Wireless Home Networking: 20 Things Not to Do When Setting up Your Wireless Network

Mar 14, 2009

1. Do not name your SSID your last name or first name

2. Do not have your pass phrase your last name of first name

3. Don’t leave your wireless channel at six, change it to 2 or 11

4. Don’t leave your wireless network open enable some sort of encryption

5. Place your wireless router in the middle of your home not next to a wall

6. Don’t place your wireless router next to large heavy objects

7. Configure your laptop not to automatically connect to a wireless networks named “linksys“

8. Don’t leave your passphase the same and change it every couple months

9. Don’t use only WEP encryption, enable WPA2 and your wireless network will be a lot safer.

10. Don’t use AES wireless encryption for wireless gamming it does slow your network down.

11. Don’t start configuring your wireless network until you have upgraded your wireless router firmware

12. Don’t purchase anything but wireless MIMO routers for home networks, MIMO routers will give you better coverage.

13. Don’t leave your transmit power at the default transmission level. If you need a strong signal turn it up, if you don’t turn it down to the minimum

14. Don’t place your wireless router in the lowest spot in your house. Place it as high as possible to give you the best coverage.

15. Don’t have your wireless antennas pointed in the wrong direction. Meaning your signal does not emit from the points, they emit from the sides.

16. Don’t expect to achieve those 108 mbps speeds that are advertised with MIMO routers….those speeds only are achieved under super ideal circumstances.

17. Don’t upgrade your wireless routers firmware over a wireless connection

18. Don’t upgrade your wireless routers firmware until you have reset your options to the defaults

19. Don’t confuse an access point for a wireless router. Wireless routers act as a firewall, access points do not.

20. Enable some sort of security on your wireless router, if you don’t you will be sorry

If you have a question we have the answer. Come check out the most popular wireless technology database on the internet http://www.wirelessninja.com Simple and Secure wireless networking. Come See us today!!

Article Source: http://EzineArticles.com/?expert=Eric_Meyer
READ MORE - Wireless Home Networking: 20 Things Not to Do When Setting up Your Wireless Network

Xbox 360 Wireless Networking

What is the Xbox 360 Wireless Network Adaptor?

The Xbox 360 Wireless Network Adapter is an accessory for the Xbox 360 video game console. It is used to connect the video game system to your wireless network. It simply plugs into the rear USB port of the console.

Created by Microsoft it is one of the most innovative and well designed accessories for the Xbox 360. It is small but has the range and speed of much bigger wireless bridges.

Why buy the Xbox 360 Wireless Network Adaptor?

The network adaptor is powered by the Xbox 360's USB port so there is no need for an external power supply. It is a dual band wireless bridge that does not interfere with the console's wireless controllers. It is 802.11a/b/g compatible so it will work with a wide variety of wireless routers.

This device is designed to be easy to setup. Simply plug it in and configure it from the console's system blade. Wireless security is also included.

This adaptor is a must for people who want to play on Xbox Live and stream videos or music from a computer without the clutter of network cables.

Some people might be afraid of experiencing lag while using a wireless network adapter but I have yet to experience any delays while playing games on Xbox Live. Videos also seem to stream well, there are no skipped frames that I can notice. Music isn't choppy or distorted while streaming either.

All in all this adaptor is well worth the purchase.

For more information about wireless networks, visit my site at http://www.wirelessnetworksetups.com
READ MORE - Xbox 360 Wireless Networking

Windows Mobile 7- not just a 'me-too iPhone'

Or at least that’s what they say in writing.
One can only judge when it’s done.

Speaking of when, by the tone of this job advertisement for a Principal Development Manager on the Windows Mobile 7 team whose responsible for building the OS foundations, the project is definitely still in its early development stages.

The Windows Mobile 7 team is searching for a Principal Development Manager

Do you have a passion for the mobile space? Enjoy big challenges, working with and learning from a high-performance team? Do you want to be part of driving the next big business for the company?

Windows Mobile 7 will change the way you view your phone. We aren’t just building a me-too iPhone or RIM competitor; we’re changing the way customers use and experience their device. In the OS Platform team we are responsible for the OS, file systems, security, hardware platforms and drivers, networking & connectivity, location framework and updateability. In other words, we build the foundation upon which the rest of Windows Mobile is built.

As Development Manager for the Core System, you will have both ICs and Leads reporting to you, with a team of approximately 20 developers. As part of a matrix style organization, you will work closely in a triad with your PM and test counterparts. Specific areas of ownership include the kernel, file systems, security, loader, and device management.

Your job will entail:

  • Building and leading a high performance team
  • Owning and driving the core os (kernel, file systems, security, and device management) features and roadmap for Windows Mobile
  • Defining an engineering system that can scale to large organizations and span multiple releases.
  • Driving quality and performance into the core platform.
  • Mentoring your organization and building a strong bench and successor.

Update: It’s interesting to point out one particular feature the job ad mentions which I think will be essential to Windows Mobile 7’s success - “updateability”. What Microsoft is planning to achieve in WM7 is the ability to ship OS updates directly to the end-user without the need for vendor and operator snail-like intervention, a current problem that’s holding faster Windows Mobile updates back. The question is if it’ll come soon enough?

READ MORE - Windows Mobile 7- not just a 'me-too iPhone'

Packet Fields and Frame Fields

routers make their primary forwarding decision by examining the destination IP address of a packet. Before sending a packet out the proper exit interface, the IP packet needs to be encapsulated into a Layer 2 data link frame. Later in this section we will follow an IP packet from source to destination, examining the encapsulation and decapsulation process at each router. But first, we will review the format of a Layer 3 IP packet and a Layer 2 Ethernet frame.

Internet Protocol (IP) Packet Format

The Internet Protocol specified in RFC 791 defines the IP packet format. The IP packet header has specific fields that contain information about the packet and about the sending and receiving hosts. Below is a list of the fields in the IP header and a brief description for each one. You should already be familiar with destination IP address, source IP address, version, and Time To Live (TTL ) fields. The other fields are important but are outside the scope of this course.
Version - Version number (4 bits); predominant version is IP version 4 (IPv4)
IP header length - Header length in 32-bit words (4 bits)
Precedence and type of service - How the datagram should be handled (8 bits); the first 3 bits are precedence bits (this use has been superseded by Differentiated Services Code Point [DSCP], which uses the first 6 bits [last 2 reserved])
Packet length - Total length (header + data) (16 bits)
Identification - Unique IP datagram value (16 bits)
Flags - Controls fragmenting (3 bits)
Fragment offset - Supports fragmentation of datagrams to allow differing maximum transmission units (MTUs) in the Internet (13 bits)
Time to Live (TTL) - Identifies how many routers can be traversed by the datagram before being dropped (8 bits)
Protocol - Upper-layer protocol sending the datagram (8 bits)
Header checksum - Integrity check on the header (16 bits)
Source IP address - 32-bit source IP address (32 bits)
Destination IP address - 32-bit destination IP address (32 bits)
IP options - Network testing, debugging, security, and others (0 or 32 bits, if any)

MAC Layer Frame Format

The Layer 2 data link frame usually contains header information with a data link source and destination address, trailer information, and the actual transmitted data. The data link source address is the Layer 2 address of the interface that sent the data link frame. The data link destination address is the Layer 2 address of the interface of the destination device. Both the source and destination data link interfaces are on the same network. As a packet is forwarded from router to router, the Layer 3 source and destination IP addresses will not change; however, the Layer 2 source and destination data link addresses will change. This process will be examined more closely later in this section.

Note: When NAT (Network Address Translation) is used, the destination IP address does change, but this process is of no concern to IP and is a process performed within a company's network. Routing with NAT is discussed in a later course.

The Layer 3 IP packet is encapsulated in the Layer 2 data link frame associated with that interface. In this example, we will show the Layer 2 Ethernet frame. The figure shows the two compatible versions of Ethernet. Below is a list of the fields in an Ethernet frame and a brief description of each one.
Preamble - Seven bytes of alternating 1s and 0s, used to synchronize signals
Start-of-frame (SOF) delimiter - 1 byte signaling the beginning of the frame
Destination address - 6 byte MAC address of the sending device on the local segment
Source address - 6 byte MAC address of the receiving device on the local segment
Type/length - 2 bytes specifying either the type of upper layer protocol (Ethernet II frame format) or the length of the data field (IEEE 802.3 frame format)
Data and pad - 46 to 1500 bytes of data; zeros used to pad any data packet less than 46 bytes
Frame check sequence (FCS) - 4 bytes used for a cyclical redundancy check to make sure the frame is not corrupted
READ MORE - Packet Fields and Frame Fields

What is Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing

A stub router is one that is connected to no more than two neighbors and should never be a transit router.The Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing provides

  • improves network stability,
  • reduces resource utilization,
  • and simplifies stub router configuration.
  • The stub router has one exit path from the routing domain and forwards all traffic to a central or distribution router.
  • eigrp stub [receive-only|connected|static|summary]
    • receive-only— This causes the router to not send any routes.
    • connected— The router advertises all connected routes to the single neighbor. No redistribution is necessary.
    • static— The router advertises all static routes to a single neighbor. The static routes still need to be redistributed into EIGRP to be advertised.
    • summary— The router advertises summary routes.
READ MORE - What is Enhanced Interior Gateway Routing Protocol (EIGRP) Stub Routing

What’s Symantec Endpoint Protection Covers

Antivirus and Antispyware:

Antivirus and Antispyware scan for both viruses and for security risks.

Personal Firewall:

The Symantec Endpoint Protection firewall provides a barrier between the computer and the Internet.

Intrusion Prevention:

The intrusion prevention system (IPS) is the Symantec Endpoint Protection client’s second layer of defense after the firewall.

Proactive Threat Scanning:

Proactive threat scanning uses heuristics to detect unknown threats. Heuristic process scanning analyzes the behavior of an application or process to determine if it exhibits characteristics of threats, such as Trojan horses, worms, or keyloggers. This type of protection is sometimes referred to as zero-day protection.

Device and Application Control:
Device-level control is implemented using rule sets that block or allow access from devices, such as USB, infrared,

READ MORE - What’s Symantec Endpoint Protection Covers

Overview of McAfee Total Protection Features

Anti-Virus and Anti-spyware Protection:
Detects, blocks, and removes viruses, spyware, adware and rootkits.

Network Manager:
Lets you easily fix security issues on your home network from one PC. Provides easy and automatic printer and file sharing across computers on your home network that you trust.

Web Site Safety Ratings:
Adds safety ratings to sites and search engine results based on comprehensive spam, adware, and online scam safety tests so you know exactly what website is safe to visit.

Warns you before accessing dangerous scam websites that try to steal your personal information.

Allows you to effectively remove any and all traces of confidential files from your computer.

Computer maintenance:
Provides automated tools to keeps your PC running at peak performance.

Identity Protection:
Let’s you shop, bank and trade online safely by asking permission before personally identifiable information like PIN’s, bank accounts, Social Security numbers are sent from your PC.

IMPROVED Anti-spam:
Helps keep your inbox free from unwanted, fraudulent and offensive emails.

Parental Controls:
Let your children go online safely at times that you define.

Data Backup:
Save copies of your most valuable files automatically wherever you want on a CD/DVD, USB, external, or network drive.

NEW Network Monitoring:
Alerts you when intruders try to connect to your wireless home network.

Email and IM Link Checker:
Search or click on links from friends, knowing your PC won’t be exposed to viruses or threats. Link Checker identifies and prevents you from clicking on harmful web site links in your browser, email, or instant messages.

NEW File Protection:
McAfee Anti-Theft encryption software lets you password protect your files on your PC

READ MORE - Overview of McAfee Total Protection Features

OSPF Router Types

Internal Router :All interfaces of the router are in single area. It does not mean that area has to be Area 0

Backbone Router: At least 1 interface in area 0.A router can be both an Internal and Backbone router if all its interfaces are in Area 0.

Area Border Router: has interfaces in multiple areas.at least one interface in Area 0 and another interface in a non-backbone area. ABRs are also one of two router types that can perform OSPF route summarization.

Autonomous System Border Router: Act as gateways between OSPF and other routing protocols. It is performing route redistribution by injecting routes from another source into the OSPF domain.

READ MORE - OSPF Router Types

How OSPF Determines the Cost(metric)

The cost (also called metric) of an interface in OSPF is an indication of the overhead required to send packets across a certain interface.Open Shortest Path First (OSPF) uses cost as the metric calculated, based on the bandwidth of the link. The cost of a link is calculated by dividing the reference bandwidth (100 Mbps by default) by the interface bandwidth. The total cost to a destination is the cost of the individual links in the path to the destination.

  • The OSPF cost value varies from 0 to 65535.
  • Cost can be set up for respective interfaces, as desired.
  • The smaller cost means smaller distance.
  • Some routers automatically add costs, depending on the line speed, but, it may not be able to support the speedup of the network. Therefore, it is safe to explicitly set up the important interfaces including backbone.

The cost can also be manually assigned under the interface configuration mode. The cost is a 16-bit number, so it can be any value from 1 to 65,535.

Router(config-router)#ip ospf cost 27

READ MORE - How OSPF Determines the Cost(metric)

Simple Network Management Protocol

Simple Network Management Protocol (SNMP) is used in network management systems to monitor network-attached devices for conditions that warrant administrative attention.

A managed device can be any piece of equipment that sits on your data network and is SNMP compliant. Routers, switches, hubs, workstations, and printers are all examples of managed devices.

An agent is typically software that resides on a managed device. The agent collects data from the managed device and translates that information into a format that can be passed over the network using SNMP.

A network-management system monitors and controls managed devices. The networkmanagement system issues requests, and devices return responses.

READ MORE - Simple Network Management Protocol

Use of Latest Norton Ghost Software (Video)

Full system backup (disk image)—Backs up everything on a hard drive or partition.
File and folder backup—Backs up only the specific files and folders you choose rather than saving an entire drive.
FTP backup—Copies recovery points to a FTP site for easier offsite backup management. NEW
Offsite backup—backs up your files to NAS (Network-Attached Storage) devices. NEW
Symantec ThreatCon integration— triggers incremental backups whenever ThreatCon reaches a specified threat level. Great for computers without virus protection. NEW
Incremental and differential backup—Backs up only files that have changed.
EXCLUSIVE! Google Desktop™ integration—Makes data recovery even faster with searchable backup indexes.
LightsOut Restore—Restores your system with an on-disk software recovery environment—no bootable CD required.
EXCLUSIVE!: Remote management—Controls other Norton Ghost installations (12.0 or higher) on your local area network.
Advanced compression and encryption—Minimizes storage space and helps keep sensitive documents safe

READ MORE - Use of Latest Norton Ghost Software (Video)

AMD raises layoff total, sees new ATI charge

U.S. chip maker Advanced Micro Devices Inc (AMD.N) said on Monday it laid off 600 workers, 100 more than first announced, and was taking yet another charge related to its $5.4 billion purchase of ATI Technolgies Inc.

AMD said it cut 600 employees in its most recent quarter, compared with the 500 it had originally planned. As a result, the company now expects to record $70 million in restructuring charges, versus the $50 million it previously predicted.

In addition, the new cost reductions would result in more charges in the first half of 2009, although AMD would not provide an estimate.

The chip maker also said it would take a goodwill impairment charge related to its 2006 acquisition of graphics chip maker ATI. AMD said its decision was "based on the results of an updated, long-term financial outlook" for the business, according to a filing with U.S. securities regulators.

The company said it could not estimate the size of the charge, which would be material and non-cash, according to the filing with the U.S. Securities and Exchange Commission. A company spokesman declined to provide any further detail.

It is the latest charge AMD has taken related to its purchase of ATI. In the June quarter, the impairment charge totaled more than $800 million.

In the December quarter, AMD said it would also take a $20 million impairment charge on its investment in flash memory chip maker Spansion Inc (SPSN.O).

Shares of Sunnyvale, California-based AMD closed down 8 cents at $2.10.

READ MORE - AMD raises layoff total, sees new ATI charge

Intel® Centrino® 2 with vPro™ technology

Keep your workforce more secure, managed, and mobile. With security and manageability built right onto the chip, Intel® Centrino® 2 with vPro™ technology provides hardware-assisted remote isolation, diagnostics, and repair, so you can manage your mobile workforce remotely, even if the system's OS is unresponsive.¹ And with exceptional dual-core performance, 5X better wireless performanceΩ and the longest possible battery life.²

Now you can also get notebooks with Intel Centrino 2 with vPro technology in astonishingly thin and light packages. As the smallest version of Intel® Centrino® processor technology yet-50 percent smaller-you're most mobile workforce can enjoy the sleekest full-featured and performance packed notebooks³ along with improved energy efficiency and power savings.°

Features and benefits

Best for business, providing state-of-the-art threat protection against security threats enabled by hardware defense filters and agent presence checking.Φ

Mobile performance. Providing the next level of mobile performance,Δ new Intel Centrino 2 with vPro technology is designed for today's needs, future 64-bit applications,² and next-generation multithreaded software.

Increased energy-efficiency. Built on the latest 45nm Intel® Core™ microarchitecture, Intel Centrino 2 with vPro technology provides industry-leading,² energy-efficient performance.

Longer battery life. Based on next-generation hafnium-based 45nm technology, Intel Centrino 2 with vPro technology offers unique energy-saving components designed to give you the longest possible battery life.

Faster, more predictable wireless. Experience up to 5x faster connectivity speeds with 802.11n wireless technology improving reliability while decreasing connection loss.Ω

Manage your mobile workforce wirelessly. Remotely diagnose, isolate, and repair infected notebooks using hardware-based remote manageability features that work even if notebooks are off or the OS is unresponsive.¹

Broad industry support from leading manageability and security software providers like Symantec, LANDesk, HP, Microsoft, and Cisco.

Reduce maintenance costs and stay compliant. Provide routine patching and maintenance ensuring that you're only paying software license fees for what you're using while keeping your licenses up-to-date.¹

Get the most out of graphics-intensive Windows Vista*. Powerful Intel® Graphics allow you to run Windows Vista with full Aero* support-without the expense of an additional graphics card.²

READ MORE - Intel® Centrino® 2 with vPro™ technology

AMD, ATIC Investing $4.2 Billion for New York Semiconductor Plant

Advanced Micro Devices (AMD) and United Arab Emirates-based Advanced Technology Investment Company (ATIC) have formed a joint venture company that will build a $4.2 billion semiconductor factory in Malta, New York. A statement from Globalfoundries, the new company created by the partnership, says the New York chip factory will be named Fab 2 and is expected to create approximately 1,400 new direct jobs and more than 5,000 indirect jobs in the upstate New York region. The plant will use 32-nanometer (32nm) manufacturing technology to build chip circuitry that is approximately one-millionth of an inch across. Company officials say that once the plant is operational, it will be the only independently managed advanced semiconductor factory in the United States. The Albany Times Union reports that AMD was offered more than $1.2 billion in cash and tax breaks from the state in 2006, when the factory was first proposed and that Doug Grose, Globalfoundries' new CEO, says the company has until July 31st to notify the state of its plans for the build, at which time it can become eligible for those incentives.
READ MORE - AMD, ATIC Investing $4.2 Billion for New York Semiconductor Plant

AMD Sempron™ Processor Overview

The AMD Sempron™ processor performs at the top of its class when running the home and business applications most. The AMD Sempron™ processor’s full-featured capabilities can include AMD64 Technology, HyperTransport™ technology, up to 256KB total high-performance cache, One 16-bit/16-bit link @ up to 1600MHz full duplex system bus technology, and an integrated DDR2 memory controller.

The AMD Sempron™ processor provides the productivity enhancing performance you need for your everyday applications. It runs over 60,000 of the world’s most popular applications, so you can enjoy solid performance. With 35 years of design and manufacturing experience and shipments of more than 240 million PC processors, you can count on AMD to provide reliable solutions for your home or business.

Affordable - Performance
  • The AMD Sempron processor performs at the top of its class on the home and business applications that you need and use most.
  • The AMD Sempron processor is designed for day-to-day computing and beyond.
Full-Featured to Improve your Computing Experience
  • The AMD Sempron processor lets you enjoy a dynamic Internet experience with smooth streaming video and audio.
  • The AMD Sempron processor saves you time and effort; enabling your system to boot and load your applications quickly.
  • Applications that allow you to communicate with family, friends and colleagues will run smoothly with the AMD Sempron processor.
The AMD Sempron™ processor’s advanced architectural features help ensure affordable performance and full-featured capability. These features include:
  • AMD64 Technology
  • HyperTransport technology
  • Up to 256KB total high-performance, full-speed cache
  • One 16-bit/16-bit link @ up to 1600MHz full duplex system bus technology,
  • Integrated DDR2 memory controller on certain models
  • Built-in security with Enhanced Virus Protection* that works with Microsoft® Windows® XP SP2 to help protect against viruses, worms, and other malicious attacks. When combined with protective software, Enhanced Virus Protection is part of an overall security solution that helps keep your information safer.

Enjoy full compatibility with the tools you use daily.
The AMD Sempron processor is designed to run more than 60,000 of the most popular software applications, so you can enjoy reliable performance for a wide variety of computing needs. And since the AMD Sempron processor is compatible with leading PC peripherals, it helps keep everything running smoothly.

Get more value from your PC.
The AMD Sempron processor is ideal for families, students and other budget-conscious or entry-level computer buyers. It includes the right set of features you need for day-to-day computing, and gives you more power for your money than other similar processors. This means you get a PC configured with better components such as CD drives, graphics capabilities, and more.

Reliability from an Industry Leader

  • AMD is an industry leader that is dedicated to enabling you to get the job done at work or at play.
  • AMD is constantly striving to find the right solutions for you and your home or business needs.
  • AMD’s superior quality and track record have long been recognized by a number of the industry’s top publications, organizations and high-tech experts. AMD products, technology, manufacturing, facilities, executives and corporate and community programs have earned a multitude of awards and recognition over the years.
READ MORE - AMD Sempron™ Processor Overview

AMD Phenom™ II Processors Product Brief

Live your life in HD. AMD Phenom™ II is for high definition entertainment, gaming, creativity, and beyond. With AMD Phenom™ II processors as the foundation, you'll enjoy a new level of responsiveness and visual intensity. AMD puts high definition computing within everyone’s reach.

Superior technologies for HD video. Enjoy a superior high definition experience for HD videos on you PC. AMD Phenom™ II processor are the powerful engine behind your fidelity, high definition video entertainment experience. Only AMD puts the Ultimate Visual Experience™ for HD video within your reach.

Enjoy entertainment beyond your media library. Get HD content online, offline, wherever you want it, however you want it. Your system can handle whatever you dish out - and serve it up on screen in full, high definition glory.*

Perfect chemistry. Combine AMD Phenom™ II processors and ATI Radeon™ HD graphics to really see the difference. Enjoy smooth video, brilliant videos and immersive games. AMD unleashes visual clarity and responsiveness for what you want to do.

Do it all. AMD Phenom™ II processors have the power to do it all. Featuring next-generation quad-core design, they crush even the most demanding tasks. So design it, render it, play it, create it, stream it, HD it.* With AMD Phenom™ II processors, if you can imagine it, you can do it.

Make a choice you can feel good about. AMD Phenom™ II processors were designed with energy efficiency in mind. Capitalizing on AMD's leadership in energy efficiency, they incorporate all of the latest technology that gives you performance when you need it and save power when you don’t.

READ MORE - AMD Phenom™ II Processors Product Brief

free counters 
HTML Hit Counter