Chapter 5 Complete

Download Report

Transcript Chapter 5 Complete

Chapter 5
LANs and WLANs
5 Chapter Contents
Section A: Network Building Blocks
Section B: Wired Networks
Section C: Wireless Networks
Section D: Using LANs
Section E: Security Through Encryption
Chapter 5: LANs and WLANs
2
5
SECTION
A
Network Building Blocks
Network Classifications
LAN Standards
Network Devices
Clients, Servers, and Peers
Physical Topology
Network Links
Communications Protocols
Chapter 5: LANs and WLANs
3
5 Network Classifications
Personal Area Network (PAN) – interconnection of
personal digital devices
Neighborhood Area Network (NAN) – connectivity
spread over several buildings
Local Area Network (LAN) – usually connects
computers in a single building
Metropolitan Area Network (MAN) – public highspeed network with range of about 50 miles
Wide Area Network (WAN) – consists of several
smaller networks
Chapter 5: LANs and WLANs
4
5 LAN Standards
LAN technologies are standardized by the
Institute of Electrical and Electronics
Engineers (IEEE) Project 802 – Local
Network Standards
– IEEE 802.3
– Ethernet
Chapter 5: LANs and WLANs
5
5 Network Devices
Each connection point on a network is referred to as
a node
To connect to a LAN, a computer requires network
circuitry, sometimes referred to as a network
interface card (NIC)
A networked peripheral, or network-enabled
peripheral, is any device that contains network
circuitry to directly connect to a network
A network device, or network appliance, is any
electronic device that broadcasts network data,
boosts signals, or routes data to its destination
Chapter 5: LANs and WLANs
6
5 Network Devices
Chapter 5: LANs and WLANs
7
5 Clients, Servers, and Peers
 Network devices can function as clients or as servers
– Application server
– File server
– Print server
 Networks that include one or more servers can operate
in client/server mode
Chapter 5: LANs and WLANs
8
5 Physical Topology
 The arrangement of devices in a network is referred to as its
physical topology
–
–
–
–
–
Star
Ring
Bus
Mesh
Tree
 Two similar networks can
be connected by a device
called a bridge
 Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs
9
5 Network Links
A communications channel, or link, is a
physical path or frequency for signal
transmissions
Bandwidth is the transmission capacity of a
communications channel
– Broadband
– Narrowband
Chapter 5: LANs and WLANs
10
5 Communications Protocols
Rules for efficiently transmitting data from
one network node to another
– Divide messages into packets
– Affix addresses to packets
– Initiate transmission
– Regulate flow of data
– Check for transmission errors
– Acknowledge receipt of transmitted data
Chapter 5: LANs and WLANs
11
5 Communications Protocols
A packet is a “parcel” of
data that is sent across
a computer network
– Circuit-switching
technology vs. packet
switching technology
• Voice over IP (VoIP)
Chapter 5: LANs and WLANs
12
5 Communications Protocols
Every packet that travels over a network
includes the address of its destination device
A MAC address is a unique number assigned
to a network interface card when it is
manufactured
An IP address is a series of numbers used to
identify a network device
IP addresses can also be obtained through
DHCP
Chapter 5: LANs and WLANs
13
5
SECTION
B
Wired Networks
Wired Network Basics
HomePNA and Powerline Networks
Ethernet
Ethernet Equipment
Ethernet Setup
Chapter 5: LANs and WLANs
14
5 Wired Network Basics
A wired network uses cables to connect
network devices
Wired networks are fast, secure, and simple
to configure
Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs
15
5 HomePNA and
Powerline Networks
HomePNA networks utilize existing telephone
wiring to connect network devices
– Special NICs and cables are required
Powerline networks transmit data over power
lines as low-frequency radio waves
Chapter 5: LANs and WLANs
16
5 Ethernet
Simultaneously broadcasts data packets to
all network devices
– IEEE 802.3
– CSMA/CD protocol
Vary in speed from 10Mbps to 10Gbps
Chapter 5: LANs and WLANs
17
5 Ethernet
On an Ethernet, data
travels on a first come,
first served basis. If two
workstations attempt to
send data at the same
time, a collision occurs.
That data must be
resent.
Chapter 5: LANs and WLANs
18
5 Ethernet Equipment
Checking a workstation
for an Ethernet port
Chapter 5: LANs and WLANs
19
5 Ethernet Equipment
Ethernet adapter (designed to support the
Ethernet protocols)
Network hub
Network switch
Network router
RJ45 connector
Chapter 5: LANs and WLANs
20
5 Ethernet Setup
Chapter 5: LANs and WLANs
21
5 Ethernet Setup
Chapter 5: LANs and WLANs
22
5 Ethernet Setup
The Network Connection window helps you
check your connection
Chapter 5: LANs and WLANs
23
5
SECTION
C
Wireless Networks
Wireless Basics
Bluetooth
Wi-Fi
Wi-Fi Equipment
Wi-Fi Setup
Chapter 5: LANs and WLANs
24
5 Wireless Basics
A wireless network transports data from one
device to another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
Slower than wired networks
Security concerns
Chapter 5: LANs and WLANs
25
5 Bluetooth
Bluetooth is a short-range, wireless network
technology designed to make its own
connections between electronic devices,
without wires, cables or any direct action from
a user
Chapter 5: LANs and WLANs
26
5 Wi-Fi
Wireless networking technologies that are
compatible with Ethernet
MMO technology uses two or more antennae
to send multiple sets of signals
Chapter 5: LANs and WLANs
27
5 Wi-Fi Equipment
Chapter 5: LANs and WLANs
28
5 Wi-Fi Equipment
If your computer is not pre-equipped with
wireless circuitry, you can purchase and
install a Wi-Fi card
Chapter 5: LANs and WLANs
29
5 Wi-Fi Equipment
Wireless network setups
– Wireless ad-hoc network
– Wireless infrastructure network
• Wireless
access point
• Wireless
router
Chapter 5: LANs and WLANs
30
5 Wi-Fi Setup
Set up the router
Connect to the router with a computer
Configure the router
Access the router setup utility
Create a new router password
Chapter 5: LANs and WLANs
31
5 Wi-Fi Setup
Enter an SSID for the network
Activate WEP, WPA, or WPA2 and create an
encryption key
Set up the wireless workstations
Connect an Internet access device
Chapter 5: LANs and WLANs
32
5 Wi-Fi Setup
Chapter 5: LANs and WLANs
33
5
SECTION
D
Using LANs
LAN Advantages and Challenges
Sharing Files
Sharing Printers
LAN Parties
Troubleshooting
Chapter 5: LANs and WLANs
34
5 LAN Advantages
and Challenges
LANs enable people to work together
Sharing networked software can reduce costs
Sharing data on a LAN can increase productivity
Sharing networked hardware can reduce costs
Sharing networked hardware can provide access
to a wide range of services and specialized
peripheral devices
Chapter 5: LANs and WLANs
35
5 LAN Advantages
and Challenges
Resources become unavailable when network
malfunctions
Networks may be vulnerable to unauthorized
access
– More vulnerable than standalone computers
Wireless networks can be tapped from a
“snooping” computer
Networked computers are susceptible to an
increasing number of worms, Trojan horses, and
blended threats
Chapter 5: LANs and WLANs
36
5 Wi-Fi Setup
Change the
default password
for your router
when you install a
wireless network.
Chapter 5: LANs and WLANs
37
5 Sharing Files
If you use Windows, it
automatically detects
available LANs any
time you turn on a
workstation
To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs
38
5 Sharing Files
In this drive mapping
example, a server’s drive
C is mapped as drive F
by a workstation. After the
mapping is complete, the
server’s hard disk appears
in the workstation’s
directory as drive F and
can be used just as though
it were a drive connected
directly to the workstation.
Chapter 5: LANs and WLANs
39
5 Sharing Files
To allow other network
users to access files or
folders on your Windows
computer, you have to
designate them as
shared.
Chapter 5: LANs and WLANs
40
5 Sharing Printers
Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs
41
5 Sharing Printers
In Windows, use the Printers and Faxes
dialog box to allow other users to share the
printer attached to your workstation
Chapter 5: LANs and WLANs
42
5 LAN Parties
A LAN party is a
gathering of people
who connect their own
computers to a LAN,
usually to play
multiplayer computer
games
– No special hardware
usually is required
– Game must have
multiplayer capability
Chapter 5: LANs and WLANs
43
5 Troubleshooting
Network problems can stem from a variety of
sources
– Cables
– Signal strength
– Interference
– Network devices
– Security
– Settings
Chapter 5: LANs and WLANs
44
5
SECTION
E
Security Through Encryption
Wi-Fi Security
Encryption
Chapter 5: LANs and WLANs
45
5 Wi-Fi Security
Wireless networks are much more
susceptible to unauthorized access and use
than wired networks
LAN jacking, or war driving, is the practice of
intercepting wireless signals by cruising
through an area
Chapter 5: LANs and WLANs
46
5 Wi-Fi Security
An offshoot of war driving is a gambit called
war chalking
Chapter 5: LANs and WLANs
47
5 Wi-Fi Security
Wireless encryption scrambles data
transmitted between wireless devices and
then unscrambles the data only on devices
that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
Activate encryption by using a wireless
network key
Chapter 5: LANs and WLANs
48
5 Wi-Fi Security
Chapter 5: LANs and WLANs
49
5 Encryption
Encryption transforms a message so that its
contents are hidden from unauthorized
readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as
ciphertext
Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs
50
5 Encryption
Weak vs. strong encryption
AES (Advanced Encryption Standard)
Encryption methods can be broken by the
use of expensive, specialized, code-breaking
computers
– Brute-force method
Chapter 5: LANs and WLANs
51
5 Encryption
Public key encryption (PKE) eliminates keydistribution problem, by using one key to
encrypt a message and another key to
decrypt the message
Chapter 5: LANs and WLANs
52
5 Encryption
When personal computer users want to
encrypt e-mail or other documents, they turn
to public key encryption software called PGP
(Pretty Good Privacy) software
Chapter 5: LANs and WLANs
53
Chapter 5 Complete
LANs and WLANs