Professional Documents
Culture Documents
Computer Concepts For End-Users (03-60-104) : Instructor: Dr. Addy (Adwoa) Donyina
Computer Concepts For End-Users (03-60-104) : Instructor: Dr. Addy (Adwoa) Donyina
Lecture 7
Instructor: Dr. Addy (Adwoa) Donyina
email: adonyina@uwindsor.ca) Website: http://cs.uwindsor.ca/~adonyina/
Chapter 5
Local Area Networks
Chapter Contents
Section A: Network Building Blocks
Network Classification
History
One of the most significant network ideas was by Bob Metcalf in 1976
His plan for transporting data between computers is a key element in computer networking
Network Classifications
Personal Area Network (PAN) interconnection of personal digital devices or consumer electronics
Metropolitan Area Network (MAN) public high-speed network with range of about 50 miles
Wide Area Network (WAN) covers a large geographical area and typically consists of several smaller networks
LAN Advantages
LANs enable people to work together Groupware, online conference, webcast etc. Sharing networked software can reduce costs Software site licenses for networks Sharing data on a LAN can increase productivity Provides authorized users access to data stored on a network or workstation Sharing networked hardware can reduce costs Ex. Connect 1 expensive printer on LAN vs many printers for each computer
LAN Disadvantages
If the LAN malfunctions then
all the resources on the LAN are unavailable until the network is repaired Intruders can access data stored on network server or other workstation Ex. If worm gets through LAN security then every computer on the network is at risk
8
Network Devices
Node Each connection point on a network contains a computer, networked peripheral/device network interface card (NIC) The network circuitry that computers require to connect to a LAN
is any device that contains network circuitry to directly connect to a network A network device, or network appliance is any electronic device that broadcasts network data, boosts signals, or routes data to its destination Router
Network Devices
10
Network Links
A communications channel, or link
is a physical path or frequency for signal transmissions is the transmission capacity of a communications channel
Bandwidth
Broadband Narrowband
11
Communications Protocols
Rules for efficiently transmitting data from one
Divide messages into packets Affix addresses to packets Initiate transmission Regulate flow of data Check for transmission errors Acknowledge receipt of transmitted data
Communication Protocols
Signals that travel over the network Digital signal
Transmitted as bits
Analog
13
Communication Protocols
How messages are transported on the network Circuit switching
Establishes a dedicated private link (direct pipeline) Ex. Telephone systems
Packet switching
Divides the message into several packets, that can be routed independently
14
15
Communications Protocols
A packet
16
Communications Protocols
17
Communications Protocols
Every packet that travels over a network
An IP address is a series of numbers used to identify a network device IP addresses can also be obtained through
DHCP
Chapter 5: Local Area Networks 18
Chapter Contents
Section A: Network Building Blocks
Technologies Section C: Network Setup Section D: Sharing Files Section E: Wireless Security
19
Ethernet
Wireless Basics Bluetooth Wi-Fi
20
Wired Basics
A wired network
fast, secure, and simple to configure Devices tethered to cables have limited mobility
Disadvantages
21
Ethernet
Ethernet is a wired network technology that is defined by IEEE 802.3 standards Simultaneously broadcasts data packets to all
network devices
22
Ethernet
23
Ethernet
24
25
Wireless Basics
A wireless network transports data from one
26
Bluetooth
Bluetooth
is a short-range, wireless network technology designed to make its own connections between two devices
27
Wi-Fi
Wi-Fi
28
Wi-Fi
Wireless ad-hoc protocol
29
Wi-Fi
30
Wi-Fi
If your computer is not pre-equipped with
31
Chapter Contents
Section A: Network Building Blocks
32
Router Installation
Router Configuration Internet Connection Device Connection
33
Setup Overview
Plug in the router Connect the router to a computer Configure the router Access the router setup utility Create a new router password Enter an SSID for the network Activate WEP, WPA, or PSK and create an encryption key 8. Connect an Internet access device 9. Set up the wireless workstations
1. 2. 3. 4. 5. 6. 7.
Chapter 5: Local Area Networks 34
Router Installation
Look for a Wireless-N router that includes a
sufficient for the number of wired devices that you intend to connect
35
Router Installation
36
37
Router Configuration
Before using your network
adjust the routers configuration settings to make sure your network is secure
Stored in routers EEPROM (router memory) You must connect a computer to the router You can use your computers browser to access the router configuration utility
38
Router Configuration
39
Router Configuration
An SSID (service set identifier)
40
Router Configuration
Each workstation requires a unique address
41
Router Configuration
Wireless encryption
scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key
WEP WPA
PSK
42
Router Configuration
WEP (Wired Equivalent Privacy) Provide level of confidentiality similar to wired network Very easy to bypass
WPA (Wi-Fi Protected Access)/ WPA2 Stronger protection by making sure that packets gave not been intercepted or tampered with Type of WPA is PSK
key)
Is used for scrambling and unscrambling data Like a password except longer (illustrated on next slide)
44
Router Configuration
45
Internet Connection
modem
Internet Connection
47
Wireless Connection
Macs and Windows OS(if wireless capable)
automatically sense available networks and give you the option of connecting to them
The computer is in range of your router
48
49
50
51
Easiest
Chapter 5: Local Area Networks 52
Chapter Contents
Section A: Network Building Blocks
53
54
allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored Once your network gives you access to other computers on the network, you can view a list of files stored there
55
you can use your operating systems file management utility is a setting that affects whether your computer can see other computers on a network, and whether your computer can be seen by others
Network discovery
56
57
58
Assign permissions to files Limit sharing to specific people Remove sharing from files you no longer want to share Use a homegroup if your network is composed of Windows computers A homegroup is a collection of trusted Windows computers that automatically share files and folders
59
Read permission
Write only
60
61
File Servers
A file server
is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations
62
Troubleshooting
Network problems can
Chapter Contents
Section A: Network Building Blocks
64
Encryption
65
Wi-Fi Security
Weakness
Because wireless signals are broadcast through the air; and like the signals from a radio station, they can be picked up by any device equipped with a receiver tuned to the right frequency
66
Wi-Fi Security
67
Wi-Fi Security
network router maintains
a list of clients that are accessing your network using wired or wireless connections
68
Encryption
Encryption
transforms a message so that its contents are hidden from unauthorized readers
Plaintext has not yet been encrypted An encrypted message is referred to as ciphertext
Decryption
69
Encryption
Cryptographic algorithm
Is a procedure for encrypting/decrypting a message Is a word, number or phrase that must be known to encrypt or decrypt a message
70
Encryption
Weak encryption
Easy to decrypt without the algorithm/key Ex. Simple substitution Very difficult to break Ex. AES (Advanced Encryption Standard) used
Strong encryption
for WPA2 Encryption methods can be broken by the use of expensive, specialized, code-breaking computers
Chapter 5: Local Area Networks 71
Encryption
Symmetric Key Encryption
Key is used to encrypt and decrypt the message Ex. Caesars encryption method Has a key-distribution problem
eliminates key-distribution problem, by using one key to encrypt a message and another key to decrypt the message
72
73
Encryption
When personal computer users want to
encrypt e-mail or other documents, they turn to public key encryption software
74
75