Basic Wireless Network Setup

Wireless Network
Basic Wireless Network

In this diagram you can see the physical and wireless connections of a basic network. A network cable connects the Internet to the cable modem or the DSL router (this is the equipment your Internet Service Provider installs). Another cable connects the ISP router to the wireless router. From this point, the wireless router connects to the Internet, allowing all computers connected to it to also access the Internet and each other. Once this basic infrastructure is in place, adding to the network is very easy.

Equipment needed for this setup:
Wireless router
Network cable (to connect the ISP equipment to the wireless router)
Other Network Cables to physically connect other computers to the wireless router (optional)

Wireless Network Setup

Equipment needed: Computer, Network Cable, Wireless Router

Setting up the wireless network isn’t difficult; securing it properly is the most important function. A non-secure wireless network can be dangerous because of the following:

1. Anybody can jump on the network and use your Internet connection.
2. Anybody can login to your router and change settings
3. Your data can be seen by others in plain text, exposing your surfing habits and passwords.

Follow the instructions that came with your router for the physical setup. The only two connections needed are:
1. Network cable from the INTERNET port on the router to the ISP modem.
2. Network cable from any other port on the router to your computer.

Basic Wireless Security:
-Change the Administrator login
-Choose an encryption level from None or WEP to WPA Personal or greater
-Change the SSID. The SSID is the identifyer your router broadcasts when hosting a wireless network. When your wireless network application lists all the networks in your area it is actually showing the SSIDs of those networks.

Instructional Videos
Linksys Routers D-Link Routers Netgear Routers

Advanced Wireless Security:
-Allow only the computers on your network to connect to the router.

Although setting an encryption passphrase (as shown in the Basic Wireless Security videos) is effective, telling the router specifically who to allow to connect is another level of security. This is done by finding the hardware code (MAC address) of your wireless network card and adding that value to the router’s “allow” list. This setting will override the encryption passphrase meaning that if a computer has the correct passphrase for the router but is not on the “allow” list it will NOT connect to the router.This works best when the wireless computers on your network rarely change.

Instructional Videos
Linksys Routers D-Link Routers Netgear Routers


Categories: Home Networking

Tags: , ,

6 replies

  1. How are you! Your site is very good, and I I am here generey and for many days. Very good website really! Thanks!

  2. i do enjoy the way you have presented this matter.

  3. I wish to take note of this particular blog, “Basic Wireless Network
    Setup | Wi-Fi Castle” on my own web-site.

    Do you mind in the event that I personallydo? Thanks a lot ,Leila

  4. I like the explianation but it should be more.

  5. ңi there to eveery single one, it’s really a goоɗ for me to paay a quick visit this web site, it consists of helpful Information.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

Brad Hedlund

stuff and nonsense


Every cloud has a silver lining.

Live Virtually

A Storage and Virtualization Blog

Virtualization Team

VMware ESX/ESXi - ESX server - Virtualization - vCloud Director, tutorials, how-to, video

Just another site

VirtualKenneth's Blog - hqVirtual | hire quality

Virtualization Blog focused on VMware Environments


Virtually everything is POSHable

Gabes Virtual World

Your P.I. on virtualization

Yellow Bricks

by Duncan Epping

Wahl Network

Technical Solutions for Technical People

Joking's Blog

Phoenix-based IT guy with too much to say...

%d bloggers like this: