Seven Tips for Safely Sharing Your Access Point
Thinking of sharing your home (or small business) WLAN? This primer on Wi-Fi basics explains security, routers, the various flavors of 802.11 and other essentials.
by Aaron Weiss
Ten years ago, sharing an Internet connection was practically an act of rebellion. I vividly remember a debate with my cable ISP (who shall remain nameless), who refused to allow subscribers to "share" their connection among several machines. But, with the first generation of turnkey routers already in big-box stores, and wireless networking just emerging, it seemed even then that this provider was on the wrong side of inertia.
Of course, today network sharing is commonplace. So common, in fact, that some of the basics are already taken for granted. If you're new to sharing an Internet connection in your house, your office, or even with your neighborsit might seem like there's a lot of mumbo jumbo to sort through to get everything working.
First, we have to start with some assumptions. The first assumption is that you already have broadband service that you want to share. For most people, this means either a DSL or cable Internet connection. Other possibilities include wireless and satellite broadband.
On the other hand, dial-up and cellular data connections are a different breed although shareable, the equipment and methods differ from what well cover in this tutorial.
1. Assess Your Situation
Depending on your Internet provider and level of service, you might have only a broadband modem, or a broadband modem combined with a wired router, but without wireless broadcasting (no antenna). In either case, you'll need to buy a wireless router. There are a plethora of retailers online, but let's assume you're driving down to your nearest big-box electronics store. Everyone loves a road trip, and you can pick up a Cinnabon while at the mall. [Full disclosure: this paragraph was not sponsored by Cinnabon.]
When choosing a wireless router, the two primary factors to consider for your needs are speed and range. (Security is important, too, but most new routers support the same levels of security. We'll talk more about securing your network later.)
Today, there are three wireless technologies you may find on store shelves. Informally we call these "b", "g", and "n" all shorthand for the technical names 802.11b, 802.11g, and 802.11n, which you will probably see printed on the box in either long or short form.
One significant difference between the three wireless types is speed. Wireless b is the slowest (and oldest). Although it is fast enough to share the average broadband connection, there is little point in purchasing a wireless b router today.
Wireless g is about five times faster than b, and today is your best bet or sweet spot for price and performance. It is likely that most of the products you find on the shelf support wireless g.
Wireless n is the newest technology and vendors are starting to push it hard. But be warned you still pay a premium for wireless n, and the performance of these early generation units falls far short of their maximum theoretical capabilities. Don't be fooled by the "300Mbps!" speed ratings you see on wireless n products rarely do they actually reach these speeds, although they are faster than wireless g.
2. Know your LAN
It takes two to tango for the best performance, the wireless card either built-in or inserted into your mobile or desktop PC needs to support the same wireless standard as your router.
The good news is, thanks to backwards compatibility, if you connect to a wireless g router from a wireless b PC, you will not have any trouble but you will only achieve wireless b speeds. Generally speaking, any PC with wireless b, g, or n can connect to any wireless router b, g, or n (except in some cases when high security is used), but the connection will only be as fast as the slower technology.
3. Need for speed
Wireless vendors have also added their own enhancements to wireless g to add extra speed. Some of these enhancements go by names like "Super G" and "Turbo G" and "Speedbooster" and can as much as double the speed of a wireless g network. Remember that this will mainly affect transferring files within your own LAN. Also remember, the speed boost will only be available when both your wireless router and your PC support the same technology a router with "Super G" will only hit maximum speed when paired with a PC with "Super G."
The added cost of premium speed enhancements, and possibly the need to buy new wireless receivers for your PC, may or may not be worth it depending how much data you move within your LAN.
4. All the Range
Wireless signals travel very well through open spaces, but degrade when passing through walls, floors, windows, and roofs. Building materials like concrete, steel, and aluminum exact a greater penalty than wood, glass, and vinyl.
The design of your wireless router can affect range, too. You will see models with one, two, or even three antennas. Some wireless routers might not appear to have any antennas, but they do they just happen to be hidden inside the plastic case. I prefer external antennas because they can be positioned to maximize signal strength and, in some models, replaced with stronger substitutes.
As with speed enhancements, some wireless routers are marketed with improved range innovations, under names like "Rangemax" and "TrueMIMO." These technologies use multiple antennas to decrease signal loss. Like their speed-enhancing counterparts, they also work best when paired with wireless receivers supporting the same technology. However, range-enhanced wireless routers do usually provide some benefit to all wireless connections, particularly in signal-challenged situations like basements.
To enjoy the best range from your wireless router, try to position it in an elevated open space. If you had to choose, for example, between a second story or a basement, the second story will usually provide better range throughout the home or building.
5. Doubling Up
You can add a second (or third or fourth) wireless router with or without cabling. To extend your range using a physical cable, you would need to run a cable from one of the network ports on your primary wireless router to one of the network ports on your additional router. The "extension" router will need to be configured to behave as a simple access point (AP) rather than a full-fledged router, so that the two routers do not conflict with each other.
Many wireless routers also support a feature called WDS, or wireless distribution system. If both your wireless routers support WDS, they can be configured to extend the range of your wireless network without using any physical cabling. When in WDS mode, the extension routers will essentially receive and rebroadcast the signal from your primary router, letting you reach more nooks and crannies.
6. Secure that Signal
Worse still, freeloaders on your Internet connection could engage in malicious or illegal activity, like sending spam and viruses, which could ultimately be traced back to your Internet service. Not cool.
If you live on a farm without any neighbors for more than half a mile, wireless security might not be a major concern. But, if you live in a more populous area unless you know and trust everyone who comes and goes within a few hundred yards of your home or office you will want to secure your wireless router in three ways:
Security level one change the password to your wireless router. Out-of-the-box, every wireless router has a default login that you use to access the Web-based administration screen. These defaults are widely available on the Web, meaning that anyone within wireless earshot can log in to your router and change your settings, potentially even locking you out of our own Internet service. Your manual will describe how to set a custom password. As always, when choosing a password, select a non-obvious phrase and write it down somewhere safe.
Security level two encryption. When configuring your wireless router's broadcasting options, you will have the choice to choose a type of encryption. Many new routers offer three types: WEP, WPA, and WPA2.
WEP is the least secure encryption and should only be used if you must connect a PC with an older wireless card that does not support WPA. Better yet, upgrade the wireless card in the PC, because WEP is relatively easy for hackers to break.
Either WPA or WPA2 are good choices. Support for WPA is more widespread among wireless receivers. Some routers will let you select either/or mode, using WPA or WPA2 depending on the capability of the wireless receiver. Much more important than your choice between WPA and WPA2 is the passphrase you select. For maximum security, you should create a passphrase that uses the maximum length of 64 characters and includes letters, numbers, and symbols (like * and !), but at minimum your passphrase should be at least 20 characters. It helps to use an online passphrase generator to create a very secure combination.
Creating a strong WPA passphrase does come at a cost of convenience you will have to plug this in to any wireless PC that tries to connect to your network. Each PC will let you save the password so you don't have to re-type it every time it connects.
Security level three (optional) whitelist. Most wireless routers support a security feature called a "MAC address list." Every wireless receiver has a unique identification code called a MAC address. You can find the MAC address for your mobile or desktop PC using a variety of methods.
When you plug in these approved MAC address into your wireless router's MAC address list configuration, it will only allow connections from these wireless receivers like a bouncer who lets only approved VIP's into the club.
A MAC address whitelist is a useful additional layer of protection if the computers in your LAN don't change very often. It may not be feasible to update the whitelist frequently if your network constantly hosts new visitors.
If, for whatever reason, you cannot or choose not to use encryption security, you can still create a MAC address whitelist to provide some level of protection to your wireless network. Note, though, that MAC addresses can be faked by savvy intruders.
7. Little Things Mean a Lot
The most common problem with wireless range, for example, is locating the wireless router in a basement, closet, or other isolated or shielded location. And, as any hacker can tell you, you can hardly throw a stick in any city without hitting a wireless router sporting a default password and no encryption.
Common sense, as they say, isn't always so common.
Article appeared originally on Wi-FiPlanet.com.
For more help, don't forget to try one of our PracticallyNetworked Forums.
|Home | Networking | Backgrounders | Internet Sharing | Security | HowTo | Troubleshooting | Reviews | News | About | Jobs | Tools | Forums|