This website uses cookies to ensure you have the best experience. Learn more

Wireless Procedure Essay

2261 words - 10 pages

LINKSYS WRT54G Procedure Manual

PROCEDURE MANUAL: LINKSYS Wireless G 2.4 GHz Broadband Router

Table of Contents

| Page |
| |
| |
Introduction | 3 |
What is Routing | 3 |
| |
Introduction | 5 |
Configuration Procedure | 6 |
| |
Introduction | 10 |
Configuration Procedure | 10 |
| |
Introduction | 14 |
Configuration Procedure | 14 |
| |
| |
| |


It is imperative that prior to configuring the WRT54G router for any customer to familiarize yourself ...view middle of the document...

There are disadvantages and advantages to both hardware and software routing platforms. Employees must be able to understand the benefits of both and able to translate that knowledge to our customers.


The Linksys WRT54G router is a 2.4 GHz Wireless-G (802.11g) SOHO (small office/home office) device. This device provides about a 100 meter range for both wired and wireless devices. The function of the WRT54G is to allow locally connected computer internet access. The router provides NAT (Network Address Translation), Firewall, Proxy and Encryption services. Linksys manufactures the router and are a Division of Cisco Systems, Inc. (Linksys, 2005). NAT provides a means for multiple computers to connect to the internet using one connection or route. Firewall/Proxy application provides packet filtering to secure the network by controlling which packets are allowed to ingress and egress the device. The job of the default gateway is to direct traffic towards the ISP so that those packets can then be routed to the internet. This guide will serve as a means to providing basic configuration for the WRT54G router by no means is this guide considered a comprehensive configuration guide for the router.

Get to know the Router
This Procedure Guide has been developed to explain how to configure a LINKSYS WRT54G wireless router. The WRT54 is a Dual-Band router capable of supporting IEEE 802.11 Wireless standards B,A and G. WRT54G Broadband Router is like four devices in one box! The Router function lets you securely share one high-speed Internet connection among your entire network, while the 4-port full duplex 10/100 Switch jump-starts your wired-Ethernet network. The first Access Point uses the 2.4GHz radio band, supporting both the popular and inexpensive Wireless-B (802.11b) standard at 11Mbps, and the almost five times faster, Wireless-G (802.11g) at 54Mbps. The second Access Point radio operates in the 5GHz band, and supports Wireless-A (802.11a) networking at 54Mbps. Since the two radios operate in different bands, they can work simultaneously, blanketing your wireless zone with bandwidth. (WRT54G-v5, 2005).

SECTION B: Configure Network Address Translation


Network Address Translations has a very important role it plays when connecting information systems to the internet. NAT has the capability to translate multiple Internet Protocol (IP) addresses on the users private Local Area Network (LAN) to one public IP address that is normally provided by the Internet Service Provider (ISP). NAT adds a level of security by providing a defense in depth solution in that a threat agent would only see the information provided on the public facing interface and have no known knowledge of the internal networking scheme because user internal IP addresses are never transmitted beyond the LAN boundary. Because of the rapid expansion of the internet and scarcity of IP address Network Address Translation (NAT) was...

Other Essays Like Wireless Procedure

Dynamic Source Routing Protocol Essay

5382 words - 22 pages 1. Introduction Mobile hosts such as notebook computers, featuring powerful CPUs, large main memories, hundreds of megabytes of disk space, multimedia sound capabilities, and colour displays, are now easily affordable and are becoming quite common in everyday business and personal life. At the same time, network connectivity options for use with mobile hosts have increased dramatically, including support for a growing number of wireless

Topologies Essay

879 words - 4 pages of FDDI protocols over twisted-pair copper wire. FDDI uses dual-ring architecture with traffic on each ring flowing in opposite directions (called counter-rotating). The dual-rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. There are many forms of Wireless Internet connections, mobile Internet providers, wireless Internet for your home

Best Ever

1112 words - 5 pages . Training Training Policy is for employees to follow the rules they were given when hired. All employees will be trained for ever policy and procedure that this company has. Any employee not following training or its rules after training will be terminated immediately. Wireless Communication Wireless Communication is to protect the company’s information stored on any computer or mobile device. Every month any computer or mobile device should be

Network Design Project

4945 words - 20 pages locations such as warehouse will be hardwired with twisted pair CAT 5 Ethernet cable. The server will be located in a room in each store with the hub or switch. A wireless access point/router will be centrally located in the store to provide good signal in every part of the store for employees using their handheld devices to be able to view and update the store inventory while on the sales floor Since the blade servers are easily expanded upon, cost

Risk Management

526 words - 3 pages Public trust is a major concern when it comes to managing risk policies. The base of risk management is necessary for the company to grow and move into its full potential. Weak policies can lead to vulnerabilities in our infrastructure and network allowing potential threats to the integrity of the company. Credit card information, confidential information, wireless connections and other assets can all be taken without proper management. What

Hypo Hyper Thermia Car Protection System for Children

3711 words - 15 pages , and due to the lack of solutions in the market, my partner and I have designed and implemented an effective and low cost wireless warning system which proactively notifies the parents on any possible incident and optionally resolves the situation prior to their arrival. Our system consists of two modules: a fixed car module, and a parent module which is carried by the parents. The car module consists of four units; motion detection unit to detect

At&T Inc. Ethics and Compliance

1052 words - 5 pages AT&T has been around for more than a century, they provide internet, cable, and wireless. They have made huge advances in the communications industry, including introducing the iPhone, ipad and u-verse. They have the largest international coverage of any wireless carrier, as well as the largest Wi-Fi network. AT&T employee’s hundreds of thousands people and are very diverse. They strive on supporting their communities as well as their employees

Complete Home Network

764 words - 4 pages technical problems in the home), then the network backup is really secured and also the backup/restore procedure can easily be sustained by just installing Backup4all on another computer. I f I were given $2,000.00, it is true that I would have made much changes because I would have extended my network and make it wireless so that I may reach my work place. References Callaway, E., Gorday, P., Hester, L., Gutierrez, J. A., Naeve, M., Heile, B., &amp

Clear Hear: Revenue, Cost Concept and Market Structure

1576 words - 7 pages phones. In addition, customers who most frequently use their cell phones for non-voice applications typically spend nearly twice as much for their current handset than do customers who do not use non-voice applications ($70 vs. $37, respectively). Studies also found, that photo applications—taking, sending and receiving pictures—are particularly popular among wireless owners, as 34 percent of customers report using this feature. This marks a

Alternative Dispute Resolution

1930 words - 8 pages commercial Contract in [2]Cable and Wireless PLC v IBM UK, Ltd. 3. NHS-After reports by the National Audit office that clinical disputes could cost £4.4 billion per year, the NHS set up a pilot project to help resolve claims quickly. 4. Court settlement Process (CSP): The judges who have received extra training in dispute resolution techniques may use CSP at the request of the parties where it is felt such a procedure could achieve an amicable

Mobile Internet

2687 words - 11 pages , mobile terminals communicate with the WAP-gateway over wireless links. These diversities indicate that the previous Internet models may not be suitable for mobile Internet any more. Therefore, if having an accurate Web browsing model for mobile Internet, it can help us design new systems, plan and optimize Websites on mobile Internet. Modeling Web browsing on mobile Internet has not been well explored in previous work, in spite of some attempts

Related Papers

Bluetooth Technology Basics Essay

2198 words - 9 pages wireless technology can enhance this procedure by transferring the data automatically from one device to another. By so doing, the transmission will be done expediently. For examples, some medical tests require certain detail analyses that might demand for electrocardiogram use to test the electrical activities of the heart. Present technology makes use of wire to transmit the analyses from the human body to the equipment. Bluetooth technology

Nt1210 Chapter 5 Definitions Essay

1028 words - 5 pages procedure by which two connected devices choose common transmission parameters, such as speed, duplex mode, and flow control. MAC address table - a table which lists which MAC address is connected to which port Ethernet frame – payload of an Ethernet packet Wired LAN – a local area network that is hard wired using Ethernet cables Wireless LAN – local area network that is wireless using the 802.11 standard Star topology - network consists of one

How To Access Facebook Essay

1356 words - 6 pages : turn on the computer. The user should monitor the computer when it turns on as it should turn on normally. But if the computer shows self-test when the start-up takes place than the user will be able to confirm that the installation was a success. Why is it important to follow protocols and procedures To know the protocols and procedure is important because it enables the user to keep his/her computer safe, avoiding all risks and also it will

What Is Wi Max Essay

1785 words - 8 pages of latest Wi-fi innovations. The reason is that wireless networking is being used more and more to connect various mobile devices and appliances, and I wish to research into this fast changing field. One of the new broadband wireless technologies being developed is WiMAX. This paper provides a brief overview of this emerging protocol and its implementation of security in terms of application, data and host. Brief Overview of WiMAX