SlideShare a Scribd company logo
1 of 4
Chapter 5: Local Area Networks
5.1 Learning Objective Checkpoints
1. What are PANs, LANs, MANs, and WANs?
PANs are the connections of devices within a range of about 30 feet without the use of wires or cables. LANs are
networks that connect personalcomputers within a very limited geographical area. MANs are public high-speed
networks that are capable of transmitting data within a range of 50 miles. WANs usually cover larger geographical
areas and contain several smaller networks.
2. What are the advantages and disadvantages of LANs?
Advantages include: enabling people to work together, reduces costs,increases productivity,can be convenient,and
provides access to a wide arrange of services and peripheral devices. Disadvantages include: malfunctions limit data
access,are vulnerable to unauthorized access and malicious code.
3. Which devices are included in a typical LAN?
A network interface card, any networked peripheral (printers, scanners,etc), a network attached storage,a network
device, and a router.
5. Why do most networks transmit digital rather than analog signals?
Basically, digital signals are easier to monitor and detect if there is any corrupted signals.
6. How does data find its way over a network to a specified destination?
The packet of data travels has an address of its destination device and it specifies the format for address within the
network. Once it reaches a network node, a routing device examines the address and sends the packet to the
destination.
7. What are the characteristics of Ethernet that make it a popular network technology?
It is easy to understand,implement, manage, and maintain. It is available from a large array of vendors making
prices low. They must meet certain standards.It is compatible with a lot of Wi-Fi technology.
8. How are data signals sent wirelessly?
Electromagnetic signals that connect two devices togetherwithout the use of wires. It sends the data back and forth.
9. What are the major differences between Bluetooth and Wi-Fi?
Wi-Fi connects to a LAN while Bluetooth does not.
11. What sort of security is available for wireless routers?
Change the default password and encryption.
14. What are the threats to LAN security?
All devices with Wi-Fi capability can connect to it. File sharing. Lots of network trouble shooting occurs.Viruses,
theft and equipment failures.
15. How does encryption work?
It basically scrambles the data transmitted between wireless devices and then unscrambles the data only on devices
that have a valid encryption key. It can also secure all credit card numbers and personalinformation that is
transferred from shoppers’computers to e-commerce sites. It can make files unusable if the devices containing the
data is lost or compromised. Maintains privacy. Basically encryption is converting plain text to ciphertext.
1.2 Beyond –the-Book Exercise
In this BTB exercise, you will be using a Windows PC/laptop of your choice to find out information on that
device. Using the command prompt (cmd) run an ipconfig /all command and answer the following
questions (NOTE: make sure you are using a PC connected to the internet or you won’t see this stuff!!)
1) What is the IP address (IPv4) of the Local Area Network connection (Ethernet adapter)?
192.168.1.142
2) What is the MAC address (physical address) of the Local Area Network adapter?
28-92-4A-4B-A4-49
3) When was the lease obtained for the IP address?
Thursday,March 19, 2015 3:12:47 P.M.
4) When does the lease expire?
Friday, March 20, 2015 6:00:21 P.M.
5) Are there any DHCP servers reported? If yes, what it the IP of the DHCP server?
Yes
192.168.1.1
6) What are the IP addresses of the DNS servers (if you see any)?
208.180.42.68
208.180.42.100
LAN Chapter 5 Key Points
LAN Chapter 5 Key Points

More Related Content

What's hot

Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhMary-Jo Apigo
 
Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Vineet Sansare
 
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 ppJunique Wepener
 
Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3jandrewsxu
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionVeacon
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolMuhammadRobeel3
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportROHIT SAGAR
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Pptemily1202
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...Maarten Weyn
 
Seminar technical
Seminar technicalSeminar technical
Seminar technicalt4cashish
 
Mobile networking through mobile IP
Mobile networking through mobile IPMobile networking through mobile IP
Mobile networking through mobile IPShihab Alvi
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-securityAnand Dhana
 

What's hot (20)

Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)Wireless fidelity (a.k.a Wi-Fi)
Wireless fidelity (a.k.a Wi-Fi)
 
Securing the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in LibrariesSecuring the Use of Wireless Fidelity (WiFi) in Libraries
Securing the Use of Wireless Fidelity (WiFi) in Libraries
 
Network technologies ict gr10 pp
Network technologies ict gr10 ppNetwork technologies ict gr10 pp
Network technologies ict gr10 pp
 
Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3Bluetooth wi fi wi max 2, 3
Bluetooth wi fi wi max 2, 3
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
What is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical VersionWhat is Bluetooth Smart? - Technical Version
What is Bluetooth Smart? - Technical Version
 
3 IoT Connection Challenges
3 IoT Connection Challenges3 IoT Connection Challenges
3 IoT Connection Challenges
 
Ch # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocolCh # 08 communication devices, network typologies , network protocol
Ch # 08 communication devices, network typologies , network protocol
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Hotspot!
Hotspot!Hotspot!
Hotspot!
 
計概報告家妃.Ppt
計概報告家妃.Ppt計概報告家妃.Ppt
計概報告家妃.Ppt
 
Communications from A to Z
Communications from A to ZCommunications from A to Z
Communications from A to Z
 
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
DASH7 Alliance Protocol 1.0: Low-Power, Mid-Range Sensor and Actuator Communi...
 
Seminar technical
Seminar technicalSeminar technical
Seminar technical
 
Mobile networking through mobile IP
Mobile networking through mobile IPMobile networking through mobile IP
Mobile networking through mobile IP
 
Wi fi
Wi fiWi fi
Wi fi
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
wireless networks
wireless networkswireless networks
wireless networks
 

Similar to LAN Chapter 5 Key Points

Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesYogesh Kumar
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSri Latha
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .pptPawanKayande1
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...ssuser036308
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 

Similar to LAN Chapter 5 Key Points (20)

Wireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+VulnerabilitiesWireless+LAN+Technology+and+Security+Vulnerabilities
Wireless+LAN+Technology+and+Security+Vulnerabilities
 
Network
NetworkNetwork
Network
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking
NetworkingNetworking
Networking
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 
Network how to configure switch router .ppt
Network how to configure switch router .pptNetwork how to configure switch router .ppt
Network how to configure switch router .ppt
 
Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...Computer Network and its applications, different kinds of technologies and di...
Computer Network and its applications, different kinds of technologies and di...
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 

More from Harold Sowards (20)

Dive heart project
Dive heart projectDive heart project
Dive heart project
 
Pseudo family violence
Pseudo family violencePseudo family violence
Pseudo family violence
 
Pseudofamilyviolence sowards
Pseudofamilyviolence sowardsPseudofamilyviolence sowards
Pseudofamilyviolence sowards
 
Sowards 440exam
Sowards 440examSowards 440exam
Sowards 440exam
 
Rape review
Rape reviewRape review
Rape review
 
Movie review
Movie reviewMovie review
Movie review
 
Line of duty review
Line of duty reviewLine of duty review
Line of duty review
 
Us v. maze
Us v. mazeUs v. maze
Us v. maze
 
Us v. garcia
Us v. garciaUs v. garcia
Us v. garcia
 
Us v. ancheta
Us v. anchetaUs v. ancheta
Us v. ancheta
 
State v. zeta chi fraternity
State v. zeta chi fraternityState v. zeta chi fraternity
State v. zeta chi fraternity
 
State v. ulvinen
State v. ulvinenState v. ulvinen
State v. ulvinen
 
State v. tomaino
State v. tomainoState v. tomaino
State v. tomaino
 
State v. stark
State v. starkState v. stark
State v. stark
 
State v. snowden
State v. snowdenState v. snowden
State v. snowden
 
State v. sexton
State v. sextonState v. sexton
State v. sexton
 
State v. schleifer
State v. schleiferState v. schleifer
State v. schleifer
 
State v. ninham
State v. ninhamState v. ninham
State v. ninham
 
State v. metzger
State v. metzgerState v. metzger
State v. metzger
 
State v. mays
State v. maysState v. mays
State v. mays
 

Recently uploaded

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

LAN Chapter 5 Key Points

  • 1. Chapter 5: Local Area Networks 5.1 Learning Objective Checkpoints 1. What are PANs, LANs, MANs, and WANs? PANs are the connections of devices within a range of about 30 feet without the use of wires or cables. LANs are networks that connect personalcomputers within a very limited geographical area. MANs are public high-speed networks that are capable of transmitting data within a range of 50 miles. WANs usually cover larger geographical areas and contain several smaller networks. 2. What are the advantages and disadvantages of LANs? Advantages include: enabling people to work together, reduces costs,increases productivity,can be convenient,and provides access to a wide arrange of services and peripheral devices. Disadvantages include: malfunctions limit data access,are vulnerable to unauthorized access and malicious code. 3. Which devices are included in a typical LAN? A network interface card, any networked peripheral (printers, scanners,etc), a network attached storage,a network device, and a router. 5. Why do most networks transmit digital rather than analog signals? Basically, digital signals are easier to monitor and detect if there is any corrupted signals. 6. How does data find its way over a network to a specified destination? The packet of data travels has an address of its destination device and it specifies the format for address within the network. Once it reaches a network node, a routing device examines the address and sends the packet to the destination. 7. What are the characteristics of Ethernet that make it a popular network technology? It is easy to understand,implement, manage, and maintain. It is available from a large array of vendors making prices low. They must meet certain standards.It is compatible with a lot of Wi-Fi technology. 8. How are data signals sent wirelessly? Electromagnetic signals that connect two devices togetherwithout the use of wires. It sends the data back and forth. 9. What are the major differences between Bluetooth and Wi-Fi? Wi-Fi connects to a LAN while Bluetooth does not. 11. What sort of security is available for wireless routers?
  • 2. Change the default password and encryption. 14. What are the threats to LAN security? All devices with Wi-Fi capability can connect to it. File sharing. Lots of network trouble shooting occurs.Viruses, theft and equipment failures. 15. How does encryption work? It basically scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key. It can also secure all credit card numbers and personalinformation that is transferred from shoppers’computers to e-commerce sites. It can make files unusable if the devices containing the data is lost or compromised. Maintains privacy. Basically encryption is converting plain text to ciphertext. 1.2 Beyond –the-Book Exercise In this BTB exercise, you will be using a Windows PC/laptop of your choice to find out information on that device. Using the command prompt (cmd) run an ipconfig /all command and answer the following questions (NOTE: make sure you are using a PC connected to the internet or you won’t see this stuff!!) 1) What is the IP address (IPv4) of the Local Area Network connection (Ethernet adapter)? 192.168.1.142 2) What is the MAC address (physical address) of the Local Area Network adapter? 28-92-4A-4B-A4-49 3) When was the lease obtained for the IP address? Thursday,March 19, 2015 3:12:47 P.M. 4) When does the lease expire? Friday, March 20, 2015 6:00:21 P.M. 5) Are there any DHCP servers reported? If yes, what it the IP of the DHCP server? Yes 192.168.1.1 6) What are the IP addresses of the DNS servers (if you see any)? 208.180.42.68 208.180.42.100