This document summarizes the contents of Chapter 5, which covers LANs and WLANs. Section A defines network classifications like PAN, LAN, MAN and WAN. It also describes network building blocks such as standards, devices, topology and protocols. Section B covers wired networks including Ethernet basics, equipment and setup. Section C discusses wireless networks, focusing on Bluetooth, Wi-Fi standards, equipment and setup. Section D reviews using LANs to share files, printers and potential issues. The chapter provides an overview of fundamental networking concepts.
The document discusses best practices for wireless LAN deployment and security. It covers wireless concepts and standards, security issues with wireless networks like weak encryption and rogue access points, and common attacks. It also provides countermeasures like using encryption, limiting the broadcast range of access points, implementing authentication, and monitoring for unauthorized devices on the network.
The document discusses wireless local area networks (WLANs), including how they work as an extension or alternative to wired LANs using radio waves, the components needed like access points and clients, common configurations including peer-to-peer and using multiple access points, standards like 802.11, encryption methods, advantages like mobility and ease of installation, disadvantages such as security issues, and applications in various industries.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document discusses several IEEE 802.11 wireless LAN standards including 802.11b, 802.11g, and upcoming 802.11ac. It outlines the key aspects that each standard defines such as the radio frequency band used, available channels, modulation technique, maximum data rates, and typical indoor and outdoor ranges. MIMO and 802.11n are also summarized as utilizing multiple antennas to achieve higher throughput.
This document discusses IEEE 802.15.4 and Zigbee wireless communication standards. It provides an overview of 802.15.4, including its applications, characteristics, frequency bands, and MAC and PHY specifications. It also describes Zigbee's architecture and how it works with 802.15.4 at higher protocol layers to provide networking and routing functionality. Typical network topologies for 802.15.4 like star, peer-to-peer, and combined are also covered.
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
Chapter 7 : CCNA Cisco Academy: LAN Switching and Wireless.
This chapter discusses the basic wireless concepts:
- Comparison between WLAN and LAN.
- The difference between wireless PAN, LAN, MAN and WAN.
- Infrared and Radio Frequency (RF).
- Benefits and limitations of the wireless technology.
- Difference between licensed and unlicensed bands.
- Wi-Fi and the key organizations influencing WLAN standards.
- Wireless infrastructure components which are the wireless NIC, Wireless Access Points and wireless routers.
- The Hidden node problem.
- Configuration parameters SSID, network modes and channels.
- Wireless 802.11 typologies: Ad hoc (IBSS), BSS and ESS.
Client and Access Point Association: Beacons, probe, authenticate and associate.
- Threats to Wireless Security- Unauthorized Access: War Drivers, Hackers and employees.
- Man-in-the-Middle Attacks, Denial of Service.
- Wireless Security Protocol Overview: open authentication, WEP authentication.
- Encryption – TKIP and AES.
- Configuring the Wireless Access Point
- Configuring security: personal and enterprise (AAA and EAP ).
- WLAN Troubleshooting: Incorrect Channel Settings, Solving RF Interference, Access Point Misplacement and Authentication and Encryption
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. It provides connectivity through wireless stations organized into basic service sets (BSSs) that together form an extended service set (ESS). Key components include the MAC sublayer, physical layers using technologies like direct sequence spread spectrum (DSSS), and services that enable station mobility and quality of service (QoS).
The document discusses best practices for wireless LAN deployment and security. It covers wireless concepts and standards, security issues with wireless networks like weak encryption and rogue access points, and common attacks. It also provides countermeasures like using encryption, limiting the broadcast range of access points, implementing authentication, and monitoring for unauthorized devices on the network.
The document discusses wireless local area networks (WLANs), including how they work as an extension or alternative to wired LANs using radio waves, the components needed like access points and clients, common configurations including peer-to-peer and using multiple access points, standards like 802.11, encryption methods, advantages like mobility and ease of installation, disadvantages such as security issues, and applications in various industries.
Wireless networks are accessible to anyone within the router’s transmission radius. This makes them vulnerable to attacks. Hotspots are available in public places such as airports, restaurants, parks, etc.
In this module, we will introduce you to common techniques used to exploit weaknesses in wireless network security implementations. We will also look at some of the countermeasures you can put in place to protect against such attacks.
The document discusses several IEEE 802.11 wireless LAN standards including 802.11b, 802.11g, and upcoming 802.11ac. It outlines the key aspects that each standard defines such as the radio frequency band used, available channels, modulation technique, maximum data rates, and typical indoor and outdoor ranges. MIMO and 802.11n are also summarized as utilizing multiple antennas to achieve higher throughput.
This document discusses IEEE 802.15.4 and Zigbee wireless communication standards. It provides an overview of 802.15.4, including its applications, characteristics, frequency bands, and MAC and PHY specifications. It also describes Zigbee's architecture and how it works with 802.15.4 at higher protocol layers to provide networking and routing functionality. Typical network topologies for 802.15.4 like star, peer-to-peer, and combined are also covered.
LAN Switching and Wireless: Ch7 - Basic Wireless Concepts and ConfigurationAbdelkhalik Mosa
Chapter 7 : CCNA Cisco Academy: LAN Switching and Wireless.
This chapter discusses the basic wireless concepts:
- Comparison between WLAN and LAN.
- The difference between wireless PAN, LAN, MAN and WAN.
- Infrared and Radio Frequency (RF).
- Benefits and limitations of the wireless technology.
- Difference between licensed and unlicensed bands.
- Wi-Fi and the key organizations influencing WLAN standards.
- Wireless infrastructure components which are the wireless NIC, Wireless Access Points and wireless routers.
- The Hidden node problem.
- Configuration parameters SSID, network modes and channels.
- Wireless 802.11 typologies: Ad hoc (IBSS), BSS and ESS.
Client and Access Point Association: Beacons, probe, authenticate and associate.
- Threats to Wireless Security- Unauthorized Access: War Drivers, Hackers and employees.
- Man-in-the-Middle Attacks, Denial of Service.
- Wireless Security Protocol Overview: open authentication, WEP authentication.
- Encryption – TKIP and AES.
- Configuring the Wireless Access Point
- Configuring security: personal and enterprise (AAA and EAP ).
- WLAN Troubleshooting: Incorrect Channel Settings, Solving RF Interference, Access Point Misplacement and Authentication and Encryption
This document provides an overview of Ethernet in a presentation for a computer networks class. It begins with an introduction to Ethernet and network topologies. The technology section discusses Ethernet standards, frame formats, and cable types. Devices covered include switches, routers, and the differences between them. Applications like firewalls and IP spoofing are also mentioned. The summary reiterates the key topics discussed, including the introduction of Ethernet, technologies and devices, and applications. It also outlines the future of Ethernet, such as vehicular uses and standardizing software-defined networking.
IEEE 802.11 is a set of media access control (MAC) and physical layer (PHY) specifications for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. It provides connectivity through wireless stations organized into basic service sets (BSSs) that together form an extended service set (ESS). Key components include the MAC sublayer, physical layers using technologies like direct sequence spread spectrum (DSSS), and services that enable station mobility and quality of service (QoS).
The document discusses key aspects of IEEE 802.11 wireless LAN standards. It describes the 802.11b, 802.11a, 802.11g, and 802.11n standards which operate in the 2.4-5GHz range and have data rates up to 11Mbps, 54Mbps, 54Mbps, and 200Mbps respectively. It explains the basic service set architecture with wireless hosts communicating through an access point. It also covers CSMA/CA for medium access, addressing in 802.11 frames, and mobility and power management in 802.11 networks.
This document summarizes a presentation on networking and CCNA. It discusses key networking concepts like network types, topologies, IP addressing, routing protocols, and practical networking examples like VOIP, ACLs, NAT, VLANs and VPNs. It also summarizes a sample student project on designing the network for an airport, covering the network components, topology, protocols and access control used to connect different airport departments and zones.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The Slides include a brief description of what is a Wireless LAN, some benefits over a wired network connection, where is WLAN mainly applied, how is the infrastructure of a Wireless LAN, the architecture of an ad-hoc Network, the range & throughput of the wireless ethernet and how to secure the wireless LAN.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
VoIP allows users to make voice calls using an Internet connection instead of a regular phone line. It works by converting voice into digital data packets that are transmitted over the IP network and then reconstructed at the receiving end. The key benefits of VoIP include lower costs compared to traditional phone service, open standards that ensure interoperability between vendors, and the ability to integrate voice and data onto a single network. Common VoIP protocols are H.323, SIP, and MGCP. VoIP sees broad use for internet calling and is widely used to provide phone services at a lower cost than traditional telephone networks.
Wireless networking allows devices to connect to a network without cables by using technologies like Wi-Fi, Bluetooth, and HomeRF. Common types of wireless networks include peer-to-peer networks connecting devices directly and infrastructure networks with an access point connecting devices to a larger network. Key components of setting up a wireless network include wireless adapters, access points, antennas, and configuring standards and security protocols like WEP, WPA, and MAC address filtering.
The document discusses the characteristics and security issues of wireless LANs (WLANs). It describes the advantages and disadvantages of WLANs, as well as their design goals and transmission technologies. It then discusses some specific wireless security issues for WLANs, including interception of radio signals, reliance on shared public infrastructure, and risks from rogue access points and war driving. Finally, it provides an overview of the IEEE 802.11 standard for WLANs, including its network architectures, transmission methods like CSMA/CA, frame types, and security features.
these are the complete notes of ccna for the students .which can be very very much usefulll while in project report,synopsis and so on which you can use at no cost
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardGiuseppe Anastasi
The document discusses the IEEE 802.15.4 standard and its limitations for Internet of Things applications with stringent requirements. It introduces the IEEE 802.15.4e standard, which amends 802.15.4 to add two new MAC modes - DSME and TSCH. DSME aims to provide bounded latency while TSCH uses channel hopping to improve reliability. The document surveys the literature on both new modes and discusses open issues and how 802.15.4e can help realize the vision of the Internet of Things.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
This document contains questions and answers about networking concepts from Cisco Networking Basics Chapter 2. It discusses LANs and their business needs, disadvantages of electronic bulletin boards, LAN design goals, WAN technologies, reasons for networking standards, problems networks experienced in the 1980s, factors that determine throughput, and tools for estimating network performance. The document also covers the OSI model, encapsulation details, network device types, VPN technologies, bandwidth characteristics, and transmission times on T1 links.
This document provides an overview of important networking concepts. It discusses data communication components and various transmission mediums including Ethernet, Fast Ethernet, Gigabit Ethernet, LocalTalk, Token Ring, FDDI, ATM, and wireless technologies. It also describes common network hardware such as hubs, switches, bridges, repeaters, routers, and NICs. Finally, it covers common network media including twisted pair, coaxial, fiber optic, and wireless and discusses specifications for Ethernet and optical fiber.
This document discusses installing and troubleshooting physical networks. It covers:
1) Understanding structured cabling standards and components like patch panels, switches, and horizontal cabling.
2) The process of installing structured cabling which involves mapping runs, pulling cable, making connections, and testing.
3) Network interface cards (NICs) including different types, installation, and using link lights for troubleshooting.
4) Diagnosing and repairing cabling issues through methods like using cable testers, toners, and time domain reflectometers.
Telecommunications and Network Security PresentationWajahat Rajab
This document provides an overview of telecommunications and network security concepts. It discusses data network types like LANs, WANs, intranets and extranets. It describes the OSI reference model and its layers. Wireless network technologies like FHSS, DSSS and OFDM are explained. Security issues with early WLAN standards like WEP are covered. Improved security protocols like WPA and WPA2 are also summarized. Common network attacks such as DNS poisoning, SYN floods, ARP poisoning and DDoS attacks are defined. Finally, the document outlines virtual private network concepts and components of intrusion detection systems and firewalls.
This document summarizes some key changes in Ethernet standards over time that enabled higher data rates and compatibility with other networks. It discusses three changes: bridged Ethernet, switched Ethernet, and full-duplex Ethernet. Bridged Ethernet divides a LAN into segments using bridges, raising bandwidth and separating collision domains. Switched Ethernet uses switches with one port per hub to further segment the network. Full-duplex Ethernet allows two devices on a link to transmit and receive simultaneously, effectively doubling bandwidth and eliminating collisions.
The document discusses wireless local area networks (WLANs) and security. It describes WLAN concepts including ad hoc and infrastructure modes. It covers WLAN security standards such as WEP, WPA, and 802.11i. It also discusses Cisco's unified wireless solutions including mesh networks, LWAPP, and AWPP protocols.
The document discusses the history and standards of Ethernet wired local area networks (LANs). It describes the IEEE Project 802 which established standards for the physical and data link layers of major LAN protocols. It then provides details on standard Ethernet, including the MAC sublayer, frame format, address types, encoding, and physical implementations. Fast Ethernet and Gigabit Ethernet are also summarized as higher speed successors to standard Ethernet.
The document discusses key aspects of IEEE 802.11 wireless LAN standards. It describes the 802.11b, 802.11a, 802.11g, and 802.11n standards which operate in the 2.4-5GHz range and have data rates up to 11Mbps, 54Mbps, 54Mbps, and 200Mbps respectively. It explains the basic service set architecture with wireless hosts communicating through an access point. It also covers CSMA/CA for medium access, addressing in 802.11 frames, and mobility and power management in 802.11 networks.
This document summarizes a presentation on networking and CCNA. It discusses key networking concepts like network types, topologies, IP addressing, routing protocols, and practical networking examples like VOIP, ACLs, NAT, VLANs and VPNs. It also summarizes a sample student project on designing the network for an airport, covering the network components, topology, protocols and access control used to connect different airport departments and zones.
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of wireless technology, outlines the 802.11 standards including 802.11a, 802.11b, 802.11g, security features, and challenges. It also summarizes how WLANs integrate with existing networks through access points and allow roaming between coverage areas.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The Slides include a brief description of what is a Wireless LAN, some benefits over a wired network connection, where is WLAN mainly applied, how is the infrastructure of a Wireless LAN, the architecture of an ad-hoc Network, the range & throughput of the wireless ethernet and how to secure the wireless LAN.
The document discusses wireless local area networks (WLANs), including an overview of common WLAN standards such as 802.11b, 802.11a, and 802.11g. It covers topics such as how WLANs integrate with existing wired networks using access points, security considerations for WLANs, and factors to consider when migrating to a wireless network such as performing a site survey.
VoIP allows users to make voice calls using an Internet connection instead of a regular phone line. It works by converting voice into digital data packets that are transmitted over the IP network and then reconstructed at the receiving end. The key benefits of VoIP include lower costs compared to traditional phone service, open standards that ensure interoperability between vendors, and the ability to integrate voice and data onto a single network. Common VoIP protocols are H.323, SIP, and MGCP. VoIP sees broad use for internet calling and is widely used to provide phone services at a lower cost than traditional telephone networks.
Wireless networking allows devices to connect to a network without cables by using technologies like Wi-Fi, Bluetooth, and HomeRF. Common types of wireless networks include peer-to-peer networks connecting devices directly and infrastructure networks with an access point connecting devices to a larger network. Key components of setting up a wireless network include wireless adapters, access points, antennas, and configuring standards and security protocols like WEP, WPA, and MAC address filtering.
The document discusses the characteristics and security issues of wireless LANs (WLANs). It describes the advantages and disadvantages of WLANs, as well as their design goals and transmission technologies. It then discusses some specific wireless security issues for WLANs, including interception of radio signals, reliance on shared public infrastructure, and risks from rogue access points and war driving. Finally, it provides an overview of the IEEE 802.11 standard for WLANs, including its network architectures, transmission methods like CSMA/CA, frame types, and security features.
these are the complete notes of ccna for the students .which can be very very much usefulll while in project report,synopsis and so on which you can use at no cost
Towards the Internet of Relevant Things: the IEEE 802.15.4e StandardGiuseppe Anastasi
The document discusses the IEEE 802.15.4 standard and its limitations for Internet of Things applications with stringent requirements. It introduces the IEEE 802.15.4e standard, which amends 802.15.4 to add two new MAC modes - DSME and TSCH. DSME aims to provide bounded latency while TSCH uses channel hopping to improve reliability. The document surveys the literature on both new modes and discusses open issues and how 802.15.4e can help realize the vision of the Internet of Things.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
This document contains questions and answers about networking concepts from Cisco Networking Basics Chapter 2. It discusses LANs and their business needs, disadvantages of electronic bulletin boards, LAN design goals, WAN technologies, reasons for networking standards, problems networks experienced in the 1980s, factors that determine throughput, and tools for estimating network performance. The document also covers the OSI model, encapsulation details, network device types, VPN technologies, bandwidth characteristics, and transmission times on T1 links.
This document provides an overview of important networking concepts. It discusses data communication components and various transmission mediums including Ethernet, Fast Ethernet, Gigabit Ethernet, LocalTalk, Token Ring, FDDI, ATM, and wireless technologies. It also describes common network hardware such as hubs, switches, bridges, repeaters, routers, and NICs. Finally, it covers common network media including twisted pair, coaxial, fiber optic, and wireless and discusses specifications for Ethernet and optical fiber.
This document discusses installing and troubleshooting physical networks. It covers:
1) Understanding structured cabling standards and components like patch panels, switches, and horizontal cabling.
2) The process of installing structured cabling which involves mapping runs, pulling cable, making connections, and testing.
3) Network interface cards (NICs) including different types, installation, and using link lights for troubleshooting.
4) Diagnosing and repairing cabling issues through methods like using cable testers, toners, and time domain reflectometers.
Telecommunications and Network Security PresentationWajahat Rajab
This document provides an overview of telecommunications and network security concepts. It discusses data network types like LANs, WANs, intranets and extranets. It describes the OSI reference model and its layers. Wireless network technologies like FHSS, DSSS and OFDM are explained. Security issues with early WLAN standards like WEP are covered. Improved security protocols like WPA and WPA2 are also summarized. Common network attacks such as DNS poisoning, SYN floods, ARP poisoning and DDoS attacks are defined. Finally, the document outlines virtual private network concepts and components of intrusion detection systems and firewalls.
This document summarizes some key changes in Ethernet standards over time that enabled higher data rates and compatibility with other networks. It discusses three changes: bridged Ethernet, switched Ethernet, and full-duplex Ethernet. Bridged Ethernet divides a LAN into segments using bridges, raising bandwidth and separating collision domains. Switched Ethernet uses switches with one port per hub to further segment the network. Full-duplex Ethernet allows two devices on a link to transmit and receive simultaneously, effectively doubling bandwidth and eliminating collisions.
The document discusses wireless local area networks (WLANs) and security. It describes WLAN concepts including ad hoc and infrastructure modes. It covers WLAN security standards such as WEP, WPA, and 802.11i. It also discusses Cisco's unified wireless solutions including mesh networks, LWAPP, and AWPP protocols.
The document discusses the history and standards of Ethernet wired local area networks (LANs). It describes the IEEE Project 802 which established standards for the physical and data link layers of major LAN protocols. It then provides details on standard Ethernet, including the MAC sublayer, frame format, address types, encoding, and physical implementations. Fast Ethernet and Gigabit Ethernet are also summarized as higher speed successors to standard Ethernet.
This document summarizes key aspects of IEEE 802.11 wireless LANs. It describes wireless LAN characteristics like infrastructure-based and ad-hoc networks. It discusses components like stations, access points, and service sets. It covers protocols like CSMA/CA and RTS/CTS for medium access control. It also discusses power management, roaming, and scanning functions important for wireless mobility.
This document discusses the evolution of Ethernet standards over multiple generations, from the original Standard Ethernet to Fast Ethernet and Gigabit Ethernet. It describes the IEEE project that established networking standards and details key changes to Ethernet like increased speeds of 100 Mbps for Fast Ethernet and 1000 Mbps for Gigabit Ethernet. Diagrams and tables illustrate different implementations and topologies for the various Ethernet standards.
This document defines and compares different types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It describes how LANs and WANs have integrated over time through the use of networking devices like bridges, routers, and switches. It also provides an overview of network design considerations and various internet and wireless connectivity options.
The document discusses wireless LAN standards including IEEE 802.11 and Bluetooth. It describes the architecture and layers of IEEE 802.11, including the physical and data link layers. It discusses topics like basic service sets, extended service sets, CSMA/CA, frame formats, and addressing. It also covers the architecture of Bluetooth including piconets, scatternets, and the Bluetooth layers.
The document discusses wireless LAN standards including IEEE 802.11 and Bluetooth. It provides an overview of IEEE 802.11 specifications and architecture, addressing mechanisms, and physical layers. It also covers Bluetooth technology, describing its ad hoc network architecture and layers such as baseband and L2CAP. Various concepts are illustrated with figures including basic service sets, extended service sets, MAC layers, and frame formats.
Wireless LANs can be used for LAN extension between buildings, nomadic access for mobile users, and temporary ad hoc networks. There are several wireless LAN categories including infrared, spread spectrum, and narrowband microwave networks. Infrared networks have an unlimited radio spectrum but are limited by concerns of eye safety and range. Spread spectrum networks use multiple-cell configurations with either peer-to-peer or hub-based topologies. Narrowband microwave networks can be licensed to avoid interference or use unlicensed spectrum at low power over short ranges.
The document discusses the evolution of Ethernet standards over four generations from its creation in 1976. It describes the IEEE 802 project which established standards for LAN communication. The original Ethernet standard defined the data link layer to consist of logical link control (LLC) and media access control (MAC) sublayers. It also established physical layer standards and frame formats for early Ethernet implementations using thick and thin coaxial cable and twisted pair wiring in bus and star topologies. Later changes like bridging and switching increased bandwidth and separated collision domains to support higher data rates.
The document discusses the evolution of Ethernet networking standards over time. It describes how IEEE Project 802 was started in 1985 to set standards for interconnecting equipment from different manufacturers. It then provides details on the original Standard Ethernet created in 1976 and its subsequent generations. The document also outlines changes to Standard Ethernet like bridging and switching. It discusses the Fast Ethernet and Gigabit Ethernet standards that succeeded Standard Ethernet by providing higher data rates of 100 Mbps and 1000 Mbps respectively.
- Wireless LANs use wireless transmission medium and were initially more expensive and had lower data rates than wired LANs, but these issues have been addressed and wireless LAN popularity has grown rapidly.
- Wireless LANs can be used to extend existing LANs without installing new cabling, ease reconfiguration of networks, and provide connectivity in areas not suited for wired LANs, but have not replaced wired LANs overall.
- Wireless LAN technologies include infrared and spread spectrum systems operating in unlicensed bands, with spread spectrum becoming more common due to longer range and better building penetration.
Wireless LANs use the IEEE 802.11 standard which defines the physical and MAC layers. The physical layer uses either frequency hopping spread spectrum or direct sequence spread spectrum to transmit over radio frequencies. The MAC layer uses CSMA/CA for channel access and defines frame formats for addressing between devices in a basic service set or extended service set. Bluetooth uses a piconet topology with a master-slave relationship between devices for communication at the baseband layer, and supports both single-slave and multiple-slave communication through its L2CAP layer.
To Download this PPT click on the link below:-
http://www29.zippyshare.com/v/14569917/file.html
Networking
Computer network
Types of network
Personal Area Networks (PANs)
Local Area Networks (LANs)
Metropolitan Area Networks (MANs)
Wide Area Networks (WANs)
Classification of Network Architecture
Client-server architecture
Peer-to-peer architecture
Hybrid architecture
Network topology
Bus Topology
Star Topology
Ring Topology
Mesh Topology
Tree Topology
Hybrid Topology
This document provides an overview of wireless communication and networking. It defines wireless communication and discusses wireless network topologies and integration with wired networks. It describes the IEEE 802.11 wireless standards including 802.11a, 802.11b, 802.11g and 802.11n. It also discusses wireless networking devices such as access points, wireless LAN controllers, and bridges. Finally, it covers common wireless security measures including SSID hiding, MAC address filtering, static IP addressing, 802.1X authentication, WEP, WPA, and WPA2 encryption.
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses, We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
This document provides an overview of local area networks (LANs) and their components. It discusses the different types of computer networks and LAN topologies. It also describes some key LAN devices like hubs, switches, routers, wireless access points, and network interface cards. It provides an introduction to the TCP/IP networking protocols and the IEEE 802.11 wireless networking standards.
The document discusses implementing a wireless mesh network using IEEE 802.11s at Sikkim Manipal Institute of Technology. It describes the benefits of mesh networks, different mesh network modes, and comparisons with other wireless technologies. It also outlines the hardware and software developed, including antennas, wireless routers, firmware, and traffic monitoring tools used to test and analyze the campus mesh network.
The document provides information about the CCNA certification course. It discusses that CCNA is a popular certification course developed by Cisco that certifies skills in network fundamentals, networking concepts, security, automation and more. It can help candidates get jobs as network administrators, engineers, and other networking roles. The document outlines the topics covered in the CCNA course and lists the most common employers of CCNA certified professionals.
Wireless LANs are used all around the world for communication at nearly the speed of light. Learn about WLANs, their components, and working. Also, learn about the architecture of networks and the principle behind WiFi
The document provides an overview of computer networking concepts including:
- What is computer networking and the benefits of networking such as resource sharing.
- Types of networks including LAN, WLAN, MAN, and WAN.
- Data packets and how data is broken into packets for transmission.
- Network protocols and the OSI reference model which defines 7 layers of network communication.
This document provides an overview of wireless networks and protocols. It discusses wireless personal area networks (WPANs) such as Bluetooth and infrared, wireless local area networks (WLANs) using IEEE 802.11 standards, and wireless metropolitan area networks (WMANs) such as WiMAX. For WLANs, it describes wireless access points, common network architectures, and media access control protocols including carrier sense multiple access with collision avoidance (CSMA/CA) and carrier sense multiple access with collision detection (CSMA/CD).
The document provides an overview of recent trends in networking, including Local Area Networks (LAN), Wide Area Networks (WAN), Bluetooth, Wi-Fi, Zigbee, and concludes with a thank you and bibliography. It discusses LAN as a high-speed network within a building or campus, and WAN as a network covering a broader geographic area. It also provides technical details and comparisons of Bluetooth, Wi-Fi, and Zigbee wireless technologies.
This document provides an overview of computer networks and their components. It defines public and private networks, and describes the differences between them. Key hardware components of networks like hubs, switches, routers and network interface cards are explained. Different types of networks such as local area networks, wide area networks, and the Internet are also outlined. The document aims to introduce readers to basic network fundamentals and terminology.
The document discusses computer networks and networking concepts. It defines what a computer network is and provides examples of common network devices like routers, switches, hubs, bridges and modems. It explains how these devices work and their purposes. The document also discusses network connection methods like WiFi and Bluetooth. It outlines the advantages and disadvantages of networks as well as factors to consider when using different connection types.
This document provides an overview of Wi-Fi technology, including its components, mechanisms, topologies, security features, versions, applications, advantages, and limitations. It describes how Wi-Fi uses radio signals transmitted between an access point or router and nearby devices to connect them to a wireless network without wires. It also covers Wi-Fi standards such as 802.11a/b/g/n/ac and security protocols including WEP, WPA, and WPA2. In summary, the document is a technical introduction to Wi-Fi networking.
Wi-Fi is a wireless networking technology that uses radio waves to provide wireless internet access. It allows devices to connect to a network wirelessly without needing cables. A Wi-Fi network uses wireless access points or routers to connect wireless devices to a wired network. Access points can provide internet access within their range to connected devices. While convenient, Wi-Fi networks have limitations such as a limited range, potential security issues, and signal interference between devices.
This document provides an introduction to networking and wireless networking infrastructure. It discusses key components needed for networking including network interface cards, cables, hubs, switches, access points, routers, modems, and internet service providers. It also describes common network types like LAN, MAN, and WAN. Wireless networking using WiFi technology is explained, along with wireless connection techniques and potential issues like slower speeds with more users. Common wireless networking hardware is also outlined.
The document provides information about basic local area networks (LANs). It defines LANs and wireless LANs, and describes their key characteristics such as topology and protocols. The document also discusses various network hardware including hubs, switches, bridges, routers, and network interface cards. It covers different types of network media like twisted pair, coaxial, fiber optic, and wireless. Finally, the document presents sample LAN implementations for home and business configurations.
1. Wireless networking uses radio waves rather than cables to connect devices in a network. It provides mobility and flexibility but is susceptible to interference.
2. Common wireless technologies include infrared and radio frequency. Wireless local area networks (WLANs) extend the boundaries of a wired network using access points.
3. Security measures for WLANs include encryption, authentication, limiting access through MAC address filtering, and following best practices like changing default passwords and enabling strong encryption.
The document provides an overview of computer networking basics including definitions, elements, and concepts. It discusses:
- The basic elements of computer networking including nodes, links, protocols, IP addresses, DNS, and firewalls.
- Network topologies like star, bus, ring, mesh and their advantages/disadvantages.
- Reference models including OSI model with its 7 layers and TCP/IP model with its 4 layers.
- Types of computer networks including LAN, MAN, WAN, VLAN, VPN, and PAN.
- Issues around networking standards and critiques of OSI and TCP/IP models.
This document provides an introduction and overview of computer networks. It defines what a network is as two or more connected computers that can share resources. The main reasons for computer networks are resource sharing, high reliability, and cost savings. It then discusses data communications, the components of a data communication system including the message, sender, receiver, transmission medium and protocol. It also defines different types of network topologies including mesh, star, bus, and ring as well as categories of networks based on size such as LANs, WANs, and MANs. Finally, it discusses network bandwidth and how it is measured in bits per second.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
1. Chapter 5
LANs and WLANs
Computer Concepts 2012
2. 5 Chapter Contents
Section A: Network Building Blocks
Section B: Wired Networks
Section C: Wireless Networks
Section D: Using LANs
Section E: Security Through Encryption
Chapter 5: LANs and WLANs 2
3. 5
SECTION A
Network Building Blocks
Network Classifications
LAN Standards
Network Devices
Clients, Servers, and Peers
Physical Topology
Network Links
Communications Protocols
Chapter 5: LANs and WLANs 3
4. 5 Network Classifications
Personal Area Network (PAN) – interconnection of personal
digital devices or consumer electronics
Local Area Network (LAN) – usually connects computers in a
single building
Metropolitan Area Network (MAN) – public high-speed
network with range of about 50 miles
Wide Area Network (WAN) – covers a large geographical
area and typically consists of several smaller networks
Chapter 5: LANs and WLANs 4
5. 5 LAN Standards
LAN technologies are standardized by the Institute of
Electrical and Electronics Engineers (IEEE) Project 802 –
Local Network Standards
– IEEE 802.3
– ARCnet
– Token Ring
– FDDI
– Ethernet
Chapter 5: LANs and WLANs 5
6. 5 Network Devices
Each connection point on a network is referred to as a node
To connect to a LAN, a computer requires network
circuitry, sometimes referred to as a network interface card
(NIC)
A networked peripheral, or network-enabled peripheral, is
any device that contains network circuitry to directly connect
to a network
A network device, or network appliance, is any electronic
device that broadcasts network data, boosts signals, or
routes data to its destination
Chapter 5: LANs and WLANs 6
8. 5 Clients, Servers, and Peers
Network devices can function as clients or as servers
– Application server
– File server
– Print server
Networks that include one or more servers can operate in
client/server mode
Chapter 5: LANs and WLANs 8
9. 5 Physical Topology
The arrangement of devices in a network is referred to as its
physical topology
– Star
– Ring
– Bus
– Mesh
– Tree
Two similar networks can
be connected by a device
called a bridge
Gateway is a generic term
for any device or software
code used to join two networks
Chapter 5: LANs and WLANs 9
10. 5 Network Links
A communications channel, or link, is a physical path or
frequency for signal transmissions
Bandwidth is the transmission capacity of a communications
channel
– Broadband
– Narrowband
Chapter 5: LANs and WLANs 10
11. 5 Communications Protocols
Rules for efficiently transmitting data from one network node
to another:
– Divide messages into packets
– Affix addresses to packets
– Initiate transmission
– Regulate flow of data
– Check for transmission errors
– Acknowledge receipt of transmitted data
Chapter 5: LANs and WLANs 11
12. 5 Communications Protocols
A packet is a “parcel” of
data that is sent across a
computer network
– Circuit-switching
technology vs. packet
switching technology
Chapter 5: LANs and WLANs 12
13. 5 Communications Protocols
Every packet that travels over a network includes the
address of its destination device
A MAC address is a unique number assigned to a network
interface card when it is manufactured
An IP address is a series of numbers used to identify a
network device
IP addresses can also be obtained through DHCP
Chapter 5: LANs and WLANs 13
15. 5 Wired Network Basics
A wired network uses cables to connect network devices
Wired networks are fast, secure, and simple to configure
Devices tethered to cables
have limited mobility
Chapter 5: LANs and WLANs 15
16. 5 Ethernet
Simultaneously broadcasts data packets to all network
devices
– IEEE 802.3
– CSMA/CD protocol
Vary in speed from 10Mbps to 100Gbps
Chapter 5: LANs and WLANs 16
23. 5
SECTION C
Wireless Networks
Wireless Basics
Bluetooth
Wi-Fi
Wi-Fi Equipment
Wi-Fi Setup
Chapter 5: LANs and WLANs 23
24. 5 Wireless Basics
A wireless network transports data from one device to
another without cables or wires
– RF signals
• Transceiver
– Microwaves
– Infrared light
Slower than wired networks
Security concerns
Chapter 5: LANs and WLANs 24
25. 5 Bluetooth
Bluetooth is a short-range, wireless network technology
designed to make its own connections between electronic
devices, without wires, cables, or any direct action from a
user
Chapter 5: LANs and WLANs 25
26. 5 Wi-Fi
Wireless networking technologies that are compatible with
Ethernet
MIMO technology uses two or more antennas to send
multiple sets of signals between network devices
Chapter 5: LANs and WLANs 26
28. 5 Wi-Fi Equipment
If your computer is not pre-equipped with wireless
circuitry, you can purchase and install a Wi-Fi adapter
Chapter 5: LANs and WLANs 28
30. 5 Wi-Fi Setup
Set up the router
Connect to the router with a computer
Configure the router
Access the router setup utility
Create a new router password
Chapter 5: LANs and WLANs 30
31. 5 Wi-Fi Setup
Enter an SSID for the network
Activate WEP, WPA, or PSK and create an encryption key
Set up the wireless workstations
Connect an Internet access device
Chapter 5: LANs and WLANs 31
33. 5
SECTION D
Using LANs
LAN Advantages and Challenges
Sharing Files
Sharing Printers
Network Troubleshooting
Chapter 5: LANs and WLANs 33
34. 5 LAN Advantages
and Challenges
LANs enable people to work together
Sharing networked software can reduce costs
Sharing data on a LAN can increase productivity
Sharing networked hardware can reduce costs
Sharing networked hardware can provide access to a wide
range of services and specialized peripheral devices
Chapter 5: LANs and WLANs 34
35. 5 LAN Advantages
and Challenges
Resources become unavailable when network malfunctions
Networks may be vulnerable to unauthorized access
– More vulnerable than standalone computers
Wireless networks can be tapped from any computers within
range of the wireless signal
Networked computers are susceptible to an increasing
number of worms, Trojan horses, and blended threats
Chapter 5: LANs and WLANs 35
36. 5 Sharing Files
If you use Windows, it
automatically detects
available LANs any time
you turn on a workstation
To connect to a shared
resource, you might be
asked for a user ID and
password
Chapter 5: LANs and WLANs 36
39. 5 Sharing Files
A homegroup is a collection of trusted networked computers
that automatically share files and folders
Chapter 5: LANs and WLANs 39
40. 5 Sharing Printers
Three setups allow for printer sharing:
– Set up printer sharing using a workstation printer
– Set up printer sharing using a print server
– Install printer with built-in networking
Chapter 5: LANs and WLANs 40
42. 5 Troubleshooting
Network problems can stem from a variety of sources
– Cables
– Signal strength
– Security
– Interference
– Network devices
– Settings
– Switches
Chapter 5: LANs and WLANs 42
43. 5
SECTION E
Security Through Encryption
Wi-Fi Security
Encryption
Chapter 5: LANs and WLANs 43
44. 5 Wi-Fi Security
Wireless networks are much more susceptible to
unauthorized access and use than wired networks
LAN jacking, or war driving, is the practice of intercepting
wireless signals by cruising through an area
Chapter 5: LANs and WLANs 44
45. 5 Wi-Fi Security
Wireless encryption scrambles data transmitted between
wireless devices and then unscrambles the data only on
devices that have a valid encryption key
– WEP (Wired Equivalent Privacy)
– WPA (Wi-Fi Protected Access)
– WPA2
– PSK
Activate encryption by using a wireless network key
Chapter 5: LANs and WLANs 45
47. 5 Encryption
Encryption transforms a message so that its contents are
hidden from unauthorized readers
– Plaintext has not yet been encrypted
– An encrypted message is referred to as ciphertext
Decryption is the opposite of encryption
– Cryptographic algorithm
– Cryptographic key
Chapter 5: LANs and WLANs 47
48. 5 Encryption
Weak vs. strong encryption
AES (Advanced Encryption Standard)
Encryption methods can be broken by the use of expensive,
specialized, code-breaking computers
– Brute force attack
Chapter 5: LANs and WLANs 48
49. 5 Encryption
Public key encryption (PKE) eliminates key-distribution
problem, by using one key to encrypt a message and
another key to decrypt the message
Chapter 5: LANs and WLANs 49
50. 5 Encryption
When personal computer users want to encrypt e-mail or
other documents, they turn to public key encryption software
called PGP (Pretty Good Privacy)
Chapter 5: LANs and WLANs 50