Sie sind auf Seite 1von 76

Computer Concepts for End-Users [03-60-104]

Lecture 7
Instructor: Dr. Addy (Adwoa) Donyina
email: adonyina@uwindsor.ca) Website: http://cs.uwindsor.ca/~adonyina/

Chapter 5
Local Area Networks

Computer Concepts 2013

Chapter Contents
Section A: Network Building Blocks

Section B: Wired and Wireless Technologies


Section C: Network Setup Section D: Sharing Files Section E: Wireless Security

Chapter 5: Local Area Networks

Section A: Network Building Blocks


Network Classifications

LAN Advantages and Disadvantages


Network Devices Network Links Communications Protocols

Chapter 5: Local Area Networks

Network Classification
History

Past: PC functioned as standalone units

One person interacted with one unit

One of the most significant network ideas was by Bob Metcalf in 1976

His plan for transporting data between computers is a key element in computer networking

Network Classifications
Personal Area Network (PAN) interconnection of personal digital devices or consumer electronics

Ex. Computer to handheld device

Local Area Network (LAN) usually connects computers in a single building

Ex. School computer Labs or Home networks

Metropolitan Area Network (MAN) public high-speed network with range of about 50 miles

Ex. Local internet service provider

Wide Area Network (WAN) covers a large geographical area and typically consists of several smaller networks

Ex. Internet (Worlds largest WAN)


6

Chapter 5: Local Area Networks

LAN Advantages
LANs enable people to work together Groupware, online conference, webcast etc. Sharing networked software can reduce costs Software site licenses for networks Sharing data on a LAN can increase productivity Provides authorized users access to data stored on a network or workstation Sharing networked hardware can reduce costs Ex. Connect 1 expensive printer on LAN vs many printers for each computer

Sharing networked hardware can provide access to a wide range of

services and specialized peripheral devices

Multiple users to access internet services

Chapter 5: Local Area Networks

LAN Disadvantages
If the LAN malfunctions then

all the resources on the LAN are unavailable until the network is repaired Intruders can access data stored on network server or other workstation Ex. If worm gets through LAN security then every computer on the network is at risk
8

LANs are vulnerable to unauthorized access

LANs are more vulnerable to malicious code

Chapter 5: Local Area Networks

Network Devices
Node Each connection point on a network contains a computer, networked peripheral/device network interface card (NIC) The network circuitry that computers require to connect to a LAN

A networked peripheral, or network-enabled peripheral

is any device that contains network circuitry to directly connect to a network A network device, or network appliance is any electronic device that broadcasts network data, boosts signals, or routes data to its destination Router

Acts as central distribution point for getting data to its destination

Chapter 5: Local Area Networks

Network Devices

Chapter 5: Local Area Networks

10

Network Links
A communications channel, or link

is a physical path or frequency for signal transmissions is the transmission capacity of a communications channel

Bandwidth

Broadband Narrowband

Chapter 5: Local Area Networks

11

Communications Protocols
Rules for efficiently transmitting data from one

network node to another:


Divide messages into packets Affix addresses to packets Initiate transmission Regulate flow of data Check for transmission errors Acknowledge receipt of transmitted data

Handshaking Communication protocol that 2 computers on a network use


Chapter 5: Local Area Networks 12

Communication Protocols
Signals that travel over the network Digital signal

Transmitted as bits

Analog

Can assume any value with Specified frequency

13

Communication Protocols
How messages are transported on the network Circuit switching
Establishes a dedicated private link (direct pipeline) Ex. Telephone systems

Packet switching

Divides the message into several packets, that can be routed independently

14

Communications ProtocolsCircuit Switching Network

Chapter 5: Local Area Networks

15

Communications Protocols
A packet

is a parcel of data that is sent across a computer network

Chapter 5: Local Area Networks

16

Communications Protocols

Chapter 5: Local Area Networks

17

Communications Protocols
Every packet that travels over a network

includes the address of its destination device A MAC address

is a unique number assigned to a network interface card when it is manufactured

An IP address is a series of numbers used to identify a network device IP addresses can also be obtained through

DHCP
Chapter 5: Local Area Networks 18

Chapter Contents
Section A: Network Building Blocks

Section B: Wired and Wireless

Technologies Section C: Network Setup Section D: Sharing Files Section E: Wireless Security

Chapter 5: Local Area Networks

19

Section B: Wired and Wireless Technologies


Wired Basics

Ethernet
Wireless Basics Bluetooth Wi-Fi

Chapter 5: Local Area Networks

20

Wired Basics
A wired network

uses cables to connect network devices Advantages

fast, secure, and simple to configure Devices tethered to cables have limited mobility

Disadvantages

Chapter 5: Local Area Networks

21

Ethernet
Ethernet is a wired network technology that is defined by IEEE 802.3 standards Simultaneously broadcasts data packets to all

network devices

IEEE 802.3 CSMA/CD protocol

Vary in speed from 10Mbps to 100Gbps

Chapter 5: Local Area Networks

22

Ethernet

Chapter 5: Local Area Networks

23

Ethernet

Chapter 5: Local Area Networks

24

Ethernet- Ethernet Adapters

Chapter 5: Local Area Networks

25

Wireless Basics
A wireless network transports data from one

device to another without cables or wires


Radio Frequency (RF) signals (Radio Waves)

Transceiver- transmitter + receiver

Microwaves-electronic signals Infrared light- ex. Remote control

Slower than wired networks Security concerns

Chapter 5: Local Area Networks

26

Bluetooth
Bluetooth

is a short-range, wireless network technology designed to make its own connections between two devices

Chapter 5: Local Area Networks

27

Wi-Fi
Wi-Fi

refers to a set of wireless networking technologies defined by IEEE 802.11 standards


Wireless ad-hoc protocol Wireless infrastructure protocol

Chapter 5: Local Area Networks

28

Wi-Fi
Wireless ad-hoc protocol

Devices broadcast directly to each other

Wireless infrastructure protocol

Centralized broadcasting device coordinates communication among network devices

29

Wi-Fi

Chapter 5: Local Area Networks

30

Wi-Fi
If your computer is not pre-equipped with

wireless circuitry, you can purchase and install a Wi-Fi adapter

Chapter 5: Local Area Networks

31

Chapter Contents
Section A: Network Building Blocks

Section B: Wired and Wireless Technologies


Section C: Network Setup Section D: Sharing Files Section E: Wireless Security

Chapter 5: Local Area Networks

32

Section C: Network Setup


Setup Overview

Router Installation
Router Configuration Internet Connection Device Connection

Chapter 5: Local Area Networks

33

Setup Overview
Plug in the router Connect the router to a computer Configure the router Access the router setup utility Create a new router password Enter an SSID for the network Activate WEP, WPA, or PSK and create an encryption key 8. Connect an Internet access device 9. Set up the wireless workstations
1. 2. 3. 4. 5. 6. 7.
Chapter 5: Local Area Networks 34

Router Installation
Look for a Wireless-N router that includes a

Gigabit Ethernet switch

Wired and wireless connections

Make sure the number of Ethernet ports is

sufficient for the number of wired devices that you intend to connect

Chapter 5: Local Area Networks

35

Router Installation

Chapter 5: Local Area Networks

36

Network device Example


Home Network

Wireless router includes


Ethernet switch Internet gateway

37

Router Configuration
Before using your network

adjust the routers configuration settings to make sure your network is secure

Stored in routers EEPROM (router memory) You must connect a computer to the router You can use your computers browser to access the router configuration utility

Chapter 5: Local Area Networks

38

Router Configuration

Chapter 5: Local Area Networks

39

Router Configuration
An SSID (service set identifier)

is the name of a wireless network

Use the router configuration software to

change the default SSID

Chapter 5: Local Area Networks

40

Router Configuration
Each workstation requires a unique address

for sending and receiving data

Chapter 5: Local Area Networks

41

Router Configuration
Wireless encryption

scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key

WEP WPA
PSK

Chapter 5: Local Area Networks

42

Router Configuration
WEP (Wired Equivalent Privacy) Provide level of confidentiality similar to wired network Very easy to bypass

Weak security measure

WPA (Wi-Fi Protected Access)/ WPA2 Stronger protection by making sure that packets gave not been intercepted or tampered with Type of WPA is PSK

Used on most home networks


43

Wireless Encryption Key (network security

key)

Is used for scrambling and unscrambling data Like a password except longer (illustrated on next slide)

44

Router Configuration

Chapter 5: Local Area Networks

45

Internet Connection
modem

designed to carry data to and from the Internet


Now a days, a device supplied by Your Internet service provider has a standard Ethernet port that can be connected to a router Most routers supply a WAN port designed for an Internet connection Plug a standard network cable into the routers WAN port and connect the other end of the cable into the Internet modem
46

Chapter 5: Local Area Networks

Internet Connection

Chapter 5: Local Area Networks

47

Wireless Connection
Macs and Windows OS(if wireless capable)

automatically sense available networks and give you the option of connecting to them
The computer is in range of your router

Chapter 5: Local Area Networks

48

Ex. Windows Wireless Connection


Windows computer

Chapter 5: Local Area Networks

49

Ex. Mac Wireless connection

Chapter 5: Local Area Networks

50

Wireless connection to other devices


Any device that has Wi-Fi capability should

be able to connect to your network

Chapter 5: Local Area Networks

51

Ex. Printer Device Connection on a network

Easiest
Chapter 5: Local Area Networks 52

Chapter Contents
Section A: Network Building Blocks

Section B: Wired and Wireless Technologies


Section C: Network Setup Section D: Sharing Files Section E: Wireless Security

Chapter 5: Local Area Networks

53

Section D: Sharing Files


File Sharing Basics

Accessing Shared Files


Sharing Your Files File Servers Network Troubleshooting

Chapter 5: Local Area Networks

54

File Sharing Basics


File sharing

allows files containing documents, photos, music, and other data to be accessed from computers other than the one on which they are stored Once your network gives you access to other computers on the network, you can view a list of files stored there

Chapter 5: Local Area Networks

55

Accessing Shared Files


To see a list of devices on your network

you can use your operating systems file management utility is a setting that affects whether your computer can see other computers on a network, and whether your computer can be seen by others

Network discovery

Chapter 5: Local Area Networks

56

Accessing Shared Files

Chapter 5: Local Area Networks

57

Sharing Your Files

Chapter 5: Local Area Networks

58

Sharing Your Files


When you activate file sharing: files in Public folders can be accessed by other network users You also can make specific files shareable If you want the convenience of sharing files, limit

what you share and who you share it with:


Assign permissions to files Limit sharing to specific people Remove sharing from files you no longer want to share Use a homegroup if your network is composed of Windows computers A homegroup is a collection of trusted Windows computers that automatically share files and folders
59

Chapter 5: Local Area Networks

Assigning Permissions to a shared file


Read and write Permission

Open + view +edit +delete


Open + view Allows people to put files in folders But people cannot open/copy/ change files

Read permission

Write only

60

Sharing Your Files

Chapter 5: Local Area Networks

61

File Servers
A file server

is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations

Chapter 5: Local Area Networks

62

Troubleshooting
Network problems can

stem from a variety of sources


Cables Signal strength Security Interference Network devices Settings Switches


63

Chapter 5: Local Area Networks

Chapter Contents
Section A: Network Building Blocks

Section B: Wired and Wireless Technologies


Section C: Network Setup Section D: Sharing Files Section E: Wireless Security

Chapter 5: Local Area Networks

64

Section E: Wireless Security


Wi-Fi Security

Encryption

Chapter 5: Local Area Networks

65

Wi-Fi Security
Weakness

Networks with wired or wireless connections are vulnerable to a variety of threats

Because wireless signals are broadcast through the air; and like the signals from a radio station, they can be picked up by any device equipped with a receiver tuned to the right frequency

Chapter 5: Local Area Networks

66

Wi-Fi Security

Chapter 5: Local Area Networks

67

Wi-Fi Security
network router maintains

a list of clients that are accessing your network using wired or wireless connections

Chapter 5: Local Area Networks

68

Encryption
Encryption

transforms a message so that its contents are hidden from unauthorized readers

Plaintext has not yet been encrypted An encrypted message is referred to as ciphertext

Decryption

is the opposite of encryption

Chapter 5: Local Area Networks

69

Encryption
Cryptographic algorithm

Is a procedure for encrypting/decrypting a message Is a word, number or phrase that must be known to encrypt or decrypt a message

Cryptographic key (Key)

Ex. Caesars Algorithm: offset letter of the

algorithm by 3 letters ( shown below) key=3

70

Encryption
Weak encryption

Easy to decrypt without the algorithm/key Ex. Simple substitution Very difficult to break Ex. AES (Advanced Encryption Standard) used

Strong encryption

for WPA2 Encryption methods can be broken by the use of expensive, specialized, code-breaking computers
Chapter 5: Local Area Networks 71

Encryption
Symmetric Key Encryption

Key is used to encrypt and decrypt the message Ex. Caesars encryption method Has a key-distribution problem
eliminates key-distribution problem, by using one key to encrypt a message and another key to decrypt the message
72

Public key encryption (PKE)

Chapter 5: Local Area Networks

Public Key Encryption

Chapter 5: Local Area Networks

73

Encryption
When personal computer users want to

encrypt e-mail or other documents, they turn to public key encryption software

such as PGP (Pretty Good Privacy), GnuPG, or AxCrypt

Chapter 5: Local Area Networks

74

Example PGP Encryption

Chapter 5: Local Area Networks

75

Chapter 5 Complete Computer Concepts 2013

Das könnte Ihnen auch gefallen