Download Slide 1

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

H.323 wikipedia , lookup

Telecommunications in Russia wikipedia , lookup

Quality of service wikipedia , lookup

PSTN network topology wikipedia , lookup

Packet switching wikipedia , lookup

Windows Vista networking technologies wikipedia , lookup

History of smart antennas wikipedia , lookup

Telecommunication wikipedia , lookup

Last mile wikipedia , lookup

Telecommunications engineering wikipedia , lookup

Wi-Fi wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Computer network wikipedia , lookup

Zero-configuration networking wikipedia , lookup

5G wikipedia , lookup

Transcript
Chapter 5
LANs and WLANs
5 Chapter Contents
 Section A: Network Building Blocks
 Section B: Wired Networks
 Section C: Wireless Networks
 Section D: Using LANs
 Section E: Security Through Encryption
Chapter 5: LANs and WLANs
2
5
SECTION
A
Network Building Blocks
 Network Classifications
 LAN Standards
 Network Devices
 Clients, Servers, and Peers
 Physical Topology
 Network Links
 Communications Protocols
Chapter 5: LANs and WLANs
3
5 Network Classifications
 Personal Area Network (PAN) – interconnection of personal
digital devices
 Local Area Network (LAN) – usually connects computers in a
single building
 Metropolitan Area Network (MAN) – public high-speed
network with range of about 50 miles
Chapter 5: LANs and WLANs
4
5 Network Devices
 Each connection point on a network is referred to as a node
 To connect to a LAN, a computer requires network circuitry,
sometimes referred to as a network interface card (NIC)
 A networked peripheral, or network-enabled peripheral, is
any device that contains network circuitry to directly connect
to a network
 A network device, or network appliance, is any electronic
device that broadcasts network data, boosts signals, or
routes data to its destination
Chapter 5: LANs and WLANs
5
5 Network Devices
Chapter 5: LANs and WLANs
6
5 Clients, Servers, and Peers
 Network devices can function as clients or as servers
– Application server
– File server
– Print server
 Networks that include one or more servers can operate in
client/server mode
Chapter 5: LANs and WLANs
7
5 Physical Topology
 The arrangement of devices in a network is referred to as its
physical topology
–
–
–
–
–
Star
Ring
Bus
Mesh
Tree
 Two similar networks can
be connected by a device
called a bridge
 Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs
8
5 Network Links
 A communications channel, or link, is a physical path or
frequency for signal transmissions
 Bandwidth is the transmission capacity of a communications
channel
– Broadband
– Narrowband
Chapter 5: LANs and WLANs
9
5 Communications Protocols
 A packet is a “parcel” of
data that is sent across a
computer network
– Circuit-switching
technology vs. packet
switching technology
Chapter 5: LANs and WLANs
10
5 Communications Protocols
 Every packet that travels over a network includes the
address of its destination device
 An IP address is a series of numbers used to identify a
network device
Chapter 5: LANs and WLANs
11
5
SECTION
B
Wired Networks
 Wired Network Basics
 HomePNA and Powerline Networks
 Ethernet
 Ethernet Equipment
 Ethernet Setup
Chapter 5: LANs and WLANs
12
5 Wired Network Basics
 A wired network uses cables to connect network devices
 Wired networks are fast, secure, and simple to configure
 Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs
13
5 Ethernet
On an Ethernet, data
travels on a first-come,
first-served basis. If two
workstations attempt to
send data at the same
time, a collision occurs.
That data must be
resent.
Chapter 5: LANs and WLANs
14
5 Ethernet Equipment
 Ethernet adapter (designed to support the Ethernet
protocols)
 Network hub
 Network switch
 Network router
 RJ45 connector
Chapter 5: LANs and WLANs
15
5
SECTION
C
Wireless Networks
 Wireless Basics
 Bluetooth
 Wi-Fi
 Wi-Fi Equipment
 Wi-Fi Setup
Chapter 5: LANs and WLANs
16
5 Wireless Basics
 A wireless network transports data from one device to
another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
 Slower than wired networks
 Security concerns
Chapter 5: LANs and WLANs
17
5 Bluetooth
 Bluetooth is a short-range, wireless network technology
designed to make its own connections between electronic
devices, without wires, cables, or any direct action from a
user
Chapter 5: LANs and WLANs
18
5 Wi-Fi Equipment
 If your computer is not pre-equipped with wireless circuitry,
you can purchase and install a Wi-Fi adapter
Chapter 5: LANs and WLANs
19
5 Wi-Fi Equipment
 Wireless network setups
– Wireless ad-hoc network
– Wireless infrastructure network
• Wireless
access point
• Wireless
router
Chapter 5: LANs and WLANs
20
5 Wi-Fi Setup
 Set up the router
 Connect to the router with a computer
 Configure the router
 Access the router setup utility
 Create a new router password
Chapter 5: LANs and WLANs
21
5 Wi-Fi Setup
 Enter an SSID for the network
 Activate WEP, WPA, or PSK and create an encryption key
 Set up the wireless workstations
 Connect an Internet access device
Chapter 5: LANs and WLANs
22
5
SECTION
D
Using LANs
 LAN Advantages and Challenges
 Sharing Files
 Sharing Printers
 LAN Parties
 Troubleshooting
Chapter 5: LANs and WLANs
23
5 LAN Advantages
and Challenges
 LANs enable people to work together
 Sharing networked software can reduce costs
 Sharing data on a LAN can increase productivity
 Sharing networked hardware can reduce costs
 Sharing networked hardware can provide access to a wide
range of services and specialized peripheral devices
Chapter 5: LANs and WLANs
24
5 LAN Advantages
and Challenges
 Resources become unavailable when network malfunctions
 Networks may be vulnerable to unauthorized access
– More vulnerable than standalone computers
 Wireless networks can be tapped from a “snooping”
computer
 Networked computers are susceptible to an increasing
number of worms, Trojan horses, and blended threats
Chapter 5: LANs and WLANs
25
5 Sharing Files
 If you use Windows, it
automatically detects
available LANs any time
you turn on a workstation
 To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs
26
5 Sharing Printers
 Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs
27
5 LAN Parties
 A LAN party is a gathering
of people who connect their
own computers to a LAN,
usually to play multiplayer
computer games
– No special hardware
usually is required
– Game must have
multiplayer capability
Chapter 5: LANs and WLANs
28
5 Troubleshooting
 Network problems can stem from a variety of sources
– Cables
– Signal strength
– Security
– Interference
– Network devices
– Settings
Chapter 5: LANs and WLANs
29
5
SECTION
E
Security Through Encryption
 Wi-Fi Security
 Encryption
Chapter 5: LANs and WLANs
30
5 Wi-Fi Security
 Wireless networks are much more susceptible to
unauthorized access and use than wired networks
 LAN jacking, or war driving, is the practice of intercepting
wireless signals by cruising through an area
Chapter 5: LANs and WLANs
31
5 Wi-Fi Security
 Wireless encryption scrambles data transmitted between
wireless devices and then unscrambles the data only on
devices that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
Chapter 5: LANs and WLANs
32
5 Wi-Fi Security
Chapter 5: LANs and WLANs
33
5 Encryption
 Encryption transforms a message so that its contents are
hidden from unauthorized readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as ciphertext
 Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs
34
5 Encryption
 Weak vs. strong encryption
 AES (Advanced Encryption Standard)
 Encryption methods can be broken by the use of expensive,
specialized, code-breaking computers
– Brute-force method
Chapter 5: LANs and WLANs
35
5 Encryption
 When personal computer users want to encrypt e-mail or
other documents, they turn to public key encryption software
called PGP (Pretty Good Privacy) software
Chapter 5: LANs and WLANs
36
Chapter 5 Complete
LANs and WLANs