Home Networking Simplified
- By Jim Doherty, Neil Anderson
- Published May 25, 2005 by Cisco Press. Part of the Networking Technology series.
Book
- Sorry, this book is no longer in print.
- Copyright 2006
- Edition: 1st
- Book
- ISBN-10: 1-58720-136-4
- ISBN-13: 978-1-58720-136-3
An illustrated home networking handbook for the everyday user
Building a network doesn't have to be all work and no play—it can actually be fun! Home Networking Simplified is an illustrated home-networking book for everyone from Grandma Mary to your tech-savvy teenage neighbor.
Home Networking Simplified gives you the most basic need-to-know info and then teaches you how to get the most out of your home network:
- Learn the basics of home networking, from connecting to the Internet to connecting your computers
- Create a basic home network
- Grow and update your network with confidence
- Secure your home network and protect yourself from hackers and viruses
- Go wireless to put your computers where you want them—not just where cables reach
- Learn about the latest technologies, emerging trends, and coolest toys
Whether you’re a newbie, a geek, or someone in-between, Home Networking Simplified helps you harness the power of home networking.
Debugged by The Geek Squad
This book is part of the Networking Technology Series from Cisco Press®, the only authorized publisher for Cisco Systems®.
Links
Download related content from TechRepublic.com
Checklists for deploying a SOHO network
Checklist for selecting the best SOHO or remote network ISP
Support and Configuration Checklists for Small/Midsize Networks
Interview(s)
Computer Outlook Radio, August 11, 2005
Investor's Business Daily, July 8, 2005
Computing Unplugged, July 2005
Geek Speak Radio, July 4, 2005
The Wall Street Journal This Morning, July 4, 2005
Entrenched Radio, July 2, 2005
TheDeal.com, June 27, 2005
Into Tomorrow, June 26, 2005
Computer Talk with TAB, June 11, 2005
TechTalkRadio, June 1, 2005
Online Sample Chapter
Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
Downloadable Sample Chapter
Download - .98 MB -- Chapter 16: Other Vulnerabilities (Spam, Cookies, Pop-Ups, Spyware, and Scams)
Table of Contents
Foreword
Introduction
Part I Networking Basics
Chapter 1 What’s a Network?
PC Hardware and Network Interface Cards
Installing Devices in Computers
Configuring New Devices in Microsoft Windows
Chapter 2 Networking Fundamentals
Bits and Bytes
Network Media Types
Twisted-Pair Cable
Coaxial Cable
Wireless Networks
Comparing Media Types
What Is an IP Address?
Dynamically Allocated IP Addresses
Domain Name Server (DNS)
Chapter 3 Connecting to the Internet
The Internet
TCP/IP
A Network of Networks
What Are HTTP and HTML and What Do They Do?
Internet Access Options
Modems
The Internet and Its Applications
E-Mail Tools
What Is Up with the @ Sign?
Sending E-Mails
Receiving E-Mails
How to Build It: Connecting to the Internet
Decide on the Type of Modem
Physically Install the Modem
Internal Modem in a Desktop Computer
Internal Modem in a Laptop Computer
External Modem
Configure Windows to “Talk To” the Modem
Set Up a Dialup Connection to the Internet
Set Up Access to E-Mail
Chapter 4 From the Geek Squad Files
Part II Simple Home Networks
Chapter 5 Creating a Basic Home Network
Planning a Network
Designing Your Network
Building Your Network
How to Build It: Connecting Two Computers
Decide on the Type of NICs
Physically Install the NIC
Internal NIC in a Desktop Computer
Internal PCMCIA NIC in a Laptop Computer
External NIC for a Desktop or Laptop Computer
Configure Windows to “Talk To” the NIC
Build a Network Between the Two Computers
Back-to-Back
Using a Hub, Switch, or Router
Set Up the Network in Windows
Troubleshooting Tips: Building a Network
Chapter 6 Sharing Network Resources
File Sharing
Printer Sharing
Practicing Safe Share
Sharing Guidelines
Network Design Guidelines
How to Build It: File and Printer Sharing
Enable File and Printer Sharing
Share a File Over the Network
Map a Shared File Folder as a Disk Drive
Share a Printer Over the Network
Map a Shared Printer
Add Security Precautions to File and Printer Sharing
Chapter 7 High-Speed Internet Access
Broadband Revolution
Different Types of Broadband
DSL
Cable
Satellite
Wireless (Cellular)
Accelerated Dialup
Providers
Need for Speed
Selecting a Broadband Service
Online Resources to Help You Choose a Broadband Provider
Keep This Important Information
How to Build It: Broadband Internet Access
Decide on a Home Network Design
One-Computer Network
Two-Computer Network
Multiple-Computer Network
Wireless Network
Router Comparison
Set Up the Broadband Equipment
Broadband Cable Connection
Broadband DSL Connection
Configure the Router for Broadband Service
Configure the Router for the Home Network
Check the Access to the Internet
Chapter 8 From the Geek Squad Files
Part III Look Ma, No Wires
Chapter 9 ABGs of Wireless
Wireless LANs
Standards Soup
802.11b
802.11a
802.11g
Comparing the IEEE WLAN Standards
Selecting the Right Wireless Standard for Your Network
Compatibility
Speed
Cost
Additional Considerations
Recommendations
Chapter 10 Going Wireless at Home
Planning Your Wireless Network
Wireless Network Topologies
Sketching a Network Layout
Making a Shopping List
Turning Up the Network
Select an SSID
Select a Wireless Channel
How to Build It: Going Wireless
Install and Set Up a Wireless Router
Install and Set Up Wireless NICs
Configuring an Existing Built-In Wireless NIC
Check Wireless Network Operation
Chapter 11 Securing Your Wireless Network
Why Should I Worry About Wireless Network Security?
What Do I Do About It?
Don’t Advertise Your Wireless Network
Scramble Your Signal
How to Build It: Securing Your Wireless Network
Stop Advertising Your Wireless Network
Enable Wireless Encryption
Enabling WEP Encryption on the Wireless Router
Enabling WEP Encryption Using the NIC’s Utility
Enabling WEP Encryption Under Windows XP
WPA Encryption Example
Disable Ad-Hoc Networking
Wireless Security Checklist
Final Thoughts on Wireless Security
Chapter 12 Wireless Away from Home
What Is a Hotspot?
How to Find a Hotspot
Hotspot Options and Costs
How to Build It: Using Wireless Hotspots
Discover and Connect to a Hotspot
Pass the Hotspot Membership Test
What Not to Do When Using a Hotspot
Chapter 13 From the Geek Squad Files
Part IV Security of Home Networks
Chapter 14 Protecting Your Network from Intruders
Introduction to Security Software
Lines of Defense
Security Software “Bundles”
Firewalls
How Firewalls Work
What Firewalls Protect You From
Hiding Your Network Addresses
How to Build It: Protecting Your Network from Intruders
Turning on a Firewall in the Router
Installing a Personal Firewall on Each Computer
Installing a Professional Personal Firewall Program
Installing a Free Personal Firewall Program
Enabling the Windows Firewall
Keeping Windows Security Up to Date
Where to Go for More Info
Chapter 15 Viruses and Other Malicious Software
What Is a Virus?
Where Viruses Live
Other Nasty Stuff
Worms
Trojan Horses
Protecting Yourself Against Malicious Code
Common Sense
Antivirus Programs
How Do Antivirus Programs Work?
What Happens with New Viruses?
How to Build It: Preventing Viruses and Other Malicious Software from Infecting
Your Network
Turn on Antivirus Protection at Your Service Provider
Set up Antivirus Protection on Your Home Computers
Make Sure Automatic Updating Is Working
Perform an Initial Virus Scan
Where to Go for More Info
Chapter 16 Other Vulnerabilities (Spam, Cookies, Pop-Ups, Spyware, and Scams)
Spam
How Spam Works
How to Block Spam
Cookies
How Cookies Work
Bad Cookies
Pop-Ups
How Pop-Ups Work
How to Get Rid of Pop-Ups
Spyware/Adware
How Spyware or Adware Works
How to Get Rid of Spyware and Adware
Additional Scams
Phishing
Urban Legends
How to Build It: Preventing Network Vulnerabilities
Turn on Spam Blocking at Your Service Provider
Set Up Spam Blocking on Your Home Computers
Avoid Phishing Scams
Set Up Spyware and Adware Blocking on Your Home Computers
Set Up Pop-Up Blocking on Home Computers
Where to Go for More Info
Chapter 17 Keeping Your Family Safe on the Internet
What Are the Online Dangers?
Pornography
Predators
Gambling
Hacking
Illegal Peer-to-Peer Sharing
Protecting Your Family from Online Dangers
How to Build It: Making the Internet Safe
Decide Which Parental Controls Are Right for You
Enable Parental Controls at Your ISP
Enable Parental Controls Using Your Home Router
Enable Parental Controls on Home Computers
Security Bundle Parental Control Option
NetNanny Option
How to Track Internet Activity
Where to Go for More Info
Chapter 18 From the Geek Squad Files
Security Checklist
Part V Advanced Home Networks
Chapter 19 Wireless Print Servers: The Cure for Joy
How to Build It: Wireless Print Server
Set Up the Wireless Print Server for Your Wireless Network
Connect Printers to the Wireless Printer Server
Install the Wireless Print Server Driver on Each Computer
Print a Test Page
Chapter 20 Video Surveillance
How to Build It: Wireless Internet Video Cameras
Set Up the Wireless Internet Video Camera for Your Wireless Network
Configure the Video Camera Security
Viewing Video from Within Your House
Viewing Images with an Internet Browser
Installing and Viewing Images with the Viewer Client
Viewing Video over the Internet
Problems with Viewing Video over the Internet
Use the Video Camera as a Motion Detector
Chapter 21 Internet Phone Service
How IP Telephony Works
Broadband Phone Services
Broadband Phone Providers
Virtual Phone Numbers
Voice-Chat Services
How to Build It: Internet Phone Service
Setting Up a Broadband Phone Service
Choosing an Internet Phone Adapter
Setting Up the Internet Phone Adapter
Setting Up a Voice-Chat Service (Using Skype)
Chapter 22 Networked Entertainment Systems
How to Build It: Networked Entertainment Systems
Set Up the Wireless Media Adapter
Connect the Home Entertainment Center to the Wireless Media Adapter
Install the Adapter Utility Client on Your Home Computer
Playing Music
Viewing Photos
Chapter 23 Online Gaming
Gaming Servers
Options for Online Gaming
How to Build It: Online Video Gaming
Set Up the Wireless Game Adapter
Connect a Video Game Console to the Wireless Game Adapter
Connect to an Online Game Provider
Setting Up an Online Game Account
Detailed Troubleshooting Steps for Online Gaming
Chapter 24 From the Geek Squad Files
Glossary
Index
Appendix
Download - 124 KB -
Appendix A: Binary Number System—The Language of Computers
Download - 370 KB -
Appendix B: MAC Address Locking for Wireless Security
Download - 63.5 KB -
Appendix C: Linksys Product List
Download - 85 KB -
Appendix D: Future Stuff
Other Things You Might Like
- Real Time Over Wireless LiveLessons
- Online Video $199.99
- MPLS Fundamentals LiveLessons
- Online Video $159.99
- Intercloud: Solving Interoperability and Communication in a Cloud of Clouds
- eBook (Watermarked) $27.19