Abstract
Like it or not, the majority of users often compare performance of an organization’s network to the network in their home. Knowing how to explain the fundamental difference between the two benefits users and system administrators. Being able to present the many layers of administration overhead may lead home users to adapt some of the practices that organizations use to protect and maintain their IT investment. This chapter covers the fundamentals of the home network and builds the foundation for understanding an organization’s network.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
“In programming, a port (noun) is a “logical connection place” and specifically, using the Internet’s protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.” See http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212807,00.html .
- 2.
IANA Port Assignments, 1998-2009 Network Sorcery, Inc. See http://www.networksorcery.com/enp/protocol/ip/ports00000.htm .
- 3.
Introduction to TCP/IP; H. Gilbert, Yale University, 1995. See http://www.yale.edu/pclt/COMM/TCPIP.HTM .
- 4.
Joe and Jack’s comments on various commercial 802.11 (a, b, and g); January, 2004. See http://gpsinformation.net/articles/80211ap.htm .
- 5.
WPA stands for WiFi Protected Access
- 6.
WEP stands for Wired Equivalent Privacy
- 7.
“The Difference between WEP and WPA”, IT.Toolbox.com, B. Wilds, 2007. See http://it.toolbox.com/blogs/unwired/the-difference-between-wep-and-wpa-20092 .
- 8.
uTorrent, Bit Torrent, Inc. 2009. See http://www.utorrent.com/ .
- 9.
- 10.
- 11.
“A proxy server receives a request for an Internet service (such as a web page request) from a user. If it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet.” Tech Target, 2009. See http://whatis.techtarget.com/definition/0,,sid9_gci212840,00.html .
- 12.
“Network-attached storage consists of hard disk storage, including multi-disk RAID systems, and software for configuring and mapping file locations to the network-attached device.” Tech Target, 2009. See http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci214410,00.html .
- 13.
“What is RAID?”, Tech Target, 2009. See http://searchstorage.techtarget.com/sDefinition/0,sid5_gci214332,00.html# .
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Eric Kralicek
About this chapter
Cite this chapter
Kralicek, E. (2016). Home Networking. In: The Accidental SysAdmin Handbook. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-1817-4_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-1817-4_2
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-1816-7
Online ISBN: 978-1-4842-1817-4
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books