Using A Wlan; Setting Up A Wlan; Protecting Your Wlan - HP Mini 210-1150 User Manual

Hp mini 210-1150: user guide
Table of Contents

Advertisement

Using a WLAN

With a WLAN device, you can access a wireless local area network (WLAN), which is composed of other
devices and accessories that are linked by a wireless router or a wireless access point.
NOTE:
The terms wireless router and wireless access point are often used interchangeably.
A large-scale WLAN, such as a corporate or public WLAN, typically uses wireless access points
that can accommodate a large number of devices and accessories and can separate critical
network functions.
A home or small office WLAN typically uses a wireless router, which allows several wireless and
wired devices to share an Internet connection, a printer, and files without requiring additional pieces
of hardware or software.
To use the WLAN device in your computer, you must connect to a WLAN infrastructure (provided through
a service provider or a public or corporate network).

Setting up a WLAN

To set up a WLAN and connect to the Internet, you need the following equipment:
A broadband modem (either DSL or cable) (1) and high-speed Internet service purchased from an
Internet service provider (ISP)
A wireless router (purchased separately) (2)
Computer equipped with a wireless device (3)
The illustration below shows an example of a wireless network installation that is connected to the
Internet.
As your network grows, additional wireless and wired devices can be connected to the network to access
the Internet.
For help in setting up your WLAN, refer to the information provided by your router manufacturer or your
ISP.

Protecting your WLAN

It is essential to understand that because the WLAN standard was designed with only limited security
capabilities—basically to foil casual eavesdropping rather than more powerful forms of attack—WLANs
are vulnerable to well-known and well-documented security weaknesses.
WLANs in public areas, or "hotspots," like coffee shops and airports may not provide any security. New
technologies are being developed by wireless manufacturers and hotspot service providers that make
the public environment more secure and anonymous. If you are concerned about the security of your
computer in a hotspot, limit your network activities to noncritical e-mail and basic Internet surfing.
32
Chapter 4 Internet

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mini 210-1160Mini 210-1180Mini 210-1190210-1150

Table of Contents