Wireless Connection Management Programs. WiFi control from the command line. Management of the router load control via the phone via Wi-Fi

Yes, the operating system will allow you to find the nearby networks and connect to them, but how is our supplement account? What if you need to have detailed information on all Wi-Fi networks around you, you need to solve problems with your network, turn your laptop into portable Wi-Fi-hot spot or stay safe on public hot spot? Windows will not help you in all this.

That is why we found six applications for you. They do everything that does not know how Windows, and even more. Five of six applications are free, while the sixth is not quite expensive.

From MetaGeek is an excellent tool for finding and collecting information on Wi-Fi networks in the zone of finding your computer. The program is also useful when solving problems with your own Wi-Fi network.

For all Wi-Fi found networks, Inssider shows the MAC address of the router, the router manufacturer (if the program can determine it - usually), the channel used, the SSID identifier, or the public name of the network, the security type, network speed, and the like. In addition, the program shows the current power signal power.

How would you use a program to solve problems with your wireless network? Seeing that the nearby network with a powerful signal operates on the same channel as you, you would change the channel of your network (most of the routers it allows) what would be avoided by potential conflicts.

Also, the program allows you to identify the "dead zones" of your area, where there is no fairly reliable Wi-Fi signal. To do this, it is enough to walk through your home or office with Inssider enabled. In the future, you can either avoid these places, or try to rearrange your router.

Independence from what you need is to solve problems with your network or find hot spots Wi-Fi to connect - Inssider is the program you want to download and try.

Price: Free
Compatibility: Windows XP, Vista and 7 (32- and 64-bit)
Download Inssider

Here is another excellent program to search for Wi-Fi networks and providing information on them, like their remoteness from you. On a similar radar, the screen shows all nearby hot spots. A separate panel offers detailed information on all found hot spot, including signal power, network type (for example, 802.11n), router manufacturer, transmission channel, etc.

Next to the radar on the panel presents even more detailed information on the network to which you are currently connected, including your personal IP address, an external IP address, DNS, information about the gateway, etc.

Why should I use Xirrus Wi-Fi Inspector, not Metaageek Inssider? For example, because a simpler and understandable Wi-Fi Inspector layout simplifies the performance of information on hot spot. The program also shows the relative physical remoteness of you from hot spot. And, probably, no one will deny the utility of the radar himself.

However, Inssider is better than the Xirrus Wi-Fi Inspector in terms of obtaining more detailed information on the surrounding Wi-Fi networks.

Price: Free
Compatibility: Windows XP SP2 +, Vista and 7
Download Xirrus Wi-Fi Inspector

- This is a wonderful, free program that allows you to turn a computer with Windows 7 (the program only works with Windows 7) in hot spot Wi-Fi, which will then be able to use nearby devices - like a smartphone, or colleaging tablets.

Of course, the computer itself, which you would like to remake in hot spot Wi-Fi, must be connected to the Internet and support Wi-Fi. At the same time, the connection to the Internet does not necessarily have to be wired (although it does not prevent), because the Wi-Fi-Map of the computer can perform a double function - on one side to perform a Wi-Fi receiver, and on the other - the transmitter.

Installing hot spot is simple: connecting to the Internet, run Connectify, give your hot-sport name and set the password. After that, the Wi-Fi card of your computer will start broadcast a Wi-Fi signal to which other devices can connect. It is worth noting that your computer will work according to the Wi-Fi protocol under which it is created. In addition, it will also support and earlier protocols. For example, the 802.11n signal will allow connecting devices from 802.11b / g / n.

Installation of the password will allow you to restrict access to Internet outsiders. By itself, the hot spot signal is protected by encryption WPA2-PSK.

Connectify You can use even to install a local network without an external Internet connection. Run the program as hot spot and nearby devices will be able to connect to its network, you do not even have access to the Internet. This can be used, for example, to transfer files within the working group or for multiplayer games.

It is worth noting that the connection of my Mac to the hot spot based on a computer with Windows 7 and Connectify caused me problems. However, other computers and devices connected without problems.

Office and setting up Wi-Fi in your house Kashkarov Andrei Petrovich

1.11. Wi-Fi Signal Distribution by Laptop

All possible options for implementing Wi-Fi distribution from a laptop or PC, including ways to configure with standard Windows 10 tools, as well as using specialized programs, it is impossible to consider within one book, so we turn to the most popular options that have passed the test.

Option number 1.The Wi-Fi distribution can be carried out by using the command line and the built-in Netsh command in Windows 7.

Requirements: Computer 1 - Internet connection (LAN, WiFi, 3G ...), the presence of a Wi-Fi module installed Windows 7 and above, as well as a second computer with a built-in Wi-Fi-module. In this case, a relatively simple network (AD-HOC MODE) in point-point mode is not suitable for connecting to devices that do not support work with AD-HOC networks (for example, the tablet or phone based on Android OS). Using this network must be mainly used to exchange data between the PC in the absence of the ability to apply access point. The essence of the method consists in several practical steps.

1. Open Start? Control Panel? Network Management Center and Common Access? Configuring a general connection or network.

2. Choose: Configure Wireless Network Computer Computer, Zhmem. Further. We ask on the Latin Name Name and security key, click Further.

3. Open Start? Control Panel? Network Management Center and Common Access? Change adapter settings.

Choose a network with Internet access and go to Properties. Then follows the transition to the tab Accessand the resolution command to shared access. On another computer, we are looking for a network created by us and connect.

Option number 2.Distribution of Wi-Fi signal using the command line and the built-in NETSH Windows 7 command to connect the network computer - devices with Wi-Fi.

Requirements: Computer 1 - Internet connection (LAN, WiFi, 3G ...), the presence of a Wi-Fi module, the drivers of which support Virtual Wi-Fi, installed by Windows 7 Maximum or Windows 8 R2, second PC or (Other devices) with a module .

Allows you to connect devices via access point (Access Point-AP) based on Virtual Wi-Fi software technology. This technology is based on the Software Access Point - Softap, to which you can connect a laptop, telephone (supported by Android OS), a camera, printer and other devices.

1. Press Start?in the search string we enter cMD?open the command prompt on behalf of the administrator.

2. Enter the following line to the command prompt:

netsh WLAN Set HostedNetwork Mode \u003d ALLOW SSID \u003d "HOMEWI-FI" KEY \u003d "123QWE123456" KEYUSAGE \u003d PERSISTENTENTwhere sSID \u003d "HOMEWI-FI" SSID- Network ID (network name), in our example: Homewi-Fi.; key \u003d "123QWE123456"- security key (password), in our example: 1 23QWE123456 ". Next click ENTER.

3. Then run the network with the command (also enter into the command prompt) netsh Wlan Start HostedNetworkAfter that, in the list of network connections, the newly created Homewi-Fi network is visible.

In order to provide access to the Internet to other devices connected to our created network, you must perform the step 3 procedure described in the "alternative" version (No. 2).

In this embodiment, there is a feature that concludes that when the distribution laptop or a sleep is turned off, the launch of the network from the command line will need to be performed again. To do not do this every time, just download this StartWi-Fi file. Bat and drag it to.

Thus, we configured the distribution of Wi-Fi from a laptop to other devices.

Option 3.With the program for distribution Wi-Fi from a laptop. Requirements: according to Method 2.

This option implements the ability to create an access point based on the described method No. 2, using only graphic shell programs. In free access there is a huge number of programs for Wi-Fi distribution from a laptop or PC, so it makes no sense to describe the setting.

Attention, important!

We will optionally purchase an autonomous Wi-Fi access point, which will save the user from a variety of problems with connecting various devices. In case of insufficient signal level, use an external Wi-Fi antenna with a large gain coefficient.

Wi-Fi Routers: Differences and Features

Today, the router is one of the most popular devices among Internet users. The market offers a wide range of routers for every taste. Which router is better to choose for home use? This question is quite difficult to give an unequivocal answer. Various types of routers, the main factors for which you want to pay attention to when choosing a home Wi-Fi-Modem, are all those important aspects, without which the right choice is difficult.

This text is a familiarization fragment. From the book information technology. Software Documentation Management Guide Author author unknown

From the Book of Hydraulics author babaev m a

From the book instrument making author babaev m a

39. Distribution of speeds with uniformly installed motion. Laminar film still, despite the above and other features, which are not stated due to their abnormality, the main sign of the turbulent movement is mixing

From the book Energy Waves by the author Ross David.

40. Distribution of speeds in the "live" section of the stream of modern hydrodynamics managed to resolve these problems by applying the method of statistical analysis. The main tool of this method is that the researcher goes beyond traditional approaches and applies to

From the book Favor Four. Costs - Half, Double - Double Author Wezsecker Ernst Ulrich Background

46. \u200b\u200bDistribution of tangent stresses with uniform motion with uniform movement of the pressure loss at the LHE length is determined: where? - moistened perimeter, W - Live cross section area, LHE - flow path length ,?, G - liquid density and acceleration of gravity ,? 0 -

From the book of rocket and flights to space of the author of Willy.

From the book digital steganography Author Grigunin Vadim Gennadyevich

10. Bininal and polynomial distribution laws. Equaliable distribution. The law of distribution of eccentricity 1. Binominal distribution law. This law is mathematically expressed by the formula of the decomposition of the binoma (Q + P) 2 in the following form where N! - read

From BIOS book. Express course Author Traskovsky Anton Viktorovich

40. Signal conversion methods Conversion in the measuring heads is implemented in three ways. The transformation mechanism contains only gear mechanisms.2. The transformation is carried out by lever-teeth, i.e., both methods of attachments are used.

From book Electronic tricks for inquisitive children Author Kashkarov Andrei Petrovich

The distribution of the role props of the raft. Sir Christopher Cockerel suggested the top three hingedly connected pontoons, following the wave profile. When the front pontoon, like a float, is fluently moving up and down, the second swings with the phase shift, and the third? -? Remains

From the book of the video surveillance system [Workshop] Author Kashkarov Andrei Petrovich

The distribution of savings then there was another problem: for a variety of reasons related to the registration (some of them were barely underwriters), energy companies stopped receiving so much profits from electricity savings as they could get from the increase

From the book of the author

The distribution of meteorites in the zodiac light The phenomenon of zodiacal light is of great interest in terms of the distribution of meteorites. As is known, it is associated with the reflection of sunlight from the lens-like accumulation of the meteoric substance, the center of which

From the book of the author

7.3. Embedding information due to a change in the time of the echo delay. The same authors proposed a method for implementing information using an echo signal. This method allows you to implement data into a cover signal, changing the echo parameters of the signal. To the Echo parameters

From the book of the author

Chapter 7 Distribution of resources This section contains options that are most critical affecting the stability of the computer. By changing the values \u200b\u200bof these parameters, you can avoid so-called device conflicts or, on the contrary, to get them. DMA clock option allows

From the book of the author

3.7. Control through the old radiotelephone or unusual application of the base and tube of the radiotelephone in everyday life sometimes happens that the home radio telephone is morally obsolete, ceases to please the way, as before - after all, modern models appear that you want

From the book of the author

2.3. Mobile video cameras for transmitting a signal over cellular networks 2.3.1. Mobile 3G GC19 Camcorder Mobile 3G GC19 camcorder (Fig. 2.26) allows you to conduct remote observation of the room in which it is installed. The signal is transmitted through cellular networks. Device

The router control implies a device setup. The router is quite difficult to the network equipment with a huge functionality, and depending on the operating conditions, this or that control is required.

Configuring the router requires certain knowledge, moreover, before starting the configuration, you must connect it to the computer, and go to those settings.

If you do not take into account "exotic" methods (for example, via telnet *, then the main methods of setting are only two:

  1. Either through a special assistant program;
  2. Either through the built-in web interface of the router.

The first way is more convenient to smartly serious users, since it is designed for practically automatic configuration with the minimum participation of a person, the second method provides a more subtle configuration.

Let's start connecting to a computer.

Connecting a router to a computer

Any router is equipped with a LAN interface (port) designed for wired connections to a computer. Also, any computer has an Ethernetport for the same goals. We take the network wire patch court, which usually go to the configuration with the router, and combine the router with a computer through port data.

Preparation of the router to the settings

Also, communication can also be installed via Wi-Fi wireless network, but not all routers and computers have a Wi-FiModule, besides the wireless network is less reliable and bonded bonds at the most inopportune moment.

Front panel router

After turning on the router, you must pay attention to its indicator light bulbs, usually located on the front panel. First, to make sure the router works (suddenly the power supply blown), secondly, to make sure that the firmware is fully loaded into its RAM and the router is ready for operation.

Front panel router

Further actions depend on how you intend to configure the router - with an assistant or independently via the web interface.

First consider the first option.

Setting up specialized software

The assistant programs are located on CDs, which are in configuration with the router. Also, if you have access to the Internet, it can be downloaded from the official website of the manufacturer.

It should be immediately noted that not all manufacturers are developing such programs!

By installing the program, run it using a shortcut that appears on the desktop. As a rule, the first one opens a welcoming window with a manufacturer's logo in which you want to start the start of the router.

The initial adjustment program window

Further steps depend on the manufacturer, but everything comes down to the selection of the provider, the input is necessary for passwords and the logins specified in the contract with the provider. On the other steps, just read the issued messages and agree with them by clicking "Next" or "OK".

Setup via web interface

But much more preferable, and professional, configure via the web interface of the router. But to enter the settings menu, this method will first require the authorization of the user, since the router not last guests simply will not let it in their settings.

Label under the bottom of the router

There also recognizes the IP address of the router.

User authorization

So, they connected the router to the computer patch cord, and turned on. Next, on the computer, open internexplorer, in which the following address of the router.

Log in to the router settings

Menu structure settings

For a very rare exception, the menu structure of the same type is either on the left, or from above is the tree of the setup items. Many manufacturers on the right side of the window also indicate help and tips at the selected menu item. In the center of the window and are produced direct settings, that is, the router control.

Menu Settings

Very good if the menu has Russian. If it is originally in English, then looking for a "Language" type string, since the menu can be multilingual, and English is simply installed by default. We change it into Russian.

Wi-Fi Setup

All, then it remains only to carefully read the names of the menu items and make settings. For example, we need to configure Wi-Fi wireless network. We need a menu name, we need "Wi-Fi", "Wireless", "Wireless Network" or something in such a way.

Consider an example setting on a Netgear router

Setting up wi fi

Go to the "Settings" menu, then select the "Wireless Setup" submenu. The setup window will open, in which you specify the name of our wireless network, select the channel, mode, transmission rate. If you wish, you can set a password to connect to the network, or leave free input.

By the same scheme, the rest of the router is configured, with some of which you can read on the video lesson:

Today I want to show you an interesting device, with which you can manage anything via the Internet using the Wi-Fi module ESP8266 (ESP-01) and the ATMEGA8A microcontroller.
In this bundle, the module performs the role of the WiFi network controller and the web server, and the ATMEGA8A acts on the role of the power node controller, takes the string along the simple protocol from ESP8266. and processing it gives the command to the opening of a relay through the shift register 74hc595. and transistor assembly ULN2003..

Device diagram:

Addressing for a given IP address, by default: 192.168.4.1, you can configure various modes and manage lighting in an apartment or house. The device has a web interface. Firmware for ESP8266 is based on "WebsWings" from respected « PVVX » . I simply add a pair of three handlers in the file that when you receive a specific row from the Web side in the UART interface, the interface will be sent 4 byte string - the command identifier. On each control channel accounts for two such commands, it is turned on and off. Also, there are even additional two commands that can enable and turn off all the lighting channels at once.
And then, writing a simple web page I easily manage the lighting of the apartment.

The device works as follows:

From the web: If it is simple, then when you click on any of the buttons, a script is called, which changes the background of the button and changes the variable value from 1 to 0 and vice versa with each press and then the AJAX handler is called, which is processed by the program in ESP8266 and sent to the UART code corresponding to the AJAX command. And already atmega8a, this string takes and processes.

From the microcontroller:a string is accepted, processed, and if a string is coincided with verification, the necessary actions are performed. It looks like like this:

Void send_data () (static char buff_data \u003d 0, rel_data \u003d 0; static char x \u003d 0; if (string_search ("@ 1A00", RX_Buffer)) // Light on Kitchen (REL_DATA | \u003d 0x81; PrintF ("1CH ON \\ This feature compares the number to the row to the Uctor, with a string that performs certain commands. If it coincides - then the action is performed.<42000 && demo_off==0) demo++; } .................... .................... else if(string_search("@2A00",rx_buffer)) // LIGHT OFF кухня { rel_data&=~0x81; printf("1CH OFF\r\n"); clear_buffer_rx(); x=0; if(demo<42000 && demo_off==0) demo++; } relay_send(rel_data); }

Function Parser Yuart homemade, here is its code:

char String_Search (Char * Str1, Char * Str2) (unsigned char addr \u003d 0, x \u003d 0, y \u003d 0; str1 + \u003d 0; str2 + \u003d 0; while (str1! \u003d 0) (addr ++;) while (STR1 [Y ]! \u003d 0 && STR2 [x]! \u003d 0) (if (STR1 [Y] \u003d\u003d STR2 [x]) (Y ++; x ++;) ELSE (if (y

The web page does not claim a premium, and looks like this:

When you click on any of the buttons, the lighting is turned on!

Web page settings are hidden from the main and open when entering links. Just below, I will indicate them.

If desired, anyone can refine the main page by adding a button or link to it to go to the settings.

192.168.4.1/protect/wifi.htm.

192.168.4.1/protect/setup.htm.
192.168.4.1/protect/uart.htm.
192.168.4.1/protect/upLoad.htm.
On issues of firmware refinement, you can.

Photo of the mounted device:

Attention!

The printed circuit boards were developed as universal (for general use) and fees were applied from what was already manufactured, it is all associated with a reduction in the development time and saving costs for the manufacture of factory boards. Therefore, some nodes are displaced not for the lighting management task.

Wireless data transmission technology in Wi-Fi local networks appeared in 1998 due to the Engineer of the Australian Laboratory of Radio Astronomy CSIRO John O'Salivna. The first standard of the IEEE 802.11n wireless data exchange protocol was approved in 2009.

During its development, Wi-Fi technology has gained broadest popularity, primarily due to the lack of need to use wires when connecting to the network. And if the original Wi-Fi technology was used to connect wearable and tuning computers, currently this technology has entered the camera and in domestic equipment, and in multimedia devices, and in control devices. Wireless sensors of various physical quantities - temperature, pressure, humidity, etc. are widely used. The control and management devices "smart home" equipped with Wi-Fi modules can carry out their functions from anywhere where the local wireless network is available, and in case this network via the router has the ability to go to the global network - and from any point, Where is the Internet. Using your smartphone connected to the Internet (via Wi-Fi or GSM), the user can not only view sites, but also control home appliances located at any distance from it.

The standard Wi-Fi network scheme contains at least one access point that generates a wireless network with a known identifier (SSID) and encryption parameters to which is connected at least one client. The access point can serve as a specialized device and a router connected to the global network equipped with a wireless radio module. Also, for example, the access point can be a laptop or smartphone equipped with Wi-Fi modules, and connected to the network using a cable or GSM technology, respectively.

In the proposed review, we will look at some modules offered by Master Whale, using Wi-Fi wireless technology. Some modules are intended for use in DIY projects are supplied as a circuit board with components and do not have enclosures, others are made in the form of complete devices and are designed to use "out of the box". It should be noted that each of the device under consideration is a wireless network client, therefore, to connect them to the network you need an access point. It is also necessary to pay attention to how the network is connected - local or global. Many Wi-Fi devices use portals placed on a global network to communicate with other devices and information exchange. This method of communication allows you to simplify the connection, since it does not require a permanent allotted IP address of the global network and relatively complex NAT network settings ("forwarding" ports to access from outside to the local network located behind the firewall of the router.

For convenience of comparison, the main characteristics of devices are reduced to the table located at the end of the review.

We will start our review with DIY modules whale master using Wi-Fi technology.

  1. - Wi-Fi relay with a thermometer and two relays.

The basis of the device is used by the widespread Wi-Fi module ESP8266. The module is a microcontroller equipped with a wireless interface. It supports IEEE 802.11 b / g / n standards, with WEP and WPA / WPA2 encryption. Also, the module has 11 available I / O ports and Wired interfaces SPI, I2C, I2S, UART and 10-bit ADC. There are several freely distributed developer sets (SDK) with a compiler and libraries that make it possible to effectively use ESP8266.

All this made it possible to create a modern device for mobile control by various electrical appliances using smartphones or tablet.

As already noted, the module is designed to work in local networks. If you need to use access to the global network, then the next device will help.

  1. - Internet relays with a thermometer and two relays using the MQTT server.

The Message Queue Telemetry Transport network protocol is a simplified data transmission protocol between devices and runs on top of the TCP / IP protocol. This protocol uses a message transmission behavioral template, known as the "Publisher-subscriber", is very easy to use and administer, does not create large loads on the communication channels and successfully works if there are problems in these channels, and also does not impose restrictions on the transmitted data format . MQTT is designed based on low-power built-in devices, so it requires minimal computing power to its implementation with which microcontrollers cope. Thus, the MQTT protocol is, along with some other similar protocols, for example, MODBUS or RS-485, an excellent means for the implementation of the "Internet of Things" functions - IoT.

Remote control of the two relays of 2000 W each;

Reception and transfer to the network readings of the two DS18B20 temperature sensors connected to it;

Receiving and transferring indications of DHT11 or DHT22 humidity sensors, analog sensors using built-in ADC.

But, in addition, it provides data reading from sensors and manage embedded relays via the Internet anywhere, there is a connection to a global network. When working in the global network, a free MQTT server is used, by default, but you can also use another.

  1. If the previous two devices use the capabilities of the ESP8266 microcontroller, the module has its own more powerful microcontroller of the STM8 series and is a device for collecting and transmitting data to Wi-Fi.

The use of the STM8 microcontroller made it possible to implement a very wide functional in a small volume. The module is on one side by a complete device for collecting data on consumed household resources, such as water, heat, gas, electricity, and on the other hand, a multifunctional device for monitoring and managing actuating modules and mechanisms.

The device collects data from the sensors connected to it and the scheduled meters and transmits this data to the server for further processing and use.

To one instrument can be connected to 8 any devices in any combination:

Water meters;

Gas meters;

Electricity meters (when installing an optional CAN or RS-485 interface module);

Temperature sensors, for example,;

Water leakage sensors, for example,;

Liquid level sensors;

Gas leakage sensors;

Executive devices (shut-off adjusting reinforcement with an electric drive), for example, a ball valve with an electric drive.

When using additional embedded RS-485 or CAN interface modules to one module, in addition to 8 devices listed above in the description, up to 8 Mercury type electricity meters can be connected.

Modules can be combined to increase the number of served channel collection channels.

The device collects data from counters and sensors and on the schedule installed in the settings transmits them to a server located on the territory of Russia. In normal mode, data is sent once a day with hourly detail. If an emergency is detected (the water meter disconnected, the leakage occurs, the battery sits down, etc.) the device comes to communicate immediately and reports the owner using Push or E-Mail notifications. The server is organized by the personal account of each user.

In the personal account you can specify on what day and hour the server will automatically automatically send readings every month. Indications can be sent in the following ways: in the form of push notifications, in the form of e-mail, directly to the Mos.ru portal. Forget about the routine associated with the monthly transfer of testimony manually!

You can also just watch readings and graphics on your mobile phone, tablet or computer using a browser or mobile application for iOS and Android.

The power supply of the module is made from three alkaline (alkaline) batteries of AA sizes, the duration of autonomous work is at least 3 years. When the charge level decreases below a 10% user will be sent Push or E-Mail notification.

The device is associated with the server using the Internet access via private or public Wi-Fi network with encryption. Two networks can be used: basic and backup. In the absence of communication, the device collects and stores the hourly log within 1 month, when it transmits data to the server. In any abnormal situation (the device does not communicate, leakage occurred, breaking in line to the sensor or counter, etc.) send you a push or e-mail notification.

Problems