What type of SOHO Internet access method offers the best bandwidth

THE FOLLOWING COMPTIA A+ 220-901 EXAM OBJECTIVES ARE COVERED IN THIS CHAPTER:

  • ✓ 2.5 Compare and contrast various WiFi networking standards and encryption types.
    • Standards
      • 802.11 a/b/g/n/ac
      • Speeds, distances, and frequencies
    • Encryption types
      • WEP, WPA, WPA2, TKIP, AES
  • ✓ 2.6 Given a scenario, install and configure a SOHO wireless/wired router and apply appropriate settings.
    • Channels
    • Port forwarding, port triggering
    • DHCP (on/off)
    • DMZ
    • NAT / DNAT
    • Basic QoS
    • Firmware
    • UPnP
  • ✓ 2.7 Compare and contrast Internet connection types, network types, and their features.
    • Internet Connection Types
      • Cable
      • DSL
      • Dial-up
      • Fiber
      • Satellite
      • ISDN
      • Cellular
    • Line-of-sight wireless Internet service

Over the last two chapters, we’ve talked a lot about foundational networking knowledge. We’ve discussed theoretical networking models, physical topologies, cables and connectors, and connectivity devices. We also spent an entire chapter devoted to the most common protocol of all, TCP/IP. The one critical technology that we haven’t covered yet is wireless networking.

Because of the unique technology of wireless networking and its huge spike in popularity, it feels appropriate to talk about it as a separate entity. That said, it’s important to remember that wireless networking is just like wired networking only without the wires. You still need to figure out how to get resources connected to each other and give the right people access while keeping the bad people at bay. You’re now just playing the game with slightly different rules and many new challenges.

We’ll start this chapter off with the last of our key networking “theory” discussions, this one on wireless networking standards and encryption methods. From there, we’ll move on to setting up and configuring small networks. This is really where the rubber meets the road. Understanding the theory and technical specifications of networking is fine, but the true value in all of this knowledge comes in being able to make good recommendations and implement the right network for your client’s needs.

No area of networking has experienced as rapid an ascent as wireless networking over the last several years. What used to be slow and unreliable is now fast and pretty stable, not to mention convenient. It seems like everywhere you go these days there are Internet cafés or fast-food restaurants with wireless hotspots. Nearly every mobile phone sold today has Internet capabilities. No matter where you go, you’re likely just seconds away from being connected to the Internet.

The most common term you’ll hear thrown around referring to wireless networking today is Wi-Fi. While the term was originally coined as a marketing name for 802.11b, it’s now used as a nickname referring to the family of IEEE 802.11 standards. That family comprises the primary wireless networking technology in use today, but there are other wireless technologies out there too. You might hear about Bluetooth, cellular, infrared, or others. Each of these standards has its strengths and weaknesses and fills a computing role. The A+ exam covers only 802.11 though, so that’s primarily what we’ll focus on here.

As a technician, it will fall to you to provide users with access to networks and the Internet. You must make sure that their computers and mobile devices can connect and they can get their email and that downtime is something that resides only in history books. To be able to make that a reality, you must understand as much as you can about networking and the topics discussed in the following sections, where we’ll take an in-depth look at the 802.11 standards. After that, we’ll spend some time on wireless security features as well.

In the United States, wireless LAN (WLAN) standards are created and managed by the Institute of Electrical and Electronics Engineers (IEEE). The most commonly used WLAN standards used today are in the IEEE 802.11 family. Eventually, 802.11 will likely be made obsolete by newer standards, but that is some time off. IEEE 802.11 was ratified in 1997 and was the first standardized WLAN implementation. There are over 20 802.11 standards defined, but you will only see a few in common operation: 802.11a, b, g, n, and ac. As mentioned in the introduction to this chapter, there are several wireless technologies on the market, but 802.11 is the one currently best suited for WLANs.

In concept, an 802.11 network is similar to an Ethernet network, only wireless. At the center of Ethernet networks is a connectivity device such as a hub, switch, or router, and all computers are connected to it. Wireless networks are configured in a similar fashion, except that they use a wireless router or wireless access point instead of a wired connectivity device. In order to connect to the wireless hub or router, the client needs to know the service-set identifier (SSID) of the network. SSID is a fancy term for the wireless network’s name. Wireless access points may connect to other wireless access points, but eventually they connect back to a wired connection with the rest of the network.

802.11 networks use the Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) access method instead of Ethernet’s Carrier Sense Multiple Access/Collision Detection (CSMA/CD). Packet collisions are generally avoided, but when they do happen, the sender will need to wait a random period of time (called a back-off time) before transmitting again.

Since the original 802.11 standard was published in 1997, several upgrades and extensions of the standard have been released.

The original 802.11 standard defines WLANs transmitting at 1Mbps or 2Mbps bandwidths using the 2.4GHz frequency spectrum and using either frequency-hopping spread spectrum (FHSS) or direct-sequence spread spectrum (DSSS) for data encoding.

The 802.11a standard provides WLAN bandwidth of up to 54Mbps in the 5GHz frequency spectrum. The 802.11a standard also uses a more efficient encoding system, orthogonal frequency division multiplexing (OFDM), rather than FHSS or DSSS.

This standard was ratified in 1999, but devices didn’t hit the market until 2001. Thanks to its encoding system, it was significantly faster than 802.11b (discussed next) but never gained widespread popularity. They were ratified as standards right around the same time, but 802.11b devices beat it to market and were significantly cheaper.

The 802.11b standard was ratified in 1999 as well, but device makers were much quicker to market, making this the de facto wireless networking standard for several years. 802.11b provides for bandwidths of up to 11Mbps (with fallback rates of 5.5, 2, and 1Mbps) in the 2.4GHz range. The 802.11b standard uses DSSS for data encoding. You will occasionally still see 802.11b devices in the wild, but they are relatively uncommon today. When you encounter them, encourage the users to upgrade to something faster. They will appreciate the increase in speed!

What type of SOHO Internet access method offers the best bandwidth

The 802.11b and 802.11a standards are incompatible for two reasons: frequency and modulation. 802.11b operates in the 2.4GHz frequency and uses DSSS. 802.11a runs at 5GHz and uses OFDM.

Ratified in 2003, the 802.11g standard provides for bandwidths of 54Mbps in the 2.4GHz frequency spectrum using OFDM or DSSS encoding. Because it operates in the same frequency and can use the same modulation as 802.11b, the two standards are compatible. Because of the backward compatibility and speed upgrades, 802.11g replaced 802.11b as the industry standard for several years, and it is still popular today.

What type of SOHO Internet access method offers the best bandwidth

Devices on the market that can operate with both 802.11b and 802.11g standards are labeled as 802.11b/g.

As we mentioned, 802.11g devices are backward compatible with legacy 802.11b devices, and both can be used on the same network. That was initially a huge selling point for 802.11g hardware and helped it gain popularity very quickly. However, there are some interoperability concerns of which you should be aware. 802.11b devices are not capable of understanding OFDM transmissions; therefore, they are not able to tell when the 802.11g access point is free or busy. To counteract this problem, when an 802.11b device is associated with an 802.11g access point, the access point reverts back to DSSS modulation to provide backward compatibility. This means that all devices connected to that access point will run at a maximum of 11Mbps. To optimize performance, you should upgrade to all 802.11g devices and set the access point to G-only.

One additional concept that you need to know about when working with 2.4GHz wireless networking is channels. We’ve said before that b/g works in the 2.4GHz range. Within this range, the FCC has defined 14 different 22MHz communication channels. An illustration of this is shown in Figure 8.1.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.1 2.4GHz communication channels

Although 14 channels have been defined for use in the United States, you’re only allowed to configure your wireless networking devices to the first 11. When you install a wireless access point and wireless NICs, they will all auto-configure their channel and this will probably work okay for you. If you are experiencing interference, changing the channel might help. And if you have multiple, overlapping wireless access points, you will need to have non-overlapping channels to avoid communications problems. (We’ll talk about this more in the section, “Installing and Configuring SOHO Networks,” later in this chapter.) Two channels will not overlap if there are four channels between them. If you need to use three non-overlapping channels, your only choices are 1, 6, and 11.

Continuing the evolution in Wi-Fi is 802.11n, which was ratified in 2010. The standard claims to support bandwidth up to 600Mbps, but in reality the typical throughput is about 300Mbps to 450Mbps. That’s still pretty fast. It works in both the 2.4GHz and 5GHz ranges.

802.11n achieves faster throughput in a couple of ways. Some of the enhancements include the use of 40MHz channels, multiple-input multiple-output (MIMO), and channel bonding. Remember how 802.11g uses 22MHz channels? 802.11n combines two channels to double (basically) the throughput. Imagine being able to take two garden hoses and combine them into one bigger hose. That’s kind of what channel bonding does. MIMO means using multiple antennas rather than a single antenna to communicate information. (802.11n devices can support up to eight antennas, or four streams, because each antenna only sends or receives.) Channel bonding also allows the device to communicate simultaneously at 2.4GHz and 5GHz and bond the data streams, which increases throughput.

One big advantage of 802.11n is that it is backward compatible with 802.11a/b/g. This is because 802.11n is capable of simultaneously servicing 802.11b/g/n clients operating in the 2.4GHz range as well as 802.11a/n clients operating in the 5GHz range.

In the 5GHz spectrum, there are 25 non-overlapping 20MHz communications channels, 24 of which can be used for Wi-Fi networks. On the surface, this sounds much better than the 3 non-overlapping channels available in the 2.4GHz spectrum!

To increase throughput, 802.11n (and 802.11ac, discussed in the next section) bond channels together. When 20MHz channels are bonded into 40MHz channels, this reduces the number of non-overlapping channels to 12. To complicate matters further, weather, commercial, and military radar operate in the 5GHz range as well, and Wi-Fi needs to avoid conflicting with them.

To avoid conflicts, wireless routers use a technology named dynamic frequency selection (DFS), which will detect radar interference and dynamically adjust to a different frequency range to avoid the problem. If your installation is in an area that does not receive interference from radar signals, you will have 12 non-overlapping 40MHz channels. Otherwise, only 4 non-overlapping, non-DFS 40MHz channels remain available for bonding.

If you’re curious (and it’s highly unlikely that you will be tested on this), the four non-overlapping non-DFS 40MHz channels are numbered: 36 and 40, 44 and 48, 149 and 153, and 157, and 161. We’ll explain this a bit more in the section on 802.11ac.

Technology is always marching forward and getting faster and cheaper, and wireless networking is no different. In January 2014, 802.11ac was approved as the newest Wi-Fi standard. In many ways, it’s a more powerful version of 802.11n in that it carries over many of the same features while adding in only a few new ones. It’s the first commercial wireless standard that claims to offer the speed of Gigabit Ethernet.

802.11n introduced channel bonding and MIMO, and 802.11ac takes those concepts further. Instead of bonding two channels, 802.11ac can bond up to eight for a 160MHz bandwidth. This results in a 333-percent speed increase. And 802.11ac doubles the MIMO capabilities of 802.11n to eight streams, resulting in another 100 percent speed increase. The theoretical maximum speed of 802.11ac is a ridiculous 6,900Mbps, but most current devices can get to about 1,300Mbps. Common maximum throughput is just under Gigabit Ethernet speeds, at around 800Mbps. You might see devices in the marketplace that claim to offer speeds over 2Gbps, but the reality is that you’re unlikely to get those speeds in anything less than pristine, laboratory-like conditions with all top-of-the-line hardware. In other words, don’t count on it being that fast.

Remember that Wi-Fi installations using the 5GHz range need to steer clear of radar signals to avoid conflicts. Radar for airplanes and weather stations has priority over your Wi-Fi network. (Sorry!)

802.11ac obtains its insanely fast performance mostly through channel bonding. If you will recall, 802.11n can bond 20MHz channels into 40MHz ones, whereas 802.11ac can take the same channels and bond them further into either 80MHz or 160MHz channels.

Ignoring DFS for a moment, there are a maximum of six non-overlapping 80MHz channels and two non-overlapping 160MHz channels available in the 5GHz spectrum. You can’t ignore DFS though, and it takes the maximum number of non-overlapping 80MHz channels down to two and eliminates any possible 160MHz channels.

Why is this important to know? Well, mostly because it explains why you’re probably not going to get gigabit speeds out of 802.11ac. And for companies or other organizations that want to upgrade to 802.11ac, there are only two non-overlapping channels to use at 80MHz. This makes it difficult (if not impossible) to deploy in anything other than a relatively small office. The other option is to use 40MHz channels just like 802.11n, but then the performance boost of 802.11ac is small and not likely to justify the higher cost of equipment. Figure 8.2 illustrates the available channels in the 5GHz frequency. The channels in the UNII-1 and UNII-3 are the ones that are completely available for Wi-Fi network use. UNII-2 and UNII-2 Extended channels are the DFS ones. (UNII stands for Unlicensed National Information Infrastructure, and is sometimes abbreviated as U-NII.)

What type of SOHO Internet access method offers the best bandwidth

Figure 8.2 Channel availability in the 5GHz spectrum

The most important new feature of 802.11ac is beamforming, which can allow for range increases by sending the wireless signal in the specific direction of the client as opposed to broadcasting it omnidirectionally. Beamforming helps overcome the fact that the range for a 5GHz signal is inherently shorter than one for a 2.4GHz signal. Not all 802.11ac routers support beamforming though, so you might have some range limitations depending on your hardware. And even if the router does support the technology, the maximum distance still won’t be any more than what you will get out of 802.11n.

Table 8.1 summarizes the 802.11 standards we discussed here. You’ll notice that 802.11ac operates in the 5GHz range and uses OFDM modulation, meaning that it is not backward compatible with 802.11b. That’s okay though—as we said earlier, it’s probably best to retire those old and slow devices anyway. Many 802.11ac wireless routers are branded as dual-band, meaning they can operate in the 2.4GHz frequency as well for support of older 802.11g and 802.11n devices. If you are running a mixed environment and want to upgrade to an 802.11ac router, check the specifications carefully to see what it supports.

Table 8.1 802.11 standards

Type Frequency Maximum Throughput Modulation Indoor Range Outdoor Range
2.4GHz 2Mbps FHSS/DSSS 20m 100m
a 5GHz 54Mbps OFDM 35m 120m
b 2.4GHz 11Mbps DSSS 40m 140m
g 2.4GHz 54Mbps DSSS/OFDM 40m 140m
n 5GHz/2.4GHz 600Mbps OFDM/DSSS 70m 250m
ac 5GHz 1300Mbps OFDM 35m 140m

What type of SOHO Internet access method offers the best bandwidth

The ranges provided in Table 8.1 are approximate and may differ based on your environment. For example, thick walls and steel beams will dramatically reduce your range. In addition, the maximum data rates for 802.11n and 802.11ac can be debated. Some equipment (and experts) will quote the theoretical maximum, whereas others will give more realistic throughput numbers. This wasn’t an issue pre-802.11n, but the newer technologies use fancier techniques to achieve maximum speeds, and we don’t always have hardware that can produce the speeds that scientists can draw up on a whiteboard.

Also keep in mind that when discussing ranges, the further away from the WAP you get, the lower your connection speed will be. For example, to get 54Mbps out of your 802.11g router, you need to be within about 100 feet of it. At the far end of its range, your throughput will be only about 6Mbps. Another key is how many clients are attached to the WAP. More clients means less bandwidth for each client. If you have ever used the Wi-Fi in an airport or a busy hotel, you know exactly what we mean. These principles hold true for all 802.11 technologies.

We have mentioned three signal modulation techniques used in the 802.11 standards. Here is how the three in common use today work:

Frequency-hopping spread spectrum (FHSS) FHSS accomplishes communication by hopping the transmission over a range of predefined frequencies. The changing, or hopping, is synchronized between both ends and appears to be a single transmission channel to both ends.

Direct-sequence spread spectrum (DSSS) DSSS accomplishes communication by adding the data that is to be transmitted to a higher-speed transmission. The higher-speed transmission contains redundant information to ensure data accuracy. Each packet can then be reconstructed in the event of a disruption.

Orthogonal frequency division multiplexing (OFDM) OFDM accomplishes communication by breaking the data into subsignals and transmitting them simultaneously. These transmissions occur on different frequencies or subbands.

The mathematics and theories of these transmission technologies are beyond the scope of this book and far beyond the scope of this exam.

What type of SOHO Internet access method offers the best bandwidth

There are many other commercial devices that transmit at the frequencies at which 802.11 operates. When this happens, there can be a lot of interference. Older Bluetooth devices, cordless phones, cell phones, other WLANs, and microwave ovens can all create interference problems for 802.11 networks, particularly in the 2.4GHz range.

If you think about a standard wired network and the devices required on such a network, you can easily determine what types of devices are available for 802.11 networks. Wireless network cards come in a variety of shapes and sizes, including PCI, PCIe, USB, and CardBus models and wireless print servers for your printers. As for connectivity devices, the most common are wireless routers (as shown in Figure 8.3) and a type of hub called a wireless access point (WAP). WAPs look nearly identical to wireless routers and provide central connectivity like wireless routers, but they don’t have nearly as many features. The main one most people worry about is Internet connection sharing. You can share an Internet connection using a wireless router but not with a WAP.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.3 Wireless router

Most wireless routers and WAPs also have wired ports for RJ-45 connectors. The router shown in Figure 8.3 has four wired connections, but they are on the back side of the device (meaning you can’t see them in the figure).

The growth of wireless systems has created several opportunities for attackers. These systems are relatively new, they use well-established communications mechanisms, and they’re easily intercepted. Wireless controllers such as 802.11 routers use SSIDs to allow communications with a specific access point. The SSID is basically the network name. Because by default wireless routers will broadcast their SSID, all someone with a wireless client needs to do is search for an available signal. If it’s not secured, they can connect within a few seconds.

You can configure the router to not broadcast and then manually set up your clients with the SSID of the device. But using this type of SSID configuration doesn’t prevent your wireless network from being compromised. If anything, it just makes it harder for legitimate users to connect to your network.

What type of SOHO Internet access method offers the best bandwidth

We’ll discuss more on SSIDs and configuring your wireless routers to be more secure than their default settings in the section “Installing and Configuring SOHO Networks” later in this chapter.

A more effective way of securing your network is to use one of the several encryption methods available. Examples of these are WEP, WPA, and WPA2, which we discuss next.

Wired Equivalent Privacy (WEP) was one of the first security standards for wireless devices. WEP encrypts data to provide data security. It uses a static key; the client needs to know the right key to gain communication through a WEP-enabled device. The keys are commonly 10, 26, or 58 hexadecimal characters long.

What type of SOHO Internet access method offers the best bandwidth

You may see the use of the notation WEP.x, which refers to the key size; 64-bit and 128-bit are the most widely used, and 256-bit keys are supported by some vendors (WEP.64, WEP.128, and WEP.256). WEP.64 uses a 10-character key. WEP.128 uses 26 characters, and WEP.256 uses 58.

The protocol has always been under scrutiny for not being as secure as initially intended. WEP is vulnerable due to the nature of static keys and weaknesses in the encryption algorithms. These weaknesses allow the algorithm to potentially be cracked in a very short amount of time—no more than two or three minutes. This makes WEP one of the more vulnerable protocols available for security.

Because of security weaknesses and the availability of newer protocols, WEP should not be used widely. You will likely see it as the default security setting on many routers, even with all of its shortcomings. It’s still better than nothing though, and it does an adequate job of keeping casual snoops at bay.

Wi-Fi Protected Access (WPA) is an improvement on WEP that was first available in 1999 but did not see widespread acceptance until around 2003. Once it became widely available, the Wi-Fi Alliance recommended that networks no longer use WEP in favor of WPA.

This standard was the first to implement some of the features defined in the IEEE 802.11i security specification. Most notably among them was the use of the Temporal Key Integrity Protocol (TKIP). Whereas WEP used a static 40- or 128-bit key, TKIP uses a 128-bit dynamic per-packet key. It generates a new key for each packet sent. WPA also introduced message integrity checking.

When WPA was introduced to the market, it was intended to be a temporary solution to wireless security. The provisions of 802.11i had already been drafted, and a standard that employed all of the security recommendations was in development. The upgraded standard would eventually be known as WPA2.

What type of SOHO Internet access method offers the best bandwidth

Both WPA and WPA2 (discussed next) have two variants: personal and enterprise. For a small office or home office network with just one wireless router or access point, personal is the choice to make. With personal, the device itself handles the authentication. For larger networks, enterprise is recommended because it consolidates authentication administration. Enterprise requires the use of a separate central authentication server, such as a Remote Authentication Dial-in User Service (RADIUS) server.

Even though their names might make you assume that WPA and WPA2 are very similar, they are quite different in structure. Wi-Fi Protected Access 2 (WPA2) is a huge improvement over WEP and WPA. As mentioned earlier, it implements all of the required elements of the 802.11i security standard. Most notably, it uses Counter Mode CBC-MAC Protocol (CCMP), which is a protocol based on the Advanced Encryption Standard (AES) security algorithm. CCMP was created to address the shortcomings of TKIP, so consequently it’s much stronger than TKIP.

What type of SOHO Internet access method offers the best bandwidth

The terms CCMP and AES tend to be interchangeable in common parlance. You might also see it written as AES-CCMP.

Since 2006, wireless devices have been required to support WPA2 to be certified as Wi-Fi compliant. Of the wireless security options available today, it provides the strongest encryption and data protection.

Nearly every small office has a network, and it seems like most homes these days have one or more computers that need access to the Internet. As a technician, you may be asked to set up or troubleshoot any number of these types of networks, often collectively referred to as small office, home office (SOHO) networks. This part of the chapter will give you the background you need to feel comfortable that you can get the job done. Most of the principles we talk about here apply to larger networks as well, so they’re helpful if you’re in a corporate environment too.

Before we get into installation and configuration, though, it’s critical to introduce a topic that permeates this whole discussion: planning. Before installing a network or making changes to it, always plan ahead. We’ll talk specifically about how to do that, but always keep planning in the back of your mind. Planning ahead of time will help you avoid many problems you could potentially run into, which will save you time in the long run.

In the following sections, we’ll look at choosing connection types, network planning and installation, and configuring a wireless router.

You already know that for computers to talk to each other, they need to be connected in some way. This can be with physical wires or through the air with one of several wireless technologies. The type of connection you choose depends on the purpose of the connection and the needs of the user or users.

You also need to think about the future. Remember that planning concept? When choosing a connection type, think about not only what the needs are today, but what the needs of the individual or organization could be. There is no sense in going overboard and recommending a top-of-the-line expensive solution if it’s not needed, but you do want to plan for expansion if that’s a possibility.

For our purposes here, we’ll break the connection types into two categories. First we’ll look at connections designed to facilitate Internet access, and then we’ll look at internal network connections.

Internet connections can be broadly broken into two categories: dial-up and broadband. It used to be that you had to weigh the pros and cons and figure out which one was best for your situation. Today, the choice is easy. Go broadband. The only time you would want to use dial-up is if broadband isn’t available, and if that’s the case, we’re sorry!

Your Internet connection will give you online service through an Internet service provider (ISP). The type of service you want will often determine who your ISP choices are. For example, if you want cable Internet, your choices are limited to your local cable companies and a few national providers. We’ll outline some of the features of each type of service and discuss why you might or might not recommend a specific connection type based on the situation.

One of the oldest ways of communicating with ISPs and remote networks is through dial-up connections. Although this is still possible, dial-up is not used much anymore due to limitations on modem speed, which top out at 56Kbps. Dial-up uses modems that operate over regular phone lines—that is, the plain old telephone service (POTS)—and cannot compare to speeds possible with DSL and cable modems. Reputable sources claim that dial-up Internet connections dropped from 74 percent of all US residential Internet connections in 2000 to three percent in 2014. Three-percent of Americans equals about nine million people, and that still feels like a lot. Most of the people who still use dial-up do it because it’s cheaper than broadband or high-speed access isn’t available where they live.

The biggest advantage to dial-up is that it’s cheap and relatively easy to configure. The only hardware you need is a modem and a phone cable. You dial in to a server (such as an ISP’s server), provide a username and a password, and you’re on the Internet.

Companies also have the option to grant users dial-up access to their networks. As with Internet connections, this option used to be a lot more popular than it is today. Microsoft offered a server-side product to facilitate this called the Routing and Remote Access Service (RRAS), as did many other companies. ISPs and Remote Access Service (RAS) servers would use the Data Link layer Point-to-Point Protocol (PPP) to establish and maintain the connection.

What type of SOHO Internet access method offers the best bandwidth

The historical term for a dial-up server is a RAS server, as used in the preceding paragraph. When Microsoft launched Windows 2000, it added routing to its RAS capabilities and renamed it RRAS. Industry wide, however, the term RAS is still widely used.

It seems that dial-up is considered to be a relic from the Stone Age of Internet access. But there are some reasons it might be the right solution:

  • The only hardware it requires is a modem and a phone cord.
  • It’s relatively easy to set up and configure.
  • It’s the cheapest online solution (usually $10 to $20 per month).
  • You can use it wherever there is phone service, which is just about everywhere.

Of course, there are reasons a dial-up connection might not be appropriate. The big one is speed. If your client needs to download files or has substantial data requirements, dial-up is probably too slow. In addition, with limited bandwidth, it’s really good only for one computer. It is possible to share a dial-up Internet connection by using software tools, but it’s also possible to push a stalled car up a muddy hill. Neither option sounds like much fun.

One of the two most popular broadband choices for home use is Digital Subscriber Line (DSL). It utilizes existing phone lines and provides fairly reliable high-speed access. To use DSL, you need a DSL modem (shown in Figure 8.4) and a network card in your computer. The ISP usually provides the DSL modem, but you can also purchase them in a variety of electronics stores. You use an Ethernet cable with an RJ-45 connector to plug your network card into the DSL modem (Figure 8.5) and the phone cord to plug the DSL modem into the phone outlet. If you need to plug a land line into the same phone jack as your DSL modem, you will need a DSL splitter (such as the one shown in Figure 8.6) and plug the splitter into the wall.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.4 A DSL modem

What type of SOHO Internet access method offers the best bandwidth

Figure 8.5 The back of the DSL modem

What type of SOHO Internet access method offers the best bandwidth

Figure 8.6 A DSL splitter

What type of SOHO Internet access method offers the best bandwidth

Instead of plugging your computer directly into the DSL modem, you can plug your computer into a router (such as a wireless router) and then plug the router into the DSL modem. Most phone companies will tell you that you can’t (or shouldn’t) do this, but if you want to connect multiple computers to the Internet and don’t mind sharing the bandwidth, there is no reason not to.

There are actually several different forms of DSL, including high bit-rate DSL (HDSL), symmetric DSL (SDSL), very high bit-rate DSL (VDSL), and asymmetric DSL (ADSL). Table 8.2 summarizes the general speeds of each. Keep in mind that the maximum speeds decrease as the installation gets farther away from the phone company’s equipment.

Table 8.2 DSL standards and approximate speeds

Standard Download Speed Upload Speed
ADSL Up to 8Mbps Up to 1Mbps
SDSL Up to 2.5Mbps Up to 2.5Mbps
HDSL Up to 42Mbps Up to 8Mbps
VDSL Up to 52Mbps Up to 16Mbps

The most popular in-home form of DSL is ADSL. It’s asymmetrical because it supports download speeds that are faster than upload speeds. Dividing up the total available bandwidth this way makes sense because most Internet traffic is downloaded, not uploaded. Imagine a 10-lane highway. If you knew that 8 out of 10 cars that drove the highway went south, wouldn’t you make eight lanes southbound and only two lanes northbound? That is essentially what ADSL does.

ADSL and your voice communications can work at the same time over the phone line because they use different frequencies on the same wire. Regular phone communications use frequencies from 0 to 4kHz, whereas ADSL uses frequencies in the 25.875kHz to 138kHz range for upstream traffic and in the 138kHz to 1,104kHz range for downstream traffic. Figure 8.7 illustrates this.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.7 Voice telephone and ADSL frequencies used

The first ADSL standard was approved in 1998 and offered maximum download speeds of 8Mbps and upload speeds of 1Mbps. The newest standard (ADSL2+, approved in 2008) supports speeds up to 24Mbps download and 3.3Mbps upload. Most ADSL communications are full-duplex.

Many ISPs have moved from ADSL to VDSL, which offers 52Mbps downloads and 16Mbps uploads over telephone wires. In practice, service providers will offer many plans with different speeds, starting at about 10Mbps to 12Mbps download and 1Mbps upload. If you want more speed, you will pay more for it. In addition, just because you pay for a certain speed doesn’t mean you will get it. The farther away you are from the phone exchange, the slower your speed will be. Line quality also affects speed, because poorer lines have more attenuation (signal loss).

One major advantage that DSL providers tout is that with DSL you do not share bandwidth with other customers, whereas that may not be true with cable modems.

To summarize, here are some advantages to using DSL:

  • It’s much faster than dial-up.
  • Your bandwidth is not shared with other users.
  • It’s generally very reliable (depending on your ISP).

There are some potential disadvantages as well:

  • DSL may not be available in your area. There are distance limitations as to how far away from the phone company’s central office you can be to get DSL. Usually this isn’t a problem in metro areas, but it could be a problem in rural areas.
  • DSL requires more hardware than dial-up: a network card, network cable, a DSL modem, a phone cord, and sometimes a splitter. A DSL modem package usually comes with a network cable and splitter, but many ISPs will make you pay for that package.
  • The cost is higher. Lower-speed packages often start off at around $20 to $30 per month, but the ones they advertise with the great data rates can easily run you $100 a month or more.
  • If you are in a house or building with older wiring, the older phone lines may not be able to support the full speed you pay for.

That said, DSL is a popular choice for both small businesses and residential offices. If it’s available, it’s easy to get the phone company to bundle your service with your land line and bill you at the same time. Often you’ll also get a package discount for having multiple services. Most important, you can hook the DSL modem up to your router or wireless router and share the Internet connection among several computers. The phone companies don’t like the fact that you can do this (they want you to pay for more access), but as of now there’s not a lot they can do about it.

What type of SOHO Internet access method offers the best bandwidth

To see if DSL is available in your area, go to www.dslreports.com. You can also talk to your local telephone service provider.

With many people using their cell phones as their home phones and land lines slowly fading into history, you may wonder if this causes a problem if you want DSL. Not really. Many phone providers will provide you with DSL without a land line (called naked DSL). Of course, you are going to have to pay a surcharge for the use of the phone lines if you don’t already use one.

The other half of the popular home-broadband duet is the cable modem. These provide high-speed Internet access through your cable service, much like DSL does over phone lines. You plug your computer into the cable modem using a standard Ethernet cable, just as you would plug into a DSL modem. The only difference is that the other connection goes into a cable TV jack instead of the phone jack. Cable Internet provides broadband Internet access via a specification known as Data Over Cable Service Internet Specification (DOCSIS). Anyone who can get a cable TV connection should be able to get the service.

As advertised, cable Internet connections are faster than DSL connections. You’ll see a wide variety of claimed speeds; some cable companies offer packages with download speeds up to 30Mbps, 50Mbps, or even 100Mbps and uploads of 5Mbps. (For business customers, download speeds can be 400Mbps.) If it’s that fast, why wouldn’t everyone choose it? While cable generally is faster, a big caveat to these speeds is that they are not guaranteed and they can vary.

One of the reasons that speeds may vary is that you are sharing available bandwidth within your distribution network. The size of the network varies, but it’s usually between 100 and 2,000 customers. Some of them may have cable modems too, and access can be slower during peak usage times. Another reason is that cable companies make liberal use of bandwidth throttling. If you read the fine print on some of their packages that promise the fast speeds, one of the technical details is that they boost your download speed for the first 10MB or 20MB of a file transfer, and then they throttle your speed back down to your normal rate.

To see how this could affect everyone’s speed on the shared bandwidth, let’s think about a simplified example. Let’s say that two users (Sally and John) are sharing a connection that has a maximum capacity of 40Mbps. For the sake of argument, let’s assume that they are the only two users and that they share the bandwidth equally. That would mean normally each person gets 20Mbps of bandwidth. If Sally gets a boost that allows her to download 30Mbps, for however long, that leaves John with only 10Mbps of available bandwidth. If John is used to having 20Mbps, that 10Mbps is going to seem awfully slow.

While it may seem as though we are down on cable modems, you just need to understand exactly what you and your customers are getting. In practice, the speeds of a cable modem are pretty comparable to those of DSL. Both have pros and cons when it comes to reliability and speed of service, but a lot of that varies by service provider and isn’t necessarily reflective of the technology. When it comes right down to it, the choice you make between DSL and cable (if both are available in your area) may depend on which company you get the best package deal from: phone and DSL through your telephone company or cable TV and cable modem from your cable provider.

To summarize, here are the advantages to using cable:

  • It’s much faster than dial-up, and it can be faster than DSL (particularly for uploads).
  • You’re not required to have or use a telephone land line.
  • It’s generally very reliable (depending on your ISP).

As with anything else, there are possible disadvantages:

  • Cable may not be available in your area. In metro areas this normally isn’t a problem, but it could be in rural areas.
  • Cable requires more hardware than dial-up: a network card, network cable, and a cable modem. Most ISPs will charge you a one-time fee or a monthly lease fee for the cable modem.
  • Your bandwidth is shared with everyone on your network segment, usually a neighborhood-sized group of homes. Everyone shares the available bandwidth. During peak times, your access speed may slow down.
  • Security could be an issue. Essentially you are on a LAN with all the neighbors in your cable segment. Thus, if you (or your cable company) don’t protect your connection, theoretically you could see your neighbors’ computers and they could see yours. The cable companies have made strides in this area and it usually isn’t a problem anymore, but know that it is a possibility.
  • The cost is higher. Lower-speed packages often start off at around $20 to $30 per month, but the ones they advertise with the great data rates can easily run you $100 a month or more.

Cable modems can be connected directly to a computer but can also be connected to a router or wireless router just as a DSL modem. Therefore, you can share an Internet connection over a cable modem.

What type of SOHO Internet access method offers the best bandwidth

For detailed information about cable Internet availability and performance, check out www.highspeedinternet.net.

Integrated Services Digital Network (ISDN) is a digital, point-to-point network capable of maximum transmission speeds of about 2Mbps, although speeds of 128Kbps are more common. ISDN uses the same two-pair UTP wiring as POTS (but it can transmit data at much higher speeds). That’s where the similarity ends. What makes ISDN different from a regular POTS line is how it uses the copper wiring. Instead of carrying an analog (voice) signal, it carries digital signals. While not nearly as fast as other broadband services, it still is considered a broadband type of access.

A computer connects to an ISDN line via an ISDN terminal adapter (often referred to as an ISDN TA or an ISDN modem). Like DSL and cable modems, an ISDN terminal adapter is not an actual modem because it does not convert a digital signal to an analog signal; ISDN signals are digital. Computers also need a network terminator to connect to the ISDN TA, but most TAs have them built in. If you have multiple users on the network who need Internet access through the ISDN line, you need an ISDN router.

An ISDN line has two types of channels. The data is carried on a channel called a Bearer channel, or B channel, which can carry 64Kbps of data. The second type of channel is used for call setup and link management and is known as the signal channel, or D channel. This channel has only 16Kbps of bandwidth. A typical 144Kbps basic rate interface (BRI) ISDN line has two B channels and one D channel. One B channel can be used for a voice call while the other is being used for data transmissions, or both can be used for data. When the B channels are combined to maximize data throughput (which is common), the process is called bonding or inverse multiplexing. Multiple BRI ISDN lines can also be bonded together to form higher throughput channels.

BRI ISDN is also known as 2B+D because of the number and type of channels used. BRI ISDN is more common in Europe than it is in the United States.

You can also obtain a primary rate interface (PRI), also known as 23B+D, which means it has 23 B channels and 1 D channel. The total bandwidth of a 23B+D ISDN line is 1,536Kbps (23 B channels × 64Kbps per channel + 64Kbps for the D channel). This is typically carried on a dedicated T1 connection and is fairly popular in the United States.

The main advantages of ISDN are as follows:

  • The connection is faster than dial-up.
  • It runs over phone lines.
  • It’s flexible. Each B channel can support voice or data. If you have a BRI ISDN connection, you can have two separate voice conversations happening at once, two data streams, a voice conversation and a data stream, or both channels bridged into one data stream.
  • Support for video teleconferencing is easy to obtain.
  • There is no conversion from digital to analog.

However, ISDN does have a few disadvantages:

  • It’s more expensive than POTS.
  • You need an ISDN modem and perhaps an ISDN router.
  • ISDN is a type of dial-up connection and therefore the connection must be initiated before use.

BRI ISDN connections were starting to become popular in home applications in the mid- to late-1990s as an alternative to dial-up before broadband really took off. Today you’ll rarely see it used in a home, but it’s occasionally used in an office. You will find PRI ISDN to be more common in office environments. BRI rates start at about $20 to $40 per month, while PRI solutions typically start in the $300-per-month range.

If you need a dedicated Internet connection, which will serve as an Internet-only connection, then one of the other broadband services is likely a better choice. If you want a line that can support both Internet and voice and provide flexibility to go between the two, then ISDN could be the right solution (although VoIP could be as well—but that is beyond the scope of this chapter).

Fiber-optic cable is pretty impressive with the speed and bandwidth it delivers. For nearly all of fiber-optic cable’s existence, it’s been used mostly for high-speed telecommunications and network backbones. This is because it is much more expensive than copper to install and operate. The cables themselves are pricier, and so is the hardware at the end of the cables.

Technology follows this inevitable path of getting cheaper the longer it exists, and fiber is really starting to embrace its destiny. Some phone and media companies are now offering fiber-optic Internet connections for home subscribers.

An example of one such option is FiOS, offered by Verizon. It offers Fiber-to-the-Home (FTTH) service, which means that the cables are 100-percent fiber from their data centers to your home. At the time we were writing this book, the fastest speeds offered for home users were 75Mbps download and 75Mbps upload. Businesses can get 150Mbps down and 150Mbps up. That means you could download a two-hour HD movie in about four minutes. That’s sick. What’s even better is that other providers are claiming to offer 1Gbps implementations.

Other companies may offer a service called Fiber-to-the-Node (FTTN), sometimes called Fiber to the Curb. This runs fiber to the phone or cable company’s utility box near the street and then runs copper from there to your house. Maximum speeds for this type of service are around 25Mbps. These options are probably best suited for small businesses or home offices with significant data requirements, unless online gaming is really important to you.

What type of SOHO Internet access method offers the best bandwidth

Some cable companies promise a high-speed, fiber-optic connection for your TV cable as well as cable Internet service. In the vast majority of cases, the fiber is FTTN, and the fiber runs only from their network to the junction box at the entrance to your neighborhood or possibly to your curb. From there, the cable is coaxial copper. If you’re paying for a fiber connection, be sure you’re actually getting a fiber connection.

Are there any downsides to a fiber Internet connection? Really only two come to mind. The first is availability. It’s still pretty spotty on where you can get it. The second is price. That great 150Mbps connection will run you about $200 a month.

One type of broadband Internet connection that does not get much fanfare is satellite Internet. Satellite Internet is not much like any other type of broadband connection. Instead of a cabled connection, it uses a satellite dish to receive data from an orbiting satellite and relay station that is connected to the Internet. Satellite connections are typically a lot slower than wired broadband connections, with downloads often maxing out at around 10Mbps to 15Mbps and uploads at 1Mbps to 2Mbps.

The need for a satellite dish and the reliance upon its technology is one of the major drawbacks to satellite Internet. People who own satellite dishes will tell you that there are occasional problems due to weather and satellite alignment. You must keep the satellite dish aimed precisely at the satellite or your signal strength (and thus your connection reliability and speed) will suffer. Plus, cloudy or stormy days can cause interference with the signal, especially if there are high winds that could blow the satellite dish out of alignment. Receivers are typically small satellite dishes (like the ones used for DirecTV or DishNetwork) but can also be portable satellite modems (modems the size of a briefcase) or portable satellite phones.

What type of SOHO Internet access method offers the best bandwidth

Satellite Internet is often referred to as “line-of-sight” wireless because it does require a clear line of sight between the user and the transmitter.

Another drawback to satellite technology is the delay (also called propagation delay), or latency. The delay occurs because of the length of time required to transmit the data and receive a response via the satellite. This delay (between 250 and 350 milliseconds) comes from the time it takes the data to travel the approximately 35,000 kilometers into space and return. To compare it with other types of broadband signals, cable and DSL have a delay between customer and ISP of 10 to 30 milliseconds. With standard web and email traffic, this delay, while slightly annoying, is acceptable. However, with technologies like VoIP and live Internet gaming, the delay is intolerable.

What type of SOHO Internet access method offers the best bandwidth

Online gamers are especially sensitive to propagation delay. They often refer to it as ping time. The higher the ping time (in milliseconds), the worse the response time in the game. It sometimes means the difference between winning and losing an online game.

Of course, satellite also has advantages or no one would use it. First, satellite connections are incredibly useful when you are in an area where it’s difficult or impossible to run a cable or if your Internet access needs are mobile and cellular data rates just don’t cut it.

The second advantage is due to the nature of the connection. This type of connection is called point-to-multipoint because one satellite can provide a signal to a number of receivers simultaneously. It’s used in a variety of applications from telecommunications and handheld GPSs to television and radio broadcasts and a host of others.

Here are a few considerations to keep in mind regarding satellite:

It’s expensive compared to other broadband access. The top packages that offer 15Mbps downloads will cost you over $100 a month. That kind of download speed will only cost you about $30 or so for DSL or cable. The low-end satellite packages, with download speeds of around 5Mbps, will run you around $30–40 per month. And, many providers set thresholds on the amount of data you can download per month. Going over that amount can result in extra charges and/or speed throttling. Your speed will be decreased for a certain period, and you will pay more for that data as well!

Installation can be tricky. When installing a satellite system, you need to ensure that the satellite dish on the ground is pointed at precisely the right spot in the sky. This can be tricky to do if you’re not trained, but some have a utility that helps you see how close you are to being right on (you’re getting warmer. . . warmer).

Line of sight is required. Satellite communications also require line of sight. A tree between you and your orbiting partner will cause problems. Rain and other atmospheric conditions can cause problems as well.

Latency can be a problem. Because of the long distance the message must travel, satellites can be subject to long latency times. While it happens with wired connections, it disproportionately affects satellite transmissions. Have you ever watched a national news channel when a reporter is reporting from some location halfway across the world? The anchor behind the desk will ask a question, and the reporter will nod, and nod, and finally about five excruciating seconds after the anchor is done, the reporter will start to answer. That’s latency.

Several years ago (and we do mean several) as a teenager, one of the authors worked for a local television station during the summers. Each summer, the television station would broadcast a Senior PGA golf tournament that was held on a nearby mountain course.

Before the tournament, the crew would spend three days setting up the control truck, cameras, and link back to the station. (It was a network with TV cameras instead of workstations!) Because of the remote location, the crew had to set up a satellite uplink to get the signals back to civilization. From the control truck, a transmitter was pointed at a relay station on the side of the mountain, which in turn was pointed at a satellite orbiting the earth. It took a team of four engineers to get it set up. Two engineers would stay at the truck, and two others would board ATVs and journey up the remote mountainside. Once in position, they would set up the relay station, which looked a lot like a keg of beer with a few antennas. The engineers at the truck would adjust their directional microwave transmitter until the relay station received a strong signal. Then the engineers on the mountainside would perform the arduous task of pointing their transmitter at the satellite.

It was a long and tedious process, and that’s really the point of the story. Satellite was the only option available to complete the network, but satellite networks can be a challenge to set up and configure.

The cell phone, once a clunky brick-like status symbol of the well-to-do, is now pervasive in our society. It seems that everyone—from kindergarteners to 80-year-old grandmothers—has a cell. The industry has revolutionized the way we communicate and, some say, contributed to furthering an attention-deficit-disorder-like, instant-gratification-hungry society. In fact, the line between cell phones and computers has blurred significantly with all of the new smartphones on the market. It used to be that the Internet was reserved for “real” computers, but now anyone can be online at almost any time.

Regardless of your feelings about cell phones, whether you are fanatical about checking in every time you visit a local eatery to ensure you’re the “mayor” or you long for the good old days when you could escape your phone because it had a functional radius as long as your cord, you need to understand the basics of cell technology.

For years, there have been two major cell standards used around the world. The Global System for Mobile Communications (GSM) is the most popular, boasting over 1.5 billion users in 210 countries. The other standard is code division multiple access (CDMA), which was developed by Qualcomm and is available only in the United States.

Both are considered 3G (or third-generation) mobile technologies, and each has its advantages. GSM was introduced first, and when CDMA was launched, it was much faster than GSM. GSM eventually caught up, though, and the two now have relatively similar data rates. The biggest issue is that GSM and CDMA are not compatible with each other. Whatever technology you get is based on the provider you sign up with. Sprint and Verizon use CDMA, and AT&T and T-Mobile use GSM. That means that if you have a CMDA phone through Verizon, you can’t switch (with that phone) to AT&T. And, your CDMA phone won’t work outside the United States.

Now we have 4G technology available, which is the new global standard designed to make 3G obsolete. The biggest enhancement in 4G LTE (Long-Term Evolution) over 3G is speed. Whereas with 3G technology you were limited to about 500Kbps downloads, some 4G LTE networks will give you download speeds of 10 to 20Mbps and upload speeds of 3 to 10Mbps. (The theoretical maximum for LTE is 300Mbps download and 75Mbps upload.) The range of 4G LTE depends on the tower and obstructions in the way. The optimal cell size is about 3.1 miles (5km) in rural areas, and you can get reasonable performance for about 19 miles (30km).

Whenever you turn on the TV, you can’t help but be bombarded with commercials (if you don’t fast-forward through them) from cell providers pitching the fastest or widest or whatever-est 4G LTE network. What does it all mean?

To be specific, 4G refers to a generation of standards for mobile devices (such as phones and tablets) and telecommunication services that fulfill the International Mobile Telecommunications Advanced (IMT-Advanced) specifications as adopted by the International Telecommunication Union (ITU). In more practical terms, it’s simply a standard for wireless telephone, Internet, video, and mobile TV. To meet IMT-Advanced standards, the service must provide peak data rates of at least 100Mbps for high-mobility communication (such as trains or cars) and 1Gbps for low-mobility communication. One major difference between 4G and 3G is that 4G is designed to use IP instead of traditional telephone circuits. It’s designed to provide mobile broadband access.

The first 4G devices that came on the market did not offer anything close to the speeds specified by the ITU. Mobile manufacturers branded them 4G anyway, and there wasn’t much the ITU could do to stop it. The result was that the world became inundated with 4G LTE advertising.

There are a two competing 4G standards: WiMax and LTE. WiMax is the marketing name given to the IEEE 802.16 standard for wireless MAN technology. LTE is what’s used by mobile providers. As of the writing of this book, it’s not even a close competition—LTE is clearly dominating.

Believe it or not, there actually were 1G and 2G standards as well. You probably just never heard anything about them. You might have heard of 3G, and now 4G is on the market. Just wait, and a few years from now everyone will probably be clamoring for the new 5G device, whatever that may be!

In regular life, tethering means connecting two things together. In computing, it means hooking your laptop up to your cell phone and using the cell phone’s connection and data plan to get on the Internet. Technically speaking, the device that’s being used for the connection can get on the Internet using a wired connection, Wi-Fi, or Bluetooth as well, but the cell phone and laptop example is the most common scenario. The cellular-enabled device that is making the Internet connection is often known as a mobile hotspot.

What type of SOHO Internet access method offers the best bandwidth

Several mobile carriers prohibit the use of your mobile phone for tethering, unless explicitly permitted in your data plan.

Many cell phone providers offer network cards (or they will incorrectly call them modems) that allow your laptop computer or other device to connect to the Internet from anywhere you can get a cell signal. Some will bundle that service with your normal monthly cell service at no additional charge, while others will charge you an incremental fee. The term you’ll hear a lot in connection with this is MiFi. Figure 8.8 shows a Verizon MiFi hotspot.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.8 MiFi hotspot

A MiFi card such as this allows you to connect up to eight Wi-Fi-enabled devices (usually 802.11g/n) as a MiFi cloud to get Internet access. Some MiFi cards allow up to 10 connections. The MiFi card then makes the connection back to the cell phone provider.

After you purchase a MiFi device, you first connect it to your laptop via USB cable for activation and setup. Once that step is complete, you can go entirely wireless. MiFi supports Wi-Fi security such as WEP, WPA, and WPA2.

Table 8.3 summarizes the connection types we have discussed in this chapter.

Table 8.3 Common Internet connection types and speeds

Connection Type Approximate Basic Package Cost Download Speed Range Description
Dial-up $10–20 Up to 56Kbps Plain old telephone service. A regular analog phone line.
DSL $20–30 Up to 50Mbps Inexpensive broadband Internet access method with wide availability, using telephone lines.
Cable $20–30 Up to 50Mbps Inexpensive broadband Internet access method with wide availability, using cable television lines.
ISDN $20–40 Up to 1.5Mbps Integrated Services Digital Network. Once popular for home office Internet connections.
Fiber $40–50 Up to 1Gbps Incredibly fast and just as expensive.
Cellular $30–50 Up to 20Mbps Great range; supported by cell phone providers. Best for a very limited number of devices.
Satellite $30–40 Up to 15Mbps Great for rural areas without cabled broadband methods. More expensive than DSL or cable.

Before you decide which broadband connection sounds the most appealing to you, you should also factor in something very important: what is available in your area. DSL is available at different rates of connectivity based on distance from a central station. If you live far enough from a central station, or near a central station that has not been updated lately (such as in the middle of rural America), DSL may not be an option.

Similarly, not all cable providers are willing to take the steps necessary to run a connection in all situations. One of the authors once had a small business in a section of an old industrial building. The cable provider said the office where the modem was desired was too far from their nearest pole and there was nothing that could be done about it. He offered to pay the expense to have an additional pole placed closer to the location, but they would not discuss it further.

Make certain you know the available options—not just the technological options—before you spend too much time determining what is best for you.

Along with deciding how your computers will get to the outside world, you need to think about how your computers will communicate with each other on your internal network. The choices you make will depend on the speed you need, distance and security requirements, and cost involved with installation and maintenance. It may also depend some on the abilities of the installer or administrative staff. You may have someone who is quite capable of making replacement Category 6 cables but for whom making replacement fiber-optic cables is a much more daunting task. Your choices for internal connections can be lumped into two groups: wired and wireless.

What type of SOHO Internet access method offers the best bandwidth

Many networks today are a hybrid of wired and wireless connections. Understand the fundamentals of how each works separately; then you can understand how they work together. Every wireless connection eventually connects back to a wired network point somehow.

Wired connections form the backbone of nearly every network in existence. Even as wireless becomes more popular, the importance of wired connections still remains strong. In general, wired networks are faster and more secure than their wireless counterparts.

When it comes to choosing a wired network connection type, you need to think about speed, distance, and cost. You learned about several types of wired connections in Chapter 6, “Networking Fundamentals,” such as coaxial, UTP, STP, and fiber- optic, but the only two you’ll want to go with today are twisted pair and fiber. You’ll run one of the two (or maybe a combination of the two), with UTP being by far the most common choice, as an Ethernet star network. Table 8.4 shows a summary of the more common Ethernet standards along with the cable used, speed, and maximum distance.

Table 8.4 Common Ethernet standards

Standard Cables Used Maximum Speed Maximum Distance
10BaseT UTP CAT-3 and above 10Mbps 100m (∼300 feet)
100BaseTX UTP CAT-5 and above 100Mbps 100m
100BaseFX Multi-mode fiber 100Mbps 2,000m
1000BaseT UTP CAT-5e and above 1Gbps 100m
10GBaseT UTP CAT-6a and above 10Gbps 100m
10GBaseSR Multi-mode fiber 10Gbps 300m
10GBaseLR Single-mode fiber 10Gbps 10km (6.2 miles)
10GBaseER Single-mode fiber 10Gbps 40km (∼25 miles)

What type of SOHO Internet access method offers the best bandwidth

Looking at Table 8.4, you might have noticed that the number in the standard corresponds to the maximum speed in megabytes (unless it says 10G, where the G is for gigabytes). This can help you remember what the standard’s maximum speed is without a lot of rote memorization. For example, if you see 100Base anything, you know the maximum speed is 100Mbps. The letter T always indicates twisted pair, and F is always fiber.

The first question you need to ask yourself is, “How fast does this network need to be?” There really is no point installing a 10BaseT network these days because even the slowest wireless LAN speeds can deliver that. For most networks, 100Mbps is probably sufficient. If the company has higher throughput requirements, then you can start looking into Gigabit Ethernet (1Gbps) or faster (10Gbps).

The second question is then, “What is the maximum distance I’ll need to run any one cable?” In most office environments, you can configure your network in such a way that 100 meters will get you from any connectivity device to the end user. If you need to go longer than that, you’ll definitely need fiber for that connection unless you want to mess with repeaters.

As you’re thinking about what type of cable you will go with, also consider the hardware you’ll need. If you are going to run fiber to the desktop, you’ll need fiber network cards, routers, and switches. If you are running UTP, you need network cards, routers, and switches with RJ-45 connectors. If you’re going to run Gigabit, all devices that you want to run at that speed need to support it.

The third question to ask yourself is, “How big of a deal is security?” Most of the time, the answer lies somewhere between “very” and “extremely”! Copper cable is pretty secure, but it does emit a signal that can be intercepted, meaning people can tap into your transmissions (hence the term wiretap). Fiber-optic cables are immune to wiretapping. Normally this isn’t a big deal because copper cables don’t exactly broadcast your data all over as a wireless connection does. But if security is of the utmost concern, then fiber is the way to go.

Fourth, “Is there a lot of electrical interference in the area?” Transmissions across a copper cable can be ravaged by the effects of electromagnetic interference (EMI). Fiber is immune to those effects.

Finally, ask yourself about cost. Fiber cables and hardware are more expensive than their copper counterparts. Table 8.5 summarizes your cable choices and provides characteristics of each.

Table 8.5 Cable types and characteristics

Characteristics Twisted Pair Fiber-Optic
Transmission rate CAT-5: 100Mbps 100Mbps to 10Gbps
CAT-5e: 1Gbps
CAT-6a and CAT-7: 10Gbps
Maximum length 100 meters (328 feet) About 25 miles
Flexibility Very flexible Fair
Ease of installation Very easy Difficult
Connector RJ-45 Special (SC, ST, and others)
Interference (security) Susceptible Not susceptible
Overall cost Inexpensive Expensive
NIC cost 100Mbps: $15–$40 $100–$150; easily $600–$800 for server NICs
1Gbps: $30 and up 10m cable cost
CAT-5/5e: $8–$12 CAT-6: $12–$15 Depends on mode and connector type, but generally $20–$40 8-port switch cost
100Mbps: $30–$100 $350 and up
1Gbps: $70–$400

What type of SOHO Internet access method offers the best bandwidth

Understand that the costs shown in Table 8.5 are approximate and are for illustrative purposes only. The cost for this equipment in your area may differ. Fiber has gotten considerably cheaper in the last 5 to 10 years, but it’s still far more expensive than copper.

Fiber-optic cabling has some obvious advantages over copper, but as you can see it may be prohibitively expensive to run fiber to the desktop. What a lot of organizations will do is use fiber sparingly, where it is needed the most, and then run copper to the desktop. Fiber will be used in the server room and perhaps between floors of a building as well as any place where a very long cable run is needed.

People love wireless networks for one major reason: convenience. Wireless connections enable a sense of freedom in users. They’re not stuck to their desk; they can work from anywhere! (We’re not sure if this is actually a good thing or not.) Wireless isn’t typically as fast and it tends to be a bit more expensive than wired copper networks, but the convenience factor far outweighs the others.

When thinking about using wireless for network communications, the only real technology option available today is IEEE 802.11. Bluetooth and infrared (which we’ll cover in just a bit) can help mobile devices communicate, but they aren’t designed for full wireless LAN (WLAN) use. Your choice becomes which 802.11 standard you want to use.

So how do you choose which one is right for your situation? You can apply the same thinking you would for a wired network in that you need to consider speed, distance, security, and cost. Generally speaking though, with wireless it’s best to start with the most robust technology and work your way backwards.

Security concerns on wireless networks are similar regardless of your choice. You’re broadcasting network signals through air; there will be some security concerns. It comes down to range, speed, and cost.

In today’s environment it’s silly to consider 802.11a only or 802.11b only. Deciding that you are going to install an 802.11b network from the ground up at this point is a bit like saying you are going to use 10BaseT. You could, but why? In fact, it will be a challenge to even find 802.11b-only devices for your network. Most devices that support 802.11b are branded as 802.11b/g (or 802.11g/b), meaning they support both network types. 802.11a never really got too popular even when it was the best technology, so why use it now?

That brings us to your most likely choices: 802.11g, 802.11n, and 802.11ac. 802.11g is heading toward belonging only in history books, but considering its relatively decent speed, it will stick around for a while. Still, it probably isn’t best to design a new network from the ground up based on that technology. For 802.11n, devices are plentiful, and it’s backward compatible with 802.11b/g. (If you happen to have 802.11a devices, then 802.11n still makes sense. But really, you should upgrade those devices!) 802.11ac is the newest and fastest, but it will cost you more and you might not get significantly better performance than 802.11n. It will come down to cost. Network cards will run you anywhere from $20 to $100, and you can get wireless access points and wireless routers for as little as around $20 to $40. Shop around to see what kind of deal you can get. Exercise 8.1 has you do just that.

  1. Visit the website for an electronics store. If you’re unfamiliar with any, try www.bestbuy.com or www.frys.com.
  2. Find an 802.11ac wireless router. How much is it?
  3. Find an older standard. See if you can find an 802.11b one. If not, go for 802.11g. How much is it?
  4. Now price out wired network cards. Find a fiber-optic card, and price that versus an Ethernet card that offers similar speeds. Also look at the price of a 25m CAT-6 (or CAT-5) cable versus a 5m fiber-optic cable. How much difference is there?

Bluetooth is not designed to be a WLAN but rather a wireless personal area network (PAN). In other words, it’s not the right technology to use if you want to set up a wireless network for your office. It is, however, a great technology to use if you have wireless devices that you want your computer to be able to communicate with. Examples include smartphones, mice, keyboards, headsets, and printers.

Nearly every laptop comes with built-in Wi-Fi capabilities, and most also come Bluetooth enabled. If not, you will need to use a USB Bluetooth adapter to use your Bluetooth devices. Almost all smartphones and other mobile devices today support Bluetooth.

There are several Bluetooth standards that have been introduced into the market. Version 1.2 was adopted in 2003 and supported data rates of up to 1Mbps. Newer versions have increased speed and compatibility with technologies such as Wi-Fi, LTE, and IPv6 as well as reduced power requirements and increased security. The newest version is Bluetooth v4.2, which was released in December 2014. Bluetooth currently supports maximum data rates of 24Mbps. It can achieve these rates by using available 802.11 signals as a transmission medium. Otherwise, the maximum transmission speed of Bluetooth is about 3Mbps. Table 8.6 summarizes the Bluetooth versions and maximum data rates.

Table 8.6 Bluetooth versions and data rates

Version Data rate
1.2 1Mbps
2.0 + EDR 3Mbps
3.0 + HS 24Mbps
4.0 24Mbps

There are three classes of Bluetooth devices, which differ in their transmission range and power usage; the specifications are shown in Table 8.7. Most mobile Bluetooth devices are Class 2 devices, which have a maximum range of 10 meters (33 feet) and power usage of 2.5mW. When studying Bluetooth, it’s easy to get the versions and classes mixed up. Remember that they are independent of each other. Most devices you see will be Class 2, regardless of the Bluetooth version they support. Also, remember that the version affects the data rate but not the maximum distance.

Table 8.7 Bluetooth device classes and specifications

Class Distance Power usage
1 100m 100mW
2 10m 2.5mW
3 1m 1mW

What type of SOHO Internet access method offers the best bandwidth

Like 802.11b/g/n, Bluetooth uses the unlicensed 2.4GHz range for communication. To avoid interference, Bluetooth can “signal hop” at different frequencies to avoid conflicts with devices using other technologies in the area. Thanks to technology improvements, interference with Wi-Fi is unlikely, but it can still occur.

One of the unusual features of Bluetooth networks is their temporary nature. With Wi-Fi, you need a central communication point, such as a WAP or router. Bluetooth networks are formed on an ad hoc basis, meaning that whenever two Bluetooth devices get close enough to each other, they can communicate directly with each other. This dynamically created network is called a piconet. A Bluetooth-enabled device can communicate with up to seven other devices in one piconet.

Infrared waves have been around since the beginning of time. They are longer than light waves but shorter than microwaves. The most common use of infrared technology is the television remote control, although infrared is also used in night-vision goggles and medical and scientific imaging.

In 1993 the Infrared Data Association (IrDA) was formed as a technical consortium to support “interoperable, low-cost infrared data interconnection standards that support a walk-up, point-to-point user model.” The key terms here are walk-up and point-to-point, meaning you need to be at very close range to use infrared and it’s designed for one-to-one communication. Infrared requires line-of-sight, and generally speaking, the two devices need to be pointed at each other to work. If you point your remote away from the television, how well does it work?

What type of SOHO Internet access method offers the best bandwidth

More information on the IrDA standard can be found at the organization’s website: http://www.irda.org.

Some laptops have a built-in infrared port, which is a small, dark square of plastic, usually black or dark maroon. For easy access, infrared ports are located on the front or sides of devices that have them. Figure 8.9 shows an example of an infrared port.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.9 Infrared port

Current IrDA specifications allow transmission of data up to 1Gbps, and IrDA claims that 5Gbps and 10Gbps standards are in the works. Because infrared does not use radio waves, there are no concerns of interference or signal conflicts. Atmospheric conditions can play a role in disrupting infrared waves, but considering that the maximum functional range of an IrDA device is about 1 meter, weather is not likely to cause you any problems.

Security is not an issue with infrared. The maximum range is about 1 meter with an angle of about 30 degrees, and the signal does not go through walls, so hacking prospects are limited. If someone is making an attempt to intercept an infrared signal, it’s going to be pretty obvious. The data is directional, and you choose when and where to send it.

You might have read the 1-meter distance limitation in the section on infrared and thought, “But my television remote works at longer distances than that,” and you are right. Television and other consumer electronics remote controls are not governed by IrDA. They use a different infrared technology, based on the RC-5 protocol developed by Philips in the late 1980s. The maximum functional distance of these remote controls is about 15 to 20 feet, depending on the device.

Computer communications standards using infrared are managed by IrDA, and the maximum distance is about 1 meter. There are methods that IR manufacturers can use to modify this, but the general specification guarantees data rates at only 1 meter.

Before you run your first cable or place your first wireless router, know exactly where everything is supposed to go on the network. The only way you’ll be able to do this is to plan ahead. If you have planned the installation before you begin, the actual physical work of installing the network will be much easier.

Every network is going to be somewhat different, but there are some general things to keep in mind as you go through your planning process:

Get a map. Understand the layout of the space in which you’re installing the network. Get a map of the office or draw one yourself. Add distances or a scale if possible so you can determine how far you’ll need to run cables or how many wireless access points you’ll need. Label power locations and their capacity. Mark any potential obstacles or hazards that you may run into when you try to run cable, such as your fluorescent lights, water pipes, or cinder block walls.

Locate your server(s). If you are installing a small network, you may not have to worry about this. But if you have a network with one or more dedicated servers, decide where they will be located. They need to be in a secured location where only authorized people have access to them. This can be anything from a small closet to an elaborate server room with raised, antistatic floors. Just make sure it’s temperature controlled because server closets tend to get very hot, and we know that heat and computers don’t mix well.

Identify where client computers will be. If you are setting up an office in a cubicle farm, just assume one computer (or more, depending on the cubicle type) per cube. This will help you determine where you need shared network resources as well as cable placement.

Locate network resources. If your network users are going to share resources such as printers, where will they be located? If there are dozens or even hundreds of users, you may need multiple printer locations or printer banks. Locate these and other shared resources in enough places so that users don’t have to walk from one end of the office to the other just to pick up printouts.

Determine how you are going to connect. If you are going to go all wireless, you can start figuring out how many wireless routers or access points you’ll need. If you are going to have wired connections, start determining how long the cable runs will be. Remember that UTP has a maximum segment distance of 100 meters. If you have to go up from a patch panel, into a ceiling, and down through a wall or conduit, take that into account too!

Designate additional connectivity areas if needed. If you are running cables and some systems are outside of your maximum cable length, you will need to install a repeater of some sort. The best choice is probably a switch, which repeats signals. If you have several hundred computers, though, and you want to separate out networks, then a router is the best choice. These connectivity locations can be just a small closet. Other times, if no space is available, some administrators will put the switch in the drop ceiling. Although there is nothing wrong with this (as long as it’s secured), it can be challenging to find power up there and it does make it more difficult to add to that switch. Finally, if there’s no way to run power into the area where you need the switch, you could buy one that uses Power over Ethernet (PoE), which is covered in Chapter 6. Generally the number of ports these devices support is limited, but it beats having no connectivity at all.

You shouldn’t begin to physically install the network until all of your plans are complete and you’ve double-checked them. There are few things more annoying than getting halfway through an installation and determining that your plans need to change drastically. Here we’ll look at installation of three groups of items: network cards, cables, and connectivity devices.

In the old days (1980s) of personal computers, NICs were a pain to install. Not only did you have to configure the hardware manually, you had to configure the network protocol stack manually. This usually involved a configuration program of some kind and was very cumbersome. Fortunately, installing a NIC today is pretty straightforward.

Before you can begin communicating on your network, you must have a NIC installed in the machine. Installing a NIC is a fairly simple task if you have installed any expansion card before; a NIC is just a special type of expansion card. In Exercise 8.2, you will learn how to install a NIC.

  1. Power off the PC, remove the case and the metal or plastic blank covering the expansion slot opening, and insert the expansion card into an open slot.
  2. Secure the expansion card with the screw provided.
  3. Put the case back on the computer and power it up (you can run software configuration at this step, if necessary). If there are conflicts, change any parameters so that the NIC doesn’t conflict with any existing hardware.

    Note that these first three steps may not be necessary if you have an onboard NIC.

  4. Install a driver for the NIC for the type of operating system that you have. Windows Plug and Play (PnP) will recognize the NIC and install the driver automatically. It may also ask you to provide a copy of the necessary driver if it does not recognize the type of NIC you have installed. If Windows does not start the installation routine immediately, open Control Panel, and choose Add A Device under Hardware And Sound. A list of hardware devices will appear. Choose the NIC and continue the installation.
  5. After installing a NIC, you must hook the card to the network using the appropriate cable (if using wired connections). Attach this patch cable to the connector on the NIC and to a port in the wall (or connectivity device), thus connecting your PC to the rest of the network.

Now that your NIC is installed, it’s time to configure it with the right IP address and TCP/IP configuration information. There are two ways to do this. The first is to automatically obtain IP configuration information from a Dynamic Host Configuration Protocol (DHCP) server, if one is available on the network. The other way is to manually enter in the configuration information yourself.

Imagine that you have found yourself in a situation in which you have a small network of no more than 10 computers and do not have a DHCP server. You want to minimize the administrative hassle of configuring TCP/IP, so you want your computers to configure themselves automatically. What do you do?

The answer is to set the NIC up to get its IP information from the DHCP server anyway. Microsoft Windows operating systems will automatically configure themselves with an Automatic Private IP Addressing (APIPA) address if they are unable to locate a DHCP server. With an APIPA address, computers on the local network will be able to communicate with one another. The limitation is that the computers will not be able to communicate with any remote devices (those not on the local network) and will not be able to get on the Internet.

To configure your NIC in Windows 7, open Control Panel in Category view and click View Network Status And Tasks under Network And Internet. In the left pane, click Change Adapter Settings. You’ll see the name of a connection, such as Local Area Connection. Right-click that, and click Properties. Figure 8.10 shows you what the Properties screen will look like.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.10 Wireless Network Connection properties

On that screen, highlight Internet Protocol Version 4 (TCP/IPv4) and click Properties. This will take you to a screen similar to the one in Figure 8.11.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.11 TCP/IP properties

As you can see in Figure 8.11, this computer is configured to obtain its information from a DHCP server. (If you have a wireless router, as many people do on their home networks, it can function as a DHCP server. We’ll talk more about that in a few sections.) If you wanted to configure the client manually, you would click Use The Following IP Address and enter in the correct information. To supply the client with a DNS server address manually, click Use The Following DNS Server Addresses.

What type of SOHO Internet access method offers the best bandwidth

If you manually configure the IP address, you must also configure the DNS server address manually. Otherwise, the client will not have access to a DNS server. Client computers can broadcast to find a DHCP server, but they cannot broadcast to find a DNS server.

Installing a wireless NIC is just like installing a normal, wired NIC. The only difference is in the configuration of the NIC. You must configure the NIC to connect to your preferred wireless network (by its SSID) and configure any security settings (such as wireless encryption keys).

To configure a wireless card under Windows 7, you must first install the wireless card. For a desktop, this usually means powering off the computer, removing the case cover, and inserting the card into an open slot (assuming the wireless card expansion card type and bus slot type match). Then you can power the computer back up, and the computer should recognize that a new card was installed and prompt you to install the driver. Most desktops also have USB ports for installation of wireless NICs. The process will be nearly identical to the one you followed in Exercise 8.2.

On a laptop, simply insert the wireless PC Card or USB NIC into any open PC Card slot or USB port with the laptop powered up. Once you have done this, Windows PnP will recognize the card and ask you to install the driver. (Note that some NIC manufacturers ask you to insert the CD and install the drivers before physically installing the NIC. Not doing so could cause installation issues. Always check your documentation!) Nearly every laptop processor chipset made today (such as the Intel Core i5) comes with integrated wireless, so no external adapter needs to be added. USB-attached NICs are an option for desktop computers as well.

Once the NIC is in and the driver is installed, you may have to reboot (but only in very unique cases). Then the wireless card should be ready to use.

What type of SOHO Internet access method offers the best bandwidth

Bear in mind that these are general steps. Always consult the documentation that comes with the hardware to ensure that there isn’t a special step that is unique to that card.

Now that your wireless card is installed in your computer, you can configure the connection so you can use it. Windows versions from XP on are beautiful for wireless use because they have utilities for connecting to wireless networks built into the operating system. Windows uses the Wireless Zero Configuration Service (also called Wireless Auto Configuration or WLAN AutoConfig) to automatically connect to wireless access points using IEEE 802.11 standards.

To configure a wireless connection, you can simply bring a Windows (XP or newer) laptop or computer within range of a wireless access point and Windows will detect and alert you to the presence of the access point. Alternatively, if you would like control over the connection, in Windows 7, you can choose Start Control Panel Network And Internet and then choose Connect To A Network. You will get a screen similar to the one shown in Figure 8.12

What type of SOHO Internet access method offers the best bandwidth

Figure 8.12 Available wireless connections

What type of SOHO Internet access method offers the best bandwidth

If you have a wireless signal strength indicator in the system tray next to the clock, you can click on it and see the same screen as is shown in Figure 8.12.

From this screen you can view the SSIDs of the available wireless networks, including the one to which you are connected (the one that says “Connected” next to it). The bars in the far-right column indicate the relative signal strength of each connection. The more green bars showing, the stronger the signal and the better (and faster) the connection.

What type of SOHO Internet access method offers the best bandwidth

If the connection shows a lock icon next to the signal indicator, it is a secured wireless network and you will need to enter some sort of password to gain access to it. It can be dangerous to join unsecured networks; you have no way of knowing who is on them or what are their intentions. Wireless attacks on unsecured networks are becoming more common, so be careful with joining unsecured networks!

To connect to any network, double-click it and Windows will try to connect. You’ll see a window similar to the one in Figure 8.13 that shows you the connection attempt is in progress. Once you are connected, Windows will display “Connected” next to that connection.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.13 Connecting to a wireless network

What type of SOHO Internet access method offers the best bandwidth

The weaker the signal, the longer the connection will take. Authentication will also slow down the initial connection time.

Network cables are not the most fun thing to install. Proper installation of network cables generally means running them through ceilings and walls and making a mess of the office. Thank goodness for wireless!

What type of SOHO Internet access method offers the best bandwidth

Be sure to use plenum cable if you are running cables through spaces where there is air ventilation, such as drop ceilings. PVC-coated cables will produce poisonous gas when burned. Also be sure that you have the proper permission to run the cables and that you aren’t violating any building codes.

If you are installing a wired network in an existing office space, you may want to look into hiring out the cable installation to a third party. You’ll find many companies that have the tools needed to properly install a wired network.

When installing a wired network yourself, always be aware of the maximum cable lengths, as outlined in Table 8.4. In addition, utilize cable troughs in ceilings and walls or another conduit in walls to keep your cables organized. Figure 8.14 shows a cable trough; they come in a variety of lengths and quality.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.14 Cable trough

Finally, if you must run cables across the floor in a walkway (which isn’t recommended), use a floor cable guard to avoid creating a trip hazard and to protect your cables. A floor cable guard is shown in Figure 8.15.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.15 Floor cable guard

What type of SOHO Internet access method offers the best bandwidth

When running cables through a ceiling, never run the cables directly across fluorescent lights. These lights emit electromagnetic radiation (EMI) that can interfere with network communications. Utilize your cable troughs to keep cables in one place and away from lights. Also remember that fiber-optic cables are immune to EMI!

Instead of using switches and hubs, wireless networks use either a wireless access point (WAP) or a wireless router to provide central connectivity. A WAP functions essentially like a wireless hub, whereas wireless routers provide more functionality, similar to that of a wired router. Based on looks alone, they are pretty much identical, and physically installing them is similar. The differences come in configuring them because they will have different options.

In the following sections, we’re going to talk about installing and configuring WAPs and wireless routers interchangeably; just remember that a lot of the features available in a wireless router may not be available in a WAP.

After unwrapping the device from its packaging (and reading the instructions, of course), you must choose a place for it. If it is supplying wireless access to your home network and the Internet, locate it where you can receive access in the most places. Keep in mind that the more walls the signal has to travel through, the lower the signal strength.

In addition, you may choose to have some computers plug directly into the device using a UTP cable. If so, it makes sense to locate the device near the computer or computers you will want to physically connect.

What type of SOHO Internet access method offers the best bandwidth

Place the WAP in the center of your home, close to a network connection. Or if you have only one computer, place it close to the broadband Internet connection you are using (i.e., the cable modem or DSL line).

In many offices, WAPs and wireless routers are often placed in the ceiling, with the antennae pointed downward through holes in the ceiling tiles. You can purchase metal plates designed to replace ceiling tiles to hold these devices. The plates have holes precut in them for the antennae to stick through, are designed to securely hold the device and easily open for maintenance, and often lock for physical security. There are also Wi-Fi ceiling antennas you can purchase that basically look like a little dome hanging from the ceiling.

What type of SOHO Internet access method offers the best bandwidth

For wireless connectivity devices placed in a ceiling (or other places with no easy access to an electrical outlet), Power over Ethernet (PoE) is a very handy technology to supply both power and an Ethernet connection.

Once you have chosen the location, plug the unit into a wall outlet and connect the two antennae that come with the unit (as needed; many newer devices contain built-in antennae). They will screw onto two bungs on the back of the unit. Once the unit is plugged in, you need to connect it to the rest of your network.

If you are connecting directly to the Internet through a cable modem or DSL or to a wired hub or router, you will most likely plug the cable into the Internet socket of the device, provided it has one. If not, you can use any of the other wired ports on the back of the device to connect to the rest of your network. Make sure that you get a link light on that connection.

At this point, the device is configured for a home network, with a few basic caveats. First, the default SSID (for example, Linksys) will be used, along with the default administrative password and the default IP addressing scheme. Also, there will be no encryption on the connection. This is known as an open access point. Even if you have nothing to protect except for the Internet connection, you shouldn’t just leave encryption turned off. It just makes you an easy and inviting target for neighbors who want to siphon off your bandwidth or even worse. Many wireless manufacturers have made their devices so easy to configure that for most networks it is Plug and Play.

What type of SOHO Internet access method offers the best bandwidth

If you have personal data on your home network and more than one computer, you should never keep the default settings. Anyone could snoop your access point from the road in front of or behind your house and possibly get on your home network. It’s too easy for identity theft!

From a computer on the home network, insert the device’s setup CD into the computer’s CD-ROM drive. It will automatically start and present you with a wizard that will walk you through setting the name of the SSID of this new access point as well as changing the default setup password, setting any security keys for this connection, and generally configuring the unit for your network’s specific configuration. Then you’re done!

Each wireless router manufacturer uses different software, but you can usually configure their parameters with the built-in, web-based configuration utility that’s included with the product. While the software is convenient, you still need to know which options to configure and how those configurations will affect users on your networks. The items that require configuration depend on the choices you make about your wireless network. We will divide the configuration section into two parts: basic configuration and security options and then additional services.

The Wi-Fi Alliance (www.wi-fi.org) is the authoritative expert in the field of wireless LANs. It lists five critical steps to setting up a secured wireless router:

  1. Change the router’s SSID.
  2. Change the administrator username and password. Make sure it’s a strong password.
  3. Select AES or WPA2.
  4. Choose a high-quality security passphrase.
  5. From the clients, select WPA2 and enter the security passphrase to connect.

The parameter that needs immediate attention is the SSID. An SSID is a unique name given to the wireless network. All hardware that is to participate on the network must be configured to use the same SSID. Essentially, the SSID is the network name. When you are using Windows to connect to a wireless network, all available wireless networks will be listed by their SSID when you select View Available Wireless Networks.

When you first install the wireless network, the default SSID is used and there is no security enabled. In other words, it’s pretty easy to find your network (Linksys), and anyone within range of your signal can get on your network with no password required. This is obviously a security risk, so you want to change that.

For the rest of this example, we’ll use a Linksys EA3500 wireless router. First, you need to log in to your device. The default internal address of this router is 192.168.1.1, so to log in, open Internet Explorer (or your preferred Internet browser) and type 192.168.1.1 into the address bar. (Some routers use 192.168.0.1 as a default; check your router’s documentation if you are unsure about what your router uses.) You’ll get a screen similar to the one in Figure 8.16.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.16 Logging in to the wireless router

What type of SOHO Internet access method offers the best bandwidth

Some wireless router installation programs will install an icon on your desktop to use for management. Clicking the icon will take you to the management program.

You should have already set up the username and password using the CD provided with the device. If not, look in the manual for the default username and password. You’ll definitely want to change these as soon as possible. Once you’re logged in, the first screen you’ll see is similar to the one in Figure 8.17. On this screen, you can see sections along the left-hand side that allow you to configure various router settings. On this router, the Connectivity section has an Internet Settings tab that identifies how you configure your incoming connection from the ISP. In most cases, your cable or DSL provider will just have you use DHCP to get an external IP address from its DHCP server, but there are options to configure this manually as well.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.17 Basic setup screen

Next, configure the parameters that are crucial for operation according to the Wi-Fi Alliance. On this router, the SSID and passwords are configured on the Basic tab of the Connectivity settings, as shown in Figure 8.18.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.18 Basic wireless settings tab

What type of SOHO Internet access method offers the best bandwidth

Figure 8.18 also shows the option to check for firmware updates, and in this case those updates will be automatic. After you install a router, change the SSID and passwords, and set up security, you should update the firmware to ensure that it’s the most current version. Using older firmware versions could present security risks.

You can see the network name (SSID) as well as the password required by clients to join the network. (We blocked out the password for pretty obvious reasons, because this router screen shows it in plain text.) You can change either of these parameters by clicking the Edit link to the right of Network Name And Password. The router’s administrative password is also changed from this screen, in the Router Password section. Click Edit and set the password as needed. Make sure it’s very different than the password needed to join the network! These steps take care of the SSID, admin password, and security phrase. While we’re in Connectivity, we’re going to click the Local Network tab to configure our internal network settings, as shown in Figure 8.19.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.19 Internal Network Settings screen

Here, you configure your router’s hostname, internal IP address (in this case 192.168.1.1), and subnet mask. On this router, DHCP is also configured on this screen. If you want the device to act as a DHCP server for internal clients, enable it here, specify the starting IP address, and specify the maximum number of DHCP users. (Author’s note: I just realized that I have my router set up to allow 50 DHCP leases at once. In my home, I have about a dozen devices that connect to my network and need a DHCP lease, so having it set to 50 is overkill. I should probably change that!) Disabling DHCP means that clients will have to use a static IP address.

What type of SOHO Internet access method offers the best bandwidth

Most wireless routers (like the one used in this example) have a help section to describe each setting on the configuration pages. So if you’re not totally sure what a setting does, click the Help link (at the top of the screen in this case) to find out what the setting does. If not, there’s always the manual or online help!

The last critical setting you need to make is to enable wireless encryption. If you don’t do this, all signals sent from the wireless router to client computers will be in plain text and anyone can join the network without a security password. It’s a really bad thing to leave disabled. On this particular router, it would make sense to configure security via the Security section, but that’s not true. (Who says things need to be logical?) Here, click the Wireless section, as shown in Figure 8.20.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.20 Wireless settings, including encryption

This router happens to be 802.11n, so it has sections for both a 2.4GHz and 5GHz network. If there were only devices of one type, it would make sense to disable the other network. In this case, though, we are talking about security, and you can see that it’s set to WPA2 Personal. To change the setting, click Edit next to the network type. The other WPA2 choice you generally have is WPA2 Enterprise, which is more secure than Personal. For a business network, regardless of the size, Enterprise is the way to go. In order to use Enterprise, though, you need a separate security server called a RADIUS server.

What type of SOHO Internet access method offers the best bandwidth

Another tab shown on Figure 8.20 is the MAC Filtering tab. On that tab, you can configure the router to allow connections only from clients with certain MAC addresses. (Recall that MAC addresses are hardware addresses built into NICs.) This is a light-duty security measure you can use on your network, but it’s easily defeated by an attacker with the ability to spoof a MAC address.

What type of SOHO Internet access method offers the best bandwidth

For your wireless router to use WPA2 Enterprise, remember that you need to have a RADIUS server on your network. The A+ exam won’t test you on how to configure RADIUS. For now just know what it is, which is an authentication server. Other exams, such as Network+, will test you on how to configure RADIUS.

With that, the router-side setup recommendations have been taken care of. Now it’s just a matter of setting up the clients with the same security method and entering in the passphrase. Before we move on to specific security options, there are a few more basic setup concepts we need to cover.

Earlier in the chapter in the section on 802.11g, we brought up the concept of wireless channels. There are 11 configurable channels in the 2.4GHz range, which is what 802.11b/g uses to communicate. If you look back at Figure 8.20, you’ll see that the channel is set to auto. Most of the time, you won’t have a need to change that.

But let’s say you’re in a situation where you have too many users for one WAP to adequately service (about 30 or more) or your physical layout is too large and you need multiple access points. Now you need to have more than one access point. In a situation like this, here’s how you should configure it:

  • Set up the WAPs so they have overlapping ranges. The minimum overlap is 10 percent, and 20 percent is recommended. This way, if users roam from one area to another, they don’t lose their signal.
  • Configure the WAPs with the same SSID.
  • Configure the WAPs with non-overlapping channels.

2.4GHz channels need to be at least five numbers apart to not overlap. So, for example, channels 2 and 7 do not overlap, nor do 4 and 10. There are 11 configurable channels, so you can have a maximum of three overlapping ranges on the same SSID, configured with channels 1, 6, and 11, and not have any interference. Wireless clients are configured to auto-detect a channel by default, but they can be forced to use a specific channel as well.

On the example router we were using, you could also configure the 5GHz network. In this case, you can choose from 20MHz or 40MHz channel widths, as well as choose the channel. Figure 8.21 shows the channels available. Each of the 20MHz channels shown is non-overlapping.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.21 5GHz channels available to select

Network Address Translation (NAT) is a very cool service that translates private IP addresses on your internal network to a public IP address on the Internet. If you are using your wireless router to allow one or more clients to access the Internet but you have only one external public IP address, your router is using NAT.

Most routers have NAT enabled by default, and there might not be any specific configuration options for it. That’s true in the case of the EA3500 router we’ve been using as an example. You can enable or disable it on the Advanced Routing tab in Connectivity, but otherwise the only options you can configure are the internal IP addresses that the router hands out to clients.

What type of SOHO Internet access method offers the best bandwidth

To be technically correct, NAT is specifically a one-to-one translation of a private IP address to a public IP address. If you have multiple client computers with private addresses accessing the Internet using one public address (called many-to-one), that is a specific form of NAT known as overloading, Port Address Translation (PAT), or port forwarding. The A+ exam does not test you on the differences between NAT and PAT, but other tests do, such as the Network+ exam.

Another type of NAT is called Dynamic Network Address Translation (DNAT), which translates a group of private addresses to a pool of routable addresses. This is used to make a resource that’s on a private network available for consumption on public networks by appearing to give it a publicly available address. For example, if a web server were behind a NAT-enabled router and did not have its own public IP address, it would be inaccessible to the Internet. DNAT can make it accessible.

Universal Plug and Play (UPnP) is a standard designed to simplify the process of connecting devices to a network and enable those devices to automatically announce their presence to other devices on the network. If you remember when Plug and Play was new to computers, it was revolutionary. You simply plugged in a peripheral (such as a USB network card or mouse) and it was detected automatically and it worked. UPnP is the same idea, but for networking. From a standards standpoint, there’s not a lot to configure. The client needs to be a DHCP client and the service uses UDP port 1900.

The concept is great. It lets devices connect to the network and discover each other automatically with the Simple Service Discovery Protocol. It can be used for any networked device you can think of, from routers and printers to smartphones and security cameras.

The problem is, UPnP has no authentication mechanism. Any device or user is trusted and can join the network. That is obviously a problem. The security consulting firm Rapid7 did a six-month research study in early 2013 and found that over 6,900 network-aware products, made by 1,500 different companies, responded to public UPnP requests. In total, they found nearly 81 million individual devices responded to requests. The United States Department of Homeland Security and many others immediately began requesting people to disable UPnP.

Since that time, the UPnP forum (www.upnp.org) has released statements saying that the security holes have been patched and that the system is more secure than ever. As of the time of writing, skeptics still abound and UPnP does not appear to be a safe option. Regardless of if and when it gets fixed, the reputation of UPnP is not a good one.

The biggest risk is for open UPnP connections to be exploited by unknown systems on the Internet. Therefore, you should configure your router to not allow UPnP connections from its external connection. Many ISPs have also taken steps to help prevent issues. If you’re concerned about devices on your network posing security risks via UPnP, visit www.rapid7.com/resources/free-security-software-downloads/universal-plug-and-play-jan-2013.jsp

to download and run the UPnP exploit scanner. If you’re unsure about your router, disable UPnP just to be safe.

Wireless routers have many advantages over wireless access points. One of the biggest advantages is the ability to share an Internet connection. By sharing a connection, you pay for only one connection but you can connect as many computers as you would like (or as many as are reasonable) to your wireless router. Here is how to do that.

First, ensure that your DSL modem or cable modem is connected properly. Then, connect your wireless router to your cable modem or DSL modem using a UTP cable (CAT-5e or better). In most cases, the wireless router will have a wired Internet port on the back of it. Connect the cable here and plug it into your broadband modem. Finally, you can connect computers to your wireless router.

Many ISPs, in an attempt to prohibit this sort of behavior, will restrict access through the modem to one MAC address. This isn’t a problem. You can do one of two things. The first option is, when you first make your connection to the ISP, just make sure your computer is already connected through your router. The ISP will see the MAC address of the router and assume that is your computer. The second option is that most wireless routers will allow you to clone your computer’s MAC address (see Figure 8.22). Your router will simply tell the ISP that it has the same MAC address as your computer, which was previously connected directly to the cable or DSL modem. ISPs may not like it, but sharing a wireless Internet connection is very economical option for a small office or home network.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.22 Option to clone a MAC address

Wireless routers offer many more services than we’ve been able to cover to this point, and most of them are out of the scope of A+ exam training. That includes configuring your router as a firewall, but that topic is so important for networking that we feel the need to give you a primer anyway. (Besides, port forwarding and port triggering are exam objectives, and those are firewall concepts.) So, we want to finish off this chapter with two more important concepts related to routers: firewalls and QoS.

Before we get into configuring your wireless router as a firewall, let’s be sure you know what firewalls can do for you. A firewall is a hardware or software solution that serves as your network’s security guard. For networks that are connected to the Internet, they’re probably the most important device on the network. Firewalls can protect you in two ways. They protect your network resources from hackers lurking in the dark corners of the Internet, and they can simultaneously prevent computers on your network from accessing undesirable content on the Internet. At a basic level, firewalls filter packets based on rules defined by the network administrator.

Firewalls can be stand-alone “black boxes,” software installed on a server or router, or some combination of hardware and software. Most firewalls will have at least two network connections: one to the Internet, or public side, and one to the internal network, or private side. Some firewalls have a third network port for a second semi-internal network. This port is used to connect servers that can be considered both public and private, such as web and email servers. This intermediary network is known as a demilitarized zone (DMZ), an example of which is shown in Figure 8.23. Personal software-based firewalls will run on computers with only one NIC.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.23 A network with a demilitarized zone (DMZ)

We’ve already stated that firewalls can be software- or hardware-based or a combination of both. Keeping that in mind, there are two general categories of firewalls: network-based and host-based.

Network-based firewalls A network-based firewall is what companies use to protect their private network from public networks. The defining characteristic of this type of firewall is that it’s designed to protect an entire network of computers instead of just one system. It’s generally a stand-alone hardware device with specialized software installed on it to protect your network.

Host-based firewalls In contrast to network-based firewalls, a host-based firewall is implemented on a single machine so it protects only that one machine. This type of firewall is usually a software implementation because you don’t need any additional hardware in your personal computer to run it. All current Windows client operating systems come with Windows Firewall, which is a great example of a host-based solution. Norton Security and many other security products come with software firewalls too. Host-based firewalls are generally not as secure as network firewalls, but for small businesses or home use, they’re an adequate, cheap solution.

Firewalls are configured to allow only packets that pass specific security restrictions to get through them. They can also permit, deny, encrypt, decrypt, and proxy all traffic that flows through them, most commonly between the public and private parts of a network. The network administrator decides on and sets up the rules a firewall follows when deciding to forward data packets or reject them.

The default configuration of a firewall is generally default deny, which means that all traffic is blocked unless specifically authorized by the administrator. While this is very secure, it’s also time consuming to configure the device to allow legitimate traffic to flow through it. The other option is default allow, which means all traffic is allowed through unless the administrator denies it. If you have a default allow firewall and don’t configure it, you might as well not have a firewall at all.

The basic method of configuring firewalls is to use an access control list (ACL). The ACL is the set of rules that determines which traffic gets through the firewall and which traffic is blocked. ACLs are typically configured to block traffic by IP address, port number, domain name, or some combination of all three.

Packets that meet the criteria in the ACL are passed through the firewall to their destination. For example, let’s say you have a computer on your internal network that is set up as a web server. To allow Internet clients to access the system, you need to allow data on port 80 (HTTP) to get to that computer.

Another concept you need to understand is port triggering. It allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port. For example, if a computer on your internal network makes an outbound Telnet request (port 23), subsequent inbound traffic destined for the originating computer on port 23 would be allowed through.

Nearly every wireless router sold today provides you with some level of firewall protection. On the router used in this example, the firewall options are on two separate tabs. Enabling the firewall and setting a few basic options is done from the Security section, as shown in Figure 8.24. More advanced options, such as configuring port forwarding and port triggering, are on the DMZ and Apps And Gaming tabs.

What type of SOHO Internet access method offers the best bandwidth

Figure 8.24 Enabling the firewall

Quality of Service (QoS) is a strategy that allows an administrator to control traffic to maintain a certain service level. By using QoS, an administrator can set different priorities for one or more types of network traffic based on different applications, data flows, or users. For example, if the engineering group needs to have a certain amount of guaranteed network bandwidth, QoS can make that happen. This is not typically implemented on small or home office networks but rather for larger enterprise networks.

QoS focuses on dealing with five different types of problems that can affect data on a network:

  • Delay, usually caused by congested routes that prevent critical data from arriving on time
  • Dropped packets, which often causes delay
  • Error, or corrupted data
  • Jitter, or variation in packet delay in a data stream
  • Out-of-order delivery, which can cause performance issues in time-sensitive applications such as VoIP.

Before each session, a QoS level is established as part of a service-level agreement (SLA). This is a simply priority setting. Higher-level numbers indicate higher priority, and administrators can set priority levels 0 through 5. Table 8.8 shows the eight levels of QoS.

Table 8.8 QoS levels

Level Description
0 Best effort
1 Background
2 Standard
3 Excellent load (business-critical applications)
4 Controlled load (streaming media)
5 Interactive voice and video (less than 100ms latency)
6 Layer 3 network control reserved traffic (less than 10ms latency)
7 Layer 2 network control reserved traffic (lowest latency)

As more and more real-time business-critical applications hit the market, QoS will become a bigger topic.

If you are given the scenario in real life or on the A+ exam, you should know how to install and configure a SOHO router. In today’s environment, most installations for small offices and home networks will involve wireless routers. Throughout this chapter you have learned everything you need to know to purchase the best device for different situations and how to set it up once you get it out of the box. Let’s review here though.

The first decision to make is which router technology to purchase. With wireless, it’s generally best to go with the best technology available because speeds have been increasing rapidly over the last several years. It seems like 802.11ac provides great speed, but you might not be able to use all of its capacity due to channel bonding limitations. Therefore, 802.11n might be just fine, and possibly cheaper.

Next, how will the office get on the Internet? The two most obvious choices are DSL and cable internet. Find the best solution (which often means the least expensive), and set it up through the service provider. In fact, you may want to do this first because it will probably take the provider at least a few days to get it set up on their end and you want it to be ready when you install the network.

Then, as needed, plan the internal network layout. Is it all wireless or will there be wired connections? Do you need to run cables? Will there be a server closet or other central connectivity point? Once you’re certain of your configuration, you can begin installation.

When installing the router, always remember these key steps:

  1. Change the default SSID.
  2. Change the administrator username and password to something highly secure.
  3. Configure the best security possible, such as WEP2 (AES).
  4. Set a strong passphrase for clients to join the network.

After those steps are complete, you can configure the clients to join the network by setting their security appropriately, finding the SSID, and entering the passphrase. Follow these guidelines and you will be able to properly install a network, regardless of the scenario presented.

In this chapter, you learned about wireless networking and configuring a small office, home office (SOHO) network. We started with wireless networking. We introduced the key wireless networking standards 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac and talked about their characteristics, such as speed, distances, frequencies, and modulation. Then, we moved into wireless security. Important security protocols to remember are WEP, WPA, and WPA2.

Next, you learned the fundamentals of installing a small network. We started this section off looking at the myriad possibilities for Internet connections, from the archaic dial-up to broadband options such as DSL, cable modems, fiber, ISDN, and satellite. After that, we talked about choosing internal network connections in both wired and wireless environments.

From there, we dove into physical network installation. The first critical step is planning. Don’t be the one who forgets that! After covering elements of good planning, we looked at how to install network adapters, cabling, and connectivity devices.

Finally, we looked at how to configure a router. The Wi-Fi Alliance has some great practical steps on how to configure a secure wireless network, such as changing the SSID, setting passwords, and enabling security. We also looked at other basic configuration options, such as DHCP, communication channels, and NAT. After that, we finished up by looking at your wireless router as a firewall and taking a quick look at basic QoS.

Know the different 802.11 standards. Standards you should be familiar with are 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac. 802.11a transmits up to 54Mbps in the 5GHz range. 802.11b transmits up to 11Mbps in the 2.4GHz range. 802.11g is backward compatible with 802.11b and transmits 54Mbps in the 2.4GHz range. 802.11n is backward compatible with all of the older versions and can achieve throughput of 600Mbps communicating in both the 2.4GHz and 5GHz ranges. The newest one is 802.11ac, which promises gigabit speeds in the 5GHz range.

Understand security protocols used for wireless networking. Listed in order from least to most secure, the common wireless security protocols include WEP, WPA, and WPA2. WPA uses TKIP and WPA2 uses AES.

Know the different types of available broadband connections. Broadband connections include DSL, cable, satellite, ISDN, cellular, and fiber optic.

Know the three non-overlapping 2.4GHz wireless channels. If you need three non-overlapping channels, you must use channels 1, 6, and 11.

The answers to the chapter review questions can be found in Appendix A.

  1. Which of the following wireless IEEE standards operate on the 2.4GHz radio frequency and are directly compatible with each other? (Choose two.)

    1. 802.11a
    2. 802.11b
    3. 802.11ac
    4. 802.11g

  2. What is the primary function of the SSID?

    1. Secure communication between a web server and browser
    2. Secure communication between a server and remote host
    3. A parameter used to identify a network and configure a wireless connection
    4. A type of password used to secure a wireless connection

  3. Which two of the following are features that allow 802.11ac to achieve higher data throughput? (Choose two.)

    1. MIMO
    2. Beamforming
    3. Channel bonding
    4. Code division multiplexing

  4. What is the most secure wireless encryption standard for 802.11 networks?

  5. What level of QoS is designated for interactive voice and video?

  6. You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure? (Choose two.)

    1. Change the default administrator name and password.
    2. Change the SSID.
    3. Enable WEP.
    4. Configure it to channel 11.

  7. You are setting up a small office network for a client. Which Internet service would you recommend to provide the best speed?

    1. DSL
    2. Dial-up
    3. Satellite
    4. BRI ISDN
    5. PRI ISDN

  8. Which service allows users with private IP addresses to access the Internet using a public IP address?

  9. You are installing a single 802.11g wireless network. The office space is large enough that you need three WAPs. What channels should you configure the WAPs on to avoid communication issues?

    1. 2, 5, and 7
    2. 1, 8, and 14
    3. 1, 6, and 11
    4. 3, 6, and 9

  10. You are setting up a wireless network. Which wireless standards would give the users over 40Mbps throughput? (Choose three.)

    1. 802.11ac
    2. 802.11b
    3. 802.11g
    4. 802.11n

  11. You have been asked to configure a network for a small office. The wireless router is installed, and now you need to connect the client computers. What do you enter on the client computers to connect to the router?

    1. The administrator password
    2. The security passphrase
    3. The client’s MAC address
    4. The default router password

  12. Which of the following wireless communication methods has an operational range of 1 meter with a viewing angle of 30 degrees?

    1. Bluetooth
    2. Infrared
    3. WiMAX
    4. Satellite

  13. Which of the following are advantages to using dial-up Internet service? (Choose two.)

    1. High speed
    2. Broad availability
    3. Low cost
    4. High security

  14. Which of the following security standards was the first to introduce a dynamic 128-bit per-packet security key?

  15. You are running an 802.11g wireless router in mixed mode. You have three 802.11g wireless NICs using the router. A new user connects using an 802.11b wireless NIC. What will happen?

    1. The user with 802.11b will access the network at 11Mbps while the users with 802.11g will access the network at 54Mbps.
    2. The user with 802.11b will not be able to communicate on the network.
    3. The user with 802.11b will access the network at 11Mbps. The users with 802.11g will access the network at 54Mbps unless they are communicating with the 802.11b device, which will be at 11Mbps.
    4. All users will access the network at 11Mbps.

  16. When enabled, which feature of a wireless router allows only specified computers to access the network?

    1. Port forwarding
    2. WPS
    3. SSID
    4. MAC filtering

  17. A firewall operates by using a set of rules known as what?

  18. You have set up a wireless router on your network and configured it to use AES. What configuration option do you need to choose on the client computers?

  19. Besides 802.11 standards, which wireless communication method works in the 2.4GHz range?

    1. Bluetooth
    2. Infrared
    3. Satellite
    4. Cellular

  20. Which of the following broadband technologies provides two dedicated, digital data channels that can be combined for greater throughput?

    1. DSL
    2. Cable
    3. Satellite
    4. BRI ISDN
    5. PRI ISDN

You will encounter performance-based questions on the A+ exams. The questions on the exam require you to perform a specific task, and you will be graded on whether or not you were able to complete the task. The following requires you to think creatively in order to measure how well you understand this chapter’s topics. You may or may not see similar questions on the actual A+ exams. To see how your answers compare to the authors’, refer to Appendix B.

You just purchased a new PCI network card for a Windows 7 desktop computer. How would you install it?