Installing a Wireless Router

My partner has long been complaining about the bird’s nest of networking cables behind her main computer. She has a simple enough set up – 3 desktops and a couple of Laptops equipped with Wifi. But the growth of networking cable and the constant changing of settings in her main computer was getting on our nerves.

So it was finally decided that I ought to sort out this problem with minimal interruption. A quick look at the available options was bewildering. What she needed was a sure-fire quick solution, which required easy setting up, and the route has to be the least complicated.

Networking in SOHO

To cut a long story short, I decided on a Wireless router with a few LAN Ports thrown in. It needs to have a basic firewall as well. This is not a tall order and there are hundreds of products available. A call to the local store revealed that they have many brands to choose and I selected DLINK DI 524 router for this task. The selection process was not based on any obscure logic. It was a matter of availability and ease of use.

The existing set up used an Ethernet Switch and all computers shared the internet access through the main computer’s ICS ( Internet Connection Sharing). Windows 2000 and Windows XP allow you to share your internet connection with other networked computers. Windows XP also ships with built-in firewall. I had installed an additional Network Card to handle the external cable modem and the first NIC (Network Interface card) was configured as the gateway for the rest of the computers.

So I unpacked the DI 524 from its box and connected the mains supply. Nothing much happened, of course, save for the front green LEDs lighting up. All 3 computers were connected to the Ports. DI 524 comes with a 4-port Ethernet switch and a DHCP server. As we have manually setup the individual IP addresses for all the computers and there are not too many computers around, the use of DHCP was not enabled.

DI 524 is ideally suited for a small home office (SOHO) networking needs. It has the usual hardware Webserver to administer the router. It is based on 802.11g which operates on 2.4 GHz frequency. Not much of a choice when you go by the standard 802.11b/g as they use this frequency, which is also used by some cordless phones and microwave ovens. This would become an issue with women and laptops in the wrong place – kitchens. Fortunately as it turned out, my partner’s microwave or the Wireless router or the partner never complained about each other – at least to me.

With its stub 4 inch antenna, the unit provided excellent connectivity up to the lawn – about 100 feet away.

When connected to the webserver through a browser – you get a nice crisp screen of menu. There is a wizard to help you along the way, which I didn’t use as I wanted to set up everything manually. I like the hard way in everything I do.

You can do it in any order. But I went straight to the LAN.
Click on LAN and set up the IP address of the router. I set up the IP address to as already the main computer has its internal IP set to
Use the default subnet mask at and click on apply. This router is like Windows – it loves to reboot after every move.

Now point your browser to and continue.

Wireless Router Setting Up

Click on WAN and set up the cable modem details as you would normally in the main computer. It pays to note down the exact IP address, subnet mask, ISP gateway IP address and the DNS IP addresses. Now click on apply and it will whir for a couple of seconds and say rebooted.

It is not over yet. You still need to set up the firewall before anyone can see anyone inside or outside. You can build complicated firewall rules later when you need them. I added one bit of line – called as action – normal – and allowed LAN complete access to WAN. Not a bright idea when you set up a firewall. You simply bypass the firewall with this rule. But then we just want to rig the unit up as quickly as possible. We will write elaborate firewall rules as we cross this stage.

Voila. We are done and we can see that all machines can access the Net without any machine using ICS.

Now time to set up the Wireless section. Here is a snippet from the device’s help file:

Network ID(SSID) :Network ID is used for identifying the WLAN. Client stations can roam freely over this product and other Access Points that have the same Network ID.
(The factory setting is default)

Channel :The radio channel number. The permissible channels depend on the Regulatory Domain.
(The factory setting is channel 6)

Security :This device supports four different types of security for wireless network.

Wire Equivalence Protection (WEP) :This is a security feature to secure wireless data transmission. Enable WEP encryption to protect your data while it is transferred from one station to another. Select from 64, or 128-bit WEP encryption. 64-bit WEP requires 10 hexadecimal digits, 128-bit WEP requires 26 hexadecimal digits. Hexadecimal digits consist of numbers (0-9) and alphabet characters(a-f).
802.1X (Authenticate with Radius Server) :If the users want to use this security-type.At least,a radius for authentication or WEP for data Encryption. Enter the IP address of Radius server.Then select the encryption bit (64 or 128) and RADIUS Shared Key.
WPA-PSK :Another encryption options for WPA-PSK, TKIP (Temporal Key Integrity Protocol). enter a password in the WPA-PSK field between 8 and 63 characters long for ASCII. 64 characters(0~9,a~f) for HEX.
WPA (Authenticate with Radius Server) :The users have to get a access form RADIUS server by performing user authentication. Enter the IP address of Radius server and RADIUS Shared Key.
WPA2-PSK(AES) :Accept WPA2 clients only and Pre-share key (encryption key) must be entered manually. You can input either 32 ASCII characters or 64 Hexadecimal digits asPre-share key.
WPA2(AES) :Accept WPA2 clients only and work simultaneously with RADIUS Server. The encryption key is got from RADIUS Server dynamically.
WPA-PSK / WPA2-PSK :Accept WPA1 or WPA2 clients to connect simultaneously and Pre-share key (encryption key) must be entered manually. You can input either 32 ASCII characters or 64 Hexadecimal digits as Pre-share key.

To keep things simple, I opted for WEP (Wired Equivalent Privacy) with 128 bit WEP key by using a string of 26 Hexadecimal (Hex) characters and the Laptops can access the network with similar combination of WEP key. I have followed the dictum – KISS – Keep it simple Stupid. You can always add complexity later as you go along. But this is a hands-on on a painless way to set up a Wireless Router.

For a device barely costing about $30, it provides all the basic functionality.

Time to brew a strong coffee from the microwave ….

Setting up X server in Windows

Administrator role of a leading women portal requires you to don various roles at the same time. To research, design, write, review and edit technical documentation is just not enough.
Amongst other things, you will have to demonstrate a strong understanding of professional web application concepts and techniques, such as servers and application integrations to designing and managing content.

Managing servers, fine-tuning them for peak performance and writing server control directives to get the maximum out of a server is almost routine in this line of work.
Towards this, you must have a development server, which matches the real world production server in closer details. We intend to share our experiences in this field – not as a means to trumpet our prowess but to show that we have much humbler origins.

Setting up X server in Windows
In this series, we start with setting up a X server in a Windows machine to work with a Linux development server. It was suggested that an easier way must be found to remotely manage several linux machines from – of all things , a Windows machine. It takes quite some time to walk across to the individual cubicles to check out why some files are not accessible to a select team whilst the rest of the team happily works with the common file server.
Of course most of the things can be managed with just command line interface through SSH, but not some GUI windows manager.
So it is essential that we need a X server to be setup which can connect to any pre-configured linux desktops with little fuss. It will be a No brainer if you are going to use another linux desktop. But here, it was decided that the webmaster’s windows machine needs the deft handling to act as the interface.
In computer parlance X Window System, commonly addressed as X11 or simply X provides windowing for bitmap displays. X windows as it is implemented in the *nix/Linux machines is based on client server technology. The communication between the server and client operates in a transparent manner on the network. In other words, the client and server may run in the same machine or be separated by miles and connected securely through the Internet by tunneling the connection.
We evaluated all options before arriving at a solution that would be easy to implement and manage. In our evaluation we decided to abide by the guiding principles of X as propounded by Bob Scheifler and Jim Gettys:

It is as important to decide what a system is not as to decide what it is. Do not serve all the world’s needs; rather, make the system extensible so that additional needs can be met in an upwardly compatible fashion.
The only thing worse than generalizing from one example is generalizing from no examples at all.
If a problem is not completely understood, it is probably best to provide no solution at all.


We decided to go with Cygwin ( for this task. So we downloaded the setup.exe and installed the X window system into the target Windows machine. It is simple and requires no hand holding for its installation. We will elaborate more on implementing a SSH server using this cygwin in a later blog.
Suffice it to say that once we are done with the installation, you should be ready to set up the connectivity for the linux desktops.
You will find a batch file to start the X server as here G:\cygwin\usr\X11R6\bin\startxwin.bat or wherever you have installed the Cygwin.
Fire up the batch file and you should be presented with a white screen with a command prompt. You connect to the target linux desktop like so:
SSH –Y –l root
The above command uses SSH to establish tunneling for the X windows and logins as root to the destination linux desktop at
Supply the credentials as required and you will have logged in to the remote linux desktop.
Fire up the required application from the command prompt and you are done.
For example, you want to see the desktop, type nautilus and you will see the remote desktop in your Windows machine assuming that your remote desktop is a RadHat 9 and it is running Nautilus.
Happy remote computing …

Our Parent site TargetWoman - the leading women portal presents painstakingly researched extensive information in the form of thousands of condensed pages. It offers the widest and the most detailed information on subjects women care.