Tonga Institute of Higher Education IT 141

Download Report

Transcript Tonga Institute of Higher Education IT 141

Tonga Institute of Higher Education IT 141 Lecture 6: LANS and WLANS

1

Network Classifications

• Classified according to size and geographic scope PAN (personal area network) – within a range of 30 feet (10 meters) NAN (neighborhood area network) – within a limited geographical area, usually over several buildings LAN (local area network) – connects personal computers within a very limited geographical area MAN (metropolitan area network) – public high-speed network capable of voice and data transmission within a range of about 80 km WAN (wide area network) – covers a large geographical area usually consists of several smaller networks

We will focus on LAN because you are most likely to encounter this type of network.

2

LAN standards

    It ranges from simple households to large businesses LAN standards – LAN technologies are standardized by the Institute of Electrical and Electronic Engineers (IEEE). E.g. – IEEE 802.3 is sometimes used to refer to a network standard in articles and advertisements Popular LAN standards – ARCnet, Token Ring, FDDI WERE POPULAR. Today, most LANS configured with Ethernet technology and use compatible Wi-Fi standards in applications that require wireless access.

3

NETWORK DEVICES

• • • • • •

node

– A single device connected to a network

Workstation

a network – personal computers connected to

Modem

– uses phone lines to transmit data over a network

Network Interface Card (NIC)

– network circuitry required to connect a computer to a LAN

Networked peripheral

– any device that has network circuitry to directly connect to a network

Network attached storage (NAS)-

that directly connects to a network storage device 4

5

CLIENTS, SERVERS, AND PEERS

Servers

– a computer that provides services for other computers on a network called clients E.g.

– Application server – run application software for network workstations – File server – stores files and supplies them to workstations on request 6

7

CLIENTS, SERVERS, AND PEERS

 

Workgroup (Peer-to-Peer)

  A workgroup is a group of computer connected by a LAN, but not sharing similar information, like usernames and passwords.

This is commonly used in networks with less than five computers where each user has their own computer

Domain (Client-Server)

  A domain allows all computers to be a part of a group that shares usernames, passwords and various settings.

This allows a user to log into any computer on a network with the same password, as well as using the same settings 8

9

Interconnecting various networks

• •

Bridge

– device that connects two similar networks

Gateways

– device or software code used to join two networks that use different topologies. Term for any device or software to join two networks, even if they use different protocols or address range.

10

NETWORK LINKS

• • •

“communications channel” or link

: physical path or a frequency for signal transmissions Data in a network with

wired links

travels from one device to another over CABLES (E.g. – Ethernet, HomePNA, HomePlug) Networks without wires transport data through the air or

wireless network technologies

(E.g. – Wi-fi, Bluetooth) 11

BANDWIDTH

   

Bandwidth

channel) - how much data can be transmitted over a network link over a certain amount of time (transmission capacity of a communications  E.g. Coaxial cable brings more than 100 channels of cable TV, and has a higher bandwidth than your home telephone line.

56Kbps (dial-up), 10Mbps (cable TV), 100Mbps (computer lab) Network is slow your "bandwidth" is small. If something has a lot of bandwidth it is called

broadband

(Ethernet networks, cable TV) If it has little bandwidth, it is called

narrowband

(phone lines, infrared ) 12

COMMUNICATIONS PROTOCOLS

• • • •

Protocol

– a set of rules for interacting and negotiating.

Communications protocol

node to another – set of rules for efficiently transmitting data from one network

Handshaking

– process where a protocol helps two network devices communicate

TCP/IP

– best known communications protocol 13

COMMUNICATIONS PROTOCOLS

• Protocols are responsible for the following aspects of network communications: – Dividing messages into packets – Attaching addresses to packets – Initiating transmission – Regulating the flow of data – Checking for transmission errors – Acknowledging receipt of transmitted data 14

DATA TRAVELLING OVER A NETWORK

15

COMMUNICATIONS PROTOCOLS

• • • • Digital signals are transmitted as bits using limited set of frequencies Analog signals can assume any value within a specified range of frequencies.

Digital equipment is sensitive to only two frequencies that represents 1s and 0s. If there are errors, protocols usually correct these 16

PACKETS

• • • Most communication protocols will divide data into small pieces, called packets, when sending over a network link

Packets

– parcel of data that is sent across a computer network Each packet contains – address of its sender, destination address, a sequence number, some data. At destination, packets rearrange themselves into original message according to sequence numbers.

17

18

SENDING MESSAGES

• • Circuit switching – technology used by communications networks, such as the telephone system Packet switching – technology, which divides a message into several packets that can be routed independently to their destination. Every packet has destination addresses that communication protocols use 19

ADDRESS

• • • Every node on a network has at least one address so that other nodes know how to send data to it. A node may have other addresses depending on the protocols it uses.

Two commonly used Addresses: – Physical Address (network address, MAC address) – Logical Address (IP address) 20

IP ADDRESSES

• • Assigned IP addresses are semi-permanent and stay the same every time you boot your computer. (

Static IP addresses

) It can also be obtained through DHCP (Dynamic Host Configuration Protocol). This protocol was designed to distribute IP addresses automatically. The next time you boot, you will be assigned with a different IP address. (

Dynamic IP addresses

) 21

Packets reaching destination

• Packets might not travel directly to their destination. When it reaches its destination, it is checked for errors one last time and then the packets are reassembled into their original configuration.

22

WIRED NETWORKS

• • • • • • Uses cables to connect devices. Advantages – fast, secure, simple to configure.

Disadvantages – devices connected have limited mobility. Running cables can be a problem with some building codes. Drilling can also be a problem Examples– Ethernet, HomePNA, HomePlug technologies Home PNA – uses telephone wires and coaxial cables Powerline network – uses premises electrical wiring to form the infrastructure for a LAN 23

   

ETHERNET

Ethernet

– simultaneously broadcasts data packets to all network devices. A pack is accepted by the device to which it is addressed Ethernet relies on

CSMA/CD

with Collision Detection]. [Carrier Sense Multiple Access  Takes care of network devices transmitting packets at the same time  It detects collision, deletes the colliding signals, resets network and prepares to retransmit data

How fast?

Original carried data over a coaxial cable bus topology at 10 Mbps. Today, up to 40 or 100 Gbps Ethernet is popular because it is easy to understand, available almost everywhere, allows flexibility in network, and compatible with Wi-Fi networks 24

ETHERNET EQUIPMENT

• • • • • Two or more Ethernet-ready computers (look for an Ethernet port, and determine it’s speed. If the computer doesn’t have one, install an Ethernet adapter, or Ethernet card/NIC) An Ethernet router (hub – device that links two or more nodes of a wired network. Switch – sends data only to the devices specified as the destination. Router – ship data from one network to another) Surge strip or UPS Network Cables for each computer Internet access device such as cable modem or DSL modem and corresponding cables 25

NETWORK DEVICES

• • • •

Network device/appliance

– electronic device that broadcasts network data, boosts signals, or routes data to its destination

Hub/Switch

– a device that connects nodes on a network together (hub slow, switch fast)

Router

– connects two different networks together (like a local network and the internet)

Repeater

– amplifies signals on a network so that they don’t lose data to noise 26

Types of Links/Cables

Twisted Pair cable – 4 copper wires twisted around each other. These are what are used for phone lines and Ethernet cables. They will end in a RJ-45 plug for Ethernet, or RJ-11 for a phone line Coax Cable – one wire that is surrounded by insulators to reduce data loss. Used for cable television and modems sometimes Fiber optic – A bundle of extremely small glass tubes. They do not use electric signals like the other cables, but use lasers instead. They are very fast and expensive 27

28

• • • • • •

Wireless Networks/Cable-less

Does not use cables or wires

USES

1. Radio – Uses what is called RF signals (radio waves). Sent and received with a transceiver (a transmitter and receiver combined) 2. Microwaves – These can carry a lot of data, but need a direct line of sight to work well Because radio and micro waves cannot bend to go around the curve of the earth, satellites are used in space to transmit signals around the globe 3. Infrared light – uses light waves to transmit data. Only good for very short distances with clear line of sight 29

Wireless networks

• • Advantages – Mobility – – No unsightly cables Power spikes are much less likely to run through cables to damage workstations Disadvantages – Was more expensive in the past – Speed – Range – Licensing – security 30

POPULAR TECHNOLOGY FOR WIRELESS NETWORKS

1. Wi-Fi 2. Bluetooth 3. Wireless USB (WUSB) 4. Wireless HD (WiHD) 31

Bluetooth

• • • • • • • Short-range wireless network technology Bluetooth networks automatically forms when two or more Bluetooth devices come within range of each other.

Piconet – a Bluetooth network Operates at the unlicensed 2.4GHz frequency Not for a collection of workstation but for mouse, keyboard or printer to computer connection For PAN Speed: Bluetooth 2.1 – 3 Mbps, range of 3 to 3000 feet. Bluetooth 3 – operates in the 6 to 9 GHz frequency range, peak speeds of 480 Mbps 32

Wi-Fi

• • • Set of wireless networking technologies defined by IEEE 802.11 standards that are COMPATIBLE with Ethernet.

Transmits data as radio waves over 2.4 GHz or 5.8 GHz frequencies Speed and range can be improved with various technologies including MIMO (multiple-input multiple-output) 33

Wi-Fi Standards

34

WIRELESS SETUP

35

WIRELESS SETUP

• • • • Check the computer’s if it has wireless capability If not, you can add a Wi-Fi adapter and plug it into a PC slot or USB port Wireless ad-hoc network: devices broadcasts directly to each other Wireless infrastructure network: there a wireless access point (wireless router) 36

WIRELESS SETUP

• • • • • • • • • Set up the router Connec to the router with a computer Configure router Access the router setup utility Create a new router password Enter a SSID for the network Activate WEP, WPA or PSK and create and encryption key Set up the wireless workstations Connect an Internet access device 37

Security through Encryption

• • • • LAN jacking – hackers interception signals driving through wireless enabled premises Pinpoint wireless access point Can see hackers in the list of clients accessing your network Preventing interception is difficult, but encrypting makes data useless to intruders 38

WIRELESS ENCRYPTION

• • • • WEP (Wired Equivalent Privacy) WPA (Wi-Fi Protected Access), WPA2 making sure that packets have not been intercepted . PSK (pre-shared key) a type of WPA, and PSK2 To activate, use the router configuration utiliteis to select and encryption protocol, and create a wireless network key Basis for scrambling and unscrambling. Key is similar to password.

39

ENCRYPTION

- Transforms a message in such a way that its content are hidden from unauthorized readers - Can be used to - Scramble data over wired or wireless networks to prevent intrusions - Security credit card numbers and other personal information transferred from shoppers’ computers to e-commerce sites - Encrypting computer databases - Scrambling email contents to maintain privacy 40

How encryption works

• • • • Original message (plaintext/cleartext) Is encrypted to ciphertext. Converting ciphertext to plaintext is decryption.

Uses cryptographic algorithm and key Cryptographic algorithm: way for encrypting or decrypting a message Eg. Do not trust Brutus (see next slide) encrypted to GRQRWWUXVWEUXWXV 41

ENCRYPTION

The algorithm for Caeser’s encryption technique was to offset letters of the alphabet.

42

Weak & Strong encryption

• • • • • • • Weak encryption: Caeser’s simple substitution key Strong encryption: very difficult to break – E.g. Advanced Encryption Standard (AES) used for WPA2 Breaking encryption methods uses expensive, specialized, code-breaking computers 32-bit key, 4.2 billion numbers, 40-bit key, 1 trillion numbers.

There is 56-bit and 64-bit 128-bit and 256-bit takes a long time to decrypt Most encryption uses 128-bit 43

Public key encryption

• • Symmetic key encryption: KEY used to encrypt a message is also used to decrypt Public key encryption: uses one KEY to encrypt a message, but ANOTHER KEY to decrypt the message 44

Public Key encryption

45