190 likes | 348 Views
Chapter 5 LANs and WLANs. Wireless Basics. A wireless network transports data from one device to another without cables or wires Slower than wired networks Susceptible to interference Security concerns Signals in air are easily intercepted. RF Radio Frequency. RF signals
E N D
Wireless Basics • A wireless network transports data from one device to another without cables or wires • Slower than wired networks • Susceptible to interference • Security concerns • Signals in air are easily intercepted Chapter 5: LANs and WLANs
RF Radio Frequency • RFsignals • radio frequency or radio waves • Transceiver • sends andreceives Chapter 5: LANs and WLANs
Microwave Transmission • Microwaves • line-of-sight transmissions • corporate MANs] Chapter 5: LANs and WLANs
Infrared Light • Infrared light • Clear line-of-sight • Short distances • PAN personal network Chapter 5: LANs and WLANs
Bluetooth • Short-range, wireless network technology • designed to make its own connections between electronic devices • without wires, cables, or direct action from user Chapter 5: LANs and WLANs
Wi-Fi Equipment Chapter 5: LANs and WLANs
Wi-Fi Equipment • If your computer is not pre-equipped with wireless circuitry, you can purchase and install a Wi-Fi adapter Chapter 5: LANs and WLANs
Wi-Fi Setup Chapter 5: LANs and WLANs
Wi-Fi Setup • Change Password upon logging onto to wireless router • Logon via browser with router IP address • Enter an SSID for the network • Name your network • This differentiates it from nearby networks • Choose WEP, WPA, orPSK • This activates encryption protection between nodes • Set up the wireless workstations • Connect an Internet access device Chapter 5: LANs and WLANs
Wi-Fi Security Router Interface Chapter 5: LANs and WLANs
Wi-Fi Security • Wireless encryption scrambles data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key • WEP (Wired Equivalent Privacy) • WPA (Wi-Fi Protected Access) • WPA2 • PSK • Activate encryption by using a wireless network key Chapter 5: LANs and WLANs
Encryption • Encryption transforms a message so that its contents are hidden from unauthorized readers • Plaintext has not yet been encrypted • An encrypted message is referred to as ciphertext • Decryption is the opposite of encryption • Cryptographic algorithm • Cryptographic key Chapter 5: LANs and WLANs
Encryption • Public key encryption (PKE) eliminates key-distribution problem, by using one key to encrypt a message and another key to decrypt the message Chapter 5: LANs and WLANs
Using LANs • LAN Advantages and Challenges • Sharing Files • Sharing Printers • Network Troubleshooting Chapter 5: LANs and WLANs
LAN Advantages • LANs enable people to work together • Sharing networked software can reduce costs • Sharing data on a LAN can increase productivity • Sharing networked hardware can reduce costs • Sharing networked hardware can provide access to a wide range of services and specialized peripheral devices Chapter 5: LANs and WLANs
LAN Challenges • Resources become unavailable when network malfunctions • Networks may be vulnerable to unauthorized access • More vulnerable than standalone computers • Wireless networks can be tapped from any computers within range of the wireless signal • Networked computers are susceptible to an increasing number of worms, Trojan horses, and blended threats Chapter 5: LANs and WLANs
Sharing Printers • Three setups allow for printer sharing: • Set up printer sharing using a workstation printer • Set up printer sharing using a print server • Install printer with built-in networking Chapter 5: LANs and WLANs