SlideShare a Scribd company logo
Chapter 5
     LANs and WLANs
Computer Concepts 2012
5 Chapter Contents
     Section A: Network Building Blocks
     Section B: Wired Networks
     Section C: Wireless Networks
     Section D: Using LANs
     Section E: Security Through Encryption




Chapter 5: LANs and WLANs                      2
5
                                    SECTION   A
        Network Building Blocks
     Network Classifications
     LAN Standards
     Network Devices
     Clients, Servers, and Peers
     Physical Topology
     Network Links
     Communications Protocols




Chapter 5: LANs and WLANs                     3
5 Network Classifications
     Personal Area Network (PAN) – interconnection of personal
      digital devices or consumer electronics
     Local Area Network (LAN) – usually connects computers in a
      single building
     Metropolitan Area Network (MAN) – public high-speed
      network with range of about 50 miles
     Wide Area Network (WAN) – covers a large geographical
      area and typically consists of several smaller networks




Chapter 5: LANs and WLANs                                      4
5 LAN Standards
     LAN technologies are standardized by the Institute of
      Electrical and Electronics Engineers (IEEE) Project 802 –
      Local Network Standards
       – IEEE 802.3
       – ARCnet
       – Token Ring
       – FDDI
       – Ethernet




Chapter 5: LANs and WLANs                                         5
5 Network Devices
     Each connection point on a network is referred to as a node
     To connect to a LAN, a computer requires network
      circuitry, sometimes referred to as a network interface card
      (NIC)
     A networked peripheral, or network-enabled peripheral, is
      any device that contains network circuitry to directly connect
      to a network
     A network device, or network appliance, is any electronic
      device that broadcasts network data, boosts signals, or
      routes data to its destination



Chapter 5: LANs and WLANs                                              6
5 Network Devices




Chapter 5: LANs and WLANs   7
5 Clients, Servers, and Peers
     Network devices can function as clients or as servers
       – Application server
       – File server
       – Print server
     Networks that include one or more servers can operate in
      client/server mode




Chapter 5: LANs and WLANs                                        8
5 Physical Topology
     The arrangement of devices in a network is referred to as its
      physical topology
       – Star
       – Ring
       – Bus
       – Mesh
       – Tree
     Two similar networks can
      be connected by a device
      called a bridge
     Gateway is a generic term
      for any device or software
      code used to join two networks
Chapter 5: LANs and WLANs                                             9
5 Network Links
     A communications channel, or link, is a physical path or
      frequency for signal transmissions
     Bandwidth is the transmission capacity of a communications
      channel
       – Broadband
       – Narrowband




Chapter 5: LANs and WLANs                                      10
5 Communications Protocols
     Rules for efficiently transmitting data from one network node
      to another:
       – Divide messages into packets
       – Affix addresses to packets
       – Initiate transmission
       – Regulate flow of data
       – Check for transmission errors
       – Acknowledge receipt of transmitted data




Chapter 5: LANs and WLANs                                         11
5 Communications Protocols
     A packet is a “parcel” of
      data that is sent across a
      computer network
       – Circuit-switching
         technology vs. packet
         switching technology




Chapter 5: LANs and WLANs          12
5 Communications Protocols
     Every packet that travels over a network includes the
      address of its destination device
     A MAC address is a unique number assigned to a network
      interface card when it is manufactured
     An IP address is a series of numbers used to identify a
      network device
     IP addresses can also be obtained through DHCP




Chapter 5: LANs and WLANs                                       13
5
                             SECTION   B
        Wired Networks
     Wired Network Basics
     Ethernet
     Ethernet Equipment
     Ethernet Setup




Chapter 5: LANs and WLANs              14
5 Wired Network Basics
     A wired network uses cables to connect network devices
     Wired networks are fast, secure, and simple to configure
     Devices tethered to cables
      have limited mobility




Chapter 5: LANs and WLANs                                        15
5 Ethernet
     Simultaneously broadcasts data packets to all network
      devices
       – IEEE 802.3
       – CSMA/CD protocol
     Vary in speed from 10Mbps to 100Gbps




Chapter 5: LANs and WLANs                                     16
5 Ethernet




Chapter 5: LANs and WLANs   17
5 Ethernet Equipment




Chapter 5: LANs and WLANs   18
5 Ethernet Equipment
     Ethernet adapter (designed to support the Ethernet
      protocols)
     Network hub
     Network switch
     Network router
     RJ45 connector




Chapter 5: LANs and WLANs                                  19
5 Ethernet Setup




Chapter 5: LANs and WLANs   20
5 Ethernet Setup




Chapter 5: LANs and WLANs   21
5 Ethernet Setup




Chapter 5: LANs and WLANs   22
5
                            SECTION   C
        Wireless Networks
     Wireless Basics
     Bluetooth
     Wi-Fi
     Wi-Fi Equipment
     Wi-Fi Setup




Chapter 5: LANs and WLANs             23
5 Wireless Basics
     A wireless network transports data from one device to
      another without cables or wires
       – RF signals
           • Transceiver
       – Microwaves
       – Infrared light
     Slower than wired networks
     Security concerns




Chapter 5: LANs and WLANs                                     24
5 Bluetooth
     Bluetooth is a short-range, wireless network technology
      designed to make its own connections between electronic
      devices, without wires, cables, or any direct action from a
      user




Chapter 5: LANs and WLANs                                           25
5 Wi-Fi
     Wireless networking technologies that are compatible with
      Ethernet
     MIMO technology uses two or more antennas to send
      multiple sets of signals between network devices




Chapter 5: LANs and WLANs                                         26
5 Wi-Fi Equipment




Chapter 5: LANs and WLANs   27
5 Wi-Fi Equipment
     If your computer is not pre-equipped with wireless
      circuitry, you can purchase and install a Wi-Fi adapter




Chapter 5: LANs and WLANs                                       28
5 Wi-Fi Equipment
     Wireless network setups
      – Wireless ad-hoc network
      – Wireless infrastructure network
          • Wireless
            access point
          • Wireless
            router
      – MiFi




Chapter 5: LANs and WLANs                 29
5 Wi-Fi Setup
     Set up the router
     Connect to the router with a computer
     Configure the router
     Access the router setup utility
     Create a new router password




Chapter 5: LANs and WLANs                     30
5 Wi-Fi Setup
     Enter an SSID for the network
     Activate WEP, WPA, or PSK and create an encryption key
     Set up the wireless workstations
     Connect an Internet access device




Chapter 5: LANs and WLANs                                      31
5 Wi-Fi Setup




Chapter 5: LANs and WLANs   32
5
                                      SECTION   D
        Using LANs
     LAN Advantages and Challenges
     Sharing Files
     Sharing Printers
     Network Troubleshooting




Chapter 5: LANs and WLANs                       33
5 LAN Advantages
        and Challenges
     LANs enable people to work together
     Sharing networked software can reduce costs
     Sharing data on a LAN can increase productivity
     Sharing networked hardware can reduce costs
     Sharing networked hardware can provide access to a wide
      range of services and specialized peripheral devices




Chapter 5: LANs and WLANs                                       34
5 LAN Advantages
        and Challenges
     Resources become unavailable when network malfunctions
     Networks may be vulnerable to unauthorized access
       – More vulnerable than standalone computers
     Wireless networks can be tapped from any computers within
      range of the wireless signal
     Networked computers are susceptible to an increasing
      number of worms, Trojan horses, and blended threats




Chapter 5: LANs and WLANs                                     35
5 Sharing Files
     If you use Windows, it
      automatically detects
      available LANs any time
      you turn on a workstation
     To connect to a shared
      resource, you might be
      asked for a user ID and
      password




Chapter 5: LANs and WLANs         36
5 Sharing Files




Chapter 5: LANs and WLANs   37
5 Sharing Files




Chapter 5: LANs and WLANs   38
5 Sharing Files
     A homegroup is a collection of trusted networked computers
      that automatically share files and folders




Chapter 5: LANs and WLANs                                      39
5 Sharing Printers
     Three setups allow for printer sharing:
       – Set up printer sharing using a workstation printer
       – Set up printer sharing using a print server
       – Install printer with built-in networking




Chapter 5: LANs and WLANs                                     40
5 Sharing Printers




Chapter 5: LANs and WLANs   41
5 Troubleshooting
     Network problems can stem from a variety of sources
       – Cables
       – Signal strength
       – Security
       – Interference
       – Network devices
       – Settings
       – Switches




Chapter 5: LANs and WLANs                                   42
5
                               SECTION   E
        Security Through Encryption
     Wi-Fi Security
     Encryption




Chapter 5: LANs and WLANs                43
5 Wi-Fi Security
     Wireless networks are much more susceptible to
      unauthorized access and use than wired networks
     LAN jacking, or war driving, is the practice of intercepting
      wireless signals by cruising through an area




Chapter 5: LANs and WLANs                                            44
5 Wi-Fi Security
     Wireless encryption scrambles data transmitted between
      wireless devices and then unscrambles the data only on
      devices that have a valid encryption key
       – WEP (Wired Equivalent Privacy)
       – WPA (Wi-Fi Protected Access)
       – WPA2
       – PSK
     Activate encryption by using a wireless network key




Chapter 5: LANs and WLANs                                      45
5 Wi-Fi Security




Chapter 5: LANs and WLANs   46
5 Encryption
     Encryption transforms a message so that its contents are
      hidden from unauthorized readers
       – Plaintext has not yet been encrypted
       – An encrypted message is referred to as ciphertext
     Decryption is the opposite of encryption
       – Cryptographic algorithm
       – Cryptographic key




Chapter 5: LANs and WLANs                                        47
5 Encryption
     Weak vs. strong encryption
     AES (Advanced Encryption Standard)
     Encryption methods can be broken by the use of expensive,
      specialized, code-breaking computers
       – Brute force attack




Chapter 5: LANs and WLANs                                     48
5 Encryption
     Public key encryption (PKE) eliminates key-distribution
      problem, by using one key to encrypt a message and
      another key to decrypt the message




Chapter 5: LANs and WLANs                                       49
5 Encryption
     When personal computer users want to encrypt e-mail or
      other documents, they turn to public key encryption software
      called PGP (Pretty Good Privacy)




Chapter 5: LANs and WLANs                                        50
Chapter 5 Complete
Computer Concepts 2012

More Related Content

What's hot

Kurose ross wi_fi
Kurose ross wi_fiKurose ross wi_fi
Kurose ross wi_fi
Gopi Saiteja
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
vivek kumar
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
dxmuthu
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
Rubal Sagwal
 
Wireless
WirelessWireless
Wireless
Sid_007007
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
City Vision University
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
JaviTorres13
 
Darsh
DarshDarsh
Vo ip
Vo ipVo ip
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
rajakhurram
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
thetechnicalzone
 
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardTowards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Giuseppe Anastasi
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
Mohit Kumar
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
shajeeha khalid
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentals
jerometnewman
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
Palanivel Kuppusamy
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
mlrbrown
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 

What's hot (19)

Kurose ross wi_fi
Kurose ross wi_fiKurose ross wi_fi
Kurose ross wi_fi
 
A presentation on networking and ccna
A presentation on networking and ccnaA presentation on networking and ccna
A presentation on networking and ccna
 
Wireless networksppt
Wireless networkspptWireless networksppt
Wireless networksppt
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Wireless
WirelessWireless
Wireless
 
Wireless Networking
Wireless NetworkingWireless Networking
Wireless Networking
 
Wireless ethernet
Wireless ethernetWireless ethernet
Wireless ethernet
 
Darsh
DarshDarsh
Darsh
 
Vo ip
Vo ipVo ip
Vo ip
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Ccna complete notes
Ccna complete notesCcna complete notes
Ccna complete notes
 
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardTowards the Internet of Relevant Things: the IEEE 802.15.4e Standard
Towards the Internet of Relevant Things: the IEEE 802.15.4e Standard
 
VLAN and its implementation
VLAN  and its implementation VLAN  and its implementation
VLAN and its implementation
 
Ccna (200 125)
Ccna (200 125)Ccna (200 125)
Ccna (200 125)
 
Q1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking FundamentalsQ1 On Ch02 Networking Fundamentals
Q1 On Ch02 Networking Fundamentals
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 

Viewers also liked

Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard ppt
Malik obeisat
 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
Lans ethernet
Lans ethernetLans ethernet
Lans ethernet
Zill Rehman
 
802.11[1]
802.11[1]802.11[1]
802.11[1]
Srujan Damera
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Faisal Mehmood
 
LAN.
LAN.LAN.
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
Ahmar Hashmi
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
Faisal Mehmood
 
Wlan
WlanWlan
wired lans
wired lanswired lans
wired lans
hoadqbk
 
Ethernet
EthernetEthernet
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
Ahmar Hashmi
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
Hattori Sidek
 
Ch 15
Ch 15Ch 15
Networking
NetworkingNetworking
Networking
Palash Sachan
 

Viewers also liked (16)

Changes in the standard ppt
Changes in the standard pptChanges in the standard ppt
Changes in the standard ppt
 
CCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukarCCNA CHAPTER 17 BY jetarvind kumar madhukar
CCNA CHAPTER 17 BY jetarvind kumar madhukar
 
Lans ethernet
Lans ethernetLans ethernet
Lans ethernet
 
802.11[1]
802.11[1]802.11[1]
802.11[1]
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
LAN.
LAN.LAN.
LAN.
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Wlan
WlanWlan
Wlan
 
wired lans
wired lanswired lans
wired lans
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
Ethernet
EthernetEthernet
Ethernet
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
12 wireless la-ns
12 wireless la-ns12 wireless la-ns
12 wireless la-ns
 
Ch 15
Ch 15Ch 15
Ch 15
 
Networking
NetworkingNetworking
Networking
 

Similar to Chapter 05

Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
M Sabir Saeed
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
abenimelos
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
Ezxprt
 
Local area network
Local area networkLocal area network
Local area network
SEDYK
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
Arunabh Mishra
 
Ccna
CcnaCcna
W-LANs (Wire less Local Area Networks)
W-LANs  (Wire less Local  Area Networks)W-LANs  (Wire less Local  Area Networks)
W-LANs (Wire less Local Area Networks)
Stella Maris College
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
Udesh Lakshitha
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
umardanjumamaiwada
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
SABIR ALI MOLLAH
 
Network Trends
Network TrendsNetwork Trends
Network Trends
Arun ACE
 
Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
cpashke
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
tazbeedrahman
 
R1x g12 wifi i
R1x g12 wifi iR1x g12 wifi i
R1x g12 wifi i
cairo university
 
Wi Fi
Wi FiWi Fi
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
Pak Cik Nan
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
Sujee Antony
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
Aiman Hud
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
AnushaJagadeesh4
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
Ramadan Babers, PhD
 

Similar to Chapter 05 (20)

Wireless communication and networking
Wireless communication and networkingWireless communication and networking
Wireless communication and networking
 
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).pptChapter 4 - Wirelsess LAN Lec Concise (1).ppt
Chapter 4 - Wirelsess LAN Lec Concise (1).ppt
 
CCNA(R&S) By Ezxprt
CCNA(R&S) By EzxprtCCNA(R&S) By Ezxprt
CCNA(R&S) By Ezxprt
 
Local area network
Local area networkLocal area network
Local area network
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Ccna
CcnaCcna
Ccna
 
W-LANs (Wire less Local Area Networks)
W-LANs  (Wire less Local  Area Networks)W-LANs  (Wire less Local  Area Networks)
W-LANs (Wire less Local Area Networks)
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol0 lecture 5 wp wireless protocol
0 lecture 5 wp wireless protocol
 
Wifi Technology ppt
Wifi Technology pptWifi Technology ppt
Wifi Technology ppt
 
Network Trends
Network TrendsNetwork Trends
Network Trends
 
Computer Literacy Lesson 25
Computer Literacy Lesson 25Computer Literacy Lesson 25
Computer Literacy Lesson 25
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
R1x g12 wifi i
R1x g12 wifi iR1x g12 wifi i
R1x g12 wifi i
 
Wi Fi
Wi FiWi Fi
Wi Fi
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
Basic networking hardware pre final 1
Basic networking hardware pre final 1Basic networking hardware pre final 1
Basic networking hardware pre final 1
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 

Recently uploaded

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 

Recently uploaded (20)

Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 

Chapter 05

  • 1. Chapter 5 LANs and WLANs Computer Concepts 2012
  • 2. 5 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C: Wireless Networks  Section D: Using LANs  Section E: Security Through Encryption Chapter 5: LANs and WLANs 2
  • 3. 5 SECTION A Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network Links  Communications Protocols Chapter 5: LANs and WLANs 3
  • 4. 5 Network Classifications  Personal Area Network (PAN) – interconnection of personal digital devices or consumer electronics  Local Area Network (LAN) – usually connects computers in a single building  Metropolitan Area Network (MAN) – public high-speed network with range of about 50 miles  Wide Area Network (WAN) – covers a large geographical area and typically consists of several smaller networks Chapter 5: LANs and WLANs 4
  • 5. 5 LAN Standards  LAN technologies are standardized by the Institute of Electrical and Electronics Engineers (IEEE) Project 802 – Local Network Standards – IEEE 802.3 – ARCnet – Token Ring – FDDI – Ethernet Chapter 5: LANs and WLANs 5
  • 6. 5 Network Devices  Each connection point on a network is referred to as a node  To connect to a LAN, a computer requires network circuitry, sometimes referred to as a network interface card (NIC)  A networked peripheral, or network-enabled peripheral, is any device that contains network circuitry to directly connect to a network  A network device, or network appliance, is any electronic device that broadcasts network data, boosts signals, or routes data to its destination Chapter 5: LANs and WLANs 6
  • 7. 5 Network Devices Chapter 5: LANs and WLANs 7
  • 8. 5 Clients, Servers, and Peers  Network devices can function as clients or as servers – Application server – File server – Print server  Networks that include one or more servers can operate in client/server mode Chapter 5: LANs and WLANs 8
  • 9. 5 Physical Topology  The arrangement of devices in a network is referred to as its physical topology – Star – Ring – Bus – Mesh – Tree  Two similar networks can be connected by a device called a bridge  Gateway is a generic term for any device or software code used to join two networks Chapter 5: LANs and WLANs 9
  • 10. 5 Network Links  A communications channel, or link, is a physical path or frequency for signal transmissions  Bandwidth is the transmission capacity of a communications channel – Broadband – Narrowband Chapter 5: LANs and WLANs 10
  • 11. 5 Communications Protocols  Rules for efficiently transmitting data from one network node to another: – Divide messages into packets – Affix addresses to packets – Initiate transmission – Regulate flow of data – Check for transmission errors – Acknowledge receipt of transmitted data Chapter 5: LANs and WLANs 11
  • 12. 5 Communications Protocols  A packet is a “parcel” of data that is sent across a computer network – Circuit-switching technology vs. packet switching technology Chapter 5: LANs and WLANs 12
  • 13. 5 Communications Protocols  Every packet that travels over a network includes the address of its destination device  A MAC address is a unique number assigned to a network interface card when it is manufactured  An IP address is a series of numbers used to identify a network device  IP addresses can also be obtained through DHCP Chapter 5: LANs and WLANs 13
  • 14. 5 SECTION B Wired Networks  Wired Network Basics  Ethernet  Ethernet Equipment  Ethernet Setup Chapter 5: LANs and WLANs 14
  • 15. 5 Wired Network Basics  A wired network uses cables to connect network devices  Wired networks are fast, secure, and simple to configure  Devices tethered to cables have limited mobility Chapter 5: LANs and WLANs 15
  • 16. 5 Ethernet  Simultaneously broadcasts data packets to all network devices – IEEE 802.3 – CSMA/CD protocol  Vary in speed from 10Mbps to 100Gbps Chapter 5: LANs and WLANs 16
  • 17. 5 Ethernet Chapter 5: LANs and WLANs 17
  • 18. 5 Ethernet Equipment Chapter 5: LANs and WLANs 18
  • 19. 5 Ethernet Equipment  Ethernet adapter (designed to support the Ethernet protocols)  Network hub  Network switch  Network router  RJ45 connector Chapter 5: LANs and WLANs 19
  • 20. 5 Ethernet Setup Chapter 5: LANs and WLANs 20
  • 21. 5 Ethernet Setup Chapter 5: LANs and WLANs 21
  • 22. 5 Ethernet Setup Chapter 5: LANs and WLANs 22
  • 23. 5 SECTION C Wireless Networks  Wireless Basics  Bluetooth  Wi-Fi  Wi-Fi Equipment  Wi-Fi Setup Chapter 5: LANs and WLANs 23
  • 24. 5 Wireless Basics  A wireless network transports data from one device to another without cables or wires – RF signals • Transceiver – Microwaves – Infrared light  Slower than wired networks  Security concerns Chapter 5: LANs and WLANs 24
  • 25. 5 Bluetooth  Bluetooth is a short-range, wireless network technology designed to make its own connections between electronic devices, without wires, cables, or any direct action from a user Chapter 5: LANs and WLANs 25
  • 26. 5 Wi-Fi  Wireless networking technologies that are compatible with Ethernet  MIMO technology uses two or more antennas to send multiple sets of signals between network devices Chapter 5: LANs and WLANs 26
  • 27. 5 Wi-Fi Equipment Chapter 5: LANs and WLANs 27
  • 28. 5 Wi-Fi Equipment  If your computer is not pre-equipped with wireless circuitry, you can purchase and install a Wi-Fi adapter Chapter 5: LANs and WLANs 28
  • 29. 5 Wi-Fi Equipment  Wireless network setups – Wireless ad-hoc network – Wireless infrastructure network • Wireless access point • Wireless router – MiFi Chapter 5: LANs and WLANs 29
  • 30. 5 Wi-Fi Setup  Set up the router  Connect to the router with a computer  Configure the router  Access the router setup utility  Create a new router password Chapter 5: LANs and WLANs 30
  • 31. 5 Wi-Fi Setup  Enter an SSID for the network  Activate WEP, WPA, or PSK and create an encryption key  Set up the wireless workstations  Connect an Internet access device Chapter 5: LANs and WLANs 31
  • 32. 5 Wi-Fi Setup Chapter 5: LANs and WLANs 32
  • 33. 5 SECTION D Using LANs  LAN Advantages and Challenges  Sharing Files  Sharing Printers  Network Troubleshooting Chapter 5: LANs and WLANs 33
  • 34. 5 LAN Advantages and Challenges  LANs enable people to work together  Sharing networked software can reduce costs  Sharing data on a LAN can increase productivity  Sharing networked hardware can reduce costs  Sharing networked hardware can provide access to a wide range of services and specialized peripheral devices Chapter 5: LANs and WLANs 34
  • 35. 5 LAN Advantages and Challenges  Resources become unavailable when network malfunctions  Networks may be vulnerable to unauthorized access – More vulnerable than standalone computers  Wireless networks can be tapped from any computers within range of the wireless signal  Networked computers are susceptible to an increasing number of worms, Trojan horses, and blended threats Chapter 5: LANs and WLANs 35
  • 36. 5 Sharing Files  If you use Windows, it automatically detects available LANs any time you turn on a workstation  To connect to a shared resource, you might be asked for a user ID and password Chapter 5: LANs and WLANs 36
  • 37. 5 Sharing Files Chapter 5: LANs and WLANs 37
  • 38. 5 Sharing Files Chapter 5: LANs and WLANs 38
  • 39. 5 Sharing Files  A homegroup is a collection of trusted networked computers that automatically share files and folders Chapter 5: LANs and WLANs 39
  • 40. 5 Sharing Printers  Three setups allow for printer sharing: – Set up printer sharing using a workstation printer – Set up printer sharing using a print server – Install printer with built-in networking Chapter 5: LANs and WLANs 40
  • 41. 5 Sharing Printers Chapter 5: LANs and WLANs 41
  • 42. 5 Troubleshooting  Network problems can stem from a variety of sources – Cables – Signal strength – Security – Interference – Network devices – Settings – Switches Chapter 5: LANs and WLANs 42
  • 43. 5 SECTION E Security Through Encryption  Wi-Fi Security  Encryption Chapter 5: LANs and WLANs 43
  • 44. 5 Wi-Fi Security  Wireless networks are much more susceptible to unauthorized access and use than wired networks  LAN jacking, or war driving, is the practice of intercepting wireless signals by cruising through an area Chapter 5: LANs and WLANs 44
  • 45. 5 Wi-Fi Security  Wireless encryption scrambles data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key – WEP (Wired Equivalent Privacy) – WPA (Wi-Fi Protected Access) – WPA2 – PSK  Activate encryption by using a wireless network key Chapter 5: LANs and WLANs 45
  • 46. 5 Wi-Fi Security Chapter 5: LANs and WLANs 46
  • 47. 5 Encryption  Encryption transforms a message so that its contents are hidden from unauthorized readers – Plaintext has not yet been encrypted – An encrypted message is referred to as ciphertext  Decryption is the opposite of encryption – Cryptographic algorithm – Cryptographic key Chapter 5: LANs and WLANs 47
  • 48. 5 Encryption  Weak vs. strong encryption  AES (Advanced Encryption Standard)  Encryption methods can be broken by the use of expensive, specialized, code-breaking computers – Brute force attack Chapter 5: LANs and WLANs 48
  • 49. 5 Encryption  Public key encryption (PKE) eliminates key-distribution problem, by using one key to encrypt a message and another key to decrypt the message Chapter 5: LANs and WLANs 49
  • 50. 5 Encryption  When personal computer users want to encrypt e-mail or other documents, they turn to public key encryption software called PGP (Pretty Good Privacy) Chapter 5: LANs and WLANs 50

Editor's Notes

  1. Figure 5-20
  2. Figure 5-44