The user who has Internet connection in single-family house, usually would like to have possibility of using the Internet in various parts of the home or even in its close surroundings like garage or garden. To reach that goal, the perfect solution is use of a wireless network (WLAN) operating in 802.11b/g standard.
In the case of difficulty with building cable installation, the wireless network can also solve the problem with connection of a greater number of household computers to the global network. Depending on the way of providing the Internet to the house, there may be used different variants of installations.
I - Internet provided by cable television operator via cable modem with Ethernet output, or by local ISP using Ethernet cable.
II - Internet access via ADSL technology.
II - Internet access via ADSL technology.
III - Internet provided wirelessly with the use of the set: directional antenna and wireless card in the computer. At least two devices have to be used. Firstly, we have to connect access point working in AP Client mode to a directional antenna.
IV - wireless access. Some Access Points have been fitted with a very useful function named Wireless Routing Client, which enables us to configure wireless port as WAN port that is normally found in any router.
It means that the wireless connection can be shared with built-in router by its LAN ports. The advantage of such configuration is compactness - one piece of equipment that performs the role of two devices. The solution allows to create our own configurable subnetwork that can be well protected from unauthorized access.
IV - wireless access. Some Access Points have been fitted with a very useful function named Wireless Routing Client, which enables us to configure wireless port as WAN port that is normally found in any router.
It means that the wireless connection can be shared with built-in router by its LAN ports. The advantage of such configuration is compactness - one piece of equipment that performs the role of two devices. The solution allows to create our own configurable subnetwork that can be well protected from unauthorized access.
No comments:
Post a Comment