Transcript Chapter 5
Chapter 5
LANs and WLANs
5 Chapter Contents
Section A: Network Building Blocks
Section B: Wired Networks
Section C: Wireless Networks
Section D: Using LANs
Section E: Security Through Encryption
Chapter 5: LANs and WLANs
2
5
SECTION
A
Network Building Blocks
Network Classifications
LAN Standards
Network Devices
Clients, Servers, and Peers
Physical Topology
Network Links
Communications Protocols
Chapter 5: LANs and WLANs
3
5 Network Classifications
Personal Area Network (PAN) – interconnection of
personal digital devices
Neighborhood Area Network (NAN) – connectivity
spread over several buildings
Local Area Network (LAN) – usually connects
computers in a single building
Metropolitan Area Network (MAN) – public highspeed network with range of about 50 miles
Wide Area Network (WAN) – consists of several
smaller networks
Chapter 5: LANs and WLANs
4
5 LAN Standards
LAN technologies are standardized by the
Institute of Electrical and Electronics
Engineers (IEEE) Project 802 – Local
Network Standards
– IEEE 802.3 specifies the standards for Ethernet
wired local area networks
• How devices physically signal each other, how devices
“share the wire in the wall”, etc.
– Ethernet is the de facto standard for wired LAN in
use today
Chapter 5: LANs and WLANs
5
5 Ethernet Frame Structure
Type
IEEE 802.3 Ethernet frame
64 – 1518 bytes in length
Preamble: 8 bytes
7 bytes with pattern 10101010, followed by one byte with pattern
10101011 (frame delimiter)
used to synchronize receiver, sender clock rates
Addresses: 6 bytes, frame is received by all adapters on a LAN and
dropped if address does not match
Type (Length): 2 bytes, length of data segment (min. 46 bytes)
CRC (Cyclic Redundancy Check): 4 bytes, created by sender,
checked by receiver, if error detected, the frame is simply dropped
Chapter 5: LANs and WLANs
6
5 Network Devices
Each connection point on a network is referred to
as a node
To connect to a LAN, a computer requires network
circuitry, sometimes referred to as a network
interface card (NIC)
A networked peripheral, or network-enabled
peripheral, is any device that contains network
circuitry to directly connect to a network
A network device, or network appliance, is any
electronic device that broadcasts/re-broadcasts
network data, boosts signals, or routes data to its
destination
Chapter 5: LANs and WLANs
7
5 Network Devices
Chapter 5: LANs and WLANs
8
5 Clients, Servers, and Peers
Network devices can function as clients or as servers
– Application server
– File server
– Print server
Networks that include one or more servers can operate
in client/server mode
Chapter 5: LANs and WLANs
9
5 Physical Topology
The arrangement of devices in a network is referred to as its
physical topology
–
–
–
–
–
Star: central connection point
Ring: attached to 2 neighbors
Bus: common, shared backbone
Mesh: multiple interconnections
Tree: stars on a bus
Two similar networks can
be connected by a device
called a bridge (or switch)
Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs
10
5 Network Links
A communications channel, or link, is a
physical path or frequency for signal
transmissions
Bandwidth is the transmission capacity of a
communications channel (usually expressed
in bits/sec, bps)
– Broadband
– Narrowband
Chapter 5: LANs and WLANs
11
5 Communications Protocols
Rules (Standards) for efficiently and
effectively transmitting data from one network
node to another. They define how to:
– Divide messages into packets
– Affix addresses (of the nodes) to packets
– Initiate transmission (arbitrate access)
– Regulate flow of data
– Check for transmission errors
– Acknowledge receipt of transmitted data (in some
protocols)
Chapter 5: LANs and WLANs
12
5 Communications Protocols
A packet is a “parcel” of
data that is sent across
a computer network
– Circuit-switching
technology vs.
– Packet switching
technology
• The Internet
• Voice over IP (VoIP)
– Advantages of one vs.
the other?
Chapter 5: LANs and WLANs
13
5 Communications Protocols
Every packet that travels over a packet-switched
network includes the address of its destination
device
Most physical devices have more than one address
A MAC address is a unique number assigned to a
network interface card when it is manufactured
An IP address is a series of numbers used to
identify a network device in an internet
IP addresses can be assigned by registration, or
obtained dynamically through DHCP
Chapter 5: LANs and WLANs
14
5
SECTION
B
Wired Networks
Wired Network Basics
HomePNA and Powerline Networks
Ethernet
Ethernet Equipment
Ethernet Setup
Chapter 5: LANs and WLANs
15
5 Wired Network Basics
A wired network uses cables to connect
network devices
Wired networks are fast, secure, and simple
to configure and well-proven
Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs
16
5 HomePNA and
Powerline Networks
HomePNA (HPNA) networks utilize existing
telephone wiring to connect network devices
– Special NICs and cables are required
Powerline networks transmit data over power
lines as low-frequency radio waves
Chapter 5: LANs and WLANs
17
5 Ethernet
Simultaneously broadcasts data packets to
all network devices (a star topology)
– IEEE 802.3 defines the Ethernet protocol
– CSMA/CD protocol used to share the channel
Vary in speed from 10Mbps to 10Gbps
Chapter 5: LANs and WLANs
18
5 Ethernet
On an Ethernet, data
travels on a first come,
first served basis. If two
workstations attempt to
send data at the same
time, a collision occurs.
That data must be
resent.
Chapter 5: LANs and WLANs
19
5 Ethernet Equipment
Checking a workstation
for an Ethernet port
Chapter 5: LANs and WLANs
20
5 Ethernet Equipment
Ethernet adapter - NIC (designed to support
the Ethernet protocols)
Network hub
Network switch
Network router
RJ45 connector
Chapter 5: LANs and WLANs
21
5 Typical Ethernet Setup
Technically, this
device functions as
an Ethernet switch,
as well as an IP
router.
Chapter 5: LANs and WLANs
22
5
SECTION
C
Wireless Networks
Wireless Basics
Bluetooth
Wi-Fi
Wi-Fi Equipment
Wi-Fi Setup
Chapter 5: LANs and WLANs
25
5 Wireless Basics
A wireless network transports data from one
device to another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
Slower than wired networks
Security concerns
Chapter 5: LANs and WLANs
26
5 Bluetooth
Bluetooth is a short-range, wireless network
technology designed to make its own
connections between electronic devices,
without wires, cables or any direct action from
a user (a piconet)
Chapter 5: LANs and WLANs
27
5 Wi-Fi
Wireless networking technologies that are
compatible with Ethernet (per IEEE 802.11)
MIMO technology uses two or more
antennae to send multiple sets of signals
Chapter 5: LANs and WLANs
28
5 Wi-Fi Equipment
Chapter 5: LANs and WLANs
29
5 Wi-Fi Equipment
If your computer is not pre-equipped with
wireless circuitry, you can purchase and
install a Wi-Fi card
Chapter 5: LANs and WLANs
30
5 Wi-Fi Equipment
Wireless network setups
– Wireless ad-hoc network
– Wireless infrastructure network
• Wireless
access point
• Wireless
router
Chapter 5: LANs and WLANs
31
5 Wi-Fi Setup
Set up the router
Connect to the router with a computer
Configure the router
Access the router setup utility
Create a new router password
Chapter 5: LANs and WLANs
32
5 Wi-Fi Setup
Enter an SSID for the network
Activate WEP, WPA, or WPA2 and create an
encryption key(!!)
Set up the wireless workstations
Connect an Internet access device
– Generally a modem that will connect to the
service available in your area (cable, DSL, etc.)
from your service provider (ISP)
Chapter 5: LANs and WLANs
33
5 Typical Wi-Fi Setup
Chapter 5: LANs and WLANs
34
5
SECTION
D
Using LANs
LAN Advantages and Challenges
Sharing Files
Sharing Printers
LAN Parties
Troubleshooting
Chapter 5: LANs and WLANs
36
5 LAN Advantages
LANs enable people to work together
Sharing networked software can reduce costs
Sharing data on a LAN can increase productivity
Sharing networked hardware can reduce costs
Sharing networked hardware can provide access
to a wide range of services and specialized
peripheral devices (read “expensive”)
Chapter 5: LANs and WLANs
37
5 LAN Challenges
Resources become unavailable when network
malfunctions
Networks may be vulnerable to unauthorized
access
– More vulnerable than standalone computers
Wireless networks can be tapped from a
“snooping” computer
Networked computers are susceptible to an
increasing number of worms, Trojan horses, and
blended threats
Chapter 5: LANs and WLANs
38
5 Sharing Files
If you use Windows, it
automatically detects
available LANs any
time you turn on a
workstation
To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs
39
5 Sharing Files
In this drive mapping
example, a server’s drive
C is mapped as drive F
by a workstation. After the
mapping is complete, the
server’s hard disk appears
in the workstation’s
directory as drive F and
can be used just as though
it were a drive connected
directly to the workstation.
Chapter 5: LANs and WLANs
40
5 Sharing Files
To allow other network
users to access files or
folders on your Windows
computer, you have to
designate them as
shared (commonly, via
Windows Explorer)
Chapter 5: LANs and WLANs
41
5 Sharing Printers
Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs
42
5 Sharing Printers
In Windows, use the Printers and Faxes
dialog box to allow other users to share the
printer attached to your workstation
Chapter 5: LANs and WLANs
43
5
SECTION
E
Security Through Encryption
Wi-Fi Security
Encryption
Chapter 5: LANs and WLANs
46
5 Wi-Fi Security
Wireless networks are much more
susceptible to unauthorized access and use
by casual users than wired networks
LAN jacking, or war driving, is the practice of
intercepting wireless signals by cruising
through an area
Chapter 5: LANs and WLANs
47
5 Wi-Fi Security
Wireless encryption scrambles data
transmitted between wireless devices and
then unscrambles the data only on devices
that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
Activate encryption by using a wireless
network key
Chapter 5: LANs and WLANs
49
5 Encryption
Encryption transforms a message so that its
contents are hidden (encrypted) from
unauthorized readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as
ciphertext
Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs
51
5 Encryption
Weak vs. strong encryption
AES (Advanced Encryption Standard)
Encryption methods can be broken by the
use of expensive, specialized, code-breaking
computers
– Brute-force method
Chapter 5: LANs and WLANs
52
5 Encryption
Public key encryption (PKE) eliminates keydistribution problem, by using one key to
encrypt a message and another key to
decrypt the message
Chapter 5: LANs and WLANs
53
Chapter 5 Complete
LANs and WLANs