These days, everyone having two or more internet-connected devices (e.g.,PC, laptop and your phone), but it is not possible to take as much as Connections for all devices. Luckily, you can rectify this injustice by using your laptop as WI-FI hotspot. By using readily available technology anybody can create a Hotspot and offer access to all wireless enable devices, customers and neighbors within range of their wireless network. Here we have some popular methods which make your laptop as WI-FI hotspot. 1.Connectify Connectify hotspot is an easy to use software router for Windows computers that utilizes your PC’s built in Wi-Fi card to wirelessly share any available Internet connection including Local Area Connection or 3G/4G Data cards with friends, co-workers, and mobile devices. You can down load this from http://www.connectify.me/and install in your PC fallow the below mentioned easy steps to make your laptop as WI-FI hotspot. Set your desired Hotspot […]
In this post I covered the DHCP Option 43 configuration steps for Cisco Aironet lightweight access points. The DHCP Option 43 is for add a Wireless LAN Controller IP address in DHCP server, after that Cisco Aironet lightweight access points will get a both IP address details and WLC IP address from DHCP server. This includes the DHCP Option 43 configuration for 1000, 1100, 1130, 1200, 1240 and 1300 series Cisco Aironet Access Points. We can configure the IP DHCP Server on Cisco Router or L3 Switch, we can add the DHCP Option 43 configuration in Cisco IOS DHCP server for use with Cisco Aironet lightweight access points. You can also configure DHCP Option 43 on Microsoft, Sun Solaris, Linux, and Lucent QIP DHCP servers. In DHCP Option 43, you should use the IP address of the WLAN controller management interface. DHCP Option 43 is limited to one access point type per DHCP […]
Wireless encryption and authentication is the heart of wireless router security and Wireless routers support multiple wireless encryption and authentication methods. Better the wireless encryption and authentication technology, the more difficult a hacker will find authenticating and unscrambling the encrypted data. When you assign your wireless router with a key and assign an encryption method, it will scramble the data and only a laptop with the same key can unscramble that data. This would ensure a hacker can not access the data. You have to use the strongest wireless encryption and authentication method your router supports, Find below different options available in this topic. Wireless LAN (WLAN) Authentication Types: Open: An open system is a system that does not require authentication. Any station can join the network without authentication. Shared Key: In Shared Key, the WEP key is used for the authentication. However, this procedure is not recommended, because it […]
In wireless networking, various techniques and configurations are used to ensure fast, high-quality, and with secure connections. Different operating types suit different setups based on requirement. It can be difficult to choose the right authentication method. Basically, wireless networks can be classified as managed (Infrastructure) networks and ad-hoc networks. Infrastructure /Access Point Mode: In Infrastructure Mode wireless clients are connected to an access point. This is generally the default mode for 802.11b cards. This is also referred as Access Point mode, all connections of the WLAN stations in the network run through the access point, which may also serve as a connection to an Ethernet. Infrastructure mode WLANs are slightly more difficult to set up than ad-hoc mode WLANs, but provide a single point of control and security for the WLAN. This helps a great deal in keeping the network safe and controlled. Using an AP mode WLAN does also […]
There are various encryption types to ensure that no unauthorized person can read the data packets that are exchanged in a wireless network or gain access to the network. Wireless LAN (WLAN) Encryption Types: WEP (Wired Equivalent Privacy): WEP stands for Wired Equivalent Privacy. WEP standard uses of the RC4 encryption algorithm, originally with a key length of 40 bits, later also with 104 bits. Often, the length is declared as 64 bits or 128 bits, depending on whether the 24 bits of the initialization vector are included or not. WEP is a weak wireless encryption protocol and easy to crack. It has holes that are easily exploitable by even a novice attacker. However if this is only option you have, then do use this. WPA (Wi-Fi Protected Access): WPA was created to improve on or replace the flawed WEP encryption. WPA provides much stronger encryption than WEP and addresses a number of WEP weaknesses. […]
The Linksys access point’s front panel will indicate the status of the connection. When the access point is powered on and is getting a successful connection to the network, the Power, Act, and Link LEDs should be lit. Checking the Access Point’s LEDs Step 1: Make sure the Power LED is solidly lit to indicate that the access point is properly powered on. Step 2: Make sure the Act LED is flashing to indicate that the access point is active and ready for sending or receiving data to or from one of the devices on the network. Step 3: Make sure the Link LED is lit to indicate a successful Ethernet connection. The flashing light indicated that the device is receiving or sending data.