Windows
 

Windows 8 : Creating a Windows Network - Installing a Wireless Network (part 1) - Wireless Network Setup Choices

2/23/2014 12:33:21 AM

If you are using a wireless router, you need to configure wireless security and networking options after installing your network adapters. You need to do this even if you are just using it for its wired Ethernet connections, and don’t plan on using its wireless capability.

You really do have to worry about wireless network security. In my home, I can pick up signals from four separate wireless networks: mine, the house next door’s, and two others (I can’t tell whose they are). It’s not uncommon to find that you can receive signals from several neighbors. And people do actually drive around with laptops in their car, looking for free Internet access. To protect against both freeloaders and hackers, one or two protection techniques are used: encryption, which scrambles data, and authentication, which certifies that a given computer should be allowed to connect to the network. You can use either encryption alone, or both encryption and authentication.

1. Wireless Network Setup Choices

To be able to distinguish your network’s signal from others and to secure your network, you will be asked to make the following choices when you set up a wireless network:

An SSID (Service Set Identifier)—A short name that you give your network, up to 32 characters in length. This could be your last name, your company name, your pet’s name, or whatever makes sense to you.

A security type—The authentication method that your network uses to determine whether or not a given computer should be allowed to connect. For home and small office use, the choices are as follows, in order of increasing security:

No Authentication (open)—No authentication is performed; any computer can connect to the network.

WPA-Personal—A method that uses a passphrase to validate each computer’s membership in the network. The passphrase also serves as an encryption key. Like WEP, it has been found to be insecure. Don’t use it unless your wireless router can’t use WPA2 and its software can’t be upgraded

WPA2-Personal—An improved version of WPA-Personal. This is the best choice for home and small office networks.

On corporate networks, other security types are sometimes used: 802.1X, WPA-Enterprise, and WPA2-Enterprise. These systems use a network server, smart card, or software certificate to validate network membership.


Caution

If you want to use file and printer sharing on your wireless network, you must use wireless security. Otherwise, random people will be able to get at your computer.

If you want to set up an “open” wireless hotspot to share your Internet connection with friends, neighbors, or the world, that’s great, but you must not use file and printer sharing on the same network.


An encryption type—The encryption method used to secure network data against eavesdropping. The options available depend on the security (authentication) type selected. The choices, in increasing order of security, are as follows:

None—No data encryption is performed. This option is available only when the security type is set to No Authentication.

WEP—Data is encrypted using the WEP protocol, using a 40-, 128-, or 256-bit key. WEP encryption can easily be broken by a hacker.

TKIP—An encryption method that can be used with any of the WPA security types. A better choice is, however, is AES.

AES—An improved encryption method that can be used with any of the WPA security types. AES is more secure and may offer faster network transmission. This is the best choice for home and small office networks.

An encryption key—The key used to encrypt and decrypt data sent over the network. The different encryption methods use keys of different lengths. Longer (more bits) is better.

• For WEP encryption, Windows 8 supports 40-bit and 128-bit security. A 128-bit WEP key must be exactly 26 hexadecimal digits—that is, the numerals 0 through 9 and the letters A through F. It could look something like this: 5e534e503d4e214d7b6758284c. You can Google “Random WEP Key Generator” if you want help coming up with one.

A 40-bit key consists of exactly ten hexadecimal digits. Windows 8 will let you join an existing 40-bit WEP network but not create a new one.

Some routers and some earlier versions of Windows let you enter a WEP key as a text phrase, but the text method was not standardized, and was pretty much guaranteed not to work across brands of wireless routers and access points, so it has been abandoned.

• For WPA or WPA encryption, enter a passphrase: a word or phrase using any letters or characters, of eight or more letters—the more the better, up to 63. The passphrase is case sensitive and can contain spaces, but must not begin or end with a space. You might use two random words separated by punctuation symbols (for example, something like “topiary#clownlike”).

• The encryption key should be kept secret because, with it, someone can connect to your network, and from there get to your data and your shared files. (I usually write it on a sticky note that I put on the bottom side of the router.)

A channel number—The channel number selects the frequency used to transmit your network’s data. The channels used in North America are usually 1, 6, and 11. The other channels overlap these and can interfere with each other. For double-bandwidth Wireless-N, the choices are 3 and 11. The preferred channel numbers are different in other countries.

Why are there so many different security methods? Because thieves, like rust, never sleep, and it seems that as soon as a new, safer method is standardized, someone figures out a way to break it. WEP stands for Wired-Equivalent Privacy, but that turned out to be a bit too optimistic—a determined person can break WEP security in as little as a minute. WPA (which stands for Wi-Fi Protected Access) uses an improved encrypting scheme, and can deter most attacks, but it, too, turns out to be crackable. WPA2 is a further improvement upon that, and it’s the best option we have at present. It should deter even the most determined hacker (although I suspect that it wouldn’t keep the National Security Agency scratching its collective head for too long, if you know what I mean).


 Note

If you don’t use a router, but just want to create a wireless network between two or more computers, you are creating an ad hoc network.


Finally, one more bit of nomenclature: If you have a router or access point, you are setting up what is called an infrastructure network. Windows 8 has a wizard to help you choose the correct settings. We’ll go through this in the next section.

Which methods should you use to set up your network? On a home or small office network, you’re limited by the least capable of the devices on your network—your weakest link. So, use the strongest encryption method and the longest key that is supported by all of the devices and computers on your network. This means that if you have even one computer that doesn’t support WPA, you need to use WEP, and if you have even one computer that doesn’t support 256-bit keys, you have to use a 128-bit key. If you have a router, access point, or network adapter that doesn’t support WPA, it’s worth checking to see if you can update its internal software (firmware) or drivers to support this stronger encryption method.


Note

Windows 8, 7, Vista, and XP with Service Pack 3 all have built-in support for WPA2. If your router doesn’t support WPA2 or WPA, you might be able to install updated firmware to get it. If that’s not possible, a new wireless router shouldn’t set you back more than $40 to $90.

 
Others
 
- Windows 8 : Creating a Windows Network - Installing Network Wiring (part 3) - Connecting Just Two Computers, Connecting Multiple Switches
- Windows 8 : Creating a Windows Network - Installing Network Wiring (part 2) - Wiring with Patch Cables, Installing In-Wall Wiring
- Windows 8 : Creating a Windows Network - Installing Network Wiring (part 1) - General Cabling Tips
- Windows 8 : Creating a Windows Network - Installing Network Adapters
- Windows 8 : Creating a Windows Network - Additional Networking Functions
- Windows 8 : Creating a Windows Network - Choosing a Network and Cabling System (part 3) - Phoneline and Powerline Networking
- Windows 8 : Creating a Windows Network - Choosing a Network and Cabling System (part 2) - 802.11n and 802.11g Wireless Networking
- Windows 8 : Creating a Windows Network - Choosing a Network and Cabling System (part 1)
- Windows 8 : Creating a Windows Network - Planning Your Network
- Windows 7 : Hardware and Software Compatibility (part 6) - Windows Virtual PC and XP Mode - Taking It to the Next Level: Windows XP Mode
- Windows 7 : Hardware and Software Compatibility (part 5) - Windows Virtual PC and XP Mode - Understanding Windows Virtual PC
- Windows 7 : Hardware and Software Compatibility (part 4) - Dealing with Software Incompatibility - Compatibility Mode
- Windows 7 : Hardware and Software Compatibility (part 3) - Understanding Windows 7 Compatibility Issues
- Windows 7 : Hardware and Software Compatibility (part 2) - The Windows 7 Upgrade Advisor - Picking through the Results
- Windows 7 : Hardware and Software Compatibility (part 1) - The Windows 7 Upgrade Advisor - Using the Upgrade Advisor
- Windows 8 : Using the Control Panel Items (part 16) - Windows Update
- Windows 8 : Using the Control Panel Items (part 15) - Windows Mobile Device Center
- Windows 8 : Using the Control Panel Items (part 14) - User Accounts - Configuring an Account, Recovering Lost Passwords, Creating a User Account Password Reset Disk
- Windows 8 : Using the Control Panel Items (part 13) - User Accounts - Adding a Local User Account
- Windows 8 : Using the Control Panel Items (part 12) - Sync Center
 
 
Most View
 
- Xbox Games with Windows 8 : Finding and Acquiring Desktop Games
- Windows 7 : Programming Drivers for the Kernel Mode Driver Framework (part 2) - KMDF Driver Structure and Concepts - Object Creation
- Sharepoint 2013 : Use Managed Metadata Navigation in a Publishing Site (part 1) - Choosing a Term Set for Navigation in a Site
- About Microsoft SharePoint 2013 : What Is Tagging?
- Windows 8 : Working with file systems (part 4) - Understanding Encrypting File System, BitLocker
- Sharepoint 2013 : Managing and Configuring Profile Synchronization (part 6) - SharePoint Profile Synchronization - Managing User Properties
- Developing Custom Microsoft Visio 2010 Solutions : Introducing the Notes Shape, Using the Developer Ribbon Tab
- Microsoft Sharepoint 2013 : Using SharePoint Commands (part 3) - Working with Site Collections
- Sharepoint 2013 : Organizing and managing information - Creating site columns
- Active Directory 2008 : Managing OUs (part 2) - Administering Properties of OUs
 
 
Top 10
 
- Microsoft OneNote 2010 : Searching Notes (part 4) - Troubleshooting Problems with Search
- Microsoft OneNote 2010 : Searching Notes (part 3) - Searching for Text with the Search Results Task Pane
- Microsoft OneNote 2010 : Searching Notes (part 2) - Searching for Text on the Current Page, Searching for Text with Instant Search
- Microsoft OneNote 2010 : Searching Notes (part 1) - Turning Audio Search On or Off, Turning Text Recognition in Pictures On or Off
- Microsoft OneNote 2010 : Prioritizing and Categorizing Notes with Tags (part 2) - Search for Tagged Notes, Removing a Tag from a Note
- Microsoft OneNote 2010 : Prioritizing and Categorizing Notes with Tags (part 1) - Applying a Tag to a Note
- Microsoft OneNote 2010 : Organizing the Pages and Sections in a Notebook (part 2) - Moving or Copying a Notebook Section, Merging One Notebook Section into Another
- Microsoft OneNote 2010 : Organizing the Pages and Sections in a Notebook (part 1) - Displaying the Hierarchy of a Notebook on the Navigation Bar
- Microsoft OneNote 2010 : Navigating Notebook Content with Links (part 2) - Notebooks list or click the Open Notebook button. Creating Wiki-Style Links to Other Locations in Your Notebook
- Microsoft OneNote 2010 : Navigating Notebook Content with Links (part 1) - Creating a Link to a Specific Notes Page, Creating a Link to a Specific Notebook Section