How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.

Slides:



Advertisements
Similar presentations
Network Hardware and Physical Media
Advertisements

Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Telecommunications Chapter 5 Chapter 5 Telecommunications
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
WXES2106 Network Technology Semester /2005 Chapter 2 Networking Media CCNA1: Module 3, 4 and 5.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Basic Networking Hardware. Agenda Basic LAN Definition Network Hardware Network Media Sample LAN Implementation.
Computer Networks IGCSE ICT Section 4.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
Core 3: Communication Systems. Transmission media is the medium by which data is transferred. It can be bounded (cabled) or unbounded (wireless). Data.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
WLAN What is WLAN? Physical vs. Wireless LAN
Networks CSCI-N 100 Dept. of Computer and Information Science.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
LANs Cabling Topologies Segments and bridges Switches and routers.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
Chapter 5 LANs and WANs. Network Building Blocks Chapter 5: LANs and WLANs 2  Network Classifications  LAN Standards  Network Devices  Clients, Servers,
Chapter 5 Networks Communicating and Sharing Resources
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Chapter 9A Network Basics.
1 10Base-T Ethernet LAN. 2 LANs u Local Area Networks u Limited Geographical Area –Single office –Single building –University campus or industrial park.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless Router LAN Switching and Wireless – Chapter 7.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
Wireless Networking.
Network Components: Assignment Three
Version Slide 1 Format of lecture Introduction to Wireless Wireless standards Applications Hardware devices Performance issues Security issues.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Implementing Wireless and WLAN Chapter 19 powered by DJ 1.
1 C-DAC/Kolkata C-DAC All Rights Reserved Computer Security.
Basic Networking Hardware
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Networks For VCE Software Development ¾, 2007 Adrian Janson, Melbourne High School.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Topology, refers to the physical and logical diagrams which summarize network connections and information flow.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
.  TJX used WEP security  They lost 45 million customer records  They settled the lawsuits for $40.9 million.
The University of Bolton School of Business & Creative Technologies Wireless Networks - Security 1.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 16 Connecting LANs, Backbone Networks, and Virtual LANs.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
TOPIC 1.2 INTRODUCTION TO NETWORKING. OBJECTIVES By the end of the topic, students should be able to: a) List the elements of data communication systems.
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
NETWORKING MEDIA b Shielded twisted-pair - 2 pair, 150 ohm b unshielded-twisted pair - 4 pair, 100 ohm b fiber optic cable - 2 fibers b coaxial cable -
NETWORK. To connect a computer with a network we need NETWORK ADAPTER.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Network media, protocols and networking standards, networking hardware.
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Chapter 5 LANs and WLANs.
Module 1: Understanding Local Area Networks
Instructor Materials Chapter 6 Building a Home Network
Intro to MIS – MGS351 Network Basics
Chapter 4 Computer Networks – Part 2
Network Basics Extended Learning Module E
Chapter 6 Networks Communicating and Sharing Resources
Presentation transcript:

How are Computers Connected? Chapter 8

How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed to complete circuit Wires are securely covered in plastic insulation Ground wire – provides safety (third wire)

Wires Power Cord Untwisted Pair Wires lie next to each other More interference Twisted Pair Used for telephone systems and network cabling Coaxial Cable Used for cable television wiring/video connections

Connectors FCC maintains registry of jacks (RJ) RJ-11 Telephones and computers 4 or 6 wire Usually only 2 wires used (red and green) – extra for future services Labor is expensive

Connectors Point-to-point communications Wires form direct connection from one computer to another RJ-11 Serial communication Byte - 8 signals sent one after the other Slow

RJ-45 Parallel communication Twisted pairs 8 wires send 4 signals at the same time Interference is low RJ-45 Wider than RJ-11 Category 5 (Cat 5)

Standards for Cat 5 10BaseT Slowest (1990) - only 4 wires used One pair for sending; one pair for receiving 10,000 bits of info per second Base – baseband signaling T – twisted pair

Standards for Cat 5 100BaseT 1995 Uses 2 of 4 pairs 100,000 bits of info per second 1000BaseT ab Uses all 4 pairs 1 million bits of info per second

New Standard 10GBaseT 802.3ae million bits of info per second Uses enhanced RJ-45 cable

Network Connections Star Network Each computer connected to central machine Telephone systems – small setup Central machine is switch Passes information Telephone switching networks Switch to switch

Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header – intended recipient All computers receive all communications, however only intended computer saves material

Ethernet Networks Rules or Protocols One computer does not interfere with communications by another Each computer ‘listens’ to the network as it transmits it message If the message received is different, another computer sent message at same time Wait random amount of time and resend Maximum length for any message

Token-Ring Network Organizes computer logically into a circle or ring Each computer – 2 connections Communication is in single direction around circle Messages have sender and addressee designator (in header) Confirmation of receipt Token – Authority to send message (one computer at a time) Messages can be somewhat longer

Expansion of networks Variations in degree to which networks are used To keep demand low on networks, many organizations maintain separate small networks and connect those networks Ethernet networks Cabling limited to 100 meters (328 feet) Hubs - A common connection point Repeaters – amplify electrical signals

Network Expansion Segment A section of a network that is bound by bridges, routers or switches Bridge Keeps track of machines on one or both sides of a segment Forwards messages when info must go from sender on one side to receiver on the other

Wireless Technology Wireless communications Infrared signals or radio waves Devices on a wireless network form a logical Ethernet network Messages are divided into packets Packet contains a header IDs which machine is to receive the data All wireless computers in an area share the airwaves, receive the same messages and determine if they are the recipient

Wireless Technology Access Point Computer directly to the Internet (acts as intermediary) Example: on a 2.4 GHz radio frequency band Beacon Repeating of identifying information by access point Association – Portable wishes to make connection Portable computers use radio waves or infrared signals to communicate with access point As portable computers move, interact with new access point If no computers have direct access to the Internet, portable computers still can interact with each other, but not with the Internet

Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception /monitoring of wireless traffic: The network traffic across a WLAN is intercepted and monitored without authorization. Mis-configuration: Many access points ship in an unsecured configuration

Types of Wireless Network Attacks - 2 Client-to-client attacks: Two wireless clients can communicate with each other directly. One may attack another. Jamming: DoS (Denial of Service) legitimate traffic overwhelms the frequencies, making the network not usable.

WLAN Security SSID Service Set Identifier or Network Name Name of a wireless local area network All wireless devices on a WLAN must employ the same SSID NOT broadcast SSID in access points MAC Filtering MAC: hardware/physical address of wireless network card Only allow specified MAC addresses for connections

WLAN Security WEP: Wired Equivalent Privacy WPA: Wi-Fi Protected Access WPA2: Best protection for home WLAN.

WEP: Wired Equivalent Privacy Purpose: Protect wireless network from eavesdropping. Prevent unauthorized access to the network How Does It Work A secret key between laptop and access point The secret key to encrypt packets Length of Key 64-bit encryption 128-bit encryption

WPA: Wi-Fi Protected Access Two types of WPA WPA-PSK (WPA Personal) - Home &Small Offices WPA-RADIUS (WPA Enterprise) – Large Organizations WPA-PSK: Pre-Shared Key Extra-strong encryption Encryption keys are automatically changed after a specified period of time after a specified number of packets Implements a subset of IEEE i.

WPA2: Wi-Fi Protected Access WPA2: Best protection for home WLAN. Fully compatible with IEEE i security standard. Stronger encryption protocol Not all wireless cards and access points support WPA2 certification is mandatory for all new devices wishing to be Wi-Fi certified.