Romney Bake Brian Peterson Clay Stephens Michael Hatheway.

Slides:



Advertisements
Similar presentations
SEMINAR ON Wi-Fi.
Advertisements

Wi-Fi Technology.
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
By Abdullah Al-Dossary Ahmad Al-Suhaibani
Wireless Router Setup. Internet Cable Internet Cable (Blue) Machine Cable (Yellow) Power Plug (Black) Reset Button (Red)
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1 Wireless LANs. 2 Introduction Types of Communication Networks. LAN’s Configurations. Wireless Technology. –Definition. –Applications. –Example. Communications.
Introduction to Computer Networking. Wireless Network.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
COMPUTER NETWORKS.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
1 BASIC TELECOMMUNICATIONS Wireless fidelity x.
Network Topologies An introduction to Network Topologies and the Link Layer.
NETWORKING COMPONENTS Zach Avis. Hub A hub is a low cost way to connect two computers. A hub can also act as a repeater. When a signal comes from one.
1 Networks. 2 What is a Computer Network? A group of computers and/or devices connected together Types of Networks LAN WAN.
Basic Networking Components
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Communications & Networks
Chapter 5: Computer Networks
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Wrocław University of Technology, Faculty of Fundamental Problems of Technology. 1.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Thornbury U3A Computer Group Wireless Networking (Part 1) September 2006 Mike Farquhar.
Common Devices Used In Computer Networks
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Unit 1—Computer Basics Lesson 7 Networks.
Computer Concepts 2014 Chapter 5 Local Area Networks.
 Introduction  Components of Wi-Fi and its working  IEEE Architecture  Advantages and Limitations.
Living Online Module Lesson 23 — Networks and Telecommunication
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
PRESENTATION ON WI-FI TECHNOLOGY
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Computers Are Your Future Eleventh Edition
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Setting Wireless Network At Home By: Parveen Sharma.
Lecture 24 Wireless Network Security
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
CSC 116 – Computer Networks Fall 2015 Instructor: Robert Spengler.
Wireless Security John Himmelein Erick Andrew Christian Adam Varun Bapna.
TOPIC 1.3 INTRODUCTION TO NETWORKING. Router – A netwok interconnection device & associated software that links two networks. The networks being linked.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Network media, protocols and networking standards, networking hardware.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
Computer Networks CSC September 23,
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
ICT Unit 4: Network and the effects of using them
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Instructor Materials Chapter 6 Building a Home Network
INTRODUCTION TO COMPUTER NETWORKS
Chapter 4 Computer Networks – Part 2
Network Infrastructure
Wireless Fidelity 1 1.
Wireless Local Area Network (WLAN)
Chapter 6 Networks Communicating and Sharing Resources
Wi-Fi Technology.
Chapter 4: Data Communication and Networks
INTRODUCTION TO COMPUTER NETWORKS
INTRODUCTION TO COMPUTER NETWORKS
Presentation transcript:

Romney Bake Brian Peterson Clay Stephens Michael Hatheway

Outline Introduction Topology Advantages/Disadvantages Hardware A, B, G, N Comparison Media Access Controls/Data Transmission Security Types Router Configuration Questions

Introduction & History Wireless connections were originally developed for mobile computing devices, such as laptops, but is now increasingly used for more services, including Internet and VoIP phone access and basic connectivity of consumer electronics such as televisions and DVD players. First Wireless LAN developed in 1971, called ALOHANET.

Topology Internet

Advantages No cables (Outdoor uses) Mobility Widely available products Global set of standards Available in more than 300,000 hot spots WPA and WPA2 securities Cheaper/Comparable prices

Drains batteries on laptops Security issues Default settings for access points and routers Potential interoperability between brands Often slower than wired connections Limited range Disadvantages

Hardware Access Point (AP) Connects a group of wireless devices to an adjacent wired LAN Relays data between connected wireless devices in addition to a (usually) single connected wired device

Wireless Adapter (WNIC) Allows a device to connect to a wireless network Connects by either PCI, USB, PCMCIA

Wireless Router Allows wired and wireless ethernet LAN devices to connect to a (usually) single WAN device such as cable modem or DSL modem allows all three devices (mainly the access point and router) to be configured through one central utility

Range Extender Extends the range of an existing wireless network Allows signal area to reach around barriers such as those created in L-shaped corridors Increase in latency

802.11a, b, g, n

Media Access Control Uses Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), similar to CSMA/CD in wired Ethernet Computers listen before transmitting, if no one else is transmitting, they transmit

Data Transmission Distributed Coordination Function Relies on computers to physically listen before transmitting Stop and Wait ARQ Point Coordination Function Computer must send Request To Transmit to Access Point first The Clear To Transmit is granted for requesting computer for specific time period on the circuit Works well with high traffic networks

Security Types Service Set Identifier (SSID) Code attached to all packets on a wireless network to identify each packet as part of that network Code is a case sensitive text string which consists of a maximum of 32 alphanumeric characters Minimum security

Wired Equivalent Privacy (WEP) Provide comparable confidentiality to a traditional wired network WEP key can be cracked with readily available software in two minutes or less Easy to share key for access

Extensible Authentication Protocol (EAP) Generates WEP keys automatically User login to server After login sever will generate WEP key for the session Easy to break by professional hackers

Wi-Fi Protected Access (WPA and WPA2) Intended as an intermediate measure to take the place of WEP while i was prepared Designed to work with all wireless network interface cards, but not necessarily with first generation wireless access points WPA2 implements the full standard, but will not work with some older network cards Not selected by default

Questions ?