d 4 E NW Link NetBIOS i F7 NWLink IPXISPXINetBIOS Compatible Transport Protocc i4 7 Microsoft TCP IP version 6 sa W Internet Protocol TCP IP Figure 11 8 The Local Area Connection status window shows information about your network connection Scroll down
39. Denial oF Service Altacks eee eere e eie S 189 emp e 189 X Contents in Detail 14 PRINTERS AND OTHER DEVICES ON YOUR NETWORK How to Connect a Printer to Your Network eee External Printer Servers ccccccccccceseeeececccceusueecececceusaueseeseceeeuaseecess Wi Fi Printer Servers c0 cc0ccccssccescccsssccsecessscesvectevcesccatevccsvesevvcsesseee Built In Printer Servers ssssee ee e emememes eren eis Automatic Printer Switches seeseeeeee emen enne Using a Computer as a Printer Server CUPS The Common Unix Printing System sss AllinOfie Devices inb occ e Mee cec tte cor dee roe deese ett osa 15 OTHER THINGS YOU CAN CONNECT TO YOUR NETWORK AUDIO VIDEO HOME ENTERTAINMENT AND BEYOND Using a Microphone and Camera with Your Network ssseee Internal and External Controllers s Networked Cameras and Microphones Home Entertainment Networks sssssse eene emere Music Through a Home Network sssssssse eem A dio Servers insiet ene de ade eme dies Audio Clients etico totis eneiee ce eret ttbi ob RE SE b ens Video Through a Home Network sssssse eee Vide6 Servers sonion iu ea at cater ter Piae e Pope P apre en TiVo and Other Digital Video Recorders ssssee Playing Video on a Computer sssss e Connecting a TV to Your Network sssss
40. Documents My Music My Pictures and other folders in drive letter Documents and Settings lt username gt To assign a folder or disk drive to Level 1 access follow these steps From the Windows desktop open My Computer Select Documents and Settings and then select the username folder 3 Ifthe folder you want to assign to Level is not visible in the My Com puter window open the drive or folder that contains that folder Right click the drive or folder icon 5 Select Sharing and Security from the pop up menu The Properties win dow shown in Figure 12 2 will appear Sharing Files Through Your Network 133 134 Chapter 12 My Music Properties xl General Sharing Local sharing and security Ys To share this folder with other users of this computer only drag it to the Shared Documents folder To make this folder and its subfolders private so that only you have access select the following check box Make this folder private Network sharing and security To share this folder with both network users and other users of this computer select the first check box below and type a share namo Share this folder on the network F Ala ork users to chang Learn more about sharing and security V rrelw 4 Windows Firewall is configured to allow this folder to be shared with other computers on the network a eo Figure 12 2 Check the Make this folder private checkbox to restrict access to
41. FTP default data 21 FTP File Transfer Protocol 23 Telnet 25 SMTP outgoing mail 37 Time 53 DNS Domain Name System 70 Gopher 79 Finger 80 HTTP web server 88 Kerberos 110 POP3 incoming mail 119 NNTP network news 1863 Microsoft MSN Messenger 5190 AOL Instant Messenger 7070 Real Audio and Video Firewall Software A wireless gateway firewall at the interface between the access point and the wired part of your LAN will keep intruders from using your network to reach the Internet and a firewall at the Internet connection will turn away attempts to connect to your network from the Internet but a wireless network still needs one more form of protection If somebody gains access to your wireless LAN without permission you want to keep them away from the other legitimate computers on the same network so each network node needs a client firewall program Client firewalls perform the same functions at a computer s network interface that a LAN or enterprise firewall performs for the entire network a client firewall detects attempts to connect to TCP service ports and rejects them unless they match one or more of the firewall program s configuration settings Several good firewall products are available as shareware and others are free to noncommercial users It s easy to try them on your own system and choose the one you like best ZoneAlarm hitp www zonealarm com and LANguard hitp www languard com are both well reg
42. GO Control Panel gt Printers File Edit View Tools Help Documents Status Comments Location Microsoft XPS Document Samsung ML 1740 Series p Soe 2 Figure 14 6 The Add a printer icon is on the toolbar directly above the Printers window CUPS The Common Unix Printing System CUPS is a printer control program for Unix and Linux systems that converts page descriptions from application programs such as a word processor or a web browser to the specific instructions used by individual printers If printing from your Unix or Linux distribution requires complicated command line instructions CUPS can provide an easier solution look for a free download from Attp www cups org A CUPS driver for Windows is also available as an extension to the PostScript driver supplied with Windows It s available at http www cups org windows CUPS can print to a printer connected directly to your own computer or through a network to a printer server All in One Devices Most offices perform several different paper handling activities copying printing scanning and faxing All of these activities use some combination of the same core functions so it often makes sense to combine several activities in a single machine that can send a digital file or scanned image to either paper or another digital file The category of device that combines these functions is called rather grandly an all in one device or simply an all in one An al
43. Internet Protocol VoIP telephones smart phones and other portable devices If you decide to include one or more Wi Fi access points in your network mark their tentative locations on your floor plan In most cases a single access point can exchange data with computers and other devices within about 300 feet 100 meters so the exact location is not critical The best location is often either in the network control center or on the floor or a table next to a computer in a fixed location For detailed information about installing Wi Fi access points and connecting Wi Fi devices to your home or office network see Chapter 8 With your network floor plan more or less complete you re ready to install the control center and string Ethernet cables to each room The next chapter will tell you how to do that job INSTALLING THE NETWORK CONTROL CENTER AND ETHERNET CABLES and other devices to the network through cables or wireless links your network must have some kind of control center that includes one or more hubs or switches for your wired Ethernet connections an access point for Wi Fi or both If you plan to connect your LAN to the Internet the control center must also include a gateway router and a modem This chapter explains how to assemble a control center and run cables between the control center and the computers game consoles printers and other devices that make up your network Connectors Wall Plates and Surface
44. Options Next Backup Time Machine Time Machine keeps Hourly backups for the past 24 hours Daily backups for the past month OFF EN jJ ON Weekly backups until your backup disk is full 1 Click the lock to prevent further changes Figure 9 9 If you have a new Mac turn on Time Machine to automatically create backups Before you trust your critical files to any backup program run some tests to confirm that the program can accurately restore those files including the metadata embedded inside them Some Mac backup programs designed for earlier versions have trouble dealing with OS X files Linux and Unix Backups Linux and Unix users have a wide choice of backup programs including sev eral that can originate the backup process from either the server pulling backup data from client computers or from individual client computers pushing the backup files to a server The Linux Online website includes an up to date list of backup programs at http www linux org apps all Administration Backup html Distributions with graphic environments such as Gnome and KDE usually include at least one graphic backup program One possible backup solution on computers running Linux Unix or Mac OS X is to use rsync over SSH to an external system and schedule it via cron This doesn t have a nice graphical front end but it gets the job done securely and efficiently because rsync does not copy bytes across the network th
45. PDA personal digital assistant or a mobile Internet device such as a BlackBerry or an iPhone you can often connect it to the Internet via Wi Fi by simply turning it on Many home and small business networks use a combination of Ethernet and Wi Fi the Wi Fi base station doubles as a connection point for Ethernet cables so the same LAN includes both wired and wireless nodes Chapter 8 contains information about installing and using Wi Fi network links Powerline Networks Chapter 2 In a powerline network computer data moves through a building s existing electric wiring Each computer connects through a parallel port a USB port or an Ethernet port to a data adapter that plugs directly into an AC wall outlet The same power transformer that feeds your house wiring also isolates your data network from your neighbors The most widely used standard for powerline networks is called HomePlug The greatest advantage of HomePlug and other powerline networks is that the wires are already in place Every AC wall socket in the house can double as a network connection point It s also more secure than Wi Fi and it can reach greater distances than a Wi Fi network with just one base station Wi Fi signals are often blocked by thick walls and other obstacles that make no difference to a powerline system NOTE You must plug all your powerline adapters directly into wall outlets Surge protectors and powerline conditioners often absorb powerline net
46. Transfer Protocol FTP 39 157 158 Finger 158 Firefox 24 firewalls 90 91 154 159 155 158 164 172 176 firewall servers 24 FireWire ports 4 21 205 211 fixed IP addresses 37 38 109 118 FLAC Free Lossless Audio Codec files 210 flash drives 1 3 120 217 floor plans 47 48 48 54 55 59 floppy disks 3 4 FM radios 214 Folder Options window 132 132 frames 11 13 248 FreeBSD 95 98 173 FreeFileSync 232 Free Lossless Audio Codec FLAC files 210 FreeNAS 95 98 98 FreeNX 226 FreeS WAN 164 173 FRU field replaceable unit 82 FTP File Transfer Protocol 39 157 158 full duplex mode 30 G Gadu Gadu 235 game consoles 220 222 game servers 24 gateway addresses 109 114 115 gateway routers 6 6 32 109 110 Gigabit Ethernet networks 14 15 29 56 72 Gmail 105 Gnome 104 127 127 128 128 147 149 148 GoodSync 232 Google Talk 234 235 Gopher 158 gov 40 gramophones 206 207 207 graphical user interface GUI 150 guest accounts 152 GUI graphical user interface 150 hackers 82 92 157 249 handoffs 177 handshaking 13 14 HDMI See High Definition Multimedia Interface HDMI HDTV screens 219 220 headers 11 13 12 Hewlett Packard HP 95 hex encryption keys 180 181 181 hidden networks 179 High Definition Multimedia Interface HDMI 217 cables 219 220 high gain directional antennas 85 high speed modems 109
47. What else happened Have you noticed any other problems or unex pected events Has another network user experienced a similar problem at about the same time Is this a new problem Have you ever experienced this problem or something similar before look for Simple Solutions First Look for easy solutions before you start to tear apart hardware or run complex software diagnostic routines Nothing is more aggravating than spending several hours running detailed troubleshooting procedures only to discover that restarting a computer or flipping a switch is all that was needed to fix the problem Restart Everything The first thing to try when an otherwise unexplainable problem occurs is to turn off each network component one at a time wait a few seconds and then turn it back on again Sometimes that s all you need to do to clear a program or a chunk of memory that is stuck on the wrong setting and return it to the correct value If possible use the operating system s shut down process to turn off the computer in an orderly manner don t use the power switch or reset button unless the computer won t respond to a mouse or keyboard command Don t turn off your computer until you have copied the text of amy error messages on the screen Sometimes the same problem will produce a different message after you restart or none at all and the text of the original message might be a useful troubleshooting tool When you restart a computer don t
48. XXX XXX you have entered for this network adapter is already assigned to another adapter 1 get the error message LAN Connection A network cable is unplugged 1 get the warning Limited or no connectivity The problem occurs only on a wireless connection The Networking Wizard does not run to completion Internet 80 Al Figure 17 1 The Windows Network Problem Solver is an excellent interactive trouble shooting tool This screen image shows only a small portion of the page scroll down for additional information and instructions Software for Troubleshooting Chapter 17 Several software programs can gather and display useful information when you re trying to understand what s happening inside your network These programs are available as free or trial downloads so you don t incur a cost when testing them Network Magic Network Magic http www networkmagic com provides a graphic display of the devices connected to a LAN as shown in Figure 17 2 and a central control point for adding new network devices or changing the existing network configuration It can also perform some basic troubleshooting tests and automatic repairs Protocol Analyzers Microsoft Network Monitor go to Attp wwuw microsoft com downloads and search for Network Monitor and Wireshark http www wireshark org are free protocol analyzers that capture and display data as it moves through your network In other wo
49. You will find more information about VNC later in this section Windows Remote Desktop Windows Remote Desktop transfers control of a client computer to a host The host mirrors the screen display from the client and the host s mouse and keyboard control the programs running on the client When Remote Desktop is active the client computer displays a blank screen and doesn t respond to keyboard or mouse input until the host releases control Remote Desktop makes the person running the host computer a sort of superuser who can take control of a client computer so several controls are built into the system that limit this kind of access First the user of the client must set the computer to accept Remote Desktop access and second the person running Remote Desktop on the host computer must have an account usually with a password on the client computer In other words if you turn off Remote Desktop on your computer other people can t use it without your permission In Windows XP the remote access tool is called Remote Access in Windows Vista it s known as Remote Desktop Computers running Windows Vista Starter Windows Vista Home Basic Windows Vista Home Basic N or Windows Vista Home Premium won t accept incoming access but you can use Remote Desktop to take control of another computer running some other version of Vista Windows XP Home Edition won t accept access from any Windows Vista machine Configuring Windows for Remote Deskt
50. a Wi Fi access point Photo courtesy of Lantronix Figure 9 5 The Lantronix UBox connects external disk drives and other USB devices directly to your network Apple s AirPort Extreme Whether or not you re using Macintosh computers in your network Apple s AirPort Extreme product can be an inexpensive alternative to a full size file server Along with its functions as a DSL or cable gateway router an Ethernet switch and a Wi Fi base station the AirPort Extreme also has a USB port that can connect an external hard drive directly to your network To use more than one external hard drive connect them to the AirPort Extreme through a USB hub Figure 9 6 shows the rear panel of an AirPort Extreme USB WAN Ethernet port port ports E igi o cm e NES ES Photo courtesy of Apple Figure 9 6 AirPort Extreme can connect a USB hard drive directly to your network File Servers 99 100 Backing Up Files to a Server Chapter 9 There s more than one way to back up files to a server You can run a backup program on the client machine and specify a drive and folder on the server as the backup storage location or you can originate the backup from the server and select files on one or more clients as explained earlier client computers are the ones that receive services from a server Before you create your backups you must decide exactly what you want to accomplish Several different kinds of backups are possible
51. a general overview of networks and the things you can do with them In later chapters you will learn how networks handle digital data how different kinds of networks move that data from one place to another and how the equipment at the core of most networks hubs routers modems and other devices works Next I ll introduce the important concepts of clients and servers and tell you how to design and install simple wired and wireless networks how to connect the local network to the Internet how to build security into your network and how to use your network for music and video along with computer data And finally the last chapter of the book offers advice about troubleshooting and describes some useful tools that might make life a bit easier when it becomes necessary to find and fix a problem When you have a network in your home or small business all the com puters connected to the network will become more flexible and more useful Your new network will change the way you use your computer within a few weeks or less you will definitely wonder how you got along without it When you and the other people connected to your network find yourself using it without thinking about the network you and I will both have met our objectives Introduction xvii HOW A NETWORK WILL IMPROVE YOUR LIFE employer or your spouse bring a computer into your office or your home and every thing is right there word processing files finan
52. a terminal block to each end and pre built cables for patch cords and for connections between wall outlets and network devices Patch cords are widely available in office supply and electronics stores but they re often four or five times more expensive than the identical cables sold through industrial electronics suppliers and online sources such as Jameco Attp www jameco com Cyberguys http www cyberguys com and Newegg com http www newegg com A 3 foot cable should not cost 8 or 10 There s no reason to pay more for premium patch cables any cable that meets the CAT5e specification will do the job This piece of advice will probably save you more money than you paid for this book In buildings with raised floors or dropped ceilings it s often convenient to run your data cables through the plenum space above the ceiling or under the floor However fire regulations often require special plenum cable that won t burn easily and won t produce toxic fumes Plenum cable is more expensive than regular bulk Ethernet cable and it s more difficult to use because the jacket is heavier and less flexible but there s no difference in its data handling performance When you re shopping for cable you might find boxes or spools of plenum cable next to regular CAT5e cable Sometimes the only difference is a single line on a label Unless you have a specific need for plenum cable don t waste your money on the more expensive st
53. additional wiring and equip ment in the future e Itshould not be adjacent to the fuse box circuit breaker box or other electrical panel AC power wiring must be kept separate from network telephone and video cables to prevent interference and to comply with the National Electric Code After you choose a place for the control center note its location on your floor plan Home Run Wiring When you have identified the locations of your network connection points and found a place for the control center you can plan the routes for your network cables The preferred method for network wiring is called home run wiring because each cable runs home to a central hub or switch The alter native which is more practical for telephone and video wiring than for data networks is point to point wiring that uses long cable runs that connect to each outlet through a splitter as shown in Figure 5 3 Designing Your Network 5 Desktop computer Desktop computer Tower PC Telephone service entry Telephone Telephone Desktop computer i li F S Telephone s Telephone Tower PC Telephone EN ae Telephone Figure 5 3 Home run wiring left is best for data networks telephones and video can use either home run wiring or point to point networks right 52 Chapter 5 If you ha
54. an Ethernet port or jack that mates with the plug on an Ethernet cable Both the plug and the socket follow a standard called R 45 that specifies the size and shape of the connectors and the signals that move through each of the eight pins RJ stands for Registered Jack RJ 45 connectors are similar to the six pin RJ 11 plugs and sockets used on telephones but the RJ 45 is slightly larger to allow for the additional pins Figure 7 1 shows both an RJ 45 Ethernet plug and an RJ 11 telephone plug E X Ww F168630 CSA wu r Figure 7 1 An RJ 45 data plug left has eight wires an RJ 11 telephone plug right has four or six wires In addition to the port itself an Ethernet interface also includes some internal hardware that converts the data in both directions between the format that the computer s central processor can handle and the format used by the network This hardware can take several forms It can be e On the computer s main circuit board the motherboard e A printed circuit card that mounts inside the computer e APC card that plugs into a laptop computer e An external unit connected to the computer through a USB cable Almost all the computers built within the past few years have built in Ethernet ports On desktop and tower computers the RJ 45 jack is on the back of the case as shown in Figure 7 2 On laptop computers the Ethernet port is usually on either the back or the side of the case If your compute
55. and take action to make it stop When this happened to me I used Wireshark to find the numeric IP address of the computer that was originating the bogus messages and a whois program to identify that computer s owner then I sent an email explaining the problem and asking them to fix it The data stream stopped within an hour A network sniffer can also identify a device within your own network that becomes infected or has some other problem that interferes with proper operation By running the sniffer program on more than one computer or even inserting a sniffer at a router a modem connection or other interface point you can often isolate the source of a problem You won t use a protocol analyzer very often which is probably okay because it s a complex and tedious process But when you need to know what s moving through your network an analyzer can give you information that you won t find anywhere else Troubleshooting 249 Microsoft Network Monitor 3 1 i Flags SePort 7155 OtPort HTTP 80 Len 0 Seq 161179712 Ack 1113806802 Win 30492 scale fac HTTP Request GET static feedroom com t_assets 20081002 d6173tac58ad5 0518043642252b5ae4bocBcoe3 Jpg SIKPOIteHTTINSUL OstPort ET inn eoi Adee 211187707 Win 5840 scale m DstPorts HTTP 80 Len a DESKTOP HTTP 80 OstPort 7157 Len 0 Seq 1 108286578 Ack 3398554873 win 5840 scale fa 72 246 51 15 CP e HTTP 80 Len 0 Seq 3398554873 Ack 1108286579 Win 3
56. change to all subfolders and their contents option Samba Samba is a suite of programs that uses SMB to allow file and print sharing from non Windows operating systems including Linux Unix and several others If it s not included with your Linux or Unix package you can download it from Attp samba org Samba itself uses text commands rather than a graphical user interface GUI but several add on GUI interfaces are available at Samba s website Unless the people using Linux or Unix on your network are comfortable using a command line shell you will want to install at least one of these GUIs along with Samba Using Shares Chapter 12 Shared folders and directories which are two names for the same type of resource are a basic networking tool Any time two or more people want to collaborate on a project they can share access to the documents and information files by creating a project share and allowing any member of the group to work on those files Your computer displays shared folders and other network resources just like files and folders stored on your own computer so where the file is actually stored doesn t matter you can place a shortcut to a share on your desktop and open a shared document or other file with a couple of mouse clicks just as if the file was stored on your own computer NETWORK SECURITY Any time you operate a network you must protect it against intrusions from outsiders and damage caused by
57. choice Unless your family operates like a business your home network probably needs a different set of features from the ones used by a business central storage backup and maybe web and email hosting But you probably won t use other common business server features such as database services and project management Microsoft s Windows Home Server is optimized for home rather than business use so this product might be a better choice for your household network Windows Home Server is available already installed on server computers from HP and other manufacturers and Microsoft also offers an OEM version that you could install on an existing computer if that computer exceeds the minimum requirements which are considerably more than those needed for a Linux server However that version doesn t include any kind of Microsoft support so you re on your own when you have trouble installing or using it The OEM version can be difficult to find through local retailers but plenty of web and mail order suppliers will be happy to sell you a copy File Servers 95 96 For mixed networks that include computers using more than one operating system Samba hitp www samba org is an excellent choice It s a well established open source and therefore free cross platform file sharing program Figure 9 1 shows the control console screen for Windows Home Server The minimum requirements for Windows Home Server are listed in the WHS Getting Started
58. cmd In Mac OS X select Applications gt Utilities and the Terminal program If you re using Linux or Unix use a command prompt or an XTerminal IPConfig The IPConfig tool displays detailed information about your computer s current LAN and Internet connection as shown in Listing 4 1 How Computer Networks Are Organized 41 C gt 1PConfig Windows IP Configuration Ethernet adapter Local Area Connection Connection specific DNS Suffix IP Address ee ee Subnet Mask 2 ee Default Gateway domain actdsltmp 1 192 168 1 100 1 255 255 255 0 1 192 168 1 1 Listing 4 1 The IPConfig tool displays the status of a computer s network configuration In this example Connection specific DNS Suffix is an address assigned by a DHCP host This address is often an arbitrary name used internally within the network but if your computer is connected directly to the Internet it might be your computer s DNS address If you try to connect to a domain name without a suffix such as example rather than example net the network will assign this suffix to the address when it sends it to a DNS server The IP Address is the numeric address of this computer within the LAN or WAN The Subnet Mask tells the network which parts of the numeric address identify individual computers and the Default Gateway is the numeric address within the LAN of the gateway router that connects your LAN to the Internet For more
59. computer printer or other network device that mates with an Ethernet cable to connect the device to a network The instruction manual or the label on every piece of Ethernet compatible equipment should tell you which type of connection it uses Twisted pair cables are bundles of wires in which each pair of wires is twisted together as shown in Figure 2 3 Because data normally moves in only one direction through each pair of wires a 10Base T or 100Base T network connection uses two pairs one for each direction The most common Ethernet cables include a total of eight wires in four color coded wire pairs so you can use the remaining wires as spares Figure 2 3 A typical Ethernet cable contains four twisted pairs of color coded wires Most of the remaining chapters of this book are dedicated to features and functions of Ethernet networks Types of Network Connections 15 16 DEALING WITH OTHER MOSTLY OBSOLETE WIRED NETWORKS Ethernet is by far the most widely used type of LAN connection but if you re using older equipment you might occasionally find a computer or other device that uses some other type of network structure Many of those older networks require special equipment and experienced network technicians but the rest of us don t have to run away from them If you have inherited a working network the best thing you can do is to leave it alone It has probably been working without any problems for many years and you
60. con nection This name will appear on desktop shortcuts to this connection Click the Next button 6 In the Public Network window shown in Figure 13 8 select the Do not dial the initial connection option because you don t need to connect through a telephone line Click the Next button New Connection Wizard Public Network Windows can make sure the public network is connected first Figure 13 8 In a wireless network the VPN does not require a dial up connection 7 In the VPN Server Selection window shown in Figure 13 9 type the host name or IP address of the VPN server New Connection Wizard VPN Server Selection Whatis the name or address of the VPN server example com Figure 13 9 The host name or IP address identifies the VPN server at the other end of the wireless link 8 Click the Next button and then the Finish button to complete the wizard Network Security 167 168 Chapter 13 10 In Vista follow these steps Open the Control Panel Select the Network and Sharing Center In the Tasks list on the left side of the Network and Sharing Center shown in Figure 13 10 select the Set up a connection or network option A Choose a Connection Option window will open Blo Gort Network and Internet Network and Sharing Center f Search 5 File Edit View Tools Help lt e Network and Sharing Center View full map i Ls e TOWER Local Internet Thi
61. copying devices 199 201 200 country codes domain name 39 40 CSMA CD Carrier Sense Multiple Access with Collision Detection 14 CUPS printer control program 199 Cyberguys 57 D data cable color codes telephone lines 65 circuitterminating equipment DCE 18 19 communications equipment DCE 18 19 entry remote 224 networks 4 outlets 48 56 56 57 59 60 67 68 packets 11 13 12 terminal blocks 52 52 transfer speeds 14 15 tunnels 159 161 data file only backups 100 data terminal equipment DTE 18 19 DCE data communications equipment or data circuit terminating equipment 18 19 decoders audio video 218 default gateways 42 43 114 118 246 Dell computers 94 demodulation 6 108 denial of service DoS attacks 189 designing networks 47 54 48 49 52 53 destinations 206 207 device drivers 74 75 DHCP See Dynamic Host Configuration Protocol DHCP dial up modems 109 dictionary attacks 183 digital audio files See audio files digital conversions 209 digital data streams 204 205 digital media receiver DMR 143 digital to analog conversion 206 207 211 digital video recorder DVR 216 217 digital visual interface DVI 218 DirSync Pro 232 Display Properties setting 231 251 D Link programs 180 181 781 216 switches 64 dm crypt 185 DMR digital media receiver 143 domain names See also Internet Protocol IP addresses country codes in 39 40 subdomain 39 top
62. display the current settings Press the button again to save the configuration values The Test Con nection screen will appear Press the button to test the connection After approximately a minute or less the PlayStation will display either a Succeeded or Failed message If the test was successful the PlayStation is ready to run multiplayer games if it fails the PlayStation will provide instructions for fixing the problem Connecting a Wii Nintendo s Wii console requires an optional Wii LAN Adapter Model number RVL 015 to connect to a network Follow these steps to connect a Nintendo Wii to your LAN 1 10 11 Turn off the Wii console and plug the LAN Adapter into the console s USB port Run an Ethernet cable from the LAN Adapter to your network router or hub Turn on the Wii console From the main menu click the Wii button at the bottom left A screen showing a Data Management box and a Wii Settings box will appear Click the Wii Settings box The System Settings screen will appear Click the blue arrow at the right side of the list of options to move to the second of three System Settings menus Click the Internet button The Internet screen will appear Click Connection Settings A list of Connection Settings options will appear Select an empty connection slot with None shown as the connection type Select either Wireless or Wired Connection as appropriate for your
63. each of them appropriate for certain situations e A complete image of your hard drive includes copies of all folders files and programs This backup allows you to restore your computer to its previ ous state after a disk failure A complete image of a drive is sometimes described as a clone e An incremental backup only includes copies of the files that have been installed or have changed since the last backup Incremental backups are faster than complete backups because they don t include the unchanged files that are already part of your backup e A selective backup only includes the important files and programs on your computer This backup is generally faster and takes up less space on the backup drive than a complete backup because it does not include things like temporary files old log files and downloads that you will never use again e A data file only backup can be useful when you expect to restore the backup to another computer that already has the operating system and application programs installed You can also re install the operating system and programs from their CDs or other media If you do choose this option remember to check each program s website for the latest patches and upgrades before you try to use that program e A limited backup includes only one or more specific types of files such as music photos or documents This kind of backup is usually a supple ment to a more complete backup that includes all the ess
64. even an antique 486 CPU so you can often recycle an old junker and use it as a firewall Both the Apache application and the operating system are available as open source software so it ought to be possible to build an extremely low cost Apache firewall If you prefer to use Windows or if you don t want to assemble your own firewall you have several options You can use the Windows version of Apache or you can use a commercial utility such as the ones listed at hitp www thegild com firewall Attacks on a wireless LAN don t all come through the air A wireless network also requires the same kind of firewall protection against attacks from the Internet as an entirely wired network Many wireless access points include configurable firewall features but if yours does not the network should include a firewall program on each computer along with a separate router or a dedicated computer acting as a network firewall Protecting Individual Computers Client firewall programs provide another line of defense against attacks coming from the Internet Some of these attacks come from miscreants who are looking for a way to read your files and other resources that you don t want the entire world to see Others might want to use your computer as a relay point for spam or attempts to break into some other computer halfway around the world in order to make the real source more difficult to identify Still others spread viruses or use really unplea
65. im Trillian Attp www ceruleanstudios com and meebo http www meebo com are available that can exchange messages with people on different services from a single contact list and message window To set up anew IM account with one or more of the major services go to their respective websites e Google Talk http www google com talk e Jabber htip www jabber org e AIM or AOL Instant Messenger hitp www aim com e Yahoo Messenger hitp messenger yahoo com e Windows Live Messenger hitp get live com messenger e Gadu Gadu based in Poland with Polish language screens hitp www gadu gadu pl In house LAN messaging offers several advantages over Internet messag ing services for exchanging messages within a business or a household It s more secure and more private because the messages never leave the LAN And they aren t exposed to spam and other unwanted messages from strangers through the Internet In addition they don t use bandwidth between the LAN and the Internet so they don t interfere with other activities and they don t require a separate account for each user with an IM service although the major IM services all offer free accounts More importantly a local messaging system controls all of your messages within the LAN rather than sending everything to an outside service Messaging Through a LAN Many LAN messaging programs are available all with similar feature sets Some are li
66. in one devices 199 201 200 Amanda Advanced Maryland Automatic Network Disk Archiver 104 American Standard Code for Informa tion Interchange ASCII 10 encryption keys 180 181 182 AM radios 209 214 analog to digital conversion 206 207 209 211 212 antennas 4 80 82 84 85 antivirus programs 245 AOL Instant Messenger AIM 158 234 235 Apache web server 95 156 Apple 21 95 AirPort Extreme 99 99 181 computers 94 iChat 237 ASCII See American Standard Code for Information Interchange ASCII asia 40 Association for Home Appliance Manu facturers AHAM 223 Audacity 208 211 audio clients 211 212 213 devices 213 214 214 controls 51 converters 206 207 209 211 files 203 205 206 214 210 212 214 formats 209 210 210 messaging 237 player programs 210 211 servers 7 8 207 209 212 213 213 Audio Interchange File Format AIFF files 209 210 audiophile music servers 209 automatic printer switches 194 195 automatic updates 185 186 786 Auxiliary input 212 254 INDEX baby monitors 205 backup files 100 104 101 103 104 BackupPC 104 Backup Status and Configuration 103 bands 79 bandwidth 3 4 bar code readers 224 Baseline Security Analyzer 188 188 BBG 3 Belkin 216 BIOS utilities 71 75 BitDefender Online Scanner 245 bits 70 10 11 biz 40 BlackBerry devices 77 bridges 32 Broadcast Wave files 210 brute force programs 153 BSD systems 95
67. intruders and crackers First you can accept the fact that wireless networks are not completely secure and use the built in network security features to slow down would be intruders second you can supplement your wireless router s built in tools with a hardware or software firewall or both to isolate the wireless network but remember that a cracker who can grab and decode encrypted network passwords can often grab firewall passwords too and third you can use additional encryption such as a VPN virtual private network to make the network more secure The security features of the early Wi Fi protocols WEP encryption were not adequate to protect data The WEP protocol was flawed in several ways WEP should be treated more as a Do Not Disturb sign than as a real means of protection The WPA Wi Fi Protected Access and WPA2 standards attempt to fix the shortcomings of WEP but they work only when all of the users of your network have modern cards and drivers Here are some specific security methods e Don t use your access point s default SSID Those defaults are well known to network crackers e Change the SSID to something that doesn t identify your business or your location An intruder who detects something called BigCorpNet and looks around to see BigCorp headquarters across the street will tar get that network The same thing goes for a home network Don t use your family name or the street address or anything else t
68. more when you set up your new connections Reserved Addresses As Chapter 3 explained your LAN communicates with other networks through a router As far as the networks connected to that router are concerned the router is just one more network connection with an IP address Therefore as Figure 4 1 shows a router has two different IP addresses one for its connection to the LAN and the other for the WAN or the Internet The router presents a single address to the Internet that represents all the computers and other devices on your LAN it performs a function called network address translation NAT that converts your public address to the addresses of individual network devices One of the benefits of this system is that you can use the same IP addresses within your LAN as your neighbor across the street or a LAN on the other side of the world and the addresses won t interfere with one another In order to make this system work properly IANA has reserved several blocks of IP address numbers for LANs when a router receives a packet with an address in one of these ranges it does not relay the packet to the Internet If you use these addresses for the devices in your LAN you can be certain that your packets and the commands messages and files that make up those packets won t end up at the reading room of the National Library of Ecuador when you wanted to send them to your assistant across the corridor The reserved IP addresses are
69. neighborhood you will probably see a list of nearby networks in addition to your own access point The control program will also tell you what kind of encryption if any each network is using In the example shown in Figure 13 16 one network RedGoldandGreen is wide open and four others are encrypted two of the encrypted networks use WPA and the two that are listed as security enabled without an encryption type use WEP t Wireless Network Connection Network Tasks Choose a wireless network Refresh network list Click an item in the list below to connect to a y reless network in range or to get more Information x Set up a wireless network Q MASTERMIND for a home or small office if Security enabled wireless network WPA p RedGoldandGreen Related Tasks Unsecured wireless network 4 Learn about wireless Qg Toadhall networking 7 Security enabled wireless network WPA Ze Change the order of Ug mcbright preferred networks i if Security enabled wireless network P Change advanced settings p Bera H f Security enabled wireless network Figure 13 16 Four of the networks in this neighborhood require an encryption key before they will connect Do the math Your access point can reach 150 feet or more in all directions so the signal probably extends beyond your own property lines or the walls of your apartment or office A network device in the building next door or across the street can probabl
70. network The connections inside a combined device don t require external cables As Figure 3 6 shows the area where your net work cables plug into your switches routers modems and so forth is almost always a rat s nest of confusing wiring anything you can do to reduce the number of cables will make things a lot easier dy Figure 3 6 The cables connected to your network controls can often form a confusing mess Hubs Switches and Routers 33 HOW COMPUTER NETWORKS ARE ORGANIZED through a network all the computers connected to that network must use the same set of rules known to network designers as a protocol The rules that control the Internet are called transmission control protocol Internet protocol TCP IP Even if you don t plan to connect your network to the Internet right now you should use TCP IP for at least two reasons First TCP IP is built into the Windows Macintosh and Linux operating systems and most inexpensive networking equipment and second you would waste a lot of time and money finding equipment that works with one of the other older network protocols This chapter offers a relatively simple explanation of the TCP IP protocols and how your network uses them 36 TCP IP Networks Chapter 4 TCP IP is really a suite of protocols The most important are TCP trans mission control protocol which controls the way commands messages and files are broken into packets and reassemble
71. networks because the same data that moves between a computer and a base station by radio can be intercepted by another computer Even if the data is encrypted 78 a dedicated intruder with enough time can steal passwords credit card num bers and other personal information However the latest security tools including WPA encryption and virtual private networks VPNs can go a long way toward making a Wi Fi network secure This chapter describes the types of Wi Fi networks and explains how to add a Wi Fi hotspot to your LAN how to select and use a Wi Fi network interface with your computer and how to keep your Wi Fi network as secure as possible Types of Wi Fi Networks NOTE Chapter 8 Wi Fi networks use the IEEE Institute of Electrical and Electronics Engineers 802 11 family of standards to define the radio frequencies data formats and other technical details that are necessary to establish a wireless LAN Today there are four types of 802 11 networks as shown in Table 8 1 Table 8 1 Wireless Network Standards 802 b 11 Mbps 300 feet 100 meters 24GHz 802 11a 54 Mbps 75 100 feet 23 30 meters 5 2 GHz 802 11g 54 Mbps 300 feet 100 meters 2 4 GHz 802 11n 248 Mbps 750 feet 250 meters 2 4 GHz 5 2 GHz The useful distance that an access point can reach is often considerably less than the promised maximum especially when the path between the access point and a computer s wireless adapter is indoors Walls
72. networks VPN via 173 174 Public Telephone Switched Network PTSN 21 22 PVC pipes 58 Q QuickTime 218 Owest 174 radio Internet 209 214 radio signals 2 4 14 16 20 69 77 79 81 85 160 174 184 radio transmitter receiver 80 81 RADIUS Remote Authentication Dial in User Service 182 183 RCA phone plugs 218 Real Audio and Video 158 210 RealPlayer 208 218 RealVNC 226 229 Registered Jack 70 remote access 226 conferencing 205 237 data entry 224 desktop programs 226 229 227 228 sensors and controls 223 224 232 terminals 23 23 webcams 204 Remote Authentication Dial in User Service RADIUS 182 183 Remote Desktop Connection Client 226 reserved addresses 37 restart options 241 242 RG6 U cables 65 rips 208 RJ 11 telephone plugs cables 64 65 70 70 RJ 45 plugs jacks 66 67 70 70 75 193 Roku 213 root servers 40 Ross John Wiring Home Networks 57 routed VPN traffic 164 routers combination boxes 33 configuring 86 gateway 6 6 32 109 110 installing 59 61 62 64 63 IP addresses 38 location of 50 network to Internet connections 109 115 114 overview of 32 33 rsync 104 Ruska Jimmy 154 Samba operating system 96 Samba Shares folder 148 150 SATA hard drives 97 scanning devices 199 201 200 secondary switches 53 second level domains 38 Secure Shell SSH 104 Secure Sockets Layer SSL 89 164 176 security network See netw
73. newer PC ExpressCards that are gradually replacing PC cards in the latest generation of laptop com puters However built in Wi Fi adapters were already standard features in most laptops by the time PC ExpressCard sockets were introduced in 2004 and 2005 so there s generally no reason to search for a separate adapter On the other hand a PC ExpressCard adapter might be the best way to add Wi Fi to your desktop if there s a PC ExpressCard socket on the computer s case USB Adapters USB Wi Fi adapters are available in two different forms small modules that plug directly into the computer s USB port and stand alone devices that connect to the USB port through a cable The separate units often provide better connections because they have more powerful transmitters and more sensitive receivers but they re considerably less convenient than the small modules especially with a laptop Figure 8 5 shows both a stand alone USB adapter and a plug in USB Wi Fi module The smaller and cheaper plug in USB Wi Fi modules are often entirely adequate to connect your computer to a Wi Fi network unless youre using the computer at the fringe of the access point s coverage If you can detect a strong signal with a plug in module you won t get better performance with a stand alone device However a separate adapter with a more powerful transmitter and a more sensitive receiver might allow you to use a signal that the smaller module won t detect
74. of a network File sharing has many uses You can use it to collaborate with other people on a single document or other file to play music or watch videos stored on another computer and for just about everything else that you can do with your own files In effect every unprotected file stored on any network computer is as easy to use as a file on your own computer For example Figure 1 1 shows a Windows display of disk drives and individual directories on a home network other file sharing methods also exist You can open a file or folder on a remote computer by double clicking an icon or a filename just as you would on your own machine C on Bedroom Bedroom E 8 x File Edit View Favorites Tools Help O Back v X Search Folders gt 5 X 2 Tv Address 2 Bedroom C d Folders x erie Nenion r C c CJ LJ Aire vetwon OBibafcd 539f5d4f Documents Downloads 63 Microsoft Terminal Services and Sett 5 69 Microsoft Windows Network s Local bJj LJ EJ Bedroom Icons Links More Radio NVIDIA F 2G Stations i2 SharedDocs W Printers and Faxes LJ LJ Desktop Desktop Program RECYCLER System WINDOWS 9 Tower Files Volume In 6 Web Client Network E a mj i2 C on Desktop Desktop i2 c on Tower Computer Tower i2 d on Tower Computer Tower nd amlogtxt AUTOEX AVG7QT F F ig Drive D D on Desktop Desktop m fH id e on Tower Computer Tower Beecham boot ini CONFIG IO SY
75. or more updates Microsoft Baseline Security Analyzer Chapter 13 Microsoft s Baseline Security Analyzer is a free tool that scans computers running Windows XP and Windows Vista to identify security threats and vulnerable features and functions You can download it from Attp technet microsoft com en us security cc 184924 aspx You can use the Baseline Security Analyzer to scan your own computer or as network manager you can test other computers connected to yours through your LAN Baseline Security Analyzer provides a quick and easy way to find and fix many common security issues Figure 13 22 shows the result of a Baseline Security Analyzer scan For each item it identifies you can click a link to an explanation What was scanned and instructions for correcting the problem amp Microsoft Baseline Security Analyzer 2 1 Microsoft W Baseline Security Analyzer Windows Scan Results Administrative Vulnerabilities Score Issue Result 9 Local Some user accounts 4 of 7 have blank or simple passwords or could not be anatyzed Account r Result det t tt Password Test LJ Autologon Autologon is configured on this computer Md Guest The Guest account is not disabled on this computer Account What w to correct th Password Some user accounts 4 of 7 have non expiring passwords Expiration What n Result t tt e Incomplete No incomplete software update installations were found Updates What windows
76. or small business network up and running you can use the network to accomplish some things you might not have expected This chapter describes a handful of other useful network applications None of these is reason enough to install a network but if you have come this far you re already using the network for other purposes Consider the network programs and services in this chapter as lagniappe a little extra that might enhance your networking experience 226 Remote Desktop Chapter 16 Remote Desktop programs allow another user with your permission to take control of your computer through a network When a remote control program is active a network manager or service technician can distribute and install new or updated software provide help and remote assistance and view information on other computers Remote Desktop programs are a standard feature in Windows XP Windows Vista and Macintosh Several open source remote desktop programs for Linux and Unix are also available including Virtual Network Computing VNC FreeNX 2X Terminal Server and X Display Manager Control Protocol You can find links to downloads for all of these programs at Attp blog lxpages com 2007 03 13 remote desktop for linux For Mac to Windows remote access try Microsoft s Remote Desktop Connection Client for Mac Attp wwuw microsofl com mac products remote desktop For Windows to Mac use a Windows based VNC client such as RealVNC or TightVNC
77. other devices on the same network The server can be a computer that you also use as a workstation a server for other data files a dedicated server for audio files or a component in a stereo or Other Things You Can Connect to Your Network 207 208 Chapter 15 home theater system Regardless of their physical form most audio servers perform these functions e They convert or rip audio tracks from CDs and other sources to one or more standard file formats e They store sound files on a hard drive e They distribute sound files on demand to one or more players e They distribute audio to the network directly from a CD DVD the Internet or some other digital source Like any other server a music server should have a relatively large hard drive with enough space to hold all the individual music files you want to store on it General purpose computers and stereo component music servers can both perform similar services each type has a different combination of cost ease of use and sound quality General Purpose Computers When you use a standard desktop or tower computer as your music server you can use the same computer to serve other types of data You can use free or inexpensive software such as Windows Media Player RealPlayer Sound Forge Audio Studio Exact Audio Copy or Audacity to create or convert files to your standard storage format and you can increase the server s storage capacity by installing one or more additi
78. point should accept at least twice as many MAC addresses as the number of users on your network today Some access points also include a MAC address exclusion feature that allows the network manager to block one or more MAC addresses from access to the network Physical Security Chapter 13 Intruders don t always use technology to crack into a network Sometimes they use brute force methods For example if a thief steals your laptop computer he can often use the convenience features of the computer s software to connect to the Internet through your network read your email and other confidential files and gain access to other computers connected to the same network Other low tech methods include shoulder surfing where the bad guy watches your screen or your keyboard as you type a login name and password and social engineering in which the intruder convinces you to reveal your password or other information because she has convinced you that she has a legitimate use for it There are some things you can do to protect your computer and the data stored in it e Think like a thief and do whatever might be necessary to make the computer difficult to steal Don t leave your laptop in plain sight in an unattended car or walk away from it in a public location such as a coffee shop airport or library In an office with cubicles or open plan workspaces use a chain and lock to secure the computer to a desk file cabinet or oth
79. programs are often provided as part of the driver software supplied with wireless network interface adapters and laptop computers For example Figure 8 6 shows the Wi Fi control program included in Windows XP and Figure 8 7 shows the Intel program supplied with its mini PCI Wi Fi adapters Both programs display a list of all nearby Wi Fi access points and identify those that are using encrypted data To use either program select the name of the network you want and click the Connect button at the bottom of the program window Other programs use different onscreen layouts but they all operate similarly In some cases one of the programs installed on your computer might be more sensitive to weak signals from access points but that usually doesn t matter all of them detect the strong nearby access points signals that you will use most often t Wireless Network Connection Network Tasks Choose a wireless network fg Refresh network list Click an item in the list below to connect to a wireless network in range or to get more information lt Set up a wireless network Ko for a home or small office i f Security enabled wireless network WPA o Related Tasks Security enabled wireless network W Learn about wireless Q Berg Home networking i ff Security enabled wireless network r Change the order of qq Wilmer preferred networks i t Security enabled wireless network P Change advanced settings p Toa
80. slow down the network s performance but slow performance is not likely to be an issue unless your network carries a lot of traffic You can solve this problem by adding a second access point that uses a different channel and dedicating that access point to one or more printers When you set up the Wi Fi link make sure you connect the printer server to your own access point and not to a network owned by one of your neighbors A Wi Fi printer server offers the following benefits e The printer may be located anywhere within range of your Wi Fi network signal e You don t need a dedicated Ethernet port for the printer server e Ifyou need to move the printer you don t have to rewire the network Built In Printer Servers When you buy a new printer for your network consider one that has a built in network printer server along with the usual USB and or parallel ports The builtin printer server will perform like a printer connected through an external printer server but it s easier to install because you don t have to connect additional cables Printers with built in network interfaces are designed for small businesses and other workgroups that often produce a greater number of printed pages than a typical home network or a single user They re often a bit more expen sive than the combination of a low end stand alone printer and a separate printer server device because they re generally more durable printers with more and better fea
81. store chains have been traced to inadequate network protection Maintaining control of your network and keeping it secure is essential Wi Fi Security on page 89 includes a list of specific actions you can use to keep intruders out of your wireless network The security tools in the Wi Fi specifications aren t perfect but they re better than nothing Even if you choose not to use them it s essential to understand what they are and how they work if only to turn them off Network Name Every wireless network has a name In a network with just one access point the name is the basic service set ID BSSID When the network has more than one access point the name becomes the extended service set ID ESSID but your computer s control program displays both types in the same list The generic designation for all network names is the service set ID SSID which is the term you will see most often in wireless access point and client configuration utility programs When you configure the access points for a network you must specify the SSID for that network Every access point and network client in a network must use the same SSID When a network client detects two or more access points with the same SSID it assumes that they are all part of the same net work even if the access points are operating on different radio channels and the client associates with the access point that provides the strongest or cleanest signal If that si
82. the added information instructed it to do By the time a message travels from a laptop computer on a wireless network through an office network and a gateway to the Internet and onward to a distant computer connected to another local network a dozen or more information attachments might be added and removed before the recipient reads the original text A package of data that includes address and control information ahead of the bits that NOTE contain the content of the message followed by an error checking sequence is called a frame Both wired and wireless networks divide the data stream into frames that contain various forms of handshaking information along with the original data The network deals with packets and frames at different places during the process of transmitting data Fortunately this all happens automatically so you as a network user don t have to worry about adding or removing them by hand Error Checking In a perfect transmission channel the signal that goes in at one end would be absolutely identical to the one that comes out at the other end But in the real world there s almost always some kind of noise along the line that can interfere with the original signal Noise is defined as anything that interrupts or is added to the original signal it could be caused by a lightning strike interference from another communications channel devices not working correctly or dirt on an electrical contact someplace in
83. the services you need for a file server operating system FreeNAS is designed for remote configuration and operation and it s relatively easy to set up and use FreeNAS Backup Restore Factory Defaults SCSI Target UPnP Dynamic ONS saMe Access Users and Groups Active Directory UWAP Status System Process Interfaces webGUI Configuration FreeNAS The Free NAS server System informaton Mame eenas local Version 0 6863 revison 2011 buit on Thu Mar 13 19 20 49 CET 2008 OS Version FreetsO 6 2 RELEASE911 revison 199506 Platform 1886 bvecd on AMD Athion tm Processex running at 1008 MHz Date Wed Apr 23 20 43 12 UTC 2008 Uptime ore Last config change Wed Aor 23 20 40 26 UTC 2008 Memory usage ed S HE Load averages 0 00 0 00 0 00 show process information Desk space usage No disk configured freenas loca Figure 9 4 FreeNAS is a simple version of Unix designed for use as a file server USB Device Servers To add one or more stand alone USB disk drives to your network as file servers consider using a USB device server such as the Lantronix UBox 4100 shown in Figure 9 5 The server connects directly to the network through an Ethernet cable and each disk drive or other USB device connected to the server appears as a local device on every computer connected to the network Similar devices are also made by Silex Technology including a wireless USB device server that connects to the network through
84. the Gnome and KDE environments used by many Linux and Unix distributions File Sharing in Windows XP Chapter 12 Windows XP uses a set of programs called Simple File Sharing to exchange files among computers on a network In XP Home Edition Simple File Sharing is always on in XP Professional file sharing is normally turned on but you can turn it on or off To turn Simple File Sharing on or off in XP Professional follow these steps From the Windows Desktop open My Computer 2 Select the Tools menu and choose Folder Options 3 In the Folder Options window click the View tab to open the window shown in Figure 12 1 Folder Options x General View File Types Offine Files Folder wews You can apply the view such as Details or Tiles that you are using for this folder to all folders PH Apply to All Folders Reset All Folders Advanced settings O Hide extensions for known file types O Hide protected operating system files Recommended O Launch folder windows m a separate process 3 Managing pairs of Web pages and folders Show and manage the pair as a single file Show both parts and manage them individually O Show both parts but manage as a single file E Remember each folder s vew settings O Restore previous folder windows at logon Show Control Panel in My Computer El Show encrypted or compressed NTFS files in color E Show pop up description for folder and desktop items BEER file sharing Recommended
85. the network to connect them e Aset of communication channels that carry something speech TV shows computer data between or among nodes e A set of rules that controls network traffic on a highway the rules might specify that vehicles drive on the right and pass on the left and every car and truck must display a license plate to identify it in a tele phone network the rules define the form and use of unique numbers called telephone numbers to identify each node and establish con nections between them To assure that a network operates properly every node and every channel must follow the rules for that particular network Next every network has a maximum carrying capacity For example a four lane Interstate highway can safely carry more cars and trucks at higher speed than a two lane country road In a communications network the capacity of a network connection is the amount of information it can carry also known as its bandwidth Both a telephone call and an FM radio station use audio channels but the same voice sounds better on the FM station because the FM channel has a greater bandwidth that allows more of the original information in this case higher audio frequencies to reach your ear In a data network the speed of a network is usually shown in millions of bits or megabits per second Mbps And finally every node on a network has a name This name might be the same as the name of the person who uses that no
86. the use of a DHCP server or manual settings for IP address and DNS 7 Click the Advanced tab to open the dialog shown in Figure 13 15 If your network is not already protected by a firewall select the Internet Con nection Firewall option This will protect the wireless client from attacks coming through the Internet 4 VPN to Internet Properties 2 x General Options Security Networking Advanced r Internet Connection Firewall v Protect my computer and network by limiting or preventing access to this computer from the Internet Learn more about Internet Connection Firewall r Internet Connection Sharing Allow other network users to connect through this computer s Internet connection Establish a dial up connection whenever a computer on my network attempts ta access the Internet Allow other network users to control or disable the shared Internet connection Learn more about Internet Connection Sharing If you re not sure how to set these properties use the Network Setup Wizard instead OK Cancel Figure 13 15 The Advanced tab controls the use of a firewall on the VPN The Options and Security tabs in the VPN to Internet Properties window control connection options that normally don t change from the default settings Network managers who want to change the security settings should instruct their users on how to configure these options to comply with the network
87. to peer messaging 234 PF Packet Filter 159 Philips 213 picture elements 10 219 picturephones 237 Pidgin 234 pigtails 85 ping command 36 45 43 44 pipsec 173 pixels 10 219 Plain Old Telephone Service POTS 21 22 PlayStation 220 221 plugin modules 83 84 84 plugs 66 67 70 70 75 193 218 242 plywood sheets 59 66 point to point networks 19 20 20 51 52 52 Point to Point Tunneling Protocol PPTP 162 163 164 172 POP3 incoming mail protocol 158 portable drives 3 port assignments port numbers 157 158 158 INDEX 261 262 INDEX ports Ethernet 4 70 74 71 85 97 193 201 216 FireWire 4 21 205 211 infrared 21 input output 4 IrDA 20 21 21 overview of 28 parallel 4 16 192 792 194 TCP service 158 USB 4 16 21 70 73 99 192 194 195 201 205 211 212 216 Port Scan Attack Detector 159 POTS Plain Old Telephone Service 21 22 power converters 61 Power LED indicator lights 240 powerstrips 61 61 PPTP Point to Point Tunneling Protocol 162 163 164 172 pre assembled cables 56 pre shared key PSK mode 182 183 printers connecting to network 191 201 192 194 199 200 servers 7 25 25 193 197 sharing 7 143 196 196 199 198 199 switches 194 195 private folders 5 protocols 35 36 115 PSK pre shared key mode 182 183 PTSN Public Telephone Switched Network 21 22 Public DNS servers 41 public folders 5 139 141 public
88. to the end of the list of items select Internet Protocol TCP IP and click the Properties button The Properties window shown in Figure 11 9 will open Internet Protocol TCP IP Propertics 2 x 198 137 231 1 SE Figure 11 9 The Internet Protocol Properties window controls your network and Internet settings Connecting Your Computer to a Network 123 124 To use this computer with a DHCP server select the Obtain an IP address automatically radio button To assign and use a static IP address select the Use the following IP address option and type the numbers of the IP address subnet mask and default gateway To use the DNS server specified by the DHCP server select the Obtain DNS server address automatically radio button To specify one or more DNS servers on this computer select the Use the following DNS server addresses radio button and type the addresses for the preferred and alternate DNS server Connecting Your Macintosh Computer to a Network Chapter 11 To connect a Macintosh computer running OS X to your network follow these steps 1 If it s not already in place install an Ethernet cable between the computer and the network s hub switch or router From the Macintosh desktop click the Apple icon at the extreme left side of the Menu Bar to open the Apple Menu The System Preferences window shown in Figure 11 10 will appear eoc System Preferences gt Show All Q Personal
89. to turn on the builtin filters in your firewall and modem install all the latest security patches to your software and network hardware and work closely with your Internet service provider at the first sign that your network is under attack Most ISPs have more sophisticated monitoring and filtering resources that can help them identify and interrupt an attack In the United States DoS attacks are a violation of federal law so it s appropriate to ask your local FBI field office for assistance in finding and prosecuting the source of an attack Conclusion As manager of a home or small business network maintaining its safety and security is one of your primary responsibilities The methods outlined in this chapter combined with some commonsense attention will allow you and your users to concentrate on the business and recreational use of your computer your network and the Internet Network Security 189 PRINTERS AND OTHER DEVICES ON YOUR NETWORK to a small business or a household full of computer users is the convenience of sharing one or more printers among all the network s users Rather than carrying a copy of each file to the computer connected to the printer on a disk ora flash drive you can simply click the Print command on your own computer and let the network send it to the printer automatically Even a very small network might include more than one printer For example you might use a black and white laser p
90. use the Restart option that can leave some settings at the same values rather than resetting them to the default startup configuration You should turn off the computer completely count to ten and then turn it back on Troubleshooting 241 242 Chapter 17 If the problem continues after you restart the computer try restarting the modem Wi Fi access point or network router If a device doesn t have an on off switch disconnect the power cable wait a few seconds and plug it back in After you restart each device check to find out if the problem still exists If the problem still occurs move on to the next device Check the Plugs and Cables If a single computer can t connect to the network confirm that the physical cables providing those connections are not unplugged Be sure to check both ends of each cable If the whole network can t find the Internet check the cables connected to the modem If possible examine the cable itself to make sure it hasn t been cut someplace in the middle Almost all routers switches modems and network adapters have LED indicators that light when they detect a live connection If one or more of these LEDs has gone dark check the connection Most data plugs and sockets maintain solid connections but it s possible that a plug might have come loose without separating itself from the socket or a wire inside the plug might have a bad contact If you suspect a loose connection try wiggling the cabl
91. use the printer or connect to the Internet at the same time Are they connected to the network by Ethernet cables or Wi Fi Does the problem happen at the same time every day If you re lucky defining the problem can tell you enough to fix it For example if the Power LED indicator light on your modem is off that s a good indication that the power cable is unplugged either at the wall outlet or on the modem itself If everybody has trouble connecting to the Internet during a rainstorm maybe water is leaking into the telephone cable that carries your Internet connection from the utility pole to your house that NOTE happened to me the repair guy told me that the cable had been there since about 1927 More often your list of symptoms will be a starting point that you can use to search for more information As you analyze the problem ask yourself these questions What caused the problem Did it occur when you or another user ran a specific program or tried to connect Does the problem seem to be related to some other action If you try the same action again does the same problem occur Did it first appear when you turned on a computer What has changed Have you installed new hardware on the network or loaded new software on the server or another computer Did you recently update the router s firmware Have you made any other change to the network or another connected computer even if the change seems unrelated to the problem
92. using a home entertain ment network see Chapter 15 Video Cameras and Home Security Devices A stand alone video camera often with a built in microphone connected to your home network can have several uses You can place a camera at the front door to identify visitors or use one in a nursery or playroom to keep an eye on your children from computers in other parts of the house Other devices can use special sensors to detect smoke and fires unlocked or open doors and windows broken glass or flooding and other problems and send alerts to the homeowner on a local computer or to a home protection service through the Internet Combined with a wireless network link the same kind of security moni toring can extend to a detached garage shed or other separate buildings even if the house s wired network does not reach those locations Chapter 15 explains how to connect and use cameras and other security devices to your network Home Automation Home automation systems usually use separate wiring from a household data network but sometimes they re closely integrated Home automation can be as simple as turning on outside lights after the sun goes down or as com plex as opening and closing drapes monitoring and adjusting heating and air conditioning operating a lawn sprinkler or filling the dog s water dish You can also expect the next generation of smart kitchen and laundry appliances to include network connections that wil
93. video it would seem that there isn t a lot of difference between a TV screen and a computer monitor But they use different methods to accomplish the same objective and these methods create problems when you try to move from one to the other The difficulty arises because of the way computer monitors and TV screens break an image into scan lines and pixels For the purpose of this explanation we can think about a still picture but the same problems can also occur in a moving image In North America an analog TV shows images as a sequence of 535 scan lines from left to right across the face of the screen when the TV reaches the end of one scan line it moves down to the next one In digital TV the screen is divided into a large number of dots called picture elements or pixels The method used by the TV to light up segments of scan lines or pixels is different on picture tubes and flat panels but the number of scan lines or pixels is specified by industry standards The size of the screen doesn t matter the number of scan lines or pixels on a screen is always the same there are several different standards for flat panels depending on size and cost but the number of pixels is constant for each standard Computer monitors also use pixels but the number of pixels in an image is different depending on screen resolution When you change your monitor s resolution from say 800 x 600 pixels to 1280 x 1024 pixels the computer adjusts the number
94. web resource at that address uses as a leading part of the address followed by a colon and two forward slashes such as hitp host sample com The http part stands for HyperText Transfer Protocol the protocol that defines most websites If you want to reach a different service at the same destination such as a file transfer server a telnet host or an Internet Relay Chat server you might instead use tp host sample com telnet host sample com ox irc host sample com respectively When an address does not include the protocol type and the two forward slashes your web browser will assume it s an http address Some top level domains that use country codes have other structures that differ from one country to another Domain names that have a us for United States top level domain sometimes use subdomains also called second level domains that identify the state and city where the owner is located such as example sf ca us which would be in San Francisco California In Canada and other countries the domain name comes right before the country code such as the Canadian Broadcasting Corporation s cbc ca whereas other countries use generic identifiers along with the geographic domain such as bbc co uk for the British Broadcasting Corporation the co stands for commercial and the wk for the United Kingdom How Computer Networks Are Organized 39 40 NOTE Chapter 4 Just because a domain name address has a country code t
95. who tries it is convinced that the second screen makes them much more productive Because you can keep two or more windows open at the same time without the need to bring one of them to the top you can work more efficiently just for starters you can drag text figures or data from one document or program to another view large documents and graphics without scrolling from one end of a document to the other and keep a web browser or video surveillance window open on one screen while you work on the other If you re writing code or working on a web page you can save your work and immediately see what your latest changes look like in an application window or a browser And in many Windows programs you can drag one or more toolbars away from the main program window to the second screen in order to make more of your work visible Two or three or more monitor screens on your desk will change the way you work with your computer Figure 16 4 shows a desktop extended across two laptop computer screens Figure 16 4 Windows can show a single large window extended onto two or more screens If you have an old monitor in the back of a closet try adding it to a computer Even if the monitor isn t the same size as your main monitor it will still work and be an improvement over a single screen The easiest way to add another monitor to your system doesn t require MaxiVista or any other special software simply plug the monitor into a spare VGA
96. you will probably solve the problem without developing or enlarging an ulcer Over time you will recognize particular symptoms and know how to home in on the most effective diagnostic tools and techniques If you can t find the problem after searching for an hour walk away for a few minutes Make yourself a sandwich have a cup of coffee or a glass of lemonade or go for a short walk The network will still be there when you get back and you ll feel better about it Approaching the problem with a fresh mind can often be the most effective possible way to solve it Troubleshooting 251 INDEX Page numbers in italics refer to figures tables and listings Numbers 2X Terminal Server 226 3COM 164 3G broadband networks 174 10 100 indicator lights 75 10Base T networks 14 15 10 Mbps operations 29 100Base T networks 14 15 100 Mbps operations 29 1000Base T networks 14 A Access Microsoft 95 access points Wi Fi 53 55 62 80 81 81 85 87 90 99 111 113 174 AC power 17 48 49 50 51 60 61 67 75 242 ACT indicator lights 75 addresses and names 36 41 38 48 See also Internet Protocol IP addresses ad hoc networks 20 administrators 152 Advanced Maryland Automatic Network Disk Archiver Amanda 104 AHAM Association for Home Appli ance Manufacturers 223 AIFF Audio Interchange File Format files 209 210 AIM AOL Instant Messenger 158 234 235 AirPort Extreme 99 99 181 all
97. 0 can all connect to your home network through either a wired Ethernet port or a wireless link to support multiplayer games with one or more additional consoles on the same LAN or through the Internet they could also connect to a business network but your employer probably would not approve Connecting a PlayStation To connect through a wireless link use the PlayStation s built in Wi Fi inter face To connect a Sony PlayStation to your network through an Ethernet cable run an Ethernet cable from the game console either directly to an Ethernet hub or to a router To configure the network connection follow these steps 1 Turn off or disconnect power from your network hub modem Wi Fi base station and other network equipment wait two minutes and then turn everything back on again 2 Ifthe PlayStation console and attached display are not already turned on turn them on now 3 Confirm the PlayStation s connection to the Internet is active From the XMB home menu select Settings gt Network Settings gt Internet Connection gt Enabled 4 Select Internet Connection Settings and press the button The PlayStation will ask Do you want to continue 5 Select Yes The PlayStation will ask you to select a connection method 10 Select Wired Connection and press the button The Internet Connec tion Settings screen will appear Select Easy and press the button The PlayStation will scan your con nection and
98. 0492 scale fa 72 246 51 15 d static feedroor com t_assets 2008 1002 2 1934672926169 147 2e4946 2 f2308799 00603 jog DESKTOP A SrcPortel DstPort 7158 Len 0 Seq 1113000487 Ack 1609178691 Win S840 scale fa 72 246 51 15 TCP Flags SPort 7158 DstPorts HTTP 80 Len 72 246 51 15 A jate feedroom DESKTOP e Control Ethernet Etype Internet IP IPv4 no transf Ipv4 Next Protocol TCP Packet ID 2539 Total orm UA CP Tcp Flags PA SrcPort 7156 DstPort HTTP 80 U x86 If i Modified Http Request GET static feedroom com t assets 2 Since Thu 02 Oct 2 008 17 30 04 GMT le Figure 17 3 Microsoft Network Monitor displays detailed information about network data Untitled Wireshark 44 11 793820 Who has 192 168 1 1 Tell 192 168 1 45 11 794139 r bf 192 168 1 1 is at 00 20 78 30 170 149 173 130 192 168 1 100 170 149 173 130 170 149 173 130 170 149 173 130 192 168 1 100 54 12 338395 170 149 173 130 192 168 1 100 55 12 340788 170 149 173 130 192 168 1 100 Source port http 80 Destination port 6991 6991 Sequence number 26459 relative sequence number Next sequence number 27839 relative sequence number Acknowledgement number 1381 relative ack number Header length 20 bytes Flags 0x10 ACK Window size 64860 Checksum Ox4fdd correct 68 6f 77 3a 20 50 69 63 how Pic tures of 20 74 68 65 20 44 61 79 the Day class 22 63 61 6c 6c 6f 75 74 callo
99. 10 Mbps NOTE To install an internal Ethernet adapter follow these steps Turn off the computer and unplug the power cable Remove the cover from the computer s case Find an empty expansion slot on the motherboard Ie UPS ir un Remove the metal bracket attached to the computer s frame directly behind the empty slot Save the screw you ll need it to secure the adapter card 5 Line up the bottom of the adapter card with the slots in the expansion socket and push it into place 6 Use the screw you saved from the old bracket to secure the adapter card 7 While the computer case is off clean out the accumulated dust and make sure none of the connectors attached to the motherboard and the drives have come loose 8 Replace the cover and plug in the power cable 9 Plug a network cable into the new Ethernet jack in the back of the computer 10 Turn on the computer If the operating system does not automatically detect the new network connection load the driver software USB Adapters A computer that has built in USB ports but no Ethernet ports can use an external USB network interface as an alternative to an internal expansion card but the data transfer speed might not be as fast USB adapters are widely available but very few computers need them By the time USB ports became common features on computers onboard Ethernet ports were also standard equipment Network Adapters for Laptops An old laptop without a
100. 208 209 211 MAC addresses 43 91 184 authentication 184 185 Macintosh OS X 35 43 44 backup files 100 103 104 104 computer to network connections 117 124 124 127 125 126 127 file servers 94 95 96 99 99 215 file sharing 131 134 135 143 147 144 146 IP addresses 112 772 118 network adapters 73 74 network security 184 185 network to Internet connections 115 OpenVPN for 173 remote desktop programs 226 229 227 228 troubleshooting info 247 wireless control programs 87 Mac to Windows remote access 226 mail servers 24 M Audio 211 MaxiVista 229 232 Mbps megabits per second 3 McIntosh MS750 209 Media Center Extender 208 media sharing 143 meebo 234 megabits per second Mbps 3 mesh topologies 28 messages sending 11 13 14 message servers 234 messaging 233 237 microphones 8 204 205 Microsoft Baseline Security Analyzer 188 188 Knowledge Base 247 MSN Messenger 158 Protocol Analyzers 248 250 Resource Kit 163 SOL 95 SyncToy 232 TechNet articles 163 Windows See Windows Xbox 360 220 222 microsoft com 44 microwave radio links 3 mini PCI cards 81 82 82 84 87 MoCA Multimedia over Coax Alliance 17 modems 6 cable 110 combination boxes 33 configuring 86 dial up 109 DSL 62 110 high speed 109 installing 59 61 62 64 63 location of 50 network to Internet connections 108 115 null 19 19 PTSN 21 22 telephone line connections and 21 23 m
101. 78 Built in Ethernet f TCP IP DNS WINS AppleTalk 802 1X Proxies Ethernet Configure IPv4 Using DHCP IPv4 Address 192 168 1 103 Renew DHCP Lease Subnet Mask 255 255 255 0 DHCP Client ID If required Router 192 168 1 1 Configure IPv6 Automatically Router IPv6 Address Prefix Length A Cancel OK Figure 10 3 In OS X choose the Using DHCP option to obtain an IP address from a server In this example the important settings are DHCP Server and Starting IP Address When the DHCP server is enabled the server provides IP addresses for the entire network When the server is disabled each computer and net work node uses a static address that you must set on that computer or node http 192 168 1 1 DHCP htm Windows Internet Ex CI Je http 192 168 1 1 DHCP htm File Edit View Favorites Tools Help Gose c e amp http 192 x DHCP Acti You can configure the router to act as a DHCP Dynamic Host Configuration Protocol server for your network Consult the user guide for instructions on how to setup your PCs to work with this feature Enable c Disable 192 168 1 100 50 0 minutes 0 means two day DHCP Clients Table Apply Cancel Internet 100 v Figure 10 4 The DHCP server sets the IP addresses for the entire network NOTE The Starting IP Address setting specifies the lowest IP address number that the server will assign to a client device
102. 8 129 local area 122 123 123 Macintosh OS X 117 124 124 127 125 126 127 overview of 117 118 Unix 117 127 127 129 128 129 Windows 117 118 118 124 119 120 121 122 123 Wireless Network Connections profile 122 network to Internet 107 115 108 111 112 other devices audio music files 203 205 206 214 210 212 214 baby monitors 205 bar code readers 224 game consoles 220 222 home appliances 8 222 228 home entertainment systems 7 8 48 49 203 206 Internet radios 209 214 live conversations 205 233 237 microphones 8 204 205 remote conferencing 205 237 remote data entry 224 remote sensors and controls 223 224 stereos 206 212 surveillance monitors 205 traffic monitors 204 video files 203 205 215 220 webcams cameras 8 204 204 205 237 types ad hoc networks 20 clients and servers 23 25 25 common elements of 9 14 DTE DCE equipment for 18 19 error checking 9 13 Ethernet 14 16 15 FireWire ports 4 21 205 211 infrared networks 20 21 21 Plain Old Telephone Service POTS 21 22 point to point 19 20 20 51 52 52 powerline networks 16 17 Public Telephone Switched Network PTSN 21 22 22 remote terminals 23 23 servers 23 25 26 telephone line connections 21 22 22 Wi Fi 16 See also Wi Fi wireless fidelity wired networks 16 wireless programs 87 87 89 88 Network Connections window 116 118 119 122 169 170 173 190 networked Internet radios 214
103. ASA Cataloguing Rules mht Properties i General Security Dotais Otyect name C Audo ArchvesilASA Cataloguing Rules mht Permissions for IASA Cataloguing Rule Ea Group or user names Security eS Object name C Aude Archives ASA Cataloguing Rules mht R Account Unknown S 1 5 21 1614895754 1844237615 83952 St Administrators Tower Administrators t Users TowerlUsers CETTE ia SYSTEM R Account Unknown S 1 5 21 1614805754 1844237615 83052 it Administrators Towor Administrators amp Users TowerlUsers Group or user names To change permissions cick Edit Permissions for Everyone Full control Modity Read amp execute Read Permissions for Everyone Write Full control Special permissions Modity Read amp execute For special permissions or advanced settings Read chick Advanced write Figure 12 10 The Security tab con Figure 12 11 Use the Permissions dialog trols file sharing permissions for indi to change permission settings for one or vidual files more users The lower part of the dialog includes Allow and Deny checkboxes for each of six different options To change a setting click to add or remove a checkmark from the appropriate box The options are Full control A user with full control can read and write data files run program files edit or delete files and change a file s permissions Modify A user with Modify permissions can run a program file and read write or delete a data file
104. Boxes As part of your floor plan you chose a location in each room for a network outlet In places where you decide to use surface boxes you can attach the outlet block to the baseboard with double sided adhesive or wood screws For wall plates you must cut a hole in the wall and use a mounting bracket like the one shown in Figure 6 1 to attach the plate to the wall If there s an 56 electrical outlet on the same wall measure the distance from the bottom of the plate to the floor and mount the data plate at exactly the same height Remember to keep data outlets at least a foot away from the nearest electrical outlet When you tighten the screws on the front of the mounting bracket the wings inside the wall will turn and hold the bracket in place Figure 6 1 Use a mounting bracket to attach data outlet wall plates to a wall If you want to install a single combined wall outlet plate for data telephone wiring and video use a modular plate with snap in connectors For a single purpose outlet use either a snap in connector or a plate with the data outlet permanently attached Ethernet Cable NOTE Chapter 6 All Ethernet cables have four color coded pairs of wires twisted together green with green and white brown with brown and white and so forth Ethernet cables and connectors are identified as Category 5 CAT5 enhanced Category 5 CAT5e or Category 6 CAT6 depending on the amount of data that can pass through a cab
105. Guide which is available at http www microsoft com windows products winfamily windowshomeserver support mspx o Windows Home Server Console As DesxToe ior 6 tet bated up Ae THINCPAD 200M J Ntbededup uy romer Wx dodedup Figure 9 1 The Windows Home Server Console offers many control options on a single screen In order to use shared files stored on a Windows Home Server from other computers in your network you must install the Connector program supplied with WHS onto each client machine Without this software the clients won t find the shared files Connector is only available for Windows XP and Vista so Home Server is less useful with Macintosh and Linux Unix clients Using a Server for File Storage Chapter 9 The easiest way to set up a file server is simply to connect a computer to the network and designate it as a server Create one or more folders for shared files and set the Permissions or Network Sharing characteristics to share files in the directories or folders with network users If you re storing photos music or video files on the server create one or more separate folders for those files and set the permissions to read only allowing network users to open the files but not to change them Figure 9 2 shows the Sharing tab that controls these settings in Windows XP For more information about sharing files see Chapter 12 Photos Properties x General Sharing Customize r Local shari
106. Media Center hitp xmbc org is an excellent choice for managing and sharing media files Remember to configure the folder or drive that contains the server s music files as a shared resource that is accessible to other computers and devices on the same network Special Purpose Music Servers Audiophile music servers store music and other audio files on a hard drive and they generally perform two kinds of playback They connect directly to a stereo or home theater system as a local program source and they also connect to an Ethernet or Wi Fi network to serve music files to computers and audio devices in other rooms Music servers sold as audiophile equipment generally contain high quality internal parts and often front panel text displays that provide information about the music track currently playing Many of them such as the McIntosh MS750 are also very expensive Most include their own CD drives for ripping copies to the internal hard drive and analog inputs with excellent analog to digital converters for making digital copies of LPs and other analog source material A music server is an expensive alternative to a computer with a very good internal or external audio interface card or adapter but in a serious audio phile sound system such a server has its place a 3 500 music server might make sense as part of a system that includes a 3 000 amplifier and a pair of 7 500 speakers But the rest of us can accomplish the same thin
107. N MEConnect To 2 e Sample Call Enter details for the phone number that you want to dial Countryiregon United States 1 x Area code 206 User name MsN imi Phone number 555 8562 Password fre change the saved password cick here Connect using U S Robotics 56K Faxmodem Win 7 Save this user name and password for the following users Meonly C Anyone who uses this computer o e Figure 2 10 The Connect To dialog in Dia xj HyperTerminal includes space for an area mie ts code and telephone number da cm Lose Figure 2 9 The Connect dialog in Windows specifies the telephone number that a modem will call and the login and password that the computer will send after the connection goes through Remote Terminals Today most networks connect two or more computers but it s also possible to use your computer as a remote terminal a keyboard and screen to operate another computer that might be located in the next room or halfway around the world Computers using terminal emulator programs send commands from your computer s keyboard to a distant system and they display data from the distant computer on your computer s screen You can connect to another computer as a remote terminal through a LAN through a dial up telephone line or through the Internet For example Figure 2 11 shows the login sequence from a remote terminal program connected to The Well a text
108. N to the Internet you add a router as a node on the LAN This kind of router is sometimes called a gateway router because packets from your LAN must pass through it on their way to the Internet and of course packets from the Internet also pass through the router on their way to your LAN The most common gateway routers are specifically designed to supply the right kind of signaling and address conversion required by DSL or cable TV connections Combination Boxes In relatively small networks the functions of two or more network control devices are often combined into a single box For example a router that con nects the network to the Internet could also include a built in switch that connects several nodes or a DSL modem might be matched with a gateway router Many other combinations are also widely available If you can find one that meets your network s requirements a combined package is almost always a better choice than two or more separate pieces A single unit is almost always less costly than separate components because the case and the power supply account for a major portion of the total price and it s often easier to configure the network when one device handles several activities Using a single device that combines two or more activities offers another advantage that might not be obvious until you have been using your network for a while and you either need to troubleshoot a problem or you want to add more devices to the
109. NETWORK KNOW HOW AN ESSENTIAL GUIDE FOR THE ACCIDENTAL ADMIN TD MM NN ann no starch press www allitebooks com NETWORK KNOW HOW www allitebooks com We are in great haste to construct a magnetic telegraph from Maine to Texas but Maine and Texas it may be have nothing important to communicate Henry David Thoreau Walden www allitebooks com NETWORK KNOW HOW An E ntial Guide for the Accidental Admin by John Ross no starch press San Francisco www allitebooks com NETWORK KNOW HOW Copyright 2009 by John Ross All rights reserved No part of this work may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage or retrieval system without the prior written permission of the copyright owner and the publisher 1312 11 10 09 123456789 ISBN 10 1 59327 191 3 ISBN 13 978 1 59327 191 6 Publisher William Pollock Production Editor Kathleen Mish Cover and Interior Design Octopod Studios Developmental Editor Tyler Ortman Technical Reviewer Mike Kershaw Copyeditors Eric Newman and LeeAnn Pickrell Compositor Riley Hoffman Proofreader Rachel Kai Indexer Sarah Schott For information on book distributors or translations please contact No Starch Press Inc directly No Starch Press Inc 555 De Haro Street Suite 250 San Francisco CA 94107 phone 415 863 9900 fax 415 863 9950 i
110. Network Problem Solver Windows Internet Explorer Js xJ Je http winhlp com wxnet htm uox loc ogle 2 File Edit View Favorites Tools Help cese c Jota sa E vy 4 Windows Network Pro f2v Hy mv ov Ov Ov E Step 1 Fill in the form E The problem definition form How to use it read this carefully You have to fill in the form because otherwise this page is hardly useful Make a d sion and plan 5 minutes The reward will be a very high likelihood of getting your particular problem perfectly solved If you do not fill in the form you will probably not find the solution Please go through the form and click on the checkbox or radio button on the left side next to each best choice The questionnaire expects you to answer as If you were sitting at the computer on which the problem shows up Take a little time and try to be precise Its worth it After each change you make different chapters in the results section below the form are opened shown with full text or closed only the heading is shown Scroll down to see them all Once this page is loaded there is no further Internet data exchange All processing is done only on your computer Fundamentals 1 F Select your computer s symptoms below Network adapter not visible or connection not visible in Network Connections or Device Manager Or if you try to assign a fixed IP address to a new adapter you may get the error message The IP address XXX XXX
111. Network and Sharing Center A a TOWER Local This computer Internet Wis Local Private network Access Local and Internet Connection Local Area Connection Sharing and Discovery Network discovery On File sharing On Public folder sharing On When Public folder sharing is on people on the network can access filles in the Public folder What the Public folder Turn on sharing so anyone with network access can open files Turn on sharing so anyone with network access can open change and create files Turn off sharing people logged on to this computer can still access this folder Printer sharing ot Password protected sharing Off Aneta chseinn ou Figure 12 5 The Network and Sharing Center controls the access level for the Public folder Regardless of the network access settings others using the local computer can always open and edit files in the Public folder Sharing through the Public folder is a good choice when you want to keep all your shared files in one place separated from the files and folders that you want to keep private The Public folder is also an easy way to share files with everybody on the network without needing to set specific per missions for individual users To open the Public folder select the Start menu and choose Documents gt Documents Then select Public from the Favorite Links list in the left panel of the Documents window If the left panel is not visible select
112. OTE Many Wi Fi hotspots that require a password display a web based login screen before they connect you to the first website you try to view These hotspots won t connect to any other Internet service such as email or instant messaging until you log in through a web browser Hybrid Wired Wireless Networks Most home and business Wi Fi networks include at least one computer connected to the network s router through an Ethernet cable rather than via a wireless link The wired connections are often in the same room as the router and modem where there s little or no advantage to using wireless In many networks it might be convenient to run a cable to one or more adjacent rooms but use Wi Fi for computers in more isolated locations Other networks limit Wi Fi connections to laptops smartphones and other portable or handheld devices All the permanent systems use Ethernet cables because they re faster and more secure Wi Fi Security Wireless networks are a trade off between security and convenience The obvious benefits of a wireless network connection fast and easy access to the network from a portable computer or an isolated location come at a cost For most users the convenience of wireless operation outweighs the possible security threats But just as you lock the doors of your car when you park it on the street you should take similar steps to protect your network and your data The simple truth is that someone who wants to
113. Organize from the taskbar directly under the menu bar and then select Layout gt Navigation Pane Figure 12 6 shows the Public folder Gow b Public File Edit View Tools Help Name Date modified Type H Favorites Public Desktop Public Public Public Music Documents Downloads i Public Pictures Public Videos Recorded TV desktop ini i Computer Figure 12 6 Windows Vista s Public folder contains subfolders for different categories of shared files To add a folder or file to the Public folder either move or copy the file or folder into the Public folder or into one of its subfolders The preset subfolders are intended for common file types such as documents music photos and videos you can add new categories or remove the existing ones to meet your own needs and preferences You can also place shortcuts to local files and web pages in the Public folder If you place a copy of your Favorites folder drive letter gt Users username V avorites in the Public Favorites folder you can share your Internet Explorer Favorites list with other network users To open or view a file or folder in a Public folder from another com puter on the same network use that computer s network browser and open the drive letter gt Users Public folder for the target computer Sharing from Any Folder The alternative to the Public folder is to treat each shared file or folder separately Outside of the Public folder you c
114. Pv6 Automatically HE Router IPv6 Address Prefix Length Cancel OK Figure 11 13 Use the Configure IPv4 drop down menu to enable or disable DHCP on this computer Select the option you want to use to assign IP addresses on this com puter Select Using DHCP to obtain an address from the network s DHCP server or select Manually to assign a fixed address If you select the Manually option enter the numeric IP address the sub net mask and the gateway router address in the appropriate fields and click DNS in the menu bar along the top of the window The window shown in Figure 11 14 will appear Click the plus sign at the bottom of the DNS Servers box and type the IP addresses of one or more DNS servers You should obtain these addresses from your Internet service provider Click OK to save your changes and close the Advanced Network window The main Network window will appear with your current settings in place Click the open padlock icon at the lower left corner of the window to lock the settings and then click Apply to save your settings and close the Network window N00 Network Built in Ethernet TCP IP DNSH WINS AppleTalk 802 1X Proxies Ethernet i DNS Servers Search Domains 192 168 0 1 domain actdsltmp 64 255 237 242 64 255 237 243 IPv4 or IPv6 addresses EM e Cem OR J Figure 11 14 Enter the addresses of your ISP s DNS servers in the DN
115. S F lt f on Tower Computer Tower ig g on Tower Computer Tower t ig h on Tower Computer Tower os L Bi on Tower Computer Tower khalinstal MSDOS NTDETEC ntldr al bf z 29 objects 780 MB W Internet Figure 1 1 The files and folders on a remote computer are easy to reach through a network Of course you probably have some files on your own computer that you don t want to share personal letters confidential financial records medical information and so forth A well designed file sharing system allows each user to set every file or folder as either public or private For more about sharing files with other computers on your home or office network see Chapter 12 How a Network Will Improve Your life 5 Chapter 1 Sharing an Internet Connection When you order a connection to the Internet the telephone company or the cable TV company installs just one connection point It doesn t matter if the Internet service uses a dial up telephone line a high speed DSL line a cable TV service a fiber optic link or some kind of radio link your Internet service terminates in just one place most often in a piece of electronic equipment called a modem that s geek speak for modulator demodulator a device that converts between computer data and some other type of communications signal If you have just one computer you can connect it directly to the modem but when you want to conn
116. S attack occurs when your network receives a very large number of incoming connection attempts that overloads the network s capacity to respond The volume of traffic forces the computers and routers in the network to operate at or beyond their capacity which causes them to either flood the network with useless traffic disrupt connections among machines or completely disrupt network service For example a mail bomb attack might generate tens of thousands of useless email messages A DoS attack can make it impossible to do anything else on the network or it can block legitimate incoming traffic such as requests for access to a web server or exchange of email Most DoS attacks are aimed at large businesses government agencies and educational institutions so they re not a common problem for home or small business networks Even so it s important to know how to recognize DoS attacks and how to deal with them US CERT the United States Computer Emergency Readiness Team has identified three basic types of DoS attack consumption of limited resources destruction or alteration of configuration information and physical destruction or alteration of network components If your small network suffers a DoS attack you re likely to see a significant deterioration of network performance or even a complete breakdown If somebody decides to target your network with a DoS attack you can t do much to discourage them Therefore your best protection is
117. S window Connecting Your Linux or Unix Computer to a Network Different Linux and Unix distributions use different network configuration programs but they all require the same information that Windows and Macintosh computers use to connect to a LAN and through the LAN to the Internet Like the network connections for Mac and Windows most Linux and Unix systems will automatically set up a connection when a DHCP server is active Figure 11 15 shows the Gnome Network Administration Tool provided with Ubuntu To change the settings select the Wired connection box and click Properties Network settings Location t JOE Connections General DNS Hosts a Wired connection s Properties rz Address dhcp Point to point connection This network interface is not configured Hep f e unlsd Eg close Figure 11 15 Gnome uses a tabbed window to set network configuration options Connecting Your Computer to a Network 127 128 Chapter 11 The DHCP control and the manual IP address and DNS settings are shown in the Properties window in Figure 11 16 This window includes fields for the usual numeric IP address subnet mask and default gateway address Sa eth Properties s Enable roaming mode Connection Settings Configuration Static IP address IP address 192 168 0 23 Subnet mask 255 255
118. Sam or Kate On the other hand the system for naming computers and networks connected to the Internet rather than to your own LAN follows some very specific rules called the Domain Name System DNS In the Domain Name System every name starts with a top level domain name at the extreme right that can be either a generic description such as com net or edu or a two letter country code such as wk for the United Kingdom or ca for Canada As you move to the left the next word or group of letters and numbers is aname called a subdomain that has been reserved by a specific owner an individual a business a government agency or some other formal or informal organization Large organizations might have one or more additional sub domain names to the left of the first one Each part of the name is divided from the next one by a period read as dot For example the University of Washington s domain name is washington edu Within the university the Department of Genome Science s address is gs washington edu And within that department the addresses of the research group studying evolutionary genetics is evolution gs washington edu At the extreme left of a domain name you will sometimes see a subdomain that identifies the type of server This address might be the familiar www or some other Internet service such as ftp file transfer protocol Many addresses also include the typeof Internet service the protocol that the
119. Sharing Before you can share files through a Mac you must turn on Windows file sharing From the Apple menu select System Preferences 2 Select View gt Sharing 3 Check Windows Sharing in the Service column as shown in Figure 12 14 The list of network preferences will now include Windows Sharing On eoo Sharing 4 Showall Q Computer Name Mr Bojangle s Computer Other computers on your local subnet can access your computer at Mr Bojangles Computer local Edit f Services Firewall Internet Select a service to change its settings On Service Windows Sharing On DVD or CD Sharing Stop v Personal File Sharing Windows Sharing Click Stop to prevent Windows users from accessing shared folders on this computer Personal Web Sharing This will also prevent Windows users from Remote Login printing to shared printers FTP Access Apple Remote Desktop You must enable an account to use Windows Sharing Enable Accounts Windows users can access your computer at 192 168 1 104 mrbojangles Remote Apple Events Printer Sharing i OO SBO amp a amp O 4 J 3 Click the lock to prevent further changes Figure 12 14 Select Windows Sharing in the Service column Connecting to Windows File Sharing To view or open a shared file on another computer through the network follow these steps 1 Click the Finder icon in the dock and select Connect to server from th
120. Some of this infor mation provides additional error checking and instructs the switching centers Types of Network Connections 11 12 Chapter 2 where to forward each packet while other information tells the destination device how to reassemble the data in the packet back into the original message The headers at the beginning of a packet and trailers at the end of a packet attached to each packet include the address of the packet s desti nation information that allows the recipient to confirm that the packet s content is accurate and information that the recipient uses to reassemble the packets in the original order Between the origin and the destination network routing equipment sometimes adds more headers or trailers that contain routing instructions and other administrative information Figure 2 2 shows how a network adds and removes headers and trailers at different stages of a communication session The specific names of the headers and trailer don t matter right now the point is that they surround the original data packet Original message Hast Transport E ER n me sec ihe Transport soma Figure 2 2 A data packet may be surrounded by several kinds of headers and footers That same pattern repeats every time you add another layer of activity to a communications system Each layer may attach additional information to the original message and strip off that information after it has done whatever
121. T I 3 Data Networks and What You Can Do with Them ssee A Pile SMGRING E E E fdancsua data E q 5 Sharing an Internet Connection sse eee 6 Instont Messages d e 7 Sharing Printers and Other Hardware sss 7 Home Entertainment ee e eene hee enhn esee se enses 7 Video Cameras and Home Security Devices ceccceceseeesceeeeeeeeeneeeenseeeaes 8 Home AUtOMatiOn ERN ER OE 8 2 TYPES OF NETWORK CONNECTIONS 9 Packets and Headers ssececcscssevsessescocccvsseccostentessevsesccenobevsececcantsecsessvececenssvess 11 xen 13 Handshaking and Overhead sss 13 E AAE UE Lue e AA e ee Eee 14 PME 16 Powerline Networks csssseeee eee eem Ihe ese ene re he isses ret r ss ess s sse ens 16 Other Alternative Wiring Methods sss eee 17 DTE and DCE Equipment eret tie eh etre rene to Phe ren EE Pee guam eo ORARE HERD ER Dod 18 Point to Point Networks sssseses eee eee nm em esses eret renes esee erret essen ena 19 P dale Bad MT Xs 20 WOO ERREUR 20 FireWire EEE T394 eese occae titia a a tins 21 Connections Through a Telephone line sssssse eee 21 Remote Terminals 52 ecce dusctete tes soos OUT EUR E E De e E ORO E Ove ERE costs Seve oes E ODE ERU QUEE 23 Clients and Servers sssssses Ie eee eee e sess s ert ret esses srt eter essen 23 3 HUBS SWITCHES AND ROUTERS 27 Hubs and Switches
122. The next sections explain how to deal with each of them DHCP Servers On or Off A DHCP server automatically assigns IP addresses and other configuration information to all of the devices in a network In a LAN the DHCP server is most often part of the router or modem that connects that network to the Internet or built into a network hub In most small networks using a DHCP server is more convenient than assigning a static IP address to each network device one at a time The DHCP setting is a common cause of connection problems If a com puter is configured to obtain its IP address and other settings from a DHCP server the DHCP server on the router or modem must be active Other less common DHCP problems can occur when more than one server is active at the same time In some cases the other network devices will obtain DHCP settings from the wrong server or the settings will not allow you to connect to the Internet If you can t successfully connect a computer to the Internet through your LAN when testing your network you should always check the DHCP server settings There are several important things to know about using DHCP in a LAN e A network can have just one active DHCP server e When a network is using a DHCP server each computer and other device such as a printer or game console connected to the network must be configured to accept an address from the DHCP server In Windows the Obtain an IP address automatically o
123. Vo Wireless adapter which is an optional accessory that connects to the DVR s USB port or a compatible adapter made by Belkin D Link Linksys or Netgear Connecting to a Wired Network To connect a TiVo to your existing wired network follow these steps Run an Ethernet cable from the DVR to a network hub or router 2 Press the TiVo button on the DVR and select Messages and Settings gt Settings Phone amp Network 3 From the Network Connection screen shown in Figure 15 6 select the Change network settings option sve Network Connection mpm Next attempt Sun 2 24 3 32 pm Network connection details Last pt Sun 2 38pm Type Ethernet connection Last status Succeeded IP addr 10 100 1 01 MAC ID 00 11 AA 22 33 44 Connect to the TiVo service now Use phone instead View network status Test TiVo service connection Figure 15 6 Use TiVo s Network Connection screen to configure a wired connection to your home network 4 Follow the instructions that appear on your screen If your network has an active DHCP server the TiVo client will detect it automatically and display a Network Setup Complete screen If your network doesn t have a DHCP server select No let me specify a static IP address and type an IP address for this network node the subnet mask and numeric addresses for the node s gateway router and DNS server 5 The DVR will test the connection If the settings are correct it will dis pla
124. Wi Fi Networks 83 84 Chapter 8 Photos courtesy of Linksys a division of Cisco Systems Inc Figure 8 5 USB Wi Fi adapters can be either stand alone devices left or small plug in modules right PCI Cards Wi Fi adapters on PCI expansion cards that mount inside a desktop computer are also available but they re less convenient than other types of adapters To install a PCI card you must open the computer s case and insert the adapter into an unused expansion slot on the computer s motherboard a considerably more complicated process than plugging in a PC card or a USB device The only reason to consider using a Wi Fi adapter on a PCI expansion card might be to add an old computer that has no USB ports to a wireless network Even then you could achieve the same result by installing an expansion card with several USB ports inside the computer and connecting a USB Wi Fi adapter to one of those ports That s probably the better approach because it will also allow you to use other USB devices with the same computer Antennas Every Wi Fi adapter comes with either a builtin antenna or an antenna that plugs into a socket on the adapter s case Some adapters include a builtin antenna and a socket As mentioned earlier in this chapter the antennas for a mini PCI adapter in a laptop computer are usually built inside the top part of the computer s case alongside the display panel Unless you re trying to send and receive Wi Fi signal
125. a small window on your desktop that contains the image from the camera in the other room Live conversations When both parties have a webcam and microphone connected to their computer it s easy to conduct a face to face conver sation through the network Remote conferencing One or more participants in a meeting or con ference can participate from a remote location Other Things You Can Connect to Your Network 205 206 Home Entertainment Networks A home entertainment system can distribute music TV movies and other audio and video through the same network that connects your household computers to one another and to the Internet Over the air cable or satellite TV and radio music from a CD player or stored on a hard drive and videos from DVDs can all provide source material for a system that can play music or display video in any room with a network connection There s a whole industry out there that supports very expensive home entertainment systems complete with video screening rooms the high tech popcorn maker is optional at extra cost TV screens built into walls or rising out of hidden cabinets in the kitchen or bedroom multiple speakers in every room and preprogrammed mood lighting But unless you have a spare 10 000 or 20 000 or more a lot more to spend on fancy equipment and custom installation those systems are not particularly practical Most of us will have to settle for something considerably le
126. adio signal from a nearby access point the adapter s control software will automatically match the signal type used by that access point Adapters Built into Laptops Built in Wi Fi interfaces are a standard feature of most new laptop computers The actual interface adapter is on a mini PCI card that mounts on the com puter s motherboard like the one shown in Figure 8 3 The antennas for internal Wi Fi adapters are usually flexible wires inside the upper half of a laptop s folding clamshell in the space surrounding the monitor screen Wi Fi Networks 81 82 Chapter 8 Antenna connectors Photo courtesy of Intel Figure 8 3 Mini PCI card Wi Fi adapters mount on the motherboard inside a laptop computer The Main and Aux connectors near the top in the photograph are antenna connectors One advantage of the mini PCI card approach as opposed to making the Wi Fi adapter a permanent part of the motherboard itself is that the adapter is what IBM calls a field replaceable unit FRU Other manufacturers use different names but the meaning is the same If an adapter goes bad or if you want to replace an older adapter with a new one that can handle new standards it s relatively easy to remove the old card and install a new one in its place without changing the motherboard This feature will be particularly convenient as and when the 802 11n standard becomes more common It s important to turn off the Wi Fi adapter whe
127. ail protocol 158 sneakernets 3 4 sniffer programs 178 179 249 social engineering 185 SoftRos Lan Messenger 235 Sony PlayStation 220 221 Sound Blaster 208 sound cards 205 208 211 212 Sound Forge Audio 208 sound quality 208 211 213 sources 206 207 SQL 95 Squeezebox devices 213 214 214 SSH Secure Shell 104 SSIDs Service Set Identifiers 86 90 177 179 178 183 244 283 SSL Secure Sockets Layer 89 164 176 standards wireless network 78 78 79 stars 27 static addresses 37 109 status indicators 75 stereo component music servers 208 stereo systems 206 212 storage servers 24 96 97 store and forward system 11 structured wiring center 59 63 subdomain names 39 subnet masks 42 109 113 118 128 superusers 226 surface boxes 55 56 surveillance monitors 205 S Video plugs 218 switches combination boxes 33 designing networks with 47 D Link 64 downstream 67 Ethernet 30 53 53 55 62 80 193 installing 59 61 62 64 63 location of 50 overview of 28 29 30 31 31 33 print 194 195 secondary 53 switching centers 11 Symantec Security Check 245 Synchronize It 232 SyncToy 232 system administrators 152 System Preferences window 124 INDEX 263 T TCO total cost of ownership 95 TCP See transmission control protocol TCP TCP IP 35 36 123 123 126 158 telephones line connections 17 18 21 22 22 64 65 65 wall outlets 48 49 51 wiring 17 18 tel
128. also print a copy of the current list including the date and keep it separately from the computer When it s time to add one or more additional devices consult the list to find and add a new address that isn t already assigned DNS Servers Your LAN needs one or more DNS servers to convert Internet addresses to numeric IP addresses but the DNS servers don t have to be part of the LAN you can use a DNS server anywhere on the Internet Use the same DNS server addresses for each computer that you used for the WAN side of the router If you can t get a DNS server address from your ISP run a web search for public DNS server to find addresses for alternative servers One widely used public DNS is OpenDNS http www openDNS com Gateways The gateway address is the address of the router or other control device that relays data between computers on a LAN and the Internet This gateway is sometimes called the default gateway The gateway address is the same as the numeric address used for the LAN side of the router Consult the router manual to find the correct address for your network Computers connected to the network don t use the same gateway address as the router or modem The router modem is the gateway between your network and the ISP s WAN Your ISP s gateway address identifies the path between their WAN and the rest of the Internet Configuring the Network Gateway The best place to find specific instructions for configu
129. ame or any other family name e Your favorite entertainer band team or song e Your own first initial and last name such as Smith e An obvious string of numbers letters or both such as 123456 abcxyz or abc123 e Your birthday or some other significant date e Your home town or country e Astring of characters from your keyboard such as qwerty or 96 e The word password e The phrase letmein that is let me in not the name of a Chinese noodle dish e The phrase trusinol Fox Mulder s password on The X Files TV series e The word swordfish originally used in the Marx Brothers Horse Feathers and in many subsequent movies books and computer games e The word sex or any common curse or obscenity e The word God or Jesus or any other deity of your choice e Any of these words or phrases spelled backward When a computer security expert in a movie or TV show finds the right password to break into the bad guy s computer on the third try he probably tried some of the passwords on this list Many network routers modems and other hardware come with default passwords preset at the factory These passwords are well known by crackers and easy to find in equipment manuals and on the Internet Network Security 153 154 Chapter 13 The best passwords are random strings of letters numbers and other characters at least seven or eight characters in length One expert tested a brute force password cracking program Ta
130. an set sharing permissions for each folder or individual file to allow read only or read and change access for specific users or groups of users A shared folder is also known as a network share or simply a share To share folders or files outside the Public folder follow these steps 1 From My Computer select one or more folders or drives that you want to share 2 Click Share in the toolbar at the top of the window The Share icon is only visible when you have selected one or more drives or folders it s not available for individual files The File Sharing dialog shown in Figure 12 7 will appear Sharing Files Through Your Network 139 22 File Sharing Choose people to share with People without a user account and password for this computer can access files you share with everyone To change this setting use the Net Name Permission Level R Everyone Contributor Y John Ross Owner v Th Unknown Contact Co owner Y Share Cancel Figure 12 7 The File Sharing dialog specifies the people with whom you can share a folder s contents To add an individual name to the list of people who have access to this folder click the arrow next to the empty field near the top of the dialog and either select that person s name from the list or select Create a new user from the drop down menu If you select Create a new user the User Accounts dialog will appear Select Manage another account and then select Create a ne
131. and NetBEUI networks IPsec is limited to IP networks Both the client and the server must use the same protocol In PPTP and L2TP the client and server must configure the tunnel for each transmission before they begin to exchange data The configuration parameters include the route through the intermediate network and the encryption and compression specifications When the transmission is com plete the client and server terminate the connection and close the tunnel Unfortunately several data security analysts have identified significant flaws in PPTP that allow intruders to break into a PPTP based VPN and sniff passwords and then decode encryption read data or inflict damage to a network server Therefore PPTP headers are not secure and should not be used In an IPsec network link the client and server must establish the tunnel through the intermediate networks in a separate transaction before they begin to exchange data Both L2TP and IPsec offer specific advantages and disadvantages but they re both good enough to create a secure link between a wireless network client and an access point The differences among the three are technical rather than practical You can find an excellent explanation of the internal operation of all three protocols in Microsoft s white paper entitled Virtual Private Networking in Windows 2000 An Overview which is available online at http technet microsoft com en us library bb 742566 aspx but reme
132. and onward to the nodes connected to those ports Each node compares the address on the packet with its own address and either accepts it if the address is the same or ignores it if the packet is addressed to some other node Because the hub sends each packet to every port only one packet can travel through the network at a time we re talking about many packets per second but they still move through the network one at a time If two or more computers try to send packets at exactly the same time Ethernet s collision detection feature forces them to stop wait and try again a fraction of a second later In order to prevent collisions each node must examine the network to be certain that no other node is already using the hub before it transmits a packet Therefore a network with a 10 100 hub is no faster than the slowest node If all the computers in your network use 100 Mbps network adapters but the printer connects through a 10 Mbps port the whole network will run at only 10 Mbps or less Hubs Switches and Routers 29 As more nodes try to use a hub at the same time the data transfer speed through the entire network drops This could have a significant effect on a busy network that uses a hub The actual data transfer could be only a fraction of the nominal 10 Mbps or 100 Mbps In general hubs are slow simple and cheap But the difference in cost between a hub and a switch is often insignificant so a switch is almost always the b
133. any When you re building a wireless network that will use network adapters made by different manufacturers or if you plan to allow users of laptops and other portable devices to connect to your network there s not much benefit to having an enhanced network The Wi Fi Alliance http www wi fi org the industry group that promotes these networks conducts periodic bake offs where many manu facturers demonstrate that their products will work correctly with equipment made by their competitors A network adapter or access point that carries the Wi Fi logo has been tested and certified for compatibility by the Wi Fi Alliance Operating Channels Wi Fi uses a segment of the radio spectrum also called a band near 2 4 GHz that has been reserved for unlicensed industrial scientific and medical ISM services including wireless data networks 802 11b 802 11g and 802 11n all use this band of frequencies 802 11a uses a different frequency band near 5 2 GHz known as the Unlicensed National Information Infrastructure U NII Both the ISM and U NII bands are open to many kinds of unlicensed radio services This means that the people who make the equipment must demonstrate that their designs meet various regulations related to maximum power interference and so forth but actual users that s you and me don t need to obtain licenses before they can operate approved radios One result of this is that the same radio frequencies used by Wi F
134. appears to connect two participants computers directly to each other so you specify the name of the other participant rather then the channel After you make the initial connection there s not much difference between chat and IM Servers vs Peer to Peer Messaging Instant messaging services can use two different structures through message servers that receive all messages and forward them to their ultimate destina tions and peer to peer systems that forward each message directly from its source to its destination Figure 16 6 shows both types Just about every Internet based IM service uses a server messaging services within a LAN are usually peer to peer FFA TC Internet LA message User 1 Ethernet Internet IM Service Peer to peer Figure 16 6 Internet instant messaging servers and peer to peer chat use different structures to accomplish similar objectives Internet Based IM Services Most IM uses one of the services that send and receive messages through the Internet such as AOL Instant Messaging AIM Windows Live Messenger Google Talk or Yahoo Messenger or a service that exchanges messages with a mobile telephone Other messaging programs are available that operate within a LAN Unfortunately many IM services are self contained networks for example you can t use Google Talk software to send a message to an AIM account However several third party programs such as Pidgin hitp wuw pidgin
135. arded Windows fire wall software products There s also a firewall built into Windows XP and Windows Vista that is adequate for most home and small business networks Linux and Unix users also have plenty of firewall options Most of them were written for stand alone firewall computers that are commonly used as network gateways but they could be equally appropriate as protection for individual network clients In Linux the iptables firewall is part of the kernel It s well documented at hitp www netfilter org projects iptables index html Port Scan Attack Detector psad is another set of tools that identify port scans and other intrusions on many Linux systems For more information see http www cipherdyne org psad IP Filter is a software package that provides firewall services to FreeBSD and NetBSD systems The official IP Filter website is hitp coombs anu edu au avalon and you can download an excellent HOWTO document at hitp www obfuscation org ip ipf howto txt The program can deny or permit any packet from passing through the firewall and it can filter by netmask or host address establish service port restrictions and provide NAT services OpenBSD FreeBSD and NetBSD can all use the Packet Filter or PF facility to perform firewalling More information is available at http www openbsd org faq pf NetBSD 1386 Firewall is another free Unix firewall It will operate on any PC with a 486 or later CPU and as litt
136. at already exist on the other side it only copies the changed bytes Server side programs run on the server and collect backups from each client computer BackupPC is a good choice as a server side Linux backup program because it can back up Windows Linux and Mac computers through a network BackupPC is available for download from hitp backuppc sourceforge net Amanda the Advanced Maryland Automatic Network Disk Archiver hittp www amanda org is another server side backup program that supports Windows and multiple versions of Linux and Unix Using a Server at Home A server on a home network can do all the same things that a server on a business network can do but many of those business functions are probably not particularly important at home A typical home network server is mainly useful for storing and sharing files such as music and videos making auto matic backups and maybe hosting web pages and email However a local server is not always the best way to manage email or host web pages Using the hosting services that are included with your Internet connection is often easier a good hosting service will handle all of the security issues and other maintenance for you Many Internet service providers will give you a separate email address for each family member and provide space on an existing web server for your family s web pages Or if you prefer you can obtain individual addresses from one or more of the free
137. authentication option that uses encryption when a network client has the key but uses unencrypted data with other network nodes Mixing Hex and ASCII Keys Setting up a mixed network becomes more complicated when some network nodes use hex only and others require ASCII keys If that s the situation on your network you will want to follow these rules for setting the encryption keys e Convert all your ASCII keys to hex Ifa configuration program demands an ASCII key enter the characters Ox zero followed by lowercase letter x followed by the hex string If you re using Apple s AirPort software you ll have to enter a dollar sign at the beginning of a hex key e Make sure all your encryption keys have exactly the right number of characters Network Security 181 182 Chapter 13 e Ifall else fails read the security sections of the manuals for your network adapters and access points It s possible that one or more of the devices in your network might have some obscure proprietary feature that you don t know about WPA Encryption WPA encryption was developed as a partial solution to the security problems that make WEP encryption less than totally secure WPA is much safer than WEP but cracking WPA is still possible WPA is more secure because it uses a method called Temporal Key Integrity Protocol TKIP to automatically change the encryption key after a specified period of time or after the system exchanges a spec
138. ay in downtown Seattle Completing that echo takes longer but it s still pretty fast Lines 4 to 7 show the packets moving through various routers in the same switching center in Seattle Starting at line 8 the route apparently jumps through routers in Chicago Kansas City Fort Worth and Dallas which increases the response times The path moves around a routing center in Dallas at lines 11 through 15 until it ends up at the Laughing Squid web host that houses the No Starch web server This connection goes from origin to destination with several thousand miles of detours However the whole thing takes only about a tenth of a second so those detours don t really matter TraceRoute can help identify several possible problems If a TraceRoute report ends with one or more lines of asterisks that usually isolates the problem to either the router named in the preceding line or the connection from that router to the next one If the report shows a very long path that includes router addresses that don t seem to be a on a reasonable route such as a path from New York to Philadelphia by way of Singapore one of the network routers is not configured correctly If the route shows that a pair of routers are passing the signal back and forth until TraceRoute times out that usually indicates that one of those routers has lost a connection and is returning the signal back to the pre vious router That router still thinks th
139. based online community that runs on a Unix host computer in Sacramento California The Well s computer treated my desktop computer in Seattle exactly the same as it would treat a local terminal connected directly to the host You might see similar text based host computer displays from library catalogs or mainframe computers Connected 9 32 PM 2 10 2008 1i This is The WELL Find membership information at http www well com Forgot your password Go to http ww well com newpass If you already have a WELL account type your username login Password Last login Sun Feb 10 17 17 11 from iiss Figure 2 11 A remote terminal allows a user to operate a remote computer through a network You can connect to a computer as a remote terminal through the Internet using a category of programs called telnet that form the core of most terminal emulators or you can connect directly to the host computer through a modem and a conventional dial out telephone line Clients and Servers As your network grows you might choose to add some computers and other devices such as printers to the network Those additional computers will provide useful resources to all of the network s users In a network a clientis a computer or program that uses resources supplied by another device a serveris the device that provides those resources Organizing a network into clients and servers is one way to make that network much mo
140. ble 13 1 shows the amount of time that one programmer Jimmy Ruska needed to discover passwords of different lengths by creating and testing every possible combination The specific numbers in this table apply only to his particular program You should pay attention to how the amount of time increases as you add more characters to a password rather than the exact times The time to crack is even greater if your password includes one or more symbols such as amp and Table 13 1 Time to Test All Possible Passwords Password Length Letters Only Letters and Numbers 3 characters 1 second 2 seconds 4 characters 3 seconds 10 seconds 5 characters 1 minute 17 seconds 6 minutes 6 characters 26 minutes 3 hours 30 minutes 7 characters 14 hours 6 days 8 characters 15 days 205 days Source http blog jimmyr com Most Common Passwords 20 2008 php Other cracking methods can be slower or faster but the general point that longer passwords are more difficult to crack still applies Firewalls A firewallis a server that uses a set of rules established by the network manager to inspect incoming data and to block data from a source that isn t on a list or files that match a particular description such as a virus Or the firewall might pass all data moving from the LAN o the Internet but only allow certain types of data from the Internet The most common use of a firewall in a LAN is at the gateway to the Internet as shown i
141. broadband and WiMAX networks might be more secure than Wi Fi primarily because capturing data from them is more difficult and WPA encryption is better than WEP encryption no wireless security is perfect Encryption and other security methods can make data a little more difficult to steal but these methods don t provide complete protection against a really dedicated snoop As any police officer will tell you locks are great for keeping out honest people but serious thieves know how to get past them To make things even more dangerous many network managers and home wireless users leave the doors and windows to their networks wide open to intruders by failing to use encryption and the other security features that are built into every Wi Fi access point and network node Drive by logins to unprotected private networks are possible in many urban and suburban business districts and in a surprising number of residential neighborhoods Most people have gotten the message about using encryption on their home and office networks but too many of them are still using the older WEP encryption system rather than the much more secure WPA method The technical support people at one major telephone company Qwest were still advising their DSL customers to use WEP encryption as late as mid 2007 If you re located in a city center or a suburb you can probably see this for yourself When you use your Wi Fi control program to scan the networks in your
142. builtin Ethernet port must use a network adapter on a plug in PC card that fits into the PCMCIA socket on the side of the computer Figure 7 4 shows a network adapter on a PC card A new standard for 32 bit PC cards and services called CardBus was adopted in 1995 CardBus PC cards with a gold grounding strip next to the 68 hole connector don t fit older 16 bit PC card sockets but 16 bit cards will fit into 32 bit sockets If your laptop was made before 1997 look for a 16 bit 10 100 Mbps PC card adapter Very old laptops that don t have PC card sockets can connect to an Ethernet network through a serial to Ethernet adapter but it s probably not worth the effort Any laptop without a PC card socket is at least a dozen years old and it won t come close to the performance of today s least expensive models Considering that a serial to Ethernet adapter is likely to cost almost as much as a whole new computer it s time to replace your Old Faithful antique instead Ethernet Network Interfaces 73 74 NOTE Chapter 7 Figure 7 4 This 16 bit PC card network adapter uses a short cable sometimes called a dongle to connect the adapter to an Ethernet socket Finding the Driver Software for Your Adapter Windows XP Windows Vista Mac OS X and most current versions of Linux and Unix can automatically detect new network adapters In some cases you might have to restart the computer after installing the network adapter but in general t
143. can expect if to continue to do so unless you try to expand or otherwise improve it This is a classic example of If it ain t broke don t fix it On the other hand if you have an old desktop computer with some other kind of network interface or no network adapter at all you can probably connect it to your Ethernet LAN if you don t mind opening up the computer and swapping circuit cards Look for an Ethernet network interface adapter on a plug in card that fits one of the empty expansion slots and download the latest driver software from the card manufacturer s website Wi Fi short for wireless fidelity is a category of networks that use radio signals instead of wires to connect computers and other devices Another name for Wi Fi is wireless Ethernet because Wi Fi uses many of the same data handling rules and specifications as a wired Ethernet network However every Wi Fi packet must include additional handshaking data so the overall data transfer speed is often slower than a conventional Ethernet link Wi Fi offers several advantages It doesn t need cables to connect every network node so it s often easier to install and use than a wired network connection Rather than string cables through walls and provide a network outlet at every desk you can distribute access to the network through antennas in between each computer and a base station an access point in a central location When you travel with a laptop computer a handheld
144. cannot be decrypted by the network s WEP key Therefore the WEP settings must be exactly the same on every access point and client adapter in the network This sounds simple enough but it can get confusing because manufacturers use different methods to identify the size and format of a WEP key The functions don t change from one brand to another but identical settings don t always have identical descriptions Network Security 179 180 Chapter 13 How Many Bits in Your Encryption Key A WEP key can have either 64 bits or 128 bits Although 128 bit keys are more difficult to crack but they are still pretty insecure they also increase the amount of time needed to transmit each packet However confusion arises because a 40 bit WEP key is the same as a 64 bit WEP key and a 104 bit key is the same as a 128 bit key The standard 64 bit WEP key is a string that includes an internally generated 24 bit initialization vector and a 40 bit secret key assigned by the network manager Some manufacturers specifications and configuration programs call this 64 bit encryption but others describe it as 40 bit encryption Either way the encryption scheme is the same so an adapter that uses 40 bit encryption is fully compatible with an access point or another adapter that uses 64 bit encryption Many network adapters and access points also include a strong encryption option that uses a 128 bit key Devices that support strong encryption are downwa
145. center e Troubleshoot network slowdowns and failures No matter which operating system you use and even if you ve never installed or run a network before you ll get what you need to know in Network Know How ABOUT THE AUTHOR John Ross has worked on wired and wireless network ing for Motorola AT amp T and other manufacturers He is the author of more than two dozen books including Internet Power Tools Random House Connecting with Windows Sybex Wiring Home Networks Sunset Books and The Book of Wireless No Starch Press COVERS WINDOWS MAC OS X AND LINUX 29 95 29 95 0m 95 29 95 CDN NI 3ATIHS J
146. ces connected to LANs Because these addresses are only visible within each LAN it s practical to use the same addresses in different networks Every computer and every other device connected to your network must have a different address within one of these reserved number ranges Each network device including the LAN side of the router itself must have a different IP address from one of the reserved groups A DHCP server usually part of the router or modem will take care of this automatically and assign new addresses whenever users connect another computer to the network This can be especially convenient if users connect and disconnect laptops and other portable devices to and from the network If you re not using a DHCP server you ll have to set the address for each device one machine at a time The LAN side of your router or modem usually has a default address that you use to reach its configuration utility look in the device s manual to find the address You do not have to change the default address on a router or other control device unless another device such as a Wi Fi access point has the same default address To make sure that you haven t assigned the same address to more than one device keep a master list of IP addresses that includes every device connected to the network including laptops and other portable devices that use part time connections You can keep the list in a text file stored on your own computer but you should
147. ch a repair person before the problem turns into a catastrophic failure Remember the classic science fiction nightmare in which all your house hold appliances communicate with one another and conspire to take over your life When you connect everything to your home network that fantasy is one step closer to reality Several specifications for networked home appliances have been estab lished in order to assure that appliances made by different manufacturers will communicate with one another through a home network including the Living Network Control Protocol LnCP developed by LG Electronics and adopted by several other mostly Korean manufacturers and the Association for Home Appliance Manufacturers AHAM standard for Connected Home Appliances CHA 1 It s too early to know whether LnCP CHA 1 or some other specification will ultimately emerge as an industry wide standard but it s likely that some method for exchanging data among appliances and other devices through a home network will become common within the next few years If you buy a network compatible smart home appliance today it will probably use an Ethernet port to connect to your home network Depending on the specific applications built into each appliance it might use a control panel or remote control unit dedicated client software or a web based interface to run the appliance s communications functions Home Automation Other home network applications ca
148. ches of the plastic jacket from the end of the telephone cable If the outlet block has screw terminals strip about half an inch of insulation off the end of each wire and wrap the bare end around the screw next to the letter that corresponds to the wire s color If the terminal uses two vertical pins with a slot between them to hold each wire don t strip the wires but use a punch down tool to force each wire between the pins If your terminal does not come with a small punch down tool look for one ata home center or hardware store you will need the same tool to connect data cables to their outlet connectors If excess wire extends from the side of the connector cut it off When all four wires are connected place the dust cover on the plug After you have connected the telephone line to the outlet block plug in a telephone with a modular RJ 11 cable to test for a dial tone If there s no dial tone check your connections at both ends if you have a dial tone unplug the telephone set and use one of the cables supplied with the modem to connect the modem to the telephone line Connecting a TV Cable Most video wiring inside a building uses coaxial cable called RG6 U with a central copper wire surrounded by insulation and a metal shield The connectors that attach to this cable are called F connectors Video cables usually require a special tool to attach the F connector to each end of the cable If you re not installing your own vide
149. cial records email music and video maybe some games and a connection to the Internet It s all in one place Love it or hate it that computer has become an important part of the way you work and play In fact it s so important and so convenient that you eventually decide to add another computer it might be a laptop that you can carry from one place to another or maybe a second desktop machine that allows more than one person to use a computer at the same time And that s when the trouble starts Shortly after you get that additional computer you will discover that something a text file or a picture you need for a report or a music file you want to play or the modem that connects you to the Internet is located on the other computer You have to copy files to a portable disk or a flash drive when you have something to print and carry it to the computer connected to your printer when you want to scan something you must go to the computer NOTE with the scanner and when you want to connect to the Internet you must either use the computer with the high speed connection or wait until another family member has finished using the telephone so you can dial in Using the computer has risen to a whole new level of inconvenience Any time you or your family or business use more than one computer something you want a file a printer or some other resource is likely to be located on or connected to the computer you re not currently usin
150. configure your network gateway and before you can connect a computer to the Internet through that gateway you must configure that computer s Internet settings 108 The Internet From the Cloud to You Chapter 10 Network diagrams traditionally show the Internet as a big cloud Inside that cloud are millions of computers routers and other equipment located all over the world but the internal operation of that equipment is Somebody Else s Problem when you re hooking up your own network the Internet is simply a huge shapeless thing that performs in a predictable manner Figure 10 1 shows the connection from the Internet through your local network to individual computers Those computers can be any kind of network attached device such as a printer a network attached storage NAS device disk drive or a pocket size smartphone but for the sake of this discussion let s think of all those things as types of computers In order to send and receive data between your computer and the Internet you must supply certain information to the Internet and the Internet provides other information to you s customer s LAN C Als Cs Desktop computer Your ISP s Your Laptop WAN host router computer lt S Another k customer s LAN af Server Figure 10 1 The Internet communicates with your computer through a local network The Modem Your LAN probably connects to the Internet through a high speed telephone line or a cabl
151. ctly to the network as a separate node a printer server or through one of the network s computers Look for information about both types of printer connections in Chapter 14 Home Entertainment The same home network that carries data to computers can also distribute music movies and other audio and video to stereo systems TVs and home entertainment centers throughout the house Special purpose computers called music servers can copy music from CDs or older recordings such as cassettes or vinyl records or download music files store the music as digital files and play them in any room in the house on demand either through the speakers attached to a computer through a traditional stereo system or through a dedicated tabletop device similar to a radio The same players can also receive and play streaming radio stations from around the world through the Internet Video servers can store movies and other videos and make them available through the network to computers televisions and How a Network Will Improve Your life 7 Chapter 1 home theater systems Some network music servers also include docking stations for iPods and other portable music players that can transfer files between the server and the portable unit and play music and videos directly from the portable device Audio and video programs can move through the network at the same time as email web surfing and instant messages For detailed information about setting up and
152. d at the other end and IP Internet protocol which provides the rules that guide each data packet through different kinds of networks to the correct destination Your computer handles transmission control automatically so you don t have to devote a lot of attention to individual data packets and their contents The information in Chapter 2 of this book provides as much detail as most users ever need But the Internet protocol is another matter you should understand how your network and just about every other network connected to the Internet uses names and addresses for individual computers and other network nodes and how to use some of the standard software tools that are included in every network computer Fortunately internal routing through the Internet is automatic if you enter a valid address in your web browser email client or other program the Internet will almost always find a path to the computer with that address If it doesn t the ping and traceroute commands described in Network Tools on page 41 will help you find the source of the problem Names and Addresses An addressing convention sounds like an event where people attend speeches and workshops about house numbers and receive awards for send ing out five million pieces of junk mail without an error The formal sessions are often boring but the after hours parties are great In networks addressing conventions are actually the rules that everybody uses t
153. d your computer can detect other computers when network discovery is off the computer can t see other computers and other users can t see yours In other words network discovery is one more setting that must be turned on in order to view files among computers You might also encounter a custom state if a firewall exception has been disabled or one of the services that controls network discovery is not active To turn network discovery on or off from the Network and Sharing Center click the On or Off button or click the arrow at the far right of the Network discovery option then click the Turn On or Turn Off button and click Apply File Sharing Vista allows two kinds of file sharing through a network sharing from the Public folder and sharing from any folder You must turn on either method in the Network and Sharing Center before you can use it Sharing Files Through Your Network 137 138 Chapter 12 Public Folder Sharing When you turn on Public folder sharing from the Network and Sharing Center any folder or file within the Public folder is accessible to anyone on the network You can set the Public folder to allow read only access or you can allow any user to create new files and to read change and delete existing ones as shown in Figure 12 5 but you can t set different access levels to the Public folder for specific users the Public folder is an all or nothing or more accurately an everybody or nobody deal
154. dapter the network manager must add one more MAC address to the list This task is probably manage able in a home or small office network but it could be a major undertaking for a larger corporate or campus wide system if it s practical at all MAC authentication does not provide unbreakable protection against unauthorized users because a determined cracker could monitor radio signals from approved users intercept their adapters MAC addresses and load an approved address onto a different adapter But combined with encryption and other security tools authentication adds one more impediment in the path of a network cracker Every access point configuration utility uses a different format for its access lists The manual and online documentation supplied with your access point should provide detailed instructions for creating and maintaining an access control list The Wi Fi standards do not specify a maximum size for an access point s access control list so the numbers are all over the map Some access points limit the list to a few dozen entries but others such as the Proxim Harmony AP Controller will support as many as 10 000 separate addresses Still others accept an effectively unlimited number If you plan to use a list of addresses to control access to your network make sure your access point will work with alarge enough list to support all of your users with enough expansion space for future growth As a rule of thumb the access
155. de or a description of the location or the type of device at that node On some networks the name is a number or a combination of letters numbers and other characters that have no obvious meaning outside of the network a telephone number is a good example of this type of name In order to allow the network to accurately find each node it s essential that every name be unique Sneakernet The simplest kind of computer network is no network at all If you have been working with multiple computers without a network you know the routine Every time you need something from a different computer you have to store a file on a floppy disk a portable drive or a flash drive physically carry it from one computer to another and load the file onto the second computer Sometimes you ll take the file from the computer you were originally using to the one that is connected to the right printer If you ve been writing a paper on a laptop computer you might want to add an image that s stored on the desktop system s hard drive Or maybe you want to give a copy to a How a Network Will Improve Your life 3 colleague for review or approval Whatever the reason you have to carry a copy of one or more computer files from one machine to another This usually involves some walking so the process is often known as sneakernet The name reflects the informal dress common in most computer centers but if you and your family dress for dinner every evening
156. details about your network connection add all to the command as shown in Listing 4 2 C v IPConfig all Windows IP Configuration Host Name Primary Dns Suffix Node Type 2 2 252 IP Routing Enabled WINS Proxy Enabled DNS Suffix Search List Ethernet adapter Local Area Connection Connection specific DNS Suffix Description Connection Physical Address Dhcp Enabled Autoconfiguration Enabled IP Address 4 e Subnet Mask Default Gateway DHCP Server ee ee DNS Servers 2 2 2 ee ee Lease Obtained Lease Expires No No 1 domain actdsltmp 1 Intel R PRO 100 VE Network 1 00 0C F1 AA BF BF 1 192 168 1 100 1 255 255 255 0 1 192 168 1 1 1 192 168 1 1 1 198 137 231 1 206 63 63 1 Wednesday April 08 2009 3 11 22 PM Friday April 10 2009 3 11 22 PM Listing 4 2 The IPConfig all command displays additional information about your connection 42 Chapter 4 Obviously this command produces a lot more information The Host Name is the name that this computer uses on the LAN The Description identifies the type of network interface adapter that connects this computer to the network The Physical Address is the MAC address the unique hardware identifier of the network adapter The DHCP Server is the add
157. devote enough time and effort to monitoring Wi Fi signals can probably find a way to intercept and read the data they carry If you send confidential information through a wireless link an eavesdropper can copy it unless the website or other host is using an end to end encryption scheme such as SSL Credit card numbers account passwords and other personal information are all vulnerable Encryption and other security methods can make data a little more difficult to steal but they don t provide complete protection against a really dedicated snoop An entire catalog of tools for cracking Wi Fi encryption is easy to find on the Internet As any police officer will tell you locks are great for keeping out honest people but serious thieves know how to get past them Wi Fi Networks 89 90 Chapter 8 There are two different kinds of security threats to a wireless network The first is the danger of an outsider connecting to your network without your knowledge or permission the second is the possibility that a dedicated eavesdropper can steal or modify data as you send and receive it Each represents a different potential problem and each requires a different approach to prevention and protection Although none of the encryption tools currently available can provide complete protection they can make life more difficult for most casual intruders And as long as the tools are out there you might as well use them A few techniques can discourage
158. dhall Security enabled wireless network WPA ep ACTIONTEC Security enabled wireless network Figure 8 6 The Wireless Network Connection program supplied with Windows detects nearby Wi Fi signals and sets up a new network connection Wi Fi Networks 87 Chapter 8 t Intel R PROSet Wireless File Tools Advanced Profiles Help Wireless networks found Select one and click Connect Wireless Networks 7 la la la la ACTIONTEC his network has security enabled Berg Home This network hes security enabled MASTERMIND This network has security enabled mcbright This network has security enabled SST PR 1 This network has security enabled a To manage profiles of previously connected wireless networks click the Profiles button soson Help Close Figure 8 7 Intel s wireless program provides the same infor mation as the Microsoft program but in a different format Both of these programs and similar programs supplied with other operating systems network adapters and computers can automatically remember the login and password information and other details of each Wi Fi network you use For example Figure 8 8 shows the Properties settings for a hotel s Wi Fi network The next time you try to connect to the same network the control program won t have to ask for a password again because this network profile is set to Automatic 4 Wireless Net
159. dial up telephone connection n extended network is a traditional VPN that happens to originate from a wireless network client The same VPN can also support connections that don t include a wireless segment and logins from public wireless services such as the ones at airports or coffee shops This setup is conventional for a VPN Local short range VPNs are interesting to people who operate wireless networks because they add another layer of security to wireless links Because the data moving between wireless clients and the network access point is encrypted using an algorithm that is more secure than WPA encryption it is unintelligible to any third party who might be monitoring the radio signal Because the VPN server won t accept data links at the access point from wireless clients that are not using the correct VPN drivers and passwords an intruder can t break into the network by associating a rogue client with the access point The goal of a wireless VPN is to protect the wireless link between the clients and the access point and to lock out unauthorized users Therefore the isolated and encrypted data can only move across a single room rather than over hundreds or thousands of miles Of course the access point might also relay VPN encoded data onward through the Internet to a network host in another location Figure 13 4 shows a wireless connection to a VPN The VPN server is located between the wireless access point and the host LAN
160. e Go menu 2 When the Connect to Server dialog appears either browse to find the share you want or type the address using this format smb lt ServerName gt lt ShareName gt 3 Click the Connect button to make the connection Connecting from Older Mac Versions Apple did not include SMB file sharing in Mac OS until OS X 10 2 You can use one of the Apple sharing services to share Mac files using older software with another computer through a network but the process is somewhat different To share files from OS X 10 1 or 10 2 with another computer on the same network select Go gt Connect to Server A list of other computers will appear Select the name of the computer that contains the files you want to use and click the Connect button To connect to another computer from OS 8 or 9 follow these steps From the Apple menu select the Chooser Click the AppleShare icon 3 Ifa list of AppleTalk Zones appears choose the zone that includes the computer you want to reach 4 Select the name of the computer that contains the file or other resource you want to open from the list and click the OK button File Sharing in Linux and Unix NOTE The latest Linux and Unix distributions all include support for Windows file sharing SMB protocols so sharing files with computers using other operating systems or other Linux Unix distributions should be easy The terminology is not always the same but if you understand the underly
161. e Therefore repeating your steps can often help identify and solve it Troubleshooting 243 244 Chapter 17 Keep Notes As you try to identify and solve a problem keep a record of what you have done Describe each problem you encounter and what you did to fix itin a simple log or notebook Note configuration settings websites that provide useful information and the exact location of any options or control programs that caused the problem or helped solve it Keep this on paper rather than in a text file stored on the computer so you will be able to access it if the computer breaks down again If the same problem appears again your log will tell you exactly what you did to fix it the first time rather than stepping through all the same unproductive troubleshooting techniques again you can go directly to the correct solution One excellent approach is to keep a network notebook in a loose leaf binder Among other things your notebook should include the following e The configuration settings and passwords for each modem router Wi Fi access point and other device connected to the network e The numeric IP addresses for your Internet connection DNS servers default gateway and subnet mask e The numeric addresses used by your LAN e The make model serial number and MAC address if you can find them of each hub switch router modem Wi Fi access point network adapter and other network device e Alist of channel numbers
162. e TV system The device that converts digital data to and from the LAN to signals that can move through the phone line or cable is a modem modulator demodulator In most cases the modem is combined with a gate way router but some cable TV companies and telephone companies provide stand alone modems that can connect either directly to a single computer or through a router or switch to a LAN For the purposes of this chapter you can think of a modem as a type of router The differences between a modem and a router are that a modem includes the internal hardware that performs modulation and demodulation activities along with the software that provides the connection settings The configuration settings that control the connections between the Internet and your local network are generally the same in both modems and routers NOTE A dial up modem that uses the voice telephone network to connect your computer to the Internet operates in a similar manner to a high speed modem but it uses a much slower connection The Gateway Router As Chapter 3 explained the router that connects the Internet to your local network has a point of presence in two different networks your Internet service provider s wide area network WAN and your own local area network LAN The WAN is part of the much larger Internet cloud Therefore the router has two different addresses one address on the WAN and a different address on the LAN The router s job is to e
163. e Windows Macintosh or Linux Unix operating system as well as on the network itself Define the Problem The first step in solving a problem should be to identify the symptoms Remember that computers and networks don t break down completely at random Every piece of information you can find about a problem can help you isolate and solve it Is the problem a failure to connect to a particular computer through the network or an error message or a file transfer that takes longer than usual Is it limited to a single computer or does it appear all over the network Have any of the lights on your network router switch or modem changed color or gone dark Does the problem occur when you are using a particular program or only when a certain desk lamp or vacuum cleaner or any other electrical device is turned on As you identify symptoms make a list either on paper or in your mind If you see an error message copy the exact text onto a piece of paper You might have to restart the computer or go to another computer to search for information and you will need the specific wording of the message Don t ignore the cryptic code numbers or other apparently unintelligible information Even if the message means nothing to you it could be the key to finding the help you need Sometimes you can identify a pattern in the symptoms When more than one user reports the same problem ask yourself what those users have in common Are they all trying to
164. e addresses of the DNS and WINS name servers used by this network Configure the remote access server as a router The server must use either static routes or routing protocols that make each VPN client reachable from the wired network Enable and configure the server for L2TP clients Windows uses Remote Access Service RAS and point to point protocol PPP to establish VPN connections The Routing and Remote Access service enables RAS A VPN connection requires the following RAS con figuration options Authentication method Encrypted PPTP connections use the MS CHAP or EAP TLS authentication methods Authentication provider Either Windows 2000 security or an external RADIUS server can verify network clients IP routing IP routing and IP based remote access must be active If the wired network acts as a DHCP server for the wireless clients DHCP must be active Network Security 163 164 Chapter 13 Configure L2TP ports Set each L2TP port to accept remote access Configure network filters Input and output filters keep the remote access server from sending and receiving data that does not originate at a VPN client These filters will reject data to or from unauthorized users so those intruders will not be able to obtain an Internet connection or a connection to the wired LAN through the wireless network Configure remote access policies Set the remote access permission for each VPN client to allow access to the RAS serve
165. e best path is through the other one so it tries again How Computer Networks Are Organized 45 46 Chapter 4 e Ifthe report shows a long delay that always begins at the same router it could indicate a problem with that router or very high demand for ser vice through that part of the Internet Unless you re a network manager you probably won t have to analyze TraceRoute reports very often But if you re having a connection problem they can sometimes help you to understand why you re not getting through to a website or instant message recipient DESIGNING YOUR NETWORK It s quite possible to construct a computer network on the fly stringing Ethernet cables from a central hub or switch to indi vidual computers and other devices as you need them But it s almost always better to spend some time planning your network before you start to install it It s a lot easier to make changes to your design on paper rather than making adds moves and changes in physical space This chapter offers advice and instructions for preparing a network plan I m assuming in this chapter that you have chosen not to use either power line or video cable as your primary network distribution medium Both of those methods can be practical in some situations but a traditional Ethernet system possibly with a supplementary Wi Fi base station is usually a better choice for a small business or household network because the equipm
166. e computer if you connect 10 computers the network is 100 times more powerful and so forth It s not an exaggeration to say that connecting your computers to a network will change your life Within just a few days or weeks you will begin to think about everything connected to the network other computers printers game consoles the Internet and anything else as an extension of your own keyboard and monitor And shortly after that you will discover new opportunities and services that a network makes possible In this chapter you will learn about the general nature of computer networks and the things you can do with them You can find more details about using a network later in this book What s a Network Chapter 1 Before we begin to consider the things you can do with a computer network it might be helpful to understand a few basic concepts First the idea of networks is not limited to computers A network can be any kind of structure that connects individual objects The highway system is a network and so is the worldwide telephone system You can use either of these networks to interact or communicate with other people connected to the same system Broadcasting networks such as CBS and the BBC use wires microwave radio links and other methods to distribute programs from one or more studios to a large number of local stations Every network has the following elements in common e Two or more objects or nodes that use
167. e direction When a data link sends and receives signals at the same time it must use separate wires to send data from the DTE to the DCE and from the DCE to the DTE Therefore a network device uses separate inputs and outputs on the same multipin connector The specific pin assignment is different in different connection types but the inputs and outputs are always different pins or sockets The problem arises because every output must connect to an input As Figure 2 5 shows if you connect an output to another output the two signals will collide if you connect an input to an input there s never any signal output collision output input I lt gt input E no signal Figure 2 5 Connect an output to an output or an input to an input and nothing useful happens Therefore when you connect two pieces of equipment the outputs at each end must go to inputs at the other end If Pin 2 on one device is an output Pin 2 on the other device must be an input Most standard data cables connect each connector pin to the same numbered pin at the other end so connecting two devices through a cable is exactly the same as plugging one device directly into another That s why there are two categories of data devices Data terminal equipment includes remote terminals computers some printers and other network endpoints Data communications equipment includes modems hubs switches and other control devices When y
168. e key looks the same to the computer either way but copying the string when it s broken apart is easier A passphrase is a string of text that the adapters and access points automatically convert to a string of hex characters Because humans can generally remember actual words or phrases more easily than hex gibberish a passphrase can be easier to distribute than a hex string However a pass phrase is only useful when all the adapters and access points in a network come from the same manufacturer D Link DI 713 Web Configuration Microsoft Internet Explorer zE File Edit View Favorites Tools Help O O AAG o Address http 192 168 0 1 z D Link Wireless Gateway ana 7 Wireless Setting Network ID SSID Local crane Security c Enable insecure access Enable IEEE 40 bit Shared Key security a2341789ff Save Undo Help Virtual Server Special AP Access Control Misc Items Wireless Basic _ Log out E Py pm A Figure 13 18 The configuration utility for a D Link access point accepts WEP keys in hex format What Are the Options Like just about everything else in a Wi Fi configuration utility the names of the encryption options are not consistent from one program to the next Some programs use a straightforward set of options such as enable WEP or WPA encryption but others use technical language taken from the formal 802 11 specification Some access points also offer a shared key
169. e network switch router or other control device Check the Settings and Options Look for other switches and settings that might interfere with a device s operation For example make sure that the network printer is online and that no Error LED indicators or messages are visible in the control panel Or if you re having trouble with a Wi Fi connection make sure your computer hasn t associated itself with the wrong base station and connected to one of your neighbors networks instead of your own Isolate the Problem If your search for simple solutions to a network problem or failure doesn t produce an answer the next step is to identify the physical location where the problem is occurring Although it s easy and often appropriate to think about a network as an amorphous cloud that exists everywhere at the same time when you re looking for a specific point of failure you must replace that cloud with a detailed map that shows every component and connection If you don t already have a network diagram in your files consider drawing one now Most problems offer some kind of hint about their location If just one computer s connection to the network has failed but all the others work properly the problem is probably in that computer or its network link But if nobody on the network can connect to any other computer or to the Internet the problem is probably in a server router or other central device Start searchin
170. e network through a single outlet as shown in Figure 5 5 Connecting through a switch can be particularly handy when you want to use two or more devices such as a computer and a game console or a printer server or two or more computers in the same room Desktop computer Printer server Switch Router Desktop computer Switch Laptop computer Figure 5 5 An Ethernet switch can extend a network to connect two or more devices to the network hub through a single cable A secondary switch can also be useful when you want to place network connection points in adjacent rooms that are difficult to reach from the control center For example if you have two second floor bedrooms that share a wall you could run a single cable to a switch and connect the switch to computers in both rooms Many Wi Fi access points are combined with switches that allow you to connect one or more devices to the network through wired Ethernet outlets If you locate your access point in a room where you also use a desktop com puter or other network device a combination unit is often an excellent choice Place the access point next to the computer and use an Ethernet cable to connect it to the switch Designing Your Network 53 54 What About Wi Fi Chapter 5 Connecting computers and other network devices through a Wi Fi network is often an easy alternative to a wired Ethernet system A single access point is often enough for sending and rec
171. e store or home center Follow the instructions on the package for gluing PVC pipes to fittings but don t worry about creating watertight seals Your network data won t leak through a bad pipe joint The Control Center Chapter 6 A network control center always performs these tasks e Itconnects the local network to the Internet through a modem and a telephone line cable TV service or some other medium e It uses a router to translate addresses between the LAN and the Internet e It uses a hub or a switch to exchange data within the network e Itacts as the central distribution point for data cables In addition it might also include these services e Abase station for Wi Fi e A distribution center for audio video and telephone connections If you re working from the floor plan you created after reading Chapter 5 you have already chosen a location for your control center If not find a place that is easy to reach but away from day to day traffic the inside wall of a walk in closet a utility room or a basement wall are all common choices A garage that s built into the house might be another good spot The control center should be close to at least one dual AC power outlet A network control center can take several forms A modular structured wiring center Several manufacturers offer structured wiring cabinets and most of the switches routers and other control devices necessary to assemble a network control cent
172. e the same for any backup program To use the Windows Backup program follow these steps 1 From the Windows Start menu select All Programs or Programs if you re using the Classic Start Menu Accessories System Tools gt Backup The Backup or Restore Wizard window shown in Figure 9 7 will open Backup or Restore Wizard x Welcome to the Backup or Restore Wizard This wizard helps you back up or restore the files and settings on your computer If you prefer you can switch to Advanced Mode to change the settings used for backup or restore This option is recommended for advanced users only Always start in wizard mode To continue click Next cma Figure 9 7 Use the Windows Backup or Restore Wizard to create backup copies of your files 2 Click Next to advance to the next screen The wizard will ask if you want to make new backups or restore files that you saved earlier Select the Back up file and settings option and click Next 3 The wizard will ask what you want to back up To save all the information on the computer select the All information option this option will allow you to create a new copy of the original hard disk but this copy takes up a lot of storage space To create a more selective backup select the Let me choose option 4 Click Next to advance to the next screen The wizard will ask where you want to store the backup File Servers 101 102 Chapter 9 5 Click the Browse b
173. e to reach all parts of a house or small office but if it doesn t because of obstructions or interference the best solution is to add a second or third access point at a location where its signal will fill in the dead spots Each access point should be connected to the wired portion of the network through an Ethernet hub or switch or if that s not practical through a wireless bridge that retransmits Wi Fi signals on a different channel In a Wi Fi network with more than one access point they should all use the same network name but each one should use a different non overlapping operating channel Photo courtesy of D Link Figure 8 2 This Wi Fi access point doubles as a network router Network Interface Adapters NOTE Wi Fi network interface adapters are small radio transceivers that convert from computer data to radio signals that they exchange with a Wi Fi access point and back again A Wi Fi adapter can be an expansion card inside a laptop or desktop computer a plug in PC card or a separate USB device A Wi Fi adapter can also exchange data by radio directly to and from another computer in an ad hoc network as described in Chapter 2 Most new Wi Fi adapters are compatible with all four standards 802 1 1a b g and n so they can exchange data with any Wi Fi access point Older adapters might use only one two or three standards so they ll only connect to compatible base stations When a network adapter detects a r
174. e while you watch the LED indicator that corresponds to that socket If the LED lights and goes dark as you shake the cable try a different cable If you can t connect through a newly installed wall outlet make sure the wires inside the outlet are connected to the correct terminals at both ends of the cable inside the wall at the outlet and at the data center To quickly confirm that data is passing through the network to and from each computer use the tools supplied with the computer s operating system to display network activity In Windows use the Networking tab in the Task Manager in Linux use the ethtool command ethtool interfacename grep Link If the computer reports that no link is available a cable is disconnected or the network adapter or hub has a problem Check the AC Power Every device connected to the network probably has an LED indicator that lights when the device is connected to AC power When a connection fails look at the front of each device to confirm the power light is on If it s not check the device s power switch if it has one and both the plug at the back of the device and the plug or power supply that plugs into the AC outlet If you use a power strip or an uninterruptible power supply make sure that the master power switch is turned on and the power unit is plugged into an AC outlet If the network fails but your computer still works a fuse or circuit breaker might have blown in the room containing th
175. ect two or more computers to the Internet at the same time you ll need a network For many families a high speed Internet connection provides the reason to start thinking about installing a home network When you spend that extra money for a DSL or cable Internet link or fiber optic link you want easy access to the Internet from every computer in the house When you connect your network to the modem through a gateway router shown in Figure 1 2 you can reach the Internet through any computer on that network Some modems require a separate router to distribute the Internet connection to multiple computers while others have built in routers Desktop computer Desktop computer Gateway DSL or cable router modem Laptop computer Tower PC Figure 1 2 A gateway router provides a connection between a local area network and the Internet Connecting your network to the Internet is not difficult but it s easier with detailed instructions You can find those instructions in Chapter 10 Instant Messages Instant message programs display text on a distant computer s screen almost as fast as you can type them They re useful for exchanging notes asking questions and nonspecific chatter within a business or between friends and family members When a new message arrives the messaging program pops up in a new window on the recipient s screen If you attach a microphone and speaker to each computer you can u
176. ection settings If the settings that appear in the Network window are not the ones you want to use click the padlock icon in the lower left corner of the window to change them The icon will change to an open padlock To change the network configuration settings click the Advanced button near the bottom of the window The Built in Ethernet window shown in Figure 11 12 will appear Built in Ethernet DNS WINS AppleTalk 802 1X Proxies Ethernet p Configure IPv4 Using DHCP d IPv4 Address 192 168 1 103 Renew DHCP Lease Subnet Mask 255 255 255 0 DHCP Client ID If required Router 192 168 1 1 Configure IPV6 Automatically sd Router IPv6 Address Prefix Length e Cm CO Figure 11 12 The Builtin Ethernet window controls the network configuration settings Connecting Your Computer to a Network 125 126 Chapter 11 10 11 12 The bar along the top of the window contains seven network options Click TCP IP to enter or change your Internet connection settings The Configure IPv4 field is a drop down menu Click the arrows at the right of the field to open the menu shown in Figure 11 13 NOM Network maw g Built in Ethernet f TCP IP DNS WINS AppleTalk 802 1X Proxies Ethernet Configure IPv Using DHCP with manual address IPv4 Address Using BootP Renew DHCP Lease Subnet Mask Manually ID If required Router or J a Configure I
177. eed a separate printer server device or a printer with a built in network server e You can locate a printer anywhere not just where you have a free net work port or outlet e Ona network where different users have different types of printers such as laser and inkjet color and black and white or special formats for photos or large documents using a computer as a printer server allows everyone to take advantage of each printer s features e You don t need an additional port on the network hub or router On the other hand this approach also has a few possible drawbacks e The computer acting as a printer server must be turned on whenever anybody wants to print this could be a security issue e When the printer begins to print without warning it could distract the person using the computer connected to the printer e As other users come into the office or workspace where the printer is located to collect their print jobs this can be yet another distraction for the operator of the computer acting as a printer server If your network also uses a dedicated file server you can eliminate the security and distraction issues by using the same computer as your network s printer server Or if you have an older computer collecting dust in a closet you can use it as a stand alone printer server although you might have to add a network interface and maybe a USB port on plug in expansion cards However the most common way to use a comput
178. eiving data to and from computers in many rooms A Wi Fi network can provide Internet access and LAN services but it has several disadvantages when compared with a wired network e Wi Fi networks are usually slower than wired Ethernet unless all the nodes in the network are compatible with the latest 802 11n standards e Wi Fi networks are less secure than wired networks Unless you protect your network with a secure encryption method such as WPA a dedicated intruder can connect to the Internet through your network without your permission and can also steal information from the other computers on the same network e Interference between your Wi Fi network and your neighbors networks and other wireless devices can reduce your network s data transfer speed In spite of those limitations a Wi Fi network is often an acceptable choice if you don t want to cut holes through your walls or spend time crawling through your attic or basement And even if you install a wired network through part of your building Wi Fi could be the best way to reach one or two isolated locations such as a top floor bedroom or a detached garage For many families and small businesses the best approach is to install both wired and wireless in the same network This will allow you and your users to connect your desktop computers printer music server and other devices that never physically move through wired Ethernet and use Wi Fi for laptop computers Voice over
179. eneenenee eene 240 Look for Simple Solutions First sss 241 Isolate the Problem 5 cte rti e ep ded 243 Refrace EO re 243 Keep Notes ciir eee ee Ra rt PE Pret eo ie REG IRR een 244 Viruses and Other N sti s 2 eei be ertet eb tere eH EET Le a nos 245 Other Common Problems 3 tete cete Lee pe ety bee ee egeo teg eee eg eet ee 245 Configuration Setfligs zu este pep CR E ERE RR Pec 246 DHCP Settings DNS and Default Gateway 246 Failed Connection to a Specific Site esccseseeseeceeeeeeteesteenteceteeneenteenaees 246 An Alternate Connection to the Internet 247 The Collective Wisdom of the Internet ssssssss 247 Software for Troubleshooting sss 248 Network Magic nii cc t eec i decet le f teat ce een 248 Protocol Analyzer 1 eiit ote iet He Dose e f e rite 248 ISP Problems e edt e e eet te cp et o d nw bier p eae dn 25 bodie one E 251 INDEX 253 Xil Contents in Detail ACKNOWLEDGMENTS A book like this is always a collaboration even if only one author s name is on the cover The book in your hands is a huge improvement over the original manuscript thanks to the efforts of editors Tyler Ortman and Kathleen Mish and copyeditors Eric Newman and LeeAnn Pickrell Technical editor Michael Kershaw protected me from embarrassing technical errors And compositor Riley Hoffman made this the attractive book you hold in your hands Thanks to all of you Of course any surviv
180. ent is widely available it s often inexpensive and it s easy to install and maintain To begin your network plan start with a floor plan of the house apartment or workspace where you want to install your network The plan doesn t have to be exactly to scale but it should be big enough to add notes within each room or cubicle and it should show the relative positions of each room Figure 5 1 shows a typical floor plan for a small one story house If it s convenient use a copier or scanner to make several copies of the floor plan T En BEDROOM STUDY LIVING ROOM T E 2 l A BATH 1 Oo KITCHEN oo BEDROOM mV r3 C LAUNDRY To T CELLAR Figure 5 1 Use a floor plan to identify locations for network connection points Identifying Current and Future Nodes The next step is to decide where you will want network connections Use different colors to note the locations of each of the following items Electrical outlets Network wiring and outlets should be at least 12 inches away from AC wiring so it will be helpful to identify all of the AC outlets in each room In addition you will want access to AC power for your computer router modem and other network hardware Your home entertainment systems Home theater equipment stereo systems televisions and game consoles can all exchange data through your home network so network outlets should be within close range Te
181. ential programs and files on a drive The backup programs provided with Windows Mac OS X and most versions of Linux and Unix are entirely adequate for most people but there are plenty of other backup programs with additional features and options often related to automatic scheduled backups Backup programs are often supplied with network attached storage NAS devices and external USB hard drives The important thing to remember about using any backup program is that you must store your backed up files separately from the originals You can store the backup on a second hard drive on the same computer not a good idea however because it doesn t protect against fire or theft on a set of CDs DVDs or data tapes or on a computer or other storage device connected to the original computer through a network or NOTE the Internet A network is a great way to move your backup data to another computer for storage but you will still want some kind of backup on removable media stored off site to protect your data from fire or theft The backup methods described in this chapter will work equally well on a network with out a designated file server you can use any other computer or network storage device on the same network as the destination for your backup files The Windows Backup Program Microsoft has supplied a backup program with most versions of Windows including XP and Vista This example uses Windows XP but the general principles ar
182. ephone line or some combination of those and other transmission media Network Security 159 160 Chapter 13 In a traditional VPN a remote user can log in to a distant LAN and obtain all the same network services that are available to local clients VPNs are commonly used to extend corporate networks to branch offices and to connect users to the LAN from home or from off site locations such as a client or customer s office A connection through a VPN server looks to the rest of the network exactly like a client device connected directly to the LAN The only difference is the data from the VPN passes through a VPN driver and a public network instead of moving directly from the network adapter to the LAN Figure 13 3 shows a typical VPN connection to a remote network Public network telephone line or Internet Remote computer with VPN driver Figure 13 3 A remote network can connect to a LAN through a virtual private network All of the same security benefits also apply to short range VPNs that tunnel through a wireless link and longer range VPNs that start on a wireless network and relay the data to a remote server These are two different uses for a VPN a local VPN that only extends across the wireless portion of a network between the client devices and the access point and an extended network that carries VPN encoded data beyond the access points to a VPN server through a public network such as the Internet or a
183. er The panel mounts on a wall or between the studs in an unfinished basement or garage and can include a cover to keep the contents clean and out of sight These panels and components are considerably more expensive than separate parts from different sources but they present a finished appearance that might be important if the control center is in a conspic uous location If you re using one of these systems follow the installation instructions supplied with each component A sheet of plywood attached to the wall A half sheet 4 feet by 4 feet of plywood securely bolted to wall studs is entirely adequate to support your network s mounting blocks control devices and other equipment It might not be as attractive as a structured wiring center but you re not going to see it very often If you do a neat workmanlike job it will work just as well as a fancy sheet metal cabinet full of matched components A freestanding mounting frame or cabinet If you have enough floor space in your utility room you can assemble the control center from equipment and shelves that mount in a 19 inch wide relay rack This approach is usually limited to larger networks that include a lot of loca tions and equipment Several wall mounted outlets and a small number of control devices modem router and or switch on a table or shelf If your network is limited to computers in just two or three rooms it might be easiest to choose one of those rooms as your contro
184. er as a printer server is to connect the printer to an existing computer and direct print commands from all the other computers in the network to print through the server In Windows setting up a printer server is a three step process described in the following sections Printers and Other Devices on Your Network 195 196 Chapter 14 Turning on Printer Sharing on the Network Card Follow these steps to turn on printer sharing on your network interface 4 From the Control Panel select Network Connections The Network Connections window will open Right click Local Area Connection and select Properties from the pop up menu To share through your wireless connection right click Wireless Network Connection Confirm that the File and Printer Sharing for Microsoft Networks option is active as shown in Figure 14 3 If you don t see a checkmark next to this option check the box to turn it on Local Area Connection 1 x General Advanced Connect using dB VIA Networking Velocity Family Giga Configure This connection uses the following items Client for Microsoft Networks a A Saos Packet Scheduler w I Pure Networks Device Discovery Driver Install Uninstall Propertie Description Allows other computers to access resources on your computer using a Microsoft network Show icon in notification area when connected V Notify me when this connection has limited or no connectivity Figure 14 3
185. er large object if you can t store it in a locked drawer or cabinet e Don t place your computer near a window where passers by can see exactly what you have e When you re away from home or work keep track of your laptop com puter at all times e Log off your office computer whenever you are about to leave your desk Don t allow other people to wander in and use your account when you re not there e Keep the login and password active on your laptop and use encryption for files that contain confidential data If somebody does steal the com puter you want it to be as difficult as possible for the thief to open and read your files e Install an antitheft alarm device on a PC card in your laptop or an inter nal card in a desktop system If somebody tries to move the computer disconnect cables or open the case without entering a security code first the alarm device will sound a very loud alarm e Use a tracking program such as LostPC hitp www lostpc com on your laptop computer The tracking software will automatically send a here I am signal to a security center every time it connects to the Internet from a new location Police and Internet service providers can some times use this information to locate and recover a stolen computer e Consider using full disk encryption tools such as TrueCrypt for Windows or dm crypt for Linux so the data on it is useless if your laptop is stolen Windows Update and Patches Mic
186. ers ssssssssssssseee eene 27 Chapter 4 How Computer Networks Are Organized sss 35 Chapter 5 Designing Your Network eem ee eene 47 Chapter 6 Installing the Network Control Center and Ethernet Cables ssssse 55 Chapter 7 Ethernet Network Interfaces sss 69 Chapter 8 Wi Fi Networks esses eem e em ee rere ener 77 Chapter 9 File Servers tee ertt eR HU e d RUE eoe deret Mee Ceo Od 93 Chapter 10 Connecting Your Network to the Internet sss 107 Chapter 11 Connecting Your Computer to a Network sss 117 Chapter 12 Sharing Files Through Your Network sss 131 Chapter 13 Network Security 2 5 cepto citur ep ce gei ee pel a ere EEE 151 Chapter 14 Printers and Other Devices on Your Network ses 191 www allitebooks com Chapter 15 Other Things You Can Connect to Your Network Audio Video Home Entertainment and Beyond sss emen 203 Chapter 16 Other Network Applications ssess ee 225 Chapter 17 Troubleshooting 1 reete e tete e e eene ke uia 239 D P vives 253 vi Brief Contents www allitebooks com CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network ccccccccsesecececcecceeseececcccusaavsccecceeesaaeasecccseussastececeeatnteeeeceeeanens 2 Smedkenmet E T
187. ers are computers on a network that hold text data and other files that all the other computers on the same network can use A file server can also be used as a work station a computer dedicated to file storage or a single purpose network attached storage NAS device This chapter describes the advantages of connecting one or more file servers to your network and explains how to set them up and use them File servers are much more common in business networks than at home but they can also be useful as part of a home network Whether at work or at home a server can provide these services e Itcan protect files on other computers connected to the network by automatically making and storing backup copies of those files e tcan store related files in a central location 94 e Itcan help control revisions and updates to documents and other files by assuring that everybody is using the same version e Itcan hold public files used by more than one person separate from each user s personal files e It can allow coworkers or family members to create and store new files or use existing ones without needing to turn on somebody else s computer e Itcan host web pages and other services for an intranet an Internet like site that can only be viewed within the local network e Itcan manage email distribution across the network e Itcan provide remote access to files through the Internet A server on a home network can al
188. es These files are not accessible through the network All Level 3 files and folders are located in the lt drive letter gt Documents and Settings All Users Shared Documents folder To assign a file or folder to Level 3 simply copy or drag it to the Shared Documents folder If you expect to create many Level 3 files and folders consider creating a shortcut to Shared Documents on the Windows Desktop Dragging an icon to a shortcut has the same effect as dragging a file or folder directly to the original folder Level 4 Level 4 drives files and folders are accessible through the network as read only documents Anybody with a network connection can open and read a Level 4 file but only the file owner and the administrator of the local com puter can change or delete the file To assign a drive folder or file to Level 4 follow these steps 1 From My Computer right click the icon of the drive or folder you want to assign to Level 4 A pop up menu will appear 2 Select Sharing and Security from the pop up menu A Properties window like the one in Figure 12 3 will appear with the Sharing tab visible System Drive C Properti 2 x General Tools Hardware Sharing Quota Local sharing and security is To share this folder with other users of this computer only drag it to the Shared Documents folder To make this folder and its subfolders private so that only you have access select the following check box va r Network shari
189. etter choice Switches A data switch performs the same function as a hub it connects the nodes of a network to one another but it does the job quite differently Rather than sending every packet to every port a switch reads the address section of each incoming packet and sets up a direct connection from the source of each packet to its destination In the meantime if some other node tries to send a data packet to another unused port the switch can set up the link without breaking the other connection As Figure 3 3 shows a switch can handle more than one connection at the same time Because a network node connected to a switch doesn t have to monitor the entire network for possible collisions it can send and receive data at the same time this is called full duplex mode Both of these features multiple segments and full duplex operation mean that data can move through a switch more quickly than through a hub a 0 6 i Desktop 1 Desktop i Laptop computer 1 computer 1 computer I l i I 1 3 Ethernet i switch i l TS Printer Figure 3 3 An Ethernet switch can support two or more simultaneous connections Data switches and hubs come in several sizes and shapes The smallest switches often have four five or eight ports inside a box that can sit on a table or shelf like the one shown in Figure 3 4 When your network expands 30 Chapter 3 www allitebooks com to need more ports than your original switc
190. etween them such as cost speed and coverage areas For readers setting up home networks the book contains useful advice about choosing and setting up hardware and software securing networks using WEP and WPA and setting up a wireless connection for VoIP JANUARY 2008 352 PP 29 95 ISBN 978 1 59327 169 5 THE MANCA GUIDE TO ELECTRICITY ELECTRICITY by KAZUHIRO FUJITAKI MATSUDA and TREND PRO CO LTD The Manga Guide to Electricity teaches readers the fundamentals of how elec tricity works through authentic Japanese manga Readers follow Rereko a denizen of Electopia the Land of Electricity as she is exiled to Tokyo to learn more about electricity In no time graduate student Hikaru is teaching her the essentials such as static electricity and Coloumb s law the relation ship between voltage resistance and current and the difference between series and parallel electrical circuits Using real world examples like flash lights and home appliances The Manga Guide to Electricity combines a whimsical story with real educational content so that readers will quickly master the core concepts of electricity with a minimum of frustration MARCH 2009 232 PP 19 95 ISBN 978 1 59327 197 8 PHONE EMAIL 800 420 7240 OR SALES NOSTARCH COM 415 863 9900 MONDAY THROUGH FRIDAY WEB 9 A M TO 5 P M PST WWW NOSTARCH COM COLOPHON The fonts used in Network Know How are New Baskerville Futura and Dogma The book was
191. etwork Attached Storage A network attached storage NAS device is a dedicated computer without a keyboard or display screen used as a network file server In the small business or home networks that many readers of this book are likely to have one or more NAS disk drives can be an entirely adequate alternative to a more expensive and complicated network server For all practical purposes a NAS drive is just a disk drive that connects to the network through an Ethernet port Several disk drive and network equip ment manufacturers offer purpose built NAS devices including complete hard drive assemblies and network storage enclosures for IDE or SATA hard drives Some NAS devices have both Ethernet and USB ports so you can use them with either a direct connection to your network or an external drive connected to a computer with or without a network link Figure 9 3 shows a network with a stand alone disk drive operating as a NAS device File Servers 97 98 Chapter 9 Stand alone disk drive Network attached Desktop computer Desktop computer Ethernet switch File server storage server Gateway router Figure 9 3 A network attached storage device connects directly to a network ANAS server could also be a regular computer with or without a key board and screen If you already have a spare computer to use as a server the FreeNAS version of FreeBSD shown in Figure 9 4 could provide all
192. f Steal This Computer Book contains new chapters that discuss the hacker mentality lock picking exploiting P2P file sharing networks and how people manipulate search engines and pop up ads Includes a CD with hundreds of megabytes of hack ing and security related programs that tie in to each chapter of the book MAY 2006 384 PP W CD 29 95 ISBN 978 1 59327 105 3 UBUNTU FOR NON GEEKS 3RD EDITION A Pain Free Project Based Get Things Done Guidebook by RICKFORD GRANT This newbie s guide to Ubuntu lets readers learn by doing Using immersion learning techniques favored by language courses step by step projects build upon earlier tutorial concepts stimulating the brain and increasing the reader s understanding This book covers all of the topics likely to be of interest to an average desktop user such as installing new software via Synaptic Internet connectivity working with removable storage devices printers and scanners and handling DVDs audio files and even iPods It also eases readers into the world of commands thus allowing them to work with Java Python or other script based applications convert RPMs to DEB files and compile software from source JUNE 2008 360 PP W cD 34 95 ISBN 978 1 59327 180 0 HACKING 2ND EDITION The Art of Exploitation by JON ERICKSON While many security books merely show how to run existing exploits Hacking The Art of Exploitation was the first book to explain how exploits act
193. f you have a total of seven nodes in your network you might use these control devices e ADSL or cable modem e A gateway router combined with a four port switch e A four port Ethernet switch Figure 6 6 shows how these devices connect to one another Desktop computer Desktop computer Server Desktop computer Desktop Laptop computer computer Figure 6 6 A network with seven nodes might use this setup in the control center You can find switches and routers at many office supply and electronics stores and through online retailers It seems as if one brand or another is almost always on sale so it s worth looking at the advertisements in the Sunday newspaper for this week s hot deals If possible your router or switch should have at least one spare port that you can use with a laptop computer When you re trying to troubleshoot the network it s often convenient to send commands from the computer while you watch the responses to those commands on the control devices status lights When you add more nodes to the network in the future you can expand the network by connecting an additional switch to the control center If there are no spare ports on the existing switch disconnect one cable from the active switch connect the new switch to that port and plug the original cable into the new switch Some switches and routers have keyhole slots on the bottom of their cases that allow you to mount them di
194. from scratch Once or twice every month is not too often to change keys in a home network An office LAN should change keys at least once a week Don t store your encryption keys in plain text on the network where they are used This seems self evident but in a widespread network it might be tempting to distribute the keys on a private web page or in a text file Don t do it Don t use email to distribute encryption keys Even if you re not sending emails in plain text an intruder who has stolen account names and passwords will receive the messages with your new codes before your legitimate users get them If it s practical to do so on your network turn on the access control fea ture in your access point Access control restricts network connections to network clients with specified MAC addresses The access point will refuse to associate with any network device whose address is not on the list This might not be practical if you want to allow visitors to use your network but it s a useful tool in a home or small business network where you know all of your potential users MAC address filtering will not pre vent a determined attacker from copying and spoofing the address of an authenticated user but it could provide an additional layer of protection Turn on the security features but treat the network as if it s completely open to public access Make sure everybody using the network under stands that they re using a no
195. furniture and other objects between the two antennas can all reduce the signal strength 802 11b networks were the first to appear and they were the most common type until the faster 802 11g version became available 802 11a uses different radio frequencies but many network adapters are compatible with both 2 4 GHz and 5 2 GHz access points Today the new 802 11n standard is beginning to replace all three older versions The three systems that use channels in the 2 4 GHz frequency band are backward compatible In other words if your Wi Fi network interface adapter uses 802 11b only it will continue to work with an 802 11g or 802 11n base station both 802 11b and 802 11g adapters will work with an 802 11n base station The missing letters 802 11c d e and so forth describe other wireless data charac teristics and enhancements that apply to wireless data networks They re important to hardware designers and manufacturers but as a network manager or user you don t have to worry about them You might also see some Wi Fi access points and network adapters identified as extreme or enhanced or with some other word which suggests that they work at faster speeds than a standard network Most often these systems use a proprietary method that involves two or more parallel channels to increase their data handling capacity Enhanced systems usually work as advertised but only when the adapter and access point were both made by the same comp
196. g it s inevitable that something you need on this computer is stored on or connected to that computer The solution to this problem is easy Simply connect the computers and allow them to share Congratulations You have just created a computer network Two or more computers connected through wires radio signals flashing lights or any combination of those and other methods form a network that you can use to send and receive instructions and files from one computer to another Whether you re using your computers at home at school in a small business or even at a temporary gathering such as a business conference or a camping trip if you re the sort of person who takes computers along on a camping trip connecting them through a network makes every one of them more useful and more powerful And when you connect your network to the Internet every device on your local network also becomes connected to the Internet When you connect two or more computers in a network each computer becomes more useful There s a rule that describes this called Metcalfe s Law Robert Metcalfe was the original designer of the Ethernet structure used in most modern computer networks his law states that the value or power of a network increases in proportion to the square of the number of devices connected to that network The math is pretty subjective but Metcalfe s Law says that two computers connected together are about 4 times as useful as a singl
197. g for considerably less money if we re willing to use a computer instead Audio File Formats Digital music players convert sound and music files in common formats to analog sounds that you can play through headphones or speakers Some of these formats use compressed audio that squeezes the data into smaller files Others use larger uncompressed files that maintain all the original details The most common format for compressed audio files is MP3 The most widely used formats for uncompressed files include WAV and AIFF Table 15 1 lists the formats that you re most likely to see The choice of format is a trade off between the size of the file and the quality of the sound As a rule of thumb sound quality increases with file size as measured in bits per second A WAV file of a music track might require eight to ten times as much storage space as an MP3 file of the same recording but the WAV file is almost always a more accurate copy of the original The compressed MP3 file occupies less space on a hard drive and can travel across the network more quickly but the added bits in the WAV file will mean that the music has less distortion and better frequency response the range between the lowest bass notes and the highest treble tones In other words an MP3 file might sound like the recording played through an AM radio whereas the same music played from a WAV file could sound at least as good as a very good CD player Other Things You Can Co
198. g for the source of a problem in the most logical device If you have a hardware problem it s often effective to isolate the problem by replacing individual components and cables one at a time until the problem goes away If the problem disappears when you install a replacement that s a good indication that the original part was the source of the problem If the replacement is a relatively expensive item like a router or a printer you might want to send it back to the manufacturer for replacement or repair especially if it s under warranty But if you replace a cheap part like a cable or a network interface card it s often easier to just throw it away and buy a new one Similar techniques can work with software If a computer connection fails try shutting down each program running on that computer one ata time and then try to reestablish the connection If you recently installed a new program driver or update try uninstalling the new software and test the connection again If the connection works the conflict is between the new software and your network connection or device driver In Windows try restarting the computer in Safe Mode and re establishing the connection if it works in Safe Mode you know that the Windows operating system is not the source of the problem Retrace Your Steps Even if a network problem appears without warning the problem was probably caused by something that has changed within the hardware or softwar
199. gital video files on the TV screen In rooms with both a computer and a large screen TV it s often worth the trouble to connect the TV directly to the computer as a complement to the smaller computer monitor The quality of pictures and text on a TV screen is not always as sharp as the same images on a computer monitor an image from a broadcast or cable TV signal or a DVD player but with a bit of tweaking it can be good enough to watch Connecting Directly to a Computer To connect a TV directly to a computer you need two things e An output signal from the computer that s compatible with an input to the television e Driver software for the computer s video controller Your television has one or more of these input types e Two or more screw terminals that connect to a flat antenna cable e Athreaded socket that mates with a coaxial cable from an antenna cable TV service or other program source the socket and mating plug at the end of the cable are called F connectors e Acircular connector with either four or seven sockets that mates with a matching multipin plug called an S Video for Super Video or Separated Video plug e Three color coded sockets yellow for video white for stereo audio left or mono and red for stereo audio right for analog audio video cables these are similar to the RCA phono plugs and sockets used in most home stereo systems e A15 pin analog VGA connector like the one used by older computer display m
200. gnal deteriorates due to interference or fading the client will try to shift to another access point on what it thinks is the same network This transfer is called a handoff If two different networks with overlapping signals have the same name a client will assume that they re both part of a single network and it might try to perform a handoff from one network to the other From the user s point of view this misdirected handoff will look like the network has completely dropped its connection Therefore every wireless network that could possibly overlap with another network must have a unique SSID The exceptions to the unique SSID rule are public and community net works that only provide access to the Internet but not to other computers or other devices on a LAN Those networks often have a common SSID so subscribers can detect and connect to them from more than one location In other words if you have an Internet access account at your local coffee shop you might find and use exactly the same SSID when you visit another shop owned by the same company Network Security 177 178 WARNING Chapter 13 A network s SSID provides a very limited form of access control because it s necessary to specify the SSID when you set up a wireless connection The SSID option in an access point is always a text field that will accept any name you care to assign but many network configuration programs including the wireless network tools in Wi
201. h as compact discs e Broadcast radio stations e Cable and satellite radio stations or music services e The Internet e Digital music files stored on a computer s hard drive or a portable device such as an iPod 4 Destination Figure 15 2 The source of the music played on this gramophone is the needle on a grooved shellac disc the destination is the horn The destination can be any of the following e Speakers connected to a home stereo system TV receiver or surround sound system e Speakers connected to a computer or built into a laptop e Headphones or a docking unit s speakers connected to a portable device such as an iPod e Astorage device such as a hard drive or a flash drive e A tabletop or portable boom box or Internet radio A home network can connect any of these sources to any destination It might be necessary to convert the source from analog to digital format before it moves through the network and you might have to convert the digital data back to analog before you play the sound through a speaker or headphones but these are relatively minor technical details the important point is the same network that handles other data can also distribute digital audio files In networking terms you can think of the devices that handle program sources as servers and the destinations as clients Audio Servers An audio serverin a home network stores music radio programs and other sound files that are accessible to
202. h can provide you can connect one or more additional switches to one of the ports on the original unit Photo courtesy of Linksys a division of Cisco Systems Inc Figure 3 4 This switch connects five network nodes Networks in larger business offices usually run cables from each computer back to a central space where all the switching equipment is mounted ona wall plate or an equipment rack This is often the same room where in house telephone equipment connects to the telephone company s outside lines This space is often called a wiring closet LANs and WANs The network in your home or office is known as a local area network LAN All of the computers connected to a LAN can share peripheral devices such as a printer or a scanner they can run programs and read data from other computers on the same LAN and they all share a common connection to the Internet In a home network the LAN might also include home entertainment systems and game controllers A LAN also uses the same set of rules and settings to control communi cation among all the networked computers These include the name of the network itself and names or address numbers or both for each computer and sometimes firewalls that protect the privacy of the people using the LAN When you want to connect several LANs you can create a network of networks called a wide area network WAN that can use communications channels such as telephone lines or a cable TV se
203. hat makes it easy to figure out where the signal is coming from e Don t use an SSID that makes your network sound as though it contains some kind of fascinating or valuable content use a boring name like say network or even a string of gibberish such as W24rnQ If a would be cracker sees a list of nearby networks yours should appear to be the least interesting of the lot e Change your access point s password The factory default passwords for most access point configuration tools are easy to find and they re often the same from one manufacturer to another hint don t use admin so they re not even good enough to keep out your own users let alone unknown intruders who want to use your network for their own benefit An unauthorized person who could be one of your own children who gets into the access point s software could lock you out of your own net work by changing the password and the encryption key If possible place your indoor access point in the middle of the building rather than close to a window This will reduce the distance that your network signals will extend beyond your own walls Use WPA encryption rather than WEP WPA encryption is a lot more difficult to break especially if it uses a complex encryption key Change your encryption keys often It takes time to sniff encryption keys out of a data stream every time the keys change the miscreants trying to steal your data are forced to start again
204. he operating system will load the device driver software right away In some less user friendly Unix or Linux distributions it might be necessary to compile the kernel to support a specific network driver and load the module at runtime but this is not common However if you re working with an older operating system or a network interface that the operating system can t recognize you ll have to find and install the correct device driver A device driver is a small program that converts between the generic output signals supplied by the computer s central pro cessor and the specific instructions that control the features and functions of a device connected to the computer It also converts incoming commands and data from the peripheral device to a format that the central processor can recognize New network adapters usually come with a software disc that contains the device driver and other related programs and documentation If yours is missing or if the disc doesn t contain the right driver for your operating sys tem you can probably find a driver program on the adapter manufacturer s website or through an online source of open source device drivers Several websites offer direct links to hundreds of sources for device drivers http www windrivers com http www pcdrivers com hitp www driverzone com hitp www driverguide com hitp www helpdrivers com hitp www winguides com drivers hitp www driversplanet com h
205. he owner of that address is not necessarily located in that country For example many American FM radio stations have obtained addresses in the fm domain which belongs to the Federated States of Micronesia and some television stations use the tv domain assigned to the Pacific island nation of Tuvalu Table 4 1 lists the most common generic top level domains Table 4 1 Generic Top Level Domains Top Level Domain Used By com Originally commercial but now a generic domain net Originally reserved for domains related to networks but now a generic domain edu Reserved for US colleges and universities org Originally reserved for nonprofit organizations but now a generic domain gov Originally reserved for the US government but now also used by state and local governments mil Reserved for branches of the US military info A generic domain with no restrictions biz A generic domain restricted to businesses name A generic domain reserved for individuals Some other top level domains such as asia coop museum and travel are restricted to certain categories of users Still others such as Jui HCIIBITaHHe OOKILLN Jeles are for addresses that don t use the Roman alphabet Name Servers DNS name servers are an essential part of the Internet s internal plumbing but most people don t know that they exist If your computer can t find a DNS server your email program web browser and other Internet programs won
206. he sizing icon on the Remote Desktop tab at the top of the screen This will allow you to copy text data or files between the two computers To return control to the local user click the X on the control tab near the top of the screen NOTE fyou try to use an account without a password to take over a Remote Desktop connec lion you will get this error message Unable to log you on because of an account restriction Jf you see this message go to Control Panel User Accounts on the target computer select Change an account to assign a password to your account and then try connecting again Virtual Network Computing VNC Virtual Network Computing VNC is a system that allows one computer the client to gain remote access to a second computer the server and to use the first computer s mouse and keyboard to control the second computer In general VNC is not as fast as the Windows and Macintosh remote desktop programs but it s more flexible Unlike the Microsoft tools described in the previous section VNC is not limited to any operating system you can use any VNC client or viewer to control any VNC server even if the two computers use different operating systems Several VNC based programs are available that offer clients and servers for more than one operating system including RealVNC Attp www realunc com UltraVNC hitp www uvnc com and TightVNC http www tightunc com Several others are limited to Linux and Unix
207. hen you want to transfer data from one computer to another when one or both of them are not already connected to a network For example if you re in a meeting where some body asks for a copy of a report or drawing you could use the built in infrared network tools built into many laptop computers to shoot the file across the table from your computer to your colleague s Or if you want to copy a file from a friend s computer you could plug a transfer cable into both machines or set up a point to point Wi Fi link Types of Network Connections 19 20 Chapter 2 Desktop MacBook computer Laptop Desktop computer computer Desktop Laptop computer computer Figure 2 7 A LAN left can provide connections between any pair of nodes a point to point network right connects two nodes Point to point networks can use wires radio signals or infrared light to exchange data between the two endpoints If you re using a cable connection you must use a special point to point Ethernet adapter or cable For a point to point Wi Fi link you must configure it as an ad hoc connection Ad Hoc Wi Fi Most Wi Fi networks connect wireless nodes to a LAN through a wireless access point but Wi Fi network adapters can also support wireless links directly from one computer to another This kind of connection is called an ad hoc network because it s usually set up as a temporary link rather than as part of a permanent network infrastruc
208. home appliances 8 222 228 home automation 8 49 51 223 home entertainment systems 7 8 48 49 203 206 Home Phoneline Networking Alliance 17 HomePlug 17 17 HomePNA 17 home run wiring 51 52 52 53 home security devices 8 205 hosting services 105 host names 43 Hotmail 105 hotspots 77 78 89 HOWTO 159 164 HP Hewlett Packard 95 HTTP See HyperText Transfer Protocol HTTP hubs data 30 55 designing 47 Ethernet 29 29 80 220 network 120 overview of 28 30 29 111 for printers 193 201 hybrid wireless networks 89 HyperTerminal programs 22 HyperText Transfer Protocol HTTP 24 39 web servers 158 IANA Internet Assigned Name Authority 37 38 157 IBM 82 94 iChat 237 IDE hard drives 97 IEEE Institute of Electrical and Elec tronics Engineers 21 78 ifconfig 43 IM instant messaging 7 233 237 incremental backups 100 indicator lights 75 individual bits 10 70 industrial electronics suppliers 57 info 40 Infrared Data Association IrDA 20 ports 20 21 21 infrared networks 20 21 21 input output I O ports 4 18 18 19 19 instant messaging IM 7 233 237 Institute of Electrical and Electronics Engineers IEEE 21 78 Intel 88 164 internal controllers 204 205 internal expansion cards 72 72 73 Internet Assigned Name Authority IANA 37 38 157 Internet based IM services 234 235 Internet connections network 110 115 111 112 Internet Explo
209. hosting 45 Layer Two Tunneling Protocol L2TP 162 163 164 169 LED indicator lights 240 242 243 Level 1 5 access 133 136 Leviton 67 LG Electronics 223 limited backups 100 line of sight 85 LINK indicator lights 75 Linksys 216 Linux backup files 100 104 computer to network connections 117 127 127 129 128 129 CUPS printer control program 199 file servers 94 95 96 215 file sharing 131 147 150 148 150 firewalls 154 159 155 158 164 network adapters 73 74 network to Internet connections 115 OpenVPN for 173 remote desktop programs 229 text commands for 43 troubleshooting info 247 VPN clients for 172 173 VPN servers for 164 wireless control programs 87 LinuxCD 95 Linux Online 104 live conversations 205 233 237 Living Network Control Protocol LnCP 223 local area connections 42 42 122 123 196 local area networks LANs addresses 37 38 computer to network connections 117 123 connections to 20 21 32 41 49 55 data transfer speeds 14 15 Ethernet 14 16 71 file sharing 137 firewalls 154 159 155 158 game consoles 220 222 instant messaging 234 236 235 network to Internet connections 107 115 108 111 112 overview of 31 32 32 remote terminals 23 23 security methods for 91 92 troubleshooting for 248 251 VideoLAN 218 VPNs and 159 161 160 161 163 Wi Fi and 54 77 78 wireless security 54 89 92 174 184 175 178 181 LostPC 185 LPs music
210. i networks are also filled with signals from cordless telephones medical equipment radio controlled toys and microwave ovens among many other things Wi Fi and those other devices use different methods to transmit and receive radio signals so there s not much danger that the Wi Fi adapter in your laptop computer will cause a model train wreck or cause your cordless phone to ring However other ISM or U NII signals along with Wi Fi signals from other nearby users can add noise to your Wi Fi signal that reduces the network s data transfer speed Within the 2 4 GHz band there are 14 overlapping Wi Fi radio channels Japan is the only major country that uses all of them Only 11 of those channels are used in North America and China while most of Europe uses 13 channels In France only 4 channels are available Each channel operates on a different frequency numbered from Channel 1 to Channel 14 Each channel overlaps the two channels above it and two below it as shown in Figure 8 1 so the channels with adjacent numbers can interfere with one another Like the interference from other ISM devices adjacent channel interference can create a slower noisier connection Therefore when you re setting up a new network or adding an access point to an existing network it s best to choose a channel number as far away from the channels used by nearby networks as possible Wi Fi Networks 79 80 22 MHz channel SS l l l l 2
211. ial part of the culture others hardly use it at all For an extensive study of instant messaging and the way people in business use it take a look at Interaction and Outeraction Instant Messaging in Action Proceedings of Conference on Computer Supported Cooperative Work 79 88 New York ACM Press hitp dis shef ac uk stevewhittaker outeraction_cscw2000 pdf The authors of this study offer some interesting insights but they have buried them under some seriously dense academic language using highfalutin words like dyadic and ethnomethodology Just about every messaging program has a similar structure It displays a list of other users with an indicator that shows whether each user is currently available to receive a message Users might not be available because their messaging program is not active or because they have set the program to not accept incoming messages To start a conversation click the intended recipient s name When a message arrives it appears in a pop up window on the recipient s screen some programs also sound an audible signal when they receive a new message Other Network Applications 233 234 NOTE Chapter 16 Instant messaging is not the same as online chat but the experience is similar The difference is that chat takes place among two or more participants who connect to a common channel a chatroom When you join a chat you instruct the program to connect to a specific chatroom Instant messaging
212. icular problem they have probably included instructions for fixing it in the Knowledge Base Similar resources exist for Macintosh networks and servers at hitp www apple com support and for Unix and Linux systems in the Support sections of each distribution s website Other online sources for useful troubleshooting information include manufacturers technical support centers independent newsgroups and web forums and sites such as Wikipedia and HowStuffWorks com that offer descriptions and explanations of various types of technology If those sites don t answer your question try a more general web search Type a few keywords that describe the problem such as XP can t find network printer or the exact text of an error message into a web search tool and follow each of the links to read about other people s experiences under similar circum stances Remember that quotation marks around phrases instruct the search sites to search for the entire phrase rather than individual words One particularly helpful tool for troubleshooting networks is the Windows Network Problem Solver at hitp winhlp com wxnet him shown in Figure 17 1 The Problem Solver is an interactive list of symptoms that links to instructions for solving the most likely cause of the problem If you take the time to carefully answer each of the questions in the problem definition form the Problem Solver can be a remarkably effective tool Troubleshooting 247 248 indows
213. ient sends audio to an amplifier s analog or digital auxiliary input Dedicated Music Client Devices As an alternative to using a computer consider using a separate device speci fically designed as a music client or network music player The client device sends an instruction to find and play a specific music file or other audio track to the music server which streams the requested file back to the player The player can either send the digital stream to a converter in the audio system or convert the file to an analog signal and send the music signal to the audio system For example Slim Devices makes a family of Squeezebox music clients including the Squeezebox Classic Squeezebox Receiver and Squeezebox Transporter Figure 15 5 shows the connections on a Squeezebox for a net work and a stereo system Similar products are available from Roku Netgear Philips and other companies Most of these devices are marketed as audio components so the best place to look for a demonstration is probably a home audio retailer rather than a computer store Each music client manufacturer supports a different set of audio file formats they all work with the most widely used formats but if your library includes more obscure formats you should confirm that a client can recog nize them Network music players offer several benefits They occupy less space than a computer they re often easier to use and they can provide sound quality as good as or bet
214. ific number of packets Because WPA changes the key frequently it s a lot more difficult for a cracker to gather enough information to decipher its encryption code In large networks WPA uses an authentication server to verify the identity of each network user The server uses Remote Authentication Dial in User Service RADIUS and Extensible Authentication Protocol EAP to exchange encryption keys with the computers and other devices that are connected to the wireless network In home networks and smaller business networks that don t have a server a method called pre shared key PSK mode uses a passphrase stored in the access point in place of the authentication server To connect to the network users must enter the same passphrase on their computer or other network device or set their device to automatically enter the passphrase When you set up WPA encryption you must specify whether the network uses a server or PSK mode Any access point and network adapter that supports 802 11g or 802 11n should also recognize WPA encryption If you re using an older 802 11b or 802 11a access point you might be able to add WPA encryption by installing the latest version of firmware and drivers Look in the support or downloads section of the manufacturer s website for free upgrade instructions and software PSK Passphrases A WPA PSK passphrase can be a string of either 8 to 63 ASCII characters or 64 hexadecimal digits The passphrase that y
215. ind a network node or any of a truly amazing number of other possible problems occurs as the local network expert it s your job is to fix it Network problems always have a specific cause or combination of causes even if that cause is not obvious Too often a network error message will say something like ask your network manager for assistance But when the network manager is you that message doesn t tell you how to solve the problem This chapter offers some tools and methods that will help you identify and solve most network problems 240 General Troubleshooting Techniques Chapter 17 The key to successful troubleshooting is to follow a logical problem solving process rather than simply trying things at random until you stumble upon the correct solution to your problem Most people who spend a lot of their time fixing things use a system like this without a formal plan but if you re new to repairing computers and networks consider using the techniques in this chapter as a guide Many of these suggestions are common sense answers rather than complex technical procedures Don t overlook them otherwise you can spend hours tracing a circuit or trying to find a bad connection just because somebody has unplugged a cable Remember that a problem that appears in your network might really be located on one of the computers or other devices connected to the network In many cases you will want to look for problems in th
216. ing errors or unclear descriptions are my own responsibility Thanks also to Jim Cavin for allowing me to connect his MacBook to my network and Tommy Tse for his assistance in obtaining evaluation software from Microsoft And thanks as usual to my agent Carole McClendon who started the wheels turning on this project INTRODUCTION This book is for people who never expected to build or run a computer network You were happily using a computer sending and receiving email writing reports and maybe down loading music through the Internet when one day you looked around to discover that one computer had somehow multiplied now you have two or three or more computers Maybe each of your children needs his or her own computer to do homework or all of your employees have computers on their desks Or maybe you brought a portable laptop computer home from work and you want to use it along with the family s desktop machine Whatever the reason you now have several computers and you need a way to connect all of them to the Internet at the same time and to share files printers and other resources among them You need a network xvi Introduction A network Yikes Isn t a network some kind of invisible monster that requires expensive equipment and people to keep it running who speak a mysterious language and go off to seminars with titles like The Power of Virtualization or Removing Internet Anonymity Barriers with IP Inte
217. ing principles involved in network file sharing you shouldn t have any trouble working with a mixed network In this section I m describing tools for sharing files that are part of the most commonly used Linux and Unix desktop environments Gnome and KDE If you re a hardcore user who works from the command line rather than a desktop I m assuming you already know how to create and use network shares or if not that you can find specific instructions from man pages and other documentation Sharing from Linux or Unix Computers Both of the major Linux Unix desktop environments Gnome and KDE include relatively easy to use network file browsers In Gnome the program is called Nautilus as shown in Figure 12 15 To open the network file browser go to the Places menu on the Gnome desktop and select Network Sharing Files Through Your Network 147 fen Windows shares on local File Browser Xe x File Edit View Go Bookmarks Help e X m t Back Forwar Jp Stor Search B 5 windows shares on local Q 100 Q Places v B E ubuntu ei DESKTOP La File System 8 4 GB Media I2 7 9 GB Media Network Servers G Trash E Documents E Music ea Pictures E Videos Figure 12 15 Gnome s Nautilus file browser includes access to network shares In KDE the comparable function is part of the Konqueror file manager as shown in Figure 12 16 smb local Konqueror Location Edit View Go Bo
218. ing a network as part of a major remodeling or new construction plan to coordinate your efforts with the contractors or outside installers who will provide electrical wiring telephones cable or satellite TV and wiring for a home theater or home entertainment system With all this information in one place it s easy to decide where you will want to install network connection points Use yet another color of pencil to mark an unobstructed place for the network outlet on the wall nearest to each computer and every other device you plan to connect to the network Each outlet should be at least a foot from the closest electrical outlet both because AC wiring can generate interference that affects data signals and because it s often required by the local electric code to prevent shorting between AC and data cables If your telephone or cable TV outlets are mounted on wall plates rather than in small boxes attached to the baseboard consider replacing the existing wall plate with a new one that combines two or three outlets of different types on a single wall plate as shown in Figure 5 2 When you design your network you should also plan for the future You probably don t need them today but within a few years it s quite possible that you will want to connect your household appliances a bedside radio and other devices to your LAN and the Internet And if you plan to eventually add one or Figure 5 2 This wall plate more online ca
219. ing document e Transmit them through the computer s network connection The alternative to a camera connected to a networked computer is a network webcam a camera and control unit that connects directly to the net work as a separate node A typical network webcam includes a remote control program on a web page that a user can operate through the network or with the correct set of passwords and authorization through the Internet Depending on each camera unit s specific features the remote control might allow an operator to zoom the image in and out rotate or tilt the camera or choose a different image through the same control unit Some network webcams also include a wireless network interface that can connect to the network through a Wi Fi base station Networked Cameras and Microphones Attaching a camera to your network with or without a microphone at the same location can add many useful features and functions Anyplace where you want or need a distant set of eyes and ears you can install a camera a microphone or both Here are some examples Surveillance monitors One or more cameras aimed at unattended entryways corridors and other locations can transmit pictures to a dis tant computer s video display monitor Baby monitors A networked computer with a camera and microphone in a nursery or child s room can replace a conventional baby monitor transmitter unit You can keep an eye on the baby while you work through
220. ings and close the Properties window Using Remote Desktop To take control of another computer using Remote Desktop in Windows XP or Remote Assistance in Windows Vista follow these steps l Select Start gt All Programs Accessories Remote Desktop Connection A dialog similar to the one shown in Figure 16 3 will appear Remote Desktop Connection amp es Mu Remote Desktop lt i Connection Compute ZE Username DESKTOP Wohn Ross You will be asked for credenbals when you connect Lone Figure 16 3 Use the Remote Desktop Connection dialog to specify the computer you want to control Type the name of the computer you want to control and click Connect Your screen will go black except for a control tab near the top of the screen and a Log On box 3 Type a valid account name and password for the target computer in the Log On box and click OK The screen on the distant computer will go dark and you will see an image of the distant computer s desktop on your screen You can now control the distant system with your own computer s keyboard and mouse You can open files run tests and load programs though the network However a user looking at the distant computer s screen will see nothing but a dark screen When a new Remote Desktop connection opens it fills the client computer s screen but you can reduce the size of the Remote Desktop window and see your own computer s desktop and Start menu by clicking t
221. intentional or accidental misuse or abuse by internal network users Computer networks are vulnerable to several forms of attack including unauthorized access to files theft of service and denial of service caused by excessive network connection requests Strictly speaking attacks on individual computers such as viruses worms and Trojan horses are a separate issue from network vulnerabilities but a good network security plan will include firewalls and other tools that also protect the computers connected to the network This chapter describes the basic steps that every home and small business network manager must take to keep his or her network secure 152 Keeping Intruders Out Chapter 13 Intruders break into networks for several reasons e They want to open files and read documents either to steal confidential information or just to overcome the challenge of cracking protected files e They want to use the network to obtain a high speed Internet connection e They want to use the network to forward unsavory or illegal data such as spam or pornography to the Internet or download similar material e They want to steal passwords credit card numbers bank account infor mation and other forms of data that they can either sell or use to order items of value e They want to interfere with normal network operation by overloading the network s ability to handle data altering or deleting essential soft ware o
222. ion make sure your network is protected with a firewall if the network includes one or more Wi Fi access points be sure to use WPA encryption On the other hand don t let these security concerns scare you away from using Level 5 access when it s appropriate In a business where two or more people work together on the same project you will want to allow those involved to create or make changes to the relevant documents On a home network you may want to provide universal access to music photos and video files and documents such as school term papers that a parent might want to review before they re turned in And if you share files between your home or office computer and a laptop you will want to allow Level 5 access between the two To assign the contents of a drive or folder to Level 5 follow these steps 1 From My Computer right click the icon of the drive or folder you want to assign to Level 5 A pop up menu will appear 2 Select Sharing and Security from the pop up menu A Properties window will appear with the Sharing tab visible This window is the same one you used to assign files or folders to Level 4 Figure 12 3 3 In the Network Sharing and Security section of the Properties window check the Share this folder on the network option Check the Allow network users to change my files checkbox 5 Click OK to save your changes and close the Properties window File Sharing in Windows Vista Chapter 12 Micr
223. is computer connects to the Internet directly or through a network hub option and click Next The Wizard will ask for a brief description and a name for this computer as shown in Figure 11 4 Network Setup Wizard I Give this compuler a descriplion and name E Computer description Sam s Office Examples Family Room Computer or Monica s Computer Computer name SAM Examples FAMILY or MONICA The current computer name is TOWER Learn more about computer names and descriptions emen Figure 11 4 Assign a unique name and description to each computer on your LAN Type a brief description of this computer and the name you want to use to identify this computer on the LAN Other users will use this name to connect to this computer through the LAN Click Next The Wizard will ask for a workgroup name Type the workgroup name and click Next You must use the same workgroup name for every com puter on the LAN The Wizard will ask about file and printer sharing as shown in Figure 11 5 If you want to allow other network users to use the printer or printers connected to this computer or if you want to share files stored on this computer with other network users select the Turn on file and printer sharing radio button if you do not have a printer connected to this computer or you don t want other users to use the printer and you don t want to share files select the Turn off file and printer sharing radio button If you do
224. itp www totallydrivers com Status Lights on Network Adapters Most Ethernet adapters have two or three status indicators that light and go dark as data moves through the network connection On an expansion card the lights are usually on the metal mounting bracket just above or below the RJ 45 connector on a PC card they might be on the card itself or on the socket that connects to the network cable Indicator lights on a built in Ethernet socket are usually right next to the socket itself The three indicator lights are LINK Lights in green when the adapter is connected to a live network 10 100 Lights in yellow when the adapter is connected to a 100 Mbps network goes dark when it s connected to a 10 Mbps network ACT Flashes in green as data passes through the network connection in either direction These lights are useful for troubleshooting and watching network per formance because they can tell you whether your network connection is working properly For example when the LINK indicator lights you know that the computer is connected to a live network when it s dark the network connection is offline When the ACT light flashes it tells you that the com puter is sending or receiving data Unfortunately the lights are often located in a place where it s difficult or impossible to see them while you re using the computer When you re testing the system it s often helpful to ask someone else to watch the lights while you ope
225. l The alternative is to send your message to a switching center that will hold it until a link to the destination becomes available This is known as a store and forward system If the network has been properly designed for the type of data and the amount of traffic in the system the waiting time will be insignificant If the communications network covers a lot of territory you can forward the message to one or more intermediate switching centers before it reaches the ultimate destination To make the network even more efficient you can divide messages that are longer than some arbitrary limit into separate pieces called packets or frames Packets from more than one message can alternate with packets containing other messages as they travel between switching centers and reassemble themselves into the original messages at the destination The great advantage of this approach is that many messages can share the same circuits on an as available basis The packets from a single message might alternate with packets from one or more other messages as they move through parts of the network For example if you send a message to a recip ient in another city the packets usually move through an inter city channel along with many other messages Each data packet must also contain yet another set of information the address of the packet s destination the sequence order of this packet relative to other packets in the original transmission and so forth
226. l allow them to let you know when the roast is cooked or the clothes dryer has completed its fluff cycle Chapter 15 provides basic information about home automation systems and devices and explains how to connect them to a computer network TYPES OF NETWORK CONNECTIONS must follow a set of rules and specifications that define the characteristics of both the physical connection and the form and structure of the data that moves from one computer to another Without these rules the people using the network cannot be sure that their computers will communicate successfully For example the plugs at the ends of data cables must match the sockets on each computer and other network hardware If a cable uses a square plug with two pins but the computer has a round socket with four holes they won t fit together The same thing applies to the electrical voltages timing error checking and other issues There are many different kinds of networks each with its own rules This chapter explains a few general principles about networks and describes the network types that you re most likely to see ina home or small office network 10 Chapter 2 You can use a network without understanding all the internal details of network communications but if you re designing and building a new network you should know how to choose the best options for your particular require ments You can treat individual network components as a series of black boxe
227. l center and place the modem router and switch near the computer but remember to allow for addi tional network nodes in the future A single wall plate can hold up to six data outlets so it s possible to run cables to several other rooms without installing an industrial looking row of mounting blocks A data outlet block is the transition between internal data wiring inside a wall and a socket for a cable with Ethernet plugs at each end Terminating each cable from another room with an outlet will make it easier to make additions and changes to your network wiring Installing the Network Control Center and Ethernet Cables 59 One side of an outlet block has a set of slotted pins that each holds one of the wires inside a data cable and the other side has a socket for an Ethernet plug A data outlet can be located on the side of a small box attached to a base board or to the plywood base of your control center or ona flush mounted wall plate Figure 6 2 shows an outlet block with cables connected to both sides The cover has been removed to make the individual wire connections visible Figure 6 2 An outlet block provides a transition A completed control from loose wires to an Ethernet connector center on a plywood panel will look something like Figure 6 3 Network Telephone terminal ine blocks To other rooms Phone line terminal block Figure 6 3 A homebrew control panel should include connections for AC power
228. l in one device almost always costs less and occupies less space than a separate printer scanner copier and fax machine however the large number of features and functions often means that it s more difficult to operate than a simple single function device Printers and Other Devices on Your Network 199 Figure 14 7 is a functional flow chart that shows the types of sources and destinations that an all in one device can handle The device can receive an image from a computer or through a telephone line or it can create a digital copy of a physical image such as a printed page a transparency or a small object placed on the surface of a scanner The device can send the digital image to any of several different destinations a printer a computer file or a distant fax machine If your all in one device also includes a network interface you can use it to accept print jobs or outgoing faxes through an Ethernet network and you can send scanned images and incoming faxes to any of the computers connected to the same network Some all in ones can also send images through the Internet as email attachments 3 Q Scanned Computer image file A X Fax via All in one Printed telephone line device page QA I Computer Fax via file telephone line Figure 1 4 7 An all in one device can obtain images from different sources and send them to any of several destinations Each of the all in one s activities is a specific combinatio
229. le and the cable s sensitivity to interference Unless you plan to install a super fast Gigabit Ethernet network CAT5e is usually the best compromise between cost and performance in a home or small office network Don t use CAT cable for new installations It might be okay for today s networks but it won t reliably support the next generation of high speed data services Ethernet cables come in two forms bulk cable on spools or in boxes and pre assembled cables with connectors already attached Pre assembled data cables are often called patch cords patch cables or jumper cables They re NOTE available in many colors and in lengths ranging from 1 foot to 100 feet Use different colored patch cords with a switch or any other device that has lots of connections multiple colors will allow you to find the right one quickly Bulk cable is the right choice for runs inside walls between your control center and the data outlets in other rooms On the other hand pre built cables are better for shorter distances such as between terminal blocks or wall outlets and computers control devices and other equipment because they re often made with more durable jackets and plugs that have permanent collars It s possible to build your own patch cords out of bulk cable and loose plugs but attaching plugs to cables is tedious work that s generally more trouble than it s worth As a rule of thumb use bulk cable for permanent installations with
230. le as 8MB of memory The NetBSD 1386 Firewall Project home page is Attp firewall dubbele com Virtual Private Nerworks NOTE A virtual private network VPN can add another effective form of security to data that moves from a remote client to a host network that can be located anywhere with a connection to the Internet A VPN uses a data tunnel to connect two points on a network through an encrypted channel The endpoints can be a single network client and a network server a pair of client computers or other devices or the gateway to a pair of LANs Data that passes through a public network such as the Internet is completely isolated from other network traffic VPNs use login and pass word authentication to restrict access to authorized users they encrypt the data to make it unintelligible to intruders who intercept the data and they use data authentication to maintain the integrity of each data packet and to assure that all data originates with legitimate network clients VPN functions occur at the IP or network layer of the ISO model Therefore they can operate on top of the Wi Fi or other wireless protocols which operate at the physical layer VPNs can also pass data across a network connection that includes more than one physical medium for example a wireless link that passes data onward to a wired Ethernet network In other words a VPN is an end to end service the data can use a wireless link an Ethernet cable an ordinary tel
231. le to every network user while others might be limited to specific users and still others are only available to the file s owner One of the most common network systems for sharing files printers and other resources is the Server Message Block SMB protocol This protocol is at the core of Microsoft Windows networking and it also works with Macintosh OS X and Linux Unix systems Therefore exchanging files among computers that run different operating systems is not a problem even though the files themselves might not always be compatible for example you probably can t run a program written for Windows on a Linux system 132 Many operating systems support more than one networking protocol but when you run a mixed network or if it s remotely possible that a visitor with a different kind of computer such as a Mac or Linux laptop might want to connect to your network it s best to use the most common protocols Control of file sharing rests with the computer that holds each file so other people can t open and read your files without your permission even if they have a login account or they re using a guest account on the same computer In order to share files with other users you must turn on your operating system s file sharing service and then assign an access level universal limited or none to each folder or directory This chapter explains how to set up file sharing in Windows XP and Vista Macintosh OS X and in
232. lephone wall outlets and connection boxes If you plan to use a DSL or dial up connection to the Internet your network will use telephone outlets to connect Cable TV or other video outlets Ifyou get your Internet service from your cable TV provider you will connect a modem to a cable outlet Even if you don t use cable Internet service you might want to use com bined wall plates for video and data outlets 48 Chapter 5 Furniture placed next to a wall You won t want to plan a network outlet socket in a place that forces you to move a bookcase or a sofa to get to it On the other hand if there s a table against the wall you could probably crawl underneath easily to plug in a cable in a place where it won t call attention to itself Closets stairways and other hiding places If your home or workplace includes spaces on more than one floor of the building be sure to note the locations of closets stairways and other places where it will be rela tively easy to run hidden cables through ceilings or floors As with the other wiring in your home or workplace your goal will be to hide all your network cables inside walls under floors and in other invisible locations If you re adding the network in an existing home or office all of these elements are probably in place already Before you start to add new network wiring and connection points you must understand how they will relate to the other things in each room If you re plann
233. les from an entertainment server to speakers and video displays in several locations around your home This chapter explains how to connect and use additional devices with your network 204 Using a Microphone and Camera with Your Network NOTE Chapter 15 A microphone connected to a computer or audio server can capture sounds and convert them into digital audio files A camera known as a webcam can capture images that a computer or server can convert to still or moving image files An audio or video server can be either a computer with an internal or external microphone or a camera or both or a stand alone device that connects directly to the network When another computer receives the same audio and or video files through a network it can display the images on a display monitor and play the sounds through one or more speakers or through a pair of headphones One widely used remote webcam service is the familiar online traffic monitor like the one shown in Figure 15 1 Figure 15 1 A traffic webcam uses a networked camera This one shows cars and pedestrians on the Brooklyn Bridge Internal and External Controllers A video camera can connect to a network through a controller mounted inside a computer on a plug in PCI expansion card or as an external USB device The controller scans the light sensitive portion of the camera from side to side and from top to bottom at a constant rate when it reaches the end of one row the cont
234. level 39 41 40 Domain Name System DNS 39 41 42 44 109 158 servers 40 41 42 43 44 109 115 118 124 127 246 DoS denial of service attacks 189 dot 39 downstream switches 67 drive by logins 174 drivers device 74 75 DSL connections 6 22 32 62 64 99 modems 110 DTE data terminal equipment 18 19 DVI digital visual interface 218 219 231 DVI to DVI cables 219 DVI to HDMI cables 219 220 DVR digital video recorder 216 217 Dynamic Host Configuration Protocol DHCP 37 38 42 43 86 109 115 246 servers 38 109 115 111 112 117 118 124 126 126 129 157 158 163 dynamic IP addresses 37 38 86 109 EAP Extensible Authentication Protocol 182 Edirol 211 edu 39 40 Elcomsoft Distributed Password Recovery 183 electrical outlets 48 50 49 52 52 55 56 59 electronics suppliers 57 email services 105 E Mu 211 encryption methods 54 89 91 159 ASCII keys 180 181 end to end 89 159 hex keys 180 181 181 WEP 90 91 174 175 176 179 182 181 183 217 wireless security and 174 184 175 178 181 WPA 54 78 90 91 136 160 174 176 179 181 182 183 194 217 WPA2 90 176 enhanced systems 78 79 equipment data communication 18 19 error checking 9 13 error messages 229 239 240 241 247 ESET Online Scanner 245 ESSID 177 179 Ethernet cables 15 47 53 56 60 60 66 66 77 192 hubs 29 29 80 220 LANs 14 16 71 networks 14 16
235. lgorithm was known to have weaknesses in certain applications all users had to know the key and no secure mechanisms for distributing new keys existed Most of these shortcomings were acknowledged and dismissed as being outside the scope of providing the same protection that a user on a standard wired net work would receive but in fact they meant that wireless equivalent privacy was little better than no protection at all Recent attacks such as those performed by the aircrack ptw tool have further undermined WEP because these tools have often been able to disclose an encryption key in a matter of minutes by analyzing a limited amount of traffic With these developments WEP should be treated more as a do not disturb sign than as a real means of protection The WPA and WPA2 standards attempt to fix the shortcomings of WEP but they only work when all of the users of your network have modern cards and drivers Most if not all network interfaces made in the last few years support WPA or WPA2 For most of us the more serious danger is not that people will eavesdrop on our messages but that they will create their own connection to your network and either read files stored on computers on the LAN or use your broadband connection to the Internet without your knowledge However business networks must take extra precautions to protect their and their customers data Several high profile compromises of customer credit card data in major
236. lligence Not necessarily Networks are not just for geeks any more Today s small networks are relatively easy to install and you don t need an advanced course in computer technology to operate them Even the smallest of small businesses will probably benefit from having a network And home networks are becoming common household utilities just like water electricity and cable TV Like those other utilities you don t need a technical background to use a network This book will tell you what you need to know to build and use a small simple network in your home or business without becoming mired in obscure technical details We thought about calling this book Networks for Nitwits but that s not quite what the book is about you re not a nitwit you re an intelligent com puter user who has been dragged into the world of networks I suggested The Bridges and Routers of Madison County but that would be an entirely different book the bittersweet tale of an Iowa housewife who finds romance with an itinerant network installer Somebody should probably write that book but this isn t it This isa guide to navigating the jungle of servers routers modems and Ethernet cables and to getting the most out of your small network I ll explain how networks operate without getting into too much tedious technical detail describe each part of a network and tell you how to use the net work with computers running Windows XP and Vista Maci
237. lly obtain the settings needed to connect to the LAN and to the Internet When no DHCP server is present or if the DHCP client isn t work ing perfectly you should assign an address manually and enter other settings for each computer individually 118 NOTE You can use a computer with a fixed IP address in a DHCP network but using one is a bad idea because the fixed address can cause collisions with an automatic assignment Some routers and other devices that contain DHCP servers may also allow you to assign a specific IP address to a network node with a particular MAC address The user s manual for your modem or router and the information supplied by your Internet service provider are the definitive sources for network configuration information Make a note of the following settings on your modem or router since you will need them to configure the individual computers e DHCP status on or off e IP address e Subnet mask e Default gateway e DNS servers Connecting Your Windows Computer to a Network Chapter 11 In Windows XP and Windows Vista the Network Setup Wizard creates a profile that connects your computer to a LAN To make changes to an existing profile use the Properties settings for that profile Creating a New Network Profile Follow these steps to run the Network Setup Wizard 1 From the Start Menu select Connect To Show all connections as shown in Figure 11 1 If you re using the Classic Start Menu select
238. m not far from the washer and dryer you probably won t want to connect your appliances to the network right now but remote control and monitoring through your home network is a real possibility in the future In each bedroom plan for an outlet near a desk or table where the room s occupant uses a computer or video game console and if it s not close to the first outlet another outlet for a bedside Internet radio or a laptop computer In an office plan for at least one network connection point next to every desk and every other location where you expect to place a computer or other network device such as a printer If you expect to use both Ethernet and Wi Fi connections to your network note the locations for one or more Wi Fi access point on your floor plan All of your network wiring should use CAT5e or CAT6 data cable less expensive CAT5 no e cable can t handle the higher speed network data that you re likely to need in the future The Control Center The network control center is the location of the switch router modem and other equipment at the core of the network All of the wiring that connects each outlet to the network converges at the control center Common locations for a network control center sometimes known as a wiring closet include closets utility rooms and garages or basements For a very small network no more than five nodes you could also consider placing the modem and router on a table next t
239. mber that the flaws in PPTP networks were identified after that whitepaper was written VPN Servers A VPN server or host can be part of a Linux Unix or Windows server or it can be built into a stand alone network router or gateway If your network already uses a separate computer as a dedicated server you can use that computer as the VPN server A separate piece of hardware might be a better choice if your network does not already have a full blown network server Dozens of VPN equipment makers offer routers gateways and other products that support one or more of the VPN protocols Each of these prod ucts has a different feature set so testing the specific combination of client and server that you intend to use on your own network before you commit to them is essential The Virtual Private Network Consortium VPNC is moving toward a set of interoperability tests and certification standards much like the Wi Fi standards for wireless Ethernet equipment The VPNC website hitp www vpne org lists the products that have passed the interoperability tests and the site also provides links to information sources for a long list of VPN products NOTE Configuring a Windows Server for a VPN If you re committed to using a Windows server you can use either L2TP or IPsec with Windows Server 2003 or Windows Server 2008 if your server runs the older Windows NT Server 4 0 or Windows 2000 Server software you re limited to L2TP or the se
240. ment at the center of a star network that connects the computers and other nodes to one another and the related devices that provide connections between networks Unless you re connecting just two nodes these hubs switches and routers are essential network build ing blocks Hubs and Switches Chapter 3 Both hubs and switches are exchange points at the logical center of an Ethernet network as shown in Figure 3 2 Each computer or other network node connects to a hub or switch through a cable plugged into a socket called a port In a small network a hub or switch is almost always a tabletop box with indicator lights on the front and Ethernet ports on the back Ina larger network the hub or switch might be a panel that mounts in an equip ment rack Ethernet hub Figure 3 2 A hub or switch is the central connection point in an Ethernet network The maximum data transfer speed of a network is the data handling speed of the hub or switch You might find a 10 Mbps Ethernet hub but as faster devices have become less expensive there s not much reason to use one Today the most common hubs and switches are designed for both 10 Mbps and 100 Mbps operation The latest generation of switches and hubs supports even faster Gigabit Ethernet 1000 Mbps switches often at prices only slightly higher than those of older 100 Mbps versions Hubs When a data packet enters a hub the hub relays that packet to all of the hub s ports
241. meras or home automation combines TV and data network devices such as lighting or climate controls outlets to the network it s a good idea to mark their tentative locations Designing Your Network 49 Remember it doesn t cost anything to mark a location for an outlet on your floor plan You don t have to install every outlet right away but it s helpful to know where they re likely to be when you plan your cable runs You can always change the exact locations before you actually pull cable through the walls NOTE Planning for a lot of extra network connection points might seem unnecessary right now but that will almost certainly change If you plan for more network connection points than you think you need today you might have enough for the next ten years Consider this If you live in an old house with the original electrical wiring you probably know that one or two AC outlets in each room was considered more than enough back in 1925 more would have been extravagant Today you should have several electrical outlet plates on every wall In the future household data networks will be as common as electricity and telephones In your home consider placing at least one network outlet in each major room don t worry about hallways and other odd spaces In the kitchen place one outlet close to a counter and plan to place another on the wall next to the refrigerator and range You might also want an outlet in the laundry roo
242. mited to a single operating system whereas others offer compatible versions for exchanging messages between different computer types In most cases the same program must be running on each computer connected to the LAN you can t assume that two different LAN messenger programs will automatically recognize each other Softros LAN Messenger a SoftRos Lan Messenger hitp bue messenger softros com is typical of this TRENER DEST LE category As Figure 16 7 shows the General program displays a list of people 5 John Ross amp Ned who are currently logged into their computers with an icon that shows each person s status Available Busy or Away To send a message to another user simply click that person s name 8 Mv Info and type your message in the pop up Conversation window Figure 16 7 LAN messenger programs list the names of available users Other Network Applications 235 236 Chapter 16 When a message arrives the recipient s computer sounds a signal and displays the message in a pop up window like the one in Figure 16 8 The same window appears on both the sender s and the recipient s computers To continue the conversation type the text in the Message text box and click Send Ned Conversation IE Conversation 2 S sinvite 11 15 AM John Ross How about lunch Meat loaf special today 11 15 AM Ned Sounds good Let s go Close Figure 16 8 Both sides of a message exchange appear i
243. more of the attempts had taken around 500 milliseconds or more that would indicate some kind of problem Ping has also become a verb in computer jargon You ll hear a technician at a help desk ask you to ping me at a specific address meaning that you should send a ping request to that address Some people have extended that usage beyond computer networks They ll talk about pinging somebody when they intend to get that person s attention either by email telephone or even poking their head into the recipient s office Many large commercial Internet sites such as yahoo com and microsoft com have chosen to block ping requests from outside their own network If you get a no reply response to a ping request try another address before you assume the problem is with your own Internet connection TraceRovte The TraceRoute tool measures and displays the amount of time it takes for your computer to receive an echo from each network device between your computer and the target As a result a TraceRoute display can show you the route between your computer and any other computer on the Internet and pinpoint the segment of that route where a problem is occurring In Windows the command is tracert in OS X Linux and Unix it s traceroute TraceRoute sends three requests to each intermediate node and shows the timing for each request Listing 4 4 shows a TraceRoute from my office in Seattle to No Starch Press in San Francisco C gt tracert
244. my Windows desktop onto this monitor Men Troubleshoot Advanced 7 em o Figure 16 5 The Display Properties dialog includes an option that can extend the Windows desktop to two or more monitor screens Other Network Applications 231 232 Remote Control When you re already using two or more computers in the same room it s often a nuisance to move among the keyboards and mice that control them MaxiVista includes a Remote Control feature that allows a single keyboard and mouse to transmit signals through a network to multiple computers To use MaxiVista s Remote Control turn on Remote Control mode in the main computer and drag the mouse cursor to the desktop of the com puter you want to use When you select or open a program with the mouse connected to the main computer the main keyboard will work with that program The shared clipboard is part of MaxiVista s Remote Control function Simply use the mouse from the main computer to select and copy a file folder block of text or other object to the clipboard just as you normally copy objects on a local computer Then move the mouse cursor to the target computer open a program or select an already open window and paste the contents of the clipboard Synchronizing Files Chapter 16 Any time you collaborate with somebody else on a project you run the risk that each copy of the document or drawing or spreadsheet or any other record of your work will accum
245. n the conversation window The same program also allows users to transfer files through the LAN If you don t like the SoftRos package there are plenty of others each with a slightly different screen layout and features A web search for LAN messenger will produce dozens of links to descriptions and download sources Messaging Through a Virtual Private Network When you connect to a LAN through a virtual private network VPN the LAN treats your computer just like every other network node even through you might be hundreds or thousands of miles away from the rest of the network Chapter 13 explains how to set up and use a VPN VPN connections are commonly used for IM although you can also use a public IM service to accomplish the same thing To set up an IM through a VPN follow these general steps Establish your VPN connection to the LAN 2 Run your LAN messaging program Choose a connection through the VPN and select the person with whom you want to exchange messages Audio and Video Messaging In some situations there s value to adding sound and pictures in text messages The world s telephone companies spent many years and huge amounts of money trying to develop a successful commercial picturephone service as a supplement to traditional voice telephone calls but it never happened until they repackaged it as videoconferencing Adding pictures to telephone service seemed like a good idea but it turned o
246. n Figure 13 1 The fire wall monitors all inbound and outbound data between the computers on the local network on one side and the Internet on the other This kind of firewall is intended to protect the computers on the LAN from unauthorized intrusion from the Internet Firewalls in Wireless Networks In a wireless network a firewall can also be placed at the gateway between the wireless access points and the wired network This firewall isolates the wireless portion of the network from the wired LAN so intruders who have connected their computer to the network without permission can t use the wireless connection to reach the Internet or the wired part of the LAN Figure 13 2 shows the location of a firewall in a mixed network that includes both wired and wireless connections Figure 13 1 A network firewall isolates a LAN from the Internet Firewall B Pi point NX a Laptop Q Laptop a Laptop computer computer computer Figure 13 2 A firewall can also protect the wired portion of a LAN from wireless intruders Network Security 155 156 Chapter 13 A firewall in a wireless network can perform several functions e Itcan act as a gateway router between the wireless network and a wired LAN e Itcan protect a direct connection from a single computer to the Internet e Itcan block all traffic moving from the wireless side to the wired network that doesn t come from an authenticated user e It passes commands message
247. n control your house s heating and air conditioning systems open and close draperies adjust the lighting commu nicate with a burglar alarm or home security service operate lawn sprinklers and control the filters and temperature of your swimming pool among other activities The interface between the network and the control device can be either a direct Ethernet link or a controller that follows the low voltage X 10 standard Remote Sensors and Controls When you connect a remote interface device to your LAN you can monitor environmental conditions or the performance of unattended equipment and operate equipment by remote control through your network Many possible applications for this kind of networked remote activity are available including the following e Monitoring the temperature in an equipment room a freezer or cold box e Measuring and monitoring air or water temperature wind speed water flow in a stream or other body of water and other environmental conditions e Monitoring power levels e Monitoring and responding to alarms e Turning AC or DC power off and back on again in order to restart hung equipment e Monitoring normally open or normally closed intrusion alarms such as open doors or windows Other Things You Can Connect to Your Network 223 224 WARNING e Remotely controlling and adjusting isolated equipment e Tracking any other condition that can be measured or monitored with a digital
248. n of input and output Scanning Goes from a scanned image to a computer file Copying Goes from a scanned image to a printed page Printing Goes from a computer file to a printed page Incoming fax Goes from a telephone line to a printed page or computer file Outgoing fax Goes from a scanned image or a computer file to a telephone line 200 Chapter 14 Computers connected to the network treat an all in one device like each of the separate devices The printer shows up in the menu that Windows Mac OS or Linux Unix displays when you want to print a document like any other printer you must add it to each computer s printer list and load a printer driver on that computer The scanner uses either a TWAIN or WIA interface to import images directly into application programs and fax pro grams detect the all in one as a fax machine The copier function sends the scanned image directly to the printer so it doesn t show up on the network An all in one that is not intended for full network operation can still operate as a networked printer However it s possible that the scanner and fax functions will only work from the computer connected directly to the all in one unit As a rule of thumb you can assume that an all in one that connects directly to the network through an Ethernet port will support all of its functions from any computer on the network But if the unit connects to a printer through a USB port it might not accept commands from remo
249. n t turn on file sharing you won t be able to view or change files on this com puter through the network 10 Network Setup Wizard Figure 11 5 Select the file and printer sharing option that applies to your network The wizard will configure your computer for the settings you have selected When configuration is complete the Wizard will display the window shown in Figure 11 6 which offers to create a Network Setup Disk or finish the wizard Select the option that describes what you want to do If you select Create a Network Setup Disk you can use a floppy disk a USB flash drive or other removable disk as your setup disk Network Setup Wizard You re almost done Figure 11 6 The Network Setup Wizard will offer to create a Network Setup Disk Connecting Your Computer to a Network 121 122 Chapter 11 11 The wizard will follow your instructions and display the Completing the Network Setup Wizard window Click Finish Repeat the process for each Windows computer connected to your network If you created a Network Setup Disk or flash drive at the end of the Network Setup Wizard for the first computer you can use the program on that disk instead of running the Wizard each time Changing Your Computer s Network Settings To change one or more of your computer s network configuration settings manually follow these steps 1 From the Start Menu select Connect To Show all connections or from the
250. n you re not using a network in order to reduce battery drain and to avoid transmitting a signal that a hacker could use to link to your computer There are usually several ways to turn an internal adapter on and off a physical on off switch a set of keyboard commands and an option in the Wi Fi control program The com puter s user manual is the best source for instructions on operating a Wi Fi adapter PC Cards Laptop computers without built in adapters can use an adapter on a credit card size PC card or PC ExpressCard To install the adapter simply plug it into the PCMCIA socket and wait for your operating system to recognize it and load the appropriate driver software Figure 8 4 shows a PC card adapter The adapters extend about an inch beyond the edge of the PCMCIA socket in order to place the antenna outside the computer s metal case NOTE E Antenna inside this part Photo courtesy of D Link Figure 8 4 PC card Wi Fi adapters usually have built in antennas Some PC card adapters also have a connector on the top or on the outside edge of the card for an external antenna This can allow you to place the antenna in a location where there s a better signal to and from the base station but the separate antenna is one more thing to carry along with your laptop computer In general an adapter with a built in antenna is usually a better choice for a portable computer A few Wi Fi adapters are also available on the
251. nal from another computer in the same room and automatically set up a network link between the two devices It s best then to disable the infrared port anytime you re not planning to use it To disable or enable infrared communications in Windows open the Device Manager Control Panel gt System Hardware Device Manager expand the list of infrared devices right click the name of the infrared port and choose Disable or Enable from the pop up menu FireWire IEEE 1394 FireWire was developed by Apple as a high speed serial data transfer method for connecting computers to external accessories It was later adopted by the Institute of Electrical and Electronics Engineers IEEE as their Standard No 1394 IEEE 1394 is used most often for high speed data transfer from audio and video equipment to computers but it can also exchange data between two computers through a special cable Unlike FireWire it s not possible to use a simple cable between two computers USB ports as a communications link for direct data transfer However special USB Data Transfer Devices are available for this purpose Connections Through a Telephone Line When a high speed wide area network service such as DSL is not available you can connect your computer or LAN to the Internet or directly to a remote computer through the dial telephone system the Public Telephone Switched Network or PTSN also known as POTS short for Plain Old Telephone Ser
252. nce because they tell the computer where and how to find the operating system To run the BIOS settings utility turn off the computer then turn it on again and immediately press the DEL delete or F1 key depending on the type of BIOS your computer uses If you re not comfortable changing the BIOS settings just leave them alone When you install another network interface Windows and other operating systems will recognize both the internal and external adapters In most cases it won t matter if both of them are active at the same time On the other hand if your network connection doesn t work when you turn on the computer but the rest of the network is okay and all the network cables are plugged into their appropriate sockets it s possible that the internal adapter has been disabled by accident This should never happen unless some body goes into the BIOS utility and changes the setting but it s possible especially if the computer is in a public location where other people can mess with it Ethernet Network Interfaces 71 72 Adding a Network Interface to an Old Computer Chapter 7 If you re using an older computer it s possible that the computer does not have a built in network interface In that case you must add one before you can connect it to your network Fortunately network interface adapters are inexpensive and easy to install As a minimum look for an Ethernet adapter that can handle both 10Base T and 100Base T net
253. nd Novell include all the features of a simple file server along with many additional business functions such as web and email hosting calendar coordination remote access automated backup and data management all with a more or less consistent appearance These server packages are relatively expensive but their easy installation and available support might be worth the added cost especially in a large enterprise where additional support staff is an issue The developers of these commercial server products argue that the total cost of ownership TCO for their products including original purchase price and the cost of ongoing maintenance and support is about the same as the TCO of free Linux and Unix servers Microsoft claims that management and maintenance staffing plus downtime account for roughly 75 percent of a server s TCO but the experience of many open source software users is quite different In a very small business the numbers will probably work out in favor of free or inexpensive server software unless you have to pay for outside support If you re already committed to other Microsoft products including Access Microsoft SOL or Windows Media Windows Server is likely to be the best choice On the other hand many Linux and Unix versions include comparable programs such as the Apache web server that perform at least as well as or better than the Microsoft products If you re a Mac household or business Apple Server is the logical
254. ndows XP and those supplied with several major brands of network adapters automatically detect and display the SSIDs of every active network within their signal range It s not always necessary to know the SSID of a network before you try to connect the configuration utility or a network monitor or sniffer program like Network Stumbler will show you the names of every nearby network in a list or a menu the exceptions are networks in which the broadcast SSID feature has been turned off For example Figure 13 17 shows the result of a Network Stumbler scan at Seattle Tacoma Airport where Wayport served the passenger terminal and MobileStar provided coverage in the American Airlines VIP club Every access point comes with a default SSID setting and password These defaults are well known and documented within the community of network snoops run a web search for default SSID to find several lists Obviously the defaults should never be used in any active network Make sure you change the access point s administrative login and password while you re at it 4 Network Stumbler Stumbl1 x l Eile Edit View Options Window Help lel x D d P eas t aat W Channels MAC SSID Name Chan Vendor s SSIDs 900409 Wayport Access 6 Cisco Aironel F Filters 900409 MobileStar 1 Cisco Aironel 2 Ready 2 APs active GPS Disabled Figure 13 17 Network Stumbler and many configuration utilities di
255. ne between the WAN and the rest of the Internet the subnet mask tells the WAN which numbers in the router s IP address identify the router and which generic numbers identify the WAN For example the most common subnet mask is 255 255 255 0 which means that the last of the four numbers is different for each node In other words if your WAN controls all the addresses in the 123 223 123 XXX group your address might be 123 223 123 103 and another customer s address on the same WAN might be 123 223 123 117 The specific numbers your router uses are absolutely essential if you don t have them exactly correct the router won t connect to the Internet But understanding what they mean is less important than getting them right Your Internet service provider will supply the numbers to use when you set up a new account Write the numbers in the same place where you keep account numbers and other important computer related information Connecting Your Network to the Internet 109 110 NOTE NOTE Chapter 10 When a separate DSL or cable modem is between the gateway router and the Internet the modem often provides the static IP address and other information to the Internet and the local network In this situation the gateway router relays the necessary addresses between the modem and the rest of the local network The LAN settings for your router or modem control the way your local network operates The specific settings in each computer connec
256. net 23 39 158 Temporal Key Integrity Protocol TKIP 182 183 text messaging 233 TightVNC 226 229 Time Machine 103 104 104 TiVo 216 216 217 TKIP Temporal Key Integrity Protocol 182 183 top level domain names 39 41 40 topologies 27 28 28 total cost of ownership TCO 95 TraceRoute tool 36 44 44 46 45 tracert 44 traffic monitors 204 trailers 11 transceivers 80 81 transmission control protocol TCP 35 36 123 123 126 158 service ports 158 Trend Micro HouseCall 245 TRENDnet 161 Trillian 234 troubleshooting AC power 242 configuration settings 246 defining problems 240 241 DHCP settings 246 error messages 229 239 240 241 247 failed connections 246 247 general techniques 239 245 isolating problems 243 ISP problems 251 keeping calm 251 note keeping 244 245 operating systems 240 plugs and cables 242 restart options 241 242 retracing steps 243 settings and options 243 software for 248 250 249 250 viruses 245 TrueCrypt 185 tunneled virtual interfaces 164 tunneling headers 161 162 TV cable connections 65 66 TVs 206 218 220 TWAIN interface 201 twisted pair cables 15 15 U UItraVNC 229 uncompressed audio files 209 210 U NII Unlicensed National Informa tion Infrastructure 79 United States Computer Emergency Readiness Team US CERT 189 niterruptible power supply UPS 61 Unix backup files 100 104 computer to network connections 117 127 127
257. networked receivers 214 Network Magic 248 249 249 Network Monitor 248 250 networks control centers designing 50 53 installing 58 68 60 63 65 for small networks 25 67 68 control devices 33 37 61 111 115 defined 1 3 designing 47 54 48 49 52 53 discovery 137 error messages 229 239 240 241 247 gateway configuration 115 hubs 120 installation cables 56 57 cable TV connections 64 66 connectors 55 56 control centers 50 53 58 68 60 63 65 DSL connections 22 62 64 99 expanding 67 small networks 25 67 68 surface boxes 55 56 telephone lines connecting 64 65 65 terminating network cables 66 67 wall plates 49 49 50 52 55 56 56 67 wiring 16 17 57 67 66 interface adapters Wi Fi 81 85 82 83 84 85 87 names See SSIDs notebooks 244 245 planning for 47 54 48 55 problems See troubleshooting profiles 118 security See also encryption methods access levels 152 administrators 152 Baseline Security Analyzer 188 188 controlling users 189 DoS denial of service attacks 189 firewalls 90 91 154 159 155 158 164 172 176 guest accounts 152 intruders 152 159 174 IP filters 159 MAC authentication 184 185 naming networks 177 179 178 passwords 90 133 136 154 143 152 154 154 205 physical security 184 185 port assignments port numbers 157 158 158 sneakernets 4 updates and patches 185 188 186 187 user accounts 152 wireless security 54 89
258. networks can operate at speeds up to 70 Mbps A 10Base T network is adequate for a small home network It s faster than most broadband Internet services so it s sufficient for handling the inbound and outbound data including audio and video that you exchange with the Internet However most new network ports hubs and switches can handle both 10Base T and 100Base T so there s very little point to limiting the network to the slower speed 100Base T will also allow you to move pictures music and videos and play multiplayer games within your own network much faster than a 10Base T network and it will not limit the speed of an 802 11n link Considering the insignificant difference in cost today s 100Base T networks are always a better choice than the older 10Base T versions Ifa 100Base T network can t handle 100 Mbps because of interference or some other problem it will automatically drop down to 10Base T A 10Base T device can work on a 100Base T network but it will force the whole network to drop down to 10 Mbps A Gigabit Ethernet network is lightning fast by today s standards but it s also more expensive than a network that uses slower equipment It might be appropriate for a business that moves very high volumes of data through its LAN As the cost of Gigabit Ethernet drops it will become the preferred choice for home and small business networks You might also see the word Ethernet used to identify the connector on a
259. nfo nostarch com www nostarch com Library of Congress Cataloging in Publication Data Ross John 1947 Network know how an essential guide for the accidental admin John Ross p cm Includes index ISBN 13 978 1 59327 191 6 ISBN 10 1 59327 191 3 1 Home computer networks 2 Computer networks Management I Title TK5105 75 R667 2009 004 6 dc22 2008052768 No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press Inc Other product and company names mentioned herein may be the trademarks of their respective owners Rather than use a trademark symbol with every occurrence of a trademarked name we are using the names only in an editorial fashion and to the benefit of the trademark owner with no intention of infringement of the trademark The information in this book is distributed on an As Is basis without warranty While every precaution has been taken in the preparation of this work neither the author nor No Starch Press Inc shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it www allitebooks com BRIEF CONTENTS Acknowledgments eode testet eese tr estne E Foe pede ges Ponte ed oreet xiii iren xv Chapter 1 How a Network Will Improve Your Life sss 1 Chapter 2 Types of Network Connections sss eee 9 Chapter 3 Hubs Switches and Rout
260. ng a Folder Sharing CO Share this folder Share this folder Share name bin Allow other people to write in this folder Comment Guest access for people without a user account cancel E create Share Figure 12 17 Use the Folder Sharing Figure 12 18 When you turn on the Share dialog to configure a directory as a this folder option the Folder Sharing dia network share log reveals more options 4 Select the options you want to apply to this share and click the Create Share button to save your choices Sharing from Konqueror If your desktop uses KDE and Konqueror follow these steps to create a share 1 Right click the folder or drive you want to share 2 Select the Permissions tab in the pop up Properties window as shown in Figure 12 19 Sharing Files Through Your Network 149 150 General Permissions Access Permissions Owner Can View amp Modify Content gt Group Can View Content Others Can View Content C Only owner can rename and delete folder content Advanced Permissions Ownership User jmr Group jmr L Apply changes to all subfolders and their contents X canca Figure 12 19 Konqueror s Permissions tab controls network access to a folder s contents 3 To configure a folder as a share use the drop down menus next to Group and Others to change access permissions and check the Apply
261. ng and security To share this folder with both network users and other users of this computer select the first check box below type a share name e this folder on the network name are T Allow network users to change my files Leam more about sharing and security Windows Firewall is configured to allow this folder to be shared with other computers on the network Mew your Windows Firewall settings 9 cw Figure 12 3 Select Share this folder on the network to assign a drive or folder to Level 4 Sharing Files Through Your Network 135 136 3 In the Network Sharing and Security section of the Properties window check the Share this folder on the network option 4 Make sure a checkmark does not appear in the Allow network users to change my files checkbox Click the box to remove an existing checkmark 5 Click OK to save your changes and close the Properties window Level 5 Level 5 drives files and folders have no protection against changes or deletions by any network user Anybody with access to a Level 5 file whether on the same computer or through the network can add change or delete that file In a Level 5 folder any user can also create a new file or folder or delete an existing one Obviously Level 5 is the lowest level of security essentially no security at all so you should only use Level 5 for files that you want to allow everybody on the network to change or delete As added protect
262. ng and security er To share this folder with other users of this computer only drag it to the Shared Documents folder To make this folder and its subfolders private so that only you have access select the following check box Make this folder private r Network sharing and security 33 To share this folder with both network users and other users of this computer select the first check box below and type a share name Share this folder on the network Share name Photos Allown Learn more about S lange my files X Windows Firewall is configured to allow this folder to be shared with other computers on the network View your Windows Firewall settings m wm Figure 9 2 Set sharing permissions for the folder that holds the files you want to store on your server When you work on a document or any other type of data file and when you download a file from the Internet use the Save As command to store the file through the network in one of the shared folders on the server To read view or listen to a file stored on the server either open the folder that contains the file you want and select the file or use the Open command in a program associated with that file type such as a word processor spreadsheet or media player and use the selection window or chooser to find the file The program should treat the file exactly the same as a file stored on your own computer Using N
263. nnect to Your Network 209 210 NOTE Chapter 15 Table 15 1 Common Audio File Formats File Extension Format Name Description wav WAV or Wave This is Microsoft s format for uncompressed audio Waveform Audio which has since been adopted by others It is widely used in audio archives mp3 MP3 or MPEG This is a compressed format for consumer audio It s not Layer 3 a high fidelity format but it is good enough for casual listening ogg Ogg Vorbis This is an open source compressed format It is widely used for free content flac Free Lossless Audio This is a compressed format that does not remove Codec FLAC content from the compressed file unlike MP3 or Ogg Vorbis Because this format is lossless a FLAC file is a more accurate copy of the original than other compressed file formats aiff Audio Interchange This is an uncompressed format introduced and mainly File Format used on Apple computers wma Windows Media This is a compressed format developed by Microsoft Audio and mainly used with Windows Media Player but it s also supported by other players ra or ram Real Audio Th is is Real Audio s family of formats for streaming Internet audio It is widely used by radio stations including the BBC bwv Broadcast Wave This is an uncompressed format established by the European Broadcasting Union for digital storage of audio files It is similar to WAV with additional space for metadata information about each file
264. nnected to this network Add Printer Wizard 4 Browse for Printer When the list of printers appears select the one you want to use Printer Shared printers s Microsoft Windows Network DESKTOP Samsung ML Samsung ML 1740 Sene B DESKTOP Printer information Comment Stalus Documents waiting Figure 14 5 The Browse for Printer screen shows a list of all the shared printers connected to this network 5 Select the name of the printer you want to use and click Next The wizard will ask if you want to use this printer as the default 6 Ifyou want this computer to send print jobs to this printer as the default click Yes If you want it to appear in a menu as a secondary choice click No 7 Click Next The wizard will confirm that you have added the printer to this computer s list 8 Click Finish to complete the wizard and close the window The name of the newly added printer should be visible in the Printers or Printers and Faxes window The process is similar in Windows Vista but the Add a printer command is in the toolbar directly above the window as shown in Figure 14 6 Click Add a printer 2 Click the Add a network wireless or Bluetooth printer option The wiz ard will display a list of all shared printers and printer servers connected to this network 3 Select the printer you want to use from this computer and click Next 4 The wizard will add this printer to your list
265. nostarch com Tracing route to nostarch com 72 32 92 4 over a maximum of 30 hops 1 4 ms 3 ms 3 ms 192 168 0 1 2 3 ms 3 ms 3 ms 192 168 0 1 3 71 ms 63 ms 64 ms blv nwnexus net 206 63 4 57 ms 53 ms 48 ms fe000 cr1 sea nwnexus net 206 63 74 1 5 44 ms 42 ms fe000 br4 sea nwnexus net 206 63 74 20 6 45 ms 43 ms 41 ms 204 181 35 197 7 42 ms 42 ms 43 ms sl bb20 sea 4 0 0 sprintlink net 144 232 6 121 o 8 9 10 11 12 13 14 15 86 ms 85 ms 87 ms sl bb25 chi 5 O sprintlink net 144 232 20 84 96 ms 97 ms 97 ms sl bb20 kc 2 0 sprintlink net 144 232 20 108 108 ms 109 ms 107 ms sl crsi fw 0 4 0 1 sprintlink net 144 232 20 56 110 ms 110 ms 108 ms sl st20 dal 1 O sprintlink net 144 232 9 136 99 ms 98 ms 97 ms sl racks 5 O sprintlink net 144 223 244 138 101 ms 98 ms 97 ms vlan903 core3 dfwi1 rackspace com 72 3 128 53 101 ms 100 ms 98 ms aggrii5a dfwi rackspace net 72 3 129 109 97 ms 100 ms 99 ms squidi4 laughingsquid net 72 32 92 4 Trace complete Listing 4 4 TraceRoute shows the path to a distant computer through the Internet In this case it took 15 hops to complete the connection The first two lines show the very fast response from the router sitting on the same table as the computer through a 6 foot cable Line 2 repeats line 1 because of a software problem in the router Line 3 whose domain name and IP address I have hidden is my Internet service provider s WAN a couple of miles aw
266. now how it works even if you choose not to use it As the name suggests the original intent of the wired equivalent privacy WEP protocol was to provide a level of security on wireless networks that was comparable to the security of a wired network That was the goal but a network that depends on WEP encryption is almost as vulnerable to intrusion as a network with no protection at all WEP will keep out the casual snoops and your free loading neighbors if they re not particularly adept at cracking encryption but WEP is not particularly effective against a dedicated intruder The more recent WPA encryption is always the better choice WEP encryption is intended to serve three functions It prevents unauth orized access to the network it performs an integrity check on each packet and it protects the data from eavesdroppers WEP uses a secret encryption key to encode data packets before a network client or an access point transmits them and it uses the same key to decode packets after it receives them The original standard used shared authentication in which the access point sends a challenge packet that a client must encrypt with the proper WEP key and send back However this opens a significant vulnerability by allowing a snooper to watch both parts of the exchange and derive the key The open authentication method which should be used by any net work using WEP not that any network should use WEP simply discards packets that
267. nsecure system Limit file shares to the files that you really want to share don t share entire drives Use password protection on every share Use the same firewall and other security tools that you would use on a wired network At best the wireless portion of your LAN is no more secure than the wired part so you should take all the same precautions Consider using a virtual private network VPN for added security Use a firewall program on every computer connected to the network including both wired and wireless nodes Wi Fi Networks 91 92 Chapter 8 It s important to take wireless network security seriously but don t let the security issues discourage you from using Wi Fi in your home or office unless you re moving very sensitive information through your network If you protect your network with encryption and other security tools you will probably keep all but the most determined hackers and crackers on the outside On the other hand if your small business handles customer billing information credit card data sensitive client or patient records personnel data such as Social Security numbers or any similar information that should remain confidential adding Wi Fi to your LAN creates an extremely attractive target If you must add Wi Fi access to your small business network use the strongest firewall you can find between the Wi Fi access point and the other computers on the network FILE SERVERS File serv
268. nt The client can be a program running on one or more of the household computers a stereo component a surround sound or home theater system or a tabletop boom box or Internet radio The client receives music files from a server or streaming audio program through the Internet and plays them through a set of headphones or speakers The quality of sound played through a network depends on several factors the quality of the original recording the amount of network traffic and the quality of the client s digital to analog converter and speakers For example if you re playing a music track that originated on a noisy cassette tape through the tiny and tinny speakers in your laptop computer the music will sound much worse than a track ripped from a CD and played through a good stereo amplifier and high fidelity speakers And if the network that connects the server to the client is already running close to its capacity or if it s using a noisy Wi Fi link you might hear repeated drop outs in the music when the client can t convert data packets to a continuous audio stream Playing Music Through a Computer A computer used as a music client must have an internal or external audio interface such as a sound card an interface on the computer s motherboard or an interface connected to the computer through a USB or FireWire port To play a music file open the file in an audio player program that supports the file s format just as you wo
269. ntosh Computer to a Network sssssse 124 Connecting Your Linux or Unix Computer to a Network sem 127 SUMMARY c5 os Ls teer een add te Sl Met coal eee ERE E POR pet ott 129 Contents in Detail ix 12 SHARING FILES THROUGH YOUR NETWORK 131 File Sharing in Windows XP sseceseeeceeseesseeneeeeteeceecneeeneesaesneeenseenteeesieenseenaees 132 Level Wes eben tate re textes odi n delest btee tita ecib ne to etie leet 133 Level 2 4 cre et ptt t te e te a di tea ee ete deter es 134 Level 3 citate t ctt dashes aeter dE eget eee iio lr Se itia 135 FOOD M M 135 level S3 cedet ique mtteaetatenedenit eite eese Mene ttaledonetgetes 136 File Sharing in Windows Vista sse eene 136 Nenwork Dis oVery coe eta MM A oce ree der ede ee Ee tees 137 File Sh ringi teneor er oper en he teer tete beached qusiess 137 Printer Sharing ecrit e Rope P b TERI Hx PR it cse ERR Fee CEPR ce 143 Password Protected Sharing 143 Mediai Sharifig ur e an ALD rss deesse iee a e tetas em o 143 File Sharing ona Macintosh cto it a enesi Meet e need EE ve ved 143 Connecting a Mac to a Windows SMB Network 143 Connecting from Older Mac Versions sss e 147 File Sharing in Linux and Unix sese e eem emen 147 Sharing from Linux or Unix Computers sss 147 Creating Shares on Linux and Unix Computers sse 149 Samba 353 eti e beer eR eter ere tede te Lee oe b ae
270. ntosh OS X and several versions of Linux and Unix I ll also tell you about some other ways you can use your network including automating household appliances and distributing digital audio and video to computers home entertainment systems and Internet radios throughout your house The ideal network is the one that you and the other people using your network never have to think about You would plug a cable from each computer into an outlet and every other computer on the network would immediately recognize it And the network would simply be there ready to use Or it would be completely invisible like the wires that provide electricity to the lamp next to the chair where you re reading this If you think about it you don t really want a network you want to see and hear files and other resources that are located beyond your own computer A network is the means to that end As I wrote this book I kept several goals in mind First I wanted to provide enough information that readers with some basic computer knowledge and skills could understand how networks work and how to plan and install their own small network second I wanted readers to think about additional uses for their networks and third I wanted to offer advice and tools for fixing a network that isn t working correctly If I have succeeded your network will be up and running shortly after you follow the book s instructions and recommendations Network Know How begins with
271. o distribution system along with your data network and you have to install your own cable from the service entry to the network control center it might be easier and cheaper to buy a pre assembled cable with the connectors already attached look for a cable close to the length you need don t use a 100 foot cable for a 20 foot run Use electrical tape or a cable tie to hold excess lengths of cable in a neat loop at one end If you have to install the video cable yourself find the service entry where the cable comes into your house or office String the cable along the ceiling or through the rafters under the floor to the control center then attach the cable to the F connector inside the outlet plate If there s a splitter with a spare connector at the service entry screw the plug at the end of the cable onto the unused socket If you can t find a splitter you ll have to install a new one or distribute your video from the control panel Installing the Network Control Center and Ethernet Cables 65 66 Chapter 6 If you re not connecting other outlets through the control center plug the cable from the service entry directly into your cable modem If you want to use the control panel to distribute cable TV signals to outlets throughout the house connect the cable from the service entrance to the input of a splitter and connect the outputs to your cable modem and the cables from each room Terminating the Network Cables If you
272. o hide cables and holes behind mop boards and other moldings After the wires are in place you ll have to patch the holes and repaint the walls Use an electrician s snake to pull or push cables through places that you can t reach with your hands When the end of the snake reaches the target location attach the end of the bulk cable to the snake with electrical tape and pull the snake and cable back from the other end It s a lot easier to route wires with a rigid snake a long thin piece of metal than to deal with loose cable flopping around inside a wall Remember to add a length of heavy twine as a pull line along with each cable or cable bundle that you pull through the walls In the future when you want to add another cable along the same route you can attach the cable to the pull line and pull it through without the need to create new holes in your walls You re going to connect a lot of cables to and through the control center so you will want to keep them out of sight in order to maintain a neat and clean appearance A 2 inch PVC pipe at the back of a closet or in some other hidden location can provide an inconspicuous route for cables between an upper floor or the attic and the basement or crawl space If the pipe runs through the space where the control center is located assemble a channel from two shorter pipes and a tee fitting about four or five feet above the floor Pipes fittings and glue are all available at your local hardwar
273. o identify the computers and other devices connected to a network and the people who use them Every computer connected to a network has a unique name and address within that network and every network connected to the Internet has its own unique numeric Internet address known as an JP address Numeric Addresses The technical committees international standards organizations and government agencies that manage the Internet have all agreed on a 32 bit numeric address format shown as four numbers between 0 and 255 separated by periods like this 192 168 3 200 When you read an IP address out loud you pronounce each digit separately and each period as dot So you would read this sample address as one nine two dot one six eight dot three dot two zero zero You can think of an IP address as similar to your telephone number Every computer connected to your LAN and every device or network connected to the Internet has a different address The agency responsible for assigning numeric IP addresses on the Internet is the Internet Assigned Names Authority IANA Some formal contracts with the US government are involved but the real reason IANA can provide this service to the worldwide Internet community is that every body agrees to respect their assignments As the owner of a small LAN you will never deal directly with IANA Your Internet service provider controls a block of numeric addresses and it will assign you one address or
274. o one of your computers but that might limit your opportunities for easy expansion of the network in the future 50 Chapter 5 www allitebooks com If you plan to distribute audio video telephone or home automation wiring around the house along with computer network data your control center should have enough space for all of the necessary equipment required by all those services It will be easier to pull two or more types of cables at the same time than to install each type separately A network control center can have several possible forms It could be a simple plywood panel attached to the wall or it might be a pre wired modular cabinet mounted on a wall or between the wall studs Or if you have the floor space it might be in one or more freestanding equipment racks The control center s location should have the following characteristics e Itshould be easily accessible Don t choose a location that forces you to climb over bicycles and storage boxes or push clothes on hangers aside to reach it e Itshould have enough light to allow you to see what you re doing at any time of day or night e Itshould be in a place that remains dry and has a stable temperature e Itshould be close to at least one electrical outlet e Itshould be relatively central in order to reduce the length of connect ing cables e Itshould be at or slightly below eye level so you can work comfortably e Itshould have enough space to allow for
275. o your network is similar to adding a computer except that you ll have to configure the printer server remotely from a com puter The usual routine is to connect the server to the network and the printer to the server and then use a web based configuration utility to set the server s network address and other options Follow the instructions supplied with the server to load the printer driver Another advantage of using a printer connected directly to the network is that it operates independently of the other computers on the network When a printer connects through a computer that computer must be on all the time or you have to create a public account that the rest of the family or office can use to print This setup is a lot less secure than printing through a server Printers and Other Devices on Your Network 193 194 WARNING Chapter 14 Wi Fi Printer Servers If your network already includes a Wi Fi access point you can use a Wi Fi printer server to connect your printer to the network The printer server should automatically detect the Wi Fi signal from your access point and establish a two way connection data in and printer status out between the printer and the computer that originated the print request The Wi Fi link should use all the same security tools such as WPA encryption as your other Wi Fi connections A Wi Fi printer shares the same wireless channel with other Wi Fi links on your network so a large document might
276. oad win 98 Install 1 0 W9XNT4Me EN US msl2tp exe Making the Connection in Windows When the VPN connection profile is in place it s easy to connect a Windows client to the host LAN or the Internet through the wireless VPN link Just double click the icon for the connection profile Windows will ask for a login and password and then make the connection If you mostly use your wireless connection to connect to the Internet you can make it the default connection which will open whenever you run a Network Security 169 170 Chapter 13 network application such as a web browser or email client program To make the VPN profile the default follow these steps 5 Open the Internet Properties window from the Control Panel Select the Connections tab In the Dial Up Settings section select the VPN connection profile from the list and click the Set Default button Click the Settings button In the Dial Up Settings section type your login and password on the VPN server Select the Dial whenever a network connection is not present option Selecting Windows XP and Vista Options Windows XP and Windows Vista offer many VPN options that were not available in earlier versions of Windows To set these options follow these steps l Choose the Network Connections window from the Control Panel Ifyou have a shortcut to your VPN connection on the desktop you can skip this step Double click the VPN icon A Connect VPN to Interne
277. odular structured wiring center 59 63 modulation 6 108 monitors multiple 229 232 230 231 motherboards 70 mounting brackets 56 56 mounting frames 59 MPEG Layer 3 MP3 files 208 209 210 210 MPlayer 218 MSN Messenger 158 Multimedia over Coax Alliance MoCA 17 music clients 211 212 213 devices 213 214 214 music servers 7 8 24 207 209 212 213 213 Muuss Mike 43 name 40 names and addresses 36 41 NAS network attached storage devices 93 95 97 98 98 100 108 NAT Network Address Translation 37 67 157 158 159 National Electric Code 51 Nautilus file browser 147 148 148 net 39 40 NetBEUI networks 162 NetBSD 159 164 173 Netgear 161 213 216 Netscape Navigator 174 network adapters for laptops 73 74 74 USB 73 Network Address Translation NAT 37 67 157 158 159 Network and Sharing Center 136 138 137 138 network applications MaxiVista 229 232 230 messaging 233 237 multiple monitors 229 232 230 231 overview of 225 remote controls 232 remote desktop programs 226 229 227 228 network attached storage NAS devices 93 95 97 98 98 100 108 network commands ifconfig 43 IPConfig 41 43 42 ping 36 43 43 44 TraceRoute 36 44 44 46 45 network compatible home appliances 223 INDEX 259 260 INDEX network configuration settings 117 129 118 129 network connections computer to network Linux 117 127 127 129 12
278. of pixels within a l inch 2 5 cm square space on the screen or any other image area Other Things You Can Connect to Your Network 219 220 To show a computer image on a TV screen the controller must adjust the number of scan lines or pixels to fit the area available on the monitor If the TV screen expects more scan lines or pixels than the incoming signal the controller will duplicate occasional lines or pixels or it will create a new line that is a blend of the one above and the one below If the computer sends too many scan lines or pixels the screen will skip some of them This process is called video scaling Video scaling has two effects It forces the video controller to work hard to change the size and sometimes the shape of the image which can slow down performance and it sends an image to the TV screen that can suffer from smeared colors looser focus jagged edges and distorted pictures A good controller can make adjustments that minimize these problems but don t be surprised if the image your computer displays on a TV screen even avery good high definition TV screen is not as sharp as the same image ona computer monitor a good DVI to HDMI image on an HDTV can be sharper than a VGA display when everything works together correctly but a mis matched system can be considerably less impressive Game Consoles Chapter 15 The most widely used game consoles Sony PlayStation2 or PlayStation3 Nintendo Wii and Xbox 36
279. oint or other device that normally acts as DHCP server for your network If the server is active and other computers on the network are connecting normally the problem is in your computer if it s not active either turn it on or confirm that this network doesn t use DHCP 2 Open the network configuration settings utility in your computer If the DHCP server is active confirm that the computer is set to accept data from the server if the network does not use DHCP make sure the addresses for the DNS server and the default gateway or gateway router are correct If the DNS server settings in your computer or DHCP server appear to be correct it s possible but unlikely that the DNS server itself is not working Try adding the address of one of the OpenDNS servers 208 67 222 222 or 208 67 220 220 as an alternative to your usual DNS server s address Failed Connection to a Specific Site When you try to connect to a specific website or other Internet service you will sometimes see an Unable to connect message instead of the web page or other screen you were expecting When this happens immediately try some other address that takes you to a site in a different geographical location for example if you can t connect to The New York Times website try a site based in Germany or Australia If you can connect to the second address you can safely assume that the problem is at the first address and not in your own computer or net
280. okmarks Tools Settings Window Help Qooco Pe a 0na E gt Location A smb local SSystem FA smb flocal a Home Folder e amp Lj Remote Places C 7 L E E Network Services e EERE TEs Desktop Tower Ej Local Desktop Tower Co Ej Mygroup Storage Media s Trash Ay Users Folders Al B 5 a uw j 2 Items No Files 2 Folders eee Figure 12 16 In Konqueror network computers are accessible as Samba Shares under Remote Places Click an icon to open a drive or folder 148 Chapter 12 Both Nautilus and Konqueror are basic graphic browsers that support the usual set of file management activities You can click an icon to open a folder or a file or drag and drop to copy a file from one computer to another Creating Shares on Linux and Unix Computers The general procedures for creating a shared directory in Gnome and KDE are similar Open a browser window that contains the directory you want to share right click the directory and change some settings Sharing from Gnome From a Gnome file browser follow these steps to create a share Right click the folder you want to share A pop up menu will appear 2 Choose Sharing options from the menu The dialog shown in Figure 12 17 will open 3 Check the Share this folder option The additional options shown in Fig ure 12 18 will become available a File Manager MEIE File Manager MEIE m Folder Shari
281. olver described in The Collective Wisdom of the Internet on page 247 for com puters using Windows or search for information about the problem in the web pages devoted to your own operating system Troubleshooting 245 246 Chapter 17 Configuration Settings When you can t connect your computer to the Internet but other computers on the same network can connect check the computer s network configura tion settings to confirm that the default gateway and the DNS server are present and correct If none of the network s computers can find the Internet check the settings on the network s router or modem To confirm that the gateway and the DNS server are alive and operating properly try sending ping requests to their numeric addresses If you don t receive a reply look for a problem in the gateway or the server or in the equipment and cables between your computer and the target DHCP Settings DNS and Default Gateway When a DHCP server is active on your network and your own computer or the one you re troubleshooting is set to accept DHCP settings the computer should automatically connect itself to the network But if there s no DHCP server or if the computer is not configured to accept DHCP data from a server and the settings on the computer itself are missing or incorrect the computer won t connect To confirm that the DHCP settings are correct follow these steps 1 Check the modem router Wi Fi access p
282. on Some access points can also accept commands through a wireless link but after you turn off the wireless function you ll need a wired connection to turn it back on again Wi Fi Networks 85 86 Chapter 8 The most common method for configuring an access point is through a web based configuration utility In other words the access point s configur ation options all appear on one or more web pages that appear when you point your computer s web browser to the access point s IP address Each make and model of access point uses a somewhat different config uration program so the manual supplied with each device is your best source of specific instructions However they all include similar options The most important settings include DHCP Many networks use Dynamic Host Configuration Protocol DHCP to automatically assign IP addresses from a DHCP host or DHCP server The alternative is to manually assign a numeric IP address to each computer and other device connected to the network The access point s configu ration utility includes an option to use the access point as the network s DHCP server IP address You must either set the access point to accept an IP address from another device a dynamic IP address or manually enter an address for the access point Wireless network name Each network should have a distinctive name called a Service Set Identifier SSID This is the name that users will select from a list of net
283. on the network nodes located at the fringes of the access point s coverage area Many Wi Fi adapters and access points use antenna connectors that are not the same as the standard cable connectors on antennas In order to match the two you must use a short cable adapter not to be confused with a network interface adapter called a pigtail Pigtails are often available directly from the companies that make Wi Fi adapters and access points but these OEM original equipment manufacturer parts are extremely expensive Cables that do the same job equally well are available for a fraction of the OEM prices from specialty cable suppliers Run a web search on Wi Fi pigtails to find a place where you can order inexpensive adapter cables Wi Fi Control Programs Before you can move data through a Wi Fi network you must configure the network s base station to specify the operating channel you want to use the password for data encryption and other characteristics of the network In addition each wireless network adapter must also run a control program Access Point Configuration Programs Your access point should have at least one wired connection to a computer in order to set and change the configuration settings Depending on the make and model you re using this connection might be through an Ethernet port a USB port or a serial data port The access point uses this connection to accept configuration and setup commands and to send status informati
284. onal hard drives The sound quality of the most common sound cards and built in sound processing on many motherboards is adequate for casual listening However the quality is not as good as an audiophile or studio quality sound card or external interface unit that adds less background noise and distortion to your files If you re creating your own files from CDs or uncompressed digital program sources you will probably want to upgrade your sound card from the Sound Blaster interface supplied with your computer On the other hand if you get all your music by downloading MP3 files from iTunes or one of the other online services or if you convert your music from CDs LPs or other sources to highly compressed MP3 files you won t notice the difference The choice of operating system Windows Macintosh or Linux is a matter of personal preference all three can work as music servers If you re already using Windows Home Server to control your home network and share other files the same server can stream audio and video to other network computers Microsoft s Windows Media Center included in some versions of Windows Vista and available as a separate add in product is primarily a media player but when you connect it to a device that has the Media Center Extender technology in place you can use the Media Center computer to serve audio and video files to other computers game consoles and televisions For mixed networks XMBC
285. one or cable TV outlet in your control center This is the same kind of outlet that you are already using to connect a telephone or TV set If you re getting Internet service from your cable TV company you can sometimes convince the installer to run a cable to your control center But if you have DSL or some other type of Internet service from the telephone company you might have to install your own wiring Connecting a Telephone Line If you have DSL or some other kind of Internet service from the telephone company you will need a telephone outlet with a four pin socket called an RJ 11 jack This is the same kind of socket that you use to plug in a tele phone set Mount the outlet block on your panel about a foot above the power strip You can use either conventional telephone cable with two pairs of wires inside or the same four pair data cable that you use for your computer network to connect the outlet block on the control panel back to the distri bution block that connects your telephones to the service entry If you use telephone cable be sure to match the colors of the wires to the letters on the outlet blocks at both ends R red Y yellow G green and B black If you use data cable use the color codes in Table 6 1 Table 6 1 Data Cable Color Codes for Telephone Lines Terminal Color Data Cable Color Green Blue Red Blue White Black Orange Yellow Orange White Use a cable stripping tool to remove about two in
286. onitors e A rectangular multipin digital input known as a digital visual interface DVI connector e A19 pin or 29 pin digital socket known as a High Definition Multimedia Interface HDMI connector The easiest way to feed a signal to your TV from the computer is to find a video controller for your computer that has outputs that match your TV s inputs but that s not always possible For example you won t find a video controller that can directly feed an old analog TV with nothing but an F connector as signal input or an even older set with screw terminals The alternative is to use some kind of adapter a special cable with different cables on each end or a converter that changes the output signal from the computer to a signal compatible with the TV s input For best quality with an HDTV screen use either a DVI to DVI cable or a DVI to HDMI cable or adapter depending on the TV s inputs Look for an adapter or converter at an electronics retailer Video Output Drivers Driver software for video controllers can come from several possible sources bundled with your computer s operating system or supplied by the maker of the video controller or the controller s chipset or with a video converter The control program for each driver package is different so you ll have to follow the printed or onscreen instructions when you install the software Video Scaling Putting aside the issues related to converting between analog and digital
287. ons of millions of their customers eff org nsa FREE SPEECH EFF s Coders Rights Project is defending the rights of programmers and security researchers to publish their findings without fear of legal challenges eff org freespeech INNOVATION EFF s Patent Busting Project challenges overbroad patents that threaten technological innovation eff org patent FAIR USE EFF is fighting prohibitive standards that would take away your right to receive and use over the air television broadcasts any way you choose eff org P fairuse TRANSPARENCY EFF has developed the Switzerland Network Testing Tool to give individuals the tools to test for covert traffic filtering eff org transparency INTERNATIONAL EFF is working to ensure that international treaties do not restrict our free speech privacy or digital consumer rights eff org global E F F ER ie ELECTRONIC FRONTIER FOUNDATION EFF is a member supported organization Join Now WWW eff org Support STEAL THIS COMPUTER BOOK 4 0 UBUNTU FOR NON GEEKS SRD EDITION 2ND EDITION HACKING THE ART OF EXPLOITATION JON ERICKSON More no nonsense books from no starch press STEAL THIS COMPUTER BOOK 1 0 What They Won t Tell You About the Internet by WALLACE WANG This offbeat non technical book examines what hackers do how they do it and how readers can protect themselves Informative irreverent and enter taining the completely revised fourth edition o
288. ooking at the status lights on the modem router or switch You won t need this phone very often but when something goes wrong you will be happy to have it Use a cell phone ora cordless handset if you have one or install an inexpensive wall phone on or near the control panel If possible look for a simple desk or wall phone that does not require an external power supply Tabletop Control Centers for Small Networks You don t need a separate control center for a small network that connects computers in just a few rooms It s often easier to place the modem and router in one room and run data cables directly to each of the other rooms You can place the modem and router on your computer table or on a nearby bookshelf Leviton and other manufacturers make wall plates that can hold up to six or eight data outlets in the same space as a dual AC outlet That should be enough for a small network if you need more add a second wall plate or replace the first one with a dual width plate When it s time to expand your network you have two options You can run new wiring from the original control room to the new location or you can add a downstream switch in the room closest to the location and run a Installing the Network Control Center and Ethernet Cables 67 68 NOTE Chapter 6 data cable from there The second approach can be particularly convenient when the new location shares a wall with a room that already has a data outlet
289. op Access To configure a Windows XP computer to accept Remote Desktop access follow these steps l Right click My Computer A pop up menu will appear 2 Select Properties from the menu The System Properties window will open 3 Click the Remote tab The dialog shown in Figure 16 1 will appear System Properties 3 x General ComputerName Hardware Advanced System Restore Automatic Updates Remote 5 Select the ways that this computer can be used from another location r Remote Assistance Allow Remote Assistance invitations to be sent from this computer hat is Remote Assistance ry Remote Desktop Allow users to connect remotely to this computer Full computer name tower What is Ramote Desktop Select Remote Users For users to connect remotely to this computer the user account must have a password Windows Firewall will be confiqured to allow Remote Desktop connections to this computer 9 se oe Figure 16 1 The Remote tab in System Properties controls inbound and outbound access to the Windows Remote Desktop utility 4 Touse this computer to control other computers remotely on your net work check the Allow Remote Assistance invitations option in the Remote Assistance area 5 To permit another computer on your network to take control of this computer check the Allow users to connect remotely option 6 When Allow users to connect remotely to this computer is tu
290. or DVI connector on your computer If your video controller doesn t have an extra video output install another video controller card in an empty expansion slot Don t worry about high performance and memory unless you re playing bleeding edge games you can use an old PCI video card with as little as 8 or 16 MB of memory from your junk box or a second hand computer store None of this requires MaxiVista You can use the Display Properties controls in Windows to extend your desktop to additional monitor screens But if you want to use a laptop computer as your second screen or if you already have two or more networked computers on the same table or countertop MaxiVista allows you to use the monitors on those additional computers as extended screens and switch back to normal use when that s more convenient If you already have both a laptop and a desktop computer MaxiVista allows you to try an extended screen without the need to haul out any extra hardware just plug your laptop into the network install the free trial version of MaxiVista and reconfigure your Display Properties settings as shown in Figure 16 5 Display Properties 2 x Drag the monitor icons to match the physical arrangement of your monitors Display 2 Radius RADS on RADEON 9600 SERIES Secondary Screen resolution Color quality less J More Highest 32 bit 7 1024 by 768 prets E E NES E Use this device as the primary monitor v Extend
291. or if you re a slave to fashionable footwear you can think of it as Oxfordnet or Slingbacknet or Espadrillenet instead Whatever you choose to call it physically carrying files from one place to another is often a distracting time consuming nuisance However sneakernet does have its uses When you travel it can often be easier and more convenient to carry a few files with you rather than retrieve them from a distant computer through the Internet If you plan to use com puters in two or more locations such as one at school and another at home you might be better off storing the file on a small portable drive instead of hauling your laptop around When security is an important issue you might not want to connect your computer to any network The very best way to protect your confidential data from theft through a network is to make sure the computer where the data is stored has no network access Sneakernet is not always the slowest way to move data from one computer to another If you want to move a lot of data over a relatively short distance when you don t have a high speed data connection it can often be faster to drive a handful of DVDs or a box of tapes across town than to send the same files through a dial up connection or any other slow network link It s one of the oldest maxims in the world of computers and networks but it s still true Never underestimate the bandwidth of a station wagon full of floppy disks
292. or low cost email services such as Hotmail Gmail or any of the others described at hitp www emailaddresses com Adding one or more file servers to a network to share resources goes a long way toward increasing the value of your computers You can certainly operate your small network without any servers but like the network itself a central storage location for documents images and other files is often a lot more convenient than storing everything on individual users machines especially if you can use an old computer as a server that would otherwise continue to collect dust in a storage closet File Servers 105 CONNECTING YOUR NETWORK TO THE INTERNET network file sharing internal web hosting and so forth are handy but the main reason that most people want to connect all of their household computers together is to share a high speed Internet connection In a business those other services are more important than they are at home but Internet access for everybody is still important This chapter explains how to connect a net work to the Internet and how to set up each computer to connect to the Internet through the network The Internet is often described as a network of networks In other words the Internet provides a way to exchange data between your own LAN and millions of other networks Before you can exchange data between your local network and the Internet however you or your network manager must
293. ored on the computer even if you never sent that data over the wireless network This type of attack might be relatively rare casual snoopers are unlikely to take the time to snoop around on the chance you have some thing interesting but it still presents a real risk Also many popular websites encrypt the login page with SSL encryption via HTTPS but they don t encrypt subsequent pages to reduce the drain on processing power your password might be secure but any email you read via the web mail interface might not be and attackers might be able to steal the cookie a unique piece of data passed with web data that identifies your login and open your mailbox directly Protecting Your Network and Your Data As the operator of a Wi Fi network what can you do to keep outsiders out You can employ a few techniques that can discourage them First you can accept the fact that wireless networks are not completely secure and use the built in network security features to slow down would be intruders second you can supplement your wireless router s built in tools with a hardware or software firewall or both to isolate the wireless network and third you can use additional encryption such as a VPN to secure traffic to the network The security features of the early Wi Fi protocols WEP encryption were not adequate to protect data The wireless equivalent privacy WEP protocol had several serious flaws The basic encryption method the RC4 a
294. orks security selective backups 100 serial data communications channels 11 Series2 Dual Tuner DVRs 216 Single Tuner DVRs 216 Series3 HD DVRs 216 Server Message Block SMB protocol 131 143 145 147 146 150 servers See also file servers 2X Terminal Server 226 Apache web server 95 156 audio music 7 8 207 209 212 213 213 audiophile music 209 client and server structures 23 25 25 computer for 94 DHCP 38 109 115 111 112 117 118 124 126 126 129 157 158 163 DNS 40 41 42 43 44 109 115 118 124 127 246 file storage 24 96 97 file transfer 39 firewall 24 game 24 HTTP web 158 internal external printer 192 192 193 mail 24 message 234 printer 7 25 25 193 197 Public DNS 41 root 40 stereo component music 208 types of 24 25 25 USB device 99 99 100 video 7 8 215 VPN 161 162 165 165 167 169 168 Windows Home Server 95 96 96 208 215 server side backup programs 104 Service Set Identifiers SSIDs 86 90 177 179 178 183 244 283 shared directories 150 shared folders 5 139 141 150 shared Internet connections 6 Shared Key Security field 180 shared printers 7 143 196 196 199 198 199 shares 139 sharing permissions 96 97 97 shoulder surfing 184 Silex Technology 99 Simple File Sharing 132 132 133 136 Slim Devices 213 214 214 smart home appliances 223 SMB Server Message Block protocol 131 143 145 147 146 150 SMTP outgoing m
295. ormation in a particular format For example web browsers such as Firefox Opera and Internet Explorer are all clients that use the HTTP HyperText Transfer Protocol commands specified by the World Wide Web Consortium every web server in the world recognizes those commands A client and server are not always connected to the same LAN some times they connect through the Internet or through a large corporate WAN Wide Area Network For example when you download a page from a website or a music file from a service such as iTunes or Zune you re using your own computer as a client to obtain something from a web server A network can take advantage of many kinds of clients and servers Here are just a few Mail server A computer that handles inbound and outbound mail for all network users File server A computer that stores data files and makes them available through any computer connected to the network Music server A specialized file server that stores music files and makes them available to computers and home entertainment systems Firewall server A computer that acts as a security firewall between the other computers on the network and the rest of the world Game server A computer that acts as host for a multiplayer game A server can be a separate computer that runs only specialized server software a general purpose computer that runs server programs along with other programs or an even more specialized device that contains a special
296. osoft introduced a completely new file sharing method in Windows Vista It s still necessary to turn on file sharing but the whole process is no longer as complicated as the earlier Simple File Sharing method because many of the network file sharing functions are consolidated into the Network and Sharing Center shown in Figure 12 4 To open the Network and Sharing Center start at the Control Panel and select Network and Internet gt Net work and Sharing Center If you re using the Classic View of the Control Panel you can go directly to the Network and Sharing Center QU amp gt Control Panel Network and Sharing Center 491 Search File Edit View Tools Help Network and Sharing Center View full map B a va TOWER Internet This computer Wis Local Private network Customize Access Local and Internet Connection Local Area Connection View status Sharing and Discovery Network discovery File sharing Public folder sharing Printer sharing Password protected sharing Media sharing On Show me all the files and folders am sharing See also Internet Options Windows Firewall Show me all the shared network folders on this computer Figure 12 4 The Network and Sharing Center controls many file sharing functions Network Discovery One important new setting in Vista is called network discovery When network discovery is turned on your computer is visible to other computers on the same LAN an
297. ou connect a terminal to a control device the output pins on the DTE device connect to the input pins on the DCE device The problem arises when you want to connect two computers without a control device in between Direct computer to computer communication requires a special cable because you can t connect a DTE device directly to another DTE device When you connect two DTE devices with serial data ports you connect the output on one computer to the output on the other computer and the input to the input so neither computer will actually receive any data Therefore you must flip the connections so each output connects to an input A cable or adapter that connects output pins to input pins is called a null modem Figure 2 6 shows a typical null modem adapter pe te nek ih TT Figure 2 6 A null modem adapter or cable connects inputs directly to outputs NOTE The data moves in only one direction rule does not apply to data moving through coaxial cable which can handle inbound and outbound signals modulated at different frequencies through the same cable Point to Point Networks Most of the time we think of a computer network as a structure that can link one computer to any other computer connected to the same network But sometimes all you need is a direct connection between two computers This kind of connection is called a point to point network Figure 2 7 shows both network types A point to point connection is handy w
298. ou enter into a network device must be exactly the same as the one stored in the access point Obviously typing 64 digits correctly is not something that you want to do frequently so the ASCII alternative is the better choice for most users For optimal security the ASCII passphrase you assign to your network should be a random mixture of at least 20 characters including letters capitals and lowercase numbers and punctuation marks A PSK network uses the passphrase to set up the initial connection between a client such as a computer or PDA and the access point After the connection is in place the TKIP assigns new encryption keys to every packet or group of packets The PSK combines with your network SSID to calculate the final key value Choosing a unique SSID and a strong passphrase is important Attackers can build large tables of SSID and PSK pairs for common network names and dictionary words performing weeks of calculation once with the payoff of nearly instantly determining the key of any network that matches that pair of values Choosing strong passphrases and unique SSIDs can mitigate this attack Using WPA Encryption When you set up a new network the security section of the access point s configuration software will ask if you want to use encryption and if so whether you want WEP or WPA encryption Unless you re planning to run an open access network you should choose WPA In many cases the access point will offer
299. ou need updates for Windows your programs your hardware or Merge spk acyl is your devices set to receive e tea security amp critical Express Get high priority updates updates Restore hidden recommended automatically updates Pick a time to Change settings Custom Select from optional and install updates FAQ high priority updates for Windows and other Get help and programs support Concerned about privacy When you check for updates basic information about Use your computer not you is used to determine which updates your programs need administrator To learn more see our privacy statement Microsoft Update Privacy Statement 2008 Microsoft Corporation All rights reserved Terms of Use Trademarks Privacy L Done T T T T T inteme Figure 13 20 Use the Custom button to search for nonessential updates After the program completes its search for new programs it will display a list like the one shown in Figure 13 21 Use the list of update types in the left column to display a list of available updates in each category Don t forget to scroll down the list to see all the categories Microsoft ANN Windows Internet Ee jslx vir x Aje Q ER EHE Quick Links Home Worldwide 4 Search Microsoft com for Go Microsoft CustomzexouLresulu LL C C C CC A Update Home PLAN da Select High Priority Updates Install To help protect
300. p with a video stream and even a wired 100 BaseT network might overload if you try to push through more than one video stream at the same time When you want to download a movie or some other large video file through the Internet it s often better to save the file to your computer s hard drive rather than trying to view it as the computer receives it because the download speed is often too slow for the video player program to assemble the digital packets and display them as a continuous stream On the other hand when all the bits are already on a DVD or hard drive the video player can play the stream without the need to wait for more bits to arrive You can think of the stream of incoming bits as a garden hose that fills a watering pail with a slow trickle of water if you pour out water more quickly than the hose fills the pail you must refill the pail before you can pour more water The same thing applies to video files through a network If the data packets that contain the video stream enter your network more slowly than the video player assembles and displays them the player s buffer will run out of bits and stop displaying anything until it receives more Video Servers A video server is a network server that stores movies and other video files and sends them through the network to video player programs on client computers or video players Most video servers can also store and distribute music files Some computer operating system
301. printed and bound at Malloy Incorporated in Ann Arbor Michigan The paper is Glatfelter Spring Forge 60 Antique Eggshell which is certified by the Sustainable Forestry Initiative SFI The book uses a RepKover binding which allows it to lay flat when open UPDATES Visit hitp www nostarch com networks him for updates errata and other information OLLI ULLAL RE MADE PAINLESS m 3 T n NN Are the machines in your office living isolated lives Do you have a few computers at home that you want to connect to each other and the Internet The best way to share files on a group of computers is to create a network But how do you do that Network Know How is your guide to connecting your machines filled with practical advice that will show you how to get things done You ll learn the nitty gritty of network setup design and maintenance from running cables and placing wireless access points to configuring file sharing and printing This practical and comprehensive guide will teach you how to implement security create intranets and more You ll learn how to Connect Windows Macintosh and Linux computers Implement network addressing Configure your network adapters hubs switches and router e Share music photos and documents no starch press ISBN 978 1 59327 191 6 n 781593 271916 il Automate household appliances and distribute digital audio and video to your home entertainment
302. ption shown in Figure 10 2 must be active Internet Protocol TCP IP PF x General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically C Use the following IP address C Obtain DNS server address automatically amp Use the following DNS server addresses Preferred DNS server 198 137 231 1 Alternate DNS server 206 63 63 1 Figure 10 2 When the Obtain an IP address automatically option is active Windows uses the network s DHCP server to set its IP address In Macintosh OS X the Configure IPv4 option shown in Figure 10 3 must be set to Using DHCP e The IP address number assigned by the DHCP server must be within one of the reserved ranges In almost all cases you don t have to change the server s default values Most hubs routers modems and Wi Fi access points use one or more web based pages such as the one shown in Figure 10 4 to display and change the DHCP server s settings However the pages supplied with just about every make and model of network control device are organized slightly differently So you must consult the manual supplied with your device or the manufacturer s website for specific instructions Connecting Your Network to the Internet TH 112 Chapter 10 60 Network xo
303. r The port type must be set to the correct VPN protocol for example PPTP or L2TP and the profile for each connection must include the type of encryption in use Windows offers three encryption strength options Basic Uses a 40 bit encryption key Strong Uses a 56 bit encryption key Strongest Uses a 128 bit encryption key VPN Servers for Linux Unix All of the BSD variations including FreeBSD NetBSD OpenBSD and Mac OS X include an IPsec VPN client and server as part of the release package Linux FreeS WAN is the most popular implementation of IPsec for Linux Go to hitp www freeswan org for downloads documentation and access to the community of FreeS WAN users OpenVPN is an SSL based VPN solution for Linux BSD OS X and Windows OpenVPN is easy to configure and offers both routed VPN traffic to specific destinations is sent through the VPN and tunneled virtual interfaces emulating a physical layer Ethernet device which can pass non IP traffic through the VPN OpenVPN can be found at Attp openvpn net If you re using a Linux firewall you might want to consider VPN Masquerade Linux uses the IP Masquerade function in the Linux kernel to share a single connection to the Internet among multiple clients VPN Masquerade is the section of IP Masquerade that supports IPsec clients The HOWTO for Linux VPN Masquerade is at hitp tldp org HOWTO VPNMasquerade HOWTO html Network Hardware with Built In VPN Support A dedica
304. r causing hardware to break down Two important objectives of network security are to limit access to author ized users and to keep those same users away from configuration settings and confidential data The most important tools for maintaining a secure network include different access levels for different users passwords and firewalls If they re not adequate more complex methods are also possible including kernel level mandatory access control systems authentication and authoriza tion mechanisms and data encryption User Accounts and Access Levels Almost all computer operating systems have at least two levels of user accounts administrators and users Administrators have access to all of the computer s configuration settings such as installing or removing printers joining a net work and so forth Users can read and write programs and data files assigned to their own accounts and to resources whose owners allow other people to use them On a network a guest account has its own access settings for those who use a computer s resources through the network rather than through the keyboard and other input devices connected directly to each computer Each user has exclusive control of his or her files The owner of every account can set access controls on files that keep them either private and confidential or public and accessible to other users Even if other users have accounts on the same computer they can t read somebody else
305. r existing password or a new password and click the Save button 7 Confirm that you can now log in to the Mac from another computer connected to the network If it works the process is complete 8 Ifyou can t log in to the Mac from another computer try changing the user s password Setting the Workgroup Name Each computer on the network should use the same SMB workgroup name but the default in Mac OS X is WORKGROUP which is probably not the name your Windows network uses To change the workgroup name on a Mac follow these steps 1 Select Applications gt Utilities Directory Access 2 Click the padlock icon to identify yourself as an administrator 3 Select SMB CIFS from the list of services as shown in Figure 12 13 eoo Directory Access f Services Authentication Contacts Enable Name Version Active Directory 1 5 8 M AppleTalk 1 2 v Bonjour 1 2 Lj BSD Flat File and NIS 1 2 2 m LDAPv3 1 7 4 LJ Netlnfo 1 7 4 M sip 1 3 1 Configure J 3 Click the lock to prevent further changes Revert Apply Figure 12 13 Select SMB CIFS from the list of services 4 Select Configure The program will scan the network and display a list of workgroups On most small networks you will see only one workgroup name 5 Select the workgroup name you want to use and click OK Click Apply and quit Directory Access Sharing Files Through Your Network 145 146 Chapter 12 Turning on Windows File
306. r has a built in Ethernet port the driver software that instructs the central processor how to handle network data is on the software disc supplied with the computer or the motherboard If your computer came with the operating system already installed the driver is already in place However if you assemble your own computer from parts you might have to install the network driver supplied with the motherboard or a third party after you load the Windows Linux or Unix operating system Figure 7 2 Most new computers come with Ethernet ports as standard features Setting the BIOS Utility If your computer has a built in Ethernet interface it s sometimes necessary to turn off that interface and use a network adapter on an expansion card or some other kind of external network interface This might happen when you want to use a faster network than your built in adapter can handle such as a Gigabit Ethernet network or if the onboard network controller doesn t work correctly To turn off the internal network interface you must open the computer s BIOS settings utility and find the option that enables or disables the onboard LAN controller or some other option with a similar name In most BIOS utilities the LAN option is buried under two or three menu levels The BIOS settings utility is a set of controls that load configuration settings when you turn on the computer These settings are an essential part of the computer s startup seque
307. r that identifies the type of server For example web servers operate on port 80 and FTP servers use port 21 so those port numbers are part of the request for access To accept access requests to a server you must instruct the firewall s Network Address Translation NAT function to forward those requests to a specific computer within the LAN Table 13 2 lists the most common service port numbers Hundreds of other port numbers have been assigned but you will never see most of them in actual use The official list of port assignments is available online at hitp www iana org assignments port numbers NAT assumes that each internal server s IP address doesn t change from one request to the next A web server on 192 168 0 23 today won t migrate to 192 168 0 47 next week That s generally not a problem on a wired network but in a wireless setting where network clients join and leave the network all the time the DHCP server automatically assigns the next available address to each new client If one of those clients is the home of one of the network s Network Security 157 158 Chapter 13 service ports the NAT probably won t find it This problem is not common because most networks don t use portable computers as servers but it can happen The solution is to turn off the DHCP server and assign a permanent IP address to each client Table 13 2 Common TCP IP Service Port Numbers Port Number Internet Service 20 FTP Data
308. rands of equipment in the same network Today more than 85 percent of all local area networks LANs including just about every modern home and office network use some form of Ethernet to provide the physical connection between computers through twisted pair cables coaxial cables or fiber optic cables One of Ethernet s most important features is the method it uses to prevent conflicts among nodes called Carrier Sense Multiple Access with Collision Detection CSMA CD Every time a network node is ready to transmit a frame it checks if another frame is already using the network if the network is clear the node sends the frame But if the node detects that another frame is using the net work a condition called a collision it waits a random period of time before it tries again CSMA CD is important because it allows a relatively large number of computers and other devices to operate through the same network without interference There are many Ethernet specifications that cover different data transfer speeds and different kinds of cables and connectors The ones you re most likely to see in a small LAN include the following e 10Base T 10 Mbps through twisted pair cables e 100Base T or Fast Ethernet 100 Mbps through twisted pair cables e l000Base T or Gigabit Ethernet 1000 Mbps through twisted pair or fiber optic cables e Wireless or Wi Fi any of several systems that use radio signals instead of wires the latest 802 11n Wi Fi
309. rate the computer On some computers the LINK and 10 100 lights might remain on when the computer is turned off This happens when the computer s BIOS has a wake on LAN feature that turns on the computer if the adapter receives an incoming signal Even if this feature is disabled the computer keeps the network port alive whenever the power supply is turned on The only way to disable the network adapter completely is to either unplug the AC power or turn off the power switch on the back of the power supply Ethernet Network Interfaces 75 WI FI NETWORKS Wi Fi short for Wireless Fidelity pro nounced why fie networks use radio signals instead of Ethernet cables to connect computers and other devices to a LAN Wi Fi is a convenient alternative to conventional wired networks because any wireless enabled computer within range of the Wi Fi signal can join the network there s no need to find a network outlet This can be particularly useful when it s not practical to pull data cables through walls ceilings and floors and when a user wants to connect a laptop computer or a handheld device such as an iPhone or BlackBerry to an existing network or through a LAN to the Internet And of course thousands of Wi Fi hotspots in public spaces such as airports coffee shops libraries and schools offer easy access to the Internet when you re away from your own home or office However Wi Fi connections are far less secure than wired
310. rd compatible with 64 bit encryption but compatibility is not auto matic so all of the devices on a mixed network of 128 bit and 64 bit devices will operate at 64 bits If your access point and all of your adapters accept 128 bit encryption use a 128 bit key But if you want your network to be com patible with adapters and access points that only recognize 64 bit encryption set the entire network to use 64 bit keys In practice the choice of 64 or 128 bit WEP encryption doesn t make much difference Tools are easily available that can crack both types although cracking a 128 bit key might take a bit longer Is Your Key ASCII or Hex The length of the key is not the only confusing thing about setting WEP encryption Some programs request the key as a string of ASCII characters but many others want the key in hexadecimal hex numbers Still others can generate the key from an optional passphrase Each ASCII character has 8 bits so a 40 bit or 64 bit WEP key contains 5 characters and a 104 bit or 128 bit key has 13 characters In hex each character uses 4 bits so a 40 bit key has 10 hex characters and a 128 bit key has 26 characters In Figure 13 18 the Wireless Setting screen for a D Link access point the 40 bit Shared Key Security field uses hex characters so it has space for 10 characters The D Link program runs all 10 characters together in asingle string but some others split them into 5 sets of 2 digits or 2 sets of 5 Th
311. rds they grab each block of data a frame as it passes in or out of your computer and they display the contents of the frame along with detailed information about the form and structure of each frame Figure 17 3 shows a data capture in Network Monitor and Figure 17 4 shows a Wireshark screen The two programs capture the same data stream but they handle and display it differently The programs are available at no cost so you might want to install both of them Protocol analyzers are also known as network sniffers 3 Network Magic Pro My Network File View Tools Help Figure 17 2 Network Magic scans your LAN and displays all the devices connected to it Most of this data display looks like hexadecimal gibberish but it contains the actual text of messages conversations and other transactions along with all the commands and status messages that move through the network Most of the time you can allow your computer and the network plumbing to handle the data in background But when something goes wrong the data captured by a protocol analyzer can help you identify what s causing the problem For example if the amount of incoming or outgoing traffic moving through your network increases the network may be sending or receiving many requests every second This could be a hacker s denial of service attack or a computer that has innocently latched itself into an endless program loop Either way you will want to identify the source
312. re 14 4 Use the Sharing tab of the printer s Properties dialog to turn on sharing 4 In Windows XP select the Share this printer option In Vista click the Change sharing options button click Continue in the User Account Control window and then select Share this printer 5 In the Share name field type a name that identifies this printer such as Don s Printer In Windows Vista the Sharing tab includes an option to render print jobs on client computers If the other computers on the network use Windows XP or some other operating system leave this option turned off But if other Vista computers will be sending print jobs to this printer you can speed up the printer s performance by checking this option Installing the Printer on Each Computer After you set up the computer acting as a printer server to accept print jobs through your network you must also add the server to each computer s list of printers Follow these steps to add a network printer in Windows XP 1 From the Control Panel select Printers and Faxes The Printers window will open 2 Double click Add a Printer to open the Add Printer Wizard The Welcome screen will appear 3 Click Next The Local or Network Printer screen will appear Printers and Other Devices on Your Network 197 198 Chapter 14 4 Select the network printer option and click Next The Browse for Printer screen shown in Figure 14 5 will appear along with a list of shared printers co
313. re flexible and powerful than the individual computers connected to it As you plan a new network or expand the one you already have you should think about each network activity as either a client program that runs on local computers or a server that supplies the program from a central source Types of Network Connections 23 24 NOTE Chapter 2 It s important to understand that a server is not always a dedicated computer in many small networks one or more server programs run on the same computer that is also used by one of the network s users for day to day activity For example if you store your entire collection of music files on one computer and play those files from other computers connected to it through your network the computer that contains all the files is a storage server and each of the players is a client Or if you print documents by sending them to another computer or a stand alone printer through the network the computer or the special network node device that controls the printer is a printer server A server almost always communicates with users that s you and me through a client It s rare for anybody except the system manager or main tenance people to work directly with a server program The software that sends instructions to a server and receives data or other services is a client program Each server communicates with a client program that sends it the correct set of requests and receives inf
314. rectly on a wall like the ones shown in Figure 6 7 When you mount a device on a wall panel place it below eye level with the front panel at the top of the box so the status lights are easy to see If there is no allowance for mounting holes on your modem switch or router and you re using a wall mounted control center attach a 6 inch shelf to the plywood panel and place the devices on that shelf If you re using a modular structured wiring center there s usually space at the bottom of the cabinet that you can use as a shelf For a rack mounted control center use a rack shelf for any devices that don t mount directly into the rack Installing the Network Control Center and Ethernet Cables 63 64 Chapter 6 Model DSS 5 DLink H W Verst cE S N WHEE CONN B20533C 008920 d Figure 6 7 This D Link switch has keyhole slots on the bottom of its case Use big wire staples from the hardware store to route the power cables neatly along one side of your control panel between each control device and the power strip Don t mash the staples all the way into the plywood allow some space to be sure you haven t crushed any of the wires Be sure to leave enough slack wire at the back of each device to allow yourself to unplug the power connector easily Adding a DSL or Cable Connection Broadband Internet service comes into your building through either a tele phone line or a TV cable Therefore you will need either a teleph
315. rer 24 174 Internet Protocol IP 35 36 54 123 123 126 addresses 36 41 36 42 45 86 computer to network connections and 118 124 126 128 127 domain names and 38 41 40 dynamic 37 38 86 109 firewalls and 157 fixed 37 38 109 118 network to Internet connections and 110 115 111 112 filters 159 networks 162 Internet Protocol Properties window 123 Internet radio 209 214 Internet Relay Chat IRC servers 39 Internet service providers ISPs 22 31 41 110 113 114 problems 251 Internet to network connections 6 107 115 108 111 112 I O input output ports 4 18 18 19 19 IP See Internet Protocol IP IPConfig 41 43 42 iPhone 77 IP Masquerade 164 iPod 8 206 207 210 IPsec network links 162 163 164 169 173 IPX networks 162 IRC Internet Relay Chat servers 39 IrDA See Infrared Data Association IrDA ISA Ethernet adapters 72 INDEX 257 258 INDEX ISM bands 80 ISPs See Internet service providers ISPs iTunes 24 J Jabber 235 jacks See ports Jameco 57 jumper cables 56 K Kaspersky Online Scanner 245 KDE 104 128 128 129 129 148 148 149 Kerberos 158 keyhole slots 63 64 64 Konquerer file manager 148 746 149 150 150 L L2TP Layer Two Tunneling Protocol 162 163 164 169 LANguard 158 LANs See local area networks LANs Lantronix UBox 4100 99 laptops interface adapters 81 82 82 network adapters 73 74 74 Laughing Squid web
316. ress of the device that assigns IP addresses to other devices on the LAN in this case this device is the same as the Default Gateway and the DNS Servers are the computers that this network consults to convert DNS addresses into numeric IP addresses The Lease Obtained and Lease Expires lines show the date and time that this computer obtained its IP address from the DHCP server and the time the computer will give up that address the host automatically renews the lease long before it expires so you don t have to worry about the expiry time ifcontig The ifconfig command is available in Macinstosh OS X and in Unix and Linux This command displays information about the current network interface including the connection type and the connection s current status The format of the information display however varies in different operating systems Therefore the best place to find a detailed explanation of the ifconfig display produced by your own system is the man page for the ifconfig command ping The ping command is an echo request When you type ping target address your computer sends a series of please answer messages to the target address and that computer sends you a reply as shown in Listing 4 3 Your computer measures the amount of time for each roundtrip and displays the duration in milliseconds C gt ping nostarch com Pinging nostarch com 72 32 92 4 with 32 bytes of data Reply from 72 32 92 4 bytes 32 time
317. ring the WAN side of a modem router or other network control device is in the information provided by your ISP Specifically when you set up a new ISP account you should obtain your connection s static IP address or DHCP setting the DNS server addresses the subnet mask and the gateway address The ISP will probably give you addresses and a password for your email account at the same time but you don t need them to configure the network connection although you will need them to send and receive messages If your ISP requires a login and password every time you connect you will need a router or modem that uses the same set of connection rules the protocol that your ISP s equipment expects If your ISP does not provide a modem ask them for a list of compatible makes and models The LAN side of the router uses addresses and other settings that don t extend beyond your own network so your network can use the same settings as your neighbor s network Therefore many manufacturers ship their routers with preset addresses that should work for most networks The user s manual or setup guide supplied with the device usually contains step by step instruc tions for changing the settings If you can t find a printed copy of the manual look for one on the manufacturer s website NOTE Chapter 11 contains detailed instructions for connecting routers using Windows Mac intosh OS X and Linux or Unix to a LAN To connect a NAS device p
318. rinter or other device to the network follow the instructions supplied with each device Summary Your network connects to the Internet through a gateway router that appears as a node on both your own LAN and your ISP s WAN In order to exchange data between a network computer and the Internet you must configure the WAN side of the router with addresses and options supplied by your ISP The LAN side of the router controls the way your own network handles communication with the Internet Therefore the router s LAN side settings must be compatible with the settings on each computer and other device connected to the LAN Connecting Your Network to the Internet 115 CONNECTING YOUR COMPUTER TO A NETWORK a computer uses it requires the same configuration settings to connect to a LAN and to the Internet Each operating system organizes configuration information differently but they all require the settings described in Chapter 10 This chapter describes the configuration settings for Windows Macintosh OS X and for Linux and Unix and it offers step by step instructions for connecting computers running those operating systems to your network Before you try to configure the computers in your network set up the LAN and WAN settings on the network s modem and router the configura tion of your network s computers must be compatible with those settings If your network includes an active DHCP server your computer should automatica
319. rinter for routine documents and reports a color inkjet or laser printer for fancy presentations and school projects and a special purpose color printer for digital photos If you have more than one printer you can select the best printer for each job Each of these printers might be located in a different room close to the person who uses it most often or in a central room where they re equally accessible to all of your network s users 192 How to Connect a Printer to Your Network NOTE Chapter 14 You can connect a printer to a network in several ways You can use an external printer server a server built in to your printer or an automatic switch connected directly to each printer or you can connect through a computer All of these methods accomplish the same thing They send a formatted document or image to a printer that produces a paper copy The best method for connecting a printer to your network depends on your budget what s convenient for you and the layout of your network External Printer Servers An external network printer server is a device that connects to the network as a separate network node with an Ethernet port and provides either a parallel port connection or a USB connection to a stand alone printer Figure 14 1 shows a printer connected to a network through an external printer server Desktop computer Desktop computer Router Server Figure 14 1 An external printer server connect
320. riously flawed PPTP The server also requires two network interface cards one connected to the wired LAN or the Internet gateway and the other connected to the wireless network The interface card that is connected to the wireless port normally connects directly to the wireless access point s Ethernet port The exact process of installing an L2TP host on a Windows server is slightly different in each version of Windows but the general steps are the same For specific information about configuring a particular operating system consult the online Help screens and Microsoft s Resource Kit and other online documentation for your server s operating system The following sections describe the configuration steps in general terms For more information about deploying and using VPNs with Microsoft servers see the Microsoft TechNet articles at http technet microsoft com en us network bb545442 aspx Configure the connection to the LAN The link to the LAN or other network is a dedicated connection through a network adapter The network connection profile for this connection must include the IP address and subnet mask assigned to this connection and the default gateway address assigned to the network gateway Configure the VPN connection The VPN connection is usually an Ethernet link to one or more access points The connection profile on the server for the VPN connection must include the IP address and subnet mask assigned to this port and th
321. rk access point which the operating system sees as a LAN connection To set up a VPN tunnel through that connection you must install the tunneling protocol as a network service Configuring Windows for VPN Windows XP and Vista include support for virtual private networks but this support is not part of the default installation so the first step in setting up a VPN client is to install the protocol In Windows XP and Windows Vista a wizard makes the whole process easy In XP follow these steps to set up a VPN connection From the Control Panel open Network Connections Double click the New Connection Wizard icon When the Network Connection Type window shown in Figure 13 6 appears select the Connect to the network at my workplace option and click the Next button Network Security 165 166 Chapter 13 New Connection Wizard Network Connection Type What do you want to do Figure 13 6 The option for creating a VPN link specifies connecting to a workplace network but this option also applies to a wireless VPN In the Network Connection window shown in Figure 13 7 select the Virtual Private Network connection option and click the Next button New Connection Wizard Network Connection How do you wantto connectto the network at your workplace Figure 13 7 Select the Virtual Private Network connection option to create a VPN connection In the Connection Name window type a name for the wireless VPN
322. rned on anybody who is logged on to another machine on the same network with the same username as an Administrator account on this computer and who uses a password to log into this computer can request remote access To allow a non Administrator to use Remote Access click the Select Remote Users button click the Add button in the Remote Desktop Users window and then type the account name for the person who you want to allow to use Remote Access 7 Clickthe OK buttons in each of the open windows to save your data and close the windows To configure Windows Vista for Remote Assistance follow these steps Right click My Computer The System window will appear 2 Click Remote settings in the Tasks list on the right side of the window The System Properties window will appear with the Remote tab visible as shown in Figure 16 2 Other Network Applications 227 228 Chapter 16 4 System Properties Computer Name Hardware Advanced System Protection Remote Q Select the ways that this computer can be used from another locabon Remote Assistance Allow Remote Assistance connections to this computer What happens when enable Remote Assistance Figure 16 2 Use the Remote tab in System Properties to turn Remote Assistance on or off Check the Allow Remote Assistance connections to this computer option Activating this option will allow both inbound and outbound remote access Click OK to save your sett
323. roller automatically moves on to the next row when it reaches the end of the bottom row the controller returns to the top At some point in the signal chain the analog image from the camera s lens converts to a continuous digital data stream in most cases this occurs inside the camera itself but some equipment might perform the analog to digital conversion in the controller card As an alternative a camera captures still images one at a time and stores them or transmits them through the network as a series of image files Many camera controller cards include two or more camera inputs In general a multiple input card costs more than a single input card with similar image quality and performance The computer can use a sound card or a USB or FireWire port to handle audio in a similar manner The sound card accepts analog audio directly from a microphone or through an external amplifier mixing desk or other source the USB port receives digital audio from an external analog to digital converter After the computer receives one or more video streams audio streams or still pictures it can do the following e Store them on a hard drive or other mass storage device e Display the pictures on the computer s video monitor as live images e Play the sound stream through the computer s speakers or through headphones plugged into the computer e Incorporate them into another program or document such as a web page or a word process
324. rosoft distributes security updates and patches through the Internet at least once every month that include fixes for newly discovered security problems You can manually check for updates and select the ones that you want to install but it s a lot easier to let Windows automatically check for newly released update packages and install them for you As network manager you will want to set all the Windows computers on your network to run Automatic Updates Network Security 185 To run Automatic Updates follow these steps 1 Right click My Computer and select Properties from the pop up menu The System Properties window will appear 2 Choose the Automatic Updates tab from the System Properties window The dialog shown in Figure 13 19 will appear axi General ComputerName Hardware Advanced System Restore Automatic Updates Remote Windows can reqularty check for important updates and install them for you Turning on Automatic Updates may automatically update Windows Update software first before any other updates How does Automatic Updates work Automatic recommended Automatically download recommended updates for my computer and install them Every day at 200PM C Download updates for me but let me choose when to install them C Notify me but don t automatically download or install them C Tum off Automatic Updates Your computer will be more vulnerable unless you install updates regularly Figure
325. rses and spyware on each computer connected to your LAN Even if you have firewalls up to date antivirus programs and other network security software running on all your computers it s possible that something might have slipped through your defenses Several antivirus program vendors offer free online scans that might identify a virus that your resident program might not catch As part of your troubleshooting routine run a full scan with your usual network security programs and also use one or more of these online scans Trend Micro HouseCall Attp housecall trendmicro com Symantec Security Check Attp security symantec com sscu6 defaullt asp BitDefender Online Scanner Attp wwuw bitdefender com scan6 ie html Kaspersky Online Scanner http www kaspersky com virusscanner ESET Online Scanner itp www eset com onlinescan Panda ActiveScan Aitp www pandasecurily com homeusers solutions activescan Use an online scanner made by a different supplier from the one that came with the antivirus program resident in your computers Each company employs a slightly different set of rules for finding and isolating viruses so you will want to take advantage of more than one approach Other Common Problems It s not practical to describe every possible network problem but there are a few that occur more frequently than others If the problem in your network is not described in this chapter try the Windows Network Problem S
326. rvers as possible But if you can t obtain reliable DNS service from your local service provider a public DNS is often a useful alternative You can find addresses for several public DNS servers though a Google or other web search for Public DNS server Some public DNS services can also provide some added features that your ISP might not offer For example OpenDNS hitp www opendns com can provide another layer of filtering against spyware identity theft adult sites and other possible problems It will also allow you to set up two three letter shortcuts to frequently used addresses and will automatically correct common keystroke errors such as typing example cmo instead of com There s some controversy about some of these features because they could lend themselves to returning names that are links to advertisements rather than the sites the original user requested Network Tools You won t use them often if your LAN and your Internet connection are working properly but you should know about a handful of troubleshooting tools that allow you to examine the innards of your network and its Internet connection All of these tools are simple text commands that you can use with just about any operating system When you type a command the system will display the results in the same window or screen In Microsoft Windows you can open a Command Prompt window after selecting Start Programs or by selecting Start Run and then typing
327. rvice to provide the links Figure 3 5 shows a simple LAN connected to a WAN Your Internet service provider JSP uses a WAN to connect you to the Internet The Internet itself is a set of connection points that link a lot of WANs It s also possible to connect a single computer directly toa WAN without going through a LAN If you have just one computer and it s connected directly to a modem your computer is on your ISP s WAN Hubs Switches and Routers 31 32 Desktop computer Desktop computer Router 7 computer Figure 3 5 A LAN is usually limited to a single building or some other small space a WAN can connect several LANs Bridges and Routers NOTE Chapter 3 Any time you connect two networks you must use a tool that translates the address and control data used by each network into values that the other network can understand When the device simply examines the address on each packet and decides which packets to forward to the other network it s a bridge When the device examines the address or routing information in each packet and sends the packet along to its ultimate destination which might be in yet another LAN far from the original it s a router Bridges and routers operate between two different networks Don t confuse them with switches and hubs that distribute data within a network However many routers combine functions with a switch in a single device When you connect your LA
328. s Origin Hey destination I have some data for you Destination Okay origin go ahead I m ready Origin Here comes the data Origin Data data data data checksum Origin That s the message Did you get it Types of Network Connections 13 14 Ethernet Chapter 2 Destination I got something but it appears to be damaged Origin Here it is again Origin Data data data data checksum Origin Did you get it that time Destination Yup I got it I m ready for more data We can leave the specific form of handshaking information to the network designers and engineers but it s important to understand that not every bit that moves through a computer data network is part of the original block of information that arrived at the input computer In a complex net work such as a wireless data channel as much as 40 percent or more of the transmitted data is handshaking and other overhead It s all essential but every one of those bits increases the amount of time that the message needs to move through the network Ethernet was introduced in the 1970s as a method for connecting multiple computers and related equipment in the same building Ethernet offers several advantages It s fast it s extremely flexible it s relatively easy to install and use and it s inexpensive It has become an industry standard supported by dozens of manufacturers so you can use different b
329. s but you still have to know which black boxes to use And when something goes wrong knowing what s inside those boxes will make troubleshooting a lot easier Before we talk about specific network types let s look at the common elements of every computer network As you probably know computers reduce all information to only two information states Either a signal is present or there is no signal These two conditions are usually described as 1 and 0 or on and off or mark and space Each instance of a 1 or a 0 is a bit Anything described as digital can be reduced to those ones and zeroes The form that each or 0 takes is different in different types of com munication channels It could be a light sound or electrical charge that is either on or off a series of long and short sounds or light flashes or two different audio tones electrical voltages or radio frequencies In a very simple system the 1 might correspond to yes and the 0 to no or any other pair of options Individual bits only offer two options so they re not particularly useful but when you string eight of them together into a byte you can have 256 different combinations 2 x 2x 2 x 2 x 2 x 2 x 2 x 2 That s enough to assign a different sequence to every letter of the alphabet both upper and lowercase the ten digits from 0 to 9 spaces between words and other symbols such as punctuation marks and many letters used in foreign alphabe
330. s and file transfers from trusted users to the Internet Therefore a legitimate user can connect to network nodes on the wired part of a mixed LAN or on the Internet but an intruder would be cut off at the firewall Because authorized wireless users and intruders are both on the unprotected side of the firewall it does not isolate the wireless nodes from one another An intruder can still gain access to another computer on the same wireless network and read shared files so it s a good idea to turn off file sharing on any computer connected to a wireless network and to use firewall software on individual computers A firewall for a wireless network should use some kind of authentication to allow legitimate users through the gateway but it should reject everybody else If access control based on MAC addresses is built into Wi Fi networks and the added authentication in 802 1x are not adequate then an outboard firewall should require all users to enter a login and password before they can connect to the Internet If your wireless network includes computers running more than one operating system your firewall must use a login tool that works on any plat form The easiest way to accomplish this is with a web based authentication server such as the one included with the Apache web server http httpd apache org The Apache web server is available as a Linux or Unix application that can run on an old slow computer with an early Pentium or
331. s such as Windows Home Server and its associated client programs include software that has been optimized for video distribution but you can also use a general purpose Linux Unix Macintosh or Windows server as long as the server computer contains one or more relatively large hard drives with enough available space to hold very large video files Other media servers combine the function of a network server and a local media player into a single package You can play music and videos through a screen and speakers connected directly to the media server or send requests to the server from other players through your network Other Things You Can Connect to Your Network 215 216 Chapter 15 TiVo and Other Digital Video Recorders The primary function of a digital video recorder DVR is to record incoming broadcast or cable television programs for delayed viewing However some DVRs including TiVo the most popular DVR in North America and Australia can also distribute programs to another DVR through a network By connect ing a TiVo to a network you can also download program schedules through the Internet rather than a slower dial up telephone connection Most recent TiVo models including the Series2 Dual Tuner and Series3 HD DVRs have an Ethernet port as standard equipment The older Series2 Single Tuner DVR requires an optional Ethernet network adapter that connects to the DVR s USB port For a wireless connection you must use a Ti
332. s XP Home Edition the Backup utility doesn t automatically load when you install the operating system Apparently somebody at Microsoft thought that Home Edition users didn t need to back up their data Go figure To install Windows Backup from the XP Home Edition CD follow these steps Place the XP CD in your computer s drive When the Welcome message appears select Perform additional tasks Select the Browse this CD option Open the ValueAdd folder and then the Msft folder and finally the Nibackup folder 5 Run the Ntbackup msi program This will start a wizard that installs the Backup program Pepe hor x Installing Backup in Windows Vista Most versions of Windows Vista except Vista Starter and Home Basic include an automatic utility that can store backup files on a network server but it doesn t run until you turn it on To configure the Vista Backup utility select Start gt All Programs or Programs in the Classic start menu Accessories gt System Tools gt Backup Status and Configuration The Backup Status and Configuration tool shown in Figure 9 8 will appear on Backup Status and Configuration te ga Automatic file backup is not set up A Cc When you set up automatic file backups Windows will make a copy of the files on your computer to a location of your choice System and program files will be Back Up Files skipped What file ty ed in the backup P a Afterwards Windows will
333. s a printer to a network using a parallel port or a USB port When you shop for a printer server look for one that uses the same type of printer port as your printer Most modern printers have USB ports but older units with parallel ports are still common If your printer has both USB and parallel ports use the USB port External printer servers are a good choice when your network includes computers in more than one room and you have at least one spare port on the network hub or router You can run an Ethernet cable to the server unit NOTE directly from the hub in the same room or from an unused wall outlet in another room If you don t have enough Ethernet ports in the room where you want to place the printer server connect the computer and the printer server to the network through an inexpensive Ethernet data switch as shown in Figure 14 2 Desktop computer Desktop computer Desktop computer Router Figure 14 2 If you don t have a spare network outlet for a printer server use a small Ethernet data switch When you install Ethernet cables for your home or small business network consider the locations where you might want to install a printer Run an extra Ethernet cable between that room and your network hub and use a wall outlet plate or surface mount box with two or more RJ 45 jacks Use a different color jack for each outlet to make it easier to identify them at a glance Adding a printer server t
334. s computer IBF Local Private network Customize Access Local and Internet Connection Local Area Connection View status Sharing and Discovery Network discovery 9 00 x File sharing On v Public folder sharing On x Printer sharing off Y Password protected sharing ott Y See also Internet Options Media sharing On Y Windows Firewall Show me all the files and folders I am sharing Figure 13 10 Use the Set up a connection or network option to create a VPN link Select the Connect to a workplace option and click the Next button The wizard will ask if you want to use an existing connection Select the No create a new connection option The wizard will ask if you want to use a VPN or a dial up connection Select the Internet connection VPN option The wizard will then ask for details in the screen shown in Figure 13 11 Type the VPN server s address provided by the network manager in the Internet address field This can be either a numeric address or a name Type the name you want to use on your own computer for this VPN con nection in the Destination name field If you want to test the connection click the Next button If you don t want to connect select the Don t connect now option and then click Next The wizard will ask for your name and password Type the name and password you use for this VPN account If you want your computer to automatically send your password turn on the Remem ber this password op
335. s content MP3 files are entirely adequate for casual listening especially for speech but uncompressed files can sound a lot better The compromise between file size and sound quality is particularly important when you are loading files on an iPod or other portable device with a limited amount of storage space For a home system where you have little or no practical limit to the amount of storage space you can almost always add another hard drive to the server storing your music files in an uncompressed format especially if you plan to listen through a good quality stereo or surround sound system is best It s important to store archival copies of original recordings as uncompressed files so future users will have the best possible recordings to work with Many libraries and archives keep a high quality WAV file as a master copy and a separate MP3 listening copy for distribution Archiving uncompressed files is less important when you re deal ing with commercially available CDs because hundreds or thousands if not millions of other copies are probably in circulation but when you have the only copy archiving an uncompressed version can make a difference Many audio player programs can automatically recognize and load most common file formats However you might want to install more than one program just in case your default player can t handle a file For example Windows Media Player won t accept very high bit rate 24 bit
336. s over very long distances the antenna supplied with your adapter should be all you need Remember that a more powerful antenna might produce stronger incoming and outgoing signals but those stronger signals often don t make any dif ference to network performance once the signal strength reaches an adequate level there s no advantage to adding more power or sensitivity The antenna used with an access point is a different story If you install a high gain directional antenna or place the antenna as high as possible the access point s coverage area will increase because radio signals at the fre quencies that Wi Fi uses are line of sight meaning that the signal can reach anywhere that an observer at the same location could see However the off axis signals to or from a directional antenna are a great deal weaker because the antenna focuses most of its output from a transmitter or sensitivity toa receiver within a limited area When you install a directional antenna take the time to make sure the antenna is oriented for the best possible signal strength between the access point and the network interfaces On the other hand nondirectional or omnidirectional antennas have equal signal strength or sensitivity in all directions The best way to provide Wi Fi coverage over a wide area is to use an access point with a nondirectional antenna and either increase the height of the access point or antenna or use directional antennas
337. s specific requirements VPN Clients for Linux Unix Using a VPN client on a computer running Unix is more complicated than running a VPN from a Windows machine because the client is not integrated into the kernel Therefore you must find a client program that works with the version of Unix and the VPN protocol you re trying to use No single program offers a universal VPN client and some combinations such as PPTP on BSD Unix versions don t seem to exist at all Linux users however can choose from several IPsec implementations FreeS WAN _hiip www freeswan org pipsec hitp perso enst fr beyssac pipsec NIST Cerberus itp w3 antd nist gov tools cerberus IPsec is included in the OpenBSD distribution You can find a tutorial that explains how to use it at hitp tutorials papamike ca pub obsd_tpsec himl The IPsec implementation for FreeBSD is at Attp wwuw r4k net ipsec For information about NetBSD IPsec take a look at hitp www netbsd org Documentation network ipsec OpenVPN A Cross Platform Alternative OpenVPN hiip openupn net is an open source VPN that does not use IPSec It can operate on Windows Mac OS X Linux and Unix It s designed for ease of use and security even through noisy or otherwise unreliable networks Using a VPN Through a Public Network When you connect your laptop to your corporate LAN through a public network at an airport or in a conference center or if you re using a broad band
338. s to conduct a conversation on a display screen and audio or video messaging where a microphone and or a camera replace or supplement the keyboard Live messaging is more immediate than email because it arrives on the recipient s screen as soon as the originator hits the Send button rather than waiting for a mail server to forward each message Assuming the distant com puter is turned on and the messaging program is running the text appears on the screen or the sender s voice comes through the computer s speakers immediately Live messaging makes it possible to conduct a text based conversation through the network without the time delay that comes with sending and receiving email The most common uses for instant messages involve brief questions and answers such as requests for specific items of information Hey Sarah I m on the telephone with a customer How many Size 4 gizmo brackets do we have in stock invitations to face to face meetings Can you meet me in ten minutes in my office or Do you have plans for lunch and purely social exchanges among friends and family IM has also become the medium of choice for online gossip among teens and preteens IM has a specific place in the hierarchy of communication methods It s less formal and more immediate than email or facsimile fax less intrusive than telephone calls and more civilized than shouting from one room to another In some businesses and families IM is an essent
339. sant programs called rootkits that take control of a PC or display threatening messages An unprotected system with a lot of unused storage space can be an attractive target for hackers who want to distribute pirated software music or video files you didn t think they store that stuff on their own computers did your The number of such idiots and creeps on the Internet is surprisingly large if you install a firewall that notifies you when an outside computer tries to connect to your network your firewall log will probably list several break in attempts every day Wireless Access Points with Firewalls The easiest firewall to use with a wireless network is one that s built into an access point Many wireless access points combine the functions of a wire less access point with a broadband router and an Ethernet switch so they support both wired and wireless network clients As you know a network router translates addresses between the numeric IP address that identifies the LAN to the Internet and the internal IP addresses that identify individual computers within the local network The firewall normally blocks all incoming requests for data to network hosts but this creates problems when you want to use one or more of the computers on the local network as file servers So the firewall redirects certain types of requests to the appropriate computer inside the firewall Each request to connect to a server includes a specific port numbe
340. scan your system on a schedule that you spedfy New C3 or updated files will be automatically added to your backup Restore Files Enabling automatic file backup will help protect your files from loss or accidental deletion Set up automatic file backup Choose your backup settings and run your first backup Change backup settings Figure 9 8 Use the Backup Status and Configuration tool to set up an automatic file backup The Backup Status and Configuration tool will step through a series of windows that request the specific information needed to run automatic backups Macintosh Backup Programs The same general principles apply to creating and restoring backups on a Mac Make backups on a regular schedule and store the backup files on a file server removable media or both The Time Machine program included in OS X can automatically create backups to an external drive or a networked drive as shown in Figure 9 9 Several alternative Mac backup programs can also send backup files to a network including SuperDuper Aitp www shirt pocket com SuperDuper SuperDuperDescription html Synk Backup http www decimus net comparison php iBackup Attp wwuw grapefruit ch iBackup Mac Backup Attp wiww mac com 1 solutions backup html File Servers 103 104 Chapter 9 eo Time Machine D Name SATA External Hard Disk Available 7 7 GB of 74 2 GB Oldest Backup Change Disk Latest Backup
341. se a similar program to speak to the person at the distant computer rather than using the keyboard and screen And if you add a camera at each end you can use a video messaging system that allows each of you to see the other party during the conversation Within a home or small office network you can use instant messaging with or without sound and pictures to communicate from one room to another It might be a simple message such as Dinner s ready or a more complicated request for information from someone else in the building And of course if there are young people in the house the instant message program will quickly become a channel for gossip and idle conversation For more about instant messaging programs see Chapter 16 Sharing Printers and Other Hardware In most homes and small businesses there s no need for every computer to have a printer available for its exclusive use because nobody uses a printer all the time It s often more practical to attach a single printer to a network or maybe one for black and white pages and another for color rather than buying a separate printer for each computer When you only need a single printer you can often buy one that provides better images and faster performance for considerably less than the price of two or three cheaper models The same kind of economy can also apply to a flatbed scanner and other specialized input or output devices A network printer can either connect dire
342. se e Game Consoles tise E Connecting PlayStati ri cerei rette dele gg roe nee Trente e eg Connecting a WI epi tt ERE OUO PA DRE Connecting an Xbox 360 15 in eiie deer tte eee be Re teg etn Connecting Home Appliances to Your Network sss Home Avlomation visio c2 re iere cte te terit tet Ot deep heir He ERO ATAN Remote Sensors and Controls sss eee Bar Code Readers and Remote Data Entry ssssssse If You Can Convert It to Digits You Can Put It on the Network 16 OTHER NETWORK APPLICATIONS Remote Desktop zc D D EE UP E EE eesti Windows Remote Desktop sss Virtual Network Computing VNC sss MaxiVista Adding a Sreem enpiri estier there lieto esten er Terhes Multiple Monitors 1 i estre bees etae bead een ee dee ene dn Remote Control tee pee ete bee e ce ied e Erie ege Synchronizing Files ss rr eee eee ee IH EET SR Ree e edd Contents in Detail xi Instant Messaging and Live Communication ccccceseeceeeeseeeeeeneeeneestseseeeeneesneeeaas 233 Servers vs Peer to Peer Messaging sess 234 Internet Based IM Services sss eme 234 Messaging Through a LAN sere iere tret t e eee eire 235 Messaging Through a Virtual Private Network sse 236 Audio and Video Messaging eee 237 17 TROUBLESHOOTING 239 General Troubleshooting Techniques sss 240 Define the Problem sssssssssssseeeeeeeen
343. sensitivity to lightning strikes Remember to use appropriate lightning suppression wherever practical Bar Code Readers and Remote Data Entry One more possible use of a small business network could be remote entry of information to a central computer This might include a portable bar code reader used for inventory control or property management security devices for controlled access and networked cash registers and other point of sale devices If You Can Convert It to Digits You Can Put It on the Network Chapter 15 The most familiar uses of a data network are the ones that involve a computer or a game console but the same network can also handle other forms of digital data Today s technology makes it possible to convert almost any kind of information to digital form if you can t find off the shelf equipment and software that can do the job you have in mind you can probably assemble a system from standard parts and software As you install your home network think about it as a household utility just like electricity telephone service and water Even if you only use your network to connect computers to the Internet today it s entirely possible that new and unexpected uses will appear in the future OTHER NETWORK APPLICATIONS number of purposes they share files and messages connect to the Internet and maybe play multiplayer games or listen to music and watch videos from a server But once you have your home
344. sensor or operated with a relay Most of these applications are more practical for relatively large businesses and government agencies that operate in several locations such as a county or statewide system of radio transmitters or a scientific study that allows researchers in multiple locations to track environmental conditions through the Web but some can be adapted for a home or small business network For example a water detector in the cellar might trigger an alarm or send an email message or an intrusion alarm a fire alarm and a remote temperature sensor in a barn could all connect to a network on a farm through a Wi Fi link to a computer or other monitoring device in the house Or with the right kind of equipment connected to your home network you could send an instruction through the Internet from your workplace in case of a sudden snowstorm that would turn on heating coils embedded in your driveway and melt the ice before you arrive home For that matter you could even operate a model railroad through your network but you ll need somebody near the tracks to take care of derailments and other scale model disasters Remote controls thermostats sensors and monitors are specialized devices but they re widely available through industrial sources and from retailers and mail web order suppliers of home automation equipment Every remote sensor and control that connects to your network through a wire or cable increases the network s
345. sharing SMB so that s the best way to exchange files between an up to date Mac and another computer through a network I ll discuss connecting older Macs to a network later in this section If your home or business uses Macintosh computers exclusively you could use one of the older Apple sharing services but you re on your own for that we re concerned here about connecting your Mac to a non proprietary network Connecting a Mac to a Windows SMB Network When a Macintosh is connected to an SMB Windows network it appears the same as any other computer connected to the network You can find drives directories files and other resources connected to the Mac directly from your Windows or Linux Unix desktop In most cases connecting a Mac to a Windows network is a plug and play process Simply plug an Ethernet cable into the socket or turn on your Wi Fi adapter and the computer will automatically detect the network However your computer won t accept connections from the network unless the user logged in on the other computer also has an account on your Mac Unlike Windows Mac OS X won t accept connections from a guest account Sharing Files Through Your Network 143 144 Chapter 12 Adding a New Account To establish a new account in Mac OS X follow these steps From the Apple menu select System Preferences 2 Select View gt Accounts 3 In OS X 10 2 select New User in later versions click the button The
346. so all of the packets that move through the wireless portion of the network are encoded For clarity the diagram shows the VPN server as a separate component but the most practical way to add VPN security to a wireless LAN is to use a router or gateway that incorporates VPN support VPN enabled routers are available from several vendors including Cisco NETGEAR and TRENDnet go Access point Figure 13 4 A VPN provides a secure connection between a wireless network and an Internet gateway or a local LAN VPN Methods A VPN moves data through one or more intermediate networks to a desti nation on another network The VPN s tunneling client encapsulates the existing data packets or frames by adding a new header with the routing information that instructs the packets how to reach the VPN s endpoint The transmission path through the intermediate networks is called a tunnel Atthe other end of the tunnel the VPN server removes the tunneling header and forwards the data to the destination specified by the next layer of headers The exact form of the tunnel doesn t make any difference to the data because the data treats the tunnel as a point to point connection Network Security 161 162 Chapter 13 The tunneling headers can take several forms The methods used most widely in VPNs are Point to Point Tunneling Protocol PPTP Layer Two Tunneling Protocol L2TP and IP Security IPsec mode PPTP and L2TP can move data through IP IPX
347. so be a central storage location for photographs music and video files and allow users to view or play them through any computer in the house or through a television stereo or home entertainment system Chapter 15 explains how to use a network as part of a home entertainment system Choosing a Computer to Use as a File Server You can use just about any computer as a file server If you have a spare computer or an older unit that no longer has enough computing power for day to day use that might be a good candidate especially if you just want to share files and add network storage capacity You will probably get better performance from an older computer if you add some extra memory and one or more new hard drives Linux server software only needs about 10GB of hard drive space but an older hard drive could be more likely to fail due to age and wear And of course you will also need disk space for all the files that you store on the server If you want to use the server for more than just storage and file sharing you can buy or build a new purpose built server with space for several storage drives and special server software that includes additional features and functions such as web hosting and automatic backups All of the major office computer manufacturers including IBM Dell Compaq and Apple sell server computers with software already installed Windows Mac Linux or Chapter 9 Every computer needs an operating system
348. splay the SSIDs of every nearby wireless network Normally most Wi Fi access points send out beacon signals that broadcast the network s SSID When a network adapter performs a radio scan it detects those beacon signals and displays a list of nearby SSIDs in its control program However you can disable the SSID broadcast so the network doesn t show up on most control program scans To connect a computer to a network whose name is not visible you must instruct your control program to search for the SSID A nonbroadcast SSID is not completely invisible A sniffer program such as Network Stumbler can still detect it and display the SSID and every time a user connects to the network the network adapter sends the SSID in a packet that can be easily sniffed Disabling the SSID broadcast might in some cases make it easier for an attacker to later attack the laptop of one of your users this is a more serious issue for businesses or corporate network administrators than for people running home networks Because the laptop cannot know if the hidden network is available it must constantly probe for the network announcing its presence and giving an attacker much of the information needed to spoof the hidden network Because a hidden network must be in a laptop s Preferred Networks list the laptop will automatically connect to the spoofed network WEP Encryption WEP encryption is an option in every Wi Fi system so it s important to k
349. ss extravagant If you ve already wired your house or apartment for a data network you can add an entertainment server and connect stereos or TVs in several rooms without spending a small fortune You can also connect entertainment devices to your network in stages rather than spend a lot of money at one time A tremendous variety of equipment and services is available that can fit within the home entertainment systems category but for this book s purposes I ll consider the processes of distributing music video and games through a home network and playing them on TVs stereo systems surround sound systems and table radios Music Through a Home Network Chapter 15 Any technology that reproduces sound has at least two elements a source and a destination Often one or more additional intermediate elements are between the source and destination such as a preamplifier that boosts volume level or an analog to digital or digital to analog converter but you ll always have a program source and a destination device that converts the signal back to sound For example consider an antique gramophone like the one shown in Figure 15 2 The source of the sound is a needle that follows the vibrations in a grooved disk and the destination is a membrane that reproduces those vibrations through a horn In a modern music system the program source can include the following e Analog media such as vinyl disks or magnetic tape e Digital media suc
350. ssible but they re almost always provided as supplements to other services These systems use the internal telephone wiring that connects extension telephones in several rooms or the coaxial cable coax that provides cable TV signals The industry group that promotes home networks through telephone wires is called HomePNA the Home Phoneline Networking Alliance MoCA Multimedia over Coax Alliance is the comparable group for coax Types of Network Connections 17 18 Don t confuse internal telephone or coax wiring with the DSL and cable services that connect high speed Internet service to your home or business LAN HomePNA and MoCA are strictly for distributing network service within a building HomePNA and MoCA are less flexible than HomePlug network wiring because most homes already have a lot more built in AC power sockets than telephone or TV outlets However if the phone boxes or cable outlets are already in convenient locations it might be practical to consider HomePNA or MoCA as an alternative to Wi Fi or separate Ethernet wiring DTE and DCE Equipment Chapter 2 There s one more concept that every network planner should understand the difference between data terminal equipment DTE and data communications equipment or data circuit terminating equipment DCE If you re clear on these two types of network devices you will avoid a lot of headaches caused by communication failures Data can move through a wire in only on
351. sys tem The console will tell you that it s initiating a test Click OK The Wii console will test your connection If it s successful you re ready to use your game console on the network If it fails try one of these fixes e Check your firewall settings e Ifthe console displays an error code go to http www nintendo com consumer systems wii en en ma errors index jsp to find an explanation for the code Other Things You Can Connect to Your Network 221 222 Connecting an Xbox 360 If you use your Microsoft Xbox 360 game console and a computer in the same room but you have only one network jack or outlet in that room you can run the network connection to the computer through the game console Follow these steps to connect a Microsoft Xbox 360 console to your network 1 Turn off or disconnect power to your computer your network s router hub modem and the Xbox 360 console 2 Ifyou don t have a second network outlet in the room disconnect the Ethernet cable from the computer and plug it into the Xbox 360 con sole The cable should now run from the game console to the network hub or router 3 Ifyou have access to a spare outlet you don t have to disconnect the computer Just run a new cable from the game console to the free net work outlet or directly to an open port on the hub or router 4 Ifnecessary plug one end of a second Ethernet cable into the Xbox 360 console and the other end into your computer
352. t ert Re eig 150 Using Shares eoe testis acu teer me dois Coates a E oan tte oct te tid ERU DU N 150 13 NETWORK SECURITY 151 Keeping Intr ders OUF i i ctetu tere epit a deci bee ope ee ioc tt tete sre debe 152 User Accounts and Access Levels sss 152 Passwords de trae Mr AULEM Mee TAE DUE ADD HUE SM de A rs 152 Firewalls 25 ca ite Sandor ce scit trate toti quae iuipu eei et eed tpe ie dee bes 154 Virtual Private Networks sce cee neces n ret rome teet e eer ER eat erae e eed eee PR Re 159 VPN pu uapn M EET 161 MPINESerVers oo deep teretes pepe e erre cert ee ems 162 VPN Client Software te torre teneret seen eels re er Der eoi dete xen eee 165 VPN Clients for Linux Unix eeee eene re nenne nee 172 OpenVPN A Cross Platform Alternative sss 173 Using a VPN Through a Public Network 173 Wireless Securlly inore rak eise emere teet e eb ert beer esee pee dune ed O ins 174 Protecting Your Network and Your Data sssee 176 Network Nome 4 eei ene t tu etm RR eere testi ete eda 177 WEP EnC PHON Em 179 ADAAL ET oe teer terr I A TTA T 182 Access Control MAC Authentication cccccccccceeeeceenseeeseeeesteeeeneeesneees 184 Physical Security 024 Saath te ete ed toe dle cbs tales Be bet epe o eegpee hoes des 184 Windows Update and Patches ssssssssseee eee eee een 185 Microsoft Baseline Security Analyzer eee 188 Controlling Your Own Users sse eme em emen 189
353. t window like the one in Figure 13 12 will appear Connect VPN to Internet 2 x Username Password Save this user name and password for the following users s We only Anyone who uses this computer Cancel Properties Help Figure 13 12 Use the Connect VPN to Internet window to configure a VPN in Windows XP Click the Properties button The Properties window for your VPN client will appear Figure 13 13 shows the General tab of the VPN to Internet Properties window VPN to Internet Properties Options Security Networking Advanced lexample co Figure 13 13 The General tab controls the destination of a VPN connection 4 TheIP address of the VPN server should already be visible in the Host name or IP address of destination field The Dial another connection first option should be disabled Click the Networking tab to view the dia log shown in Figure 13 14 dud to Internet Properties Figure 13 14 The Networking tab controls the VPN s network configuration options Network Security 171 172 Chapter 13 5 Select the type of VPN server your network will use from the Type of VPN menu If you don t know the VPN type select the Automatic option 6 Select Internet Protocol TCP IP or Internet Protocol Version 4 from the list of connection items and click the Properties button to change the network settings including
354. te computers Installing an all in one is like installing a printer Connect the USB connector to the computer you want to use as a printer server or connect the Ethernet port directly to the network hub or router If the server doesn t automatically detect the all in one device load the software supplied with the device If all else fails follow the installation instructions supplied with the all in one device Printers and Other Devices on Your Network 201 OTHER THINGS YOU CAN CONNECT TO YOUR NETWORK AUDIO VIDEO HOME ENTERTAINMENT AND BEYOND data you can transmit that data through a network and either convert it back to its original form or use it as input data for a com puter With the right kind of input and output devices you can use the same network that shares computer resources to monitor and control industrial processes listen to sound from a microphone or watch images from a camera distribute audio and video through your home or business and operate equipment by remote control And if the network is connected to the Internet you can do all those things to or from anywhere with an Internet connection Many of these network applications are extremely specialized such as monitoring the temperature of the water in a stream but others are often practical for a home or small business network For example you can use your network to watch or listen to activity in another room or to distribute audio and video fi
355. ted to the network must be within the ranges defined by the router or modem The next section explains how each of these LAN side settings works Individual Computers Each computer connected to a LAN must have the same configuration set tings in relation to the router that the router has with the WAN a numeric IP address a network mask and addresses for a gateway to the Internet and one or more DNS servers As the person responsible for your network you must set up a DHCP server and either provide these values to each of your users and make sure they enter them correctly or type them into each com puter and network device yourself The differences between setting up a router to talk to the Internet and setting up a computer to talk to the local area network are 1 the router has two groups of settings the WAN and the LAN but the computer has only one and 2 the router obtains its WAN settings from your Internet service provider but the local computer gets many of the same settings from the router Therefore you should almost always set up the gateway router in your network first before you add computers to the network When you connect a single computer directly to the Internet through a high speed DSL or cable modem you must use the settings supplied by your ISP or the modem The essential settings for connecting a computer to the Internet through a LAN are similar to the ones that you use to set up the modem and the router
356. ted computer running Linux or one of the BSD versions of Unix can be an inexpensive VPN server Or if you re using a Windows server for other purposes a dedicated computer can also provide VPN support at little or no additional cost But a full size network server is often a bigger and more complicated solution to a relatively simple problem They re not always the best choice Many switches routers gateways and firewall devices also include VPN support Cisco 3COM Intel and many other manufacturers make VPN products that are often easier to install and maintain than a separate computer In a wireless network the VPN server does not need all the same bells and whistles as a server in a larger corporate network As Figure 13 5 shows a router located between the wireless access point and the wired portion of an enterprise network can easily double as a VPN server In a home network the VPN server can operate between the access point and a DSL or cable modem server a point Ethernet Figure 13 5 A network router can also act as a VPN server for a wireless network Stand alone VPN client hardware that sits between the computer and the network is also available but this setup isn t as practical in a wireless network because the wireless network adapter is almost always plugged directly into the computer itself VPN Client Software A wireless client connects to a VPN server through its wireless Ethernet link to the netwo
357. ter For example your ISP might use a WAN with the network address 203 23 145 XXX the individual computers and LANs connected to that WAN would have addresses from 203 23 145 000 to 203 23 145 255 In this case the subnet mask would be 255 255 255 0 because the local address is limited to the last part of the address the zero A maximum of 256 devices numbered 0 through 255 can be connected to this subnet Within your own LAN you can use subnet masking to divide the network into two or more subnets Dividing the network into subnets is useful when you want to separate your wired connections from the Wi Fi access point or when you want to use an internal firewall to isolate computers that contain sensitive personnel or financial data from the rest of the network To divide your LAN into two equal size subnets assign the subnet mask XXX XXX XXX 0 to one subnet and use local addresses from 1 to 126 use 0 for the router For the other subnet use the subnet mask XXX XXX XXX 128 and assign addresses between 129 and 255 You will need a separate router for each subnet Using subnets to split a LAN into separate groups counts as an advanced networking practice youre not likely to see this setup in a simple home or very small business network Connecting Your Network to the Internet 113 114 NOTE Chapter 10 IP Addresses As Chapter 4 explained several groups of numeric IP addresses have been reserved for computers and other devi
358. ter and monitor so a small UPS should be enough to keep your network alive for up to an hour Of course during a power failure you will be able to use the network only with laptops and other battery powered portables The battery in a UPS is relatively heavy so you will probably want to place the UPS on the floor rather than on a shelf on the control panel If the UPS does not have enough battery backup outlets for all of the equipment in your control center plug a power strip directly into an outlet on the UPS Installing the Network Control Center and Ethernet Cables l 62 Chapter 6 Modems Routers and Switches If you already have broadband Internet service take a close look at the modem that connects your computer to the telephone line or TV cable and the instruction sheet that was provided with the modem Some Internet service providers supply modems such as the one shown in Figure 6 5 that double as gateway routers switches and or Wi Fi access points If you have a combined unit there s no need to duplicate those functions with one or more separate boxes REN I Photo courtesy of 2Wire Inc Figure 6 5 This DSL modem includes a four port switch and a Wi Fi base station Your floor plan should contain enough information to tell you the number of nodes in your network You will need one port on a switch or combined switch router for each node plus additional ports to connect the control devices For example i
359. ter than a computer for less money If you re buying new equipment to play music through your network a dedicated music player can Other Things You Can Connect to Your Network 213 214 Chapter 15 be an excellent choice but if you already have a spare computer you can probably accomplish the same thing without buying any new equipment although replacing the computer s audio interface might improve the system s performance Headphone Analog Digital Digital Ethernet Power mini jack audio optical coax RCA output output Photo courtesy of Slim Devices Figure 15 5 Slim Devices Squeezebox connects a music server to a home audio system through an Ethernet or Wi Fi network Networked Receivers and Internet Radios It s not necessary to use a computer or a full scale stereo or surround sound system just to listen to music from a music server or streaming radio stations and music channels through the Internet You can find a whole category of tabletop Internet radios that combine the music client and speaker in a single box sometimes with satellite speakers for stereo In spite of the name most Internet radios can also play music files stored on your own music server Some also include AM and FM radios so you can use the same device to listen to local broadcast stations An Internet radio works like any other network music client It connects to your home network through an Internet port or a builtin Wi Fi port and allo
360. th an Internet connection If any Internet technique can eliminate the apparent distance between you and your LAN your office and your colleagues without sacrificing security a virtual private network is that technique Wireless Security Chapter 13 Wireless networks are not secure They are safe enough for many users most of the time but it s just not possible to make a network that uses radio to exchange data absolutely private Wireless networks are a trade off between security and convenience The obvious benefits of a wireless network connection fast and easy access to the network from a portable computer or an isolated location come at a cost For most users the convenience of wireless operation outweighs the possible security threats But just as you lock the doors of your car when you park it on the street you should take similar steps to protect your network and your data The simple truth is that a wireless network uses radio signals with a well defined set of characteristics so somebody who wants to dedicate enough time and effort to monitoring those signals can probably find a way to intercept and read the data contained in them If you send confidential information through a wireless link an eavesdropper can copy them Credit card numbers account passwords and other personal information are all vulnerable An entire catalog of tools for cracking Wi Fi encryption methods is easy to find on the Internet Although 3G
361. the circuit or in the case of carrier pigeons an attack by a marauding hawk Whatever the source noise in the channel can interrupt the flow of data In a modern communications system those bits are pouring through the circuit extremely quickly millions of them every second so a noise hit for even a fraction of a second can obliterate enough bits to turn your data into digital gibberish Therefore your data stream must include a process called error checking Error checking is accomplished by adding some kind of standard information to each byte In a simple computer data network the handshaking informa tion is called the parity bit which tells the device receiving each byte whether the sum of the ones and zeroes inside the byte is odd or even This value is called a checksum If the receiving device discovers that the parity bit is not correct it instructs the transmitter to send the same byte again More complex networks including wireless systems include additional error checking hand shaking data with each string of data Handshaking and Overhead The computer that originates a message or a stream of data can t just jump online and start sending bytes First it has to warn the device at the other end that it is ready to send and make sure the intended recipient is ready to accept data To accomplish this a series of handshaking requests and answers must surround the actual data The sequence of requests goes something like thi
362. this folder 6 Check the Make this folder private checkbox to limit access to the files in this folder Click again to remove the checkmark and allow other users to see this folder 7 Click OK to save your choice and close the Properties window Level 2 Files stored in Level 2 drives and folders are accessible to the owner of those drives and folders and to anybody with an administrator level account on the computer where the folders and files are stored Other users on this computer and all users on other computers connected to this computer through the network can t open these files To assign a drive or folder to Level 2 follow these steps 1 From My Computer right click the drive or folder icon you want to assign to Level 2 A pop up menu will appear next to the icon 2 Select Sharing and Security A Properties window will appear with the Sharing tab visible 3 Disable the Make this folder private option and the Share this folder on the network option If a checkmark appears in either box click the box to remove it 4 Click OK to save your choice and close the Properties window Level 3 The owner of Level 3 folders and files and any user with an administrator level account on the same computer can read change or delete Level 3 folders and files all others using the same computer can read or open these files but they can t change or delete them In Windows XP Power Users can also change and delete Level 3 fil
363. tion Click the Create button to establish the VPN connection and close the wizard e Connectto a workplace Type the Internet address to connect to Your network administrator can give you this address Internet address vpn myhomeoffice com VPN Connection Destination name Use a smart card e Allow other people to use this connection This option allows anyone with access to this computer to use this connection Don t connect now just set it up so I can connect later Next Cancel Figure 13 11 Use this screen to configure your VPN To create a shortcut to a VPN on your desktop in Windows follow these steps 1 In XP open the Control Panel and select Network Connections In Vista open the Control Panel select the Network and Sharing Center and select Manage Network Connections from the Tasks list 2 From the Network Connections window right click the icon or listing for the VPN and select Create Shortcut from the pop up menu 3 Apop up window will ask if you want to place the shortcut on the desk top Click the Yes button A shortcut will now appear on the desktop The Microsoft L2TP IPsec VPN Client Microsoft includes a client for L2TP connections with Internet Protocol security IPsec in Windows 2000 Windows XP and Windows Vista A similar client program for Windows 98 Windows Me and Windows NT Workstation 4 0 is available for free download from ttp download microsoft com downl
364. ts A byte is the basic building block of computer communication The most widely used coding system for converting bytes to characters is called ASCH American Standard Code for Information Interchange Figure 2 1 shows a typical sequence of two bytes Figure 2 1 These bits form the ASCII sequence of A 01000001 and n 01101110 ASCII is fine for text but a computer can also convert many other forms of information to digital data For example it can divide every second of sound from a microphone or an analog recording into thousands of very short segments and use 16 or 24 bits to specify the content of each segment or divide a picture into millions of individual points called pixels short for picture elements and use a series of bits to specify the color of each bit A wire or other data link can carry only one bit at a time Either there s a signal on the line or there isn t Over short distances it s possible to send the data through a cable that carries eight or some multiple of eight signals in parallel through eight separate wires Obviously a parallel connection can be eight times faster than sending one bit at a time through a single wire but those eight wires cost eight times as much as a single wire That added cost is insignificant when the wires extend only a foot or two but the additional cost www allitebooks com of parallel wires can add up quickly when you re trying to send the data over a long distance And
365. ture wireless networks with one or more central access points are called infrastructure networks Infrared Infrared connections use invisible flashing light it s invisible because it uses frequencies outside the range of human sight to exchange data between computers mobile telephones digital cameras and other devices Most of the wireless remote control units that you use with your television DVD player and home stereo system also use infrared light signals Infrared channels are often called IrDA connections because the Infrared Data Association IrDA has set the standards for infrared communication Many laptop computers have builtin IrDA ports usually in an incon spicuous location along the edge of the case The IrDA port is usually an infrared lens under a transparent plastic cover like the one shown in Figure 2 8 The camera captured the flashing infrared light even though it s not normally visible to the human eye www allitebooks com NOTE NOTE looks like a blank panel on the edge of the case As you have probably noticed with your TV s remote control infrared signals can bounce off walls and other objects so it s not absolutely necessary to point a pair of IrDA ports directly at each other especially when they re both indoors When two computers with active IrDA ports are in the same room they will usually detect each other automatically The infrared port on a laptop computer can detect an IrDA sig
366. tures But if your network s users print enough pages to justify a workgroup printer the added cost will often pay for better performance Automatic Printer Switches When two or more of your computers are located in the same room or adjacent rooms an automatic printer switch might be a less expensive alter native to a network printer server As the name suggests an automatic switch detects print requests from two or more input connectors and automatically forwards them to the printer and the switch returns status information from the printer back to the computer that originated the request When it receives more than one print request at the same time the printer switch sends the first one to the printer and holds the other requests in a buffer until the first one has completed printing As far as each computer attached to the switch is concerned the printer is connected directly to that computer A printer switch is less practical when the computers on your network are in rooms that are far apart because a cable must run from each computer to the switch Using a Computer as a Printer Server The alternative to a printer server for a network that extends beyond more than one or two rooms is to connect the printer directly to one of the network computers and send print requests from all the other computers through that one This approach has several advantages e You can use any printer connected to your computer e You don t n
367. two or more types of WPA encryption If your network includes a RADIUS server choose EAP If the network has no encryption server use the WPA TKIP option For a network user providing a WPA key is just as easy as providing a WEP key Most network adapters made in the last couple of years auto matically recognize the type of encryption embedded in each Wi Fi signal that they detect so the control program might ask for an encryption key without specifying whether it s a WEP key or a WPA key Attacking WPA Security It was probably inevitable that somebody would take the added security features in WPA encryption as a challenge and develop a WPA cracking tool Several such tools are out there so WPA does not provide the impene trable protection that some of its proponents might want you to believe In particular programs called coWPAtty and Aircrack ng both use dictionary attacks on WPA TKIP networks to try thousands or millions of possible keys until they find the correct one Fortunately neither of these programs nor any of the others aimed at cracking WPA encryption are easy to use and cracking a network can take a lot of time so successful attacks on WPA are not particularly common This technique takes time because the programs can only try about 50 different encryption keys per second but eventually they will find the right passphrase and connect to the target network Because each additional letter number or other character in a ke
368. ty programs but the settings are similar You can generally find the controls and settings by searching around each version s desktop Remember that some network control settings programs don t make permanent changes especially when you re loading the operating system from a CD or DVD or you re using versions of the ifconfig route command to assign IP netmask or other addresses To make a permanent change you must load the operating system on the computer s hard drive and edit the system configuration Checking the settings each time you start the computer is always good practice Summary No matter what kind of computer you re using the basic network configura tion settings are the same Either the computer obtains an IP address and related settings from the network s DHCP server or it uses settings from the network configuration utility The procedures in this chapter should give you enough information to set up a working network connection with any commonly used operating system Connecting Your Computer to a Network 129 SHARING FILES THROUGH YOUR NETWORK between convenience and security You want to make some of the files stored on your computer available to other people but you probably have other files that contain information you would prefer to keep private Therefore Windows and other network operating systems allow you to assign different files or directories to different access levels Some files are availab
369. ually work and how readers can develop and implement their own In this all new second edition author Jon Erickson uses practical examples to illustrate the fundamentals of serious hacking You ll learn about key con cepts underlying common exploits such as programming errors assembly language networking shellcode cryptography and more And the bundled Linux LiveCD provides an easy to use hands on learning environment This edition has been extensively updated and expanded including a new intro duction to the complex low level workings of computer FEBRUARY 2008 480 PP W CD 49 95 ISBN 978 1 59327 144 2 Se THE BOOK OF WIRELESS 2ND EDITION THE BOOK OF A Painless Guide to Wi Fi and Broadband Wireless WIRELESS by JOHN ROSS i x This plain English guide to popular wireless networking standards shows readers how to connect to wireless networks anywhere they go After an introduction to networking in general and wireless networking in particular the book explains all available standards including all flavors of wireless Ethernet Wi Fi along with new standards like WiMAX and 3G networks Readers will learn how to use wireless software to connect to the Internet wherever they are rather than waiting until they re in range of a public Wi Fi hot spot The Book of Wireless offers information about all of the cur rently available wireless services for Internet access with advice on how to understand the important differences b
370. udes laptops and other portables that connect and disconnect from the network DHCP is the better choice because it allows the network to assign an address automatically when a user connects and to re use the same address after the first user has disconnected Some Internet service providers and corporate network managers assign static IP addresses to each user whereas others use DHCP to generate addresses Chapters 10 and 11 explain how to set up your own computer and LAN to use either method The Domain Name System Computers have no trouble handling long strings of numbers but people often do Addresses in the form of words rather than numbers are generally easier to remember and use That s why the Internet and just about every LAN use names for each computer connected to a network In a LAN each computer reads the name of every other device on the same network auto matically on the Internet a computer called a Domain Name System server DNS server converts names to numeric addresses when you type the name of a website into a browser a DNS server finds the number that corresponds to that name and returns it to your browser which connects to that numeric address You or your network manager will assign a name to each computer when you set up your network your Internet service provider should set up a domain name for your connection to the Internet Within a LAN you can use simple descriptive names for each computer such as
371. uff Pushing Cable Through Walls NOTE This is a book about computer networks rather than home improvement or new home construction so it s not the place to describe all the special tools and techniques that electricians and telephone installers have been using for more than a hundred years to push wires through walls under moldings and inside closets If you plan to install your own internal wiring consult some of the do it yourself websites or look for a book about home wiring at your local home center before you start I can specifically recommend Wiring Home Networks Sunset Books 2004 as a guide to installing network wiring because I wrote it However several other illustrated books about home wiring also include the information you need Installing the Network Control Center and Ethernet Cables 57 58 NOTE In order to feed wires from wall plates or surface boxes through your walls to the control center you will have to drill some holes through base plates studs and other structural elements of your house or workplace If you re working in rooms on the ground floor you might be able to reach the spaces between the walls from below drilling upward from an unfinished ceiling in the basement or crawl space On the top floor you can work down ward from the attic But if you can t get to the inside of the walls from above or below your best option will be to cut holes in the wall and drill through the vertical studs or t
372. uivalent privacy WEP encryption 90 91 174 175 176 179 182 181 183 217 wired networks connecting to 216 220 wireless Ethernet See Wi Fi wireless fidelity gateway firewalls 158 network names 86 network standards 78 78 79 security 54 89 92 174 184 175 178 181 wireless fidelity See Wi Fi wireless fidelity Wireless Network Connection programs 87 87 89 88 122 Wireshark 248 249 250 wiring Ethernet 17 home run 51 52 52 53 installing 16 18 57 58 66 modular structured wiring center 59 63 telephone 17 18 wiring closets 31 50 Wiring Home Networks Ross 57 workgroup names 145 World Wide Web Consortium 24 WPA Wi Fi Protected Access encryption 54 78 90 91 136 160 174 176 179 181 182 183 194 217 WPA encryption 90 176 X Xbox 360 220 222 X Display Manager Control Protocol 226 XMBC Media Center 208 Y yahoo com 44 Yahoo Messenger 234 235 Z ZoneAlarm 158 Zune 24 The Electronic Frontier Foundation EFF is the leading organization defending civil liberties in the digital world We defend free speech on the Internet fight illegal surveillance promote the rights of innovators to develop new digital technologies and work to ensure that the rights and freedoms we enjoy are enhanced rather than eroded as our use of technology grows PRIVACY EFF has sued telecom giant AT amp T for giving the NSA unfettered access to the private communicati
373. ulate a different set of changes It s essential to maintain some kind control that synchronizes everything File synchronization software compares computer files across a network and incorporates all the additions moves changes and deletions from each copy into all the others When the file synchronizer finds a conflict between two versions it can flag the differences and allow a human editor or project manager to decide which version to accept Most file synchronizers compare and update the contents of folders or directories but they don t open and change individual files you must make an all or none decision about each file Some synchronizers are limited to Windows or Macintosh computers but others can compare files stored on computers that use different operating systems Here are some programs that are either available at no cost or as try before you buy downloads e Synchronize It hitp www grigsoft com winsin htm e GoodSync hitp www goodsync com e Microsoft SyncToy hitp www microsoft com downloads search for SyncToy e DirSync Pro hitp directorysync sourceforge net index himl e FreeFileSync http sourceforge net projects freefilesync Instant Messaging and Live Communication As the name suggests instant messaging IM is the process of sending text or other data that arrives at its destination almost immediately The most common forms are text messaging in which the participants use their key board
374. uld open any other kind of file The audio Other Things You Can Connect to Your Network 211 212 Chapter 15 output for the computer s audio interface should connect through an audio cable to a set of powered computer speakers or a full scale stereo or home theater system If you re using the computer exclusively as a music client you don t need the latest and most powerful processor or a large screen monitor Anything that can connect to the network and support a decent audio interface unit should be entirely adequate If you have an older laptop that you re no longer using for other purposes try using it as a music client the laptop is probably more compact than a desktop unit and it might work just as well if you plug a decent audio interface into the USB port Most computers look like well like computers If your stereo system is located on a bookshelf or behind glass cabinet doors in your living room you might prefer to use a music server that matches your other stereo components If you don t mind assembling a computer out of parts look for computer cases such as the Antec case shown in Figure 15 3 that look like stereo equipment But remember that you ll still need some kind of keyboard mouse and monitor On the other hand it s often easy enough to place the computer case out of sight on the floor or in some other out of the way location or to run the server through the network from another room Photo co
375. urtesy of Antec Figure 15 3 Some computer cases are designed to look like stereo components Connecting Your Network to Your Stereo If you don t have a spare computer you can also run audio cables between your stereo and a nearby computer that you re using for other purposes For example if you have both a desktop computer and a stereo system in your home office or study you can use that computer to feed the existing speakers through the stereo s amplifier Even if the stereo is in another room running audio cables through the wall or under the floor might be more practical Figure 15 4 shows a typical system connection To play music from your music server set the input selector on the stereo to the Auxiliary input or whichever input you have connected to the computer and use the computer s mouse and monitor to select the song or other music file you want to hear If your computer or sound card has digital outputs either optical or copper and the stereo has digital inputs use a digital cable to transfer the audio The computer should automatically open the music file in a compatible player and feed it to the stereo de Ethernet GP Music Wi Fi x server router Kg Digital or analog audio Music client CS Ethernet amp g Digital or analog audio Music Music server client Speaker Figure 15 4 A music server can connect to a client through either a Wi Fi link or an Ether net cable The cl
376. ut a 54 68 65 20 48 6f 75 73 The Hous e gave f 69 6e 61 6c 20 61 70 70 inal roval to 20 74 68 65 20 24 37 30 the 70 0 billio Figure 17 4 Wireshark uses contrasting colors to show different kinds of data frames 250 Chapter 17 ISP Problems As a formal or informal network manager you re often on your own when you re trying to find and fix a problem on your LAN but if you or one of your users discovers a problem using the Internet you might need help from your Internet service provider s ISP s support center and the people who run the computer or network at the other end of your connection Therefore you should find and keep the telephone numbers and email addresses of the ISP s help desk and the network tech center at the telephone company cable TV service or other company that provides the physical connection between your own LAN and your ISP The people who answer calls in those support centers are there to help you and they will often have tools that can test and monitor your network connection When you talk to a support representative ask for the case number or trouble ticket number that they have assigned to your problem if you have to call back later the case number will lead the person who takes your call to the notes about earlier calls Don t Panic Finally keep calm Your network does not have a mind of its own If you take a logical and organized approach to finding the cause of a network problem
377. ut to be too expensive and too intrusive to be practical for individual users As a business proposition call based picturephones were a complete flop But less expensive video devices and higher bandwidth have made it possible to send and receive both still pictures and full motion video through computer networks As a result many people have added online cameras webcams and microphones to their systems Both Microsoft s Windows Live Messenger shown in Figure 16 9 and Apple s iChat support video conversations in parallel with their text messag ing services They re both designed to operate through the Internet but there s nothing to stop you from using them to conduct conversations with other people on your LAN vi 0X D Karen ready for the weekend karentoh hotmail com BUGROSBS Rh 4 amp Thomas says Are we up for tonight guys Karen says I m down Thomas says oe So I ll see you later then J G 4 Z7 d 3 Tonight of course E Send Search ZA e E Play the new Windows Live Messenger Games Image courtesy of Microsoft Figure 16 9 Windows Live Messenger can add video images to simple text Other Network Applications 237 TROUBLESHOOTING When your network is working properly it s all but invisible you can send and receive files through the network between any pair of computers or other connected devices But when a connection fails or one of your users can t f
378. utton to open the Save As dialog Use either the Save In field or the finder window to navigate through the network to the folder on the file server where you want to store the backup file Choose that folder and click the Save button and then the Next button in the wizard window 6 The wizard will show you the details about the backup you are about to create If everything is correct click Finish The backup program will start To restore data from your backup files run the same Windows Backup program but select the Restore files and settings option in the Backup or Restore Wizard The reason you re making backups is to protect your data against loss or damage The most common problems that will destroy your original files are caused by either human error you really didn t mean to reformat that hard drive did you or damage to a disk drive When either of those events occur restoring the files from a network server is easy enough but if you lose your files because of a fire a power surge a lightning strike that damages the server along with the client computers or some other major disaster the backup files on the dead server won t do you much good Therefore creating at least one set of backup files on a set of DVDs tapes or removable hard drives and storing them in another location such as a friend s home or office or a safe deposit box at your bank is always good practice Installing Backup in XP Home Edition In Window
379. ven t already done so this is a good time to look around the rooms where you plan to install network outlets and the spaces directly above and below each room If you have access to an unfinished basement or attic you can run cables through the rafters and joists but if you have to run cables through finished walls and ceilings you will probably have to hide cables inside walls and behind baseboards and patch some holes after the wires are in place Either way look for the best routes for cables from each network outlet to the control center Use a pencil to mark the routes on your floor plan There are two ways to attach a network outlet to a wall For a finished appearance use a wall plate similar to the ones used for electrical outlets like the one shown in Figure 5 2 If the outlet will be hidden behind furniture or in some other place where it won t be visible you can use a small terminal block mounted on a baseboard like the one in Figure 5 4 Figure 5 4 A data terminal block can mount directly to a baseboard Trunks and Branches Using Secondary Switches There s an alternative to a pure home run wiring design for small networks that can make it possible to expand the network without having to run new cables all the way back to the control center This approach which vaguely resembles the trunks and branches of a tree or the tributaries of a river uses data switches to connect additional computers and other devices to th
380. vice Dial up network links are considerably slower than DSL cable or Types of Network Connections 21 22 Chapter 2 other high speed services but they re convenient because there s a POTS telephone line in just about every home and business and because the PTSN often continues to work during power failures A network connection through a telephone line uses a modem to convert digital computer data to sounds that can pass through the PTSN A second modem at the other end converts those sounds back to digital data The communications programs in Windows and other operating systems send control codes that instruct the modem to transmit telephone numbers and adjust the data transfer speed and other configuration settings Most new laptops have built in PTSN modems Separate modems for desktop computers are available as internal expansion cards or external devices that connect to the computer through a serial data port or a USB cable Figure 2 9 shows the dial up modem control panel used in Windows XP to connect a computer to a distant network or an Internet service provider ISP Figure 2 10 shows the setup screen for the HyperTerminal program Other programs have different layouts but they all do essentially the same thing They dial a telephone number and log in to the computer that answers the call Advanced properties specify the type of network connection the data speed and other configuration settings Connect Internet via MS
381. w account in the Manage Accounts dialog Step through the rest of the process to create a new account and then return to the File Sharing dialog You should now see the name of the new account in the drop down menu Select the person you want to share access to this folder with and click the Add button That name will appear in the list of users as shown in Figure 12 8 ry kw 72 File Sharing Choose people to share with People without a user account and password for this computer can access files you share with everyone To change this setting use the Net Name Permission Level R Everyone amp john Ross Owner v 3 Sample New User Reader 4p Unknown Contact Co owner Wt Share Cancel Figure 12 8 The File Sharing dialog now includes the new user s name 7 Click the Permission Level to the right of each user s name to assign that person one of these permissions for the shared files in this folder Reader A reader can view the contents of files but cannot edit or delete them Contributor A contributor can view files and add new ones to the folder but cannot edit or delete existing files Co owner The co owner of a file or folder can open and view files create new ones and edit or delete existing files 8 Click the Share button at the bottom of the dialog to save your changes and close the window 9 The File Sharing utility will display a window confirming that the folder in question is no
382. w shared with other computers on the network The utility offers to email other users to advise them about the new shared folder but you do not need to send such a message the new share automatically appears whenever an authorized user opens a link to your computer as shown in Figure 12 9 T Tower Computer Tower Bl xj File Edit View Favorites Tools Help 2 Or Ory FIDE lee xX lbr ig Address 2 Tower 2 2 2 Ampex Manuals C F Folk Music Revival ad ad ed a G H Hootenanny Pix Public 8 objects A Figure 12 9 This network link shows a computer with four hard drives C F G and H along with three shared folders and a Public folder 10 Click the Done button at the bottom of the dialog to close the window To change permissions for an individual file within a shared folder follow these steps 1 Open the folder that contains the file 2 Right click the name or icon for the file whose permissions you want to change A Properties window for that file will appear Sharing Files Through Your Network 141 142 Chapter 12 Click the Security tab to view the dialog shown in Figure 12 10 In the Group or User Names list choose the name of each user to see current permissions If you can t see the name you want use the scroll bar at the right side of the list To change a user s access to this file click the Edit button The Permis sions dialog shown in Figure 12 11 will appear i JI
383. when you re using existing circuits such as telephone lines you don t have any choice you must find a way to send one bit at a time with some additional bits and pauses that identify the beginning of each new byte This is a serial data communications channel because you re sending the bits one after another At this stage it doesn t matter what medium you use to transmit those bits it could be electrical impulses on a wire or two different audio tones or a series of flashing lights or even a lot of notes attached to the legs of carrier pigeons but you must have a way to convert the text or other output of the computer to the signals used by the transmission medium and to convert the same signals back again at the other end Packets and Headers Communication over a direct physical connection such as a wire between a single origin and destination doesn t need any kind of address or routing information to tell a message where to go You might have to set up the connec tion first by placing a telephone call or plugging cables into a switchboard but after you re connected the link remains in place until you instruct the system to disconnect This kind of connection is great for voice and for simple data links but it s not particularly efficient for digital data on a complex net work that serves many origins and destinations because a single connection ties up the circuit all the time even when no data is moving through the channe
384. wireless service you can connect through that network to the Internet and onward to your corporate VPN server Because you ll have to log in to the public network before you initiate the VPN connection you should create a separate VPN via Public Network connection profile in addition to the one you use from your own office The profile should point to your corporate VPN server but it should not be your default connection To connect through a public network on a computer running Windows follow these steps 1 Turn on the computer with the wireless network adapter in place 2 Use your wireless configuration utility to select the public network you want to use 3 Start Internet Explorer Netscape Navigator or another web browser You will see the public network s login screen 4 Ifthe computer doesn t do it automatically type your account name and password The public network will acknowledge your login 5 Minimize the browser window and open the Network Connections win dow or find the VPN shortcut on your desktop 6 Double click the icon for your VPN via Public Network profile The com puter will connect through the Internet to your corporate LAN 7 Type the login and password for your corporate network Network Security 173 174 VPNs are an important part of many networks security plans for off site users With just a few keystrokes or mouse clicks you can establish access to your network resources from anywhere wi
385. work If you can t connect to any site look for a local problem such as your computer the LAN or your Internet service provider An Alternate Connection to the Internet When your Internet connection breaks down it s not possible to use that connection to consult technical support websites or send email to your net work provider Therefore it s often helpful to have a backup method for connecting at least one of your computers to the Internet It might be a neighbor s Wi Fi network with their permission of course a nearby library or coffee shop that offers Internet access or a link through a dial up tele phone line and modem Before you have a problem ask your Internet service provider if they offer dial up access along with their high speed services If they do ask them for a dial up account as an emergency backup and make a note of the access telephone numbers login name and password in your network notebook The Collective Wisdom of the Internet Any problem that occurs on your network has happened before to somebody else You have an excellent chance of finding a description of the problem and instructions for fixing it someplace on the Internet This is where defining the problem carefully becomes important If you re working with a Windows based network the Microsoft Knowledge Base at hitp support microsoft com can be particularly useful if Microsoft s technical support people have ever had to deal with a part
386. work Connection Properties X Travelodge Palo Alto properties General Wireless Networks Advanced below Available networks v Use Windows to configure my wareless network setings To connect to disconnect fom or find out more information about wireless networks in range click the button below View Wireless Networks Preferred networks Automatically connectto available networks in the order listed 4 Travelodge Palo Alto Automatic Stanford Manual 4 test Aulomate X SampleNetwork Automatic Add Remove Properties Leam about seting up wireless network configuration Advanced Association Authenlicabon Connection Network name SSID Wireless network key This network requires a key for the following Network Authenscaton x Data encryption WEP Y Network key DIDI Co coe Figure 8 8 The Windows Wi Fi control program automatically saves the characteristics of past network connections If your computer remains connected to the same Wi Fi network all the time at home or in your office or if you frequently connect to the same Wi Fi hotspot at your favorite coffee shop or lecture hall the Wi Fi control program should automatically use the password and other configuration settings for that network every time you turn on the computer within the network s range The exceptions are public networks that require a new login with every connection N
387. work data because they see the data as noise on the AC power voltage Conversely if you re using a powerline net work you will want to connect your stereo or home theater system to power conditioners to filter out the noise produced by the network All equipment that follows the HomePlug specifications should work together in the same network Some older types of powerline networking might also be available but they re less reliable than HomePlug because they can suffer from interference caused by certain electrical appliances such as vacuum cleaners and other appliances that use big motors or power transformers and they don t always work well with very old house wiring Today it s better to stay away from anything that doesn t carry the HomePlug certification mark shown in Figure 2 4 Pratt HomePlug CERTIFIED Figure 2 4 The HomePlug certification mark indicates that a powerline network ing product has been approved by the HomePlug Powerline Alliance If installing Ethernet wiring is not practical in your building a HomePlug network might be your best choice When it works which it does in most houses it provides an easy reliable network But some would be users report slow performance and other problems so it s best to buy your HomePlug adapters from a retailer who will allow you to return them if they don t work in your house Other Alternative Wiring Methods Two more home networking methods are po
388. works If you plan to connect the computer to a Gigabit Ethernet network you ll need a faster and more expensive adapter Like other computer components Ethernet adapters are available both as inexpensive no name products and slightly more costly brand name versions that come with better documentation and a manufacturer s warranty As always you get what you pay for considering that you can generally find a brand name adapter for just a few dollars or euros or pounds more it s usually the better choice Internal Expansion Cards Internal network adapters are printed circuit cards that fit into one of the expansion slots on your computer s motherboard like the one shown in Figure 7 3 Unless you re working with a very old computer the adapter should be a PCI card that s probably the only kind you will find at your local computer or office supply store The PCI sockets on the motherboard are almost always white Photo courtesy of D Link Figure 7 3 An internal PCI card mounts in an expansion slot inside a desktop or tower computer If your computer was made before the mid 1990s you might need an ISA card instead ISA sockets on motherboards are usually black ISA Ethernet adapters are still available but you ll probably have to go to a specialist source A Web search for ISA Ethernet card will produce pointers to many choices but be sure to order a 10 100 or fast Ethernet card rather than an older design that works at only
389. works in their computers control programs Channel number Each access point operates on a single channel This option sets that channel For best performance choose a channel that is different from the ones used by other Wi Fi networks within your signal range Operating mode Many access points can operate on more than one operating mode 802 11b 802 11a 802 11g or 802 11n depending on the mode used by the computers with which it exchanges data This option allows you to set the access mode to detect operating modes automatically and choose the best one available or to specify a parti cular mode Other wireless settings are often available sometimes in a separate advanced menu or web page Unless you have a good reason to change something it s usually best to keep the default settings Many Wi Fi access points are combined with routers or modems so the configuration process also includes some additional setup options See Chapter 10 for information about configuring a router or modem If you re using a separate access point it s usually best to turn off the DHCP server in the access point and obtain all of the network s addresses from the router or modem Wireless Connection Programs A computer with an installed Wi Fi adapter uses a wireless control program to select a Wi Fi network and establish a connection Windows Mac OS X and various versions of Linux and Unix include wireless control programs and alternative control
390. ws you to select files from your own server or streaming programs through the Internet Ultimately these devices will be as easy to use as the tabletop radio in your bedroom or kitchen simply turn the device on select the station and listen The important difference is that you re not limited to the programs on local radio stations you can choose from thousands of radio stations and streaming music services that offer a huge variety of music news and other programming many of them without commercials Today Internet radios are still expensive novelties most cost 200 or more but if and when the price comes down they will probably become a hugely popular alternative to radios that only receive local stations Video Through a Home Network Video in the form of movies television shows home videos or files down loaded through the Internet is yet another type of program material that you can distribute through your network You can view videos on your computer s monitor or through an adapter on a television screen Video distribution through a network follows a similar structure to audio Video files are stored on a server and transmitted to a client on demand However video files contain many more bits per minute of content than audio files so the network must have a high enough capacity to handle that additional demand In practice this means that many Wi Fi links except the newest 802 11n equipment may not be able to keep u
391. xchange data in both directions between these two networks In certain respects the Internet treats the router the same way that the router treats the other com puters on the network but the Internet uses different addresses to accomplish those goals One of the important activities that occurs inside the router is network address translation Your router s Setup utility shows two groups of settings one for the WAN and one for the LAN The WAN side identifies the router to the Internet with a unique numeric address That address can be either fixed or static which means that it is always exactly the same or dynamic which means that a server at the WAN assigns the next available address from a pool every time the router connects to the WAN Dynamic address assignment uses a process called Dynamic Host Configuration Protocol DHCP which is described in DHCP Servers On or Off on page 110 The gateway router typically specifies the numeric address of one or more Domain Name System DNS servers that convert Internet addresses that use words such as nostarch com into numeric addresses Without a DNS server to consult the WAN won t know where to direct email messages requests for web pages or any other attempts to communicate with a destination on the Internet Your Internet service provider will provide the addresses of one or more DNS servers The router also needs a gateway address and a subnet mask The gateway is the next router in li
392. y a Network Setup Complete screen Connecting to a Wireless Network To connect a TiVo DVR to your network through a Wi Fi link follow these steps 1 Press the TiVo button on your DVR The TiVo Central screen will appear Select Messages and Settings gt Settings Phone amp Network If your TiVo is already connected to a telephone line select Use network instead If it s connected to a wired network select Change network set tings Press Select If the wireless adapter is not already connected connect it now When the TiVo identifies the wireless adapter it will display the Network Adapter Detected screen Press Select The Wireless Network Name screen will appear Either select the name of your Wi Fi network and press Select or if the network does not broadcast the network s name select Enter network name and follow the instructions on your screen TiVo will ask for your network password Use the keypad on your screen to type your WEP or WPA password and then click Done Entering Net work Password If the password is correct and your network uses a DHCP server the Network Setup Complete screen will appear If the network doesn t use DHCP you will see a series of configuration screens Type the IP address subnet mask and the addresses for your network s gateway router and DNS server Importing Programs To watch a program that has been stored on a TiVo from a second DVR in another room follow these steps
393. y detect your network If you don t take some precautions to prevent it your neighbor or somebody using a laptop or PDA inside a car parked on the street can log in to your LAN steal files from your servers and tie up your Internet connection with streaming videos multiplayer games or worse It s important to understand that we re talking about two different kinds of security threats The first is the danger of an outsider connecting to your network without your knowledge or permission the second is the possibility that a dedicated eavesdropper can steal or modify data as you send and receive it Each represents a different potential problem and each requires a different approach to prevention and protection While it s certainly true that none of the encryption tools currently available can provide complete protection they can make life more difficult for most casual intruders And as long as the tools are out there you might as well use them Network Security 175 176 Chapter 13 An unsecured wireless network presents many opportunities to an attacker Not only are the network crackers able to monitor any data that moves through the network but they might also be able to modify that data If for example your web browser has a vulnerability an attacker can replace images as you view them with an image that exploits that vulnerability and installs a Trojan horse program on your computer allowing the attacker to steal data st
394. y increases the key s complexity a long key takes much longer to crack than a short one However a commercial product called Elcomsoft Distributed Password Recovery uses graphics processors on video cards to break Wi Fi encryption up to 100 times faster than by using CPU only so even a relatively long key is not that secure Completely protecting yourself against attacks might not be possible or practical but a long passphrase that includes random numbers and punctua tion marks is still a better choice than a string of words or numbers alone Network Security 183 184 In other words something like hdt 96mzx33wolfbfgilxxqcv ttsmedbxoris a better passphrase than nostarchpressbooks But the only truly secure way to use Wi Fi is to combine it with VPN encryption Access Control MAC Authentication Most access points include an option that permits the network manager to restrict access to a specific list of client adapters If a network device with a MAC address that does not appear on the list of authorized users tries to connect the access point will not accept the request to associate with the network This option can keep intruders from connecting to a wireless LAN but it forces the network administrator to keep a complete list of users adapters and their MAC address Every time a new user wants to join the network and every time an established user swaps adapters or gets a new laptop PDA or other device with a built in a
395. your computer against security threats and performance problems we strongly recommend Updates 1 you install all high priority updates Select b i Total 1 updates 171 KB less than Type y Review and install updates miniis High Priori ar Y 4 Important Software You ve hidden important updates Optional 2 You ve asked us not to show you one or more high priority updates but your computer might be at risk until they are installed Restore them now Hardware Optional 0 Select by High priority updates oe Microsoft Windows Defender Windows 3 ra I CAPICOM Definition Update for Windows Defender KB915597 Definition 1 39 119 0 0 E Microsoft Update Privacy Statement 2008 Microsoft Corporation All riahts reserved Terms of Use Trademarks Privacy TT T T T inem 100 gt 5 Figure 13 21 The list of update types left shows the number of updates available for each category Network Security 187 188 5 Choose the updates you want to install in each category from the right panel The number in parentheses next to Install Updates in the left panel shows the number of updates you have selected 6 Click Install Updates The Review and Install Updates panel will appear on the right side of the window 7 Click the Install Updates button The update program will load the updates you have selected one at a time If necessary the Update rou tine will restart the computer to complete one
Download Pdf Manuals
Related Search
Related Contents
French pdf Lucent Avaya X330W 2DS1 (700214612) Router infusion set/dispositif de perfusion - ACCU Cooper Lighting LV-616-TR User's Manual monteringsvejledning 全ページ - いなべ市 第10期定時株主総会招集ご通知(インターネット開示情報を含む) Manual de Utilização - Suporte AR Telecom Copyright © All rights reserved.
Failed to retrieve file