Skip to main content

Home Networking

  • Chapter
  • 1207 Accesses

Abstract

Like it or not, the majority of users often compare performance of an organization’s network to the network in their home. Knowing how to explain the fundamental difference between the two benefits users and system administrators. Being able to present the many layers of administration overhead may lead home users to adapt some of the practices that organizations use to protect and maintain their IT investment. This chapter covers the fundamentals of the home network and builds the foundation for understanding an organization’s network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    “In programming, a port (noun) is a “logical connection place” and specifically, using the Internet’s protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.” See http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212807,00.html .

  2. 2.

    IANA Port Assignments, 1998-2009 Network Sorcery, Inc. See http://www.networksorcery.com/enp/protocol/ip/ports00000.htm .

  3. 3.

    Introduction to TCP/IP; H. Gilbert, Yale University, 1995. See http://www.yale.edu/pclt/COMM/TCPIP.HTM .

  4. 4.

    Joe and Jack’s comments on various commercial 802.11 (a, b, and g); January, 2004. See http://gpsinformation.net/articles/80211ap.htm .

  5. 5.

    WPA stands for WiFi Protected Access

  6. 6.

    WEP stands for Wired Equivalent Privacy

  7. 7.

    “The Difference between WEP and WPA”, IT.Toolbox.com, B. Wilds, 2007. See http://it.toolbox.com/blogs/unwired/the-difference-between-wep-and-wpa-20092 .

  8. 8.

    uTorrent, Bit Torrent, Inc. 2009. See http://www.utorrent.com/ .

  9. 9.

    http://www.skype.com/intl/en-gb/welcomeback/

  10. 10.

    http://messenger.yahoo.com/

  11. 11.

    “A proxy server receives a request for an Internet service (such as a web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet.” Tech Target, 2009. See http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html .

  12. 12.

    “Network-attached storage consists of hard disk storage, including multi-disk RAID systems, and software for configuring and mapping file locations to the network-attached device.” Tech Target, 2009. See http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci214410,00.html .

  13. 13.

    “What is RAID?”, Tech Target, 2009. See http://searchstorage.techtarget.com/sDefinition/0,sid5_gci214332,00.html# .

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Eric Kralicek

About this chapter

Cite this chapter

Kralicek, E. (2016). Home Networking. In: The Accidental SysAdmin Handbook. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1817-4_2

Download citation

Publish with us

Policies and ethics