How to learn to understand computer networks

Table of contents:

How to learn to understand computer networks
How to learn to understand computer networks
Anonim

Networks can be categorized according to different parameters. One approach determines the type of network according to its coverage of the geographic area. Local area networks (LANs), for example, usually cover the area of one home, while wide area networks (WANs) cover entire cities, states, or even the whole world. The Internet is the largest public global network.

Steps

Learn Computer Networking Step 1
Learn Computer Networking Step 1

Step 1. Use WEP

WEP stands for Wireless encryption protocol. This is a common method for encrypting traffic on a wireless network. It should not be neglected, as without it, hackers can easily gain access to your wireless network.

Learn Computer Networking Step 2
Learn Computer Networking Step 2

Step 2. Change and disable broadcasting of the SSID name

SSID stands for service set identifier. It is a way of recognizing the wireless access point so that clients are able to connect to it. Use a unique, separate SSID for each access point. Also, if possible, delay the sending of the SSID through the antenna. It will not appear in the list of wireless networks when searching, although it will be available for connection.

Learn Computer Networking Step 3
Learn Computer Networking Step 3

Step 3. Disable DHCP

so hackers will have to decode TCP / IP parameters, subnet mask and IP address in order to hack your network.

Learn Computer Networking Step 4
Learn Computer Networking Step 4

Step 4. Disable or change SNMP settings

Change the private and general SNMP settings. You can also just disable this option. Otherwise, hackers can use SNMP to get important information about your network.

Learn Computer Networking Step 5
Learn Computer Networking Step 5

Step 5. Use an access list

For additional security on the access point, if it supports this feature, create an access list. The access list determines which machines can directly access the access point. An AP with an access list can be used for data transfer protocol (TFTP) to download updated lists while staying away from hackers.

Popular by topic