Chapter 5 Complete
Download
Report
Transcript Chapter 5 Complete
Chapter 5
LANs and WLANs
5 Chapter Contents
Section A: Network Building Blocks
Section B: Wired Networks
Section C: Wireless Networks
Section D: Using LANs
Section E: Security Through Encryption
Chapter 5: LANs and WLANs
2
5
SECTION
A
Network Building Blocks
Network Classifications
LAN Standards
Network Devices
Clients, Servers, and Peers
Physical Topology
Network Links
Communications Protocols
Chapter 5: LANs and WLANs
3
5 Network Classifications
Personal Area Network (PAN) – interconnection of
personal digital devices
Neighborhood Area Network (NAN) – connectivity
spread over several buildings
Local Area Network (LAN) – usually connects
computers in a single building
Metropolitan Area Network (MAN) – public highspeed network with range of about 50 miles
Wide Area Network (WAN) – consists of several
smaller networks
Chapter 5: LANs and WLANs
4
5 LAN Standards
LAN technologies are standardized by the
Institute of Electrical and Electronics
Engineers (IEEE) Project 802 – Local
Network Standards
– IEEE 802.3
– Ethernet
Chapter 5: LANs and WLANs
5
5 Network Devices
Each connection point on a network is referred to as
a node
To connect to a LAN, a computer requires network
circuitry, sometimes referred to as a network
interface card (NIC)
A networked peripheral, or network-enabled
peripheral, is any device that contains network
circuitry to directly connect to a network
A network device, or network appliance, is any
electronic device that broadcasts network data,
boosts signals, or routes data to its destination
Chapter 5: LANs and WLANs
6
5 Network Devices
Chapter 5: LANs and WLANs
7
5 Clients, Servers, and Peers
Network devices can function as clients or as servers
– Application server
– File server
– Print server
Networks that include one or more servers can operate
in client/server mode
Chapter 5: LANs and WLANs
8
5 Physical Topology
The arrangement of devices in a network is referred to as its
physical topology
–
–
–
–
–
Star
Ring
Bus
Mesh
Tree
Two similar networks can
be connected by a device
called a bridge
Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs
9
5 Network Links
A communications channel, or link, is a
physical path or frequency for signal
transmissions
Bandwidth is the transmission capacity of a
communications channel
– Broadband
– Narrowband
Chapter 5: LANs and WLANs
10
5 Communications Protocols
Rules for efficiently transmitting data from
one network node to another
– Divide messages into packets
– Affix addresses to packets
– Initiate transmission
– Regulate flow of data
– Check for transmission errors
– Acknowledge receipt of transmitted data
Chapter 5: LANs and WLANs
11
5 Communications Protocols
A packet is a “parcel” of
data that is sent across
a computer network
– Circuit-switching
technology vs. packet
switching technology
• Voice over IP (VoIP)
Chapter 5: LANs and WLANs
12
5 Communications Protocols
Every packet that travels over a network
includes the address of its destination device
A MAC address is a unique number assigned
to a network interface card when it is
manufactured
An IP address is a series of numbers used to
identify a network device
IP addresses can also be obtained through
DHCP
Chapter 5: LANs and WLANs
13
5
SECTION
B
Wired Networks
Wired Network Basics
HomePNA and Powerline Networks
Ethernet
Ethernet Equipment
Ethernet Setup
Chapter 5: LANs and WLANs
14
5 Wired Network Basics
A wired network uses cables to connect
network devices
Wired networks are fast, secure, and simple
to configure
Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs
15
5 HomePNA and
Powerline Networks
HomePNA networks utilize existing telephone
wiring to connect network devices
– Special NICs and cables are required
Powerline networks transmit data over power
lines as low-frequency radio waves
Chapter 5: LANs and WLANs
16
5 Ethernet
Simultaneously broadcasts data packets to
all network devices
– IEEE 802.3
– CSMA/CD protocol
Vary in speed from 10Mbps to 10Gbps
Chapter 5: LANs and WLANs
17
5 Ethernet
On an Ethernet, data
travels on a first come,
first served basis. If two
workstations attempt to
send data at the same
time, a collision occurs.
That data must be
resent.
Chapter 5: LANs and WLANs
18
5 Ethernet Equipment
Checking a workstation
for an Ethernet port
Chapter 5: LANs and WLANs
19
5 Ethernet Equipment
Ethernet adapter (designed to support the
Ethernet protocols)
Network hub
Network switch
Network router
RJ45 connector
Chapter 5: LANs and WLANs
20
5 Ethernet Setup
Chapter 5: LANs and WLANs
21
5 Ethernet Setup
Chapter 5: LANs and WLANs
22
5 Ethernet Setup
The Network Connection window helps you
check your connection
Chapter 5: LANs and WLANs
23
5
SECTION
C
Wireless Networks
Wireless Basics
Bluetooth
Wi-Fi
Wi-Fi Equipment
Wi-Fi Setup
Chapter 5: LANs and WLANs
24
5 Wireless Basics
A wireless network transports data from one
device to another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
Slower than wired networks
Security concerns
Chapter 5: LANs and WLANs
25
5 Bluetooth
Bluetooth is a short-range, wireless network
technology designed to make its own
connections between electronic devices,
without wires, cables or any direct action from
a user
Chapter 5: LANs and WLANs
26
5 Wi-Fi
Wireless networking technologies that are
compatible with Ethernet
MMO technology uses two or more antennae
to send multiple sets of signals
Chapter 5: LANs and WLANs
27
5 Wi-Fi Equipment
Chapter 5: LANs and WLANs
28
5 Wi-Fi Equipment
If your computer is not pre-equipped with
wireless circuitry, you can purchase and
install a Wi-Fi card
Chapter 5: LANs and WLANs
29
5 Wi-Fi Equipment
Wireless network setups
– Wireless ad-hoc network
– Wireless infrastructure network
• Wireless
access point
• Wireless
router
Chapter 5: LANs and WLANs
30
5 Wi-Fi Setup
Set up the router
Connect to the router with a computer
Configure the router
Access the router setup utility
Create a new router password
Chapter 5: LANs and WLANs
31
5 Wi-Fi Setup
Enter an SSID for the network
Activate WEP, WPA, or WPA2 and create an
encryption key
Set up the wireless workstations
Connect an Internet access device
Chapter 5: LANs and WLANs
32
5 Wi-Fi Setup
Chapter 5: LANs and WLANs
33
5
SECTION
D
Using LANs
LAN Advantages and Challenges
Sharing Files
Sharing Printers
LAN Parties
Troubleshooting
Chapter 5: LANs and WLANs
34
5 LAN Advantages
and Challenges
LANs enable people to work together
Sharing networked software can reduce costs
Sharing data on a LAN can increase productivity
Sharing networked hardware can reduce costs
Sharing networked hardware can provide access
to a wide range of services and specialized
peripheral devices
Chapter 5: LANs and WLANs
35
5 LAN Advantages
and Challenges
Resources become unavailable when network
malfunctions
Networks may be vulnerable to unauthorized
access
– More vulnerable than standalone computers
Wireless networks can be tapped from a
“snooping” computer
Networked computers are susceptible to an
increasing number of worms, Trojan horses, and
blended threats
Chapter 5: LANs and WLANs
36
5 Wi-Fi Setup
Change the
default password
for your router
when you install a
wireless network.
Chapter 5: LANs and WLANs
37
5 Sharing Files
If you use Windows, it
automatically detects
available LANs any
time you turn on a
workstation
To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs
38
5 Sharing Files
In this drive mapping
example, a server’s drive
C is mapped as drive F
by a workstation. After the
mapping is complete, the
server’s hard disk appears
in the workstation’s
directory as drive F and
can be used just as though
it were a drive connected
directly to the workstation.
Chapter 5: LANs and WLANs
39
5 Sharing Files
To allow other network
users to access files or
folders on your Windows
computer, you have to
designate them as
shared.
Chapter 5: LANs and WLANs
40
5 Sharing Printers
Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs
41
5 Sharing Printers
In Windows, use the Printers and Faxes
dialog box to allow other users to share the
printer attached to your workstation
Chapter 5: LANs and WLANs
42
5 LAN Parties
A LAN party is a
gathering of people
who connect their own
computers to a LAN,
usually to play
multiplayer computer
games
– No special hardware
usually is required
– Game must have
multiplayer capability
Chapter 5: LANs and WLANs
43
5 Troubleshooting
Network problems can stem from a variety of
sources
– Cables
– Signal strength
– Interference
– Network devices
– Security
– Settings
Chapter 5: LANs and WLANs
44
5
SECTION
E
Security Through Encryption
Wi-Fi Security
Encryption
Chapter 5: LANs and WLANs
45
5 Wi-Fi Security
Wireless networks are much more
susceptible to unauthorized access and use
than wired networks
LAN jacking, or war driving, is the practice of
intercepting wireless signals by cruising
through an area
Chapter 5: LANs and WLANs
46
5 Wi-Fi Security
An offshoot of war driving is a gambit called
war chalking
Chapter 5: LANs and WLANs
47
5 Wi-Fi Security
Wireless encryption scrambles data
transmitted between wireless devices and
then unscrambles the data only on devices
that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
Activate encryption by using a wireless
network key
Chapter 5: LANs and WLANs
48
5 Wi-Fi Security
Chapter 5: LANs and WLANs
49
5 Encryption
Encryption transforms a message so that its
contents are hidden from unauthorized
readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as
ciphertext
Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs
50
5 Encryption
Weak vs. strong encryption
AES (Advanced Encryption Standard)
Encryption methods can be broken by the
use of expensive, specialized, code-breaking
computers
– Brute-force method
Chapter 5: LANs and WLANs
51
5 Encryption
Public key encryption (PKE) eliminates keydistribution problem, by using one key to
encrypt a message and another key to
decrypt the message
Chapter 5: LANs and WLANs
52
5 Encryption
When personal computer users want to
encrypt e-mail or other documents, they turn
to public key encryption software called PGP
(Pretty Good Privacy) software
Chapter 5: LANs and WLANs
53
Chapter 5 Complete
LANs and WLANs