chapter 5 lans and wlans

19
Computer Concepts 2012 Chapter 5 LANs and WLANs

Upload: patia

Post on 23-Feb-2016

53 views

Category:

Documents


0 download

DESCRIPTION

Chapter 5 LANs and WLANs. Wireless Basics. A wireless network transports data from one device to another without cables or wires Slower than wired networks Susceptible to interference Security concerns Signals in air are easily intercepted. RF Radio Frequency. RF signals - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Chapter  5 LANs and WLANs

Computer Concepts 2012

Chapter 5LANs and WLANs

Page 2: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 2

Wireless Basics A wireless network transports data from one device to

another without cables or wires Slower than wired networks

– Susceptible to interference Security concerns

– Signals in air are easily intercepted

Page 3: Chapter  5 LANs and WLANs

5 RF Radio Frequency

Chapter 5: LANs and WLANs 3

– RF signals– radio frequency or radio waves

• Transceiver • sends and receives

Page 4: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 4

• Microwaves • line-of-sight transmissions• corporate MANs]

Microwave Transmission

Page 5: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 5

• Infrared light• Clear line-of-sight• Short distances• PAN personal network

Infrared Light

Page 6: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 6

Bluetooth Short-range, wireless network technology

– designed to make its own connections between electronic devices• without wires, cables, or direct action from user

Page 7: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 7

Wi-Fi Equipment

Page 8: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 8

Wi-Fi Equipment If your computer is not pre-equipped with wireless circuitry,

you can purchase and install a Wi-Fi adapter

Page 9: Chapter  5 LANs and WLANs

5 Wi-Fi Setup

Chapter 5: LANs and WLANs 9

Page 10: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 10

Wi-Fi Setup Change Password upon logging onto to wireless router

– Logon via browser with router IP address

Enter an SSID for the network– Name your network

• This differentiates it from nearby networks

Choose WEP, WPA, or PSK – This activates encryption protection between nodes

Set up the wireless workstations Connect an Internet access device

Page 11: Chapter  5 LANs and WLANs

5 Wi-Fi Security Router Interface

Chapter 5: LANs and WLANs 11

Page 12: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 12

Wi-Fi Security Wireless encryption scrambles data transmitted between

wireless devices and then unscrambles the data only on devices that have a valid encryption key– WEP (Wired Equivalent Privacy)– WPA (Wi-Fi Protected Access)– WPA2– PSK

Activate encryption by using a wireless network key

Page 13: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 13

Encryption Encryption transforms a message so that its contents are

hidden from unauthorized readers– Plaintext has not yet been encrypted– An encrypted message is referred to as ciphertext

Decryption is the opposite of encryption– Cryptographic algorithm– Cryptographic key

Page 14: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 14

Encryption Public key encryption (PKE) eliminates key-distribution

problem, by using one key to encrypt a message and another key to decrypt the message

Page 15: Chapter  5 LANs and WLANs

5 SECTION D

Chapter 5: LANs and WLANs 15

Using LANs LAN Advantages and Challenges Sharing Files Sharing Printers Network Troubleshooting

Page 16: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 16

LAN Advantages LANs enable people to work together

Sharing networked software can reduce costs

Sharing data on a LAN can increase productivity

Sharing networked hardware can reduce costs

Sharing networked hardware can provide access to a wide range of services and specialized peripheral devices

Page 17: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 17

LAN Challenges Resources become unavailable when network malfunctions

Networks may be vulnerable to unauthorized access– More vulnerable than standalone computers

• Wireless networks can be tapped from any computers within range of the wireless signal

Networked computers are susceptible to an increasing number of worms, Trojan horses, and blended threats

Page 18: Chapter  5 LANs and WLANs

5

Chapter 5: LANs and WLANs 18

Sharing Printers Three setups allow for printer sharing:

– Set up printer sharing using a workstation printer– Set up printer sharing using a print server– Install printer with built-in networking

Page 19: Chapter  5 LANs and WLANs

Computer Concepts 2012

Chapter 5 Complete