Posted by: lrrp | November 9, 2004

Home Networking The Wireless Way by Maryanne Murray Buechner

Want to share a fast Internet connection among several computers? Here’s a step-by-step guide for setting up your own secure network


Start with your computers. Every PC, laptop and Apple computer in your house will need a wireless antenna, which comes in the form of a slim card, or adapter, that either slides into a slot or plugs into a USB port. There are a number of these cards for PCs. For a Mac, you’ll need what’s called an Airport card, which comes built in on newer models.

The heart of your network will be a wireless router–a box with an antenna that shuttles signals between each of your computers and the network. Choose one that has extra Ethernet ports and a built-in firewall. You can get one for $100. Linksys, Belkin, Buffalo, D-Link, even Dell and Microsoft sell them. Before you buy one, read reviews at or

There are a few different wi-fi standards, but home users need to know about only two of them: 802.11b and 802.11g. Don’t sweat it. They are compatible with each other. But these days, it makes sense to go with all G. It moves data around about four times as fast as B. You won’t download Web pages any more quickly, but you will be able to move audio and video files between computers (or from a PC to, say, a wi-fi–equipped stereo or TV) at a faster clip. Busy households with multiple users will also see a difference.

Just be sure everything you buy is stamped WI-FI CERTIFIED so you know that all your gear will work together. (Important: if you bought any G products before Sept. 1, check the manufacturer’s website for a free upgrade.) A laptop using a B card will talk to a G router (and vice versa), but it will connect at a slower speed. And experts warn that mixing B and G drags everything down.

Mac and Windows computers, even those running older operating systems, should be able to coexist peacefully on your wireless home network. But the more you mix it up, the more complicated things can get. In a perfect world, all your Windows machines would be running Windows XP (which was designed with wifi in mind), and all your equipment would come from the same manufacturer, so when you call tech-support folks, they can’t pass the buck.


Follow the product manuals closely. Whatever you do, don’t click on anything or change any settings you’re not sure about. It’s much harder to fix a mistake than it is to go back and complete a step that you skipped the first time through.

Before you begin, contact your Internet service provider to get your account’s IP address and other numbered settings, such as subnet mask, default gateway and DNS addresses. Keep them handy. At some point you may be prompted to key them in.

To set up, first turn everything off. Disconnect your cable or DSL modem from your computer and plug it into the back of the wireless router. Use another Ethernet cable to connect the router to the computer’s Ethernet port (the same one you had the modem plugged into). You will set up the router by running the accompanying CDROM on this computer. (Tip: It’s a good idea to keep at least one computer tethered to the router, says Synergy Research analyst Aaron Vance. That way, if your wireless connections fail, as they occasionally will, you’ll always have at least one computer ready to go online, and you’ll always be able to check or tweak the router.)

When setting up your router, be sure to pick a unique password and SSID (service set identifier, the name for your network). Keep WEP (wired equivalent privacy, a security feature) disabled for now. (We’ll get to it in Step 3.)

Remember, you need to install wireless adapters in every computer that doesn’t have wi-fi built in (except, of course, the PC that’s already connected to the router by cable). Use the CDROM that came with each card. And keep the SSID consistent.

A notebook that has a built-in wireless card and is running Windows XP or Mac OS X should immediately detect the presence of your network and, if all goes well, configure itself. My iBook was connected in less than a minute. The Dell 600m I borrowed required a bit more fiddling but was pretty straightforward.

A good way to see what’s going on with a particular machine is to look for the wireless-networking icon in the bottom or top righthand corner of the screen. Click on it to view a list of available networks, which will be identified by their SSIDs. (I’d love to know which of my neighbors is “zajal.”) Your network should be listed first on the Preferred list.

If you find that you can’t venture as far away from the router as you’d like with one of your networked notebooks, experiment with the router’s placement. Indoor range should be about 300 ft., but will be significantly reduced by walls, hallways and other barriers. If you are getting interference from a baby monitor or microwave, try changing the channel (a minor tweak in your router’s basic settings). If your cordless phone is a problem, get one that automatically looks for a clear channel or, better yet, one that uses the 5.8-GHz band.


To prevent unwanted visitors, you need to enable the WEP security feature on your router. It’s a flawed technology, but enable it anyway. You’ll be asked to make up a pass phrase and generate a WEP key, a string of letters and numbers you will need to type into each machine on your network (after clicking on the networking icon and going to Network Properties). Friends who come over with their laptops will need that WEP key too, so write the key down and tape it to the back of your router.


These days, self-starters have fewer opportunities to screw up, thanks to better setup wizards and wi-fi–ready computers. But home networking is still a tricky business. Tech-support people can sometimes unravel a problem over the phone, but if they can’t, consider calling in a pro. Dell and Gateway make house calls for fees starting at $160. You can also search the database at to find a network installer near you. Most charge by the hour.


For more in-depth info about wi-fi home networking–including ways to lock out snoops and bandwidth thieves–check out the FAQs at


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: