AllFreePapers.com - All Free Papers and Essays for All Students
Search

My Life Case

Autor:   •  January 31, 2015  •  Essay  •  532 Words (3 Pages)  •  889 Views

Page 1 of 3

For my home network, I choose to use a cable modem as the speeds seem to go a little higher than standard DSL and cable doesn't depend on the phone line to get a connection which is a plus for me. Since I will be connecting multiple devices on my home network, I chose to go with the 25mb down and 15mb up service which is called "Turbo". Now with that being said; in order to connect multiple devices I have to find a way to get everything connected. My setup consist of two laptops with wireless capability and a desktop that also has wireless capability, since my desktop will be doing most of the downloading and streaming I would like to hard wire it and utilize the wireless capabilities on the laptops, I also have a wireless printer that needs to be connected. After looking at the back of the cable model I noticed that there was one Ethernet port available and it was not wireless. This immediately prompted me to buy a router and the one I chose was the "Linksys WRT Dual band router" this router has the capability to run on two different bands and since I live in an apartment complex most people will be using the 2.4 Ghz band and having the capability to switch to 5 Ghz is a major plus; as I can get the most out of my bandwidth on this band and there are fewer people on it so the interference would be minimal. This router also gives me six Ethernet ports and that is more than enough for my home office, it even gives me the option to hard wire my laptops for when I'm doing high data transfers or projects that require a lot of bandwidth. After connecting my router to my cable modem I then logged into the desktop that is hard wired and configure my router. Instead of adding security, I decided to protect my network by using MAC address filtering which only allows devices who's MAC addresses have been specified; so even though my network doesn't show that it's protected to the outside eye, when someone tries to connect

...

Download as:   txt (2.7 Kb)   pdf (58.9 Kb)   docx (10.6 Kb)  
Continue for 2 more pages »