資料來源: Google Book

WiFi home networking

  • 作者: Smith, Raymond J.
  • 出版: New York : McGraw-Hill ©2003.
  • 稽核項: 1 online resource (xvi, 347 pages) :illustrations.
  • 標題: Wireless LANs. , COMPUTERS Data Transmission Systems -- Broadband. , COMPUTERS , COMPUTERS Data Transmission Systems -- Wireless. , NetworkingLocal Area Networks (LANs) , Data Transmission SystemsBroadband. , Home computer networks. , COMPUTERS Networking -- Local Area Networks (LANs) , Electronic books. , IEEE 802.11 (Standard) , Data Transmission SystemsWireless.
  • ISBN: 0071412530 , 9780071412537
  • 試查全文@TNUA:
  • 附註: Copyright; CONTENTS; CHAPTER 1 Is This Trip Necessary? ; At Home in the Twenty-first Century; Turning Your Home into a Hot Spot; A Brief History of Wireless Computer Networks; Wirelessly Wired; The Old Way of Connecting Dial-Up Modems; Wiring at Home and Work; Interchangeable Parts; IEEE Wireless Standards; Nonstandards; Wi-Fi Versus Bluetooth; Why Wi-Fi?; Roam, Roam on the Range; Wi-Fi Drivers: The Private Sector; Wi-Fi and Cell Phones; Wi-Fi Building Blocks; Connect Your Home; Buying Internet Access; Connect Your Personal Computers; Avoiding Trouble Spots; Wi-Fi Interfaces. Loading Wi-Fi SoftwareReady for Takeoff; CHAPTER 2 From the World to Your Door ; Into the Fast Lane; How to Connect a Broadband Pipe; How Fast Is Fast?; Your Internet Service Provider (ISP); Read the Fine Print; Ma Bell DSL; Telco Distance Limits; Installing Your DSL; CHAPTER 3 From the Doorstep to the Tabletop ; Sharing a Broadband Internet Connection; Software Routers; Hardware Connection Sharing; Alternatives to Wi-Fi; Infrared Links; Telephone-Line Home Networks; Networking over Electrical Wiring; True Wireless; Physical Planning for Your Wi-Fi Home Network; Home Antennas. CHAPTER 4 Security and Setup War Dialing; Unwired Security; Configuring Restricted Access; Four Security Fences; The SSID: Wi-Fi Networks Announce Themselves to the World; Authentication; MAC Address Filtering; Wired Equivalent Privacy (WEP); Virtual Private Networks (VPNs); Password Advice; Configure from Inside; Workstation File Sharing; Firewall Limits; Firewall Fire Drills; Unwanted Bugs: Viruses; Spyware; Spam; Kid-Safe; Walking Laptops; Voluntary Amnesia; Setting Up Your Network; Pulling the Wrappers; ISP Configuration Settings; Insert the Router into Your Network. Connect Other Hardwired PCsConfigure the Workstations; Workstation Networking Parameters; Loading and Configuring Workstation VPN Support; Wi-Fi in Windows XP; Wi-Fi Workstation Configuration; Configure the Router; Special Application Configurations; Access Controls; Assorted Router Utilities; CHAPTER 5 Good Housekeeping ; Maintenance Is a Good Habit; Scout's Motto: Be Prepared; Call for Backup; Backup Software; Network Backup Repositories; Power Corrupts; Ironing out the Volts; Uninterruptible Power Supplies (UPSs); Other Maintenance Tasks; Bug Patrol; CHAPTER 6 Can You Hear Me Now? Basic Troubleshooting MethodsWho Ya Gonna Call?; Simplify the Problem; Troubleshooting Tools; Wi-Fi Router Status Display; Dealing with the Trouble Desk; Dialing for Answers; Navigating the Maze; Trouble Desk Etiquette; A Case History; Common Wi-Fi Problems and Cures; Configuration Does Count; Common DSL Problems and Cures; Residual Line Hardware; Enforced Idleness; Common Cable Broadband Problems; Line Splitters; Defective Cables; Unsolid Connectors; Troubleshooting Shoot-'em-Ups; The DMZ; Game Servers; Chat; DirectX and Other Drivers; Nonroutable Protocols; Tweaking: The Need for Speed.
  • 電子資源: https://dbs.tnua.edu.tw/login?url=https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=99805
  • 系統號: 005304637
  • 資料類型: 電子書
  • 讀者標籤: 需登入
  • 引用網址: 複製連結
·Describes the costs, benefits and necessity of networking ·Reviews software networking tools that save money for small-time operators ·Summarizes business expenses and savings to help a prospective user choose their office setup ·Offers criteria for deciding on distribution media ·Compares wireless versus wired connections ·Includes important, practical information about security, viruses, and backing up
來源: Google Book
評分