Professional Documents
Culture Documents
1SCS105 Wired-Wireless - DOC ONE
1SCS105 Wired-Wireless - DOC ONE
REVIEW
SCS3105
INTER. DATA COMMUNICATION • Local Area Networks (LANs)sometimes- referred to as
Local area data networks
AND NETWORKING • Are used to interconnect distributed communities of
BITC/3 computer based data terminal equipment(DTE)
located in a localized group of building such as a
COMPILED BY University, Hospital, factory .
Matovu Henry(Lecturer)
• LANs normally installed and maintained by the
organizations are referred to as Private Data Networks
1 2
Types of LAN
a)Base band
• Base band transmission is a type of data transmission
in which digital or analog data is sent over a single un
multiplexed channel, such as an Ethernet LAN.
• The signal flows in form of discrete pulses.
• The entire channel capacity is used to transmit a
single data signal
5 6
• For broadband transmissions to be sent and received, 1) Mid-split broad band. This divides the width into
the media has to be split into two channels. two channels. One transmits and one receives
• Multiple channels are created using Frequency
Division-Multiplexing (FDM)
• Digital systems such as computers require MODEM to
translate the digital signal into analog signal.
9 10
Summary of comparison
MEDIUM ACCESS CONTROL METHODS in a WIRED LAN • Simultaneous access to the cable is either prevented
by using a token-passing method or controlled with a
• Local area networks (LANs) are typically shared by a carrier sensing and collision detection method.
number of attached systems, but
• The primary access methods listed below,1 & 2 are
• Only one system at a time may use the network cable used by Ethernet. The 3rd is used by Token ring
to transmit data. networks.
• An access method defines how a system gains access 1. CSMA/CD (Carrier Sense Multiple Access/Collision Detection)
to a shared network in a cooperative way so its 2. CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance)
transmissions do not interfere with the transmissions 3. CONTROL TOKEN
of other systems.
13 14
• With the help of different amplifiers, the users can • Wi-Fi uses radio networks to transmit data between
easily change their location without disruption in their its users.
network access. • Networks are made up of cells that provide coverage
• Wi-Fi devices are compliant with each other to grant across the network.
efficient access of information to the user. • The more the number of cells, the greater and
• Wi-Fi location where the users can connect to the stronger is the coverage on the radio network
wireless network is called a Wi-Fi hotspot
23 24
4/18/2021
• There are two most common modes by which we connect • Infrastructure mode is one of the two methods for
to Wi-Fi for connectivity for accessing internet or other connecting to wireless networks with Wi-Fi enabled
computer for file sharing etc.
devices such as laptops, etc.
• The most common modes for Wi-Fi connectivity are as • These devices are connected to wireless network with
follow: the help of Access point (AP) or Base station.
• Wireless Access Points are usually routers or switches
a) Infrastructure mode which are connected to internet by Ethernet port.
b) Ad hoc Mode
25 26
Ad hoc Mode
• SSIDs have a maximum length of 32 characters. • Ad hoc is another mode of connectivity available for
• It should be known to clients for their computers to Wi-Fi connectivity.
connect WLAN. • Devices are capable for communicating directly with
• The Access point is then connected to wire network each other.
(Internet) to provide wireless internet connectivity to
clients. • No Access point (routers / switches) is required for
communication between devices and,
• Multiple access points can be added in the WLAN, this
increases the reach of infrastructure for supporting • All devices in the range connect in peer to peer
many number of wireless clients communication mode.
29 30
39 40
4/18/2021
AES
• WEP is used at the two lowest layers of the OSI model • Short for Advanced Encryption Standard
- the data link and physical layers; • A symmetric 128-bit block data encryption technique
• So-it therefore does not offer end-to-end security developed by Belgian cryptographers.
• The U.S government adopted the algorithm as its
encryption technique replacing the DES encryption it
used.
• AES works at multiple network layers simultaneously.
41 42
• DES WPS
• Short for Data Encryption Standard, a popular • Short for WI-FI Protected Setup a network security
symmetric-key encryption method developed standard to create secure wireless home network
longtime ago and standardized by ANSI. • Wi-Fi Protected Setup is a feature that lets you easily
connect WPS-supported client devices, such as
• DES uses a 56-bit key and uses the block cipher wireless printers, to your router wirelessly
method, which breaks text into 64-bit blocks and then
• WPS lets you join a secure WiFi network without
encrypts them. selecting the network name and entering the
password
43 44
4/18/2021