Intro -- Preface -- Acknowledgments -- PART I:Determining Which Broadband Is Right for You -- Chapter 1:Why You Need Broadband Internet Access -- Computing Without Interruption -- Support files download in a flash -- Applications arrive in a blink -- Immersive Experiences -- Streaming audio -- Streaming video -- Communicating Over Broadband -- Voice over broadband -- Webcams -- Videophones and video IM -- Broadband Gaming -- Game play requirements -- Wrapping yourself in the game world -- The most popular games -- Summary -- Chapter 2:Getting Familiar with Broadband Technology -- What Is Broadband? -- What the Feds Call Broadband -- Symmetrical versus Asymmetrical Connections -- Why service providers offer both options -- Downstream details -- Upstream details -- Asymmetrical advantages -- Symmetrical advantages -- Speed comparisons -- Summary -- Chapter 3:Types of Broadband Providers -- Broadband from Phone Companies: Flavors of DSL -- The development of DSL technology -- How DSL works for you -- Service provider details -- Broadband from the Cable Company -- How broadband over cable works for you -- Service provider details -- Summary -- Chapter 4:Types of Alternative Broadband Providers -- Satellite Broadband -- How satellite works -- Latency -- Service providers -- Community Wireless -- How wireless works -- Service providers -- Wi-Fi hotspots: public 802.11b -- Summary -- Chapter 5:Emerging Broadband Service Options -- Fiber to the Home and Office -- How fiber works -- Coverage areas -- Trials in progress -- Speed -- Reliability -- Security -- WiMax -- How WiMax works -- Coverage area -- Trials in progress -- Speed -- Reliability -- Powerline Broadband -- How Powerline broadband works -- Trials in progress -- Speed -- Reliability -- Security -- Summary -- Chapter 6:Pros and Cons: Choosing Your Best Broadband Option. Decision Points for Your Comparisons -- How to compare service features -- Pros and Cons for Cable -- Current coverage areas -- Decision checklist -- Pros and Cons for DSL -- Current coverage areas -- How to compare service features -- Decision checklist -- Pros and Cons for Satellite Broadband -- Current coverage areas -- How to compare service features -- Downlink and uplink details -- Decision checklist -- Pros and Cons for Community Wireless Broadband -- Current coverage areas -- Security concerns -- Decision checklist -- Service Provider Restrictions -- Acceptable use policies -- Rules on connection sharing -- Bandwidth hogs -- Summary -- PART II:Practicing Safe Broadband -- Chapter 7:Understanding Computer Security -- How Miscreants Get into Your Computer -- E-Mail -- Downloaded files -- Web sites -- Physical Security Details -- Traveling laptops -- Disks from outside -- Wired network security -- Wireless network security -- Keeping Things Out (Viruses, Worms, Trojans, Hackers) -- Update your operating system -- Update your virus protection -- Update your personal firewall -- Keeping Things In (Your Information) -- Router firewall settings -- Desktop firewall settings -- Note to online game players -- Summary -- Chapter 8:Examining Your Home Broadband Hookup -- Cable and DSL "Modems" -- Modem/not modem -- Demarcation point -- Routers for Access Sharing -- Router features -- Router security -- Wireless Broadband Routers -- Wi-Fi speeds and more -- Improving distances -- Summary -- Chapter 9:Examining the Multitenant Broadband Hookup -- Broadband When You Don't Control Access -- The building local exchange carrier -- Physical connection options -- Apartments -- Condos -- Executive suites -- Office parks -- Service from the landlord -- Billing questions -- Separate terms of service -- Service level agreement -- Support contacts. Privacy assurances -- Update your security -- Service from a third party -- Support contact -- Service level agreement and privacy -- Keeping your account -- Onsite broadband router -- Firewall -- Network address translation -- Summary -- PART III:Moving from Stand-Alone PCs to a Network -- Chapter 10:Server and Storage Options -- Why You Want a Home Server -- The messy side of home computing -- Cleaning up home computing -- Why You Need a Small Business Server -- Backup -- Organization -- Sharing -- Security -- Capacity -- Choosing Your Server -- All-in-one server appliances -- Network-attached storage units -- Turning an old computer into a server -- Setting Up Users and Disk Shares -- Setting up users and groups -- Managing disks -- Connecting Network Devices -- Server and storage appliances -- Routers -- Wireless Webcam -- Server Security -- Physical security -- Blocking hackers -- Backup planning -- Summary -- Chapter 11:What You Need to Know About Desktop Networking -- Inexpensive Routers with NAT Support -- Windows 9x/ME: Keep or Can? -- Reasons to upgrade your Windows 9x/ME computer -- Reasons not to upgrade your Windows 9x/ME computer -- Configuring Windows 95/98/ME for Networking -- Basic network settings -- Adjusting the default security options -- Closing exposed security holes -- Configuring Windows 2000 for Networking -- Basic network settings -- Adjusting the default security options -- Closing exposed security holes -- Configuring Windows XP for Networking -- Basic network settings -- Adjusting the default security options -- Closing exposed security holes -- Configuring Other Systems -- Using Shared Resources -- Finding and linking to shares -- Sharing resources -- Summary -- Chapter 12:What You Need to Know About TCP/IP Networks and Routing -- TCP/IP Details -- Why TCP/IP? -- Addressing -- Routing. Dynamic Host Configuration Protocol -- What DHCP servers do -- DHCP server settings -- DHCP client settings -- Domain Name Service -- What name servers do -- Finding name servers -- Static IP addresses -- Dynamic Domain Name Service -- Network Address Translation -- Public and private addresses -- Configuring NAT -- Translating the address -- Is NAT enough security? -- NAT limitations -- Firewalls -- Router-based firewalls -- Configuring a router-based firewall -- Using a personal firewall -- Configuring firewalls for online games -- Proxy and cache servers -- Summary -- Chapter 13:Backup and Disaster Recovery -- More Backups Mean Less Frustration -- What to backup -- Configure your PC for easy backups -- Back-up technology overview -- Pros and cons of back-up options -- Back-Up Tools -- Backing up a desktop -- Backing up a laptop -- Backing up network-connected computers -- How Your Small Business Data Can Survive Disasters -- Offsite storage saves the day -- Tools that rebuild systems quickly -- Data retention rules for businesses -- Summary -- PART IV:Linking Your Network Devices -- Chapter 14:Wired Connection Options -- Choosing Between Wired and Wireless -- Pros and cons of wired versus wireless -- Where to use wires -- Where to use wireless -- Twisted Pair (10 and 100Base-T) Ethernet Wiring -- A quick overview of Ethernet -- Category 5 (CAT5) cabling -- Wiring hardware -- Wiring hubs -- Wiring switches -- Wiring devices in routers -- HomePlug: Networking through Your Power Outlets -- HomePlug overview -- HomePlug and Ethernet -- HomePlug security and compatibility -- HomePlug and wireless -- HomePlug pros and cons -- HomePNA: Networking through Your Telephone Line -- Networking through Your Cable Wires -- Summary -- Chapter 15:Wireless Connection Options -- Wireless Advantages Inside Your Building -- Wireless Standards Overview -- 802.11b. 802.11a -- 802.11g -- 802.11g nonstandard enhancements -- Wi-Fi -- 802.11 futures -- Choosing the Right Wireless Local Area Network Hardware -- Router -- Client connection hardware -- Hardware configuration tools -- Physical Design of Your Wireless Network -- Designing for security -- Designing for distance -- Channel settings -- Summary -- Chapter 16:Wireless Security in Depth -- Wireless Security: An Oxymoron? -- Start Thinking Security When Wireless -- At the wireless router/gateway -- At the laptop client -- Service Set Identifier -- At the wireless router -- At the wireless client -- Wired Equivalency Protocol -- At the wireless router -- At the wireless client -- Media Access Control Filtering -- Virtual Private Network Connections -- Wi-Fi Protected Access -- How WPA works -- Configuring WPA -- One WPA security hole to avoid -- Security Improvement Checklist -- Summary -- Chapter 17:Avoiding Wireless Eavesdropping and Hacking -- Why You Care About Eavesdropping -- How They Eavesdrop -- Wardriving -- Warchalking -- Sniffers -- Legal issues abound -- Common Wireless Hack Attacks -- Wired equivalency protocol cracking -- Man-in-the-middle attacks -- Media access control attacks -- Dictionary attacks -- Session hijacking -- Thwarting Eavesdropping and Attacks -- 802.1x -- Public Wi-Fi Access -- Secure your laptop -- Connect home safely -- Summary -- PART V:Troubleshooting -- Chapter 18:Troubleshooting Internet Access Problems -- Common Problems and Fixes -- Viruses and other malware -- Slow or dead Web pages -- E-mail disruptions -- Working with Your Provider's Customer Service -- Before you call for support -- Reboot everything -- What you need to know when you call -- What they won't tell you -- Dealing with Lousy Customer Service -- How to complain effectively -- Working through their system -- Be your own customer service representative. Power in numbers: Enlist other subscribers.
9780764577437
Broadband communication systems. Internet service providers. Digital subscriber lines. Modems. Artificial satellites in telecommunication.