Context of the Problem
Home networks are a recent computing ideology that most end users prefer contrary to public computer networks. With the ever-increasing need to have access to the internet and telecommuting, individuals are being compelled to set up home networks that can guarantee access to the internet for the purposes of working, education, and leisure. Apart from having access to the internet, home networks can be used to offer services such as file and printer sharing.
The challenge in setting up a home network is that in most cases, there is no dedicated technician that can troubleshoot the network in cases of failures. Reports indicate that most home networks are set up by an expert or the internet service provider, after which they leave the system for the end-user. It is notable that third parties such as the internet service providers and the outsourced technicians are usually not available during cases of network failure.
Computers, just like other machines, do not guarantee 100 percent functionality, and so is the associated computer network. This implies that network breakdowns can occur at any time and in an unpredictable manner. Such network breakdowns can be a result of diverse factors such as poor network configurations, lack of knowledge by the end-user concerning the various ways of gaining access to the network, and other diverse causes that may impair the functionality of a network, which may be user-oriented or hardware-oriented.
This research paper will attempt to identify the various problems associated with home networks. In addition, the paper will also investigate the extent to which home network users can tackle such problems. This is imperative in ensuring that effective measures are put in place to combat home network problems.
Statement of the Problem
Computer networks provide great things for the home environment, which include more convenient Internet access, sharing of files and printers, additional home entertainment options, and so on. Yet, home network technology also poses several challenges. Many individuals do not know where to start. Things often do not work right the first time. Sometimes, people settle for an inferior setup and never realize the full potential of their home network. The advice below helps you avoid these common problems. Therefore, this proposal will educate people on the most common home networking issues and provide solutions that will resolve these situations as they may occur.
Significance of the Study
This study is very important because technology is our present and future and will continue to evolve. A home network or home area network or (HAN) is a residential local area network (LAN). It is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. An important function is the sharing of Internet access, often a broadband service through a cable TV or Digital Subscriber Line (DSL) provider. Additionally, a home server may be added for increased functionality. These home networks are important because most family households use computers for e-mail, schoolwork, shopping, instant messaging, downloading music and videos, and playing games. For many families, one computer is no longer enough to go around. In a household with multiple computers, a home network often becomes a necessity rather than a technical toy.
These home networks may use wired or wireless technologies. One of the most common ways of creating a home network is by using wireless radio signal technology. Some home networking devices operate in both radio-band signals. A wireless network can be used for communication between many electronic devices, to connect to the Internet, or to wire networks that use Ethernet technology. Most individuals have much success with their wireless connections, and others have many problems. In my research, I identified my own equipment as evidence, I currently own a Linksys wireless router and use a digital subscriber line (DSL), which has given many problems with keeping a connection within its specified area.
Having a successful home network system has many different factors that come into play. For example, the cable TV or digital subscriber line provider has an extremely big part of having a clear connection or high speed. During my research, it has been identified that some companies have much better service than others do. They also offer different strengths of connections. Having a lower grade of service does affect the connection and the speed of the home network. Most companies offer a variety of speeds at different price points. Which speed is right for you will vary upon your usage and expectations?
Other common problems with home networks are as follows.
- Conflicts in IP Addresses (or Address Already in Use).
If a computer is set up with a static IP address that is being used by some other device on the network, the computer (and possibly also the other device) will be unable to use the network.
- “The Network Path Cannot Be Found.”
Updating the TCP/IP configuration can resolve this issue sometimes seen on Microsoft Windows computers when trying to access another device via Network Neighborhood.
- “Duplicate Name Exists on the Network.”
After starting up a Microsoft Windows computer connected to a local network, you may encounter this error as a balloon message. When it occurs, your computer will be unable to access the network. You may need to change the name of your computer to resolve this issue.
- “Limited or no connectivity…”
When attempting to access a Web page or network resource on a Windows shared drive, you may receive a pop-up dialog error message that starts with the words “limited or no connectivity.”
- “Connected with Limited Access…”
A technical glitch in Windows Vista causes this error message to appear when making certain types of wireless connections. Microsoft has provided a fix for this issue in Vista service packs. This error can also occur on a home network for other reasons that may require you to reset your router.
Other network issues are things such as the “Network Won’t Reach Certain Areas, Computers Can’t See Each Other on the Network, Computers Can’t Get on the Internet, Special Devices Won’t Join the Network, Certain Network Applications Won’t Function, Network is Too Slow, Network Connections Drop Unexpectedly and the Office Computer Won’t Join Home Network” which are all things that can be affected depending on what type of equipment you own or the service you obtain. As the researcher, I can’t stress enough why having a good home network is so important not only for small businesses and offices who have deadlines to meet for their consumers but also to the average American who is a student with a project due or a new grandparent who expects new pictures of a grandchild. The significance of this study is of great importance.
Research Questions
With the constant change in technology, individuals are almost forced to keep up regardless of their expertise in specific areas; one must learn to adapt and just go along with what is now considered the norm. In today’s society, having a wireless computer network in the home environment is a necessity, especially for those households with children in grade school and even college. The problem, though, is that most individuals have no idea where to start or even how to upkeep a home network. To obtain the information needed to assess these areas of the topic, the author will ask and answer the following research questions:
- Why Build a Wireless Home Network? A network (either wired or wireless) increases the usefulness of your home computers. Wireless home networks offer even more benefits than wired ones.
- What Hardware is required to build a Wireless Network? Strictly speaking, no hardware other than wireless adapters is required to build a small wireless LAN (WLAN).
- How Many Computers Can Share a WiFi Network? The exact number of devices that can connect and effectively share a Wi-Fi varies but is probably larger than you think.
- Can Two Routers Be Used on the Same Home Network? Installing two routers on the same home network can be useful when building a hybrid wired and wireless network or generally expanding the existing capability.
- What is Wi-Fi Infrastructure Mode? In wireless networking, infrastructure mode bridges a WLAN with a wired Ethernet LAN and allows Wi-Fi networks to support more clients with greater reach.
Organization of the Study
Chapter 2 will about research question 1 (Why Build a Wireless Home Network?). Chapter 3 will be about Research Question number 2 (What Hardware is required to build a Wireless Network?). Chapter 4 will be about Research Question number 3 (How Many Computers Can Share a Wi-Fi Network?). Chapter 5 will be about Research Question number 4 (Can Two Routers Be Used on the Same Home Network?). Chapter 6 will be about Research Question number 5 (What is Wi-Fi Infrastructure Mode?). Chapter 7 will be the conclusion.
Research Design and Methodology
Research approaches are primarily based on the structure of the research questions. This paper aims at evaluating the effectiveness of a wireless network in comparison to a wired network. The research will basically use secondary resources in an attempt to have an in depth analysis of the research questions and attempt to relate them with the problems associated with home networks.
It is evident that wireless communication is one of the recent technologies in comparison to wired technologies; this implies that it has improved efficiency and effectiveness in comparison to the traditional wired networks. A wireless network can be viewed as a computer network whose interconnections do not comprise cables (Deal, 2008). With the ever-increasing need to have a dynamic computing environment, whereby end users can have access to the internet irrespective of their location, wireless computer networks come in handy to offer the solution in that context. Wired networks are static, and the end-users are limited to the distance under which the cable can reach. In some cases, wired networks are more beneficial compared to wired networks. For instance, in cases where there is no need to broadcast and access to that particular network is limited, wired networks are more effective since they only offer limited access points, which are the terminals of the cables. In terms of network performance, wireless networks outdo wired networks since they incorporate most of the latest technologies such as Wi-Fi, WI-Max that are faster, reliable, and provide efficient avenues to access the internet. Basing on the above, it is evident that wireless networks are more beneficial compared to wired networks in terms of efficiency and reliability (Yan et al., 2008).
Any network, whether wired or wireless, requires hardware for implementation. Differences are evident only when deploying the different types of hardware. For instance, the use of wireless networks eliminates the need to interconnect workstation computers using cables. The hardware used in the implementation of a wireless network depends on the scope of the wireless network and the need to have multiple access points. Typically, a small Wireless LAN only requires wireless broadcasting equipment such as a wireless radio, which can serve as a broadcasting channel through which the workstation computers can be connected by use of a device that is capable of detecting the signal transmitted by the wireless radio.
In order to facilitate the mobility of the end-users, the wireless LAN has to deploy spread spectrum technologies whereby the users can access the network irrespective of their position within the network (Harold, 2004). Wi-Fi can be used to implement this technology. The basic infrastructure of a wireless LAN incorporates the use of wireless adapters in the host machines and a wireless transmitting radio. Wireless LANs that use Wi-Fi are advantageous because they offer a wide area of coverage and are not affected significantly by obstacles; in addition, they are not dependent on issues such as a line of sight. Wireless LANs are more cost-effective compared to wire LANs due to the elimination of hardware such as cables and central switches. It is also imperative to note that a wireless LAN is more effective in terms of signal transmission since there are fewer distortions associated with attenuation, as in the case of Wired LANs (Briere & Hurley, 2010).
One of the significant benefits associated with Wi-Fi networks is scalability; this means that the host machines can be varied as required, provided the bandwidth be kept in check; otherwise, the functionality of the network is impaired in consideration to variables such as network speed and availability. Workstation PCs and other devices that can detect the Wi-Fi signal usually connect to a Wi-Fi network through the use of wireless access points; in the context of home networks, access is gained through the use of a wireless router. According to the router specifications, different devices can have access to the home network.
The standard limitation is known to be 255 devices, the limitation being brought about by the exhaustion of Internet Protocol (IP) address that can be assigned to a single wireless broadcasting device. This limitation due to the use of IP version 4, which can only support 18-bit addresses. Recent improvements have seen the development of IP version 6, which can support a maximum of 16-bit addresses, thereby increasing the number of IP addresses that can be allocated to devices in the Wi-Fi network. For a Wi-Fi network to function effectively, not all the IP addresses have to be used since it will cause issues relating to the network load. A solution to this problem is to install multiple access points in a Wi-Fi network so as to distribute the load that would impair the functionality of the network if it were to have a single access point (Deal, 2008).
The use of two routers in a home network serves primarily to increase the access points in that particular network. Basically, the deployment of two routers in the network serves to increase network performance and network security. Routers also provide an effective way of expanding the home network while at the same time eliminating the burden associated with network load. Multiple routers a network provide an effective way of segmenting the home network. Network segmentation offers an effective approach to network management since each segment can be configured differently according to the requirements of the users under each segment. One of the recent trends in home networking is the need to integrate wired networks with wireless networks; the only effective way of establishing a hybrid network is the use of multiple routers.
One router can host the wired network, while the other router can be used to host the wireless network. Wireless and wired hybrid networks can be used in increasing the current capability of the network by integrating both the benefits associated with wired and wireless networks (Meyer, 2003). There are network scenarios that practically demand the use of two routers; for instance, it is not practical to have long Ethernet cables from the parent router in cases where the host machines are far from the router. A solution to such a problem is the linking of two routers, where a secondary router is connected to a primary router resulting in the creation of a very different network segment. Generally, the use of multiple routers in a home network plays a significant role in the solution of problems related to network security, network performance, network scalability, and provision of network interactivity (Briere & Hurley, 2010).
An infrastructure mode in a Wi-Fi network provides connectivity between the wireless network and a wired network that uses Ethernet cables. One of the significant advantages associated with Wi-Fi infrastructure mode is that it offers a single point of connection for both the clients under the WLAN network. One of the key requirements during the implementation of infrastructure mode Wi-Fi networking is a Wireless Access Point. In order to effectively join a Wide LAN, the Access Points, and all the clients under the wireless network are set up to use the same Service Set Identifier (SSID). SSID serves as the network name under the LAN and is encrypted in order to limit its access. The Access Points for the wireless host machines are then connected to an Ethernet Wired Network in order to allow the wireless hosts to have access to network resources such as network drives, network printers, and other network resources. Using a common SSID can facilitate the addition of wireless Access Points to the Wide LAN, thereby increasing the access of the network infrastructure and facilitating the network to support as a large number of wireless networks (Deal, 2008). Therefore, the advantages associated with the use of infrastructure mode Wi-Fi home networking include:
- Increased network security can be fostered by the encryption of the SSID.
- It increased network scalability since the WLAN can provide support to a large number of wireless hosts.
- It enhanced network management platforms since it provides avenues for disowning network devices and managing the connectivity of the hosts under the SSID.
The drawback associated with networking infrastructure is associated with additional costs of hardware acquisition (Meyer, 2003).
Summary
Home networks have become a vital need for most households in most of the developed countries. Internet consumers have benefitted greatly from the ability to access and use broadband internet connections from different places in the home (Brendell, n.d). The content shared in-home networks by order of popularity is as follows: Internet Access (80%), Documents (70%), Photos (62%), Music (33%), Video (22%), and Games (22%).
The home-networks have evolved from mere sharing of internet access to sharing of multimedia files. The content in multi-media files has pushed consumers to seek integrated digital media adapters. Internet service providers are relying on multi-media and voice segments to create a niche for themselves in the broadband market.
While home networks present a portable technological solution to many homes due to the ease of sharing and accessing data, they also pose significant challenges to the end-users. The networks always fail, and the solutions are not easy to install as prescribed in user manuals and advertisements. Users usually attempt to solve the problems themselves or seek the services of a technologically enlightened family member or friend. As home networks evolve and advance, home network users will require professional maintenance and support services.
The challenges a home network user faces depend on the configuration of the network and the number of computers connected to the network. The challenges can be narrowed down into three categories; the challenges facing every home network user; Challenges in relation to configuration and set-up of the home-network; and those relating to advanced networks. Advanced home networks enable users to establish high-security levels within the network, manage how ports function and run versatile applications, and share all types of resources (“Best Practices,” 2011).
Viruses, malware, and spyware have been noted to contribute significantly to the challenges associated with home networks. Best Buy, one of the leading companies providing home installation and configuration services, reported that an increase in internet viruses resulted in the rapid growth of its business (Brendell, n.d). Home network users in The US increased from 2.5 million in 1998 to over 18 million in 2004. Wi-Fi is the most preferred mode of configuring home networks because its internet connection is untethered.
The exponential growth of home networks has created obstacles for CPE (Customer Premise Equipment) developers and ISPs who provided home networks as RG (Integrated Residential Gateway) solutions.
Most manufacturers advertise Wi-Fi devices as a simple plug and play devices, which is not the reality on the ground. They turn out to be extremely complicated to run in the eyes of the computer user. The main cause of the problem is the way manufacturers have personalized broadband software so that it can only operate on hardware devices produced by the same company, e.g., most modems will only accept the sim or U-SIM card of the company providing the services.
To establish a home network, most manufacturers require a separate password for every user. The security key will have to be entered anytime upon logging in. This has the effect of limiting the use of one computer to a particular user. Being compelled to use the manufacturer’s products poses a challenge where the manufacturer’s software is not compatible with the user’s operating system (“Wireless Networks,” 2002).
Home networks also slow the speed taken by a computer machine to boot. This is due to the updates that are operating systems and software search for on the internet every time the booting process takes place. In case of unavailability of an internet connection, the booting process is halted until the updates can be located. Virus software is the most notorious one in seeking updates. Many home network users often change the computer settings to avoid this liability. Doing so is not safe for the user as the computer may be infected by viruses until it is able to update again.
Another problem facing home-networks is the inherently high level of insecurity that they pose. It is very complicated to set up the security settings provided by the manufacturer. The settings only work if a home network user is using devices by one manufacturer in the network and is relying on software from the manufacturer( Deal, 2008 ). The software is designed in such a way that every user has to input a security key before logging in. This creates a problem where many users are sharing the home-network because the security software is designed to understand that only one user is relying on the Wi-Fi connection. Where a user is using hardware from diverse manufacturers to access the internet, the situation is worsened because the software has to be disabled manually every time the user has to connect to the internet so that the operating system can be able to adapt to the changes.
Home-networks are, in fact, susceptible to frequent failures. The failures give no warning as, on the surface, the network seems to be functioning smoothly. Failures are very easy to correct, but most computer users do not have an idea about the solution. The problem is solved by simply shutting down the computer and all the devices, then rebooting the entire system. Upon rebooting, the software has to be uninstalled and then re-installed (Brendell, n.d).
Security is a key feature of any network, be it a home network or an office network. Home networks, especially wireless ones, are faced y a myriad of security problems with regard to eavesdropping and authentication of the users on the network (“Best Practices,” 2012 ). While many service providers have devised methods to prevent third parties from accessing the network, no network has been proved 100% secure from intrusion so far.
When intruders hack into a network, they are able to intercept traffic, read the user’s emails, order and pay for items online using the user’s credit card, or even send nasty messages to employers and friends.
Wireless networks are particularly vulnerable to inappropriate eavesdropping because of their broadcast capability. The presence of a Wireless Access Point (WAP) makes it possible for anyone within the card’s broadcast range to receive the information being sent out of the network without interfering with the transmission of data within the network (Brendell, n.d). There must therefore be very strict security between the base station and the wireless card.
The main focus of WAP security administrators is the prevention of eavesdropping. This is usually achieved through encryption of data accomplished through the creation of static security keys. The other concern is the authentication of those who are able to access the home network. A physical port enables a system administrator to determine the people who are able to access the network on the basis of traffic generation. In a home-network, traffic should come from a similar source. If the port indicates another source of traffic, then someone without authority to access the home network is probably accessing it. Mapping users is more complicated in wireless networks than in wired ones. Identification of the users is required as a further reinforcement measure against unauthorized users. It can be done through the creation of passwords.
Wireless networks have become more popular among home users. The popularity has led to a reduction of the price of wireless networks and an increase in the bandwidth that wireless networks are able to offer as 5 GHz 802.11 wireless is capable of providing 54 MBps of data, a range that allows users to use DSL connections or cable modems. Outside users can easily access the ad-hoc connections created through wireless networks.
Security is very costly to home-network users as compared to large-scale network users such as companies. Corporations are able to buy the necessary equipment for security installation and pay experts to operate the security of the system. A small-scale user, on the other hand, is not in a position to afford expensive security equipment, let alone pay security professionals. Home-users are unable to afford radius serves and high capacity security gateways.
Due to limited options, home-network users tend to use the security features provided by the wireless manufacturers. Most of the wireless devices and software presently available in the market come with a built-in feature for security purposes known as Wired Equivalent Privacy (WEP).WEP functions through encryption of data. A person has to provide the key to be able to access the network. Most home-network users prevent intrusion and eavesdropping through reliance on WEP (“Wireless Networks,” 2002).
WEP is not as secure as home network users think it is. Experienced hackers have invented various techniques to get around it and break into the network. The most popular method employed by hackers involves eavesdropping on the packets and deactivating the key used to encrypt data. They are, therefore, able to access the network without the knowledge of the system administrator, who still thinks that the encryption key is functioning appropriately. The software most commonly used by a hacker known as AirSnort. It is able to guess the correct encryption key after it receives a certain number of wireless packets (“Wireless Networks,” 2002). The program is free on the internet, making it hassle-free for hackers.
Encryption also reduces the bandwidth, as about 40% is lost. It also provides security for outsiders only and not home users within the network who might also require having their data secured.WEP cannot be used where there is a large home network as it is only ideal for small environments.
Most administrators do not give much weight to security concerns. A study established that most of them would gladly use a network without any security over not having a network (Harold, 2004). The wireless network of Columbia University has been given as an example where practically no security measures have been put in place. Anyone with a DHCP or a wireless card can configure it and use the university’s network so long as they are close to the base station. The university has no system in place to track unauthorized use of its networks. Even some close cyber-cafes rely on the network to provide internet connections to customers. If such a large institution can be so reckless about the security of its system, how about a small scale home network user?
Other security measures implemented by system administrators include DHCP reservation and static IPS. Static IPs work by the rejection of addresses that do not match with the static IP and acceptance of those that do (Meyer, 2003). DHCP reservations work with The Mac operating system. Mac addresses are reserved in a pool. DHCP is used to grant access to the IP address or deny access if the MAC address is not recognized. The system is usually criticized as not being effective because it is very easy to change The MAC address on a wireless card. It is also very easy for a hacker to eavesdrop on the transmission of wireless packets, get the Mac address, and modify theirs to match with the Mac addresses on the database.
People generally look for free things, and with the popularity of wireless networks, more and more people are looking for places where they can pick free wireless signals to use for internet access. Wireless signals can be picked up by anyone within a sufficient broadcast range because of their broadband characteristic. Several wireless users try to locate susceptible points in home networks, which they might tap into and gain internet access. The practice is commonly known as wardriving (Brundell et al., n.d)
Free software easily available on the internet, such as Net Stumbler, practically enables “War drivers” to locate access points that are vulnerable. The practice literally involves driving I the neighborhood equipped with the software and antennae detecting the weakest access points. Softwares such as NetStumbler are able to pick up wireless signals together with the necessary information required to log into them. With bigger antennas, war drivers are able to pick up wireless signals in very wide areas. Mapping for future use is done using GPS devices.WEP security or a home network with no security is the easiest to access using Airsnort and NetStumbler
There are harmless war drivers whose only intention is to get access to free wireless internet, but there are others who are malicious and hell-bent on industrial espionage. They spy on the data of individuals who work at profitable corporate to gain information and then sell it to competitors (Harold, 2004).
Once war drivers spot an unsecured network, they advertise it n the internet, and the whole world, particularly the residents of the particular neighborhood, get to know about the weakness. Other users are therefore able to access the network without much hassle. Such users then compromise the network by doing illegal or prohibited things since nobody will be able to track them or hold them accountable.
Wardrivers leave signs that can be followed by subsequent interested persons to learn about the location of the unsecured network. The concept is known as war chalking (“Wireless Networks,” 2002). They leave the relevant information to access an unsecured base station by marking a place and writing down crucial information about the network. This may include the strength of the signal transmitted, whether the network is secured and the type of software used to secure the network, and the network’s SSID (Harold, 2008). Experienced war checkers who know how to read the marks only have to put on their wireless devices and do whatever they desire on the network.
To improve and enhance network security, network users can take a variety of steps and recommendations. For those using The Windows Operating System, the following measures can assist in securing their network.
Host-Based Solutions for Windows Operating System
- Moving to a more modern operating system. Those using earlier versions of Windows, such as Windows XP may consider migrating to Windows 7 and Windows Vista. This is because newer versions of Windows have more security enhancements that operate by default. The user must also ensure that the version of windows being used is able to update automatically.
- Install a Host-Based Security system: Such a system has anti-virus features, and at the same time, it safeguards safe browsing on the network. It also protects against third party intrusion and serves as a firewall as well. When these features work in collaboration, they give protection against spyware, malware, and other common threats.
- Limited use of The Administrator Account: Home network users should consider creating separate user accounts for every user on the network and a single administrator account. Use of the administrator account should be limited to installation if updates and configuration the host. Services like browsing, email access, sharing of multi-media content, and other general internet uses should be conducted via user accounts. Accessing the internet through an administrator account makes it easy for hackers to intercept data packets and get the security key. The accounts within the home-network should have lengthy, complex passwords.
- Using a Browser that is Capable of Sandboxing. Sandboxing features work by inhibiting malware from interfering with the operating system during the execution of services. The sandbox also alerts the user when there is a need to configure and install updates.
- Using a PDF Reader That is Capable of Sandboxing: The use of PDF files to transmit viruses and malware is on the rise.PDF readers with sandboxing features protect the network since they block strange URLs automatically.
- Use The Latest Versions of Microsoft Office: The most recommended ones are Microsoft Office 2007 and Microsoft Office 2010. This is particularly so for those using the home-network for the transfer of documents, spreadsheets, and powerpoint presentations through email. Documents should also be stored in the XML format (Meyer, 2003). The format ensures the use of malicious codes, which are normally transmitted through official documents. In Microsoft Office 2010, documents open as ROM documents in projected view thus malware cannot be transmitted from the file to the network.
- Regular Updates Of Softwares: Many home network users do not take time to ensure that all softwares in their system are up to-date. They are ignorant that it is not all softwares that come with an automatic update feature. Malicious attackers may use the un-updated applications to attack the host- server.
- Implemantation of FDE (Full Disc Encryption): This is mainly recommended for laptops and tabs. Windows 7 Ultimate and Windows Vista come with inbuilt FDE support. For earlier versions of Windows, the user can purchase FDE applications from the market.FDE works by preventing disclosure of data third parties if a user happens to lose the laptop or if the laptop is stolen.
Recommendations for the Mac Operating System
- Use an Updated Operating System: the Mac operating system should be configured to automatically update itself. Upon notification that an update is available, the user should provide the right information to ensure successful installation of the updates. The i-pad should be routinely updated through connecting a USB cable to an i-tunes host. This should be done at least one time in a month.
- Updating Application Software: there are those third party applications that automatically update themselves but there are those ones that do not have this feature. An Apple User should routinely check for updates.
- Limiting the use of The Administrator (Privileged) Account: Just like is the case for The Windows OS, user accounts should be created for general use of the internet. The privileged account should only be used for installation and configuration of the host server to avoid interception of the key by third parties.
- Data Protection Features for The Ipad: It is important to enable the password required t access encryption keys for the hardware, a feature controlled by the data protection application on the i-pad.
Activating The File Vault Feature, this is mainly for laptops and it works in a similar manner to FDE in The Windows OS. The File Vault Feature on The Mac OS prevents disclosure of data incase a laptop gets lost or stolen.It also creates a backup and prevents loss of data.
Network Based Recommendations
- Design of The Home Network: Most Internet Service providers sell a modem with both wireless features and routing capabilities. To maximize control over the home network, the home network user should consider implementing a personal router device to connect the device provided by The ISP.This way the home user is able to troubleshoot, install, and configure easily.
- Use of WPA 2 on Wireless Networks:WPA 2(Wi-Fi Protected Access 2 should be used over Wired Equivalent Privacy(WEP).This is because WEP has proved to be ineffective and is broken into within a matter of seconds by a hacker. Older devices may not be able to support The WPA 2 feature and therefore the user may have to upgrade his hardware or software.
- Disable External Administration of The Network: Administration of the home network should be done internally by the home administrator (“Best Practices”’ 2011).disabling external administration makes it impossible for a malicious attacker to access and compromise the home-network.
- Use of Alternative Domain Name Servers Providers: Domain Name servers (DNS) that are provided by The ISP are not effective security wise. For instance, they do not have the ability o block malicious or infected websites.
- Strong Passwords for Devices Used to Share Content within The Network: The password should not only be limited to The WAP. All devices on the network including printers used to share content should also be strongly protected.
Home network users should also be responsible about behavior relating to internet access. This involves:
- Avoiding Use of Wireless Hotspots: When travelling with mobile devices such as smart phones and laptops users are strongly advised to use the inbuilt Wi-Fi on the Smartphone or 3G or 4G internets for laptops. They should avoid free internet provided by through wireless hotspots in hotels, airports and such establishments. This is because most of the hot spots networks are not secure ad are easily hacked into. The information obtained when using a wireless hotspot can be used to gain access to the user’s home network
- Taking Caution when Exchanging Content on a Home-Network; Home network users are encouraged to have content sent to their work or school email accounts. This is because government and organizations’ hosts re more secure and re better positioned to detect malicious attacks as compared to the much weaker home networks.
- Avoiding Storing personal Information on The Internet: Most online services require uses to provide them with personal information relating to their bank accounts, VISA cards, ID cards, and other vital personal details. This information is then very difficult to remove afterwards. Attackers may use it to compromise a user’s home network (Brundell et al., n.d).
- Policy on Social Media Sites; The use of social media sites has proliferated and thy rare being used to share information with friends and family. The sites are risky because network users do not exercise caution of the information that they transmit and exchange over the networks. They easily post information relating to addresses, phone numbers, and work places. The information can later be used to stalk or harass them. Since the sites have lax security policies, content containing malware is easily posted and shared on social media (“Best Practices”, 2011). Home network users should keep updating the privacy 0f the information available on social media.
- Installation of SSL Encryption: SSL encryption protects the privacy of information when it is being transmitted. It also prevents impersonification by other browsers in public hotspots when logging in. Most internet applications are SSL enabled but a home network user should always countercheck since the feature is not universal for all web applications.
- Email Protection: Attackers normally use emails to infiltrate home networks. Email accounts are a favorite for hackers who spread threats. To avoid this, home network users may use different usernames for different email accounts so that it becomes difficult to track their email activity. They should also use the services of SSL enabled email providers such as Gmail. Mails containing attachments from strange sources should be deleted without further ado.
The design and installation of home network is often not transparent to the home network users. It has also proven difficult or home-network users to integrate the network use into their daily routines. They also have no clue about transmission of data packets or movement of traffic from their network. There are challenges in coordinating home-networks particularly with regard to sharing resources, administering the network, and troubleshooting.
In terms of demographics, teenagers are the ones in a position to use more time on the internet. As for parents, they only have a short time-limit as they spend most of the day at work, and the hurt time afterwards engaging in domestic chores.
Some parents have also invented a form of “Parental control” by limiting the home network to certain rooms of the house. The most common procedure is to have the home-network connection in the sitting room, the kitchen, and the parent’s bedroom. Teenagers can only access the internet from the table room where their activities can be supervised.
Impediments are washing away the enumerated benefits of home-networks. Home networking hardware and software are among the most returned electronic equipment in stalls all over the world (“Wireless Networks”. 2002). A research in 2006 established that over a quarter WAPs were returned to stores, not because they had any faults or defects on them, but primarily because users were unable to properly install and configure them. On the surface, home network problems seem like problems that can be easily solved by product vendors and Internet Service Providers. The main challenge with home networks is the same protocols designed for the entire internet are applied in the home context.
Conclusion
To provide relief the challenges faced by home network users, Internet Service providers and the other manufacturers involved with broadband connections will have to speed up their game. This can be done by developing various applications such as: Parental control and other internet security application; Automation of basic functions by developing utility soft5wares such as Virus scans and disc scans; Assisting in transfer of multi-media resources between resources in the home network; and providing improved broadband softwares and hardware in the market. Such broadband modems should be simple to install, configure, and troubleshoot (Meyer, 2003).
Manufactures ought to follow the 802.11 standards for home-networks set by The Institute of Electrical and Electronic Engineers (IEEE).The main weakness of these standards is that they are not rigidly enforced and are not binding on every manufacturer. They therefore fail to prevent manufacturers from developing softwares that limit the user to using their products only and to keep updating and upgrading the software.
Home-network users have to ensure that they have first-hand information on the software and hardware devices they use, as information is integral to problem solving. It is also prudent to buy all the devices and softwares from the same manufacturer to avoid compatibility problems. Having a network expert on standby to solve network issues is also commendable.
The existing home-network security features and softwares have proved to be very expensive for the average home-user and are also ineffective since they are susceptible to intrusion by third parties. Home-users are also reluctant to buy extra security features as they are satisfied using the ones that come from the manufacturer of the wireless device (“Best Practices”, 2011). Network administrators should consider the need to stop relying on WEP and WEP2 softwares for security since hackers are easily able o intercept encrypted information and get access to the security key. A radius server should be added to WEP security to guarantee valid authentication of users of the home network.WEP should also be enhanced to adopt SSL features, which requires authorization via a certificate before one can obtain the network key.
Gateway solutions between the base station and the other devices on the network have been suggested as a viable home network security solution. Many improvements will have to be done on gateway solutions to make them more credible. For instance, authentication of the network user will have to be accomplished without downloading and installing an interface. The gateway solutions will also have to be modified and become universal so that they are compatible with all operating systems in the market (Harold, 2008).
Currently, no solution in the market is an effect for solving network security concerns. Protection of the network can only be assured where the machines in the network are identical to each other and all the machines are using similar operating systems. Where there are machines of different makes in the home network, most security programs are unable to function effectively.
The threat of having strangers accessing data packets and using the home network free is further complicated by existence of war drivers. The information as to vulnerable networks increases daily in the web with the rate of increase in popularity of wireless devices. This increases the number of people who can hack into a home-network and use the information they obtain for malicious purposes.
Management of the network is becoming more crucial as network connection is expanding to more devices in the home including televisions. Network engineers should therefore focus on simplifying the procedures and tools required to configure a network so that laymen do not find it hard to configure and install their home networks. This is putting into mind that the average home user does not understand how protocols work and does not have a clue about web scripting languages (Brundell et al., n.d)
The quality of the network that home users receive also needs to be reviewed. Home networks are currently the most afflicted by network congestion. Quality of Service devices needs to be applied to the major services being relied upon by home network users. This can be achieved through accuracy in the identification and categorization of traffic.
Network engineers must also ensure that home-networks are flexible. Home network users keep adding new devices to the network, and the devices have an impact of hanging the traffic trends resulting in congestion of the network or slow internet connections. The networks have o be flexible so that they are not affected by such simple changes. The geographical location of the home also has an impact on how well signals are received and transmitted. Appropriate advice should therefore be given to home network users before they embark on an installation mission (“Best Practices”, 2011).
All is not lost for home network users. Security is bound to improve with the improvements in bandwidth and encryptions. At one point in future, the security of wireless home networks will be at par with that of wired networks. Meanwhile, administrators must put every measure into place to ensure that war drivers are not able to locate weak access points in their network ad advertise the information on the internet because it would have detrimental effects on the network users.
References
“Best Practices for Keeping your Home Network Secure”. The Information Assurance Mission at NSA. Web.
“Discover and learn,” WI-Fi Alliance. Web.
“Frequently Asked Questions,” Home Plug Power line Alliance, Web.
“Wireless Networks: Security Problems and Solutions”. Sans Institute Infosec Reading Room. Web.
Briere, D., & Hurley, P. (2010). Wireless Home Networking For Dummies. Hoboken, NJ: Wiley. Britanica. Web.
Brundell, P. et al. (n.d). The Network from Above and Below, Faure Deal, R. (2008). Cisco Certified Network Associate study guide (exam 640-802). New York: McGraw-Hill Professional.
Harold, D. (2004). Absolute beginner’s guide to Wi-Fi wireless networking. New York: Que Publishing. Web.
Jean-Philippe. “IEEE P1901 Draft Standard for Broadband over Power Line Networks: Medium Access Control and Physical Layer Specifications,” IEEE Standards Association. Web.
Meyer, M. (2003). Mike Meyers’ A+ Guide to PC Hardware. New York: McGraw-Hill Professional. Wangerien, Brian. “The Challenges of Wi-Fi.” Communications News. Encyclopedia.
Wilson, Tracy V., and John Fuller. “How Home Networking Works” 2001. HowStuffWorks. Web.
Yan, Z., Jun, Z., & Miao, M. (2008). Handbook of research on wireless security. Hershey, PA: Idea Group Inc (IGI).