Compaq Mini CQ10-500 HP Notebook Reference Guide - Windows 7 - Page 16

Setting up a new WLAN, Protecting your WLAN, Firewall, Wireless encryption

Page 16 highlights

NOTE: The functional range (how far your wireless signals travel) depends on WLAN implementation, router manufacturer, and interference from other electronic devices or structural barriers such as walls and floors. Setting up a new WLAN Required equipment: ● A broadband modem (either DSL or cable) (1) and high-speed Internet service purchased from an Internet service provider (ISP) ● A wireless router (purchased separately) (2) ● The wireless computer (3) NOTE: Some cable modems include a built-in router. Check with your ISP to see if you need a separate router. The illustration below shows an example of a wireless network installation that is connected to the Internet. NOTE: When setting up a wireless connection, be sure that your computer and wireless router are synchronized. To synchronize your computer and wireless router, turn your computer and wireless router off and then back on. As your network grows, additional wireless and wired computers can be connected to the network to access the Internet. For help in setting up your WLAN, refer to the information provided by your router manufacturer or your ISP. Protecting your WLAN When you set up a WLAN or access an existing WLAN, always enable security features to protect your network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports may not provide any security. If you are concerned about the security of your computer in a hotspot, limit your network activities to e-mail that is not confidential and basic Internet surfing. Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected signals. You can take the following precautions to protect your WLAN: ● Firewall-Checks both data and requests for data that are sent to your network, and discards any suspicious items. Firewalls are available in both software and hardware. Some networks use a combination of both types. ● Wireless encryption-Wi-Fi Protected Access (WPA) uses security settings to encrypt and decrypt data transmitted over the network. WPA uses Temporal Key Integrity Protocol (TKIP) to dynamically generate a new key for every packet. It also generates different sets of keys for each computer on the network. 6 Chapter 2 Networking (select models only)

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75

NOTE:
The functional range (how far your wireless signals travel) depends on WLAN implementation,
router manufacturer, and interference from other electronic devices or structural barriers such as walls
and floors.
Setting up a new WLAN
Required equipment:
A broadband modem (either DSL or cable)
(1)
and high-speed Internet service purchased from an
Internet service provider (ISP)
A wireless router (purchased separately)
(2)
The wireless computer
(3)
NOTE:
Some cable modems include a built-in router. Check with your ISP to see if you need a separate
router.
The illustration below shows an example of a wireless network installation that is connected to the
Internet.
NOTE:
When setting up a wireless connection, be sure that your computer and wireless router are
synchronized. To synchronize your computer and wireless router, turn your computer and wireless
router off and then back on.
As your network grows, additional wireless and wired computers can be connected to the network to
access the Internet.
For help in setting up your WLAN, refer to the information provided by your router manufacturer or your
ISP.
Protecting your WLAN
When you set up a WLAN or access an existing WLAN, always enable security features to protect your
network from unauthorized access. WLANs in public areas (hotspots) like coffee shops and airports
may not provide any security. If you are concerned about the security of your computer in a hotspot,
limit your network activities to e-mail that is not confidential and basic Internet surfing.
Wireless radio signals travel outside the network, so other WLAN devices can pick up unprotected
signals. You can take the following precautions to protect your WLAN:
Firewall
—Checks both data and requests for data that are sent to your network, and discards any
suspicious items. Firewalls are available in both software and hardware. Some networks use a
combination of both types.
Wireless encryption
—Wi-Fi Protected Access (WPA) uses security settings to encrypt and
decrypt data transmitted over the network. WPA uses Temporal Key Integrity Protocol (TKIP) to
dynamically generate a new key for every packet. It also generates different sets of keys for each
computer on the network.
6
Chapter 2
Networking (select models only)