Basic Home Networking – Part 2

Welcome to the Fast-Air Tech Talk newsletter. The Tech Talk newsletter is a free service for all Fast-Air customers. Please feel encouraged to suggest newsletter topics.

Wireless computer devices use radio transmissions to connect to a router. Inside all routers supporting wireless devices is a transmitter-receiver, or transceiver. This radio signal is converted to a digital signal inside the router. Typical wireless power radiation is measured in microwatts.

Because the radiated power is measured in microwatts and radio signals are affected by solid objects, the effective range of a router wireless signal is about 50 to 300 feet. The effective distance is determined by the radio in the computer devices too. In a home or small office, the location of the wireless router is important to having good signal range.

Because consumer grade routers supporting wireless are part of a LAN, the wireless portion of the LAN sometimes is called the Wireless LAN or WLAN.

The term Wi-Fi describes a wireless connection. The term actually has no definition. The term was derived as a marketing gimmick. The term sounds similar to Hi-Fi, which means High Fidelity, a term used to describe audio quality in home stereo systems. Unlike Hi-Fi, Wi-Fi does not mean Wireless Fidelity.

Not all consumer grade routers support wireless.

Whereas wired devices usually communicate with one another the moment they are connected, wireless devices are more fickle. Wireless signals are easily monitored by anybody because the radio signal radiates everywhere. Therefore security plays a role in how wireless devices connect. All wireless devices use the computer equivalent of handshaking to connect. Because security is important, often wireless signals are encrypted to prevent untrusted people from learning the contents of the signals.

Wired connections can be monitored too, but unlike open radiating wireless transmissions, requires physical access to the computers.

All computer devices connected to a network are assigned an identifier called an IP (Internet Protocol) address. An IP address is a bunch of numbers and functions much the same as a street address. For most people the IP address will look something like 192.168.0.1 or 10.2.1.1.

All IP addresses use the same format. All IP addresses on a LAN are similar to one another. This similarity is called a subnet. All devices on the same subnet do not need anything more than a switch to communicate with one another.

Devices on different subnets, that is, different networks, need a router to communicate with one another.

Routers keep track of multiple computers and devices through technology known as Network Address Translation (NAT). NAT technology converts each device’s local IP address on a specific subnet into the public IP address assigned by the ISP.

High-end consumer “routers” offer many features, such as firewalls and supporting USB devices for shared storage or printers. Generally, security becomes more complicated and challenging the more features a router device supports.

Similar to the firewall in a car that is used to inhibit engine fires, a computer firewall is the term used to describe software that inhibits unwanted computer connections. Loosely speaking, devices that are trusted are allowed to communicate with one another. Untrusted devices are blocked. For home and office computers, firewalls in routers are used to block unrequested incoming traffic from the Internet but allow outgoing requests.

While computer operating systems support some kind of internal software firewall, a router firewall adds an additional layer of security by protecting the entire network behind the firewall.

Routers are essential for sharing a single ISP connection among multiple computers and devices. Routers are essential when wanting to use wireless devices. Yet installing a router even when using only one computer in the home or office is a good security layer.

Technical trivia: Before the World Wide Web became popular, computer enthusiasts conversed online through community bulletin board systems (BBS). Software developers used BBSs to provide patches and drivers. BBSs were managed and maintained by sysops, or system operators. Large BBSs supported multiple modems to support several concurrent users.

Next issue: Basic Home Networking – Part 3

Dancing Animals?

Video

Latest posts by Backwoods Geek (see all)