Networking Reviews

Home Network Setup – Wireless Home Network

1 Comment

The wireless home network technology is dominated by the WiFi brand (WiFi=Wireless Fidelity) which is based on the IEEE 802.11 standard. There exist different versions of the 802.11 standard (a,b,g,n) with different characteristics, as shown on this Post.

A typical WiFi wireless home network is shown below:

how to set up a wireless home network

The heart of the wireless network is the WiFi wireless router, which controls all wireless devices (Laptops, PCs, PDAs etc) and routes the traffic to the wired (Ethernet) connection. All wireless devices have to be equipped with a compliant 802.11 WiFi wireless adapter card. These adapters can be embedded in the device, or can be externally attached (USB, PCMCIA).

Equipment Checklist

Wireless Router:
This is the gateway between the wired and wireless world. It takes the wired ethernet data coming on its ethernet port and translates that data to radio signals for transmitting to the attached wifi devices, and vica-versa. It also assigns IP addresses to the attached wireless devices and routes traffic between them, and between the wireless and wired interfaces. This router also facilitates Internet Connection Sharing by connecting its wired Ethernet port to the ADSL/Cable modem of the Internet Service Provider (ISP). The wireless router controls also the security of the wireless home network. You can configure SSID, WEP, WAP, MAC Filtering etc to secure and control which devices can be attached on the wireless network (more info below).

wifi wireless router image

Wireless Adapter:
Each wifi device must be equipped with a wireless network adapter. Almost all modern laptop computers come with an embedded wireless adapter, but you can also connect external devices (USB, PCMCIA) as shown below. Once you install the drivers of the wireless adapter and configure it properly, it should start searching for available wifi routers in the area in order to attach on the network. By default, if you didn’t do any configuration on the wifi router (i.e you left it with its default configuration and turned it on), the wireless adapter should automatically attach to the wireless router, get an IP address, and should be fully connected to the wireless network. However, leaving your wifi network configured with its default (out of the box) settings is not secure at all. Some basic security must be applied, as we will see below.

pcmcia wireless adapter usb wifi adapter

Typical Configuration

SSID:
The Service Set Identifier (SSID) is the name of each particular wireless network. All wireless devices of the same network must have the same SSID in order to communicate with each other. The SSID is configured first on the wireless router, and then on each client device. If the SSID is left unspecified, then any wireless device can connect on the wireless network, which is not a good security practice. The image below shows a typical SSID configuration on a wireless router.

ssid configuration image

The SSID name “mywifinetwork” must be configured on all wireless devices of this particular wifi home network in order to communicate with each other. Another important security enhancement is to Disable the Wireless SSID Broadcast, so that the router does not transmit out on free air the SSID name.

The image below shows the SSID configuration settings on a WinXP laptop computer with wireless network adapter. You configure the SSID under

“Network Connections> right click on Wireless Network Connection> Properties> Wireless Networks> Add “. As you can see, the SSID name configured on the laptop is the same as the SSID on the wireless router.

ssid settings image

Security:
One of the disadvantages of wireless networks is weak security. If you connect your wireless equipment with default settings, then you will manage to provide your neighbor with free internet access as well!!

Fortunately, the WiFi alliance has developed several security techniques to provide encryption and access control to the wireless network. One of these security techniques is WiFi Protected Access (WPA) with Preshared Key (PSK). To configure WPA with PSK, you need to enable it on both the router and the client, and also configure a common pre-shared key between them. The settings on the router are shown below:

wpa settings

The Pre-shared key “wirelesskey” (together with enabling WPA-PSK) must be configured also on the laptop wireless adapter, as shown below:

wpa configuration

TCP/IP Network Settings:
As far as tcp/ip network settings are concerned, by default the wireless router works also as a DHCP server, which means that it assigns IP addresses dynamically to the wireless clients. Basically you don’t need to configure anything for the tcp/ip network settings, since each client will automatically receive an IP address from the wireless router.

Use your Wireless Home Network to Monitor your Home
One of the benefits of having a wireless network in your home is that you can install wireless security cameras for monitoring the inside of your home from anywhere in the world. This is discussed in more detail in this post. Linksys has several products for home camera security such as the one shown below:

wireless security camera with remote control

The Linksys Wireless-G Pan/Tilt/Zoom Video Camera sends live video through the Internet to a web browser anywhere in the world! The Pan/Tilt/Zoom feature gives also flexible control remotely from a Web Browser. If you enable the security mode of the camera, you can also use it as a motion detection sensor, which can send you email alerts with video clips upon motion detection.

Filed Under: Home Network Setup Tagged With: Home Network Setup, wifi home network, wireless camera, wireless home network, wireless setup

Comments

  1. steven catron says

    March 16, 2016 at 1:47 pm

    i have a shop around 2hunder feet away without digging what can i do to get wifi out there

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • VoIP Tutorial
  • In Review – Sylvania Netbook
  • Choosing the Right 7 Inch Tablet PC For You
  • Wireless Access Point Reviews – How and Why Standards Matter
  • Types Of Wireless Speaker Adapters

Categories

  • Cisco Certifications
  • Cisco Firewall
  • Computer Virus Education
  • General Technology
  • Home Computer Security
  • Home Network Setup
  • Home Security IP Cameras
  • Information Security
  • IP Network Tutorials
  • IP Telephony and VoIP
  • Network Security
  • Networking Acronyms
  • OSI Layers
  • Software Tools
  • Technology News
  • Troubleshooting
  • Usefull Network Info
  • Wii Game Console
  • Windows
  • Wireless Networks
  • XBOX and PS3 Networking
  • XBOX PS3 and Wii News

Copyright © 2025 · | Contact | About | Privacy Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT