Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Distributed firewall wikipedia , lookup

Wi-Fi wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Wireless security wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
Chapter 5
LANs and WANs
5 Chapter Contents
 Section A: Network Building Blocks
 Section B: Wired Networks
 Section C: Wireless Networks
 Section D: Using LANs
 Section E: Security Through Encryption
Chapter 5: LANs and WLANs
2
5
SECTION
A
Network Building Blocks
 Network Classifications
 LAN Standards
 Network Devices
 Clients, Servers, and Peers
 Physical Topology
 Network Links
 Communications Protocols
Chapter 5: LANs and WLANs
3
5 Network Classifications
 Personal Area Network (PAN) – interconnection of personal
digital devices
 Neighborhood Area Network (NAN) – connectivity spread
over several buildings
 Local Area Network (LAN) – usually connects computers in a
single building
 Metropolitan Area Network (MAN) – public high-speed
network with range of about 50 miles
 Wide Area Network (WAN) – consists of several smaller
networks
Chapter 5: LANs and WLANs
4
5 LAN Standards
 LAN technologies are standardized by the Institute of
Electrical and Electronics Engineers (IEEE) Project 802 –
Local Network Standards
– IEEE 802.3
– Ethernet
Chapter 5: LANs and WLANs
5
5 Network Devices
 Each connection point on a network is referred to as a node
 To connect to a LAN, a computer requires network circuitry,
sometimes referred to as a network interface card (NIC)
 A networked peripheral, or network-enabled peripheral, is
any device that contains network circuitry to directly connect
to a network
 A network device, or network appliance, is any electronic
device that broadcasts network data, boosts signals, or
routes data to its destination
Chapter 5: LANs and WLANs
6
5 Network Devices
Chapter 5: LANs and WLANs
7
5 Clients, Servers, and Peers
 Network devices can function as clients or as servers
– Application server
– File server
– Print server
 Networks that include one or more servers can operate in
client/server mode
Chapter 5: LANs and WLANs
8
5 Physical Topology
 The arrangement of devices in a network is referred to as its
physical topology
–
–
–
–
–
Star
Ring
Bus
Mesh
Tree
 Two similar networks can
be connected by a device
called a bridge
 Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs
9
5 Network Links
 A communications channel, or link, is a physical path or
frequency for signal transmissions
 Bandwidth is the transmission capacity of a communications
channel
– Broadband
– Narrowband
Chapter 5: LANs and WLANs
10
5 Communications Protocols
 Rules for efficiently transmitting data from one network node
to another
– Divide messages into packets
– Affix addresses to packets
– Initiate transmission
– Regulate flow of data
– Check for transmission errors
– Acknowledge receipt of transmitted data
Chapter 5: LANs and WLANs
11
5 Communications Protocols
 A packet is a “parcel” of
data that is sent across a
computer network
– Circuit-switching
technology vs. packet
switching technology
Chapter 5: LANs and WLANs
12
5 Communications Protocols
 Every packet that travels over a network includes the
address of its destination device
 A MAC address is a unique number assigned to a network
interface card when it is manufactured
 An IP address is a series of numbers used to identify a
network device
 IP addresses can also be obtained through DHCP
Chapter 5: LANs and WLANs
13
5
SECTION
B
Wired Networks
 Wired Network Basics
 HomePNA and Powerline Networks
 Ethernet
 Ethernet Equipment
 Ethernet Setup
Chapter 5: LANs and WLANs
14
5 Wired Network Basics
 A wired network uses cables to connect network devices
 Wired networks are fast, secure, and simple to configure
 Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs
15
5 HomePNA and
Powerline Networks
 HomePNA networks utilize existing telephone wiring or
coaxial cables to connect network devices
– Special NICs and cables are required
 Powerline networks transmit data over electrical wiring as
low-frequency radio waves
Chapter 5: LANs and WLANs
16
5 Ethernet
 Simultaneously broadcasts data packets to all network
devices
– IEEE 802.3
– CSMA/CD protocol
 Vary in speed from 10Mbps to 100Gbps
Chapter 5: LANs and WLANs
17
5 Ethernet
On an Ethernet, data
travels on a first-come,
first-served basis. If two
workstations attempt to
send data at the same
time, a collision occurs.
That data must be
resent.
Chapter 5: LANs and WLANs
18
5 Ethernet Equipment
Chapter 5: LANs and WLANs
19
5 Ethernet Equipment
 Ethernet adapter (designed to support the Ethernet
protocols)
 Network hub
 Network router/bridge
Chapter 5: LANs and WLANs
20
5 Ethernet Setup
Chapter 5: LANs and WLANs
21
5 Ethernet Setup
Chapter 5: LANs and WLANs
22
5 Ethernet Setup
Most routers are
configured using a
browser. You should
change the network
administrator password,
then verify that DHCP is
enabled
Chapter 5: LANs and WLANs
23
5
SECTION
C
Wireless Networks
 Wireless Basics
 Bluetooth
 Wi-Fi
 Wi-Fi Equipment
 Wi-Fi Setup
Chapter 5: LANs and WLANs
24
5 Wireless Basics
 A wireless network transports data from one device to
another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
 Slower than wired networks
 Security concerns
Chapter 5: LANs and WLANs
25
5 Bluetooth
 Bluetooth is a short-range, wireless network technology
designed to make its own connections between electronic
devices, without wires, cables, or any direct action from a
user
Chapter 5: LANs and WLANs
26
5 Wi-Fi
 Wireless networking technologies that are compatible with
Ethernet
 MIMO technology uses two or more antennae to send
multiple sets of signals
Chapter 5: LANs and WLANs
27
5 Wi-Fi Equipment
Chapter 5: LANs and WLANs
28
5 Wi-Fi Equipment
 If your computer is not pre-equipped with wireless circuitry,
you can purchase and install a Wi-Fi card
Chapter 5: LANs and WLANs
29
5 Wi-Fi Equipment
 Wireless network setups
– Wireless ad-hoc network
– Wireless infrastructure network
• Wireless
access point
• Wireless
router
Chapter 5: LANs and WLANs
30
5 Wi-Fi Setup
 Set up the router
 Connect to the router with a computer
 Configure the router
 Access the router setup utility
 Create a new router password
Chapter 5: LANs and WLANs
31
5 Wi-Fi Setup
 Enter an SSID for the network
 Activate WEP, WPA, or WPA2 and create an encryption key
 Set up the wireless workstations
 Connect an Internet access device
Chapter 5: LANs and WLANs
32
5 Wi-Fi Setup
Chapter 5: LANs and WLANs
33
5
SECTION
D
Using LANs
 LAN Advantages and Challenges
 Sharing Files
 Sharing Printers
 LAN Parties
 Troubleshooting
Chapter 5: LANs and WLANs
34
5 LAN Advantages
and Challenges
 LANs enable people to work together
 Sharing networked software can reduce costs
 Sharing data on a LAN can increase productivity
 Sharing networked hardware can reduce costs
 Sharing networked hardware can provide access to a wide
range of services and specialized peripheral devices
Chapter 5: LANs and WLANs
35
5 LAN Advantages
and Challenges
 Resources become unavailable when network malfunctions
 Networks may be vulnerable to unauthorized access
– More vulnerable than standalone computers
 Wireless networks can be tapped from a “snooping”
computer
 Networked computers are susceptible to an increasing
number of worms, Trojan horses, and blended threats
Chapter 5: LANs and WLANs
36
5 Sharing Files
 If you use Windows, it
automatically detects
available LANs any time
you turn on a workstation
 To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs
37
5 Sharing Files
Chapter 5: LANs and WLANs
38
5 Sharing Files
Chapter 5: LANs and WLANs
39
5 Sharing Printers
 Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs
40
5 Sharing Printers
You can designate
the printer attached
to your computer as
sharable over the
network.
Chapter 5: LANs and WLANs
41
5 LAN Parties
 A LAN party is a gathering
of people who connect their
own computers to a LAN,
usually to play multiplayer
computer games
– No special hardware
usually is required
– Game must have
multiplayer capability
Chapter 5: LANs and WLANs
42
5 Troubleshooting
 Network problems can stem from a variety of sources
– Cables
– Signal strength
– Security
– Interference
– Network devices
– Settings
Chapter 5: LANs and WLANs
43
5
SECTION
E
Security Through Encryption
 Wi-Fi Security
 Encryption
Chapter 5: LANs and WLANs
44
5 Wi-Fi Security
 Wireless networks are much more susceptible to
unauthorized access and use than wired networks
 LAN jacking, or war driving, is the practice of intercepting
wireless signals by cruising through an area
Chapter 5: LANs and WLANs
45
5 Wi-Fi Security
 Wireless encryption scrambles data transmitted between
wireless devices and then unscrambles the data only on
devices that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
– PSK
 Activate encryption by using a wireless network key
Chapter 5: LANs and WLANs
46
5 Wi-Fi Security
Chapter 5: LANs and WLANs
47
5 Encryption
 Encryption transforms a message so that its contents are
hidden from unauthorized readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as ciphertext
 Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs
48
5 Encryption
 Weak vs. strong encryption
 AES (Advanced Encryption Standard)
 Encryption methods can be broken by the use of expensive,
specialized, code-breaking computers
– Brute-force method
Chapter 5: LANs and WLANs
49
5 Encryption
 Public key encryption (PKE) eliminates key-distribution
problem, by using one key to encrypt a message and
another key to decrypt the message
Chapter 5: LANs and WLANs
50
5 Encryption
 When personal computer users want to encrypt e-mail or
other documents, they turn to public key encryption software
called PGP (Pretty Good Privacy) software
Chapter 5: LANs and WLANs
51
Chapter 5 Complete
LANs and WLANs