Chapter 7 Part 2 Networks. Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference.

Slides:



Advertisements
Similar presentations
Chapter 7 Networking: Connecting Computing Devices
Advertisements

LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
Presented by Serge Kpan LTEC Network Systems Administration 1.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
11 WIRELESS SECURITY by Prof. Russell Jones. WIRELESS COMMUNICATION ISSUES  Wireless connections are becoming popular.  Network data is transmitted.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
Wireless Networking. Wi-Fi or Uses radio waves (like cell phones, tv and radio). Just like wired networking except without the wires. A hot spot.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Improving Security. Networking Terms Node –Any device on a network Protocol –Communication standards Host –A node on a network Workstation 1.A PC 2.A.
Wireless Security Focus on Encryption Steps to secure a Wi-Fi Network.
Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World This chapter takes you behind the scenes of networking.
Wi-Fi the Standard and Security. What is Wi-Fi? Short for wireless fidelity. It is a wireless technology that uses radio frequency to transmit.
A Guide to major network components
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc. 0.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Dainis Krakops’ Wireless Network MOTOROLA SURFboard SB5101 CABLE MODEM Enables cable operators to provide broadband Internet connection for my LAN devices.
Securing a Wireless Network
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computer communication
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Chapter 20 Networks. 4 Questions that need to be answered concerning networks? –How will each computer be identified? –What kind of wire should you run.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Udit Verma( ) Aditya Gulati( ) Abhishek Meena( )
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
LANs and WLANs Chapter 5. 5 Chapter 5: LANs and WLANs 2 Chapter Contents  Section A: Network Building Blocks  Section B: Wired Networks  Section C:
1 Chapter 7 - Networking Fundamentals Computer network: – Two or more computers connected together Each is a Node (other nodes: printers, network devices,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Computer Concepts 2014 Chapter 5 Local Area Networks.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
Today’s Topics Chapter 8: Networks Chapter 8: Networks HTML Introduction HTML Introduction.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Computers Are Your Future Eleventh Edition
Computers Are Your Future Tenth Edition Spotlight 3: Home Network Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Setting Wireless Network At Home By: Parveen Sharma.
WIRELESS NETWORKING Ramiah Qasem, Jahmia Algahmie, Andrew Speice.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
WEBMASTER 3224 PHYSICAL VS LOGICAL COMPONENTS OF THE INTERNET AND NETWORKS.
How are Computers Connected? Chapter 8. How do you connect computers? Run wires between two computers Power Cord Plug into a power outlet Two wires needed.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall 1.
Securing a Wireless Home Network BY: ARGA PRIBADI.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc. 0.
Computer Networks CSC September 23,
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Ad Hoc – Wireless connection between two devices Backbone – The hardware used in networking Bandwidth – The speed at which the network is capable of sending.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition 0.
TECHNOLOGY IN ACTION. Chapter 7 Networking: Connecting Computing Devices.
How Networks Function Networking Fundamentals
TECHNOLOGY IN ACTION Chapter 7
Chapter 7 - Networking Fundamentals
Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 6 Networks Communicating and Sharing Resources
Presentation transcript:

Chapter 7 Part 2 Networks

Why would I ever consider a wired network connection over a wireless? – Wireless signals are more susceptible to interference from magnetic and electrical sources. – Other wireless networks can interfere with the signals on your network – Certain building materials (concrete/cinder blocks, metal) can decrease throughput. – Distance from the networking equipment can lessen throughput.

How is data sent through a network? – Network navigation devices facilitate and control the flow of data through a network. Data is sent over transmission media in bundles. Each bundle is called a packet. – Router – transfers packets of data between two or more networks. (example: home network and the internet would be 2 networks) – Switch—a “traffic cop” receiving packets of data and sending them where they are intended to go. (Routers for home use have switches integrated into them).

Networking software – What software do home networks require? Home networks need operating system software that supports P2P networking. Windows, OS X, and Linux all support P2P. You can connect computers running any of these OSs to the same network.

– Is the same software used in client/server networks? The centralized servers in a client/server network have specialized network operating systems (NOS). This software handles that requests for information, internet access, and the use of peripherals for the rest of the nodes. Some examples of NOSs are Windows Server 2008, R2, and SUSE Linux Enterprise Server.

Ethernets – An Ethernet is a network named because it uses the Ethernet Protocol as the means or standard by which the nodes on the network communicate. The Ethernet protocol was developed by the Institute of Electrical and Electronics Engineers (IEEE). Each standard that the IEEE develops is numbered with being wireless, and being wired. The standard is also known as Wi-Fi.

– UTP-unsheilded twisted pair wire like cat5, cat5e, and cat6 are often used for data transmission in a network. Some precautions to take when running UTP cable: Do not put sharp bends into the cable Avoid putting the cables in a location where there is foot traffic. UTP cannot exceed 100 meters per run (328ft) or the signal will degrade.

Connecting devices to Routers – How many devices can be connected to a router in a home network? Most home wireless routers can support up to 253 wireless connections at the same time. This a theoretical maximum (most home networks have fewer than 10 wireless devices)

Network-Ready Devices – A network-ready device is a device that can be connected directly to the router, no need to connect it to another computer on the network. Examples: Xbox 360, many DVRs – A few devices still have network adapters, but they are being phased out.

Network Attached Storage device – (NAS) a network attached storage device is a specialized computing device used to store data. They are popular with business networks. Think of them as specialized external hard drives. Examples include MyBook from WD (Western Digital). They connect directly to the router. For apple, Time Capsule operates as a wireless router and NAS. (Airport is just a wireless router for Apple.)

Home Network Server – This is a step up from a NAS, but it does not turn a peer-to-peer network into a client/server network because the functions are more limited. Example: Acer Aspire Easy Store Server. It connects as a node on the router and provides: – Auto back up – Shared file storage for the network – Access gateway to the network

Securing a Wireless Network – All computers connected to the internet need protection from intruders. This is usually accomplished by a firewall. A firewall is either a piece of hardware or software that acts as a shield to your home network. – Wireless network present added vulnerabilities. With a wired network it is easy to tell if a hacker is using your network (they would have to physically wire themselves into it). A wireless network is invisible and extends beyond the boundaries of a house or apartment.

c. Piggybacking-a term used to describe illegally using a wireless connection. Why might a person be piggybacking? – Accidental: most devices are set to use the strongest signal available. In this case, a person may be on the opposite side of their house from the WiFi signal, and they can pick up their neighbor’s more easily. – Without permission: they can use your signal so they do not have to pay for their own. – For cyber attacks: if a person wishes to launch a cyber attack, they do not want it traced back to them. They will piggyback on your signal so that it gets traced back to your IP address.

Steps in securing your wireless network – Change your network name (SSID). The default Service Set Identifier is linked to default access codes by the manufacturer. Changing your network name will make it more difficult for hackers to find your access code. – Disable SSID broadcast. Most routers are set up to broadcast their SSIDs so they are “discoverable” or other devices can find them. (This would be good protection from the accidental piggybacking. – Change the default password

– Turn on security protocols. (WEP) wired equivalent privacy or (WPA) Wi-Fi Protected Access. These encrypt data sent into code. You will need to set up a passphrase to allow decryption. – Implement (MAC) Media Access Control. There is a serial number associated with network adapters. You can specify which of these “addresses” are allowed access to your network.

– Limit signal range. You can adjust the range at which you broad cast the wireless signal. Settings are low, medium, high. – Apply firmware updates. As bugs are discovered, hackers may try to exploit these vulnerabilities so patches are made in the form of an update that fixes the bug.

How can I test the speed of my Internet connection? – Your ISP may have promised certain uploading and downloading speeds. You can check the actual throughput using some online applications. Speedtest.net and broadband.gov can test the actual speed and they allow you to compare it to others in your area or all over the US.