Chapter 5 Personal Computer Data Communications and Networking
Transcription
Chapter 5 Personal Computer Data Communications and Networking
CChhaapptteerr 55 PPeerrssoonnaall CCoom mppuutteerr D Daattaa CCoom mm muunniiccaattiioonnss aanndd N Neettw woorrkkiinngg This chapter provides a practical introduction to data communications and networking for personal computers. It includes a brief introduction to data communications, a section on connecting USB devices such as cameras and printers to personal computers, and sections on setting up and securing a wireless home network. A student who successfully completes this chapter should be able to: define the data communications terms used in the chapter. describe the nature and importance of data communications standards. And briefly describe three common standards for serial data communications – RS-232c, USB and Firewire. connect USB devices with and without drivers to a personal computer and move data between the devices and the computer. find manuals and driver software for most common peripheral devices. set up a wireless home network. secure a wireless home network. Figure 5-1: components of a common home computer network including: a broadband modem with an outside Internet connection, a wireless router, a desk top computer, two laptops, a wireless printer, and a Nintendo Wii. Section 5.1 – Serial Data Communications In this section we will explore personal computer communications by looking at the nature of digital data, the differences between parallel and serial communication, and three common standards for serial data communications – RS-232c, USB and Firewire. 5.1a – Digital Data Digital data is stored as a series of bits. A bit is a binary digit, a one or a zero, represented in a computer using electrical, magnetic and optical technology. Everything from word processing documents to sound, pictures, and video is represented as a series of bits. CD and DVD technology store data as bits of information. Today, even broadcast and cable television are transmitted as binary digital data. A group of bits is called a word. The number of bits that a particular computer works with at one time is called the computer’s word length. Most modern computers have a 32-bit word length, which means that the computer’s central processing unit works with 32-bit groups of words. Some new computers have a 64-bit word length. Figure 5-2: binary digital data, such as that found on a CD or DVD. Binary (base two) numbers have two digits – 0 and 1 – compared to our decimal (base ten) system with ten digits – 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. CIS 103 – Applied Computer Technology Data Communications page 2 A byte is an 8-bit word. The term was coined to refer to the word length for early computers, which were mostly 8-bit machines. Today the size of a computer’s memory is still measured in bytes, even though 8-bit computers are no longer commonly used. We talk about 4 gigabytes of memory, not 4 gigawords of memory. This system, known as byte-addressable memory, keeps the size of a computer’s memory and the memory addresses used by software independent from the computer’s word length. It also makes it easier to compare the size of computer memories for systems that have different word lengths. 5.1b – Parallel and Serial Data Communication Data communication is the movement of bits of information from one place to another, both inside a computer and between computers and other digital devices, such as printers, cameras, or other computers on a network. Bits in a word of data can be moved at the same time over several parallel wires, or one at a time over a single wire. Parallel data communication is the movement of the bits of data in a word at the same time over several parallel wires. Serial data communication is the movement of bits of data one at a time over a single wire. Actually, serial communication often uses two wires – one in each direction, but the bits of each word are still moved one at a time as a series of signals over a single wire. Figure 5-3: serial and parallel data communication. These diagrams show the movement of an 8-bit word, a byte. Parallel communication is faster than serial communication, but the equipment is more expensive. A serial cable only needs one data wire, but often has one data wires for each direction. An older 8-bit parallel cable only needs eight wires for data. Newer parallel cables need 32 or 64 data wires, making them much more expensive than serial cables. Most data communications cables also have a few extra wires for timing and control signals. Today serial communication is normally used between computers, or between a computer and a device such as a printer, to save money. Most computer networks use serial data communication. Parallel data communication is primarily found inside a computer, using data busses. A bus is a set of wires that are grouped together. A data bus is a set of wires used for data communication, connecting the various parts of the computer, such as the Random Access Memory (RAM) and the Central Processing Unit (CPU). The size of a data bus usually matches a computer’s word length. So, a CPU that has a 32-bit processor usually has a 32-bit data bus, and moves data from place to place 32 bits at time over the bus. The size of the data bus can affect how fast a computer system processes data – 64-bit computers are faster than 32-bit computers, for example. Figure 5-4: an 8-bit word and an 8-bit data .bus. Serial data communication is often used to connect peripheral devices to a computer. A peripheral device, or simply a peripheral, is a device that is not part of a computer, but that attaches to a computer. An external hard drive is an example of a peripheral device. A camera is an example of a standalone device that can also be connected to a computer as a peripheral. Each peripheral device uses certain data communications standards to connect to a computer. CIS 103 – Applied Computer Technology Data Communications page 3 Standalone devices, such as cell phones and iPods, that can work independently, but which are often connected to a computer to download data, share content, and so on, are often called mobile computing devices. 5.1c – Serial Data Communication Protocols and Standards A communications protocol is a set of rules defining a data communications method, including the electronic signals to be used, how fast the data should be sent, and so on. All data communication needs to follow a communications protocol to ensure that the receiver of a message can understand the sender. Data communication standards include the communications protocol, along with equipment specifications, such as the type of connectors and cables to be used. It is important for computer companies to follow data communications standards so that equipment from different manufacturers can work with each other. There are several organizations that define different data communications standards. Generally, they fall into four categories: Government agencies are part of the government and have the force of law. The Federal Communications Commission (FCC) is a federal government agency in the U.S. responsible for regulating electronic communications. Government affiliated agencies work with governments, but are not directly controlled by a single government. The International Telecommunications Union (ITU) is a UN sponsored organization that works with governments to standardize international data communications. Professional groups are organizations whose members are qualified professionals in a certain field. The Institute of Electrical and Electronics Engineers (IEEE) is a professional association whose members specialize in electronic engineering, computer science, and related fields. Trade associations are made up of companies who share a common interest. The Electronics Industries Alliance (EIA), formerly known as the Electronics Industries Association, is an organization of computer and electronic equipment manufacturers. We will look briefly at three serial data communications standards commonly used with personal computers – RS-232c, USB, and Firewire. 5.1d – RS-232c The RS-232c standard was created by the EIA in 1969 for terminals connected to old mainframe computers. It became the standard for connecting devices like printers and telephone modems to the first personal computers in the 1970’s and 80’s, but today it is not used much. You are most likely to see it if you are connecting an older printer to a computer. The RS232c standard was important because it was one of the first communications standards that many different manufacturers adopted, making is easier to connect one brand of equipment to another. Such compatibility is commonplace today, largely because of communications standards. There are two different types of RS-232c connectors – 25-pin and 9pin. Only two of the pins are used for data, one for each direction, while the others are used for control and timing signals. Figure 5-5 shows an RS232c cable with 9 pin connectors, and the wires bundled inside a plastic sheath. Older RS232c cables looked like a ribbon, with the wires side-by-side. Figure 5-5: a nine pin RS232C cable, like the type used to connect older printers to computers. Some video cables use the same nine pin connectors. CIS 103 – Applied Computer Technology Data Communications page 4 5.1e – USB the Universal Serial Bus Implementers Forum (USB-IF) is an organization formed in the 1990’s by a group of computer companies, including Intel, Compaq, Microsoft, Digital, IBM, and Northern Telecom, to develop a faster and less expensive data communication standard for connecting peripheral and mobile computing devices to personal computers. The USB (Universal Serial Bus) standard is now the most widely used data communication standard for connecting devices to personal computers. Commonly used flash ROM drives, sometimes called memory sticks or thumb drives, are USB devices, as are most newer printers, digital cameras, and cell phones. Currently there are three different versions of the USB standard. In 1994 the original USB 1.0 appeared, but it was quickly modified as USB 1.1, with a maximum data transfer rate of 12 million bits per second (12 Mbps) and a maximum cable length of 3 meters. Figure 5-6: a computer with a USB port and a cable with a USB connector. USB 2.0, called Hi-Speed USB, appeared in 2001. It has a maximum data transfer rate of 480 Mbps and a maximum cable length of 5 meters. USB 2.0 devices are backward compatible with USB 1.1 devices, which means that they use the same connectors and USB 1.1 and USB 2.0 devices will work with each other, but using the older protocol. In November of 2008 the USB-IF introduced USB 3.0, known as SuperSpeed USB. It has a maximum data transfer rate of 5Gbps (Gigabits per second), and is backward compatible with Hi-Speed USB and USB 1.1. 5.1f – Firewire Firewire is a serial communication standard first developed by Apple Computers and approved as IEEE standard 1394 in 1995. Sony’s version of Firewire is called iLInk and Texas Instruments calls their version Lynx. The High Definition Audio-Video Network Alliance (HANA) has chosen Firewire as the standard for the audio visual industry, so most professional video equipment, such as high end video cameras, have Firewire connections. The automobile industry and the military also use Firewire. The new F22 Raptor and F-35 Lightning II aircraft are equipped with Firewire data communication connections, as is the NASA Space Shuttle. Figure 5-7: 6-pin and 4-pin Firewire connectors are common. There are several versions of Firewire, just as there are several versions of USB. IEEE 1394a, also called Firewire 400, has a maximum data transfer rate of 400 Mbps. IEEE 1394b (Firewire 800) is capable of 800 Mbps over standard cables and up to 3,200 Mbps using fiber optic cables. Firewire 800 can be used with cables up to 100 meters long. As with most communications standards, new versions of Firewire are being developed. Firewire is more sophisticated than USB – it is more reliable at higher speeds and the cables can be much longer – but the equipment is more expensive and it can be a little harder to use, so USB is far more common for connecting devices to personal computers. In the next part of this lesson we will focus on connecting USB devices to personal computers. Firewire and RS232c connections work in a similar manner, except that driver software is more often needed, and the connectors are different. CIS 103 – Applied Computer Technology Data Communications page 5 5.1 Section Review a. b. c. d. e. f. How is digital data stored inside a computer? why are the terms byte and word length both important in modern computing? What is the difference between parallel and serial data communications? Where are each used and why? What are data communication protocols and standards, and why are they important? Who makes up such standards? What is the RS232c standard and why was it important? What is the USB standard and why is it important? What are the three different versions of USB? Who is responsible for the USB standard? What is the Firewire standard and where is it used? How does it compare with USB? Who is responsible for the Firewire standard? —— §—— Section 5.2 – Connecting USB Devices to Personal Computers In this section we will see how to use USB technology to connect peripheral devices to computers. We will look at specific examples – connecting a camera to a computer without using driver software, and connecting a printer that does need driver software. 5.2a Using USB Technology To connect peripheral USB devices to personal computers you need to establish a physical connection between the computer and the device, and make sure that any necessary driver software is in place. A driver is a computer program that manages a device or a connection between devices. USB connections are simple and do not need drivers, but sometimes the device connected to the computer needs a driver so that it will work properly. There are six different standard USB connectors, as shown in Figure 5-8. You need a cable with the correct connector to connect a USB device to a computer. A type A connector plugs into a USB host connection slot on a personal computer. Devices such as flash memory chips and the end of a USB extension cable have Type A USB connectors. The other five types of USB connectors – Type B, Mini-A, Mini-B, Micro-AB, and Micro-B – plug into the peripheral device. You must make sure that the USB cable you are using has the correct type of connector for the device you are trying to connect. Figure 5-8: six standard USB connectors. 5.2b Moving data from a camera over a USB Connection Data, including pictures, can be moved from one device to another by connecting the two devices to each other using a USB cable, or by taking a memory chip out of one device and plugging it into another. We are going to look at connecting a PC to a Kodak EasyShare C813 digital camera, shown in Figure 5-9. We will do so without using the software that comes with the camera, which is mostly for editing pictures and managing albums of picture files. CIS 103 – Applied Computer Technology Data Communications page 6 Figure 5-9: a Kodak EasyShare C813 digital camera with its packaging, which includes the box, manuals, a CD with software, batteries, a camera carrying strap, and a USB cable. To move data from a camera to a computer Step 1 - Make sure you have the correct cable. The end of the cable that plugs into the computer is a type A USB host connector, like the one on a USB thumb drive. The USB port on the camera, shown in Figure 5-10, is a USB micro A port, so we need a USB cable with a micro A connector. Step 2 – Make sure the camera is turned off and that the computer is turned on and ready to use. Step 3 – Connect the cable. Plug the USB cable into the camera and then plug the other end of the cable into a USB port on the computer. Step 4 – Turn on the camera and make sure it’s set so that you can view pictures on the camera’s display screen. You need to be familiar with the camera or read the instruction manual to see how to do this. Step 5 – Open the picture folder. A connection dialog box should appear on the computer screen, just like it does when you plug in a flash ROM drive. You should select the [open folder] option. and then navigate to find the folder in the camera’s memory that has your pictures. Figure 5-10: a USB micro B port on the Kodak EasyShare C813. We need a USB cable with a micro B connector on one end. CIS 103 – Applied Computer Technology Data Communications page 7 Step 6 – Copy the data to the desired location. Once you have found your pictures on the camera, then open the My Pictures folder on the computer and copy the picture files to the PC. You can copy a single picture file or the entire folder of pictures – just as you can when copying data from a Flash ROM Drive. You could also make a folder under My Pictures, or anywhere else on your computer to hold these particular pictures. That’s it. You can now turn off and unplug the camera and work with your pictures on the computer. If you double-click a picture file, it will open using the computer’s default picture software. This will be the Microsoft Photo Viewer, unless you’ve installed other picture software on your computer and made it the default for viewing pictures. You can even print pictures from Microsoft Photo Viewer, but first a printer needs to be properly connected to the computer. Alternate Method –An alternate way to move pictures from a camera to a computer is to take the memory chip out of the camera and plug it into the computer. There are several formats for memory chips like this, including SD, SDHD, and XD, but they work the same way. Of course, this method will only work if your computer has a slot for the type of chip your camera uses. Adapters that plug into USB slots are available for most types of memory chips. Figure 5-11: the Kodak EasyShare C813with an SD memory card, like the type the camera uses. The Kodak EasyShare C813uses an SD memory chip, as shown in Figure 5-11. So, for this camera’s chip, you need a computer with an SD memory slot or a chip reader with an SD memory slot that plugs into a USB port. Microsoft has a similar lesson online at: http://www.microsoft.com/windowsxp/using/digitalphotography/takeit/transfer.mspx 5.2c Connecting a USB Printer Connecting a printer is just like connecting a camera, but you will probably need printer driver software to make the printer work properly. The printer shown on the right is an HP C4480 Photosmart printer, which is similar to many popular all-in-one color printers that can also be used as a copier, scanner, and fax machine. The best way to connect and set up a device that needs driver software, like a printer, is to follow the instructions in the manual that comes with the device. So, there are three basic steps to using such a device: Figure 5-12: an HP C4480 Photosmart printer. Find the instructions. Read the instructions. Follow the instructions. But what should you do if you are not sure whether or not a particular device needs a driver? The same three steps apply – the manual will tell you if your device needs a driver. Also, if you try to establish a connection with a device that requires a driver, but no driver is present, the operating system will tell you that the necessary driver is missing. CIS 103 – Applied Computer Technology Data Communications page 8 But what if you can’t find the manual, or the software that came with the device? Figure 5-13 shows part of the Web page for downloading the instruction manual and software for the HP C4480 Photosmart printer from the HP website. Manuals and software and for almost all computer peripheral devices can be downloaded free of charge directly from the manufacturer. Figure 5-13: part of the Web page found by searching for “C4480 manual” on the Website www.hp.com. Notice that you can download a setup guide, a basics guide, or a full user guide. You will need Adobe Acrobat reader to read or print the manuals, which are in the Adobe PDF format. Most printer manufacturers have similar manuals that you can find, download, and read or print using Adobe Acrobat reader, which can also be downloaded free of charge. It is best to search for the manuals and software directly on the manufacturer’s Website rather than on a general purpose search engine, such as Google, which could lead you to commercial sites that ask for personal information or try to sell you related products. You might need to use an Internet search engine to find the manufacturer’s Web site, but once you locate the manufacturer’s Web site, you should search there for what you need. As you can see in Figure 5-13, you can download a setup guide, a basics guide, or the entire manual. The setup guide will show you how to connect the printer to a computer. Most manufacturer’s Web sites and manuals are very similar. You can also do a similar search for the software that comes with the printer. In this case, notice that the menu on the left on the Web page in Figure 5-13 includes a link for software and driver downloads, which is underlined in the picture. Figure 5-14 shows part of the Webpage from which you can download the software. CIS 103 – Applied Computer Technology Data Communications page 9 Figure 5-14: part of the Web page for downloading the software for the HP C4480 Photosmart printer. You can download the basic driver software, download the full software that comes with the printer, or order a CD with the software. Most manufacturers let you download the software freely, but charge for sending you a CD. From this page you can: download the basic driver software, which is 38.68 Mb long. download the full feature software that comes with the printer (146,57 Mb). order a CD with the software to be mailed to you from the company. The full software includes applications programs for things like scanning documents or images, and managing a library of scanned images. Only the driver software, and not the full feature software, is needed to use the printer. Again, most manufacturers have similar Websites. They want you to be able to use their products, which are useless without the manual and the software drivers. They almost all also have simple quick start guides or getting started booklets so you can set up their products without reading through the entire manual. But how do you replace a missing cable? Simply buy a compatible USB cable from almost any consumer electronics store, such as Best Buy or Radio Shack. If you are not sure which cable will work, then you can use the model number to find a correct cable. You can also order the proper cable directly from the manufacturer, or from online retailers like amazon.com or tigerdirect.com. The USB HP Photosmart printer has a type B connector (shown back in Figure 5-8). Most USB printers have a similar type B connector. 5.2 Section Review A. What is a driver. Do USB peripheral devices need drivers? B. Briefly describe how to connect a camera that doesn't need a driver to a computer and move pictures from the camera to the computer. What alternative method can sometimes be used, and why doesn’t it always work? C. What three steps should someone always follow when connecting a device that needs driver software, such as a printer, to a computer? How can you tell if a device needs a driver? Where can you find replacement manuals and driver software? —— § —— CIS 103 – Applied Computer Technology Data Communications page 10 Section 5.3 – A Wireless Home Network with Internet Service In this section we will look at wireless home network standards and hardware, how to set up the network, and how to secure it from outside intrusion. 5. 3a Wireless Home Networks Wireless home networks are becoming increasingly popular because they allows users to connect computers to the Internet, to peripheral devices such as printers, and to other computers from almost any place in the home without installing wires or cables. This is especially useful as laptop computers become more common, allowing users to make the most of the laptop’s portability. Wireless home networks are also popular because they are less expensive than wired networks, and easier to setup. Most home computer networks are connected to and centered on the home’s broadband connection to the Internet, which is often a telephone company DSL connection, a telephone company fiber optic connection, or a coaxial cable television connection. Broadband networks are high speed networks that have special hardware allowing data to move across the network more quickly. Broadband Internet connections, offered by companies like Verizon and Comcast, are usually DSL, cable, or fiber optic connections accounting for most Internet access in the US today, so we will focus on these. Broadband and Dial-up Internet Access in American Homes, 2000-2010 80% 70% 60% 50% 40% 30% 20% 10% 0% 2000 2001 2002 2003 2004 2005 Broadband 2006 2007 2008 2009 2010 Dial-up Figure 5-15: The growth of home broadband Internet access in the United States. Broadband includes DSL, cable and fiber optic connections. data source: Pew Internet & American Life Project surveys http://pewinternet.org/Reports/2010/Home-Broadband-2010.aspx Dial-up telephone modem Internet access is becoming increasingly rare, so we will not cover that category. In the Spring of 2010, for example, less than five percent of all Internet users in the U.S. had dial-up Internet access, as shown in Figure 5-15. CIS 103 – Applied Computer Technology Data Communications page 11 5.3c Wireless Networking Standards The most important standards for wireless home networks are the IEEE’s 802.11 standards for wireless telecommunication. (The standards are in section 802.11 of the IEEE’s telecommunications code.) Three different standards are commonly used today for wireless home networks – IEEE 802.11b, 802.11g, and 802.11n. All three will work, but the g and n standards work better over longer distances. Standard Max. Data Rate Indoor Range Outdoor Range 802.11 b 802.11 g 802.11 n 11 Mbps 54 Mbps 150 Mbps 125 ft 125 ft 230 ft 460 ft 460 ft 820 ft Figure 5-16: Maximum data transfer rates and effective ranges for wireless networking standards. data source: http://standards.ieee.org/getieee802/download/802.11-2007.pdf 5.3b Wireless Home Network Hardware Almost all home computer networks and most networks in schools and the workplace use Ethernet technology. Ethernet, defined by IEEE standard 802.3, is a networking standard defining cables .connections and protocols for low cost local area networks. The hardware needed for a wireless home network includes a broadband modem, a wireless router, and wireless network adapters for each computer or device connected to the network. Even though it’s a wireless network, there are a few components wired together, most commonly using Ethernet technology. So, you will also need at least two Ethernet cables, even though it’s called a wireless home network. An Internet Service Provider will bring Internet service into your home through a broadband connection, usually a DSL, coaxial cable, or fiber optic connection. The cable coming into the home is connected to an Ethernet broadband modem, which is a device that changes the high speed signals used on a broadband network to Ethernet signals compatible with data communication hardware for home computers. It is usually located in some out of the way place, such as a basement or closet. The broadband modem is also called a DSL modem, coaxial cable modem, or fiber optic modem, depending on the technology used on your Internet service provider’s network. Modems change both the speed of the signal and the transmission media – for example, from a Verizon coaxial cable to copper wiring in the home. A router is an electronic device that routes data moving across a network and between two networks. The router in a home network is the electronic gateway between the Internet service provider’s network and your home network. It routes data between the two networks, making sure that each packet of data is on its way to the correct destination with the right addressing information for the receiving network. A wireless router moves data between a wired network and a wireless broadcast network. Figure 5-17 shows two views of a Linksys E1000 wireless router from Cisco. Most wireless routers for the home have one port for a connection to the ISP’s broadband modem and several connections for home devices that are wired directly into the router. They can also transmit and receive signals to communicate with wireless devices in the home. In this case, the E1000 has a port with a yellow label for the connection to the broadband modem, and four numbered ports with blue labels for connections to devices in the home. Figure 5-17: a Linksys E1000 wireless router. CIS 103 – Applied Computer Technology Data Communications Figure 5-18: RJ 45 connectors and an RJ-45 port on a laptop computer. page 12 The ports on wireless routers use the standard connections for Ethernet networking, called 8P8C (8 position 8 contact) connectors or RJ-45 connectors. They are similar to the standard RJ-11 telephone jacks found in most homes, but slightly larger. Technically, RJ-45 is a particular wiring standard defining how connectors with 8 positions and 8 contacts should be wired for a telephone system. The same connectors are used in Ethernet technology, but wired differently than the RJ-45 telephone wiring standard. Yet, they are commonly called RJ-45 connectors rather than 8P8C connectors because they are exactly the same connectors used in RJ-45 telephone jacks. Figure 5-18 shows two standard RJ-45 connectors and an RJ-45 Ethernet port on a common laptop computer. The cables used for wired home networks and for the wired connections in a wireless network are standard Ethernet Category 5 or Category 6 cables, called cat-5 or cat-6 cables. They have 8 wires with RJ-45 connectors on each end of the cable. Category 5 and Category 6 cables will both work with common Ethernet technology, but Category 6 wiring is less subject to interference than Category 5 wiring, so it is more reliable and can handle a higher bandwidth. Cat-6 is used for 1 gigabit per second Ethernet networks, found in many businesses and schools. Most home networks aren’t quite that fast. The Linksys E1000 wireless router shown above in Figure 5-17, for example, operates at speeds up to 300 Mbps, or 0.3 gigabits per second. Figure 5-19: A cable for an Ethernet network with RJ-45 connectors on each end. For a home network, the broadband modem provided by the Internet service provider will need to be connected to the wireless router using a cat-5 or cat-6 cable. It’s also necessary to connect a personal computer directly to the wireless router using a cat-5 or cat-6 cable to initialize and program the router when setting up the network.. Of course, to plug your computer directly into an Ethernet port on the router, your computer will need to have an Ethernet port as well. Almost all modern computers have at least one RJ-45 Ethernet port. For wireless connections to the router, each device will need to have a built-in wireless network adapter. A wireless network adapter is a device with the electronic components needed to transmit and receive data over a wireless network. In essence, it is a specialized digital radio. New laptop computers usually have built-in wireless adapters. Figure 5-20: An 802.11 g USB wireless adapter from Netgear. Computers that do not have built-in wireless adapters will require a wireless adapter that can be plugged into the computer. Today the easiest and most common way to do this is by using an adapter that connects to the computer’s USB port, and which looks very similar to a USB thumb drive, like the one shown in Figure 5-20. CIS 103 – Applied Computer Technology Data Communications page 13 Inexpensive printers are now available with built in wireless adapters. For example, the Lexmark Impact S305 and Epson Stylus® NX420 are all-in-one wireless printers that can each be purchased for less than $100. Other devices, such as cell phones, alarm systems, and video game consoles, can also be connected to a wireless network. Nintendo’s Wii game system, for example, comes with a built-in wireless adapter, and can easily be connected to the Internet through your home’s wireless router. Figure 5-21: Hardware in a typical wireless home network. Figure 5-21 shows how all of this hardware for a wireless home network fits together. Your Internet service provider’s network is connected to your home by a broadband modem. The modem is connected to an Ethernet compatible wireless router using a cat-5 or cat-6 cable with RJ-45 connectors. Each computer on the wireless part of the network connects to the router by using a wireless adapter. Other devices, such as a printer and a Nintendo Wii game console, can also be connected if they have built-in wireless adapters. 5.3d Setting up a Wireless Home Network with Internet Service Setting up a wireless home network is easier than you might think it is. Basically, you need to make sure that you have the right equipment, that it is connected properly, and that it is properly initialized. The two trickiest things to set up are the broadband modem, which connects your home to the Internet, and the wireless router. Your Internet Service Provider should install and set up a broadband modem for you. That step is taken care of for you. CIS 103 – Applied Computer Technology Data Communications page 14 So, to set up a wireless home network you will first need to locate your broadband modem or have one installed by an Internet Service provider, then connect and initialize a wireless router. After that, the wireless devices in the network should be able to connect to the router. You should also secure the network, which is discussed in the next section of this chapter. Setting up a wireless router requires you to connect the router to the broadband modem using an Ethernet cable. You will also need to connect a computer directly to the router using a cable so that you can use the computer to initialize the router. After the router is initialized, you can then disconnect the computer if you wish to do so, and use it wirelessly. Typically, routers have a control panel that is accessed through an Internet browser, such as Internet Explorer or Firefox. After you connect the router, you must enter the router’s URL in the browser, then the control panel will appear in the browser. You will need to use the control panel to do things like name the network and set up network security. Except for network security, which is covered in the next section of this chapter, it shouldn’t be too complicated. Yet, each router is slightly different and you may encounter things you have never seen before, so, it is best to follow the same three step process used to set up a printer with a driver – 1. Find the directions. 2. Read the directions 3. Follow the directions. Even experienced computer professionals who know what they are doing will most likely still need the directions to find the router’s URL. Almost all router manufacturers have a free help line you can call if you run into trouble setting up your router, and the manuals for routers are available on the manufacturers’ Web sites, just like printer drivers are. Computers with wireless adapters should be able to detect the wireless router and connect to it once it is set up, but the first time each device connects to the router, you may need to make the connection manually, using the operating system’s connect to a network feature. The following steps show you how to do this in Windows 7. The process is very similar in Windows XP and Windows 8.0. To connect a PC to a wireless router: 1. Open the windows Control Panel. This can be done from the Windows start menu, as shown in Figure 5-22. There may a Connect To shortcut on your system and there are other ways to do this, but this way should be available on every computer with Windows. Figure 5-22: The Windows 7 Start Menu, showing the link the Control Panel. CIS 103 – Applied Computer Technology Data Communications page 15 2. When the Control Panel opens, select Connect to the Internet under the Network and Internet heading, as shown in Figure 5-23. In the figure, the Network and Internet links are also shown in a red box Figure 5-23: The Connect to the Internet link 7 on the Windows Control Panel. . 3. A Connect to the Internet window will appear, as shown on the left in Figure 5-24. Select Wireless and a menu of the wireless routers your computer can detect will appear. This is shown on the right in Figure 5-24. The router name and the network name are the same. Select your network. In the figure, the Office network has been already selected. 4. A Connect automatically check box will appear asking if you wish to make this connection automatic in the future. If you make the connection automatic, then the computer will connect to this network whenever it is in range of the wireless router without you having to go through these steps. For now, you need to click the Connect button to connect to the network. Figure 5-24: The Connect to the Internet link 7 on the Windows Control Panel. CIS 103 – Applied Computer Technology Data Communications page 16 5. If you have already set up security on your wireless network, then a security window will appear, as shown in Figure 5-25, asking yout to enter the network security key. Once you enter the proper security key and click OK, you will be connected to the network. If the network has no security key, then you will be connected without seeing this Window. That’s it. It may take a minute or two for your router to connect your computer to the Internet, but once that’s done you are now ready to use your home network. Setting up network security, including a network security key is addressed in the next section. Figure 5-25: the window asking you to enter the network security key when connecting to a wireless network. 5.3 Section Review A. What are wireless home networks and why are they popular? B. Briefly describe the hardware needed for a wireless home network. C. What is the 802.11 standard? What versions of the standard should be used for a wireless home network? D. Briefly describe how to set up a wireless home network. What can you do about computers that don't have a built-in wireless adapter? —— § —— CIS 103 – Applied Computer Technology Data Communications page 17 Section 5.4 – Securing a Wireless Home Network In this section we will look at the need to secure a wireless home network, the top five things you can do to secure a wireless home network, and how to do so by reconfiguring a wireless router. 5.4a The Need to Secure a Wireless Home Network As wireless home computer networks become increasingly popular, the need to secure them becomes increasingly important. If you have an unsecured wireless network in your home, then your neighbors, people walking down the street, or people driving by in cars may be able to connect to your network … unless your network is properly secured. Here are a few of the things that a person who is able to connect to your wireless network might do: Slow down your Internet connection. Steal data and files from your computer, including passwords, bank account information, credit card details, photographs, and other personal private data. Steal your identity. Change the software on your computer. Install viruses on your computer. Send email, spam or viruses to other computers from your computer. Use your computer as part of a denial of service attack on other computers. These are just some of the risks of using an unsecure home network. In this lesson we will look at some fairly easy things you can do to secure your wireless network, and then look at the process of configuring your router to implement these security measures. CIS 103 – Applied Computer Technology Data Communications page 18 5.4b Improving Wireless Home Security Let’s list and describe several things that you can do in just a few minutes to make your wireless home network more secure. Each of these involves configuring your wireless router, which is covered in the next section. So here, in reverse order of importance, are the top five things you can do to configure your wireless network for better security. Of course we won’t list things like ―don’t tell people your password‖ … 5. Use data encryption – This is what banks, credit card companies, and agencies like the FBI and CIA do to protect data that is moving over a computer network. You can do the same thing on a home wireless network by setting up an encryption method and an encryption key for your wireless router, and for any devices on your network, including PCs and peripheral devices like printers. This is only number five in our list because encryption schemes can be broken, so while it’s fifth in the list for keeping out professional hackers, it’s the simplest and easiest way to protect data from casual users. 4. Don’t broadcast your network SSID – an SSID (Service Set IDentifier) is the name of a network, or more precisely, the name of the router controlling a network. When someone who has a computer with a wireless adapter asks the computer to connect to a wireless network, it will show a list of available networks. This list comes from the wireless routers broadcasting their network SSIDs and asking if anyone wants to connect to them. It’s like putting up an electronic billboard that says ―Hey! This house has a network. Do you want to try to connect to it?‖ You can stop this from happening by connecting to your router and telling it not to broadcast the SSID. Then, anyone who wants to connect to your network needs to know in advance that it’s there, and what its name is. Of course, once you stop broadcasting your SSID, then you will need to tell each device that you want to connect to the network what the network’s SSID is. You only need to do this once on each device that is part of your network, so, you won’t have to type in the network name every time you want to use the network, just the first time each particular device connects to the network. Figure 5-27: The names that appear when someone attempts to connect to a wireless network are each network’s SSID. 3. Use your network adapters’ MAC addresses – A MAC address (Media Access Control address) is like a serial number that is built into the hardware of each network adapter. The number is usually printed somewhere on the adapter, or on the device if the adapter is built-in. You can give the router a list of MAC addresses, and enable MAC addressing, which would only let the router connect with adapters you’ve listed. This isn’t foolproof because MAC addresses themselves can be stolen and faked, but it goes a long way toward stopping things like what’s shown in the Doonesbury comic strip above. 2. Disable remote router administration – Most routers have a feature that will allow someone to take control of the router from another network by accessing it through your broadband connection. Your Internet service provider or the router’s manufacturer may need to do this sometimes to diagnose and fix a problem with your network. You should turn off this feature of your modem so that other people can’t log in and do the same whenever they want to do so. You can turn it back on later if you actually do need remote help. … and the number one thing you can do to protect your home network is: 1. Change the password on your wireless router – This is a big deal. If you leave your router’s password to be the factory setting, then anyone familiar with that brand of router can actually log into the router and change your network settings so that they, and not you, control the network in your home. They can actually take over your computers while locking you out of the network. Again, this is a big deal. Changing your router’s password is one CIS 103 – Applied Computer Technology Data Communications page 19 of the simplest and most important things you can do to secure your network. But, as with all passwords, don’t lose it, or you may need to buy a new router. 5.4c Reconfiguring Your Router to Secure Your Wireless Home Network Now that you know what you can do to secure your wireless home network, let’s look at how to actually do it. The first and most important thing to know is that not all router interfaces look the same, and this section provides a general description of what to do, but the actual look of the screens, buttons you need to press, and so on, are different from one manufacturer to the next ... but only slightly. If you know what to do and what to look for it is fairly easy to negotiate the differences between router control panels, just as it’s fairly easy to learn to drive most cars once you’ve learned on one particular car. Step 0 – Before you start. It helps to have a copy of the manual or other documentation that came with your router, because it will tell you exactly what to do. If you can’t find it, then you can probably find it online by going to the manufacturer’s Web site and searching for ―[the make and model of your router] + documentation‖ or ―[the make and model of your router] + manual‖. Figure 5-28: a wireless security tab on the control panel for a LinkSys wireless router. Step 1. Access the router’s control panel. Once you have the documentation, you should connect to the router’s internal software. This is easy to do because you use a Web browser to do so. Most routers will allow you to do this from any brand of computer, sometimes even a cell phone, from almost any browser – Internet Explorer, Firefox, Google Chrome, Safari, and so on. You won’t be connecting to the Internet, but will using the same technology – a browser and an IP address – to connect your computer to the router. Common Wireless Router IP Addresses Brand 3Com Apple AirLink+ Belkin Dell D-Link Linksys Microsoft Netgear (since 2005) US Robotic IP Addresses 192.168.1.1 10.0.1.1 192.168.1.1 192.168.2.1 192.168.1.1 192.168.0.1 192.168.1.1 192.168.0.1 192.168.1.1 192.168.1.251 192.168.2.1 192.168.0.1 192.168.0.227 192.168.1.1 Figure 5-29: wireless router IP addresses The image above shows the router control panel for a Cisco Linksys router. Most router control panels are really just web pages with tabs for different settings, text boxes, radio buttons, etc. to configure the router. This image shows the wireless encryption tab. Each router has a ―home‖ IP address for your network. An IP address is an Internet Protocol networking address. It is like a numerical equivalent of a URL. URL’s like www.ccp.edu are actually turned into IP addresses. To connect to your router using a Web browser, you need to open the browser and then type in the IP address of the router as if it were a URL. The chart in Figure 5-29 shows some common router IP addresses, but your router’s manual is the best place to find your router’s IP address. The browser will then probably ask you for the router’s administrator login and password. Again this is in the manual, unless, of course someone has changed it. If anyone has changed it, then you need to know what it is before continuing. CIS 103 – Applied Computer Technology Data Communications page 20 After that, the router control panel will appear in the browser. You’ll be amazed at how fast this happens … this is not some slow Internet connection; you are working with a device that is directly connected to your computer. Step 2 – Set up data encryption. You can set up data encryption using WEP, WPA or other encryption methods. The screen above shows settings for WEP encryption. WPA encryption is a newer more secure method, but WEP is good enough to keep out all but dedicated professional hackers. Encryption methods can almost always be broken by dedicated professionals, so by itself, this is only a small measure intended to keep out unwanted nuisance intruders, so WEP is probably good enough. WEP can be set to 40/64 bit or 128 bit. If you’re not sure what to do, then you should simply choose 40/64 bit encryption, enter a passphrase (if required), and then click the button to generate one or more encryption keys. Write these down, because from now on you will need to use one of them to set up a connection to your router from PC’s, etc. on your network. Step 3– Turn off SSID Broadcasting. You’ll have to search around to find this setting, which could be on the setup or administration tabs, but once you find it, it’s a simple matter of checking the box to ―turn off SSID broadcasting‖. This will effectively prevent people from setting up a connection to your network unless they know the network name in advance. Step 4– Turn on the MAC filter. Usually there is a separate tab for this. If you look closely at the Linksys screen above, you can see that it says “MAC Address Filter” in the second row of the menu bars at the top of the screen. You’ll have to check a box to turn on MAC filtering, then type in the MAC addresses of the wireless adapters in your network. The MAC addresses are usually printed on the Wi-Fi adapters or on a sticker on the computer if the adapter is built into the computer. If you can’t find the MAC addresses, then do not turn on the MAC address filter. Once you do turn it on and put in the MAC addresses, it works automatically. You can also come back and change this later, for example, if you buy a new computer or Wi-Fi adapter. Step 5 – Disable remote router administration. This is almost always just a simple check box on the administration tab. You can turn it off then log in again to turn it on if you do someday need remote help. Step 6 – Change the router’s login and password. This function could be on the setup or the administration tab, and works pretty much the same as changing any login and password. This is a wise thing to do, as long as you don’t lose the password. As mentioned above, changing your router’s password is one of the simplest and most important things you can do to secure your network, but don’t lose the password. That’s it. Don’t forget to save your changes when exiting the router control panel and to write down important information, like encryption keys and the router’s new password. Most routers have a number of advanced features beyond the scope of this course, and many have additional easy-to-use features like parental controls that allow you to block certain Web sites. 5.4 Section Review A. What are some of the things that a person who is able to connect to your wireless network might do? C. Briefly describe how to reconfigure a wireless router to secure a home network. B. List five things you can do to improve the security of your wireless home network. —— § —— CIS 103 – Applied Computer Technology Data Communications page 21 Chapter 5 – Vocabulary 1. Define each of the following terms: bit Ethernet broadband modem serial data communication broadband network Firewire SSID byte IP address byte-addressable memory MAC address Universal Serial Bus Implementers Forum (USB-IF) communications protocol mobile computing devices data bus parallel data communication data communication peripheral device data communication standards RJ-45 driver router Ethernet RS-232c USB (Universal Serial Bus) wireless network adapter wireless router word word length Chapter 5 – On the Web For more information on the material on this chapter see the following Web sites: Chapter 5 – Exercises Exercise 1 – HP USB Printer Create a Word document for this exercise listing your name, any other information your instructor directs you to include, and the title HP C4480 Photosmart printer. Find and open the setup guide for the HP C4480, as shown in the chapter. Copy into your word document the URL for the Web page from which you can download the setup guide. Using Window’s print screen function, copy an image of the screen showing the setup guide’s title page to a Word document. Add short notes describing what the URL and image are. Find the Web page for downloading the driver for the 32-bit Windows 7 operating system. Copy and paste the URL for the Web page into your word document from part 1 of this question. Using Window’s print screen function, copy a screen image of the page, and paste it into the Word document. Add short notes describing the URL and what the image shows. Make sure your word document is neatly formatted and easy to understand. Save the Word document for this exercise and submit it to your instructor. Make sure your name and any other information the instructor requires are in the document. Exercise 2 – Another USB Printer In this assignment you will create a short word document describing how to find the manual and the driver software for a particular printer other than the one shown in class. You must find the manual and driver software for the printer n the Web. CIS 103 – Applied Computer Technology Data Communications page 22 Select any common printer for a PC, such as: Epson Artisan 810 Canon MX 330 Lexmark Interact S605 or a printer that you have at home or at work. Create a short Word document listing the printer you choose. Find the printer’s manual on the Web. Copy into your word document the URL for the Web page from which you can download the setup guide. Open the manual and copy the cover page into your the Word document. Find the Web page for downloading the driver for the printer for Windows 7 (32 bit). Copy the URL for the Web page from which you can download the driver and paste it into your word document. Copy an image of the page into a Word document using Window’s print screen function. Crop the image as necessary in Word. Add some text to your document to briefly describe how to find the setup manual and the driver software for the printer you have chosen, putting your two images in the correct location in the document. You may also add other screen images if you would like, but keep it simple. Make sure your word document is neatly formatted and easy to understand. Save the Word document for this exercise and submit it to your instructor. Make sure your name and any other information the instructor requires are in the document. Note: Some of the manufacturers’ websites require you to select your country first, then re-direct you to their USA website. All of their websites don't look the same, but they all have search boxes, and using your printer’s model number you should be able to find the printer’s manual and its software. Some searches will take you to a general Web page for the product. Look around the resulting page for a link to downloading, or for support. Chapter 5 – Research Topics CIS 103 – Applied Computer Technology Data Communications page 23 CCoonntteennttss Chapter 5 Personal Computer Data Communications and Networking ....................................................................1 Section 5.1 – Serial Data Communications ............................................................................................................1 5.1a – Digital Data..............................................................................................................................................1 5.1b – Parallel and Serial Data Communication .................................................................................................2 5.1c – Serial Data Communication Protocols and Standards .............................................................................3 5.1d – RS-232c ...................................................................................................................................................3 5.1e – USB ..........................................................................................................................................................4 5.1f – Firewire ....................................................................................................................................................4 5.1 Section Review .............................................................................................................................................5 5.2a Using USB Technology ..............................................................................................................................5 5.2b Moving data from a camera over a USB Connection .................................................................................5 5.2c Connecting a USB Printer ..........................................................................................................................7 5.2 Section Review .............................................................................................................................................9 Section 5.3 – A Wireless Home Network with Internet Service ..........................................................................10 5. 3a Wireless Home Networks ........................................................................................................................10 5.3c Wireless Networking Standards................................................................................................................11 5.3b Wireless Home Network Hardware ..........................................................................................................11 5.3d Setting up Wireless Home Network with Internet Service .......................................................................13 5.3 Section Review ...........................................................................................................................................16 Section 5.4 – Securing a Wireless Home Network ..............................................................................................17 5.4a The Need to Secure a Wireless Home Network ......................................................................................17 5.4b Improving Wireless Home Security .........................................................................................................18 5.4c Reconfiguring Your Router to Secure Your Wireless Home Network ....................................................19 5.4 Section Review ...........................................................................................................................................20 Chapter 5 – Vocabulary ........................................................................................................................................21 Chapter 5 – On the Web .......................................................................................................................................21 Chapter 5 – Questions .......................................................................................... Error! Bookmark not defined. Chapter 5 – Exercises ...........................................................................................................................................21 Exercise 1 – HP USB Printer............................................................................................................................21 Exercise 2 – Another USB Printer....................................................................................................................21 Chapter 5 – Research Topics ................................................................................................................................22 Topic 1 – Data Communications Standards ..................................................... Error! Bookmark not defined.