Using a wlan, Setting up a wlan, Protecting your wlan – HP Envy 15-1002xx Notebook PC User Manual

Page 26: Setting up a wlan protecting your wlan

Advertising
background image

Using a WLAN

With a WLAN device, you can access a wireless local area network (WLAN), which is composed of other
computers and accessories that are linked by a wireless router or a wireless access point.

NOTE:

The terms wireless router and wireless access point are often used interchangeably.

A large-scale WLAN, such as a corporate or public WLAN, typically uses wireless access points
that can accommodate a large number of computers and accessories and can separate critical
network functions.

A home or small office WLAN typically uses a wireless router, which allows several wireless and
wired computers to share an Internet connection, a printer, and files without requiring additional
pieces of hardware or software.

To use the WLAN device in your computer, you must connect to a WLAN infrastructure (provided through
a service provider or a public or corporate network).

Setting up a WLAN

To set up a WLAN and connect to the Internet, you need the following equipment:

A broadband modem (either DSL or cable) (1) and high-speed Internet service purchased from an
Internet service provider (ISP)

A wireless router (purchased separately) (2)

The wireless computer (3)

The following illustration shows an example of a wireless network installation that is connected to the
Internet.

NOTE:

When setting up a wireless connection, be sure that your computer and wireless router are

synchronized. To synchronize your computer and wireless router, turn your computer and wireless
router off and then back on.

As your network grows, additional wireless and wired computers can be connected to the network to
access the Internet.

For help in setting up your WLAN, refer to the information provided by your router manufacturer or your
ISP.

Protecting your WLAN

Because the WLAN standard was designed with only limited security capabilities—basically to foil casual
eavesdropping rather than more powerful forms of attack—it is essential to understand that WLANs are
vulnerable to well-known and well-documented security weaknesses.

16

Chapter 3 Wireless and local area network

Advertising