IntroductionWelcome| 00:04 | Hi! I am Garrick Chow and
welcome to Small Office Networking.
| | 00:07 | This course is for anyone interested in
learning how to put together a home or
| | 00:10 | small office network for the purpose
of sharing an Internet connection, files,
| | 00:14 | or a network printer.
| | 00:15 | We'll begin with an overview of
exactly what a small network is, and what a
| | 00:18 | common network configuration looks like.
| | 00:20 | We'll also take an in-depth look at how to
set up and manage the wireless part of your network.
| | 00:25 | Once we're up and running, I'll
demonstrate how to share files between computers
| | 00:28 | running Windows, MacOSX, or a combination
of both platforms. And you'll also see how
| | 00:33 | to share network devices like printer
and hard drives, so all the computers on
| | 00:37 | your network can use the same resources.
| | 00:38 | We'll be covering all of this, and lots
more, so let's started with Small Office
| | 00:42 | Networking to Connect, Share, and Print.
| | Collapse this transcript |
|
|
1. Networking BasicsWhat is a network?| 00:00 | So what exactly is a
network, and why do you need one?
| | 00:04 | Well, a network is simply two or
more computers that are being connected
| | 00:07 | together so they may communicate with
each other in order to share files, such
| | 00:10 | as movies, music, photos, and documents,
and often so that they can share resources,
| | 00:15 | such as a single Internet connection.
| | 00:17 | These computers may be connected by
physical cables, or they may communicate
| | 00:20 | wirelessly if they're equipped to do so.
| | 00:23 | More and more these days, the devices
on your network probably aren't all going to
| | 00:26 | be computers either.
| | 00:27 | At various times you may have printers,
Webcams, Smart phones, gaming consoles,
| | 00:31 | stereos, DVRs, and all kinds of other
devices connected to your network and
| | 00:35 | sharing information and
resources with each other.
| | 00:38 | But how do you get all of these
devices connected together into a network?
| | 00:42 | These days the most common device used
to network devices together is a router.
| | 00:46 | Routers can support just wired
connections over Ethernet cables or, much more
| | 00:50 | commonly these days, routers can
operate both wired and wirelessly.
| | 00:55 | There's really very little reason to get
a router that's not capable of wireless
| | 00:58 | communication unless you concerned
about security, but we'll see later how to
| | 01:01 | secure your wireless network.
| | 01:02 | So the purpose of the router is to
act as the main traffic controller for
| | 01:06 | your entire network.
| | 01:08 | It allows each device to see and
communicate with all of the other devices, and it
| | 01:11 | routes the data to the proper devices.
| | 01:14 | The router is also what allows you to
share a single Internet connection among all
| | 01:17 | of your computers and devices.
| | 01:19 | When you subscribe to Internet service,
your Internet service provider, or ISP,
| | 01:24 | gives you a modem, which is the device
that communicates with your ISP and provides
| | 01:27 | the Internet service to your home or office.
| | 01:30 | You plug the modem into your router, which
gives all network computers access to the Internet.
| | 01:34 | I should also mention here that it's
fairly common these days for your ISP to
| | 01:37 | provide you with a combination modem
and wireless router, so you might not even
| | 01:41 | have a choice when it comes purchasing a router.
| | 01:44 | But in the sense, you can think of your
router as the device that bridges the
| | 01:47 | two networks together.
| | 01:49 | You have your home network, which is all
the computers connected to your router,
| | 01:52 | and it's called the LAN, or Local Area
Network. And you have the rest of the
| | 01:56 | Internet, which is considered by your
router to be another network, and in
| | 02:00 | relation to your network is
called the WAN, or Wide Area Network.
| | 02:04 | On the back of most routers, you will
see a port label WAN to indicate the place
| | 02:07 | where your plug in the broadband modem.
| | 02:09 | And at all times the router acts
as the main traffic controller.
| | 02:12 | If the computer on the left wants to
send a file to the computer down here, the
| | 02:16 | data first goes to the router, and the
router sends to the correct computer.
| | 02:20 | If the computer on the left wants to
send a file out to another computer on the
| | 02:23 | Internet, the data first hits the router,
the router sees that it supposed to go
| | 02:26 | out to the Internet, and then it sends
the data to the modem, and then the files head off
| | 02:30 | to their destination.
| | 02:31 | Now you maybe wondering how the router
keeps track of which computer is which.
| | 02:36 | Well part of the router's job is to
assign each device connected to it a unique
| | 02:40 | address known as an IP address. When you
connect your computer to the router, the
| | 02:45 | router, using a technology called DHCP,
provides the computer an IP address that
| | 02:49 | looks something like these.
| | 02:52 | Each subsequent computer or device
you add, whether it's a wired or wireless
| | 02:55 | device, is also assigned
its own unique IP address.
| | 02:59 | Notice that it's normally just the last
set of the numbers in the address that
| | 03:02 | are different, so we have 192.168.1
which they all have in common, but the last
| | 03:07 | numbers are all different;
more on this little later.
| | 03:09 | Even the router itself has an IP
address, so you'll be able to access and
| | 03:13 | change its settings.
| | 03:14 | We'll see that in an upcoming movie.
| | 03:15 | Now the thing to understand here is
that these addresses are all LAN, or Local
| | 03:20 | Area Network, addresses.
| | 03:21 | They mainly apply, and are significant
to, the devices on your local network.
| | 03:25 | When the WAN, or Internet side of things,
is considered, you have a couple other
| | 03:29 | addresses to understand. Just like
how your router assigns each device or
| | 03:33 | network its own IP address, your
Internet service provider also assigns a
| | 03:36 | unique IP address to your
router. This known as the WAN address.
| | 03:41 | The WAN address is your unique
address across the entire Internet; no other
| | 03:45 | router, computer, or
device shares your WAN address.
| | 03:47 | So you can see that the router
has both a WAN and a LAN address.
| | 03:52 | Now this may seem complex at first,
but it's really a very organized system.
| | 03:55 | I like to think of the routers WAN
address as the address of an office building,
| | 04:00 | and the LAN address as the numbers of
each individual office in that building.
| | 04:03 | If I were to order a pizza to be sent
to my office, but I didn't provide my
| | 04:07 | office number, the pizza would only
get as far as the building's lobby.
| | 04:11 | The security guard would then asked who
the pizza was supposed to go to, look up
| | 04:14 | my office number, and then have it sent up to me.
| | 04:17 | Similarly, the router acts as kind of the
doorman, and provides a certain level of
| | 04:20 | security to your network.
| | 04:21 | For example, if I bring up a Web page on
one of my network computers, the request
| | 04:25 | is sent through the router to
the server hosting the Web page.
| | 04:29 | As far as that server is concerned, it
only knows that a request came from a
| | 04:32 | computer at my WAN address, when the
page is sent back my router knows which
| | 04:37 | computer requested that
information, and it sends the data through.
| | 04:40 | And if this communication were
intercepted or eavesdropped on by a hacker, they
| | 04:44 | would only know my WAN address, but not
my LAN address, making it more difficult
| | 04:48 | to access my specific computer.
| | 04:50 | So IP addresses are the way your
individual computers and devices are identified
| | 04:55 | on your network, and they are assigned
and managed entirely by your router.
| | 04:59 | Now this is a very broad overview, and
we will be getting into much more detail
| | 05:02 | about a lot of the information I've
covered here, but for now this should give
| | 05:05 | you a basic understanding of
what a network is, and how it works.
| | Collapse this transcript |
| Connecting two computers together| 00:00 | At its most basic, a network is simply
a connection, either wired or wireless,
| | 00:04 | between two computers.
| | 00:06 | These days a computer to computer
connection is not that common because most
| | 00:09 | Internet connected homes and offices
have routers to manage the network.
| | 00:13 | But there are many times when you need
to copy a document, or other file, from
| | 00:16 | one computer to another when the
network isn't available; for instance in a hotel
| | 00:19 | room, or on a plane.
| | 00:21 | In those cases, all you need
is a single Ethernet cable.
| | 00:24 | These are often referred to as
network cables, or as Cat 5, or Cat 6 cables.
| | 00:28 | Cat 6 cables look identical to Cat 5
cables, but offer faster transfer speeds.
| | 00:33 | Either one will work though.
| | 00:35 | And of course, both computers will need to
have Ethernet ports to plug the cable into.
| | 00:38 | They look like this.
| | 00:41 | Nearly all desktop computers have
Ethernet ports, as do most notebook
| | 00:44 | computers, although you'll find the some
small notebooks and subnotebooks do not,
| | 00:48 | in which case you'll have to create your
connection wirelessly, and we'll look at
| | 00:50 | how to do that in a later chapter.
| | 00:53 | But both of my computers here do have
Ethernet ports, so I'll plug one end of my
| | 00:56 | cable into one computer, and I'll
complete this two computer network by plugging
| | 01:02 | the other end of the cable
into the other computer.
| | 01:05 | Now I still have to make sure the two computers
can see and talk to each other, but we'll be
| | 01:08 | covering how to get computers to
recognize each other over a network a little
| | 01:11 | later. But this is it as far as
making the physical connection goes.
| | 01:15 | Now as I mentioned, this isn't really
a practical way to network computers
| | 01:18 | together these days, but it's possible
to make something like this work in a
| | 01:21 | pinch with no other hardware required.
But if I want to add more computers to
| | 01:24 | the mix, or share resources like a
printer, or an Internet connection, we need to
| | 01:28 | add some special devices to the network.
| | 01:29 | I'll talk about that in an upcoming movie.
| | Collapse this transcript |
| Connecting multiple computers| 00:00 | When you have two or more devices that
need to communicate with each other, and
| | 00:03 | share an Internet connection,
you'll need more than just one cable.
| | 00:06 | To let the devices communicate with each
other you'll need a device called a switch.
| | 00:10 | A switch usually has four or more Ethernet
ports, and it acts as a traffic controller
| | 00:14 | for your network, passing
information to and from each device.
| | 00:18 | Using a switch is great for local
file and printer sharing, but to connect
| | 00:21 | your network to the
Internet, you will need a router.
| | 00:24 | These are often called combination
routers, which are the most common kind you'll
| | 00:28 | find for home and small offices, and
they perform the role of a switch by
| | 00:31 | letting all of the devices connected
to it communicate with each other. But
| | 00:34 | they also pass information back and
forth between your network and the
| | 00:37 | Internet, which as you might recall
from earlier in this chapter can be
| | 00:40 | thought of as one enormous network.
| | 00:42 | So in that sense a router
connects networks together.
| | 00:45 | These are all examples of combination
routers. As you can see, they all look
| | 00:50 | pretty different from each other.
| | 00:52 | But generally, all routers have at
least three Ethernet ports to connect your
| | 00:55 | computers to, and they always have
another Ethernet port labeled either WAN, for
| | 00:59 | Wide Area Network, or simply Internet,
or in the case of the Apple AirPort
| | 01:03 | Extreme, it has an Ethernet
port with a little circle of dots.
| | 01:07 | In each case, this is where you plug in
the cable that comes from your modem
| | 01:09 | your Internet service provider gave you,
and it's what allows you to share this
| | 01:12 | single Internet connection with
every computer on your network.
| | 01:15 | Now its' also becoming more common for
Internet service providers to issue a
| | 01:19 | combination modem/router.
| | 01:21 | They basically just put both devices
into a single unit, so we'll still have
| | 01:24 | multiple Ethernet ports to plug your
computers into, and it will still have a
| | 01:27 | port that you plug your Internet cable into.
| | 01:29 | It just eliminates the
need for an external modem.
| | 01:33 | So, as I discussed earlier, the router acts
as your network's connection to the Internet.
| | 01:37 | It distributes IP address to each
computer connected to it, and manages the
| | 01:41 | traffic to and from each computer,
regardless of whether the traffic is internal
| | 01:44 | to your local network, or
going to and from the Internet.
| | 01:48 | An additional switch is used when you
need to add more computers to your network,
| | 01:52 | but no longer have any more available ports.
| | 01:53 | You simply run a cable from one of
the ports on your router to the switch,
| | 01:57 | and then you can plug your additional
computers, printers, or other network devices in.
| | 02:01 | I will show you how to do
that in a later chapter.
| | 02:04 | Now, unlike a router, a switch does not
distribute IP addresses. Its main job is
| | 02:08 | to expand your network.
| | 02:10 | You could plug all of your computers
into a switch, and they'd be able to
| | 02:13 | communicate with each other, but you
wouldn't have any of the benefits offered by a
| | 02:16 | router, like a Firewall, or Internet Sharing.
| | 02:19 | So if you need a share an Internet
connection or other data between multiple
| | 02:22 | computers, you definitely need a router.
| | 02:24 | Again, your Internet service provider
might've given you a router already, and
| | 02:27 | if so, you should be all set.
| | 02:29 | But if you need to add additional devices to
your network, you'll want to pick up a switch.
| | 02:33 | Now, you may be wondering where
wireless networking fits into all of this.
| | 02:37 | We have got an entire chapter
dedicated to wireless networking, but for now,
| | 02:41 | just know that routers these days have
Wi-Fi capabilities, and that computers on
| | 02:44 | your network that connect to the router
over Wi-Fi behave pretty much just as
| | 02:47 | they do when they have a wired
connection. More on that a little later.
| | Collapse this transcript |
| Understanding wired connections on Windows| 00:00 | For the most part, when you plug your
Windows computer into a router with an
| | 00:03 | Ethernet cable, it should be
automatically connected to your network with no
| | 00:07 | configuration or setup needed on your part.
| | 00:09 | But I still think it's important to
understand exactly what happens when you
| | 00:12 | connect to your network.
| | 00:13 | First let's make sure you will be
able to see the same icons in the
| | 00:16 | notifications area of the
taskbar that you see here in this movie.
| | 00:19 | You most likely already have this
network icon in your notifications area,
| | 00:23 | but in case you don't, click the arrow next
to the notification area, and choose Customize.
| | 00:28 | In this window find Network, and make sure its
Behavior is set to Show icon and notifications.
| | 00:33 | If you don't see Network here, click
Turn system icons on or off, and in here
| | 00:38 | make sure Network is set to On.
| | 00:40 | And while you are in here you might want
to make sure other icons are showing or
| | 00:43 | hidden, but I just want to make
sure that Network shows up right now.
| | 00:47 | So this icon is the quickest way to
check the status of your network connection.
| | 00:50 | When I roll over it, I can see that I
am currently not connected to a network,
| | 00:53 | but that connections are available.
| | 00:54 | If I click the icon, I see a list of
all the wireless networks my computer can
| | 00:58 | detect, but I'm not interested in
wireless networks at the moment.
| | 01:01 | I want to show you what happens
when you plug in a network cable.
| | 01:04 | So I am going to go ahead now and connect my
computer to my router with an Ethernet cable.
| | 01:08 | And you can see that the icon is now
changed to reflect that I have a wired connection.
| | 01:13 | It looks like a computer monitor with a
tiny Ethernet cable next to it now. And
| | 01:17 | when I roll my mouse over that icon, I
could see I am connected to my router, it
| | 01:21 | says I am connected to
Network 3, and I have Internet access.
| | 01:24 | And I can test that by opening my Web
browser, and going to a Web page.
| | 01:32 | I can see that works.
| | 01:33 | Now let's look at some
details to see what's going on here.
| | 01:36 | I am going to click my Network icon again,
and choose Open Network and Sharing Center.
| | 01:42 | This gives an overview
of my network connections.
| | 01:45 | At the top, you can see my computer
is connected to my router, in this case
| | 01:48 | Network 3, which is connected to the Internet.
| | 01:51 | Underneath that on the right-hand
side, I can see I have a Local Area
| | 01:54 | Connection, which is another way of
saying I'm connected to my router via Ethernet.
| | 01:57 | I will click Local Area Connection,
which gives me the Status window, and the
| | 02:02 | information in here lets you know
things like how long you have been connected
| | 02:04 | to your network, and the
speed of your connection.
| | 02:07 | You can see I am getting gigabit speeds here.
| | 02:09 | What I really want to show you here,
though, is found by clicking Details.
| | 02:12 | Now, there is a lot of stuff in here
you will probably never need to concern
| | 02:16 | yourself with. What I want to point out
is that this is where you will find
| | 02:18 | your IP address, labeled here as IPv4 Address.
| | 02:22 | But you can just call it your
IP address, or IP for short.
| | 02:26 | In this case, the IP address of
this computer is 192.168.1.117.
| | 02:32 | As we discussed earlier, every computer
on your network gets its own unique IP
| | 02:35 | address, which is assigned by your router.
| | 02:38 | Notice that DHCP Enabled is set to Yes.
| | 02:42 | DHCP stands for Dynamic Host
Configuration Protocol -- not that you need to
| | 02:46 | know that -- but it simply means that
when DHCP is enabled on your computer, or
| | 02:50 | whatever device you are connecting to
your network, your router assigns it an
| | 02:53 | available IP address.
| | 02:55 | In almost all cases, the first three
groupings of numbers before each period in
| | 02:58 | an IP address -- these are called octets -- are
going to be the same for every device
| | 03:03 | connected to the same network, which
can be convenient if you ever need to
| | 03:06 | remember the IP address of a
particular computer. And in that case, you will
| | 03:10 | only need to remember the last octet
as long as you know the first three are
| | 03:13 | the same for each device.
| | 03:15 | So in this case I would only need
to remember 117, because I always
| | 03:18 | remember 192.168.1.
| | 03:21 | Notice the Default Gateway is 192.168.1.1.
| | 03:26 | The gateway is another term for your router.
| | 03:28 | Your router's address is
almost always going to be 1.
| | 03:31 | And as you will see in upcoming movies,
this is the address we type into our Web
| | 03:34 | browser to work with the router's settings.
| | 03:37 | So if you ever forget, or need to figure
out, what the address of your router is,
| | 03:40 | this is where you will find it.
| | 03:41 | But as you can see, there's really
nothing to set up when connecting your
| | 03:44 | computer directly to your
router with an Ethernet cable.
| | 03:46 | Just plug in, and you should be able to
connect to other computers and devices on
| | 03:49 | your network, and browse the Internet.
| | 03:51 | Now on the off chance you don't have an
IP address, or you can't seem to connect to
| | 03:55 | other computers on your network or to
the Internet after plugging the cable into
| | 03:58 | your computer, here is one thing you can check.
| | 04:00 | I am going to go back to the Network
Sharing Center; I am going to click
| | 04:04 | Change adapter settings.
| | 04:06 | That shows you all the different
connection types your computer has.
| | 04:09 | As you can see, I have a Bluetooth
Network Connection, I have a Local Area
| | 04:13 | Connection, which again is another way
of saying Ethernet. Actually, I have two
| | 04:16 | Ethernet cards in this particular
computer, so you can see I have Local Area
| | 04:19 | Connection 2, and I have a Wireless
Network Connection, and actually I have a
| | 04:23 | second Wireless Connection
2, which is currently disabled.
| | 04:26 | Now to troubleshoot the Ethernet
connection, I am going to right-click on it,
| | 04:29 | and choose Properties.
| | 04:32 | In this window, I am going to locate
Internet Protocol Version 4, (TCP/IPv4),
| | 04:37 | and double-click it.
| | 04:40 | And in here I am going to make sure Obtain
an IP address automatically is selected.
| | 04:44 | That should be the default state of
pretty much all computers running Windows,
| | 04:47 | but it's possible your setting was
changed by you, or someone else using your
| | 04:50 | computer. So if you are not getting an
IP address, come in here and check to
| | 04:54 | make sure this option is selected.
| | 04:56 | The only time you would choose Use the
following IP address is when you want
| | 04:59 | to assign a static IP address to your
computer, meaning, when you want your
| | 05:03 | computer to always have the same exact
address on your network, which can be
| | 05:06 | useful, but right now I want to make
sure we are focused on making sure the
| | 05:09 | router can assign the computer an IP address.
| | 05:11 | So I am going to leave this
selected and click Cancel.
| | 05:14 | Again, you probably won't have to go
in and make that change, but I wanted to
| | 05:17 | make sure you knew where that setting
was, just in case you're having trouble
| | 05:20 | receiving an IP address from your router.
| | Collapse this transcript |
| Understanding wired connections on Mac OS X| 00:00 | Now let's take a look at what happens
when we connect a Mac to our network
| | 00:03 | via an Ethernet cable.
| | 00:05 | Here in OS X, I am going to go to
System Preferences, and select Network.
| | 00:10 | So here on the left side of the
Preference pane, I have a list of all the
| | 00:13 | network devices installed on my Mac.
| | 00:15 | Notice that Ethernet -- in this case
Ethernet 1, because I've two Ethernet ports on
| | 00:18 | this Mac -- but notice that it is
currently red, and it says Not Connected.
| | 00:23 | That means that my Mac knows I'm
not currently plugged into my router.
| | 00:26 | I am going to go ahead and plug the
cable into my Mac now, and after just a
| | 00:30 | second, Ethernet 1 gets a green
light, and its status says Connected.
| | 00:34 | Now my Ethernet Connection was already
at the top of this list, but generally
| | 00:38 | your primary connection is always
going to be at the top of this list.
| | 00:40 | Notice Wi-Fi is on, but I am not
connected to any networks right now.
| | 00:43 | I have a little yellow light right now.
| | 00:45 | If Wi-Fi were being used as my primary
connection, it would move to the top of
| | 00:48 | the list. We will see that a little bit later.
| | 00:49 | But just so you know, you can have both
Ethernet and Wi-Fi, or AirPort as it was
| | 00:54 | called in earlier versions of
Mac OS X, running simultaneously.
| | 00:58 | Your Mac will always use the fastest
connection, though, which is Ethernet. It
| | 01:01 | will only switch to the AirPort or Wi-Fi
connection if Ethernet becomes
| | 01:04 | unavailable or sluggish.
| | 01:07 | Now with Ethernet selected, I
get some information on the right.
| | 01:10 | I could see the Status is Connected,
and that its IP Address is 192.168.1.135.
| | 01:16 | As we saw earlier, every computer on
your network gets its own unique IP
| | 01:20 | address, which is assigned by your router.
| | 01:23 | Notice that Using DHCP is
the default Configuration.
| | 01:27 | DHCP stands for Dynamic Host
Configuration Protocol, not that you need to know
| | 01:31 | that, but it simply means that when
using DHCP is selected on your Mac, which is
| | 01:35 | the default selection, your router
assigns it an available IP Address.
| | 01:39 | In almost all cases, the first three
groupings of numbers before each dot or
| | 01:43 | period that you see here, and these are
called octets; they are going to be the
| | 01:46 | same for every device connected to the
same network, which is convenient because
| | 01:50 | if you ever need to remember the IP
address of a particular computer, you only
| | 01:53 | need to remember the last octet, as
long as you know that the first three are
| | 01:56 | the same for each device.
| | 01:58 | In this case, it's 192.168.1.
| | 02:01 | Some routers use the 10.1.10 naming convention.
| | 02:05 | Notice that we can see here that the
router's address is 192.168.1.1.
| | 02:10 | Your router's address is almost always
going to be 1, and as you will see in
| | 02:13 | upcoming movies, this is the address we
type in to our Web browser to work with
| | 02:16 | the router's settings.
| | 02:18 | So if you ever forget, or need to figure
out, what the address for your router is,
| | 02:21 | this is where you will find it.
| | 02:23 | But as you can see, there is really
nothing else to set up when you are
| | 02:25 | connecting your Mac directly to
your router with an Ethernet cable.
| | 02:28 | You just plug the cable in, and you
should be able to connect to other computers
| | 02:31 | on your network, and to the Internet, right away.
| | Collapse this transcript |
| Understanding network connections| 00:00 | Before we finish this chapter I want to
go over some important information about
| | 00:04 | network speeds, and how speeds are
affected by wired and wireless connections.
| | 00:08 | This is useful information to
understand so you can make informed
| | 00:11 | decisions about what equipment
you'll need when putting together your
| | 00:13 | small office network.
| | 00:16 | Let's start with the assumption that
you're going to buy the most common type of
| | 00:18 | router; the all-in-one device that
supports both wired and wireless connections.
| | 00:22 | This type of router lets you plug in
computers and other devices via Ethernet,
| | 00:26 | it lets you connect wireless computers
to your network, and it allows you to share
| | 00:29 | a single Internet connection among all
the devices connected to your network.
| | 00:33 | Now the most important thing to figure
out here is to determine what kind of
| | 00:36 | speed you want to have over your network.
| | 00:39 | The speed of the network effects how
quickly you can transfer files from one
| | 00:42 | computer to another.
| | 00:43 | If you don't have, or foresee, much need
to transfer large files between computers
| | 00:47 | on your network, you can get just about
any router that supports both wired and
| | 00:51 | wireless connections.
| | 00:53 | Most routers support a wired
connection speed of 100 Mb per second.
| | 00:57 | That means that each computer connected
to the router by Ethernet can transfer
| | 01:01 | files to each other at 100 MB
per second, which is pretty fast.
| | 01:04 | For example, a 1 GB video file would take
just a little over a minute to copy over.
| | 01:09 | But you'll also find that more and
more routers these days are supporting
| | 01:13 | transfer rates of 1 Gb per second.
| | 01:15 | At that kind of speed, a 1 GB file
would only take a few seconds to copy from
| | 01:19 | one computer to another.
| | 01:20 | Of course, this is only if both
computers support gigabit speeds, which most
| | 01:24 | modern computers do.
| | 01:26 | The speed of the data transfer is only
as fast as the slowest device, so if one
| | 01:31 | of the computers only supports 100 Mb
per second speeds, it won't matter that
| | 01:35 | the router and the other computer
support gigabit speeds; files will only
| | 01:38 | transfer at 100 Mb per second.
| | 01:41 | Now similarly, if you have some
computers connected by Ethernet, and some
| | 01:44 | connected wirelessly, you'll also
notice a slowdown in the transfer speeds of
| | 01:48 | files going to and from the wireless computers.
| | 01:51 | These days, you have three speeds of
wireless or Wi-Fi technology in circulation.
| | 01:55 | 802.11 b is the oldest and it
supports up to 11 Mb per second.
| | 02:00 | 802.11 g supports up to 54 Mb per
second. And the newest Wi-Fi standard is
| | 02:06 | 802.11 n, which supports a theoretical
speed of around 300 Mb per second under
| | 02:12 | optimal conditions, making it faster
than a standard 100 Mb per second Ethernet
| | 02:16 | connection. But I say theoretical
because in practice you'll probably only get
| | 02:20 | about 130 Mb per second, which is still
faster than older wireless standards and
| | 02:25 | 100 Mb per second Ethernet.
| | 02:27 | Most computer manufacturers are using
the 802.11 n standard these days, but nearly
| | 02:32 | all routers and Wi-Fi devices are
backwards compatible, meaning you can have
| | 02:36 | older wireless b and g devices on
your network, and they'll still be able
| | 02:39 | communicate with each other.
| | 02:41 | By the way, you can refer to these Wi-Fi
standards as wireless b, wireless g, and wireless n;
| | 02:45 | you don't need to say to 802.11
whatever for most people to understand what
| | 02:49 | you're talking about.
| | 02:51 | And again, the speed of your data
transfers is going to be determined by
| | 02:53 | the slowest device.
| | 02:54 | So if I'm transferring a video file from
my 1 Gb wired computer to my wireless n
| | 02:59 | laptop, I'll be limited
to about 130 Mb per second.
| | 03:03 | Now with Wi-Fi devices, you have
the added element of interference.
| | 03:07 | These speeds that I've listed here are
what you'd get under ideal conditions, which
| | 03:10 | you almost never have.
| | 03:11 | For example, the further away you
get from your router, the slower your
| | 03:15 | Wi-Fi connection will be.
| | 03:16 | You may have to bring your laptop closer
to the router to get better transfer speeds.
| | 03:20 | Of course, most laptops these days also
have built-in Ethernet ports, so if you
| | 03:24 | have a very large file to move, it's a
better idea to plug your laptop into the
| | 03:28 | router so you can get those faster
Ethernet speeds, especially if your laptop
| | 03:32 | supports gigabit speed.
| | 03:34 | Now let's take a look at these
speed issues in terms of your
| | 03:36 | Internet connection.
| | 03:37 | This is what a typical
Internet connection looks like.
| | 03:40 | The modem, whether it is cable, DSL,
or fiber-optic, connects to your router,
| | 03:44 | and the router distributes the Internet
connection to all the devices on your network.
| | 03:48 | Depending on the type of broadband you
have, your Internet speed may be anywhere
| | 03:52 | from 1 Mb per second, to 20 or 30 Mb per second.
| | 03:56 | Companies like Verizon FiOS may even
offer up to 50 Mb per second in your area,
| | 04:00 | but the fastest Internet speed is
still not as fast as even the wireless n
| | 04:04 | laptop on my network.
| | 04:05 | So when it comes to Internet
connections, the Internet is probably the slowest
| | 04:09 | device on your network. That's
something to take into consideration when you're
| | 04:12 | putting together your network.
| | 04:14 | If the primary purpose of creating a
network is to share an Internet connection,
| | 04:17 | and you don't foresee having to
transfer a lot of large files between your
| | 04:20 | computers, then you probably don't have
to invest in a gigabit capable router.
| | 04:24 | A 100 Mb per second router is going
to be cheaper, and more than capable of
| | 04:28 | distributing your Internet connection at the
fastest available speed to all of your computers.
| | 04:33 | Now, iff down the road you find that
you are transferring a lot of large files
| | 04:36 | from computer to computer on your
network, and that 100 Mb per second isn't
| | 04:40 | cutting it, you won't have to throw out
your router and get a new one. Instead,
| | 04:44 | you can buy a gigabit switch.
| | 04:45 | Then you can plug your gigabit
computers into the switch via Ethernet so that
| | 04:49 | they'll be communicate
with each other at top speed.
| | 04:52 | The switch will also be connected to
the router, which will continue to perform
| | 04:55 | its task of assigning each computer an
IP address, and disturbing the Internet
| | 04:59 | connection among all your computers,
but the gigabit switch will allow your
| | 05:02 | gigabit computers to talk to each
other at their fastest capable speed.
| | 05:06 | Okay, so I hope that gives you a decent
understanding of how wireless and wired
| | 05:10 | technologies affect the speed of your network.
| | Collapse this transcript |
|
|
2. Router AdministrationAccessing your admin settings| 00:00 | One of the most important things to
learn right off the bat is how to access
| | 00:03 | your router's administrative settings.
| | 00:05 | As the person managing your network,
you'll need to become familiar with your
| | 00:08 | router's features and abilities, and
how to adjust them when necessary.
| | 00:12 | Just about all routers are
accessed through your Web browser, with one
| | 00:15 | notable exception being the Apple AirPort
Extreme, but we'll cover that in the next chapter.
| | 00:20 | With most routers, you just open your
Web browser, and then enter the default
| | 00:23 | address of the router.
| | 00:25 | The default address can vary
depending on the brand of router you're using.
| | 00:28 | In my case it is 192.168.1.1, and that
will take me to the router's admin interface.
| | 00:35 | Now, in case you don't know your
router's address, you can check the manual for
| | 00:37 | the default address. Or in a Mac, go to
System Preferences>Network, and if you're
| | 00:43 | connected to your router via an Ethernet
cable, select Ethernet, and I can see here
| | 00:48 | that my router's address is 192.168.1.1.
| | 00:49 | Now, if you're connected by Wi-Fi, or
AirPort as it's called in earlier versions
| | 00:55 | of OS X, you can select Wi-Fi, then
click Advanced, and under TCP/IP you'll find
| | 01:01 | your router address here.
| | 01:04 | Now if you're on Windows, you can find
your router's IP address by going to the
| | 01:07 | Start menu and typing 'network status',
or just enough of it so that View network
| | 01:12 | status and tasks shows up here. Click
your Local Area Connection, and then in
| | 01:17 | this window that opens click Details.
In here, look for IPv4 Default Gateway.
| | 01:24 | A gateway is another name for a router,
and this way you'll find your router's IP
| | 01:27 | address, which again in this case is 192.168.1.1.
| | 01:29 | Okay, so I've entered the address for
my router here in my Web browser, and now
| | 01:35 | it's asking me for the username
and password to access those settings.
| | 01:38 | Let me just cancel this for a moment.
| | 01:40 | Now it's telling me I'm not
authorized, because I didn't enter the password.
| | 01:43 | But I want to point out that if you
don't have the password for your router, or
| | 01:47 | you've forgotten it, you
can visit routerpasswords.com.
| | 01:49 | This is a Web site that lists the
default usernames and passwords for
| | 01:53 | hundreds of routers.
| | 01:54 | You just select the brand of your
router from the menu, and then browse through
| | 01:57 | the list for the particular model you have.
| | 01:59 | You can see a lot of them are very similar.
| | 02:01 | All right, but I'm going to go back
to my router 192.168.1.1., and in my case I
| | 02:08 | enter my username and my password. And now
I'm seeing the admin interface for the router.
| | 02:16 | And this is a good first step in
troubleshooting. If you can get to this page,
| | 02:19 | you know that your computer is
successfully connected to the router.
| | 02:21 | So, for example, if you can't get to
the Internet, but you can get to the
| | 02:24 | router's interface, you know the
problem isn't in your computer, or the cable, or
| | 02:28 | the wireless connection, but probably
somewhere in the router settings, or in the
| | 02:31 | modem, or with your service provider.
| | 02:34 | So let's just check a few of these
basic settings, so we can get the hang
| | 02:36 | of where things are.
| | 02:37 | Now the location and availability of
these settings are going to vary from
| | 02:40 | router to router, but you should be able
to find just about all these options by
| | 02:43 | digging around in your own router's settings.
| | 02:45 | For example, I'd like to start by setting my
time zone to the proper time zone that I'm in.
| | 02:49 | I can select that from this menu here.
For the Internet setup, the default
| | 02:56 | state for most routers is DHCP. That
basically means you're going to allow your
| | 03:00 | router to receive an IP address. We'll talk
more about IP addresses a little bit later.
| | 03:05 | Your router itself will also serve
out IP addresses using the DHCP server
| | 03:09 | settings. You can see my settings
are enabled; all the addresses on my
| | 03:13 | network are going to start with 192.
168.1.100 in this case, and I'm going to
| | 03:18 | allow a maximum of 50
users to connect to my router.
| | 03:22 | This Maximum Number of Users settings can
actually be a kind of security to limit
| | 03:26 | the number of computers
to just the ones you have.
| | 03:28 | So if you know you only have three
computers on your network, you could limit
| | 03:31 | this to three. That way no one else
would be able to connect your network.
| | 03:34 | Maybe in my case, I know I only
have 10 computers, so I'll type in 10.
| | 03:40 | Now because I'm adjusting my router's
settings through a Web page, I need to
| | 03:43 | save any changes I make.
| | 03:44 | You'll usually find a button called
Save, or Save Settings, or Apply, on each page
| | 03:48 | in your router's admin area.
| | 03:50 | So in this case I'll click Save
Settings. Now depending on what you changed,
| | 03:55 | you might have to wait a few seconds
before the page refreshes, and you can
| | 03:57 | adjust more settings.
| | 03:58 | You can see in this case, it tells me my
Configuration Changes have been set, and
| | 04:02 | I can click Continue, and that
takes me back to the main admin page.
| | 04:07 | Something else you should do
right off the bat is to change your
| | 04:09 | router's default password.
| | 04:10 | This is the password you use to access
these settings in the first place, and I
| | 04:14 | just showed you that routerpassword.com
Web site where anyone can go and
| | 04:18 | look up the default username and
password for just about any router.
| | 04:20 | So to prevent just anyone from getting
into your router and changing settings,
| | 04:24 | locate the area where you can change
your username and password, and pick your own.
| | 04:27 | In case of the Linksys router here, I
go to Administration; here I will find
| | 04:32 | router password, so here I can type in a new
password, and then re-enter it to confirm it.
| | 04:40 | In the case of this particular router, I
only need to come up with a password; I
| | 04:43 | don't need to come up with the username.
| | 04:45 | For your router, you may
have to come up with both.
| | 04:48 | But just be sure that you will remember
the username and password you come up with,
| | 04:51 | because if you forget it, you'll most
likely have to reset your router to factory
| | 04:54 | settings, and you'll lose any and all
custom settings you may have applied.
| | 04:57 | I'll click Save Settings again to save
my new password, Continue, and I'm back
| | 05:04 | on the page that I left from.
| | 05:06 | Now we'll be getting into specific
router settings much more in upcoming
| | 05:09 | movies, but I encourage you to click around
your router interface and see what's available.
| | 05:13 | For the most part, as long as you don't
actually change anything, you can't really
| | 05:16 | mess anything up. But it's a good idea
to get the lay of the land, so you have a
| | 05:19 | general idea of where different settings
are accessed, so you'll know where to go when
| | 05:23 | you do want to make changes down the road.
| | Collapse this transcript |
| Finding and installing firmware updates| 00:00 | One thing you might want to do right
off the bat after installing a new router
| | 00:03 | is to check for, and install, any new
firmware updates that might be available.
| | 00:08 | Your router's firmware is essentially
the program that runs this entire system.
| | 00:11 | It's stored on chips, and doesn't need
power to stay saved, which is why you can
| | 00:15 | unplug your router, move it to another
location, and it will still remember it's
| | 00:18 | settings when you turn it back on.
| | 00:20 | Manufacturers occasionally release
firmware updates that fix bugs, and add more
| | 00:24 | features to their products, and in
most cases you will want to be running
| | 00:27 | the latest firmware.
| | 00:28 | If your router came with some sort of
setup wizard, a program that walked you
| | 00:31 | through the process of setting up your
router, it may have automatically checked
| | 00:35 | for your firmware update. But you
should also be able to check manually by
| | 00:38 | visiting the manufacturer's Web site,
looking up your router model, and seeing if
| | 00:42 | any updates are available,
| | 00:43 | which would be useful to do if you've
had your router for several months or
| | 00:46 | years, and started having trouble with it.
| | 00:48 | Sometimes a firmware update
can fix issues that crop up.
| | 00:51 | As an example, I'm looking at the
product page for my Linksys router on the
| | 00:55 | Cisco Web site, and here under
Downloads I can Select my hardware version,
| | 01:00 | which is just Version 1.0 in this
case, and you can see here that there is a
| | 01:03 | firmware update available.
| | 01:06 | Now a strong word of caution is necessary here.
| | 01:08 | As I just mentioned, firmware is the
program that runs your entire router, so it
| | 01:12 | is possible to actually damage your
router, possibly to the point where it can't
| | 01:16 | be fixed, if the updating process is interrupted.
| | 01:19 | So here are some basic rules to follow:
| | 01:21 | first of all, don't update your
firmware over a wireless connection.
| | 01:25 | Make sure you're connected directly
to your router with an Ethernet cable.
| | 01:27 | You'll want to avoid having any
other programs running on your computer,
| | 01:31 | especially any that might restart
your computer, or use your Web browser.
| | 01:34 | You'll want to be sure not to press any
buttons or adjust anything on your router
| | 01:39 | while the firmware is being updated.
| | 01:40 | In fact, just don't touch the router at
all and leave it alone while it's doing
| | 01:43 | the updating process.
| | 01:45 | And also, don't try this right before you
need your router for a critical project
| | 01:49 | or task, like sending an
important e-mail, or updating a Web site.
| | 01:52 | If your router goes offline,
you're going to be stuck without an
| | 01:54 | Internet connection.
| | 01:56 | Now don't let this scare you off.
Firmware updates are pretty standard
| | 01:59 | activities, but it doesn't hurt
to be smart and cautious about it.
| | 02:02 | All right, so back here on the Cisco
page; the process is naturally going to vary
| | 02:08 | from router to router, but
the basic idea here is the same.
| | 02:10 | You're going to start by accessing
your router's administrative interface.
| | 02:14 | So I'm going to open a new browser
tab here, and in the case of the Linksys
| | 02:17 | router I'm using, I go to 192.168.1.1, which
is already in my history so I'll access that.
| | 02:26 | And you can see in the upper right-hand
corner here -- let me make my browser
| | 02:29 | size a little bit bigger
here -- I'm using Version 1.0.03.
| | 02:35 | Here on the Cisco Web site, you can see
the most current Version available is
| | 02:38 | 1.0.04, so there is a newer
version of the firmware available here.
| | 02:44 | Now again, if your router is working
fine and you're having no problems, there is
| | 02:47 | no requirement for you to update your firmware.
| | 02:49 | In fact, most of the time you should
be able to find a link to review the
| | 02:53 | release notes, or version information.
| | 02:55 | You can see we have a Release Notes
link here, which basically tells you what's
| | 02:58 | changed in this latest release.
| | 03:00 | And from the looks of it, this update
mostly fixes some minor bugs, and adds some
| | 03:03 | minor enhancements;
probably nothing you even notice.
| | 03:06 | So I could most likely skip this
update if I wanted to, but I'll go through the
| | 03:09 | process so you can see how it works.
| | 03:10 | I'll click the Download link to download
the firmware, and now find the file that
| | 03:15 | I just downloaded. There it is, and just
for simplicity's sake, I'm just going
| | 03:21 | to dump this to my Desktop so I
can find it when I do the upgrade.
| | 03:24 | Okay, now go back to my router setup here.
I'll just make this a little bit smaller again.
| | 03:32 | So now in my router's admin
interface, in this case I'm going to go to
| | 03:35 | Administration, and here I'll
find a link for Firmware Upgrade.
| | 03:40 | And now I'll just find the file that I downloaded.
| | 03:42 | Now it's on my Desktop; there it is.
| | 03:45 | Now, notice all the red letters here.
| | 03:47 | Again, it's absolutely imperative that
you don't touch your router while the
| | 03:50 | firmware is being updated.
| | 03:51 | They are telling me in big letters here
the "Upgrade must NOT be interrupted !!".
| | 03:55 | All right. So I've downloaded the
file, I've chosen it here in my router
| | 03:59 | administrator interface, and now
I'm going to click Start to Upgrade.
| | 04:01 | So now it's going through the
process of upgrading the firmware.
| | 04:06 | Again, I'm not going to touch the router;
I'm not going to do anything else on
| | 04:08 | my computer while this is going on.
| | 04:10 | Okay, so now I get the message that the
upgrade is successful and my router is
| | 04:16 | now restarting, and now I'm taken
back to the router administration area.
| | 04:21 | So you can see now in the upper
right-hand corner, I'm now running
| | 04:24 | Firmware Version 1.0.04.
| | 04:27 | So I have upgraded my firmware here.
| | 04:30 | And according to the documentation we
saw, that makes my router a little more
| | 04:33 | stable and a little more enhanced.
| | 04:35 | Now, depending on your router, and when
you check for updates, you might find that
| | 04:38 | major new features have been added to
your router, but in all cases the process
| | 04:42 | is usually the same.
| | 04:43 | Find out which version you're currently
running, check the manufacturer's site
| | 04:46 | for updates, and if one's
available, download it and install it.
| | Collapse this transcript |
| AirPort Extreme management| 00:00 | Many routers today come with companion
applications that walk you through the
| | 00:03 | process of creating and
modifying your router settings.
| | 00:06 | For instance, my Cisco Linksys router
comes with Cisco Connect Software which I
| | 00:11 | can run to set up the basic
settings of my router. But as you get more
| | 00:14 | experienced with your router and it's
capabilities, you'll probably find that you
| | 00:17 | prefer to go directly into the router's
settings through it's Web-based interface,
| | 00:20 | because it allows quicker access to
more of the advanced features and settings.
| | 00:24 | We saw this area in use
previously in this chapter.
| | 00:27 | If you haven't watched those movies yet, you
might want to go back and watch them first,
| | 00:30 | because I'm going to be drawing
parallels between them, and the AirPort Extreme.
| | 00:33 | So, unlike the majority of routers on
the market today which you can access via a
| | 00:37 | Web-based interface, the Apple AirPort
Extreme is a router that can only be
| | 00:40 | managed with Apple's AirPort Utility software.
| | 00:43 | There is no Web-based interface for this router.
| | 00:46 | The Utility software comes as part of
the Mac OS X operating system, but you can
| | 00:50 | also use and manage the AirPort
Extreme on a Windows-based computer.
| | 00:53 | If you're on a Mac, you'll find the
AirPort Utility in the Utilities folder
| | 00:57 | located inside your Applications folder.
| | 00:59 | If you're on Windows, you'll need
to download the utility by going to
| | 01:02 | apple.com/support/airport, then clicking
Downloads, and here you should find the
| | 01:08 | AirPort Utility for Windows,
which I've already downloaded.
| | 01:12 | Once it's downloaded you'll install it,
and then you'll find it under the Start
| | 01:15 | menu>All Programs>AirPort Utility.
| | 01:20 | And once you open it, you should see
your AirPort Extreme listed in the left
| | 01:23 | pane of the Utility window, along with any other
AirPort devices you might have on your network.
| | 01:28 | Seeing your AirPort Extreme over here
and being able to select it is a good
| | 01:31 | first step in troubleshooting, because
at this point at least you know that you
| | 01:34 | can connect to your router successfully.
| | 01:36 | So, for example, if you can't get to
the Internet, but you can get to the
| | 01:39 | AirPort Extreme settings, you know the
problem isn't in your computer, or in the
| | 01:42 | cable, or the wireless connection,
but probably somewhere in the router
| | 01:45 | settings, or in the modem,
or with your service provider.
| | 01:49 | The AirPort Utility feature is a step-
by-step set up assistant that walks you
| | 01:52 | through the process of getting your
AirPort Extreme router up and running.
| | 01:55 | And you may have used it the first time
you connected your router. All you do here
| | 01:59 | is make sure it's selected and click
Continue, but for this movie let's go
| | 02:02 | through the manual setup where it's
much easy to find individual settings.
| | 02:05 | So I'll click Manual Setup.
| | 02:07 | I'll need to enter my password.
| | 02:12 | Now the manual setup area is divided into
these categories at the top of the window.
| | 02:17 | Each category has its own
collection of related tabs.
| | 02:21 | Generally, the settings that have to
do with how your router connects to the
| | 02:23 | Internet, and how your computers
communicate with the router, are going to be
| | 02:26 | found under the AirPort and Internet categories.
| | 02:30 | The Summary tab under AirPort is
where you can get a quick status update on
| | 02:33 | your router, including its firmware
version number, its wireless settings, and
| | 02:37 | its WAN IP address.
| | 02:38 | You can see Version number is right
here, you can see how it's set up as a
| | 02:43 | Wireless Network right now,
and here is its IP Address.
| | 02:47 | Under Base Station you can edit the Name
of your router and also adjust the Time
| | 02:52 | Zone settings if necessary.
| | 02:54 | This is also where you can change the
password used to access your router's settings.
| | 02:58 | Don't confuse this with the password to access
your wireless network; that's on a different tab.
| | 03:02 | This is to change the password
to access your router's settings.
| | 03:05 | If you want, you can check
Remember this password in my keychain,
| | 03:09 | if you feel fairly certain that someone
isn't going to jump in on your computer
| | 03:12 | and change your AirPort settings.
| | 03:13 | That way you won't have to enter your
password each time you want to modify your
| | 03:16 | AirPort Extreme settings.
| | 03:19 | This is also where you can check for
firmware updates, which we discussed in the
| | 03:21 | previous movie, by clicking Options.
| | 03:25 | In here you can have the AirPort
Extreme check for updates automatically on a
| | 03:29 | daily, weekly, or monthly basis.
| | 03:32 | This is a nice alternative to
having to remember to visit your router
| | 03:35 | manufacturer's Web site periodically
yourself to check for firmware updates.
| | 03:38 | I'm just going to cancel out of here for now.
| | 03:42 | Under Wireless, you can create and
manage your wireless network by editing its
| | 03:46 | name and changing security settings.
| | 03:48 | We'll be getting into this later.
| | 03:50 | One feature I really like about the
AirPort Extreme, and you will find this on
| | 03:53 | other routers as well, is
the Guest Network option.
| | 03:56 | This is a feature that lets you set up a
separate wireless network so that when
| | 04:00 | people come to visit you, you can give
them access to your Internet service with
| | 04:03 | a password different than the one
you use to connect to the network.
| | 04:06 | So they will be able to get online
from their laptops or smartphones, but the
| | 04:09 | guest network quarantines them from being able
to access the other computers on your network.
| | 04:13 | It's just a nice extra layer security,
and this prevents you from having to give
| | 04:17 | out your personal Wi-Fi password.
| | 04:18 | We'll talk more about this later as well.
| | 04:22 | Under the Internet category you'll
find the settings that manage how your
| | 04:25 | AirPort Extreme connects to your
Internet service, and how it behaves when
| | 04:28 | distributing IP addresses to
the computers on your network.
| | 04:30 | For example, under Internet Connection
I have Ethernet selected, which is going
| | 04:35 | to be the most common way for my
AirPort Extreme, or any router for that matter,
| | 04:40 | to connect to my broadband modem.
| | 04:42 | In some rare cases you might select
PPPoE, which stands for Point-to-Point
| | 04:47 | Protocol over Ethernet, but only some
DSL services use that protocol, and you'll
| | 04:51 | be informed by your Internet service
provider if that's the selection you need.
| | 04:56 | Under TCP/IP, in most cases
you'll have Using DHCP selected,
| | 05:00 | meaning you're going to let your
router be automatically assigned it's IP
| | 05:03 | address by your Internet service provider.
| | 05:05 | And this here is the IP
Address we saw under the Summary tab.
| | 05:09 | Under the DHCP tab is where you
determine how your router distributes IP
| | 05:12 | addresses to the computers and
devices connected to your network.
| | 05:16 | You can choose if you want to go with
the addresses that start with 10.0, or
| | 05:20 | with the more common in 192.
168. There is even 172.16.
| | 05:24 | There is really not much
of a practical difference.
| | 05:27 | Some people just find it easier to use
the 10.0 format, because it's easier to
| | 05:31 | type longer IP addresses, rather than having
to type 192.168, and so on, and so on.
| | 05:38 | You can also determine to start the
addresses at a certain number, but again you
| | 05:41 | probably won't need to make any
changes in here unless you are purposely
| | 05:44 | assigning static IP addresses, meaning
non-dynamic and unchanging addresses, to
| | 05:48 | some devices on your network.
| | 05:50 | Again, more on that later.
| | 05:52 | Now, anytime you make a change to any
of your settings it's important to click
| | 05:55 | Update so your new settings will be applied.
| | 05:57 | Unlike the Web-based interface of most
routers where you have to click save or
| | 06:01 | update on each settings page, you can
make multiple changes in the AirPort
| | 06:04 | Utility before clicking update.
| | 06:06 | So this is just a small sampling of
the AirPort Utility, and it works the same
| | 06:10 | way on the Mac as it does here on Windows.
| | 06:12 | We'll be getting into specifics a
little later on, but for now I wanted to make
| | 06:15 | sure we covered how to open the
utility and access the manual settings.
| | Collapse this transcript |
|
|
3. Wireless NetworksUnderstanding wireless types| 00:00 | In this chapter, we're going to get
into setting up and working with wireless
| | 00:03 | networks, but before we getting into the
details, I think it's important to have a
| | 00:07 | brief overview of the current
state of wireless technology.
| | 00:11 | When Wi-Fi really started to get popular around
early 2001, the standard in use was 802.11b.
| | 00:16 | It had a range of about 150 feet, and was able
to transfer data at a speed of up to 11 Mbps.
| | 00:22 | It also operated in the 2.4 gigahertz
frequency spectrum, which it shared with cordless
| | 00:29 | phones, and other wireless electronics.
| | 00:31 | Microwave ovens also throw out interference
at that frequency when they're being used.
| | 00:36 | Now, 802.11b was supposed to be
eventually replaced with a similar standard
| | 00:39 | called 802.11a. And while it had a more
limited range, it operated at almost 4
| | 00:45 | times the speed of 802.11b, and it also
operated at 5 gigahertz, which was rarely used
| | 00:51 | for consumer devices, meaning it
would have much less interference.
| | 00:54 | The problem was, by that time 802.11b
had taken off so successfully that no one
| | 00:59 | wanted to buy a wireless device that
wasn't backwards compatible with 802.11b,
| | 01:03 | because most people already had
expensive devices that already operated on B.
| | 01:07 | So 802.11a never really took off, but
some computers today, like all Intel-based
| | 01:12 | Macs, can operate on 802.11a. But
the next standard to be adopted by the
| | 01:17 | industry was 802.11g.
| | 01:18 | 802.11g is nearly identical to 802.11a,
but it operates on the 2.4 gigahertz frequency,
| | 01:26 | making it backwards compatible with B
devices, which made it easier for people to
| | 01:30 | transition to this standard.
| | 01:31 | The problem was that if a B device
joined the G network, then the speed of the
| | 01:35 | entire network would have to drop back
down to the maximum B speed of 11 Mbps.
| | 01:41 | So fast-forward to today where we
have the latest standard called 802.11n.
| | 01:46 | Wireless N has a practical range of
about 175 feet, and it supports theoretical
| | 01:51 | speeds of up to 300 Mbps,
| | 01:54 | although realistically you'll
probably get closer to half that speed.
| | 01:57 | It's also capable of operating on
either the 2.4 or 5 gigahertz frequency range.
| | 02:02 | So it can support wireless B and G
devices if you still have those devices on
| | 02:06 | your network, but it will slow down
the network down to the maximum speed of
| | 02:10 | either the B or G devices connected.
| | 02:12 | Most modern computers and Wi-Fi devices,
though, are now wireless and compatible.
| | 02:16 | So if you only have those type of
devices on your network, you could see some
| | 02:19 | decent transfer speeds. But you're
going to find that the speed and range of
| | 02:23 | your network is going to depend largely
on where you place your wireless router
| | 02:26 | in your home or office, and that's
what we're going to take a look at next.
| | Collapse this transcript |
| Placing a wireless router| 00:00 | So, you've got your wireless router,
and you're trying to figure out the best
| | 00:03 | place to put it in your office, or home,
or home office. And in many cases you want
| | 00:07 | your router to be centrally
located, kind of like this.
| | 00:10 | And ideally its signal should
spread out in all directions, like this.
| | 00:14 | But exactly how far and evenly it
spreads is going depend on a lot of factors,
| | 00:18 | such as which type of wireless standard
your router uses: 802.11b, g, or n; or even
| | 00:24 | what materials the
building was constructed with.
| | 00:26 | For example, in older buildings with
chicken wire or horse hair plaster in
| | 00:29 | the walls, you might find that your Wi-Fi
signal drops to just 20 feet or less in range.
| | 00:33 | Or in some cases your walls may let
Wi-Fi signals pass through so well that
| | 00:37 | you get great range, but that means
your neighbor's Wi-Fi signals will also
| | 00:40 | easily pass through your walls and
interfere with your wireless network, and
| | 00:44 | you'll interfere with theirs.
| | 00:46 | And there are lots of other
things that can cause interference.
| | 00:48 | As I mentioned earlier, microwave ovens
throw out interference in the 2.4 gigahertz
| | 00:52 | range, which is the same frequency that
802.11b and g devices operate on. So you
| | 00:57 | might find that every time someone
makes a bag of popcorn, your wireless signal
| | 01:01 | drops significantly in the vicinity of
the microwave, and even in the area behind
| | 01:04 | it in one direction.
| | 01:06 | So the office in the lower right here
would probably get very little network
| | 01:09 | connectivity while the microwave is
running. And there might be other oddities
| | 01:13 | with your particular house or office.
| | 01:14 | Maybe this used to be a doctor's
office, and this one wall is lined with lead,
| | 01:18 | which is something you might not
realize until you try to place your wireless
| | 01:21 | router, and discover you're getting little
to no signal on the other side of this wall.
| | 01:24 | The point here is that when you first
set up your router, be prepared to move it
| | 01:27 | around to different locations in order
to get the signal to all the places in
| | 01:30 | your home or office that
need to get on the network.
| | 01:32 | Of course, you may be limited by where
your Internet connection comes into your
| | 01:35 | building, and you may find that one
wireless base station isn't enough to give
| | 01:39 | you the coverage you need.
| | 01:39 | In that case, you may need two or
more wireless network devices: your main
| | 01:44 | wireless router, and another
wireless router that acts an access point.
| | 01:47 | You may need to run an Ethernet cable
between the two devices, but it's also
| | 01:51 | possible, in many cases, to chain them
together wirelessly so that the second
| | 01:54 | device can connect to the first, and
then extend the range of the network
| | 01:57 | into the uncovered area.
| | 01:59 | So those are some things to be aware
of when placing your wireless router.
| | 02:01 | Now, there are some things you can do
to your wireless router's settings to
| | 02:05 | prevent or minimize interference
with other devices, such as changing the
| | 02:08 | broadcast channel of your router, and
we'll take a look at how to do that in an
| | 02:11 | upcoming movie.
| | Collapse this transcript |
| Administrating a wireless router| 00:00 | Once you've decided where you want
your wireless router placed, you have to
| | 00:03 | go into your router's settings and make some
decisions about its wireless capabilities.
| | 00:07 | In this case I'm working with the Cisco
Linksys router, but all wireless routers
| | 00:10 | will offer the same kind of settings
I'm going to be looking at in this movie.
| | 00:13 | I want to mention and emphasize
here that when you're making any changes to
| | 00:16 | your router's settings, especially when
you're making changes to its wireless
| | 00:20 | settings, you should do so from a
computer that's connected to the router via an
| | 00:23 | Ethernet cable, and not wirelessly.
| | 00:25 | Depending on what changes you're
making you might find yourself disconnected
| | 00:28 | from the wireless network,
and unable to reconnect.
| | 00:30 | So make sure you plug in with a cable
when you're adjusting wireless settings.
| | 00:35 | I've logged into my router by going to
192.168.1.1 in my Web browser, as we saw
| | 00:39 | how to do, earlier and I'm going
to go to the Wireless section.
| | 00:44 | Now this Linksys router has a feature
called Wi-Fi Protected Setup, but that's
| | 00:48 | sort of specific to this router,
and some other types of routers.
| | 00:50 | But I am going to switch over to Manual
so we can see the more common settings
| | 00:54 | found in most routers.
| | 00:56 | So the first option here is Wireless Band.
| | 01:00 | Since this is a fairly modern router I can
choose either 2.4 gigahertz, or 5 gigahertz.
| | 01:05 | If you recall from earlier in this
chapter, the older 802.11b and g standards
| | 01:09 | broadcast only in the 2.4 gigahertz frequency.
| | 01:12 | So if I have any of those devices, or if
I foresee any of those devices needing
| | 01:16 | to connect to my network, I'll
need to keep this at 2.4 gigahertz.
| | 01:20 | Remember, wireless N also works on 2.4 gigahertz,
| | 01:23 | so this is the best selection for the
most compatibility with all devices.
| | 01:27 | Notice I can also choose to then specify
which type of devices I want to support
| | 01:30 | in this wireless band. I can choose to
allow B only, G only, N, a mixture of B
| | 01:37 | and G, or a mixture of all of them.
| | 01:39 | There is also the option to choose
Disabled, which is how you completely turn off
| | 01:43 | the wireless capabilities of the router
in case you want to prevent anyone from
| | 01:46 | getting on your network
wirelessly for some reason.
| | 01:48 | I'll leave this set to Mixed.
| | 01:51 | Now I'll see different option in this
menu if I switch to the 5 gigahertz setting.
| | 01:55 | Remember that only wireless N and A
operate on the 5 gigahertz frequency, so
| | 01:59 | we're seeing those options here.
| | 02:00 | So you would only choose this band if
you want to prevent wireless B and G
| | 02:04 | devices from connecting to your network
or if you just know that you don't need
| | 02:07 | to support those types of
devices on your network.
| | 02:10 | And as I touched on earlier, when you
operate on the 5 gigahertz frequency you
| | 02:14 | may see faster speeds and greater range
from your router since you're allowing
| | 02:17 | wireless N to broadcast at its full
potential rather than having to accommodate
| | 02:21 | the older standards.
| | 02:22 | So again, with 5 Gigahertz selected
we only see Mixed, Wireless-A Only,
| | 02:26 | Wireless-N Only, or Disabled.
| | 02:27 | But for this example let's assume I
still have some older B and G devices
| | 02:31 | to connect to my network,
| | 02:33 | so I'll switch that back to 2.4
gigahertz, and again I am going to
| | 02:37 | make sure the Network Mode is Mixed.
| | 02:39 | Next, we have the field for the Network Name.
| | 02:40 | This is the name that appears when you,
or other people in the vicinity, look for a
| | 02:44 | wireless network to connect to.
| | 02:46 | You can name your network anything you
want, and you'll probably want to choose
| | 02:49 | something unique or meaningful to
yourself if only to make it easier to pick out
| | 02:52 | your network in a Wi-Fi crowded area
where it seems many people leave the
| | 02:55 | default names of their networks.
| | 02:58 | So in this case I'm going
to change mine to Bluehorse.
| | 03:04 | Now, there is also a chance you might
not want the name of your network to show
| | 03:06 | up on other people's devices,
especially if you live in a crowded area.
| | 03:10 | In that case you can set
SSID broadcast to Disabled,
| | 03:15 | but bear in mind that if you do so,
you'll have to manually enter the name of
| | 03:18 | your wireless network on each device
you want to connect to the network.
| | 03:21 | I'm going to leave mine enabled.
| | 03:22 | Next, we have Channel Width. You
might not see this option on all routers.
| | 03:28 | Generally, Auto is the best choice if you
have B, G, and N devices on your network.
| | 03:33 | If you only have B and G devices, 20
megahertz is the best selection, but in this
| | 03:37 | case I recommend just keeping this set to Auto.
| | 03:40 | Next, we have the Channel menu.
| | 03:42 | Because I have the 2.4 gigahertz band
selected, I can see that I can choose
| | 03:46 | Channels 1 through 11, and these are
basically the different ranges of the 2.4
| | 03:50 | gigahertz frequency.
| | 03:51 | For example, Channel 1 is 2.412
gigahertz; Channel 6 is 2.437 Gigahertz.
| | 03:58 | Now it's set to Auto by default,
and the most common channels in this
| | 04:01 | frequency are 6 and 11.
| | 04:05 | So if you're experiencing low Wi-Fi
range or speeds, it's possible that it's
| | 04:09 | because other wireless routers or
devices in your area are broadcasting on the
| | 04:12 | same channel, and interfering with your network.
| | 04:15 | If that's the case, the first thing to
try is to come into your wireless settings
| | 04:18 | and select a different channel.
| | 04:19 | So maybe I'll choose Channel 2.
| | 04:22 | Now these days the 2.4 gigahertz
frequency is more cluttered than ever, so
| | 04:26 | finding a clear channel may be impossible,
but it's worth trying a few different
| | 04:29 | channels to see if any of them
improve your wireless situation.
| | 04:33 | The same thing applies if you
have the 5 gigahertz band selected.
| | 04:36 | You'll be given the choice of Auto, or
a set a specific channels you can choose
| | 04:41 | from to try to find one of the best signal.
| | 04:44 | Notice that changed my settings as
far as the Network Name goes here,
| | 04:48 | so I should have saved that
before I changed back to 5 gigahertz.
| | 04:54 | So let's go back to 2.4.
| | 04:55 | Let's go call it Bluehorse again, switch
that to Auto, switch that to 2, and now
| | 05:02 | I'll save my settings.
| | 05:07 | So those are the options found
under my basic wireless settings.
| | 05:10 | Again, depending on your router, you
may find these settings in different
| | 05:12 | locations, but they're usually located
on the same page, and near each other in
| | 05:16 | your router administration area.
| | 05:19 | Again, I want to stress the importance
of being connected to router via Ethernet
| | 05:22 | when changing its settings, especially
when altering wireless settings, since you
| | 05:26 | might find yourself disconnected and
unable to reconnect wirelessly, depending on
| | 05:29 | the changes that you've made.
| | Collapse this transcript |
| AirPort Extreme wireless admin| 00:00 | Previously in this chapter, we looked
at how to manage your wireless router settings
| | 00:03 | using the built-in Web interface
that you'll find with most routers.
| | 00:06 | As you have also previously seen, the
Apple AirPort Extreme router does not have
| | 00:09 | a Web-based interface.
| | 00:10 | So, in this movie I'm going to look at
how to adjust basic wireless settings on
| | 00:13 | the AirPort Extreme using the AirPort
Utility that comes with Mac OS X, and which
| | 00:17 | can downloaded for Windows
at apple.com/support/airport.
| | 00:19 | Once it's been installed on Windows,
you can find it by going to the
| | 00:25 | Start menu>All Programs.
| | 00:26 | Here on my Mac, I'm going to go into
the Applications folder, and to Utilities, and
| | 00:31 | here I'll find AirPort Utility.
| | 00:33 | And as I stressed in the previous movie,
any time you're making changes to your
| | 00:36 | router's settings, especially if you're
making changes to the wireless settings,
| | 00:39 | make sure you are connected to the
router with an Ethernet cable and not
| | 00:42 | wirelessly. Otherwise, there is a
chance that once you change your wireless
| | 00:45 | settings, you might not be able to
reconnect to the router wirelessly.
| | 00:48 | For example, you might accidentally set
your router to only work with wireless N
| | 00:51 | devices, and your computer is
wireless G. As long as you have an Ethernet
| | 00:54 | connection you should still be able to
connect and make changes to your router
| | 00:57 | settings, regardless of how
you set up the wireless options.
| | 01:00 | Okay, so I have my AirPort Extreme selected.
| | 01:02 | I'm going to choose Manual Setup.
| | 01:03 | I need to enter my password. I'm going
to leave Remember this password in my
| | 01:08 | keychain checked, so I don't
have to enter my password again.
| | 01:11 | And under the AirPort category,
I'm going to go to Wireless tab.
| | 01:14 | First of all, I have my AirPort
set to Create a wireless network.
| | 01:18 | In most cases, this is what you have
selected if you're AirPort is your main
| | 01:21 | router, and your Internet
modem is plugged into it.
| | 01:23 | The AirPort is also capable of
extending the range of an existing wireless
| | 01:26 | network, but I'm not going to do that now.
| | 01:28 | This menu is also where you can turn off
the wireless capabilities of your AirPort,
| | 01:31 | in case you only want to use it for
wired devices over Ethernet, but I'll leave
| | 01:35 | Create a wireless network selected for now.
| | 01:37 | Next, we have the Wireless
Network Name, and it will usually have a
| | 01:40 | generic Apple network name.
| | 01:42 | Now, the network name, also called the
SSID, is what appears when you, or other
| | 01:46 | people in the vicinity, look for a wireless
network to connect to on your Wi-Fi devices.
| | 01:50 | You can name your network anything
you want, and you'll probably want to choose
| | 01:52 | something unique, or meaningful to
yourself, if only to make it easier to pick out
| | 01:56 | your network in a Wi-Fi credit area,
where it seems many people leave the default
| | 01:59 | names of their networks.
| | 02:00 | So, for example, maybe I'll call my chownet.
| | 02:04 | Now, there is a chance you might not
want the name of your network to show up on
| | 02:06 | other people's devices,
especially if you live in a crowded area.
| | 02:09 | If that's the case, click Wireless
Network Options down near the bottom here,
| | 02:13 | and in here check Create a closed
network. That keeps your network active, but
| | 02:18 | hides its name from appearing on
devices looking for wireless networks. Just
| | 02:21 | bear mind that if you do, do this,
you'll have to manually enter the name of your
| | 02:24 | wireless network on each device you
want to connect your network. I'm going to
| | 02:27 | leave mine unchecked.
| | 02:30 | The next option is Allow
this network to be extended.
| | 02:33 | If you have a large area or building
to cover with your Wi-Fi network, you might
| | 02:36 | need to extend it by adding another
AirPort Extreme or AirPort Express to it.
| | 02:39 | Apple makes it very easy to extend
networks; you just check this option, and
| | 02:43 | then when it comes time to increase
the range of your network, plug in your
| | 02:46 | second AirPort Extreme or Express, and
tell it to extend a wireless network,
| | 02:49 | from up here in the Wireless
Mode menu. I'm just going to leave this
| | 02:53 | unchecked for now, though.
| | 02:54 | Next we have the Radio Mode, and you
use this to determine which wireless
| | 02:57 | standards you want to support with your network.
| | 02:59 | With the most recent AirPort Extreme,
which is what I have here, you don't really
| | 03:02 | have to worry about making any changes
in here. And that's because it's actually
| | 03:05 | a simultaneous dual band wireless router,
which means it has two radios, so it
| | 03:09 | can support both A/N devices in the 5
gigahertz band, and B/G devices in the 2.4
| | 03:14 | gigahertz band, and it can
do that at the same time.
| | 03:17 | So in most cases, you can
just leave it set to Automatic.
| | 03:20 | Now, Radio Channel Selection is where
you can select alternate channels within
| | 03:24 | those frequencies to use
for your wireless network.
| | 03:26 | I'll switch mine to Manual, which gives
me this Edit button. And so here I can
| | 03:31 | choose channels for both the 2.4
gigahertz, and 5 gigahertz bands.
| | 03:35 | You would want to do this if you're
experiencing poor wireless signals within
| | 03:38 | relatively close proximity to your
router, which may be a result from some other
| | 03:41 | devices on the same
channel causing interference.
| | 03:43 | There is really no magic channel here,
so you may have to select a few
| | 03:47 | different channels to see which one
works best in your area. And just click
| | 03:51 | Done when you're done.
| | 03:52 | Okay, now there is another setting here
in regards to Wireless Security, but I'm
| | 03:57 | going to be getting to
that in the separate movie.
| | 03:59 | For now, I'll just click Update to
save the changes I made my router.
| | 04:02 | It's telling me that my network
services will be temporarily unavailable while
| | 04:06 | it reboots the router. I will click
Continue. And again, let me stress that you
| | 04:10 | should be connected by Ethernet
cable when altering your router's settings.
| | 04:13 | So there you have the basic wireless
options you should understand in your
| | 04:16 | AirPort Extreme Utility settings.
| | Collapse this transcript |
| Connecting to a wireless network (Windows)| 00:00 | Once the Wi-Fi portion of your network
is up and running, you'll have to connect
| | 00:03 | each wireless computer to it.
| | 00:04 | To connect a Windows computer to your
network, click the Wi-Fi network button
| | 00:07 | in the notifications area of the taskbar.
| | 00:09 | It kind of looks like a bar graph,
that is unless you have an Ethernet cable
| | 00:12 | plugged in, in which case it looks like a
little computer monitor with a cable next to it.
| | 00:15 | But in this case, I am not connected to my
network at all, so it looks like a bar graph.
| | 00:19 | That will display all the wireless
networks your computer can detect.
| | 00:21 | Select yours, and then click Connect.
| | 00:23 | If you want it to connect
automatically in the future, you can keep Connect
| | 00:26 | automatically checked.
| | 00:28 | If you have set up a password, and you
should have, enter the password here.
| | 00:32 | If someone is looking over your
shoulder, you can check Hide characters, so they
| | 00:35 | won't be able to see what
the password is on the screen.
| | 00:37 | In just a few moments you will
be Connected to your network.
| | 00:40 | I can check my connection by opening up
a Web browser and visiting a Web page.
| | 00:47 | So now I am connected to my wireless
network, and I can access the Internet, and
| | 00:51 | I can communicate and share data with
the other computers on my network that are
| | 00:54 | connected both wirelessly, and via Ethernet.
| | 00:56 | Now, if you didn't see the Wi-Fi network
button in your taskbar, first make sure
| | 00:59 | your computer actually has Wi-Fi capabilities.
| | 01:02 | Most do these days; especially laptops.
| | 01:04 | You can also click this Triangle
button, and choose Customize, and from here
| | 01:09 | locate Network, and set its
Behavior to Show icon and notifications.
| | 01:13 | That keeps the Wi-Fi network icon button in
your taskbar so you have easy access to it.
| | 01:17 | Now just in case you don't see Network
listed here, click Turn system icons on
| | 01:20 | or off, and then make sure Network is set to On.
| | 01:23 | That's the default icon for when you have
an Ethernet cable plugged into your computer.
| | 01:28 | So that will place Network here under
icons, and then you can make sure Show icon
| | 01:31 | and notifications is selected.
| | 01:34 | Clicking the Network button also
shows you what network you're currently
| | 01:36 | connected to, and if you roll your mouse
over the names of the networks, you can
| | 01:40 | get additional information, like what
type of security it's using, and what form
| | 01:44 | of Wi-Fi it's using, which is
faster than opening your Web browser and
| | 01:46 | connecting to your
router's administrative interface.
| | Collapse this transcript |
| Connecting to a wireless network (Mac)| 00:00 | Once the Wi-Fi portion of your network
is up and running, you have to connect
| | 00:03 | each wireless computer to it.
| | 00:04 | On a Mac, go to System
Preferences, and then click Network.
| | 00:09 | If you're running Mac OS X v10.7 Lion or
later, you'll select Wi-Fi. In earlier
| | 00:14 | versions of Mac OS X, it's labeled as AirPort.
| | 00:16 | They're both the same thing though.
| | 00:17 | So if your Wi-Fi card currently says Off, make
sure you click turn Wi-Fi, or turn AirPort, on.
| | 00:23 | From the Network Name menu, select your network.
| | 00:26 | This is where you'll see a list of all
the networks your Mac can find in your area.
| | 00:29 | So for instance, if you have a
Notebook Mac, and you're on the road, you can
| | 00:32 | select other Wi-Fi
networks to connect you from here.
| | 00:34 | But of course that's only if they're open, or
if you've been given the password for them.
| | 00:38 | You can see these wireless networks
that have a lock symbol next to them
| | 00:40 | indicate that these are password-protected.
| | 00:42 | I'm going to select lyndaeast_wireless,
and now it's prompting me for my WPA2
| | 00:47 | password, and you should have that
since you probably created it yourself.
| | 00:52 | If you want your Mac to remember this
network in the past so that it will join it
| | 00:55 | automatically, you can have that
checked; I'll click Join. And you can see in
| | 01:00 | just a few seconds, I get the green
light, I am told I am I'm connected, and
| | 01:04 | now I should be online.
| | 01:05 | I can also see I have an
IP address of 192.168.1.11.
| | 01:07 | So if I open up a browser, I should be
able to go to a Web site; so that's working.
| | 01:16 | So now that I'm connected to my wireless
network, and I can access the Internet,
| | 01:20 | I can also communicate and share data
with the other computers on my network
| | 01:23 | that are connected both
wirelessly, and via Ethernet.
| | 01:26 | If your Wi-Fi connection is your main
network connection, I suggest coming back
| | 01:29 | here into your Settings and
checking Show Wi-Fi status in menu bar.
| | 01:32 | That puts this small menu icon up here in
the upper-right-hand corner, and that lets
| | 01:36 | you see what network
you're currently connected to.
| | 01:38 | You can see the check mark next to lyndaeast_wireless.
| | 01:40 | This is also where you can select
and join other wireless networks.
| | 01:44 | And here is a quick tip: if you hold
down the Option key, and then click the
| | 01:47 | AirPort menu, you'll see the specifics
about your Wi-Fi network; which channel
| | 01:51 | it's broadcasting on, and which
security type it's using, which is faster
| | 01:53 | than having to open your Web
browser and connect to your router's
| | 01:56 | administrative interface.
| | 01:57 | So that's how to connect to
a Wi-Fi network from a Mac.
| | Collapse this transcript |
| Understanding wireless encryption| 00:00 | These days, it's pretty much a given
that if you're going to have a home or
| | 00:03 | office network, it's going to support Wi-Fi.
| | 00:05 | With so many wireless devices, like
laptops and smartphones, in use around the
| | 00:08 | home and office, it's impractical, and
sometimes impossible, to plug each device
| | 00:13 | directly into the router with an Ethernet cable.
| | 00:15 | It's also a fact that just by the
nature of the technology, wireless signals are
| | 00:19 | less secure than using a wired connection
| | 00:21 | simply because wireless data has to
travel through the air in the form of
| | 00:24 | radio signals, which anyone with the
proper equipment and software could
| | 00:28 | potentially eavesdrop on.
| | 00:30 | It's surprisingly easy for anyone to
acquire software, and sit outside your home or
| | 00:33 | office within range of your wireless
network, and grab data like what Web pages
| | 00:37 | you visit, your username and passwords,
or even using your wireless network to
| | 00:41 | distribute illegal files.
| | 00:43 | Therefore, it's essential that you
secure the wireless portion of your network
| | 00:46 | by turning on the encryption security
settings that are built into all routers.
| | 00:50 | These days there's really no excuse not to.
| | 00:52 | Now, while no security system is 100%
completely effective, the features that
| | 00:56 | are built in to your router are
enough to deter most casual attackers from
| | 00:59 | accessing your network.
| | 01:01 | So what does it mean to
have an encrypted network?
| | 01:04 | Well, from the perspective of someone
who wants to access your wireless network,
| | 01:08 | it simply means that they will have to
enter a password that you've created in
| | 01:11 | order to gain access.
| | 01:13 | Once authenticated, the computer and the
router share a secret key which is used
| | 01:17 | to scramble and unscramble the data
they send and receive from each other.
| | 01:21 | So any information being sent from my
computer is going to be perceived as
| | 01:26 | gibberish by anyone intercepting
that data who isn't on my network, and
| | 01:29 | therefore doesn't have the
key to unscramble that data.
| | 01:32 | But my router, and any other computer
I'm communicating with on my network, for
| | 01:35 | that matter, is able to translate the
scrambled data back into it's original form.
| | 01:39 | Now, I'm not going to go into the details
of how encryption actually works. Trust
| | 01:43 | me it's very dry, and you can look up
encryption on Wikipedia if you really want
| | 01:46 | to get into that, but I do want to
give you a brief overview of the types of
| | 01:49 | encryption that are supported on most routers.
| | 01:53 | So here I have a screenshot of the wireless
security options found on my Linksys router.
| | 01:57 | Again, your router's options may vary
slightly, but most modern routers will
| | 02:00 | share these features.
| | 02:03 | The oldest encryption technology
here is WEP, which stands for Wired
| | 02:07 | Equivalent Privacy.
| | 02:08 | Turns out, though, that it didn't
really offer the equivalent of a wired
| | 02:11 | connection, because it ended up
being pretty easy for hackers to crack.
| | 02:14 | So I recommend against
using this form of encryption.
| | 02:16 | The exception is if you have an old
computer that can only support WEP, and not
| | 02:20 | the newer standards.
| | 02:21 | Be aware, though, that this will reduce
the speed of your entire network down to
| | 02:24 | wireless G standards.
| | 02:26 | So even if you have wireless N devices,
they won't be able to reach their full speeds.
| | 02:31 | Underneath WEP, we have RADIUS, but
that refers to a large network that uses
| | 02:35 | something called a RADIUS server to
authenticate users, and you're not going to
| | 02:38 | have or need something like that
on a small office or home network.
| | 02:42 | Similarly WPA Enterprise, WPA2
Enterprise, and Enterprise Mixed Mode all work
| | 02:47 | in conjunction with the radius server as well,
so you can probably ignore those options too.
| | 02:52 | So that leaves us with these last
three options, which are basically WPA,
| | 02:56 | WPA2, or a mix of both.
| | 02:58 | WPA stands for Wireless Protected
Access, and as you would probably infer from
| | 03:03 | their names, WPA2 is a newer version of WPA.
| | 03:07 | WPA2 has been available on all
certified Wi-Fi routers since about 2006.
| | 03:11 | So unless you have some weird off-
brand router, you have this option.
| | 03:15 | It provides improved encryption over WPA,
and all modern computers, and most other
| | 03:19 | current Wi-Fi devices, support this standard.
| | 03:21 | So WPA2 is really the way to go.
| | 03:24 | The only reason you would choose Mixed Mode
is if you had some older devices that only
| | 03:27 | support WPA, but my suggestion is to
stick with WPA2, and see if any of your
| | 03:31 | devices have trouble
connecting to your network.
| | 03:34 | You can always switch to mixed if
necessary, but try WPA2 to start out with.
| | 03:37 | In the next couple of movies,
I'll show you how to set it up.
| | Collapse this transcript |
| Activating WPA2 encryption| 00:00 | In the previous movie, we learned
that currently the most secure form of
| | 00:03 | network encryption is WPA2.
| | 00:06 | Now I want to show you just how
easy it is to turn on and use.
| | 00:08 | I have logged in to my router, and from
here I am going to go into Wireless
| | 00:11 | settings, and from here I
will go to Wireless Security.
| | 00:15 | Once again, this is a CISCO Linksys
router, but you should be able to find the
| | 00:18 | equivalent area on your own router.
And let me the stress again that you
| | 00:21 | should be doing this from a computer
that's connected to your router via Ethernet,
| | 00:24 | and not wirelessly.
| | 00:25 | As you can see, I currently have Security
Disabled, which is a pretty bad idea these days.
| | 00:29 | Anyone can connect to my wireless
network and use my Internet connection, or even
| | 00:32 | attempt to access my
network computers at this point.
| | 00:34 | Now, it's possible that you have
considered disabling Wireless Security because
| | 00:37 | you want to create a public
wireless network, like at a coffee shop, or
| | 00:40 | bookstore, but at the end of this chapter,
I will show you how to set up a guest
| | 00:43 | network for that sort of purpose.
| | 00:45 | Even if that's the case, you should
still set up security on this end of things
| | 00:47 | so you can protect the majority of your network.
| | 00:49 | So I will select WPA2 Personal, from
the Security Mode menu, and now all I
| | 00:54 | have to do is to create a Password.
| | 00:56 | For WPA2 Security, it has to have at least 8
characters, with a maximum of 63 characters.
| | 01:01 | If you can create and remember a 63
character password, I would say go for it,
| | 01:04 | since the more characters you
have, the more secure your password.
| | 01:07 | But otherwise, just come up with
something that can't be easily guessed.
| | 01:10 | Don't make the word password, or 12345678.
| | 01:13 | The best passwords for security and
easy recalling are a meaningful word or
| | 01:17 | phrase with a couple of numbers in there.
| | 01:19 | I will make mine 2burgers4me. So I
think I can remember that; it's got some
| | 01:23 | letters and numbers in it, and I
will click Save Settings.
| | 01:27 | So now my wireless network is
password protected. Let's see if it worked.
| | 01:30 | I will go down to my network icon, and
my Linksys router is set up with the name
| | 01:34 | Bluehorse, so I will select that. Just
rolling over, you can see the Security
| | 01:38 | Type has been set to WPA2. So when I
click that, and choose Connect, it asked me
| | 01:44 | for my Password, again I can check Hide
characters, if I don't anybody to see my
| | 01:48 | password. Although I can see the
password right here, so I would make sure I
| | 01:51 | close that window first. And now
I'm connected to my wireless network.
| | 01:57 | You can see it's connected.
| | 01:59 | So that's how easy it should be to
add wireless encryption to your network.
| | 02:03 | Now in order for any other wireless
device to connect to my network, I will need
| | 02:06 | to enter the password on
each one of those devices.
| | 02:08 | So if you often have visitors to your
home or office who need to get on with
| | 02:11 | their devices, you will have to
provide them with the password as well. Or
| | 02:13 | better yet, if your router supports it,
you can create a separate guest network,
| | 02:17 | which, as I mentioned, we'll take a look
at how to do at the end of this chapter.
| | Collapse this transcript |
| Activating WPA2 on the Airport Extreme| 00:00 | As we saw earlier, currently the most
secure form of network encryption is WPA2.
| | 00:05 | We saw how to enable WPA2 encryption
through the Linksys router's Web interface,
| | 00:08 | and in this movie I will show you how
to do so with the Apple AirPort Extreme.
| | 00:11 | I have opened the AirPort Utility,
| | 00:13 | I have my AirPort Extreme
selected, and I'll click Manual Setup.
| | 00:16 | And let me stress again that you
should be doing this from a computer that's
| | 00:19 | connected to your AirPort via
Ethernet, and not wirelessly.
| | 00:22 | Under the AirPort category at the top,
I am going to select Wireless, and here
| | 00:25 | you can see that my Wireless Security
is currently set to None, which is a
| | 00:29 | pretty bad idea these days.
| | 00:31 | Anyone can connect to my wireless
network and use my Internet connection, or even
| | 00:34 | attempt to access my
network's computers at this point.
| | 00:37 | Now maybe you've considered disabling
Wireless Security, because you want to
| | 00:40 | create a public wireless network, like at
a coffee shop or bookstore, but at the
| | 00:44 | end of this chapter I will show you how to
set up a guest network for that sort of purpose.
| | 00:47 | Even if that's the case, you should
still set up security on this end of things
| | 00:50 | so you can protect the majority of your network.
| | 00:52 | So I'll click the Wireless
Security menu to see my choices.
| | 00:55 | Notice that unlike the Linksys router
from the previous movie, we don't even get
| | 00:58 | a choice for WEP encryption.
| | 01:00 | As I mentioned earlier, WEP was
determined to be easily hackable, and pretty
| | 01:03 | insecure, several years ago.
| | 01:05 | So Apple doesn't even include that option here.
| | 01:07 | Your choices are WPA/WPA2 Personal, WPA2
Personal, or the Enterprise versions of those options.
| | 01:14 | You won't choose either Enterprise
option unless you're in a large office,
| | 01:16 | and you're planning on using your AirPort
Extreme in conjunction with a RADIUS server.
| | 01:20 | If you don't know what that is,
you probably don't need it.
| | 01:22 | Now again, since the WPA2 is the most
secure form of encryption right now, I
| | 01:25 | will choose WPA2 Personal.
| | 01:27 | If you have an older device on your
network that isn't compatible with the WPA2,
| | 01:31 | you can choose the mixed selection, but
otherwise stick with the WPA2 Personal.
| | 01:35 | All I have to do now is create a password.
| | 01:37 | For WPA2 security, it has to have at least
eight characters, with a maximum of 63 characters.
| | 01:43 | If you can create and remember a 63
character password, I'd say go for it
| | 01:46 | since the more characters you have, the
more secure your password, but otherwise
| | 01:50 | just come up with something
that can't be easily guessed.
| | 01:52 | Don't make it the word password, or 12345678.
| | 01:55 | The best passwords for security and
easy recalling are a meaningful word or
| | 01:59 | phrase with a couple of numbers in there.
| | 02:01 | So I will just type in a password.
| | 02:04 | I'll verify it by typing it again,
and I am going to leave Remember this
| | 02:07 | password in my keychain checked.
| | 02:09 | That way I won't have to type this password
each time I want to connect to the network.
| | 02:12 | So now I'll click Update to update my settings.
| | 02:14 | I will click Continue, and I will
just wait for the AirPort Extreme to
| | 02:17 | reboot, and here it is.
| | 02:20 | Now let's see if it worked.
| | 02:21 | I'll go up to my AirPort menu, and
I'll look for the Network, and there is
| | 02:25 | chownet, which is the name of my network.
| | 02:27 | It didn't prompt me for the password,
because I've chosen for it to be
| | 02:30 | remembered in my keychain.
| | 02:32 | But you can see that I am now connected
to the chownet network. And again, if I
| | 02:35 | hold down the Option key while clicking
the Wi-Fi menu, I can see some details
| | 02:39 | about the network, including that I've
turned on WPA2 Personal, and that it's
| | 02:42 | broadcasting on Channel
149 in the 5 gigahertz frequency.
| | 02:46 | So that's how easy it should be
to add wireless encryption to your
| | 02:48 | AirPort Extreme network.
| | 02:49 | Now, in order for any other wireless
device to connect to my network, I will need
| | 02:52 | to enter the password on each of those devices.
| | 02:54 | If you often have visitors to your
home or office who need to get on your
| | 02:57 | network with their devices, you will
have to provide them with the password as
| | 03:00 | well. Or better yet, if your router
supports it, you can create a separate
| | 03:03 | guest network, which as I mentioned,
we'll take a look at how to do at the end
| | 03:06 | of this chapter.
| | Collapse this transcript |
| MAC address filtering| 00:00 | Another way you can add a level of
security to your wireless network is to use
| | 00:03 | something called MAC Address Filtering.
| | 00:05 | Now this MAC stands for Media Access
Control, and has nothing to do with Apple
| | 00:10 | Macintosh computers.
| | 00:11 | Basically, every device that can connect
to networks, whether wired or wirelessly,
| | 00:15 | has what's called a MAC address.
| | 00:16 | Let me show you what I mean.
| | 00:17 | I am going to go to System Preferences,
and I'll go to Network, I'll select my
| | 00:22 | Wi-Fi card, and I'll click Advanced.
| | 00:26 | Here at the bottom I see my Wi-Fi Address.
| | 00:29 | That's my Wi-Fi card's MAC
address: 00:1b:63:ef:1b:12.
| | 00:35 | No other network device shares this number.
| | 00:37 | Let me go ahead and cancel this, and select
my Ethernet card, and click Advanced again.
| | 00:44 | Here under the Hardware tab is the
MAC address for my Ethernet card.
| | 00:48 | So my MAC computer actually has two MAC
addresses: one for the Ethernet port, and
| | 00:52 | one for the Wi-Fi card.
| | 00:53 | For wireless security, I'm only
interested in the AirPort card's MAC address.
| | 00:58 | So again you find that by selecting Wi-
Fi, clicking Advanced, and here's where
| | 01:02 | you will find that address.
| | 01:03 | Now let's see where you
find this address on Windows.
| | 01:06 | So on Windows you can find your MAC
address by clicking the Network Notification
| | 01:09 | icon, and then selecting Open
Network and Sharing Center.
| | 01:13 | Then click Change adapter settings.
| | 01:15 | Here you will see a list of all
your installed network devices.
| | 01:18 | I'll right-click my Wireless Network
Connection, and choose Status, and in here I'll
| | 01:23 | click Details. And here I'll find
the listing for the physical address.
| | 01:29 | That's the MAC address of
my computer's wireless card.
| | 01:31 | It's shown a little differently on
Windows here, with the hyphens in between the
| | 01:34 | digits instead of colons,
but this is the MAC address.
| | 01:37 | So what can we do with this information?
| | 01:39 | Well, since we know that the MAC
address is unique to every single computer, we
| | 01:42 | can go into our router settings, and here on
my router, under the Wireless tab, I'll select
| | 01:49 | Wireless MAC Filter.
| | 01:50 | I'll choose Enabled, and now I can choose
to Permit -- or Premit as the typo says here --
| | 01:58 | I can permit PCs listed below
to access the wireless network.
| | 02:01 | So all I'll have to do here is
now enter the MAC address of my
| | 02:03 | computer's wireless card.
| | 02:04 | So I would come back to this Details
window, find my MAC address, and copy it down.
| | 02:09 | I've already copied that into my Notebook app.
| | 02:11 | So I'll just copy that.
| | 02:13 | Notice I had to put the colons in here,
because that's the way my router works.
| | 02:16 | I won't bother saving that.
| | 02:18 | I'll click in here, Delete, and Paste.
| | 02:23 | Then I would continue pasting in the
addresses of any other computers that I want to
| | 02:27 | allow on my wireless network.
| | 02:28 | Now, if your computer and other devices
are already connected to your wireless
| | 02:31 | network, on this Linksys router I
can click Wireless Client List, which
| | 02:36 | normally will show me all the
MAC addresses of each computer.
| | 02:39 | Right now I currently have no
computers connected to the wireless portion of
| | 02:41 | this network, which is why
we don't see anything here.
| | 02:43 | But if there were other computers
listed here, I'd be able to copy their MAC
| | 02:45 | addresses from here, and then
paste them into the master list.
| | 02:49 | Otherwise, I would just need to type
in the MAC addresses of each computer I
| | 02:52 | want to allow to connect to my wireless network.
| | 02:54 | Now once I were to save my settings
here, even if someone stole my Wi-Fi
| | 02:57 | network's password, they still couldn't
connect to my network, because I haven't
| | 03:00 | authorized their computer's MAC address.
| | 03:02 | But again, I should mention that, like
all security options, nothing is foolproof,
| | 03:05 | and there are always ways for hackers
to sniff out the MAC addresses of the
| | 03:08 | computers you've allowed to connect to
your network, and then do what's called
| | 03:11 | spoofing your MAC address on their
computers, basically to fool the router into
| | 03:14 | thinking that their computer is one of yours.
| | 03:16 | But that takes a certain level of
skill, and limiting to only approved MAC
| | 03:19 | addresses is yet another way to add
some more security to your network.
| | 03:22 | It's also the most tedious,
because you have to manually enter the MAC
| | 03:25 | address of each device.
| | 03:26 | But if you only have a limited number
of devices, then this is another nice way
| | 03:29 | to prevent unauthorized access to your network.
| | 03:31 | Now you can also perform MAC address
filtering on the AirPort Extreme router.
| | 03:34 | Let's switch back to the Mac.
| | 03:35 | So here on the Mac I am going to go
to my Applications folder>Utilities, and
| | 03:40 | open up AirPort Utility, and in here I will
select my AirPort Extreme, and choose Manual Setup.
| | 03:46 | Here under AirPort I am
going to go to Access Control.
| | 03:49 | The cool thing about MAC address
filtering on the AirPort Extreme is that you
| | 03:52 | can limit when certain MAC addresses can
get on your network by choosing Timed Access.
| | 03:56 | You can see the first item here
allows you to specify the default amount of
| | 04:01 | time for any wireless MAC
address that's not listed in here.
| | 04:04 | I'll come back to that in a moment.
| | 04:06 | First I am going to click the plus button.
| | 04:07 | So, for example, let's say I want to
allow the computer I'm currently on to
| | 04:11 | always be able to connect
to the network at any time.
| | 04:13 | So here for the MAC Address,
I just click this computer.
| | 04:16 | It automatically fills in my MAC
address for this computer, puts in the
| | 04:20 | description, and you can see that the
rule is set to Everyday, all day, which is
| | 04:23 | exactly what I want.
| | 04:24 | I'll click Done, and I would continue to
click the plus button for each computer
| | 04:28 | I want to allow access to my network.
| | 04:29 | So, for example, here I might type the
MAC address of, say, my kid's computer. And
| | 04:34 | then I can come down and change
this from Everyday to, say, Weekdays.
| | 04:39 | I could say on weekdays I only want
them to be able to access the Internet
| | 04:43 | between the hours of 9 a.m. --
and double-click that -- 7 p.m.
| | 04:46 | But maybe on weekends,
I'll give them all day access.
| | 04:54 | You can add different times for different days.
| | 04:56 | You can even choose
specific days, as you saw here.
| | 04:58 | Now I don't actually have a MAC
address to enter in here right now, but if I
| | 05:04 | were setting this up for real, I would
just enter that in there and then click Done.
| | 05:08 | I am just going to cancel this for now.
| | 05:10 | Again, you would repeat
this process for each computer.
| | 05:12 | Now, the important part here is to
edit the default behavior, which is what
| | 05:15 | determines the access privileges for any
computers that try to connect, for which
| | 05:18 | you haven't entered a MAC address.
| | 05:20 | So I am going to select that, and click Edit,
and I am going to switch this to No Access.
| | 05:26 | I might even want to change the description to
No Access, so I remember what this is set for.
| | 05:32 | So now, any unrecognized computers
won't be able to access my network at all.
| | 05:37 | And when you're done, you would click
Update to save your settings. And that's
| | 05:40 | how you set up MAC
Filtering on the AirPort Extreme.
| | 05:42 | If you have another brand of router
than the ones I have shown you here, you
| | 05:45 | might have to dig around to find your
MAC Filtering Options, but generally all
| | 05:48 | routers have this ability, and again,
it's yet another way to add some more
| | 05:51 | security to your wireless network.
| | Collapse this transcript |
| Creating a guest network| 00:00 | These days, it seems like just about
every one of your friends, coworkers, and
| | 00:03 | family members has at least one
portable Wi-Fi device, like a laptop computer, or
| | 00:07 | smartphone. And when they come to
visit you at your home, or office, they of
| | 00:10 | course want to be able to get onto
your wireless network to check their e-mail,
| | 00:13 | or sports scores, or whatever.
| | 00:15 | Usually this involves giving them
the password to your network, which can
| | 00:18 | sometimes prove to be a socially awkward
situation, especially if you are someone
| | 00:21 | who uses the same password for
everything, and then you either have to hand over
| | 00:25 | this password, or take their device
and type in the password yourself.
| | 00:28 | Fortunately, more and more routers
these days have a feature that allows you to
| | 00:31 | set up a guest network that runs
alongside your regular network.
| | 00:34 | A guest network shows up as its own
individual network with its own separate
| | 00:37 | password, and allows you to share your
Internet connection, but not provide access
| | 00:41 | to the computers, or other
devices on your network.
| | 00:43 | So your visitors can get online, but
can't connect to your computers to see your
| | 00:46 | movies, photos, or music
collections, because they are technically on a
| | 00:49 | completely different network.
| | 00:51 | In most cases these are easy to set up.
| | 00:52 | In this movie I will show you how to
set up a guest network on a Linksys Router,
| | 00:55 | and on an AirPort Extreme. But other
routers by D-Link, Belkin, Netgear, and so
| | 01:00 | on should also have this feature, and you
should be able to easily set up a guest
| | 01:03 | network on whichever router you have,
as long as it was manufactured recently.
| | 01:07 | Now, in the case of my Linksys E2000
router, and other routers from Linksys, in
| | 01:10 | order to set up a guest network, you
have to use the Cisco Connect software that
| | 01:14 | came with the router.
| | 01:15 | You can't set up a guest network using
the Web-based interface that we've been
| | 01:17 | using up to this point.
| | 01:19 | So I'll go ahead and close this, and I
will go to the Start menu>All Programs, and
| | 01:24 | I'll find the Cisco Connect
software that I installed right here.
| | 01:28 | And out of these options here I'll
choose Guest access, and all I have to do here
| | 01:31 | is click Yes to guest access.
| | 01:33 | Now, the Guest network name is simply my main
wireless network's name with guest added to it.
| | 01:37 | Now the Cisco software also
generates a password for me.
| | 01:40 | Now I have actually reset my router
several times, but when you get one of these
| | 01:43 | routers frseh out of the box, it
actually gives you a good password; not just guest.
| | 01:47 | The Cisco software uses a unique word
and number combination for your password,
| | 01:51 | but now that I have reset it a
couple of times it's just giving me guest.
| | 01:54 | So in this case I do want to change it to
something a little less obvious than guest.
| | 01:57 | So here I have to type in a
password that's 4 to 32 characters long.
| | 02:00 | I will just choose radishes32.
| | 02:04 | Don't ask me why, but that's the
password, and I am going to remember that.
| | 02:07 | I will click Change.
| | 02:09 | Now this next option is to select how many
guests you will allow on the network at once.
| | 02:13 | In this case I can allow between 1
and 10, which is nice if you have a
| | 02:16 | slow Internet connection, and you don't want
all your guests hogging up your bandwidth.
| | 02:19 | I'll just leave this is set to 5.
| | 02:20 | Now notice it tells me here that my
guests should connect to my wireless guest
| | 02:23 | network listed above, open a Web
browser, and then enter the guest password.
| | 02:27 | So those are important instructions
to know for the people who are going to
| | 02:29 | connect to this guest network.
| | 02:30 | I will click Finish, and I will
close the Cisco Connect software.
| | 02:34 | So let's take a look at how this works.
| | 02:36 | Let's say I am a guest, and I need to get online.
| | 02:38 | I'll click my Network icon, and there
it is; just showed up: Bluehorse_guest.
| | 02:42 | That's the guest network, right there.
| | 02:43 | So I will select that and connect to it.
| | 02:47 | Now Windows is telling me, Additional
log on information may be required;
| | 02:50 | Click to open your browser.
| | 02:51 | So I'll click that.
| | 02:52 | All right, and now I will try to
connect to a Web site. And because I am on
| | 02:57 | the guest network, I see this Guest
access screen where I have to enter the
| | 03:00 | password for this network.
| | 03:01 | This is the password we just set up in
the Setup Utility, and this is the same
| | 03:05 | password that you will provide to your visitors.
| | 03:06 | I believe it was radishes32.
| | 03:10 | Login, and now I am connected to the Web,
and I can browse around on the Internet,
| | 03:14 | but I can't access any of the
computers on the main network.
| | 03:17 | So if your guest network setup is
similar to this on your router, it's
| | 03:19 | important to tell your guests to first
open a Web Browser on the devices to
| | 03:22 | complete the sign in process.
| | 03:24 | If they just try to use their mail
programs, or some other non-browser-based
| | 03:27 | service, it won't be able to connect
until they open a Web page in their browser.
| | 03:31 | Okay, so that's how to set up the guest
network with the Cisco Connect software.
| | 03:34 | Let's switch over to the Mac, and see how to
create one on the AirPort Extreme. All right!
| | 03:39 | So here on the Mac I am going to open
up my AirPort Utility by going to my
| | 03:42 | Applications folder>Utilities, and in
here I will find AirPort Utility. And it's
| | 03:47 | found my AirPort Extreme; I am
going to click Manual Setup.
| | 03:51 | And here under AirPort, we have the Guest
Network tab, and all you have to do here
| | 03:54 | is check Enable guest network.
| | 03:56 | By default, the name it's assigned
is your regular wireless network's name
| | 03:59 | with the word Guest appended to it,
but you are free to change this to
| | 04:02 | anything else you want.
| | 04:03 | Also, you have the option here to allow guest
network clients to communicate with each other.
| | 04:07 | With this option checked, two or more
guests can share files over the guest
| | 04:10 | network as long as they have the
proper sharing settings turned on on their
| | 04:13 | devices, which may be convenient if you
have a bunch of coworkers over to your
| | 04:16 | home office, and you need to share
files with each other, but you don't want to
| | 04:18 | give them access to your main wireless network.
| | 04:20 | All you have to do is make sure this
option is checked, give them access to the
| | 04:23 | guest network, and then hop onto the
guest network yourself to exchange files.
| | 04:26 | And, of course, you should set up
security on your guest network.
| | 04:29 | I have WPA2 Personal selected, and I
have created a password separate from my
| | 04:32 | main wireless network's password.
| | 04:34 | Click Update when you're done.
| | 04:37 | The AirPort Extreme will reboot itself,
and when it comes back on, if I turn on
| | 04:40 | my wireless card, and yup, there is APX Guest.
| | 04:44 | I can select it, type in my password, and
now I am connected to the guest network.
| | 04:49 | Now unlike the Cisco Linksys setup we
saw, your guests won't have to open a Web
| | 04:52 | page to connect your guest network.
| | 04:54 | They will just have to connect to the
network from their devices, at which point
| | 04:56 | they will be prompted for the password,
and once they've entered it correctly, as we
| | 04:59 | just saw, will be on the network right away.
| | 05:01 | So there you have two examples
of how to create guest networks.
| | 05:04 | Other routers, like the D-Link brand of
routers, have Web-based interfaces for
| | 05:07 | creating guest networks, but you'll find
they are easy to set up, and have similar
| | 05:09 | features to what you saw in these two examples.
| | 05:11 | It's a very useful ability to have a
guest Network, and since they are so easy to
| | 05:14 | set up, I suggest creating one so you
will be ready the next time you have
| | 05:17 | visitors who need to get online.
| | Collapse this transcript |
|
|
4. Sharing an Internet ConnectionUnderstanding broadband types| 00:00 | One of the primary reasons many people
create a home or small office network is
| | 00:04 | to share a single Internet connection.
| | 00:06 | Generally, you pay to subscribe to a
broadband Internet service, and then use
| | 00:09 | a router to distribute the Internet service to
all the computers and devices on your network.
| | 00:13 | But before we get into the details of
sharing service, I thought it was important
| | 00:16 | to clarify what the most popular types
of broadband service are, and what some of
| | 00:20 | their advantages and disadvantages are.
| | 00:22 | Now what do we mean when we say broadband?
| | 00:24 | Generally, broadband refers to any type
of Internet service that isn't dial-up.
| | 00:28 | Broadband service is always on, meaning
you don't have to dial a number over your
| | 00:31 | phone line to connect to a
service before you can get online.
| | 00:33 | And, as its name implies, broadband is
also much faster than traditional dial-up
| | 00:37 | access, so more data can be
transferred in much shorter time.
| | 00:40 | So you can enjoy services like high-
quality streaming music, interactive
| | 00:44 | multimedia games and presentations, and
you can download videos much faster on
| | 00:48 | video intensive sites, like lynda.com.
| | 00:50 | These days you pretty much have to
have a broadband connection if you want to
| | 00:53 | do anything more than sending and receiving
e-mail, or browsing the most basic of Web pages.
| | 00:57 | And unless you're in a remote, rural area,
you probably have at least one option
| | 01:00 | when it comes to receiving broadband services.
| | 01:02 | So let's take a look at some types.
| | 01:04 | Now, just as a point of comparison, and
because it still exists, let's start by
| | 01:08 | looking at traditional dial-up service,
which you can get through companies like
| | 01:10 | NetZero and EarthLink.
| | 01:12 | You connect to a service by dialing a number
with a dial-up modem connected to your computer.
| | 01:16 | The service itself is really,
really slow by today's standards.
| | 01:19 | You have a theoretical speed of 56
kilobits per second for downloads, and
| | 01:23 | the same for uploads, but that varies greatly
depending on the quality of your connection.
| | 01:27 | It's generally free or very
inexpensive to have dial-up, but if you have
| | 01:30 | broadband available in your area, and
you plan of spending more than a little
| | 01:33 | time on the Web, you definitely need to make
the move away from dial-up, and get broadband.
| | 01:37 | One very popular form of broadband is
cable broadband, which is provided, not
| | 01:41 | surprisingly, by your cable TV provider,
and uses the same lines as the TV uses
| | 01:45 | to enter your home or office.
| | 01:47 | cable broadband is usually available in
speed tiers, and you pay more for faster speeds.
| | 01:51 | They can start around 1.5 megabits
per second, which is actually considered
| | 01:54 | kind of slow these days.
| | 01:56 | And as I'm recording this movie,
Comcast's XFINITY service is preparing to
| | 01:59 | launch a broadband tier that they
say will offer up to 105 megabits per
| | 02:02 | second, which would make it one of the
fastest residential and small business
| | 02:06 | broadband services available.
| | 02:07 | Also, expect it to be the most
expensive available since you'll always pay a
| | 02:10 | premium for the fastest speeds.
| | 02:12 | Generally, for the home or small office,
you'll probably be more than satisfied
| | 02:15 | with the balance of price and speed you get
from a 20 to a 30 megabit per second connection.
| | 02:20 | Now again, these are theoretical speeds.
| | 02:22 | One issue with cable broadband is that
you share the pipeline with your neighbors.
| | 02:26 | To use the technical jargon, you're on the
same node as everyone else in your neighborhood.
| | 02:29 | So you'll probably find that your speed
slows down during high-traffic times of
| | 02:32 | the day, such as when the kids get home
from school, or right after dinner time.
| | 02:36 | During off-peak hours, though, you'll
probably find your speeds going back up to
| | 02:39 | what you're paying for.
| | 02:40 | The next type of broadband
service you've probably heard of is DSL.
| | 02:44 | DSL stands for Digital Subscriber Line,
and the service is transmitted over the
| | 02:47 | same phone lines that run to your
home or office, but it doesn't interfere
| | 02:50 | with your phone service.
| | 02:51 | So you can use your phone
and be online at the same time.
| | 02:54 | DSL has speeds ranging from about 0.
5 megabit per second up to around 50
| | 02:58 | megabits per second.
| | 02:59 | One advantage of DSL is that you
don't share a node with your neighbors, so
| | 03:03 | the speeds you pay for are usually closer to
what you actually get at all times of the day.
| | 03:06 | But your speed also depends on your
home or office's distance from your phone
| | 03:09 | company's closest switching station.
| | 03:11 | The closer you are, the
faster your service can be.
| | 03:13 | The further away you are, the slower your speed.
| | 03:16 | In the past, DSL providers used to
guarantee your speeds, but because of the
| | 03:19 | factors of distance, and the quality
of the phone lines, they generally just
| | 03:22 | offer their services in speed ranges.
| | 03:24 | One important thing to consider about
DSL is that the upload speeds aren't great.
| | 03:28 | At best, you get 1 megabit per second,
which is really slow if you have to move
| | 03:31 | large files like videos over the Internet.
| | 03:33 | If you have to send large files, and if
you have a choice of services, you would
| | 03:36 | be better off with cable or fiber.
| | 03:38 | Fiber is the newest broadband
technology, and many residential neighborhoods and
| | 03:42 | office parks are being built
with fiber optic lines installed.
| | 03:45 | So phone companies no longer need to
run copper wires, and can instead offer
| | 03:48 | phone and Internet service
over the fiber optic lines.
| | 03:50 | Verizon's FiOS service is probably
the most well known and prevalent
| | 03:54 | fiber service in America.
| | 03:55 | And currently, fiber offers some of
the fastest broadband speeds available.
| | 03:59 | You can get service starting around 50
megabits per second down and 5 megabits
| | 04:02 | per second up, all the way down to
150 megabits per second down and 35
| | 04:06 | megabits per second up.
| | 04:07 | But again, unless you're moving a
ton of data both up and down over the
| | 04:10 | Internet, you probably won't want to pay
the premium price for the fastest speeds.
| | 04:14 | Anywhere around 25-50 megabits per
second down and 20-25 megabits per second up
| | 04:18 | is probably fine for most applications.
| | 04:20 | And, by the way, just to clarify,
when I talk about down, I'm talking about
| | 04:23 | download speeds, meaning information
that is coming from the Internet to your
| | 04:26 | computer, and up refers to upload
speeds, meaning information that is leaving
| | 04:30 | your computer and going out to the Internet.
| | 04:32 | With fiber, you'll generally have to
pay more for the lowest package plans.
| | 04:35 | Although many cable and fiber
providers are bundling phone, Internet, and
| | 04:38 | TV services together, and you can
usually get a deal if you agree to a
| | 04:41 | multi-year commitment.
| | 04:42 | You'll have to check with your
local provider for the details.
| | 04:45 | Now, if you live in a part of the
country where you can't get cable, DSL, or
| | 04:48 | fiber broadband, one other option
that's available is mobile broadband.
| | 04:52 | Almost all the major cell phone
carriers offer plans so that you get your
| | 04:55 | Internet service off their mobile network.
| | 04:57 | It usually requires a mobile modem
that you connect to your computer via USB.
| | 05:00 | These plans are generally the most
expensive, though, usually starting around $50
| | 05:04 | per month, and you get the slowest
download and upload speeds compared to the
| | 05:07 | traditional services.
| | 05:08 | Additionally, all the carriers impose
data caps, meaning you can only download
| | 05:11 | so much data over a billing period,
and if you go over your limit, you're
| | 05:14 | charged extra for the extra data.
| | 05:16 | Most carriers offer levels of plans,
but none offer unlimited packages anymore.
| | 05:20 | Still, if you need to get online and
this is your only option, it's better
| | 05:23 | than nothing, and you can still share your
connection with multiple computers over a network.
| | 05:27 | Lastly, one other option you may find
if you can't locate any other broadband
| | 05:30 | services in your area is satellite service.
| | 05:33 | Many satellite TV providers, as well as
dedicated Internet services, can provide
| | 05:36 | broadband over satellite signals.
| | 05:38 | It's still kind of a last ditch
choice though, since the download and upload
| | 05:41 | speeds are pretty slow.
| | 05:42 | But like mobile, if you have no choice,
it's probably better than nothing.
| | 05:45 | Now, if you're not sure what services are
available in your area, a good place to
| | 05:49 | start is broadbandreports.com.
| | 05:51 | They have a review area where you can
punch in your ZIP Code, and get a list of
| | 05:54 | services available in your neighborhood,
as well as reviews from your neighbors
| | 05:57 | who use them, so you can get a better
idea of the quality and speed of the
| | 06:00 | service from real people.
| | 06:01 | So be sure to check out Broadband
Reports if you're not sure where to start.
| | 06:04 | Okay, so that's an overview of the
most common types of broadband services.
| | 06:08 | In the rest of this chapter, we'll
look at some network management activities
| | 06:10 | that relate to your Internet connection.
| | Collapse this transcript |
| Understanding firewalls and port forwarding| 00:00 | One of the main advantages of having a
router set up on your network is that you
| | 00:04 | automatically get a pretty decent level
of security against people who may try
| | 00:06 | to hack in from the Internet.
| | 00:08 | That's because the router
acts as an intermediary for all
| | 00:10 | communications between not only the
computers on your network, but it also
| | 00:13 | handles all communications between
the computers on your network and the
| | 00:16 | rest of the Internet.
| | 00:17 | And that's what I'd like to
focus on here in this movie.
| | 00:19 | I want to talk about what the router does to
protect your computers from outside attacks.
| | 00:23 | First let's look at a routerless scenario.
| | 00:25 | Let's say you subscribe to cable
broadband, but what I'm about to cover holds
| | 00:28 | true for DSL, fiber, and
satellite broadband as well.
| | 00:31 | The cable company has sent you a modem,
which you connect to the cable coming out
| | 00:34 | of your wall, or a phone line in the case of DSL,
| | 00:37 | and this connects the modem to the Internet.
| | 00:39 | And then you connect the modem to
your computer with an Ethernet cable.
| | 00:42 | When you power up the modem and your
computer, your computer is assigned an IP address.
| | 00:46 | This is its own unique address on the Internet;
| | 00:48 | no other in computer in
the world has this address.
| | 00:50 | The IP address you're assigned is also
known as the WAN, or Wide Area Network
| | 00:54 | address, because the Internet is
essentially a big wide network.
| | 00:57 | Now certain bad people out there on the
Internet are constantly scanning random
| | 01:01 | IP addresses, and testing
them for vulnerabilities.
| | 01:03 | If your IP address randomly comes up,
and you don't have a firewall running on
| | 01:06 | your computer, there's a possibility
that someone could find their way into your
| | 01:09 | system, and cause all sorts of problems.
| | 01:11 | So the main issue here is that in
this setup, your computer is essentially
| | 01:14 | directly connected to the Internet.
| | 01:16 | Another issue with this setup is that
you can only connect one computer at a
| | 01:19 | time to the Internet.
| | 01:20 | So a router can solve both of
these problems, and more, for you.
| | 01:24 | When you throw a router into this setup,
you connect it directly to the modem in
| | 01:26 | place of the computer.
| | 01:27 | So your WAN IP address is
assigned to it, instead of your computer.
| | 01:32 | Your computers are connected to the
router, and the router, in most cases, then
| | 01:35 | assigns each computer its own local
IP address, also known as a LAN, or Local
| | 01:39 | Area Network address.
| | 01:41 | So all the computers connected to
your router are part of the LAN network,
| | 01:44 | and your modem and router are connected to
the WAN, the Internet, or Wide Area Network.
| | 01:49 | So now if someone on the Internet
were trying to get into your network
| | 01:52 | through your WAN address, they would run into
the router instead of directly into a computer.
| | 01:55 | The router acts as kind of the mean
receptionist for all the computers on your
| | 01:58 | network, and it allows only incoming
communications that have been requested.
| | 02:01 | For example, if the computer in the
upper left here wants to view a Web page,
| | 02:05 | the router sees that the computer
at 192.168.1.100 has requested some
| | 02:10 | information, so it sends this
information out to the Internet.
| | 02:12 | But before doing so, it uses something
called Network Address Translation, or NAT.
| | 02:17 | Basically,
| | 02:18 | it reformats the request to make it
look like it's coming directly from the WAN
| | 02:21 | address, 74.125.224.51 in this case.
| | 02:25 | So the Web server receiving this request
just thinks it's coming from that WAN address.
| | 02:29 | And when the Web server sends back the
Web page to the WAN address, the router
| | 02:32 | first sees that this incoming information
really was requested by someone on the network.
| | 02:36 | And it also knows to send the
information just to the Mac at 192.168.1.100, and
| | 02:42 | not to the PC, or to any other
computers or devices on your network.
| | 02:46 | On the other hand, if the router
receives an incoming communication that wasn't
| | 02:48 | requested, the router recognizes
it as such, and it just rejects all
| | 02:52 | nonrequested incoming messages.
| | 02:54 | Because the router is in the way doing
its job, there's no way for anyone on the
| | 02:57 | Internet to know how many computers,
if any, are actually on your network.
| | 03:01 | Now this is all great, but you can also
run into problems, because occasionally
| | 03:04 | you do want to receive
nonrequested communications.
| | 03:06 | For example, you might want to use one
of your computers as a server to share
| | 03:10 | files with coworkers or clients.
| | 03:11 | In order for someone to access my
computer, I need to give them my WAN IP
| | 03:15 | address, either by phone or e-mail, for example.
| | 03:17 | But that only gets them as far as my router,
| | 03:19 | and by default my router is going to
reject any request to connect to computers
| | 03:23 | on my network if I don't
initiate the connection myself.
| | 03:25 | So what I need to do is to tell the router
to allow certain types of requests through.
| | 03:29 | You do this by opening what are
called ports in the router's firewall.
| | 03:32 | When you're surfing the Web, checking
e-mail, or chatting with someone over the
| | 03:35 | Internet, unbeknownst to you is that
all the different types of information you
| | 03:38 | send are going through specific
ports in your router's firewall.
| | 03:41 | For example, Web page requests go
through port 80, and e-mail goes through port 25.
| | 03:46 | These are kind of arbitrary numbers, but
they're the numbers that have been agreed upon.
| | 03:49 | So when I want to allow someone to
access the files on one of my computers
| | 03:52 | through my firewall, I have
to open the correct ports.
| | 03:55 | For instance, if I'm using Apple File
Sharing to share files from one of my
| | 03:58 | Macs, I have to use port 548.
| | 03:59 | Well, how did I find out this port number?
| | 04:02 | Well, in most cases, you can Google the
phrase "port number", along with the name
| | 04:05 | of the service you want to open on your router.
| | 04:06 | In this case, I Googled AFP port number.
| | 04:09 | There's also a Wikipedia page called
List of TCP and UDP port numbers, that lists
| | 04:14 | the most popular and common
ports you may need to open.
| | 04:16 | So okay, in order to allow people to
access my Mac, I need to open port 548,
| | 04:21 | because by default that port is closed.
| | 04:23 | So anyone trying to communicate to my
network over those ports will be rejected,
| | 04:26 | so I need to open port 548.
| | 04:29 | Not only that, but then I have to tell
the router which computer is going to be
| | 04:32 | receiving communications over this port.
| | 04:34 | Otherwise, with multiple computers on my
network, the router has no idea where to
| | 04:37 | send the incoming information.
| | 04:38 | So basically I have told the router,
anytime you receive communications on port
| | 04:42 | 548, send those directly to my Mac.
| | 04:45 | This is called port forwarding.
| | 04:46 | Depending on the type of service
you are working with, you'll have to
| | 04:48 | open different ports.
| | 04:49 | Again, you can check that Wikipedia
page for a list of common ports, or if
| | 04:53 | you're playing online games with other
people, you might be able to check the
| | 04:55 | documentation that came with the game
to see if it supplies any port numbers
| | 04:59 | you might need to open.
| | 05:00 | So once I've set up port forwarding and
someone tries to communicate with my Mac
| | 05:03 | via AFP using my WAN address,
they'll be connected to my Mac.
| | 05:07 | Now of course you'll still have to
supply them with the name and password you
| | 05:09 | set up on your Mac in order to allow
people to connect, but they would never
| | 05:12 | even get to your Mac if you
hadn't opened the port, and forwarded
| | 05:15 | communications to it.
| | 05:16 | Now occasionally you might find
yourself in a situation where port forwarding
| | 05:19 | just doesn't seem to be working, or you
just don't know what ports you need to open
| | 05:22 | for a particular program.
| | 05:23 | In those cases, you can
set up a DMZ on your router.
| | 05:26 | DMZ stands for De Militarized Zone,
and is basically a quick and easy way to
| | 05:30 | place a single computer on your
network in front of the firewall.
| | 05:33 | All you do is set up the router to
direct all incoming communications to a
| | 05:36 | specific LAN address.
| | 05:37 | This is pretty as same as connecting
your computer directly to the modem
| | 05:40 | without the router.
| | 05:41 | This can often solve a lot of
connection problems, because you're exposing the
| | 05:44 | computer to all kinds of communications.
| | 05:46 | But it can also cause problems,
because your computer is unprotected.
| | 05:49 | It's generally a good idea to only
place a computer in the DMZ for just
| | 05:52 | the time necessary to get your work done, and
then just stick it back behind the firewall.
| | 05:56 | All right!
| | 05:56 | So now let's take a look at how
you open up ports on a router.
| | 05:59 | I've gone into my Web browser here, and I've
gone to 192.168.1.1 and logged into the router.
| | 06:04 | Again, I'm working with a Cisco Linksys
router here, but you should be able to
| | 06:08 | find similar settings on
whichever brand of router you have.
| | 06:10 | I'm going to go over to
Applications & Gaming on this router.
| | 06:13 | And with this particular router, I have
a choice of Single Port Forwarding or
| | 06:16 | Port Range Forwarding.
| | 06:18 | On some other routers, single and port
range forwarding are all in the same page.
| | 06:21 | Which one of these you use depends
on what application or service you're
| | 06:24 | trying to open ports for.
| | 06:25 | Here's that Wikipedia page,
again, that lists port numbers.
| | 06:28 | Notice that many of these
have single port numbers.
| | 06:30 | But you'll find that some, like for
instance, BitTorrent here, have a range. In
| | 06:34 | this case, 6889-6890.
| | 06:37 | Windows Live Messenger has 6891-6900.
| | 06:41 | IRC, or Internet Relay Chat,
has 6660-6664, and so on.
| | 06:46 | But most of these are single number ports.
| | 06:48 | It really all depends on which
applications you're opening ports for, and you'll
| | 06:52 | either have to look it up here or
check the documentation that came with the
| | 06:55 | game or program you're using.
| | 06:56 | To go with my Apple File Sharing example,
for instance, I'll do a Find for AFP,
| | 07:03 | and I found it right there.
| | 07:04 | You can see the port here is 548.
| | 07:06 | So that's a single port that I need to open.
| | 07:08 | So I go back to my router; go
back to Single Port Forwarding.
| | 07:12 | Now here on the Linksys router, they
reserve the first five spaces for common
| | 07:16 | ports you might want to open.
| | 07:17 | For example, I can choose FTP, or File
Transfer Protocol, and it automatically
| | 07:21 | fills in those port numbers for me.
| | 07:23 | The External Port and the Internal
Port are usually the same number.
| | 07:27 | Now AFP isn't listed here, though, so
I'm going to choose None here, because I
| | 07:30 | don't want to open FTP.
| | 07:31 | But I'm going to go to the first
available field here, and I'll type AFP right here.
| | 07:35 | This is just a label, it actually has
no effect in your settings, but it's just
| | 07:38 | here to help remember what ports you're opening.
| | 07:40 | So for the External Port, I'll type
548, which is the port that we saw in the
| | 07:43 | Wikipedia page, and for the Internal also 548.
| | 07:48 | Next we have to say which protocol we're using.
| | 07:50 | The choices here are TCP, UDP, or Both.
| | 07:53 | TCP stands for Transmission Control
Protocol, and UDP stands for User Datagram Protocol.
| | 07:58 | You don't need to
remember either of those things.
| | 08:00 | They're basically both languages used to
transfer data from one computer to another.
| | 08:04 | And while you could look up which one
your particular application uses, I say in
| | 08:07 | almost all cases just leave Both selected.
| | 08:10 | That way you don't have to worry about
specifying one or the other. All right!
| | 08:12 | Next to that is IP Address.
| | 08:15 | And this is where you specify which
computer information coming in through this
| | 08:18 | port should travel to.
| | 08:19 | I showed you earlier how to find your
computer's IP address, so once you locate
| | 08:22 | it, you'll enter that here.
| | 08:24 | Here on my Mac, just as a quick review,
I can go to my System Preferences, look
| | 08:28 | under Network, and here at Ethernet, I
can see my IP Address is 192.168.1.135.
| | 08:35 | Notice that all but the last set
of the digits are pre-filled for me.
| | 08:38 | So all I have to do here is fill in 135.
| | 08:40 | And lastly, I want to click Enabled
to say that I want to open this port.
| | 08:43 | Nothing will happen, though,
until I save my settings.
| | 08:47 | And that's all there really is to it.
| | 08:48 | You can see my configuration changes
have been set. I'll click Continue to go
| | 08:51 | back to the settings.
| | 08:53 | And I've just set it up so that all
communications sent through this port
| | 08:56 | go immediately to the computer at 192.168.1.
135, which is this computer that I'm using.
| | 09:01 | I can also come back in here at anytime
and uncheck Enabled at anytime I want to
| | 09:05 | close that port again. All right!
| | 09:06 | Now also notice I have this section called DMZ.
| | 09:10 | Again, this is the De Militarized Zone.
| | 09:11 | So this is the area where you put the
address of the computer that you want to
| | 09:14 | put in front of your router's
firewall, just in case you're having trouble
| | 09:17 | communicating with another
computer over the Internet.
| | 09:19 | All I have to do here is click Enabled.
| | 09:22 | Now because this does leave your DMZ
computer unprotected, you have a couple
| | 09:25 | of other choices here.
| | 09:26 | Now these options might not be
available on your router, but on the Linksys
| | 09:29 | router here, I can choose Any IP
Address, or I can specify an IP address.
| | 09:33 | With Any IP Address selected, anyone
who has my WAN address can potentially
| | 09:37 | connect to my DMZ computer.
| | 09:39 | You would choose this option if more than
one person needs to connect to your computer.
| | 09:42 | But I can also specify an IP address.
| | 09:44 | So if I wanted to make sure only one
person could connect to this computer, I
| | 09:47 | can ask him for his WAN
address, and then enter it here.
| | 09:50 | That way my router will only allow
communications from that specific address to
| | 09:53 | access my DMZ computer.
| | 09:55 | The Destination is where I specify which
of my computers I want to place in the DMZ.
| | 09:59 | So again, I know that this particular
Mac is 192.168.1.135, so I'll enter 135.
| | 10:06 | When your computer is in the DMZ, you
don't have to open ports on your router,
| | 10:09 | because your computer is in front of
the firewall, so all communications go
| | 10:12 | directly to your computer.
| | 10:14 | Now, because normally your router
dynamically assigns IP addresses to each
| | 10:17 | computer on your network, it's
possible that your computer's LAN IP address
| | 10:21 | might change at some point.
| | 10:22 | But as we learned in an earlier chapter,
each computer also has a unique MAC
| | 10:26 | address, which you can enter here, so
even if your computer's IP address changes,
| | 10:30 | its MAC address never will.
| | 10:32 | So you can enter it here to make sure all DMZ
communications always go to the same computer.
| | 10:36 | But again, having DMZ enabled is
really only something that you should have
| | 10:39 | temporarily enabled, because it leaves
your computer much more vulnerable than
| | 10:42 | keeping it behind the router.
| | 10:43 | So when you're done with what you're
doing, be sure to set it back to disabled.
| | 10:46 | Now just in case you've forgotten how
to find your computers' IP addresses,
| | 10:49 | you'll find those steps back in
Chapter 1 in the movies on Understanding Wired
| | 10:53 | Connections on Windows and Macs.
| | 10:55 | And I just gave you a quick
MAC refresher here as well.
| | 10:57 | And you'll also find the steps on
locating in your computer's MAC address in
| | 11:00 | Chapter 3 in the movie
that discusses MAC filtering.
| | 11:02 | So be sure to check those movies
again if you need a quick review.
| | Collapse this transcript |
| Restricting internet access| 00:00 | Being able to share a single Internet
connection with every computer on your
| | 00:03 | network is great, but there may be
times when you actually want to restrict
| | 00:06 | access to the Internet.
| | 00:07 | For example, if you want make sure
people in your office aren't using certain
| | 00:09 | services during work hours, or maybe
you're a parent and you don't want your kids
| | 00:13 | surfing the Web after
certain hours on school nights.
| | 00:15 | Now again, I'm using a Linksys router
here, so in my particular case I have
| | 00:18 | logged into the router, and I am
going to go to Access Restrictions.
| | 00:21 | You might have to hunt around in your
router's settings, but most routers do have
| | 00:25 | similar features to what I
am going to show you here.
| | 00:27 | Here in Access Restrictions, this is
where you can set up Internet Access Policy,
| | 00:30 | and if I click the Access Policy menu,
you can see I can have up to 10 policies
| | 00:35 | or rules for when certain services
can be accessed through my router.
| | 00:38 | In this case I will start with Rule 1.
| | 00:41 | First I will enter a name for this
policy I am about the create, and I will call
| | 00:43 | this one School Night, since I am
setting this one up for the kids, and I will
| | 00:48 | click Enabled to turn this policy on.
| | 00:50 | Next I need to tell the router,
which PCs this is going to affect.
| | 00:53 | I will click the Edit List button, and
here I have a couple of different ways to
| | 00:57 | identify which computers I want
to apply these restrictions to.
| | 01:00 | In this case, maybe I know the two
kid's computers with IP addresses
| | 01:03 | 192.168.1.104 and at 105. Maybe my
computer is at 106 or 107, but I want to
| | 01:11 | maintain full access for myself, so
I am not going to enter my own IP
| | 01:14 | address anywhere here.
| | 01:15 | Now you also have the option of
identifying the computers with the MAC addresses.
| | 01:19 | Again, this is a unique ID
number for each network device.
| | 01:22 | As I've previously mentioned,
since your router assigns IP addresses
| | 01:25 | dynamically, each computer's IP
address might sometimes change.
| | 01:28 | So if you're restricting your kid's
access by IP address, and their address
| | 01:31 | changes, or if your kids are tech savvy,
and they know how to change your IP
| | 01:34 | addresses, you could instead enter their
MAC addresses here, which are much more
| | 01:38 | difficult to spoof, or get around.
| | 01:39 | I am not going to bother with
MAC addresses right now though.
| | 01:41 | Notice you also the option of
specifying a range of IP addresses.
| | 01:45 | This is for when you might have
assigned certain computers a certain range of
| | 01:48 | IP addresses manually.
| | 01:49 | Maybe in your small office the
accounting computers are all in the range of
| | 01:52 | 101-110, and the HR computers are in the
range of 111-120, and maybe you want to
| | 01:58 | limit accounting's access.
| | 02:00 | So instead of entering each of the 10
IPs manually in the IP Address area here,
| | 02:04 | which we can do anyway, because there
is six spaces, I could leave those blank
| | 02:08 | and then just type in a range of 101-110,
but I am to going to do that right now either.
| | 02:12 | I am just going to leave the 104 and 105
addresses here, and I will click Save Settings.
| | 02:18 | I'll click Continue, and I
can close this Window now.
| | 02:22 | So now any rules I set up are only going
to affect the computers at those two IP
| | 02:26 | addresses I specified.
| | 02:27 | Next, I'll choose whether I am going to
allow or deny Internet access during the
| | 02:31 | hours I am about to select.
| | 02:31 | I will choose Deny.
| | 02:34 | And then I can choose which days of
the week I want this to go into effect.
| | 02:37 | I will uncheck Everyday, and then check
all the days that have school nights.
| | 02:42 | Sunday, Monday, Tuesday, Wednesday,
Thursday, and I'll leave Friday and
| | 02:45 | Saturday unchecked.
| | 02:46 | Now currently, Internet access is
going to be completely denied at all times
| | 02:50 | for each day I select, but I want my kids to be
able to get online for homework in the evenings.
| | 02:54 | So instead of having 24 Hours selected
here, I will select this radio button, and
| | 02:58 | I will have this rule going to effect
Sunday through Thursday from, say, 8:30 p.m.
| | 03:06 | until I will say 11:55 p.m.
| | 03:13 | Now if I was concerned that my kids
would sneak out of bed after midnight and
| | 03:19 | get online, I have to create another
policy that would restrict access from
| | 03:23 | midnight to say 7 a.m. And yes, they
would have a five minute period between
| | 03:26 | 11:55 and midnight in which they would be able to
get online, but I woulnd't have to tell them that.
| | 03:30 | But that's all I have to do to set up a
time restriction on the entire Internet.
| | 03:33 | Let's scroll down and click Save
Settings, and that policy is now in effect.
| | 03:37 | So you can see the policy is now listed
in the Policy menu, and I can create nine
| | 03:42 | more policies at this point.
| | 03:44 | Now this is a pretty restrictive
policy I have set up here, because once 8:30
| | 03:47 | comes around, boom, the entire
Internet shuts down as far as those two
| | 03:51 | computers are concerned.
| | 03:52 | They will have no access to Web pages,
chat services, e-mail, or anything else.
| | 03:56 | But maybe I just want to block
e-mail during this time period.
| | 03:58 | I want my kids to still be able to
browse Web sites, but I don't want them
| | 04:01 | sending e-mails to their friends.
| | 04:03 | So I am just going to
change this current policy.
| | 04:05 | I am going to change this to Allow, and
by checking Allow, that means Internet
| | 04:09 | access is now allowed Sunday through
Thursday during the hours I specified.
| | 04:12 | But now I can come down here to Blocked
Applications, and here I can choose the
| | 04:16 | type of communications that will be restricted.
| | 04:18 | I am going to select POP3,
| | 04:22 | Add that to the Blocked List, and
IMAP, and add that to the Blocked List.
| | 04:26 | Those are e-mail protocols.
| | 04:27 | I am also going to block SMTP.
| | 04:30 | So now they'll still be able to browse
Web sites, but not receive e-mail through
| | 04:33 | their e-mail applications.
| | 04:35 | But what if they use Gmail, or some other
e-mail service you can get to through Web sites?
| | 04:38 | Well, I can come up to Website Blocking
by URL Address and enter gmail.com. And
| | 04:45 | for good measure, maybe I want to block Facebook.
| | 04:49 | I think you get the idea.
| | 04:49 | Now there is also where you can block
Web sites by keywords, meaning if certain
| | 04:54 | words appear on Web sites -- and you know
which words we are talking about -- and you
| | 04:57 | don't want your kids seeing those Web
sites, you can type up to four different
| | 05:00 | words here. But I am not going to type
those words right now; instead I am just
| | 05:03 | going to click Save Settings.
| | 05:06 | So now I have set up some basic restrictions.
| | 05:08 | Again, your router may have similar
features, or even more restriction features.
| | 05:12 | So if blocking Internet access at
certain times, or blocking certain types of
| | 05:15 | content at all times is a concern of
yours, be sure to explore those settings
| | 05:18 | in your router.
| | Collapse this transcript |
| Sharing your internet connection (Windows)| 00:00 | As we've seen throughout this course,
one of the primary advantages of having a
| | 00:03 | router is the ability to share a
single Internet connection among all your
| | 00:06 | computers and other network devices.
| | 00:08 | But there may be times, especially when
you travel, when you don't have access to
| | 00:11 | a router, yet need to get
more than one device online.
| | 00:13 | For example, while many hotels offer
wireless Internet services these days, some
| | 00:17 | still offer only a single Ethernet
cable at the desk in the room, and you can
| | 00:20 | only connect one computer to it at a time.
| | 00:22 | That is, unless you know how to share an
Internet connection from your computer.
| | 00:25 | Both Windows and Mac computers are
capable of taking an Internet connection
| | 00:28 | through their Ethernet ports, and then
creating a Wi-Fi network that your other
| | 00:31 | devices can connect to.
| | 00:32 | Let's take a look at how this works in Windows.
| | 00:34 | First let's start with the assumption
that I'm connected to the Internet via my
| | 00:37 | Ethernet cable, which I am.
| | 00:38 | I'm going to click the Start
button and type network connections.
| | 00:44 | The first result at the top is View
network connections, which is what I want,
| | 00:47 | so I'll press Enter.
| | 00:48 | And now I'm looking at the ways my
computer can connect to networks.
| | 00:51 | I've got Bluetooth, Local Area
Connection, which is my Ethernet connection,
| | 00:54 | Local Area Connection 2, because in this case,
I have two Ethernet jacks in this computer,
| | 00:59 | and I have my Wireless Network Connection.
| | 01:00 | I also have a virtual Wi-Fi that I'm not
using at this point because it's disabled.
| | 01:03 | What I'm interested in here is sharing the
Internet connection I'm getting from my
| | 01:07 | Local Area connection.
| | 01:08 | So I'm going to right-click
on that and choose Properties.
| | 01:11 | And in the Properties window,
I'll find a Sharing tab.
| | 01:13 | And in here I'm going to check Allow
other network users to connect through this
| | 01:16 | computer's Internet connection.
| | 01:18 | And then I'm going to choose to share
this out over my wireless Connection.
| | 01:21 | You also have the option here to allow
other network users to control or disable
| | 01:24 | the shared Internet connection.
| | 01:25 | You'd only want to check that if you
want to be able to turn the Internet
| | 01:28 | sharing off from one of the other
computers connected to your network, kind of
| | 01:31 | like how you can administer a
router from any computer connected to it.
| | 01:34 | I prefer to keep things simple and
leave this unchecked in a most cases though.
| | 01:36 | Now you'll also find a Settings button in here.
| | 01:39 | If you just want to share your Internet
connection with other computers, there
| | 01:42 | is no need to check anything in here.
| | 01:43 | These options are only here in case you
want to run specific services from your
| | 01:46 | computer itself, but you'll most likely
not need to configure and host an e-mail
| | 01:50 | server or a Web Server from your computer,
so I'm just going to click Cancel. All right!
| | 01:54 | So that's the first step.
| | 01:55 | I've checked Allow other network
users to connect through this computer's
| | 01:58 | Internet connection, I'm going to
be sharing over the Wireless Network
| | 02:00 | Connection, and I'll click OK.
| | 02:01 | So you can see the status now is Shared.
| | 02:04 | Now I'm going to click the arrow next to
Network and Internet here on my address
| | 02:09 | Bar, and go to the Network and Sharing Center.
| | 02:11 | And in here I'm going to click
Set up a new connection or network.
| | 02:16 | And if I scroll down, I'll
find Set up a wireless ad hoc, or
| | 02:20 | computer-to-computer, network.
| | 02:21 | And you can see this is to set up a
temporary network for sharing files or an
| | 02:25 | Internet connection.
| | 02:26 | So I'll select that and click Next.
| | 02:28 | This next screen just tells
me what an ad hoc network is.
| | 02:31 | Again, it's just a temporary
network for sharing files and an Internet
| | 02:34 | connection, and I see that my devices have to be
within 30 feet of each other. I'll click Next.
| | 02:40 | And here's where you create your network.
| | 02:41 | Start by giving it a name.
| | 02:43 | This is just like setting up
a network name on your router.
| | 02:45 | This is the SSID that will appear when
you look for wireless networks on your
| | 02:48 | other computers or devices.
| | 02:49 | Maybe I'll call this one lappy, since I'm
normally on my laptop when I create ad hoc networks.
| | 02:55 | Next we have the Security type menu,
and notice we get the choices of No
| | 02:58 | authentication (Open), meaning an open
network that anyone can join without a password.
| | 03:02 | And we also have WEP, and WPA2-
Personal, which we looked at in the chapter
| | 03:06 | on wireless networks.
| | 03:07 | And as we learned there, WPA2-Personal
is the most secure, while WEP is the older
| | 03:11 | and less secure encryption method.
| | 03:12 | However, as of this recording,
there still appear to be bugs when
| | 03:15 | selecting WPA2-Personal.
| | 03:16 | You'll be able to select it, but many,
many Windows users have reported that
| | 03:20 | they're unable to connect to an
ad hoc network with WPA turned on.
| | 03:24 | So at this time, I really can't
suggest you use WPA2-Personal.
| | 03:27 | If you want security, you'll have to select WEP.
| | 03:28 | Now I know I said it's not the most
secure, but it's better than no security, and
| | 03:32 | since you'll only be using this
network temporarily, you'll be able to limit
| | 03:35 | your exposure to hacking.
| | 03:36 | And if you feel relatively safe and
don't want to bother with passwords at all,
| | 03:39 | you can always switch it to No
authentication, and not have to worry about it.
| | 03:42 | But if you do want to choose WEP,
notice that these are the choices we have;
| | 03:45 | 5 case-sensitive characters, 13 case-
sensitive characters, 10 hexadecimal, or 26
| | 03:49 | hexadecimal characters.
| | 03:50 | If you're just setting up an ad hoc
wireless network in your hotel room, you're
| | 03:54 | probably okay with a 5 or 13 letter password.
| | 03:56 | So I'll just type a quick password here.
| | 03:59 | Now it has to be either 5 or 13 characters.
| | 04:02 | Obviously, the more characters, the more secure.
| | 04:05 | Notice we did have the option to check
Hide characters; that way only dots will
| | 04:09 | show up as you type.
| | 04:10 | That way if somebody is looking over your
shoulder, you can hide what the password is.
| | 04:13 | Now, if you think you may use this
network in the future -- maybe you travel a lot
| | 04:16 | and need to create ad hoc networks frequently --
you can check Save this network. Then click Next.
| | 04:21 | I get the confirmation that my
lappy network is ready to use.
| | 04:25 | And I'm told that this network will
appear in the list of wireless networks;
| | 04:28 | that's when somebody gets on their
computer and looks for wireless networks.
| | 04:31 | And it will stay active until
everyone disconnects from it.
| | 04:33 | You could see here is the name of
the wireless network, and here is the
| | 04:37 | password in plain letters,
| | 04:38 | so if there is somebody looking over
your shoulder whom you don't see the
| | 04:40 | password, you might want
to turn your laptop away.
| | 04:42 | But I would need to give this
information to anybody who wants to connect to
| | 04:45 | this ad hoc network. I'll click Close.
| | 04:48 | So now on any other computer or device
within range, I can look for, and connect
| | 04:52 | to, this ad hoc network I created.
| | 04:53 | Then I can get online just like I would
with a regular router-based Wi-Fi network.
| | 04:57 | And again, this is probably
something you won't have to do very often,
| | 04:59 | especially on a home network where
you should already have a router.
| | 05:02 | But if you travel with your laptop and
other wireless devices, as many people do
| | 05:05 | these days, it's good to know you
have this capability if you ever need it.
| | Collapse this transcript |
| Sharing your internet connection (Mac)| 00:00 | As we've seen throughout this course,
one of the primary advantages of having a
| | 00:03 | router is the ability to share a
single Internet connection among all of your
| | 00:07 | computers and other network devices.
| | 00:09 | But there may be times, especially when
you travel, when you don't have access to
| | 00:12 | a router, yet need to get
more than one device online.
| | 00:14 | For example, while many hotels offer
wireless Internet services these days, some
| | 00:18 | still offer only a single Ethernet
cable at the desk in the room, and you can
| | 00:22 | only connect one computer to it at a time.
That is, unless you know how to share
| | 00:25 | an Internet connection from your computer.
| | 00:26 | Both the Windows and Mac computers are
capable of taking an Internet connection
| | 00:29 | through their Ethernet ports, and then
creating a Wi-Fi network that your other
| | 00:32 | devices can connect to.
| | 00:34 | Let's take a look at how this works with Macs.
| | 00:36 | So let's start with the assumption that I am
connected to the Internet by an Ethernet cable.
| | 00:39 | I am going to open up System
Preferences, and click Sharing, and in the Sharing
| | 00:44 | Preferences window I am going to select
Internet Sharing, but I am not going to
| | 00:47 | check it yet to turn it on.
| | 00:49 | First, I will need to configure it.
| | 00:50 | On a Mac, you can share your Internet
connection from any network interface to
| | 00:53 | any other network interface, meaning I
am not limited to sharing an Internet
| | 00:56 | connection just from Ethernet to Wi-Fi.
| | 00:58 | I could share it from Wi-Fi
to Ethernet if I wanted to.
| | 01:01 | But in this case I am going to leave
Ethernet selected in the Share your
| | 01:04 | connection from menu, and next I'll
check how I want to share this connection.
| | 01:07 | I will select Wi-Fi, and then I
am going to click Wi-Fi Options.
| | 01:10 | First, you might want to
give your network a name.
| | 01:13 | This is the SSID that appears when other
computers look for wireless networks to connect to.
| | 01:17 | I will leave this one called Booth Mac
Pro, that way I'll be able to identify it.
| | 01:22 | You can select a channel, just
like with a normal wireless router.
| | 01:25 | I will leave this set to 11.
| | 01:27 | There's really no magical number here.
| | 01:29 | But if you experience any interference
problems, you can always come back and
| | 01:31 | try to select a different channel.
| | 01:33 | Next, we can enable security.
| | 01:35 | Now, the only form of encryption
currently available on a Mac is WEP, and as I
| | 01:38 | discussed in the chapter on wireless
networking, WEP is not the most secure, and
| | 01:42 | is actually hackable.
| | 01:43 | But bear in mind that sharing your
Internet connection from your computer should
| | 01:46 | only be a temporary thing
to be used when you need it.
| | 01:48 | The idea is to turn it on when you do
need the network, and then shut it down
| | 01:51 | again when you're done.
| | 01:52 | If you need a more permanent
network, you should have a router.
| | 01:54 | So with only a limited time running,
you'll decrease the chance that any nearby
| | 01:58 | hackers could hack your
network and do any damage.
| | 02:00 | We have the choice of 40-
bit or 128-bit WEP encryption.
| | 02:03 | I will choose 128-bit to be
just a little bit more secure.
| | 02:05 | Next we need to enter a password.
| | 02:07 | Now notice when I have 128-bit WEP
selected that the password must be entered as
| | 02:12 | exactly 13 ASCII characters, or 26 hex digits.
| | 02:15 | By ASCII characters I
mean no special characters.
| | 02:17 | So your password shouldn't have a
copyright symbol in it, for example, but it
| | 02:21 | has to also be exactly 13 characters,
and the reason for this is if you want to
| | 02:24 | share your connection with devices
other than a Mac, it has to be 13 characters.
| | 02:28 | If I were to select 40-bit, it only
would have to be 5 characters, but
| | 02:31 | again, that's a little less secure.
And of course, you have the option of
| | 02:34 | having no security as well.
| | 02:35 | So if you just want to create an
open network to share your Internet
| | 02:38 | connection, you could do that.
| | 02:39 | And again, if it's just for a short
amount of time, you're probably okay, but
| | 02:42 | if you do want to set encryption, choose
128, and then choose a 13 character password.
| | 02:47 | You'll know you've typed it
correctly when the OK button appears.
| | 02:50 | You'll be asked to enter your password.
And now that my options are set, I will
| | 02:55 | click the check box next to
Internet Sharing, and then Start.
| | 02:59 | And up here on my menu bar, my
AirPort icon turns into this upward-pointing
| | 03:02 | arrow icon to indicate that
I am sharing a connection.
| | 03:04 | If I click it, I can see the name of
my network, Booth Mac Pro, and now any
| | 03:08 | other devices within range can connect to this
network as long as I give them my WEP password.
| | 03:13 | Again, this is probably something you
won't have to do very often, especially on
| | 03:16 | a home network where you should
already have a router, but if you travel with
| | 03:19 | your laptop and other wireless devices,
as many people do these days, it's good
| | 03:23 | to know you have this
capability if you ever need it.
| | Collapse this transcript |
|
|
5. Sharing Files Over a NetworkSetting a network location (Windows)| 00:00 | In this chapter, we are going to talk
about sharing files across your network.
| | 00:04 | These may be work documents, like Word
or Excel files, or they may be music,
| | 00:08 | movies, photos, or any other kind of
files you need to get from one computer on
| | 00:11 | your network to another
computer on your network.
| | 00:13 | This is a really convenient feature
of networks, because you can transfer
| | 00:16 | files without having to first copy
them to a disk or some kind of portable
| | 00:19 | storage device, which you would then have to put
into the receiving computer to copy the files to.
| | 00:24 | Over a network, you can simply
transfer the files directly from computer to
| | 00:27 | computer, and this is particularly
useful if the files you have to share are
| | 00:31 | large, and won't fit on portable drives or disks.
| | 00:34 | Before you can share files, though,
there is some setup required, and the setup
| | 00:37 | is going to be different depending on
if you're going to be sharing files from
| | 00:40 | a Windows PC to another Windows PC, or from a
Windows PC to a Mac, or from a Mac to a Mac.
| | 00:45 | We will cover all three of these scenarios.
| | 00:48 | So in this movie, we're going to look at how
to get your Windows machine ready to share.
| | 00:51 | The first step is to set your network location.
| | 00:53 | I am going to right-click the Network
icon in my Notifications area, and choose
| | 00:58 | Open Network and Sharing Center.
| | 01:00 | Now you can also get here by clicking
the Start button, typing network, and then
| | 01:06 | selecting Network and Sharing Center.
| | 01:08 | Here under View your active networks,
you can see the network I am currently
| | 01:11 | connected to, and it's set to Work network.
| | 01:13 | So I will click Work network.
| | 01:15 | Now, yours may say Home
network or Public network.
| | 01:18 | Go ahead and click it, whichever it is.
| | 01:20 | That opens the Set Network Location window.
| | 01:22 | It's likely that you made a selection
here when you first set up your computer,
| | 01:25 | but you might not have fully
understood what you were choosing.
| | 01:28 | Basically, each of the three choices here
applies different levels of access to your computer.
| | 01:32 | You select Home network if your
computer is on a home or a small office network
| | 01:37 | on which you know and trust
everyone who has access to that network.
| | 01:40 | The Home network setting makes it
easy for anyone on the network to access
| | 01:43 | things like your music, photos, videos,
and documents using a feature of Windows
| | 01:47 | 7 called Homegroups.
| | 01:49 | Homegroups only works
between Windows 7 computers,
| | 01:52 | so if it's all you have on your
network, go ahead and select it, and sharing
| | 01:55 | files will be a breeze.
| | 01:56 | The Work network selection is for
when you're in an office network
| | 01:59 | situation where you don't want to make it
quite so easy for coworkers to get to your files.
| | 02:03 | You can still easily share files
over a Work network, but you will need
| | 02:06 | usernames and passwords, or you'll have
to set up special shared folders to do so.
| | 02:11 | And select Public if you're at a coffee
shop or some other public network where
| | 02:14 | you don't know who could be on the same network.
| | 02:17 | This selection prevents your computer
from being seen on the network, making it
| | 02:20 | much more difficult to tamper with. And
nothing you select here is set in stone.
| | 02:24 | In fact, if you're using a laptop,
you might very well want to change your
| | 02:27 | network location based on where you are.
| | 02:30 | At home or in a small office where
you know and trust everyone, you could
| | 02:33 | switch it to Home network.
| | 02:34 | That way your family can get to
your files, and you can get to theirs.
| | 02:38 | Then when you go to work in an office,
where you don't necessarily know and trust
| | 02:41 | everyone, switch to the Work network.
And if you take a trip and need to get
| | 02:45 | online at the airport, you
would switch to the Public network.
| | 02:48 | Now, I'm not saying you're definitely
going to get hacked if you forget to
| | 02:51 | change your location, but it
is a good practice to get in to.
| | 02:54 | So for this example, I'll select the
Home network, and with that selection, I can
| | 03:01 | choose which types of files I want to share.
| | 03:03 | Again, this has to do with the Home
Group feature of Windows 7, and we'll go
| | 03:06 | into detail about that next.
| | Collapse this transcript |
| Setting up HomeGroup (Windows)| 00:00 | Previously, we looked at how to
select your network location by opening the
| | 00:03 | Network and Sharing Center, and clicking the
link here under View your active networks.
| | 00:07 | This may be listed as Home network, Work network,
or Public network depending on how you set it.
| | 00:12 | I will go ahead and click it, and again,
this is where you choose the type of
| | 00:16 | network location you're on. And as I
previously mentioned, if you're running
| | 00:20 | Windows 7 on all the computers you want
to share files with, and if you trust the
| | 00:23 | other people in your home or small
office network, you can select Home network to
| | 00:27 | take advantage of a feature called Homegroups.
| | 00:29 | But this is a Window 7 only feature,
| | 00:31 | so if you have a mix of computers and
operating systems on your network, you'll
| | 00:34 | have to follow some other steps I will
be showing in some upcoming movies in
| | 00:37 | this chapter if you want to share
files between all those computers.
| | 00:40 | But for this example let's assume I
am running Windows 7 on at least two
| | 00:43 | computers on my network.
| | 00:44 | I will start by clicking Home network,
because you can only create a homegroup
| | 00:48 | when Home network is selected. And that
opens the Create a Homegroup window, and
| | 00:54 | here you just check the types of
things you want to share from this computer.
| | 00:57 | Notice everything except Documents
is checked by default, but you can check
| | 01:01 | any combination of these items if you want.
| | 01:02 | Notice that in addition to sharing
files, you can also share any printers
| | 01:06 | connected to your computer.
| | 01:07 | This makes it incredibly easy for any
other computer running on the homegroup to
| | 01:10 | print to your printer over the network.
| | 01:12 | So I have everything
selected here and I will click Next.
| | 01:15 | Now Windows gives you a ridiculously
random password that you're supposed to
| | 01:21 | write down, or print out, so you can
enter it into each of the other computers on
| | 01:24 | your network that you want in your homegroup.
| | 01:26 | You can click Print password and
instructions, and this window opens up giving
| | 01:31 | you the steps to follow on each other computer.
| | 01:34 | You can print this out if you want to as well.
| | 01:36 | I am going to click Cancel for now
though, and here I will click Finish.
| | 01:40 | Because before I go to my other computers,
I am going to change my password into
| | 01:44 | something easier for me to remember.
| | 01:46 | Because after all this is my
trusted home or small office network.
| | 01:49 | I don't need some random string of upper
and lower case letters that I will have
| | 01:52 | to look up every time I want to
add another computer to my homegroup.
| | 01:55 | So I will click Start menu, and
type homegroup, and press Enter.
| | 02:00 | That takes me to the Change homegroup
settings control panel, and here's where
| | 02:04 | you can change your sharing settings.
| | 02:06 | Notice we have the same check boxes
for the types of files that could be
| | 02:09 | shared from this computer.
| | 02:10 | There is also the option here
to stream media with devices.
| | 02:13 | If we check this option, other people on
your network will be able to play your
| | 02:16 | photos, music, and movies from
Windows Media Player or Media Center without
| | 02:20 | having to first copy
those file to their computers.
| | 02:22 | I am going to leave that unchecked for now.
| | 02:25 | Down at the bottom of the window
I will find Change the password.
| | 02:27 | Notice it's telling me to make sure
all the homegroups are on, and not asleep
| | 02:32 | and that I should immediately go to
each computer and enter the new password
| | 02:34 | once I change it here.
| | 02:36 | Now, it's not as urgent as its made to
appear here, but basically if you have
| | 02:40 | already set up your other homegroup
computers they will lose access to your
| | 02:43 | computer when you change the password here.
| | 02:45 | Not a big deal; you just go
change them when you're done here.
| | 02:47 | So I will click Change password.
| | 02:49 | I'm offered yet another complex password,
but I am just going to change that to
| | 02:52 | something else, and that's something I
will be able to remember more easily.
| | 02:57 | I click Next, and I will click Finish.
| | 03:04 | That's all there is to setting
up the homegroup on one computer.
| | 03:06 | Now, by the way, this is also where
you will find the option to leave the
| | 03:09 | homegroup, and that's in case you don't
feel like sharing all of your folders
| | 03:12 | across the network at some point.
| | 03:14 | You can always turn it back
on rejoining the group, though.
| | 03:17 | Speaking of which, let's see how you
join a homegroup once you have set one up.
| | 03:20 | All I do is go to another computer on
my network that I want to share with.
| | 03:24 | So here I am on another machine
running Windows 7 on my network.
| | 03:27 | I will click the Start menu, and I will type
homegroup to go to Homegroup control panel.
| | 03:33 | I will press Enter to open it up, and
here you can see it says Garrick Chow
| | 03:37 | on GWEEICKCHOW-PC, which is the
name of my computer, has created a
| | 03:40 | homegroup on the network.
| | 03:42 | So this computer has already
detected that homegroup I just created.
| | 03:45 | Now again, this only works if you
have your network location set to Home.
| | 03:48 | So just as a reminder -- remember, when you go
to the Network and Sharing Center it
| | 03:56 | should say Home network here.
| | 03:57 | If it doesn't, make sure you click and
select Home network before you attempt to
| | 04:00 | connect to a homegroup.
| | 04:01 | But I am already set to Home network on
this computer, so I am going to click Join now.
| | 04:07 | As before, I can choose what I want to
share from this particular computer.
| | 04:11 | Maybe in this case I only want to share Music.
| | 04:13 | So I am going to uncheck Pictures,
Videos, and Printers. I will click Next.
| | 04:17 | It's going to ask me to enter the
password for this homegroup, which again is
| | 04:22 | why I created an easier to remember password.
| | 04:24 | I will click Next, and now I see the message
that I've successfully joined the homegroup.
| | 04:31 | I'll click Finish.
| | 04:32 | Here you can see my settings,
| | 04:34 | so if I do want to share other
libraries, I can select those, but I will leave
| | 04:38 | everything as is for now.
| | 04:39 | At this point, if I want to access
the files on my first PC, I just open
| | 04:44 | an Explorer window.
| | 04:46 | Over here on the left I will see
Homegroup, under which I will see all the
| | 04:49 | computers in my homegroup listed, which
is just the one computer right now.
| | 04:52 | But by selecting that you can see I
have access to Documents, Music,
| | 04:56 | Pictures, and Videos on my computer,
which is exactly what I set up to share on
| | 05:00 | that first computer.
| | 05:01 | So, for example, if I wanted to go
into Documents, I can see the documents
| | 05:04 | that are on that computer.
| | 05:05 | Maybe I want to grab this handbook.
| | 05:07 | I'll just drag that to my Desktop, and I've now
made a copy of that document on this computer.
| | 05:13 | Similarly, maybe I want to go into Music.
| | 05:15 | You can see what kind of music is on
that computer, and if I want to grab one
| | 05:18 | of those songs I'll drag it to my
Desktop. Or may be I want to send a file to
| | 05:23 | the other computer.
| | 05:25 | Here I have a picture on my
Desktop called beach_surfboards.
| | 05:27 | Maybe I want to drag that into Pictures.
| | 05:30 | Actually, before I do that,
let me show you something.
| | 05:32 | Inside Pictures I have a folder
called beach pics on that first computer.
| | 05:37 | So this beach_surfboard photo would
fit with the theme here, and it was
| | 05:40 | actually taken during the same photo shoot.
| | 05:41 | So if I want to put this within this folder,
watch what happens if I try to drag this in here.
| | 05:45 | It says Copy to beach pics.
| | 05:48 | I'll release, but it's telling me it's denying me
access to that, because I need permission to
| | 05:51 | perform this action.
| | 05:52 | That's because when you share a folder
on your homegroup you are only sharing
| | 05:58 | the main folders for Documents,
Music, Photos, or Videos, or whatever
| | 06:01 | combination you chose.
| | 06:03 | So I can only drag this
picture into the Pictures folder.
| | 06:06 | I can't put it into a subfolder, because
I only have permission to put it in the
| | 06:09 | main Pictures folder.
| | 06:10 | You can see currently it
says Copy to Public Pictures.
| | 06:14 | So I'll copy that over, and if I
look inside Pictures, there it is.
| | 06:18 | If I try to drag that inside beach pics
now, again it's telling me I don't have
| | 06:22 | permission to do that.
| | 06:23 | But when I go back to that first
computer, I will be able to drag
| | 06:28 | beach_surfboards into the beach pics
folder, because that's my computer and I
| | 06:31 | will be logged into it.
| | 06:32 | So that's how easy it is to connect to a
homegroup once you have it set up on one computer.
| | 06:37 | The nice thing here is I will
never have to enter that password again
| | 06:40 | unless it's changed.
| | 06:41 | So from this point, it's very easy to
send and receive files to and from other
| | 06:44 | computers on the homegroup.
| | 06:46 | This is a great feature, but again it
only works if all the involved computers
| | 06:49 | are running Windows 7.
| | 06:50 | But what if you want to share the contents
of a folder other than Documents, Music,
| | 06:55 | Pictures, or Videos?
| | 06:56 | Well, in those cases you'll have to
learn how to share specific folders, and we
| | 06:59 | will take a look at how to do that next.
| | Collapse this transcript |
| Sharing specific folders (Windows)| 00:00 | In a previous movie I showed you how to
set up homegroups on computers running
| | 00:03 | Windows 7, which allows you to quickly
access all the other computers in the
| | 00:07 | homegroup without having to enter a
username and password each time you want to
| | 00:10 | copy a file from one computer to another.
| | 00:12 | But the limitations of Homegroups
are that it only works with Windows 7
| | 00:15 | computers, and you can only share certain
folders like your Music, Movies, Photos, and so on.
| | 00:20 | So let's look about how to share
folders other than the standard
| | 00:23 | homegroup shared folders.
| | 00:24 | Now where you set up these folders
depends on how you want to share them.
| | 00:27 | I have a folder on my Desktop called
Travel Receipts, and I want to be able to
| | 00:31 | get to this folder from all the
other computers on my network.
| | 00:34 | Essentially, I want everyone on my
network to able to place files in here,
| | 00:37 | and copy files out.
| | 00:38 | I'm going to right-click on that
folder, and mouse over Share with.
| | 00:41 | Notice that gives me four options.
| | 00:44 | The default state is Nobody, which
means that this folder will show up only on
| | 00:48 | this computer, and not to
anyone else on the network.
| | 00:50 | Every folder is like this until you
decide to share it and make it visible to
| | 00:53 | other computers on your network.
| | 00:55 | Next is Homegroup (Read). Selecting this
option means the folder will show up on
| | 00:59 | any computer that's in your homegroup
if you're using Homegroups, but other
| | 01:03 | people will only be able to see the
contents of this folder, and copy them to
| | 01:06 | their own computers.
| | 01:07 | They won't be able to copy items into
this folder, or alter its contents by
| | 01:10 | adding more files, or deleting any of them.
| | 01:12 | If you want to allow changes to this
folder, choose Homegroup (Read/Write),
| | 01:16 | which simply means that anyone in your
homegroup can copy, move, add, or delete
| | 01:20 | files from this folder.
| | 01:22 | This can be a good option if you're
collaborating with people on your network
| | 01:25 | on a project, and you need a central location to
store and access the files you are working with.
| | 01:29 | Now of course, these two Homegroup
options depend on you being on a Home network
| | 01:33 | location and connected to a homegroup.
| | 01:35 | If you are not using a homegroup, you are
going to want to choose Specific people.
| | 01:40 | That opens this window, which asks you
to Choose people to share with, and you
| | 01:43 | can choose users on this
computer by clicking this menu.
| | 01:46 | Now this is where things get slightly complex.
| | 01:48 | You would think that you should be
able to choose from this list of users on
| | 01:51 | your computer to assign specific people the
ability to get into this folder over the network.
| | 01:56 | However, because this folder is on my
Desktop, it's part of my user folder, and
| | 02:01 | therefore I can't assign other users
the ability to get into this folder.
| | 02:04 | What's weird is that I can choose
to allow Everyone to have access.
| | 02:07 | So I'll select Everyone,
in this case, and click Add.
| | 02:10 | You can see that adds everyone
to the list of approved people.
| | 02:14 | Now if you want to share a folder with
specific people, and not with others, the
| | 02:17 | folder has to live outside your user
folder; more on that in just a minute.
| | 02:21 | Now under Permission Level you can
choose Read or Read/Write for each individual.
| | 02:26 | Read means the user will only be
able to view the contents of the folder
| | 02:29 | and copy files from it, but will
be unable to move, create, or delete
| | 02:32 | anything in that folder.
| | 02:34 | Read/Write is what grants that kind of access.
| | 02:36 | So if you are using the folder to just
distribute files to the people on your
| | 02:39 | network, you will want to
set the Permission to Read.
| | 02:42 | If you want them to be able to place files
in that folder as well, choose Read/Write.
| | 02:47 | And now I will click Share, and
now I can see my folder is shared.
| | 02:52 | Windows also gives me the option here
to e-mail a link to the folder to the
| | 02:55 | people on my network.
| | 02:57 | Clicking this link will open your
default e-mail program, like Outlook for
| | 03:00 | example, with a message
containing this local address you see here.
| | 03:04 | Now this address will only work for
people connected to your network; it won't
| | 03:07 | work over the Internet.
| | 03:08 | If you don't use a mail application --
maybe you use Gmail's browser interface,
| | 03:12 | for example -- you can also click Copy to
copy the link, so you can paste it into
| | 03:16 | a message manually.
| | 03:17 | Also notice that it says Shared items
aren't accessible when your computer is
| | 03:20 | asleep, which makes sense. All right!
| | 03:22 | I will click Done.
| | 03:25 | So now this folder on my
Desktop is being shared.
| | 03:28 | Incidentally, if you ever want to stop
sharing a folder, just right-click on it,
| | 03:32 | go to Share with, and choose Nobody,
which will remove all people from the shared
| | 03:37 | list. But I am going to
leave that shared for now.
| | 03:39 | Okay, what if you want to share a folder
with specific people instead of everyone?
| | 03:43 | The process is pretty much the same,
except the folder can't be on your Desktop
| | 03:47 | or in any of the folders in your user
folder, like Music, Movies, Documents, and so on.
| | 03:51 | Without getting into the down and
dirty details, this has to do with the way
| | 03:54 | Windows secures user folders.
| | 03:57 | So I am going to open an Explorer window,
I'm going to go to my main hard drive,
| | 04:01 | my C drive, and what I recommend here is
that you create a folder in here called
| | 04:05 | Share, or something like that.
| | 04:07 | So I'll create a New Folder, I will
just call it Share, and inside this folder
| | 04:14 | you can store all the folders you want to
share with specific people across your network.
| | 04:18 | So maybe I will create another New
Folder in here, and I will call this one
| | 04:27 | Allison Invoices, and this will be a
folder on my computer where I would like
| | 04:31 | Allison to place her work related
invoices, and I don't want anyone else on the
| | 04:34 | network to be able to get into it.
| | 04:36 | So I will right-click on that folder,
again, go to Share with>Specific people,
| | 04:44 | and from the menu here I will choose
Allison Taylor, and I will click Add.
| | 04:52 | Now this is important:
| | 04:53 | in order for specific people to
access a shared folder, they have to have an
| | 04:57 | account on your computer
you're sharing the folder from.
| | 05:00 | Whenever they try to connect to the
folder, they will be prompted to enter the
| | 05:02 | username and password.
| | 05:05 | So the reason you see these names here
like Allison Taylor, and Jimbo Jones, is
| | 05:09 | because they have accounts on this computer.
| | 05:10 | Now if you need a refresher on how to
create an account, I will show you that at
| | 05:13 | the end of this movie. And I will make
sure Allison has Read/Write access, and I
| | 05:20 | will click Share, and now
the folder is being shared.
| | 05:25 | If you have other folders to share with
specific people, just repeat this process.
| | 05:28 | I will click Done.
| | 05:31 | Now let's see what it looks like
when we try to get to these folders
| | 05:33 | from another computer.
| | 05:35 | Okay, on this computer I will open
up a window, click Network in the left
| | 05:41 | sidebar here, and that shows me all the
computers on the network that can be found.
| | 05:45 | In here I see GARRICKCHOW-PC, which is
the computer I set up the shared folders
| | 05:48 | on, so I will double-click that.
| | 05:49 | And you can see there's the
Allison invoices folder that I created.
| | 05:55 | I will get to that in a second. But
first let me go into Users>Garrick
| | 05:59 | Chow>Desktop, and there is that
Travel Receipts folder that we saw on the
| | 06:04 | Desktop, which we shared with everyone.
| | 06:06 | So you can see I can get into that
without using a password or a username.
| | 06:09 | Now let's go back to the main level here.
| | 06:13 | Now what if I try to get into Allison
Invoices, which we set up to only be
| | 06:16 | accessible by Allison Taylor?
| | 06:18 | Well, it tells me Windows cannot
access that folder, because I don't have
| | 06:22 | permission to access it.
| | 06:23 | Now, I have seen Windows 7 behave in
such a way that it will prompt you with the
| | 06:26 | username and password, so if you were
Allison, or had Allison's name and password,
| | 06:30 | you could log in from here.
| | 06:31 | I can't actually do that right now.
| | 06:33 | So what I need to do is
switch to a different user account.
| | 06:36 | Specifically, I need to switch to the
Allison Taylor account on this computer.
| | 06:40 | So in order to access this shared
folder, which is shared only with Allison
| | 06:43 | Taylor, I have to have an account
on this computer for Allison Taylor.
| | 06:47 | You can see right now I am
just logged in as Garrick.
| | 06:49 | So I am going to log off, and
then log back in as Allison Taylor.
| | 06:53 | Okay, so now I am logged back in.
| | 06:57 | You can see I am now
logged in as Allison Taylor.
| | 06:59 | So again, I will open up a window, go to
Network, find my PC with the shared folders.
| | 07:05 | There is Allison invoices, and all I have
to do is double-click on it, and I am in.
| | 07:09 | Now it's currently empty, and again,
whether I can modify the contents of this
| | 07:12 | folder depends on whether my
Permissions were set to Read, or Read/Write.
| | 07:16 | So if I wanted to create a new folder
in here, because my Permissions are set
| | 07:18 | to Read/Write, I could choose New>
Folder, and maybe I could create a folder
| | 07:23 | called July invoices -- or, I should say, Allison
could create a folder called July invoices.
| | 07:28 | So again, to make sure you can connect
to a folder that's been assigned to share
| | 07:31 | with a specific person or specific
people, you have to make sure you have an
| | 07:35 | account on that computer that matches
the one that created the shared folder.
| | 07:38 | And as promised, here is how to do that
in case you are not familiar with the
| | 07:41 | process, or just need a refresher
on how to create a new user account.
| | 07:44 | I am just going to go to the Start menu.
| | 07:45 | I will just type user, which takes me
to User Account when I press Enter or
| | 07:50 | Return, and in here I will
click Manage another account.
| | 07:53 | Here I can see all of my
accounts on this computer.
| | 07:55 | I will click Create a new account,
and now I can create another user.
| | 08:00 | Decide whether he wants to be a
Standard or an Administrator account.
| | 08:04 | Now if you are setting up this account
for someone else to access your shared
| | 08:06 | folders, there is probably no reason to
give them an Administrator account, so you
| | 08:09 | can stick with Standard. But if you
want them to be able to administer the
| | 08:12 | computer that you're setting this
up on, you can choose Administrator.
| | 08:14 | I will click Create Account,
and you can see there it is.
| | 08:19 | So I will select Phil, and you
definitely want to create a password, and the
| | 08:22 | password, again, has to match the
password on the computer that you set the
| | 08:25 | shared folder up on.
| | 08:30 | And that's it; you have
now created a new account.
| | 08:33 | So that's how to share folders, and
share them with either everyone on your
| | 08:35 | network, or with specific people.
| | 08:37 | Again, if you are sharing the folder
with everyone, just right-click on the
| | 08:40 | folder, choose Share with>Specific
people, and then Everyone. And if you want to
| | 08:44 | share the folder with a specific
person, right-click on the folder, choose
| | 08:47 | Share with>Specific person, and then
choose that person's account from the
| | 08:50 | dropdown menu.
| | Collapse this transcript |
| Simple file sharing (Mac)| 00:00 | Now let's take a look at how to set up
a Mac, so it can share files with other
| | 00:03 | Macs on your network.
| | 00:04 | Start by opening System
Preferences, and here you'll find a preference
| | 00:08 | pane called Sharing.
| | 00:10 | Now if I just want to share with other
Macs on my network, the only thing I have
| | 00:13 | to do in here is check File Sharing.
| | 00:16 | You can see that Sharing is now on, and
it tells me that other users can access
| | 00:19 | shared folders on this computer, and
administrators all volumes, meaning all
| | 00:22 | drives, at this address of afp://booth-
mac-pro.home/ or just Booth Mac Pro.
| | 00:28 | So that's the name of my computer;
you can see at the top here my Computer
| | 00:32 | Name is Booth Mac Pro.
| | 00:33 | Now, another way to get to your computer
is by IP address, which you can see by
| | 00:38 | going to Network and clicking your
connection; in this case I have Ethernet. My
| | 00:42 | address here is 10.1.10.160.
| | 00:45 | So there are essentially two main ways
other Macs on the network can get to my Mac:
| | 00:48 | they can either enter my IP
address, or browse for my computer's name.
| | 00:52 | We'll take a look at both methods.
| | 00:54 | And incidentally, you're free to
name your Mac whatever you'd like here in
| | 00:56 | the Sharing section.
| | 00:57 | So let me give you an example of how this works.
| | 00:59 | All I have done here is turned on File Sharing.
| | 01:02 | Without this on, people would not be
able to communicate with this Mac, but in
| | 01:05 | order to access this Mac, the person
trying to connect needs to have an
| | 01:08 | account on this Mac.
| | 01:09 | I will show you a way around this in
the following movie, but for basic file
| | 01:12 | sharing, you need to have an account
on the Mac you're trying to access.
| | 01:16 | As an example, I have a MacBook Pro
connected to the same network I am on with
| | 01:19 | this computer, and I've turned on
that MacBook Pro's file sharing.
| | 01:22 | Let me just close System Preferences here.
| | 01:25 | So one of the options to connect to
that computer is by using the IP address,
| | 01:28 | so I would need to know the IP
address of my MacBook Pro, which I do in this
| | 01:32 | case, so from here in the Finder I am going to
choose the Go menu, and choose Connect to Server.
| | 01:37 | You can also use the keyboard shortcut
of Command+K. That gives me the Connect
| | 01:41 | to Server window, and all I have to do
here is type in the IP address of my
| | 01:44 | MacBook Pro, which in this case it's 10.1
.10.152, and I will click Connect.
| | 01:52 | And now I see this dialog box telling
me to enter my Name and Password for the
| | 01:56 | server Garrick's MacBook Pro.
| | 01:58 | Now I can either connect as a
Guest, or as a Registered User.
| | 02:01 | Now, because this is my MacBook Pro, I
have an administrator account on it, so I
| | 02:04 | can just type my name and password just
as I would if I were actually using the
| | 02:07 | MacBook Pro right now.
| | 02:08 | Next it's asking me which volume or
drive of the MacBook I want to connect to.
| | 02:18 | Depending on how many hard drives you
have connected to your computer, you may
| | 02:21 | see more or fewer volumes listed here.
| | 02:23 | Notice, because I logged in with my
personal account info, I can connect
| | 02:27 | directly to my own home folder, or I
can select the hard drive if I want to
| | 02:30 | access the entire computer.
| | 02:32 | I have named my hard drive Flexo, but by
default most hard drives on the Mac are
| | 02:35 | called Macintosh HD.
| | 02:37 | Now, if you want to mount more than
one drive, hold down the Command key and
| | 02:40 | click the ones you want to mount.
| | 02:41 | I will just open up my main hard drive, and
now that appears here in a Finder window.
| | 02:47 | You can also see I am connected to
my MacBook Pro here under the Shared
| | 02:50 | section of the sidebar.
| | 02:53 | And again, because I logged in as an
Administrator, I have full access to my
| | 02:56 | entire hard drive on my MacBook Pro.
| | 02:58 | In fact, I could go into Users, my
home folder, and I have access to my entire
| | 03:04 | home folder, because I
signed in with my User Account.
| | 03:06 | Now, if I go back to the Users folder,
you can see there are some other user
| | 03:11 | accounts in here, but if I try to
go into one of those, I can't go into
| | 03:15 | Documents, Downloads, Movies, Music, or
anything like that, because I didn't log
| | 03:19 | in with Melanie's credentials.
| | 03:21 | The only folder I can open in here is
her Public folder, and in here I can see
| | 03:24 | her Drop Box, which I could drop files
into if I wanted to share something with
| | 03:27 | her, but notice I can't get
into it when I double-click it.
| | 03:31 | So I don't have the privileges to
see what's in that Drop Box; only to
| | 03:34 | place items into it.
| | 03:35 | If I go back a few levels, I will find
the Shared folder, and here's where you
| | 03:41 | can place files that you want to be
accessible to every account on the Mac.
| | 03:44 | Notice I can see its contents, and I
could place files in here to be found and
| | 03:47 | opened by other users.
| | 03:49 | So this is what the experience is like
if you have an account on the Mac that
| | 03:52 | you're connecting to.
| | 03:53 | You can basically go everywhere and
access everything, except for other
| | 03:56 | user's home folders.
| | 03:57 | When you're done, you can eject the
volume by clicking the Eject button next to
| | 04:01 | it here in the sidebar.
| | 04:01 | So now I am no longer connected to the MacBook.
| | 04:05 | Now, let's connect back to the MacBook
again, but this time as a Guest; someone
| | 04:08 | who does not have an account on the Mac.
| | 04:11 | I could go to Go>Connect to Server again,
but realistically, you, and the other
| | 04:15 | people in your network, are not
always going to know the IP address of the
| | 04:18 | computers they want to connect to.
| | 04:19 | Instead, you can quickly find all the
available computers on your network by
| | 04:22 | choosing Go>Network.
| | 04:24 | You can also press Shift+Command+K,
and here I can see my MacBook Pro; I
| | 04:29 | will double-click it.
| | 04:30 | By doing that, I've actually logged in
as a Guest. You can see I Connected as:
| | 04:33 | Guest; I didn't enter a password or anything.
| | 04:36 | If I wanted to enter with a user account,
I could click Connect As, and then enter
| | 04:39 | that way, but in this case I
am just going to be a guest.
| | 04:42 | So notice I don't see any of the other
hard drives or volumes that are connected
| | 04:45 | to that MacBook Pro.
| | 04:47 | Instead, I only have access to each
user's Public Folder, and this folder called
| | 04:50 | Company Meeting, which is a shared folder.
And we'll talk about sharing specific
| | 04:54 | folders a little later.
| | 04:55 | I will select my Public Folder, and
in here all I see is the Drop Box.
| | 04:59 | Because I didn't sign in with my
account, I don't have access to the Music
| | 05:02 | folder, or the Documents folder, or
any other folder; just the Drop Box.
| | 05:06 | So guests have very limited access,
which is good because you don't want just
| | 05:09 | anyone on your network getting into
your files. And again, as a guest, I can't
| | 05:13 | even open the Drop Box.
| | 05:14 | The only thing I can do is put files
into the Drop Box, or if there were some
| | 05:17 | files in the public folder, I could
copy them out of there onto my own Desktop,
| | 05:21 | but not move or delete them.
| | 05:22 | I have this text document here on my
Desktop; notice if I try to drag that into
| | 05:26 | the Public Folder, I get this No symbol.
| | 05:28 | I can't put anything in this
folder, because I am just a guest.
| | 05:31 | I can drag it over the Drop Box, and
my cursor turns into that plus symbol
| | 05:34 | letting me know I can
put a copy of this in here.
| | 05:36 | When I release my mouse to drop it in,
I see this message telling me I can put
| | 05:40 | items in the Drop Box, but I won't be
able to open the folder to make sure it
| | 05:43 | really got there, because that would
reveal the other contents of the Drop Box, and
| | 05:46 | I don't have permission to do that.
| | 05:47 | But I will click OK, and the file is copied over.
| | 05:51 | Now, at this point, the owner of the
account could go in and grab that file.
| | 05:54 | So if I were to physically walk over to
my MacBook Pro, I could view that file on
| | 05:57 | my computer there, because
that's my personal account.
| | 06:00 | So those are the two types of
experiences you can have, in a basic sense, when
| | 06:04 | you have File Sharing turned on, and
this should cover most of your network
| | 06:07 | file sharing needs.
| | 06:08 | But if you do need to do a little bit
more advanced sharing, for example, if you
| | 06:11 | want to give users a little more
ability to see and share files without having
| | 06:15 | to create accounts for them on your Mac,
be sure to watch the upcoming movie on
| | 06:18 | advanced Mac file sharing.
| | Collapse this transcript |
| Sharing specific folders (Mac)| 00:00 | Previously, we've seen how people with
administrator accounts on your Mac have
| | 00:03 | full access to it over your network.
| | 00:05 | Since they have their own accounts,
they can log in, they can open their own
| | 00:08 | home folder, they can also get into
the hard drive and any other connected
| | 00:11 | drives, and make any changes
that they want or need to.
| | 00:14 | Guest accounts, on the other
hand, have very limited access.
| | 00:17 | They essentially can only get into the
user's public folders, and drop files in
| | 00:20 | the Drop Box, or copy
files from the public folder.
| | 00:23 | So the problem here is that
there isn't much of a middle ground.
| | 00:25 | Let's say I wanted someone on my
network to make a change to a file or folder
| | 00:29 | on my Mac, but I don't want to give them a
full user account just to make this change.
| | 00:33 | But I also can't just allow them to come
in as a guest, because then they'll only
| | 00:36 | have access to the public folder.
| | 00:38 | The solution to this is to share a
specific folder, or folders, with guests.
| | 00:42 | On my Desktop, I have a folder called HR,
| | 00:44 | and inside it is a
document called meeting agenda.
| | 00:47 | Let's say I want other people in my
small office network to be able to get here
| | 00:51 | and add items to the meeting agenda.
| | 00:52 | Well, in order to get to my Desktop, or
anywhere else in my public folder, they
| | 00:57 | need to log in as me, and I
definitely don't want to give them my password.
| | 01:00 | So I'm going to open up System
Preferences, and go to Sharing.
| | 01:03 | I'll select File Sharing, which is still
on from when I previously activated it,
| | 01:09 | and here we have a list of Shared Folders.
| | 01:11 | And you can see, by default the public folder
of each user on this computer is listed here.
| | 01:16 | Clicking on a folder shows you what
level of access each user under the Users
| | 01:20 | list has for that particular folder.
| | 01:21 | So the owner of the folder always has
Read & Write access, while everyone else
| | 01:26 | only has Read access.
| | 01:27 | All I have to do here is add my HR
folder as a shared folder, and then specify
| | 01:32 | that guests can have Read & Write access to it.
| | 01:34 | I'll click the plus button,
locate the folder on my Desktop;
| | 01:38 | now the folder does have to
exist before you can add it.
| | 01:41 | Notice there isn't a New Folder button here.
| | 01:43 | So I've selected the folder,
I'll click Add, and there it is.
| | 01:47 | And now to make it available for guests,
I want to make sure Read & Write is
| | 01:50 | selected next to everyone.
| | 01:51 | So basically, anyone who connects to
my computer as a guest will have access
| | 01:55 | to this folder, and they'll be able to copy,
move, and edit files that they find there.
| | 01:59 | Now as an example, I've set up the
exact same folder on another Mac on my
| | 02:02 | network so you can see what it looks
like to be on the guest side of this.
| | 02:05 | So I'm going to close System Preferences
for now. And let's say I want to connect
| | 02:08 | to the MacBook Pro on the
network, and get to that meeting agenda.
| | 02:11 | I'm going to go to the Finder and choose
Go>Network, and locate my computer, and
| | 02:18 | I'll just double-click it
to connect to it as a guest.
| | 02:21 | So notice that along with the usual
public folders you see as a guest, I have
| | 02:24 | the HR folder here now.
| | 02:26 | I'll double-click that to open it.
| | 02:28 | There's that meeting agenda,
which I can double-click to open.
| | 02:30 | Notice I didn't even have
to copy it to my computer;
| | 02:33 | I can work on it directly over the network.
| | 02:34 | And I'll just add a line here to
the agenda; we'll say 401K overview.
| | 02:38 | And I'll save that, and close it,
| | 02:45 | and I can just eject this folder
when I'm done. So it's that easy.
| | 02:49 | All you have to do is select the folder
you want to share, allow everyone Read &
| | 02:52 | Write access, and then guests
can connect to it for full access.
| | 02:55 | Now, of course, there may be times when
you only want to give specific people
| | 02:59 | access to a folder, rather than
allowing everyone on the network access to it.
| | 03:02 | We already know that you could create a
user account for that use, but it's kind
| | 03:05 | of unnecessary if you only
want to share some files.
| | 03:08 | So in those cases you can create a
sharing only account, and here's how to do that.
| | 03:12 | Open System Preferences
again and return to Sharing.
| | 03:15 | I'll just use the HR folder again for
this example, but this could apply to any
| | 03:19 | folder you put in here.
| | 03:20 | So with HR selected, I'm first
going to switch Everyone to No Access.
| | 03:26 | That way this folder
will not show up for guests.
| | 03:29 | Now I'll click the plus button
under Users to add another user.
| | 03:33 | This gives you access to your Mac's
address book, so you can browse through and
| | 03:36 | find the person you want to add.
| | 03:37 | If that person isn't in the address
book, or you don't use address book, you can
| | 03:41 | just click New Person.
| | 03:43 | And in here, type in the User Name
you want to assign to this person.
| | 03:45 | This can be their full name,
first name, nickname, or whatever.
| | 03:48 | Then create a password by typing
it, and typing it again to verify.
| | 03:54 | And then click Create Account.
| | 03:56 | Then select this new person,
and then click the Select button.
| | 03:59 | So you can see greg has now been added
to this list of users for this particular
| | 04:04 | folder, and I'll set his
permissions to Read & Write.
| | 04:08 | So now Greg is the only person who can see
and interact with this folder over the network.
| | 04:12 | To do so, he would just go to the
Go menu>Network, find my computer,
| | 04:18 | double-click it, provide his username
and password, which I'll provide to him,
| | 04:21 | and he would log in just as if
he had an account on my computer.
| | 04:25 | And in fact, he actually does
have an account on my computer.
| | 04:27 | If I go back to System Preferences, and
go to Users & Groups, or Accounts -- let me
| | 04:33 | unlock this, so you can see a little bit better --
| | 04:34 | you can see he is listed
here as a Sharing Only account.
| | 04:38 | He doesn't have a user account, so
the only way he can access my computer
| | 04:41 | is over the network.
| | 04:42 | And the only folder he can get to is
that HR folder, or the public folders
| | 04:46 | everyone else can get to.
| | 04:47 | So it is possible to create these
Sharing Only accounts, and they won't take up any
| | 04:51 | hard drive space on your
computer like a full user account does.
| | 04:53 | Now if you ever want to remove this account,
just click the minus button, and delete it.
| | 04:58 | You'll also want to return to Sharing,
select that folder, and you can see this
| | 05:06 | has now become an Unknown User.
| | 05:07 | I just to select to delete
those out of there. Okay.
| | 05:11 | So that's how to be a little bit more
specific about which folders you share on
| | 05:14 | your Mac, and how to
determine who can access what.
| | Collapse this transcript |
| Sharing between Windows and Mac computers| 00:00 | So far, we've seen how to share files
from Windows to Windows, and Mac to Mac,
| | 00:04 | but it's quite possible that you may have a
network that includes both types of machines.
| | 00:08 | It turns out that Macs and Windows
machines can communicate with each other
| | 00:10 | relatively easily, and there are just a
few things you need to do to set them up.
| | 00:14 | On the Mac side of things, I need to
go to System Preferences, to Sharing, and
| | 00:21 | select File Sharing.
| | 00:22 | We saw earlier that simply turning on
File Sharing makes your Mac instantly
| | 00:26 | visible and accessible to other Macs
on the network, but at this point it's
| | 00:29 | still invisible to Windows machines.
| | 00:31 | So I'll click Options, and in this
dialog box, Share files and folders using AFP
| | 00:36 | is checked by default, as it always
will be when you start file sharing.
| | 00:40 | Notice that unchecking
it turns off file sharing.
| | 00:43 | Notice that File Sharing got unchecked here.
| | 00:44 | So I'll turn that back on.
| | 00:46 | Since I want to share with Windows as
well, I need to check Share files and
| | 00:50 | folders using SMB (Windows).
| | 00:52 | SMB, or Samba, is the standard language,
or protocol, of Windows file systems.
| | 00:57 | So in order for your Mac to be able to
talk to Windows machines, and vice versa,
| | 01:00 | you need to turn on SMB.
| | 01:02 | Now the thing about connecting from
Windows to Mac is you must connect with
| | 01:05 | an existing account.
| | 01:07 | You can't sign on as a guest.
| | 01:08 | So when you turn on Windows Sharing, the
next step is to check the usernames you
| | 01:11 | want to allow access from Windows.
| | 01:13 | Now, this can include Share only
accounts, which we looked at in the previous
| | 01:16 | movie, so you don't have to create a
full-fledged user account for someone on
| | 01:20 | your network just so they can access your Mac.
| | 01:22 | If you need a refresher on how to
create a Share Only account, go back and
| | 01:25 | review the previous movie.
| | 01:26 | So in this case, I'll just turn on my own account.
| | 01:28 | It's going to ask me to type in my
password for the account to prove it's me,
| | 01:32 | and then I'll click Done.
| | 01:35 | So now I've turned on Windows File
Sharing, and selected at least one user.
| | 01:38 | Now let's switch over to
the PC to see how this works.
| | 01:41 | So, here in Windows, I just open an
Explorer window, select Network, and my
| | 01:46 | BOOTH-MAC shows up because I shared it,
and I just double-click it to connect to it.
| | 01:51 | Because I'm currently signed in to my
Windows machine with the same username and
| | 01:54 | password I use on my Mac, it
lets me right into the computer.
| | 01:57 | If I were on the different account here
on Windows, or if I just used a different
| | 02:00 | password to access my Windows account,
I would have been prompted to enter my
| | 02:03 | Mac's username and password.
| | 02:04 | But in this case it let me right in.
| | 02:06 | But once you're connected, you can
access all the hard drives on your Mac,
| | 02:09 | I can get right into my home folder,
and I'm free to work with everything in
| | 02:12 | here just as if I were
sitting in front of my Mac.
| | 02:14 | So you can see, all I had to do on the
Mac side was turn on SMB File Sharing, and
| | 02:18 | it's very easy, then, to connect
to my Mac from my Windows machine.
| | 02:20 | Now let's look at things in the other direction.
| | 02:23 | If you want to access a Windows PC
from a Mac, you need to check some settings,
| | 02:27 | and find a couple of pieces of information.
| | 02:29 | First click the Start menu, and type sharing.
| | 02:31 | Then select Manage advanced sharing settings.
| | 02:35 | Under your current profile, make sure
Turn on network discovery is selected, so
| | 02:39 | you will be able to see this computer
from other computers on the network.
| | 02:42 | Make sure Turn on file and
printer sharing is selected as well.
| | 02:48 | If you want people who connect to
this computer to be able to get to the
| | 02:50 | public folders, like your public
documents, music, movies, and so on, be sure
| | 02:55 | to check Turn on sharing, so anyone
with network access can read and write
| | 02:58 | files in the public folders.
| | 02:59 | If you don't want to
allow that just turn it off.
| | 03:04 | Now under Password protected sharing
you're going to decide whether or not to
| | 03:08 | allow guests, meaning people without
accounts on this computer, to connect to it.
| | 03:11 | Turn on password protected sharing to
restrict connections to only users who
| | 03:15 | have accounts on this computer.
| | 03:17 | Turn off password protected sharing to
allow guests, who will be able to get into
| | 03:20 | the public folders, but not to
any of the user's personal folders.
| | 03:23 | If you made any changes in here,
make sure you click Save changes.
| | 03:26 | I didn't make any changes
so I'll just click Cancel.
| | 03:30 | So those are sharing
settings you should check out.
| | 03:32 | Next, you need to confirm some information.
| | 03:34 | First click the Start menu, and then right-
click on Computer, and select Properties.
| | 03:40 | In this window, note the name of your computer.
| | 03:42 | You might want to jot this down.
| | 03:43 | In my case, it's lyndacom-PC.
| | 03:44 | Then go ahead and close this window.
| | 03:49 | Next, you need to know the name of each
of the account usernames you might want
| | 03:52 | to access from your Mac.
| | 03:53 | If you're already logged into one of
the accounts you want to access from your
| | 03:56 | Mac, just click the Start button, and you'll
see your account name right here at the very top.
| | 04:00 | Just note exactly how the name appears.
| | 04:03 | You can also type user, to go to User
Accounts, and then click Manage another
| | 04:09 | account to see all the accounts on your PC.
| | 04:13 | Jot down any of those
that you might want to use.
| | 04:14 | So now let's switch back to
the Mac and see how this works.
| | 04:19 | On my Mac I should be able to
see my PC by going to Go>Network.
| | 04:23 | I should also be able to find it in
the sidebar under Shared, and you can see
| | 04:27 | lyndacom-pc is right here.
| | 04:29 | But it's also been my experience that
they sometimes don't show up right away,
| | 04:31 | so that's why I had you note
the computer name and user names.
| | 04:35 | With that information, you can
connect directly to your PC.
| | 04:37 | Now, because they are showing up in
here, I could just double-click to connect,
| | 04:40 | but let me disconnect from that.
| | 04:42 | Again, it's letting me right in,
in this case, because I have the same
| | 04:45 | username and password.
| | 04:46 | But in case they didn't show up in the
Finder window, you can go to Go>Connect
| | 04:50 | to Server, or press Command+K from the
Finder. And now type smb:// followed by
| | 04:57 | the account name you want to access,
| | 04:59 | so in this case, garrick, followed by
the @ sign, and then type the name of the
| | 05:03 | computer you jotted down;
in this case, lyndacom-pc.
| | 05:05 | To make this easier to connect to the
next time, you can click the plus button to
| | 05:12 | add that as a favorite
server, and then click Connect.
| | 05:16 | Depending on the account you're
logging in from, from your Mac, if you have the same
| | 05:19 | username and password you use on
Windows you will be let right in.
| | 05:22 | Otherwise, you'll have to
enter username and password.
| | 05:24 | But here I can see these
shared volumes here on my computer.
| | 05:28 | I'll go into Users, for example, and
here I can go to my User folder, and here I
| | 05:33 | can get to all the folders in
my account on my Windows machine.
| | 05:35 | For instance, I can go to my
Desktop, and here is a Reports folder;
| | 05:39 | I can look inside there.
| | 05:40 | So now I'm logged into my PC through my Mac.
| | 05:42 | It's pretty easy. And I'm free to
work with any of these files, or drag them
| | 05:45 | anywhere to my Mac, or copy files to my PC.
| | 05:48 | So if I wanted to copy this file here, I
could just drag it to my Desktop, and there it is.
| | 05:52 | Now, when you're done working with your
PC, you can click the Eject button next to
| | 05:55 | it in the sidebar to disconnect.
| | 05:57 | Incidentally, if you have trouble
connecting to your PC by pressing Command+K
| | 06:01 | and typing in its name like we saw here,
you can also just type smb, followed
| | 06:06 | by the local IP address of that computer,
which may work better under some circumstances.
| | 06:10 | So there you have how to share
files between Mac and Windows machines.
| | Collapse this transcript |
|
|
6. Other Types of Network SharingSharing via AIM and iChat| 00:00 | Chances are you're familiar with
the concept of chatting or instant
| | 00:03 | messaging over the Internet.
| | 00:05 | I'm, of course, referring to
applications like AOL Instant Messenger, Skype,
| | 00:08 | Yahoo Messenger, and others that allow
you to communicate in real time with other
| | 00:12 | people over the Internet.
| | 00:14 | Now, some people are still under the
impression that instant messaging, or IMing,
| | 00:17 | is just for having informal
conversations or gossiping, but Internet and network
| | 00:21 | chatting can be very useful in
a home or small office setting.
| | 00:25 | If you have multiple people in your
office, and you need to just ask one of them
| | 00:27 | a question, instead of having to
e-mail, phone, or walk down the hall,
| | 00:31 | if you're all in the same chat system,
you can just communicate that way with
| | 00:34 | short text messages.
| | 00:36 | Now, the key is being on the same IM system.
| | 00:39 | Probably the most popular one, at least
in the US, is AOL Instant messenger, or AIM.
| | 00:44 | The iChat application that comes
on all Macs operates on this system.
| | 00:47 | Another popular system is Skype,
which, in addition to letting you chat with
| | 00:51 | friends over computers, also lets you
call landline and mobile phones for an
| | 00:54 | additional fee. You may have also
heard of Google Talk, Yahoo messenger,
| | 00:58 | Windows messenger, IRC; the list goes on and on.
| | 01:02 | The problem is, none of these different
IM systems can talk to each other very
| | 01:05 | well, but the good news is that there
are some programs out there that allow you
| | 01:08 | to have accounts and talk to people
on multiple IM systems simultaneously.
| | 01:12 | For example, on the Mac side of things
there is a program called Adium, and this
| | 01:17 | lets communicate with AIM,
Yahoo messenger, Google Talk,
| | 01:20 | Twitter, Facebook, and many others.
[00:01:22.02
For Windows, there is an app called
Digsby, which also let's you chat across
| | 01:26 | multiple IM networks.
| | 01:27 | Now, there are more than just these
two chat clients, but these are two of
| | 01:30 | the most popular ones.
| | 01:32 | But since I'm on the Mac here, it comes
with its own chat client called iChat, which
| | 01:35 | is compatible with Google Talk,
Jabber, and the most popular IM client: AOL
| | 01:39 | Instant Messenger. I'll
go ahead and start it up.
| | 01:41 | Now, you most likely know the basics of
how to chat. You have a list of friends,
| | 01:47 | coworkers, or family members with whom
you have exchanged account names. You can
| | 01:50 | see when they're online and available.
| | 01:52 | In this case, I only have Jade Westley
here as my one buddy in my iChat list here.
| | 01:57 | If any of my other friends were online,
I would see them appearing here as well.
| | 02:00 | So to IM somebody, just double-click his
or her name, and I'll send a message to Jade
| | 02:07 | asking her, "Did you receive a
copy of the quarterly meeting video?"
| | 02:13 | Now, this little bubble that's popped up,
lets me know the Jade has received my
| | 02:16 | message, and is now typing a reply. And
she comes back with, "No, do have a copy?"
| | 02:21 | And I'll say, "Yes, I'll send it to you."
| | 02:24 | So this is a conversation that has
happened in real time. I didn't have to send
| | 02:27 | an e-mail and wait for response. I didn't
have to make a phone call, and get into
| | 02:31 | an unrelated conversation. Because
Jade was sitting at her desk and free to
| | 02:34 | chat, she was able to respond right away to my
question, and now this brings to my main point.
| | 02:39 | Another way to transfer files from one
computer to another over your network
| | 02:42 | is via an IM client.
| | 02:44 | There are many advantages to this.
| | 02:46 | First, unlike attaching a file to an
e-mail, there is not really a size limit to
| | 02:49 | the file you're sending over chat.
| | 02:51 | Since you're sending the file directly
to the other person's computer, you can
| | 02:54 | send much larger files than e-mail would allow.
| | 02:56 | It may take a while for it to get there,
depending on the size, but with some clients you
| | 03:00 | can connect directly over your network.
For instance, with iChat's Bonjour feature,
| | 03:04 | you can chat without your messages
first going out over the Internet.
| | 03:07 | Instead, messages and files go
directly from one computer to another, and
| | 03:10 | transferring files is limited mostly
by the speed of your local network.
| | 03:13 | Okay, so to transfer a file
just locate it on your computer.
| | 03:16 | I have this movie here on my Desktop,
and in the case of most IM clients you can
| | 03:20 | just drag the file onto your contact's
name, or into the area you type in, if you
| | 03:24 | have an active chat going on.
| | 03:25 | I'll confirm that I do want to send this.
| | 03:32 | Now I just have to wait
for Jade to accept the file.
| | 03:34 | Looks like she has accepted it, and
it's now transferring over to her.
| | 03:38 | So, of course, the person you are IMing
has to be there to accept the transfer on
| | 03:42 | their end, but once they do,
the file is sent over right away.
| | 03:44 | Okay, so it looks like the file has been sent.
| | 03:46 | I can see that Jade is typing
again, and she says, "Thanks, got it!"
| | 03:52 | And now it looks like she is sending me a
file; it's called SouthernUtah.m4v; it
| | 03:55 | looks like it's a movie file.
| | 03:57 | So similarly, you may be on the
receiving end of file transfer.
| | 04:00 | If I want to receive it, I'll just click
it, and here it comes; looks like it's a much
| | 04:03 | smaller file. And once the file transfer is over,
| | 04:06 | I can just open it up to
check it out, and there it is.
| | 04:11 | (Music playing)
| | 04:22 | And there is the file.
| | 04:24 | Now again, this process is going to
vary little depending on the client you're
| | 04:27 | using, but you can see that chat IM
clients are a useful option for sending files
| | 04:31 | across your network, or even the Internet.
| | 04:33 | Best of all, you don't have to mess
around IP addresses, opening ports, and so on.
| | 04:37 | Just drag the file to the person you
want to send it to, and as long as they're
| | 04:39 | there to receive it, off it goes.
| | Collapse this transcript |
| Sharing printers and peripherals (Windows)| 00:00 | Another advantage of being on a network
is the ability to share a single device,
| | 00:04 | like a printer, or other peripheral,
with other computers on the same network.
| | 00:07 | In this movie, I'll show you how to share a
printer that's connected directly to a Windows PC.
| | 00:11 | Later in this chapter, we'll see how
to print to a network printer, which is a
| | 00:14 | printer that doesn't connect to any
computer, but instead connects directly to
| | 00:18 | your network itself.
| | 00:19 | But for now, let's take a look at how to
share a printer that's connected to your PC.
| | 00:23 | For this example, I have a printer
connected to my PC via a USB cable.
| | 00:27 | First, click the Start button, and type sharing.
| | 00:30 | Then select Manage advanced sharing settings.
| | 00:33 | Under the Home or Work profile, make
sure that Turn on network discovery is
| | 00:36 | checked, as well as Turn
on file and printer sharing.
| | 00:39 | If you had to make any changes, click
Save Changes. I didn't make any changes
| | 00:42 | so I'm just going to click Cancel.
| | 00:43 | Now, go to the Start menu and
choose Devices and Printers.
| | 00:49 | Here you'll find a list of the printers and
other devices currently connected to your
| | 00:52 | computer, or which you've had connected
to your computer at some point. Locate
| | 00:55 | the printer you want to
share, and double-click it.
| | 00:58 | Now, the appearance of this window that
opens is going to vary depending on the
| | 01:03 | make and model of your printer, but
you should see a link that says Customize
| | 01:07 | your printer. Go ahead and click that link.
| | 01:09 | In the Properties window that opens,
click the Sharing tab, and then check
| | 01:14 | Share this printer.
| | 01:16 | In the Share name field, feel free
to give the printer a different name.
| | 01:19 | This is the name that will show up on
other people's computers on your network,
| | 01:22 | so you'll probably want to add
something more descriptive, so they'll know
| | 01:24 | which printer they're printing to, especially if
you have more than one printer on your network.
| | 01:28 | I'll just change this to
Garrick's office printer.
| | 01:30 | I generally recommend keeping Render
print jobs on client computers checked.
| | 01:35 | With it unchecked, your computer will do
all the processing of the print jobs it
| | 01:38 | receives, and why should you tie up your
own computer with somebody else's work?
| | 01:41 | So leave that checked, click OK, and the
printer is now being shared across your network.
| | 01:46 | Okay.
| | 01:46 | So let's switch to another computer, and see
how to print to this printer over the network.
| | 01:51 | So on this PC, I'll choose Start>
Devices and Printers, and again this shows
| | 01:56 | you which devices are currently connected
to, or have been connected to, this computer.
| | 01:59 | I'll click Add a printer, and next,
I'll choose to add a network, wireless,
| | 02:05 | or Bluetooth printer.
| | 02:09 | Just like that, the printer I've
shared from my other PC shows up.
| | 02:11 | You can see there is the name I came up
with: Garrick's office printer. I have it
| | 02:14 | currently selected, I'll click Next,
and since I am on Windows 7 the printer
| | 02:18 | drivers are automatically installed for
me, and now I am told I've successfully
| | 02:22 | added the HP Photosmart C5100 series printer.
| | 02:25 | I'll click Next again.
| | 02:29 | If I want, I can set this as my default printer,
| | 02:31 | so if that's the only printer on the
network, that makes sense to keep that
| | 02:33 | checked. And down here I'm offered a
chance to print a test page to make sure
| | 02:37 | the printer is working properly.
| | 02:38 | You would just click this button if
you want to give the printer a try.
| | 02:41 | It should work fine for you, and from
that point on, you'll be able to select the
| | 02:44 | printer from any application you're
working in that has print capabilities.
| | 02:46 | So I'll click Finish.
| | 02:48 | You can see the printer has been added there.
| | 02:50 | So I'll go down to the Start menu>All
Programs, go to Accessories, open up WordPad.
| | 02:57 | I'll type a little bit of text.
| | 03:03 | If I choose to print this file, you
can see there is my printer, right there
| | 03:08 | selected, and then I could
click Print to print my text to it.
| | 03:11 | So, it's pretty easy to share a printer
from a Windows 7 PC, and that's generally
| | 03:15 | how it works for other devices that can
be shared across a network as well, like
| | 03:17 | a scanner, for example.
| | 03:18 | All you have to do is just go to your
Devices and Printers, locate the device
| | 03:23 | you want to share, double-click it,
and then check the box to share the device.
| | Collapse this transcript |
| Sharing printers and peripherals (Mac)| 00:00 | Another advantage of being on a
network is the ability to share a
| | 00:03 | single device, like a printer or other
peripheral, with other computers on the same network.
| | 00:07 | In this movie, I'll show you how to share a
printer that's connected directly to your Mac.
| | 00:11 | Later in this chapter, we will see how
to print to a network printer, which is
| | 00:13 | a printer that doesn't connect to
any computer, but instead connects
| | 00:16 | directly to your network.
| | 00:17 | But for now, let's take a look at how
to share a printer that's connected to
| | 00:20 | your Mac via USB cable.
| | 00:22 | And it's actually very easy to do.
| | 00:23 | Start by going to System Preferences, go to
Sharing, select Printer Sharing, and turn it On.
| | 00:31 | So you can see Printer Sharing is now On.
| | 00:35 | Any printers that you have selected
will be listed here, and you can check all
| | 00:37 | the printers you want to share.
| | 00:39 | With each printer, you will have a list of
users; by default it just says Everyone Can Print.
| | 00:44 | If you want to restrict a certain
printe,r and allow only certain users to print
| | 00:47 | to it, you can click the plus button,
find the user, select. And notice now Jeff
| | 00:53 | Van West can print, but Everyone else
has No Access, or we can switch No Access
| | 00:58 | to Can Print as well.
| | 00:59 | But if we're going to allow everyone to print, notice
that the specific user has now gone away.
| | 01:03 | And that's pretty much it.
| | 01:04 | Now let's switch to another computer,
and see how to print to a shared printer.
| | 01:08 | All right, so here on this Mac we don't
even need to add the printer. I don't
| | 01:12 | need to go to System Preferences
and go into my Printer Settings.
| | 01:14 | All I need to do is open a program I want to
print from, for instance, Microsoft Word here,
| | 01:18 | I can type some text on
the page, go to File> Print.
| | 01:23 | You can see, I currently have no
printer selected here, but all I have to do is
| | 01:27 | click the Printer menu, look for Nearby
printers, and sure enough there's the HP
| | 01:31 | Photosmart C5100 series that's being shared
by the Booth Mac Pro that I just shared
| | 01:36 | it from. I select it, Mac OS X
automatically downloads the drivers
| | 01:40 | for me, and there it is. All I have
to do is click Print, and my page will be
| | 01:44 | printed to that computer through the other Mac.
| | 01:46 | So as you can see, it's pretty easy
to share a printer for Mac OS X, and you
| | 01:50 | will be able to print to that
printer not only from other Macs, but from
| | 01:52 | Windows PCs as well.
| | Collapse this transcript |
| Printing to a network printer (Windows)| 00:00 | Earlier in this chapter, I showed you
how to share a printer connected directly
| | 00:03 | to your Windows machine so that other
computers on the network would be able to print to it.
| | 00:07 | This solution works fine in most cases,
but it does require that the PC to
| | 00:10 | which the printer is connected be on at all
times in order for the other PCs to print to it.
| | 00:15 | An alternate solution that is more and more
popular these days is to get a network printer.
| | 00:19 | A network printer is just like a
regular printer, but instead of having to
| | 00:22 | connect to a computer, it connects
directly to your network via Ethernet cable
| | 00:26 | or wirelessly over Wi-Fi.
| | 00:28 | The advantage being that the printer
is completely self-reliant, and you don't
| | 00:31 | need to leave a computer on to control it.
| | 00:33 | It just sits there until it receives a print
job over the network, and it does its thing.
| | 00:37 | Now, I am not going to get into how
to set up the network printer itself,
| | 00:40 | because there are too many different
makes and models to go in to detail.
| | 00:42 | But generally, you should find that
they are pretty easy to set up these days.
| | 00:46 | Most printers come with a quick setup
sheet that walks you through the necessary
| | 00:49 | steps to connect your printer to the network,
| | 00:50 | but how do you print to the
printer once it's on your network?
| | 00:53 | Well it turns out, it's really not
any different than printing to a shared
| | 00:56 | printer connected to another PC on your network.
| | 00:58 | So really, you have already seen this in
action, but here's another quick run through.
| | 01:02 | Click the Start button and choose
Devices and Printers, then click Add a printer.
| | 01:07 | Choose to Add a network printer, and in
a few moments any printers it finds on
| | 01:11 | your network will appear here in this window.
| | 01:13 | Just select the one you
want and then click Next.
| | 01:17 | Now I had actually had this printer
installed before, so it's asking me if I want to
| | 01:21 | use the driver that's are already
installed, or I can download a fresh copy of
| | 01:23 | the current driver.
| | 01:24 | Now, you will only see this dialog box
if you've had the printer installed before.
| | 01:28 | Just to save time, I'll use the
driver that's currently installed.
| | 01:30 | And if you want you can give the printer
name that will help you recognize it later.
| | 01:35 | This is especially useful if you have
multiple printers from the same manufacturer
| | 01:38 | on your network. Like, I might
call this one the Upstairs printer.
| | 01:42 | I will click Next, so now we have
the option of sharing this printer.
| | 01:47 | So it's actually possible to share a
network printer, just like you can share
| | 01:49 | printer that is physically connected to
your computer via USB, as we saw before.
| | 01:54 | I think it's a little unnecessary to
do this, myself, since any computer on
| | 01:56 | your network that can see your
shared printers should be able to see the
| | 01:59 | network printer too, so you might as well
connect directly to the network printer instead.
| | 02:03 | So I will just choose Do not share this
printer, in this case, and I will click Next.
| | 02:08 | As before, you can click Print a
test page to see if your connection was
| | 02:11 | successful, and then
click Finish when you're done.
| | 02:15 | You can see it's now called Upstairs
printer, and from this point on, you
| | 02:18 | should be able to print to this network
printer from any application that's capable of printing.
| | 02:21 | So again, I could open up, say, WordPad,
type a little more text, choose Print,
| | 02:29 | and you can see Upstairs printer is
ready to be selected and printed it to.
| | 02:35 | And that's how you connect and
print to a network printer from Windows.
| | Collapse this transcript |
| Printing to a network printer (Mac)| 00:00 | Earlier in this chapter, I showed
you how to share a printer connected
| | 00:03 | directly to your Mac via USB, so that
other computers on the network would be
| | 00:07 | able to print to it.
| | 00:08 | This solution works fine in most
cases, but it does require that the Mac to
| | 00:11 | which the printer is connected be on
at all times in order for the other
| | 00:14 | computers to print to it.
| | 00:16 | An alternate solution that's more and more
popular these days is to get a network printer.
| | 00:20 | A network printer is just like a
regular printer, but instead of having to
| | 00:23 | connect it to a computer, it connects
directly to your network via Ethernet
| | 00:27 | cable or wirelessly over Wi-Fi.
| | 00:29 | The advantage being that the printer
is completely self-reliant and you don't
| | 00:32 | need to leave a computer on to control it.
| | 00:34 | It just sits there until it receives a print
job over the network, and then it does its thing.
| | 00:37 | Now I can't get into the setup of the
network printer itself, because there are
| | 00:40 | too many different makes and models to
go into detail, but generally you should
| | 00:43 | find that they're pretty
easy to set up these days.
| | 00:46 | Most printers come with a quick setup
sheet that walks you through the necessary
| | 00:49 | steps to connect your printer to the network.
| | 00:51 | But how do you print to the
printer once it's on your network?
| | 00:53 | Well, it turns out it's really not
any different than printing to a shared
| | 00:56 | printer connected to
another Mac on your network.
| | 00:58 | So really you've seen this in action
already, but here's another quick run through.
| | 01:01 | Now just to show you that I'm going to
be printing to a network printer, I'm
| | 01:04 | going to go to System Preferences, and
under Print & Scan you see I have no
| | 01:08 | printers installed currently.
| | 01:09 | This is not something you have
to check or do; I'm just trying to
| | 01:11 | illustrate that I'm going to be
printing to a printer that's not currently
| | 01:14 | installed on this computer.
| | 01:16 | And to do that, I'm just going to open
any program that can print, for instance,
| | 01:19 | TextEdit, and I'll type some
text, and choose File>Print.
| | 01:24 | You can see here it says, No Printer
Selected, so I'll click that, and notice
| | 01:28 | it's finding nearby printers.
| | 01:29 | Right here under Nearby Printers,
Photosmart C5100 series; that's the network
| | 01:33 | printer that's connected to my
network, so I'll select that.
| | 01:36 | It's now downloading the software,
installing it, and it's doing all of this
| | 01:40 | automatically. All I had to
do was select the printer itself.
| | 01:42 | And now it's ready, and I can click Print,
and the printer is now printing out my
| | 01:46 | little bit of text. And
that's really all there is to it.
| | 01:49 | Now if I go back to System Preferences,
Print & Scan; you can see the printer has
| | 01:54 | now been installed here.
| | 01:56 | So that's how to connect and print
to a network printer from the Mac.
| | Collapse this transcript |
| Remote Desktop (Windows)| 00:00 | When you have several computers on
your network that you need to manage, it
| | 00:03 | can be tedious to have to constantly
go to each computer to perform tasks on
| | 00:06 | them, especially when the computers are in
different parts, or floors, of your home, or office.
| | 00:09 | Fortunately, both the Windows and Mac
operating systems have features that
| | 00:13 | let you remotely access and control the other
computers on your network from a single computer.
| | 00:17 | All it involves is setting up each
computer to allow remote access, although I
| | 00:21 | do need to mention that on the
Windows side, you have to be running either
| | 00:23 | Windows 7 Professional or Ultimate.
| | 00:26 | Remote Desktop is not
available in the Home Premium edition.
| | 00:28 | So if you're running the Home edition,
and this a feature you think you'll need
| | 00:31 | after watching this movie, you'll have to
upgrade to Professional or Ultimate. All right!
| | 00:35 | So let's see how to authorize access on
a Windows machine that you'd like to be
| | 00:38 | able to remotely control.
| | 00:39 | Start by going to the Start menu, and then
right-click Computer, and choose Properties.
| | 00:44 | Here on the left, find Remote Settings,
and here under Remote Desktop, you have
| | 00:50 | the choices of Don't allow connections to
this computer, which is in the default state,
| | 00:54 | but if you want to be able to remotely
control this computer, you need to choose
| | 00:57 | either Allow connections from
computers running any version of Remote Desktop
| | 01:00 | (less secure), or Allow connections
only from computers running Remote Desktop
| | 01:04 | with Network Level Authentication (more secure).
| | 01:07 | All these two choices really boil down
to is, the less secure choice is for when
| | 01:11 | you think this computer might need to
be accessed by computers running older
| | 01:14 | versions of Windows, and you can use
Remote Desktop with older versions of
| | 01:17 | Windows XP and Windows Vista, again
if you're running the Professional or
| | 01:20 | Business versions of them.
| | 01:21 | So if you have older Windows systems on
your network, you'll want to check Allow
| | 01:24 | connections from computers
running any version of Remote Desktop.
| | 01:27 | When you make one of these selections,
you might see this message telling you
| | 01:30 | that this computer is set to go to
sleep or hibernate when not in use, and
| | 01:33 | obviously when it's sleeping, people
won't be able to connect to it remotely.
| | 01:35 | And you can change your
power options if you want to.
| | 01:38 | I'm just going to click OK.
| | 01:40 | Now, Windows 7 Remote Desktop uses
something called Network Level Authentication,
| | 01:44 | which basically means anyone who wants
to connect to this computer has to enter
| | 01:47 | the proper username and
password before they're connected.
| | 01:49 | In older versions of Remote Desktop,
and when you choose Allow connections
| | 01:52 | from computers running any version of
Remote Desktop, you would be connected
| | 01:56 | to the Remote Desktop computer, and
then presented the dialog to enter a
| | 01:59 | username and password, which is
technically a little less secure, because you
| | 02:02 | were connected first, before you were asked
for the username and password for full access.
| | 02:05 | But again, it really boils down to
whether you're running on a complete Windows
| | 02:08 | 7 network system, or if you have a mixed bag
of Windows 7, and older versions of Windows.
| | 02:13 | Next, you might want to click Select
Users, but this is only if you want to
| | 02:16 | authorize a user who does not have
administrator privileges to remotely
| | 02:19 | access this computer.
| | 02:20 | If you have an administrator account,
you don't need to do anything here
| | 02:23 | to authorize yourself.
| | 02:24 | As you can see at the top here, it
says the Administrators group can connect
| | 02:27 | even if they're not listed, and below here
you can see Garrick Chow already has access.
| | 02:31 | I'm just going to click Cancel, and
then I'll click OK to apply my changes.
| | 02:34 | That's all there is to authorizing
remote access on a Windows machine.
| | 02:38 | So how do you then get to this
computer, and control it over your network?
| | 02:41 | Well, I have another PC on my network right
now on which I've authorized remote access.
| | 02:45 | So let's take a look at how we can get to it.
| | 02:47 | In the Start menu I'm going to go to
All Programs>Accessories, and in here,
| | 02:53 | you're going to find Remote Desktop Connection.
| | 02:55 | So this is the application you'll use to
access the other Windows computers on your network.
| | 02:59 | Now, in this case, I do know the IP address of the
computer I want to connect to. It's 10.1.10.165.
| | 03:04 | Now, before I connect,
let's look at some options.
| | 03:09 | Under the Experience tab, you can
control how well the look of the remote
| | 03:13 | computer is represented.
| | 03:14 | Right now, it's set to Low-speed broadband.
| | 03:16 | So you can see, it's only going to
show me Visual styles, and whatever
| | 03:19 | Persistent bitmap caching is.
| | 03:20 | I'm going to choose LAN (10 Mbps or higher).
| | 03:24 | That's because I'm controlling
this computer over my home network.
| | 03:27 | Notice this checks all the items below.
| | 03:30 | Because I'm using Remote Desktop
Connection on my local network, I have enough
| | 03:33 | bandwidth to see things like the
Desktop background of the remote computer, and
| | 03:36 | Menu and window animations, and so on.
| | 03:37 | But if I were controlling this
computer over the Internet, I might try
| | 03:41 | High-speed broadband, which just
shows me the basics, like the layout of the
| | 03:44 | icons on the remote computer's Desktop
and it won't eat up my bandwidth trying
| | 03:48 | to show the Desktop wallpaper.
| | 03:49 | By the way, if you do want to remotely
control your computer over the Internet,
| | 03:53 | for example, if you wanted to
control your home computer from your work
| | 03:55 | computer, you'd have to enter your home
network's WAN address under the General
| | 03:59 | tab here. And you'd also have to open
the proper ports, as I showed you how to do
| | 04:02 | in Chapter 4 in the movie on
firewalls and port forwarding.
| | 04:04 | But in this case, I'm working on my local
network, so I'm going to keep LAN selected.
| | 04:09 | Under the Display tab, you can choose
how large a window you want the remote
| | 04:12 | computer to appear in.
| | 04:13 | I generally like to keep it Full
Screen, but you can easily change it once
| | 04:16 | you're connected, too.
| | 04:17 | I also suggest leaving Display the
connection bar, when I use full screen, checked.
| | 04:21 | We'll see the connection bar in
action in just a moment. All right!
| | 04:24 | So those are the options I've set,
I'm going to go back to the General tab.
| | 04:26 | I am going to enter my
User name, and click Connect.
| | 04:30 | Now, it's going to ask me for my password.
| | 04:37 | So now I'm looking at a completely
different computer through my computer, and I
| | 04:41 | can control it just as if I
were sitting in front of it.
| | 04:43 | This is the control bar at the top that
I was telling about, and this basically
| | 04:46 | reminds you that you're looking at
another computer, because when you're looking
| | 04:49 | at it in full screen, you can
sometimes forget you're not actually operating
| | 04:51 | your computer, but somebody else's computer.
| | 04:53 | I can easily make this into a window.
| | 04:55 | Let me just close this.
| | 04:58 | I can see my own Desktop back here,
as well as the other computer that I'm
| | 05:01 | controlling remotely, or I
can go back to full screen.
| | 05:05 | Now, be aware that when you connect to
a computer like this, anyone who happens
| | 05:08 | to be sitting in front of the actual
computer at that time will see the screen
| | 05:11 | go back to the Windows login page, and
they won't be able to do anything until
| | 05:14 | you close this connection. Although,
if they log in with their password from
| | 05:17 | there, they'll kick you
off your remote connection.
| | 05:19 | But again, now that I'm connected,
I can operate this computer.
| | 05:21 | I can go to the Start menu, I
can open the Programs, I can open
| | 05:25 | Applications, and so on.
| | 05:27 | Again, it's very easy to see both
Desktops at the same time, which can really be
| | 05:30 | convenient if you need to work
on both machines simultaneously.
| | 05:33 | So that's Remote Desktop Connection.
| | 05:34 | I'm going to go ahead and close this
window, and that actually disconnects
| | 05:37 | me when I click OK.
| | 05:40 | Anyone sitting at the remote computer
will now be able to control it again.
| | 05:43 | And again, you have to set this access up
on every computer you want to be able
| | 05:46 | to control, and this only works with the
Professional and Ultimate versions of Windows 7.
| | 05:50 | You can, however, access Windows
remotely through a Mac. Here I'm on a Mac.
| | 05:54 | Now, you can't do this natively,
but all you have to do is go to
| | 05:57 | microsoft.com/mac/remote-desktop-
client, and you can download a free copy of
| | 06:03 | Remote Desktop Connection for your Mac.
| | 06:04 | It also comes as part of the
Office 2011 suite, as you can see here.
| | 06:08 | So if you have that on your Mac, you
already have Remote Desktop Connection
| | 06:11 | installed, and you'll be able to
connect to and control your Windows
| | 06:13 | machines from your Mac.
| | 06:14 | So, for example, I already have it
installed, so I'll go to my Applications
| | 06:19 | folder; there's Remote Desktop Connection.
| | 06:23 | Punch in the IP address of the
computer I want it to connect to again, and
| | 06:30 | there's the Desktop.
| | 06:31 | Now I'm seeing a black Desktop here.
| | 06:34 | The computer still works
the way it's supposed to work.
| | 06:36 | I am controlling a Windows
computer here on my Mac,
| | 06:37 | but this is what happens when you
choose a lower connection speed.
| | 06:41 | Now, on the Mac version of this, you
have to go to Preferences>Display, and
| | 06:46 | here's where you can choose the
different items you want to show.
| | 06:49 | This is also where you can choose
the resolution of the Windows Desktop.
| | 06:53 | I close that, close this, Disconnect,
and I'll just save those changes I made.
| | 07:00 | So now when I open Remote Desktop again,
and connect to the computer, now I can
| | 07:07 | see the full Desktop.
| | 07:08 | So that's Remote Desktop Connection to
help you control Windows machines from
| | 07:11 | both Macs and Windows
machines across your network.
| | Collapse this transcript |
| Screen sharing (Mac)| 00:00 | In the previous movie we looked at
Remote Desktop Connection for Windows, which
| | 00:04 | is available for the Professional and
Ultimate editions of Windows 7, and allows
| | 00:07 | you to remotely control your Windows
machine from either another Windows
| | 00:10 | machine, or a Mac, on your network.
| | 00:12 | So in this movie I want to look at
how remotely control the Macs on your
| | 00:15 | network from another Mac.
| | 00:16 | Now unfortunately, you can't control
Macs from a Windows PC using any of
| | 00:19 | the built-in software,
| | 00:21 | so this movie is only about how to
control a Mac from another Mac on your network.
| | 00:24 | Now, there are two main ways to do this;
| | 00:26 | there is a program for Macs called
Remote Desktop, which is a professional level
| | 00:30 | program for managing lots of Macs
across your network and the Internet.
| | 00:33 | As of this recording, Remote Desktop
still costs $80 through the Mac App Store,
| | 00:37 | but for a home and small office network,
you probably don't need all the features
| | 00:40 | of a Remote Desktop, like Report
Generating, Automation, Task Servers, and so on.
| | 00:44 | Instead, you can use a free built-in
feature of Mac OS X called Screen
| | 00:48 | Sharing, which lets you take control
over Macs on your network from any other
| | 00:52 | Mac on your network.
| | 00:53 | The first step is to turn on Screen
Sharing on the Mac you would like to
| | 00:55 | be able to control.
| | 00:56 | Open System Preferences and go to Sharing.
| | 00:59 | Now all I need to do here is check Screen
Sharing turn it on, and notice what happens.
| | 01:03 | It's telling me Screen Sharing is
currently being controlled by the
| | 01:06 | Remote Management service.
| | 01:07 | So I am getting this message because
Remote Management is checked right here.
| | 01:11 | Remote Management is the sharing
option for using Remote Desktop: the $80
| | 01:14 | program we just looked at.
| | 01:15 | So you can't use both Remote Desktop
and Screen Sharing simultaneously. So I am
| | 01:19 | going to uncheck Remote Desktop,
and now I can turn Screen Sharing on.
| | 01:22 | And there are few options here;
| | 01:24 | under Allow access for, the default
selection is Only these users, and then
| | 01:28 | Administrators appears below.
| | 01:30 | So basically, anyone with an
administrator's account on this computer will be
| | 01:33 | able to connect to and control this computer,
but anyone with a regular account will not.
| | 01:38 | If you want to allow only specific
users to be able to control this Mac, click
| | 01:41 | the plus button, and add that user,
and then you will most likely want to
| | 01:46 | remove administrators if you don't want certain
administrators to have access to this computer.
| | 01:51 | So only the specific people you allow
will be able to share this Mac screen.
| | 01:54 | If you check All users, that means
anyone who has an account on this Mac, whether
| | 01:58 | they are administrators or regular
users, will be able to login and control this
| | 02:02 | computer over the network.
| | 02:03 | But the key here is that the person
must have a user account, or at least know
| | 02:06 | the username and password for one of
the accounts, in order to take control.
| | 02:10 | Generally, though, I usually just have
administrators with access to screen sharing.
| | 02:14 | And that's really all you need to
do to set up a Mac to allow it to be
| | 02:17 | controlled remotely.
| | 02:18 | So let's see how this works.
| | 02:18 | I have another Mac on my network that
I set up with screen sharing, and I want to
| | 02:22 | connect to it. And by the way, screen
sharing only has to be activated on the
| | 02:26 | Mac you want to control; it doesn't
have to be turned on from the Mac you're
| | 02:28 | doing the controlling from.
| | 02:29 | So I'll just go out to my Finder here,
I'll open up a new Finder window, and I
| | 02:34 | can see the computers on my
network here under Shared in the sidebar.
| | 02:37 | I will just select the computer I want
to control, and here in the upper right,
| | 02:40 | since screen sharing is activated on
that Mac, I have a Share Screen button.
| | 02:44 | Clicking it opens the Screen Sharing
utility, and now I just enter my name and
| | 02:48 | password for the account
that I have on that Mac.
| | 02:49 | And now I'm looking at the other Mac in
this window, and I can operate it just
| | 02:54 | like I would be able to if I
were actually sitting in front of it.
| | 02:56 | I can move windows around,
| | 02:58 | I can open folders, and so on.
| | 03:01 | And unlike the Windows version of Remote
Desktop, anyone sitting in front of this
| | 03:05 | computer can see everything you're doing.
| | 03:06 | So this can actually be a useful way
to offer someone tech support, or maybe
| | 03:10 | teach them something on their Mac.
| | 03:11 | You can take control of your screen,
and they can watch what you are doing. And
| | 03:14 | this can be a big timesaver if your Macs
are spread out all over your office, and
| | 03:17 | getting to them all just to perform
a small task is kind of a pain.
| | 03:20 | Just enable screen sharing on each one,
and you will able to do most everything
| | 03:24 | from the comfort of your
own Mac, across your network.
| | 03:26 | You will find a couple of options
under Screen Sharing>Preferences, and they
| | 03:30 | mostly have to do with the quality
of the display, and the options to
| | 03:32 | encrypt what you're typing.
| | 03:33 | Notice there is a keyboard command here
to switch between Control, and Observe.
| | 03:37 | Meaning if you're just watching somebody
do their work; maybe they're demoing
| | 03:40 | something and they are talking over
the phone to you, you don't want to roll
| | 03:42 | your mouse over their window and
accidentally take control of their computer.
| | 03:45 | Because anytime you move your mouse in this
area, you are now controlling that computer.
| | 03:49 | Using the keyboard command to toggle
between Control and Observe, which in this
| | 03:52 | case is Option+Command+X, will
make it so that you can just watch what's
| | 03:55 | going on, rather than taking control.
See, I just press the keyboard command, and
| | 03:58 | now I have this white cursor, and I am
not actually controlling that computer.
| | 04:01 | I press it again, and now
I am controlling it again.
| | 04:05 | Generally, though, the default settings
here should be fine, but feel free to
| | 04:07 | take a look in here and play around
with some of these options. And because I
| | 04:10 | am working in Mac OS X v10.7 Lion, I do
have the Full Screen option here if I wanted
| | 04:14 | to take over their entire screen like
this, or I can go back and make it another
| | 04:18 | windowed experience.
| | 04:19 | You have a couple of more options if
you choose View>Show toolbar; you see, we have
| | 04:24 | some buttons here. This is another way
to switch between Control and Observe
| | 04:27 | mode, or full screen mode -- or Fit
Screen to Window as it's called.
| | 04:31 | You can also take screenshots. And
these buttons allow you to get and send the
| | 04:35 | clipboard contents between your
computer and the remote computer, and that can
| | 04:39 | be useful when you need to copy
something from one computer and paste it into
| | 04:41 | the other. For example,
| | 04:42 | if I open a Web browser on my own
computer here, and go to lynda.com,
| | 04:49 | I can select this address, copy it, and
then on the Screen Sharing window, I can
| | 04:57 | choose Send clipboard
contents to the remote clipboard.
| | 05:00 | So when I open a browser on the
remote computer, and choose Edit>Paste from
| | 05:03 | there, you can see it pastes in that address.
| | 05:08 | Similarly, I can copy something on the
remote computer, get those content, and
| | 05:16 | put them on my current
computer, and then paste them in.
| | 05:22 | To disconnect I just close
the window, and we are disconnected.
| | 05:27 | So that's Screen Sharing; it's a
free utility that's built in to Mac OS X.
| | Collapse this transcript |
|
|
7. Tips and TricksLinking switches for more physical ports| 00:00 | I mentioned in an earlier chapter that
if you find you've run out of Ethernet
| | 00:03 | ports on your router, you can easily
add more by purchasing a switch, and
| | 00:06 | connecting it to your network.
| | 00:08 | To do so, first free up one of the
ports on your router by unplugging one of the
| | 00:11 | cables to your computers, or one of
your network devices, and plug it into an
| | 00:14 | available port on your switch. And then
take another Ethernet cable, plug one end
| | 00:20 | into any other port on your switch,
and the other end into your router.
| | 00:27 | And that's it. I now have
three more ports to work with.
| | 00:30 | Because the switch is not a router, it
doesn't try to assign IP addresses, and it
| | 00:33 | doesn't manage my network in any way.
| | 00:35 | It simply gives me more ports to work
with, and sends the traffic coming to and
| | 00:38 | from my devices straight onto the router.
| | 00:40 | And if I were to use up these ports, I
could just buy another switch and connect it
| | 00:44 | to this one, or to the router
again, to give myself more ports.
| | 00:47 | Although, it does make sense to plan
ahead, and if you think you're going to need
| | 00:50 | a lot of extra ports, you should buy a
switch with more ports to begin with,
| | 00:53 | rather than having to chain a
bunch of smaller switches together.
| | 00:56 | It'll still work that
way, but it's a lot messier.
| | 00:59 | In these days, between multiple
computers, printers, gaming consoles, DVRs, and
| | 01:04 | all sorts of other networkable devices, you'll
probably have to add a switch or two at some point.
| | 01:08 | Now one important thing to bear in mind:
| | 01:11 | as we saw earlier, switches and routers
are rated for data transfer speeds of 10,
| | 01:14 | 100, and 1000 megabits per second, but
the data over your network will only
| | 01:19 | travel at the speed of the slowest devices.
| | 01:21 | So even if you have a router that's
capable of 1000 megabits per second, or
| | 01:25 | gigabit speeds, if you attach a
switch that tops out at 100 megabits per
| | 01:28 | second, that's how fast the data will move to
and from any device connected to that switch.
| | 01:33 | So when adding switches to your network,
make sure you're matching your existing speeds.
| | 01:37 | Truth to be told, though, your slowest
device is probably your router if you use
| | 01:41 | a standard modem router your
Internet service provider gave you.
| | 01:44 | Those usually top out at 100 megabits
per second, but some providers will give
| | 01:47 | you a gigabit version of the device if
you request one, or pay an additional fee.
| | 01:51 | You'll have to check with your
provider to see if they offer a gigabit router,
| | 01:54 | but in my opinion it's worth it,
especially if you have to move large files
| | 01:58 | across your network all the time.
| | Collapse this transcript |
| Creating ad hoc networks| 00:00 | Occasionally, you may find yourself in
a situation where you need to exchange
| | 00:03 | files with other computers, but don't
have a router handy to create a network.
| | 00:07 | For example, may be you are sitting
on a plane with some coworkers, or in a
| | 00:10 | diner with a client.
| | 00:11 | Fortunately, as long as each computer
has a Wi-Fi card, you can create what's
| | 00:15 | called an ad hoc network which is a
temporary network, key word being temporary,
| | 00:19 | which each computer can join so you can
exchange files, or even share an Internet
| | 00:23 | connection, and then
disconnect from when you are done.
| | 00:26 | If you watched the movie on sharing an
Internet connection from Windows, in a
| | 00:28 | previous chapter, you saw how
to create an ad hoc network.
| | 00:31 | I am going to show you again here,
as we'll show you how to create an ad
| | 00:34 | hoc network from a Mac.
| | 00:36 | All you need is one computer, Mac or PC,
to act as the hub by creating the network,
| | 00:41 | and then the rest of the
computers can connect to it.
| | 00:44 | Now, this is not for connecting dozens
and dozens of computers together; this for
| | 00:47 | creating a temporary network
when no router is available.
| | 00:50 | Now, just as an example, I have set
up an ad hoc network on a Mac.
| | 00:54 | Here on Windows, I can join that network
by clicking my Network icon, and here I
| | 00:57 | can see Garrick's MacBook Pro. And you
can see that its icon looks different;
| | 01:01 | it kind of looks like three
computers connected together.
| | 01:04 | That indicates that this is an ad hoc network.
| | 01:07 | So I will connect to that.
| | 01:09 | Now in this case, I haven't set up any
kind of encryption, because I know this is
| | 01:11 | going to be a temporary network, and this
just makes it easier to connect, but be
| | 01:15 | sure to use your own discretion
when creating an ad hoc network.
| | 01:18 | Now, it also might takes slightly longer
for computers to connect to the ad hoc
| | 01:21 | network, because they are going to be
waiting to be assigned an IP address. But
| | 01:24 | since there's no router, there is no
DHCP, and eventually the computer will give
| | 01:29 | up and assign an IP address to itself.
| | 01:31 | Self-assigned IP addresses come from a
reserved pool of addresses, which now that
| | 01:35 | I am connected, I can show you how that works.
| | 01:37 | I am going to go to Network and Sharing Center.
| | 01:39 | Here you can see that I am
connected to Wireless Network Connection,
| | 01:43 | Garrick's MacBook Pro.
| | 01:44 | I will select that and go to
Details, and here you can see my IP address
| | 01:49 | is 169.254.116.110.
| | 01:49 | Self-assigned IP addresses all start
with 169.254, and the last two sets of
| | 01:58 | numbers are usually unique to
each computer on the network.
| | 02:01 | So if I wanted to connect to this
computer, I would type this IP address into the
| | 02:04 | computer I wanted to connect from.
| | 02:06 | I'll just go ahead and close these.
| | 02:09 | So if I were to open an Explorer window
and go to Network, you can see all the
| | 02:14 | other computers that are
connected to this ad hoc network.
| | 02:17 | Currently, the name of
my computer is Garrick PC.
| | 02:22 | So you're seeing that here; this is one
of my laptops, and this is my MacBook Pro.
| | 02:28 | As long as I have set up the
sharing settings properly on each of these
| | 02:30 | computers, and I have the username and
passwords, I can connect to these computers,
| | 02:34 | and drag files to and from them.
| | 02:36 | So that's how to connect to an ad hoc network.
| | 02:38 | Let's take a look, now, at how to set one up.
| | 02:41 | I am going to disconnect from the one I
just connected to. And I am going to go
| | 02:44 | back to the Network and Sharing
center, and I am going to click Set up a new
| | 02:48 | connection or network.
| | 02:49 | I will scroll down and
find Set up a wireless ad hoc
| | 02:52 | (computer-to-computer) network.
| | 02:56 | Next, I get a screen telling
me what an ad hoc network is.
| | 02:58 | Notice it says the computers and
devices must be within 30 feet of each other,
| | 03:01 | which is good to know. I will click Next.
| | 03:03 | I'll come up with a network name.
| | 03:06 | I will just call this laptop ad hoc.
| | 03:09 | Now again, it's up to you to decide
whether or not to use encryption.
| | 03:12 | If you're only going to be connected
to other computers for a few minutes, you
| | 03:15 | can probably do without, and it'll be
easier to connect all the computers.
| | 03:19 | But it does expose you to anyone else
in the vicinity who might be sniffing for
| | 03:22 | open wireless networks.
| | 03:24 | If you do decide to use encryption,
remember that WPA2-Personal doesn't really
| | 03:27 | work well, or at all in
many cases, with Windows 7.
| | 03:31 | So most likely you will want to stick with WEP.
| | 03:32 | I am going to go without
encryption for this example, though.
| | 03:35 | I will click Next, and now the
network is being set up, and it's done.
| | 03:41 | I can go ahead and close that, and if I
click my Network Status icon, you can see
| | 03:47 | there is the ad hoc network I just created.
| | 03:49 | It says Waiting for users, meaning
it's waiting for people to connect.
| | 03:52 | So now I just let me colleagues know the
name of this network I just created, and
| | 03:55 | they can all connect to it,
and we can start sharing files.
| | 03:57 | If I am trying to share an Internet connection
with them, I have to perform some other steps,
| | 04:01 | so refer back to the movie on sharing
Internet connections from Chapter 4 if you
| | 04:05 | need that information.
| | 04:07 | So that's how to create an
ad hoc network on Windows.
| | 04:09 | Now when you're done using it, you'll want
to click your Network Status icon again,
| | 04:12 | come up here, and choose to disconnect that.
| | 04:14 | You will definitely want to remember to
do that, especially if you haven't used
| | 04:18 | password protection.
| | 04:19 | Let's switch over to the Mac.
| | 04:21 | Creating an ad hoc
network on a Mac is even easier.
| | 04:24 | Just make sure your Wi-Fi, or
AirPort, icon is up here in the menu bar.
| | 04:27 | Now if it's not, you'll want to open up
System Preferences, go to Network, select
| | 04:34 | Wi-Fi, or AirPort; whatever the case
may be, and make sure Show Wi-Fi status in
| | 04:38 | menu bar is checked.
| | 04:41 | So to create the ad hoc network, just click
your Wi-Fi icon, and choose Create Network.
| | 04:45 | Here you'll want to name your network, or
just leave the default name, which is the
| | 04:49 | name of your computer.
| | 04:50 | I will just leave the default name.
| | 04:51 | Now, if you want to add encryption, you
can choose 40 bit or 128 bit WEP.
| | 04:56 | Again, since WPA2 encryption is still
unreliable on an ad hoc network, only
| | 04:59 | WEP is available here.
| | 05:00 | But I will just leave it open again, for
simplicity's sake, and click Create. And that's it.
| | 05:06 | You can see that the icon up here has
changed to indicate that this Mac is now
| | 05:10 | hosting an ad hoc network, and any
computers in this area should be able to join
| | 05:13 | it so we can exchange files.
| | 05:15 | If I click it, you can see
it's listed under Devices here: Booth Mac Pro.
| | 05:19 | Now, if you wanted to share an Internet
connection, that's a different setting, so
| | 05:22 | again, refer back to
Chapter 4 for that information.
| | 05:25 | When you are done using your ad hoc
network, click on the Wi-Fi menu again, and
| | 05:29 | choose to disconnect from your ad hoc network.
| | Collapse this transcript |
| Staying protected from viruses (Windows)| 00:00 | You're probably aware of the existence
of malicious programs called viruses, and
| | 00:04 | the importance of keeping your
computer protected from them.
| | 00:07 | Viruses, or malware as they are also
referred to, are often created with the
| | 00:10 | intent of stealing information from your
computer, or sometimes just to mess with
| | 00:14 | your computer by erasing important files.
| | 00:16 | Now, as a Windows user you can download
and install free antivirus software from
| | 00:21 | Microsoft's Web site by
opening your Web browser and going to
| | 00:23 | microsoft.com/security_essentials. All
you have to do is come here, and click
| | 00:28 | Download it today, and follow the instructions
to download and install it on your computer.
| | 00:32 | And once you've been installed the
software, you'll find it by going to the
| | 00:34 | Start menu>All Programs>
Microsoft Security Essentials.
| | 00:41 | Generally, all the antivirus software
programs function pretty similarly, so
| | 00:44 | even if you use something other than
Microsoft software, you'll get pretty much
| | 00:47 | the same kind of protection.
| | 00:49 | How it works is, once a week the
antivirus software scans your entire computer
| | 00:53 | looking for any viruses
you might have picked up.
| | 00:55 | Since new viruses and malware are
always being discovered, the software also
| | 00:59 | checks with an online database for new
virus definition files, so that it's
| | 01:02 | always up to date with the latest new
viruses that have been found floating
| | 01:05 | around on the Internet.
| | 01:06 | So basically, once you've installed the
antivirus software, there is not much you
| | 01:09 | have to do unless you want to change
when, and how often, it scans your computer,
| | 01:13 | which you can do by going
to the Settings tab here.
| | 01:15 | And here you can select
options in the left column, and change the
| | 01:17 | settings on the right.
| | 01:18 | For example, with Scheduled scan
selected, you can see that the default setting
| | 01:23 | is to scan your computers on Sundays at 2 a.m.
| | 01:26 | If you happen to always be using your
computer at 2 a.m. on Sundays, you could
| | 01:29 | pick another time when you're
not likely to be on your computer.
| | 01:31 | And it's not that you can't use your
computer while the antivirus software is
| | 01:34 | running, it's more that you probably
don't want other programs actively doing
| | 01:37 | things while you're working.
| | 01:39 | Under the History tab you will see
reports of previous scans, what malware was
| | 01:43 | discovered, if any, and what action was taken.
| | 01:47 | Under the Update tab, you can see
when the latest virus definitions were
| | 01:50 | downloaded, and you can click the big
Update button here if you want to manually
| | 01:53 | download the latest updates.
| | 01:56 | And under the Home tab you can perform
a manual scan by clicking Scan Now, and you
| | 02:01 | can see that I have Quick selected.
| | 02:03 | A quick scan checks the places where
viruses are most likely to be hidden.
| | 02:06 | A full scan checks every file and
folder on your computer, and could take a
| | 02:09 | couple of hours, depending on the size
of your hard drive and how full it is.
| | 02:12 | You can also choose Custom scan to
specify particular folders you want to scan.
| | 02:16 | For example, if someone sends you a file
attached to an e-mail, you might want to
| | 02:19 | scan that file before opening it.
| | 02:21 | And that actually leads me to
another important point about keeping
| | 02:23 | your computer protected.
| | 02:25 | You have to play an active role,
and you shouldn't just rely on
| | 02:27 | antivirus software.
| | 02:29 | Antivirus software attempt to catch
malware once it is already gotten into your
| | 02:32 | computer, but by being vigilant
you can take steps prevent malware from
| | 02:36 | getting into your system in the first place.
| | 02:38 | First of all, never open files or click links
attached to e-mails from people you don't know.
| | 02:43 | Oftentimes these will take you directly
to malicious Web sites that may attempt
| | 02:46 | to install malware on your system.
| | 02:47 | And if an e-mail seem suspicious,
don't forward it to other people,
| | 02:51 | especially people who might not be
aware of how to protect themselves from
| | 02:53 | viruses and malware.
| | 02:55 | And when browsing the Web, don't click any
of the links and any pop-up ads that appear.
| | 02:58 | Again, these could start the
process of installing malware.
| | 03:01 | When it comes to installing malware,
ask yourself if it's coming from
| | 03:03 | a reputable source.
| | 03:05 | There's lots of great free software
out there, but free software can often
| | 03:08 | carry malicious code.
| | 03:09 | Do your research and see if anyone
else you know has used the software you're
| | 03:12 | thinking of downloading.
| | 03:13 | See if you can find out anything about
the software somewhere other than the Web
| | 03:15 | site you're thinking of downloading it from.
| | 03:18 | And just like in real life, if something
is too good to be true, it probably is.
| | 03:21 | Offers free money and huge
discounts on products often lead to viruses.
| | 03:25 | So those are just some things to keep
in mind concerning keeping your computer
| | 03:28 | and your information protected.
| | 03:30 | You can find more information on the
Microsoft Security Essential site we
| | 03:33 | looked at earlier.
| | Collapse this transcript |
| Staying protected from viruses (Mac)| 00:01 | You're probably aware of the existence
of malicious programs called viruses, and
| | 00:05 | the importance of keeping your
computer protected from them.
| | 00:07 | Viruses, or malware as they are also
referred to, are often created with the
| | 00:11 | intent of stealing information from your
computer, or sometimes just to mess with
| | 00:15 | your computer by erasing important files.
| | 00:16 | Fortunately, as a Mac user, you don't
have nearly as much to be concerned about
| | 00:20 | as your Windows using counterparts.
| | 00:22 | It's difficult to infect a Mac with a
virus, and since the Mac has a much smaller
| | 00:26 | user base than Windows, the cretins who
create viruses generally keep their focus
| | 00:30 | on the larger group.
| | 00:32 | Now that said, there have been
some demonstrations of how to infect Macs
| | 00:35 | with viruses, but these usually involve
tricking the Mac user into downloading
| | 00:38 | and installing software containing a virus.
| | 00:41 | So while you don't have to worry as much
about malicious software being installed
| | 00:44 | through a Web site, like Windows users do,
you still have to remain vigilant, and
| | 00:47 | not install software from an
untrusted or unknown source.
| | 00:51 | Also, as a general rule, don't open
attachments or click links in e-mails from
| | 00:54 | people you don't know either.
| | 00:56 | And just because it's more difficult to
infect a Mac with a virus, that doesn't
| | 01:00 | mean you can't be a carrier.
| | 01:01 | If someone sends you an e-mail with a
Windows virus, and you forward it to a
| | 01:04 | Windows user unknowingly, you've played
your part in infecting that person's computer.
| | 01:08 | Now with that said, antivirus
software for the Mac does exist, but for most
| | 01:11 | reports, the majority of Mac
users don't use antivirus software.
| | 01:15 | The choice is yours, of course, but as
long as you don't click unknown links, or
| | 01:18 | install software from an unknown source,
including pirated versions of popular
| | 01:22 | software, you should be able to stay virus free.
| | 01:26 | Your Mac even warns you the first time
you try run your software for the first
| | 01:29 | time, and asks you to be sure that
you trust the source of the software.
| | 01:32 | So just keep those tips in mind, and
you shouldn't have any trouble with
| | 01:35 | viruses or malware.
| | Collapse this transcript |
|
|
8. TroubleshootingBasic troubleshooting workflow| 00:00 | It's pretty much inevitable that at
certain times, things just won't work
| | 00:03 | properly on your network.
| | 00:05 | Maybe you've lost your Internet
connection, maybe one computer isn't able to
| | 00:08 | find another, maybe you can't
print to your network printer.
| | 00:11 | For those times, it's a good idea to
have a basic plan for systematically
| | 00:14 | narrowing down the number of
possibilities that might be causing the problem.
| | 00:17 | A good way to think about this is to keep in
mind a basic hierarchy of how a network works.
| | 00:21 | At its most basic level, a
network needs a physical connection.
| | 00:26 | There must be actual wires or radio
signals connecting the computers and the router.
| | 00:31 | Once that exists, then the computers
can have a network address; a way of
| | 00:34 | uniquely identifying them on your network.
| | 00:37 | And once that exists, the proper
protocols can run over those wires or radio
| | 00:41 | signals, meaning your computers and
other network devices can properly
| | 00:44 | communicate with each
other and exchange information.
| | 00:47 | And once that's established, you have
access to your network services like Web
| | 00:50 | browsing, getting and sending
e-mail, sharing files, and so on.
| | 00:54 | Now, often when I'm troubleshooting a
network issue, one of the first things I'll
| | 00:57 | try is to ping another computer on the network.
| | 00:59 | A ping is a way of sending a
kind of "Hello, are you there?"
| | 01:02 | message to another computer on the
network, just to see if the two computers
| | 01:05 | can see each other.
| | 01:06 | And if the other computer receives
the ping, it will respond back with
| | 01:09 | essentially a "Yes, I'm here" reply.
| | 01:11 | What the ping is doing is checking
whether these bottom two layers are in fact
| | 01:15 | working by looking at the Network
Address layer, because if that works, then
| | 01:19 | that means the physical connection
between the computers and router is okay, and
| | 01:22 | that they're both being
assigned IP addresses by the router.
| | 01:25 | And therefore, the problem must be
somewhere in these upper two layers.
| | 01:28 | Conversely, if they can't ping each
other, then there is no reason for me to
| | 01:31 | check the network services or
protocols, because each of these layers depends
| | 01:34 | on the layer below it.
| | 01:35 | But if I can get a ping, then I must have a
working physical connection, and IP addresses.
| | 01:39 | Here's an example of what it looks like
when you ping another computer on your network.
| | 01:44 | And don't worry: in the upcoming movies I
show you how to do this on both a PC, and a Mac.
| | 01:48 | But the gist of it is, when I ping a computer,
I want to get a reply that looks like this.
| | 01:53 | And all that information is telling me
how fast the reply came back in terms of
| | 01:56 | milliseconds and some other info, but
the important thing is that I got a reply
| | 01:59 | from the IP address I pinged, meaning
the two computers can see each other.
| | 02:03 | So that means I should start
investigating why they can't actually exchange
| | 02:06 | useful information, or share files, or
why I can't connect to the Internet, or
| | 02:10 | whatever the problem might be.
| | 02:12 | On the other hand, if I see something
like this when I ping the other computer,
| | 02:15 | that means they are not seeing each
other, and I should start looking at my
| | 02:17 | physical connections.
| | 02:18 | So let's run though potential workflows
for when pings work, and when they don't work.
| | 02:22 | Let's start with what you
should if the ping doesn't work.
| | 02:26 | The first thing you should do is
check your cables and make sure they are
| | 02:28 | actually plugged in.
| | 02:29 | I can't tell you how many times I've
had network problems only to find that I
| | 02:32 | accidentally knocked an Ethernet cable
loose while plugging something else into
| | 02:35 | my computer, like a speaker or a USB cable.
| | 02:38 | Sometimes fixing your network is as
easy as making sure all the cables are
| | 02:41 | shoved all the way in.
| | 02:42 | Also, many PCs, and all routers and
switches, have lights on each Ethernet port
| | 02:46 | that flash to indicate network activity.
| | 02:48 | So check those lights and see
if they are on and blinking.
| | 02:51 | If not, the cables might not be plugged in
all the way, or you might just have a bad cable.
| | 02:55 | And you can even check your operating system.
| | 02:57 | On a Mac, the network devices that
aren't connected will have a red light
| | 03:00 | next to them, and on Windows, you'll
have those little Xs next to the devices
| | 03:02 | that aren't connected.
| | 03:04 | Another thing to check for
is for valid IP addresses.
| | 03:07 | Unless you've purposely set up an ad
hoc network, which we looked at earlier,
| | 03:10 | your computer's IP addresses
should not start with 169.254.
| | 03:15 | Those are reserved for self-assigned
IP addresses, and they tell you that your
| | 03:18 | computer has assigned itself an IP
address, because either your router isn't
| | 03:21 | doing its job, or it can't communicate
properly with the router to get the right
| | 03:24 | address for some reason.
| | 03:26 | If your problem is with a wireless
connection, try connecting your computer
| | 03:29 | with a wire, if possible.
| | 03:30 | If you can get on your network with an
Ethernet cable, that tells you that there
| | 03:33 | isn't some global network connectivity
issue, but that something is wrong in the
| | 03:37 | wireless settings of either
your computer or your router.
| | 03:40 | Just plugging in a cable can
also save you valuable time.
| | 03:42 | Maybe you need to get a report done and
e-mailed, but your wireless isn't working.
| | 03:46 | Well, if you find that Ethernet
connections are working, at least you can finish
| | 03:49 | your report before having
to troubleshoot your network.
| | 03:52 | Another thing to check if you're not getting
an IP address is the router's DHCP settings.
| | 03:56 | Is DHCP enabled? Have you forgotten
that you set up MAC address filtering, and
| | 04:00 | is that the reason why you can't
connect to your network within your computer?
| | 04:03 | And lastly, although sometimes I
do this first, is to try a restart.
| | 04:06 | I usually try it just by
restarting my computer first.
| | 04:10 | If that doesn't fix the problem, I'll
restart the router and the modem too.
| | 04:14 | Sometimes it helps if you first start
the modem, wait until it's all up, then
| | 04:17 | turn the router back on, wait until
it's up, and then restart your computer.
| | 04:21 | This may take a few minutes, but it's
a minimal amount of effort, and if it
| | 04:24 | works, you just saved yourself a bunch of
digging around to check connections and settings.
| | 04:28 | Let's say the ping is working.
| | 04:30 | So I'm able to ping another
computer, and I'm getting the reply back,
| | 04:33 | but there's some kind of
network service that's not working.
| | 04:35 | For example, maybe your e-mail
application isn't getting new e-mail that you know
| | 04:38 | you should be receiving.
| | 04:39 | The first thing I usually try in cases like
that is to see if I can pull up a Web site.
| | 04:43 | If I can pull up a Web page, this lets
me know that everything is working from
| | 04:46 | my computer, to the router, to
my modem, and out to the Internet.
| | 04:50 | So the problem must be either in my
e-mail program's settings, or more likely if
| | 04:53 | I haven't changed anything, the problem
is with my e-mail provider's server, and
| | 04:57 | I should maybe give them a call to
see if they're having a service outage.
| | 05:00 | Or if I can get to the Internet, but I
can't share files with the computer I'm
| | 05:03 | able to ping, then I know the problem
is somewhere on my local network, and it's
| | 05:07 | probably something to do
with my sharing settings.
| | 05:09 | Now, if I can't access the Internet, I'll see
if I can access my router by its IP address.
| | 05:14 | And if I can get to my router, and I can
ping other computers on my network, and
| | 05:18 | they all can get to the router, then
my problem might not be on my network.
| | 05:21 | Again, this might be a good time to
call my ISP and tell them my network seems
| | 05:24 | to be working, but I can't get online.
| | 05:26 | Again, the problem might be on their end.
| | 05:28 | But if it's possible that someone
other than yourself has gotten into your
| | 05:31 | router's settings, you might want to
check to make sure it's set up properly to
| | 05:35 | access your Internet
service while you're in there.
| | 05:36 | Let's say I can get to the Internet,
and I can ping other computers on my
| | 05:39 | network, but I can't get to
the network services I need.
| | 05:42 | For example, let's say I
can't get to my shared folders.
| | 05:44 | The next thing to try is to
access them by their IP address.
| | 05:48 | If you recall from earlier, you can
usually access the other computers on your
| | 05:51 | network by their names,
| | 05:52 | but sometimes the names don't work.
| | 05:54 | In those cases, get the IP address for
the computers, and then try typing them
| | 05:58 | into the computer you're
trying to access them from.
| | 06:00 | Many times this will work more
successfully than typing in the computer's name
| | 06:03 | or browsing for it, because
you're providing an exact address.
| | 06:07 | And lastly, just make sure sharing is
turned on for the computer or particular
| | 06:10 | folder you're trying to reach.
| | 06:11 | Maybe you turned it off at some
point, and forgot to turn it back on.
| | 06:14 | Maybe you didn't set the permissions properly.
| | 06:16 | Check your computer and folder
settings, and make sure they're set up the way
| | 06:19 | they should be for you to
get to them over the network.
| | 06:21 | Again, these are just some
suggestions for workflow steps you could follow,
| | 06:25 | but regardless of how you go about things,
try to keep this network hierarchy in
| | 06:29 | mind as you troubleshoot your network.
| | 06:31 | It's one of the most valuable concepts
for helping you narrow down the problem,
| | 06:34 | and figuring out where you
should be focusing your attention.
| | Collapse this transcript |
| Pinging (Windows)| 00:00 | So at the beginning of this chapter I
talked about the troubleshooting technique
| | 00:03 | of pinging computers on your network,
which is the activity of sending a hello
| | 00:07 | message to a computer to see if you
get a reply back, thereby letting you know
| | 00:10 | that the two computers are
successfully communicating over your network.
| | 00:13 | On Windows, you do this by using the
Command Prompt, which you can get to by
| | 00:16 | going to the Start menu and typing
Command, or just com in this case, which you
| | 00:21 | can see selects the Command
Prompt, and I'll press Enter.
| | 00:23 | The Command Prompt is where you control
your computer through text commands,
| | 00:26 | rather than using the Graphic User Interface.
| | 00:29 | It's not for the casual user in most
cases, though. But all we want to here is
| | 00:32 | enter a simple command: ping <Space
> followed by the IP address of the
| | 00:37 | computer we want to ping.
| | 00:38 | So you need to know, or check, the IP
address of the computer you want to ping
| | 00:41 | before you can ping it.
| | 00:42 | In this case, I know the IP address of
the laptop on my network is 10.1.10.152.
| | 00:45 | So when I press Enter, my
computer starts pinging that address.
| | 00:52 | A ping is simply a tiny bit of data,
in this case 32 bytes, which you can see
| | 00:56 | right here, and when you're successfully
pinging another computer, you should see
| | 01:00 | this Reply from line up here.
| | 01:01 | You can see that I'm getting all 32
bytes back; it's taking about 1 millisecond.
| | 01:05 | And as you can see, my computer pinged
this IP address four times, and in this
| | 01:09 | case, it got a response all four times.
| | 01:11 | And that's almost always the case when you're
successfully pinging a computer on your network.
| | 01:15 | You also get some stats down here
at the bottom. You can see Packets:
| | 01:17 | Sent = 4, Received = 4, and Lost = 0 (0% loss).
| | 01:20 | You see the minimum out of time it took
is 1 millisecond, Maximum 1 millisecond,
| | 01:26 | and the Average, obviously, 1 millisecond.
| | 01:28 | So that's a successful ping by any measure.
| | 01:30 | Now let me type an address that I know
doesn't currently exist on my network.
| | 01:33 | Now here is a tip: when you're in the
Command Prompt window, you can use the up
| | 01:36 | arrow key on your keyboard to
call up the last command you used.
| | 01:39 | So it can be a bit of a time saver
when you're typing a lot of commands.
| | 01:41 | But in this case, I'm going to delete
that entire address, and I'll type something
| | 01:44 | that doesn't even belong in this
network; 192.168.1.203, we'll say.
| | 01:50 | So now it's sending out its data,
waiting for a response. We can see Request timed
| | 01:54 | out. There is the second ping, sending
out a third ping now, there is the third.
| | 01:58 | It's going to try one more
time, and there is the forth.
| | 02:01 | So now you can see there were 4
packets sent, 0 received; we lost all four
| | 02:05 | of them for 100% loss.
| | 02:07 | So in a real-world scenario I'd have a
network problem here if I were trying to
| | 02:10 | connect to a computer, and
found I couldn't ping it.
| | 02:12 | Now, pinging isn't just limited to your
local network, there maybe times when
| | 02:15 | you have trouble getting into a Web site
even though you know you have Internet access.
| | 02:18 | One thing you can try is to type in the
address here, for example, ping google.com.
| | 02:24 | It's pinging it now, and you can see
this is a lot different than pinging a
| | 02:29 | computer on your local network.
| | 02:30 | You can see this first reply worked;
it came back at about 30 milliseconds.
| | 02:34 | The second ping timed out. The third
ping worked; it came back at about 29
| | 02:38 | milliseconds, and the fourth one timed out.
| | 02:40 | Notice it doesn't say that it's getting
reply from Google.com. It's getting reply
| | 02:44 | from this IP address right here.
| | 02:46 | This is Google's actual WAN IP
address, or I should say one of them.
| | 02:49 | Anytime you type a Web address into
a browser, your ISP uses its DNS, or
| | 02:54 | Dynamic Name Server information, to
look up at exactly what IP address that
| | 02:58 | Web site is located.
| | 02:59 | Notice if I open up a Web browser, and I
type in the address I see here, that takes
| | 03:06 | me to Google's Web site.
| | 03:08 | This can be useful if you find you're
having trouble getting to a Web site even
| | 03:11 | though you know you have Internet access.
| | 03:13 | I suggest looking up the IP address
of a couple of sites using this method,
| | 03:17 | especially sites you normally visit,
and then saving those IP addresses
| | 03:20 | somewhere on your computer.
| | 03:21 | Then if you ever can get to the
site through your browser, you can try
| | 03:23 | pinging their IP addresses.
| | 03:25 | If you can get through that way, you know
there is a problem with your ISP's DNS server.
| | 03:28 | If you can't get through that way, it's
possible the actual Web site itself is down.
| | 03:32 | So again, pinging can really help you
narrow down where the problem might be.
| | 03:35 | If you can ping other computers on
your network successfully, you know your
| | 03:38 | physical connections are all intact, and
that the computers have their own IP addresses.
| | 03:42 | So there is probably something going on
in your settings if you can't share files.
| | 03:46 | If you can't ping another computer, then
there is some kind of break in the basic
| | 03:49 | communications: a cable is pulled out,
your router isn't distributing IP
| | 03:52 | addresses, something along those lines.
| | 03:54 | So that's how to ping under Windows.
| | 03:55 | When you're done in here, just
close the Command Prompt window.
| | Collapse this transcript |
| Pinging (Mac)| 00:00 | At the beginning of this chapter I
talked about the troubleshooting technique of
| | 00:03 | pinging computers on your network,
which is the activity of sending a hello
| | 00:06 | message to a computer to
see if you get a reply back,
| | 00:09 | thereby letting you know that
the two computers are successfully
| | 00:12 | communicating over your network.
| | 00:13 | On a Mac, you can do this one of two ways.
| | 00:15 | One way is to go to the Terminal, which
you'll find in your Applications folder,
| | 00:19 | in Utilities, and we'll
find Terminal right here.
| | 00:22 | Now, many users tend to shy away from the
Terminal, because it's really not for casual users.
| | 00:26 | This is a window into the Mac's UNIX
underpinnings, and it's how you control
| | 00:29 | your Mac entirely through text commands,
rather than through the Graphic User Interface.
| | 00:33 | But all we want to do in this case
is enter a simple command: ping <Space>
| | 00:38 | followed by the IP address of
the computer we want to ping.
| | 00:40 | So you need to know, or check, the IP of the
computer you want to ping before you can ping it.
| | 00:44 | In this case, I know the IP address
of the MacBook Pro on my network is
| | 00:48 | 10.1.10.152. So when I press Return, my
computer starts pinging that address.
| | 00:54 | A ping is simply a tiny bit of data, and
when you're successfully pinging another
| | 00:58 | computer, you should see the replies in
the form of 64 bytes from the address
| | 01:03 | that you're pinging. That means the
computer you're pinging is sending those
| | 01:05 | bytes back to you to let you know it's there.
| | 01:07 | You can see that I'm constantly
getting all 64 bytes returned, and it's taking
| | 01:10 | about 1 millisecond to send the reply.
| | 01:14 | Now unlike pinging on Windows, which
stops after four pings, and which you might
| | 01:17 | have seen in the previous movie, you
have to stop the pinging manually here in
| | 01:20 | Terminal by pressing Control+C. Now as you
can see, it pinged that address 41 times, I
| | 01:25 | had 41 packets transmitted, and in this case
I got all 41 packets back resulting in a
| | 01:30 | 0% packet loss, and that's almost
always the case when you successfully ping a
| | 01:33 | computer on your network.
| | 01:35 | Now let me make up an address here that I
know doesn't currently exist on my network.
| | 01:38 | Now here's a tip: when you're in the
Terminal window, you can use the up arrow key
| | 01:41 | on your keyboard to call up
the last command you used.
| | 01:44 | So it can be a bit of a time saver
when you're typing a lot of commands.
| | 01:47 | In this case, I'll just delete 152 and
change this to 205, which I know
| | 01:51 | doesn't exist on my network.
| | 01:52 | So now it's trying to send out the
data again, but now I'm getting these
| | 01:55 | Request timeout messages.
| | 01:57 | Again, I'm going to press Control+C to stop this.
| | 02:00 | So you can see it's
alternating between ping: send to:
| | 02:02 | Host is down, and Request timeout.
And you can see 14 packets were sent, 0
| | 02:06 | received, 100% packet loss, because
there is no computer at that address.
| | 02:10 | Now, in a real-world scenario where I
know there is a computer at this address,
| | 02:12 | I would have a network problem here,
because I'm trying to ping the computer's
| | 02:15 | address, and it's not coming back that it's
seeing me. So that's how to ping in Terminal.
| | 02:20 | Now, if you're not comfortable typing
in Terminal -- we'll go ahead and quit there --
| | 02:23 | there is an alternate way to ping
computers in your network by, again, going to
| | 02:26 | Application>Utilities. And in here you'll
find utility called Network Utility. And
| | 02:31 | this is the utility with several
tools to help you check your network
| | 02:34 | connectivity, and one of the tabs here
is Ping, and all I have to do here is
| | 02:37 | typing the IP address of
the computer I want to ping.
| | 02:41 | We also get the option here of
sending unlimited pings, like we just saw in
| | 02:45 | Terminal, or we can limit it to 10, or
any other number. Maybe I'll say 4 pings,
| | 02:49 | and I'll click Ping, and that looks
just like it did in Terminal, only we sent
| | 02:53 | four packets this time, and then it stopped.
And I can see my stats here: 4 packets
| | 02:57 | transmitted, 4 packets received, 0% packet loss.
| | 03:00 | So you can see the results look pretty
similar to what you saw in Terminal, but
| | 03:03 | this is a bit more user-friendly.
| | 03:05 | Now, pinging isn't just limited to your
local network. There maybe times when
| | 03:08 | you are having trouble getting to Web site,
even though you know you have Internet access.
| | 03:12 | One thing you can try is to type in the
address here, or in Terminal. I'll just
| | 03:15 | do it in here, in this
case; google.com, for example.
| | 03:19 | So notice that even though I pinged
Google, it says PING google down here, what
| | 03:23 | I'm seeing here is an IP address; 74.125.
115.105. This is Google's actual WAN IP
| | 03:29 | address, or I should say one of them.
| | 03:31 | Anytime you type a Web address into
a browser, your ISP uses its DNS, or
| | 03:36 | Dynamic Name Server information, to look up
exactly at what IP address that Web site is located.
| | 03:40 | Notice if I select this address, copy
it, and then past it into my browser it
| | 03:49 | takes me directly to Google.
| | 03:50 | So that's Google's IP address right there.
| | 03:53 | This can be useful if you find you're
having trouble getting to a Web site, even
| | 03:56 | though you know you have Internet access.
| | 03:58 | I suggest looking up the IP addresses
of a couple sites you normally visit, and
| | 04:01 | saving them somewhere on your computer.
Then if you ever can't get to the site
| | 04:04 | through your browser, try pasting
their IP addresses into the browser.
| | 04:07 | If you can get through that way, you
know there is a problem with your ISP's DNS
| | 04:11 | server. If you can't get through that
way, it's possible the actual site is down.
| | 04:14 | So again, pinging can really help you
narrow down where the problem might be.
| | 04:17 | If you can ping other computers on
your network successfully, you know your
| | 04:20 | physical connections are all intact,
and that the computers have their own IP
| | 04:24 | addresses, so there is probably something going
on in your settings if you can't share files.
| | 04:27 | If you can't ping the other computer,
there are some kind of break in the basic
| | 04:30 | communications. A cable is pulled out,
your router isn't distributing IP
| | 04:34 | addresses, or something along those lines.
| | 04:36 | So that's how to ping under Mac OS X.
When you're done in here, you can just
| | 04:39 | Quit Network Utility.
| | Collapse this transcript |
|
|
ConclusionAdditional resources| 00:00 | By now you should have a firm
understanding of how to set up, manage, and
| | 00:03 | maintain your small office network.
| | 00:05 | You are probably also aware that this
topic is immense, and you could go much
| | 00:08 | further into learning about networking.
| | 00:10 | If you are interested in exploring
further into some of the topics covered in
| | 00:13 | this course, or if you're looking for
some tools, tips, and other resources for
| | 00:16 | your network, here are some Web sites
you can check out: broadbandreports.com.
| | 00:21 | They are a great resource for reading
reviews of Internet service providers
| | 00:24 | in your area, so you can make an educated
decision when choosing a broadband service.
| | 00:27 | They also provide online tools for
checking the speed of your service, and they
| | 00:31 | have an enormous and active forum,
where you can ask all levels of networking
| | 00:34 | questions, and get responses from other users.
| | 00:37 | I mentioned this one previously,
but it's worth mentioning again:
| | 00:40 | routerpasswords.com, which is a great
resource for quickly finding the default
| | 00:44 | username and passwords
for all brands of routers.
| | 00:47 | It's especially useful if you're
trying to set up someone else's network, and
| | 00:50 | you are not familiar with their brand of router.
| | 00:52 | And practicallynetworked.com is a
good source for in-depth reviews and
| | 00:56 | information on specific brands of
routers, switches, and other networking
| | 00:59 | gear, and it is a great place to visit
when you're not sure what device to buy
| | 01:02 | for your particular setup.
| | 01:03 | They also have some good
troubleshooting articles and networking tutorials.
| | 01:08 | And of course, you can usually find
specific information online by Googling
| | 01:11 | your particular issue or question.
| | 01:13 | So there you have it.
| | 01:14 | I hope you have enjoyed this course,
and that you will be able to take what
| | 01:17 | you've learned here, and put
together a useful small office network.
| | 01:20 | I am Garrick Chow. See you next time.
| | Collapse this transcript |
|
|