How are Computers Connected?

advertisement
Computer Networks
Network Connections
 Ethernet Networks




Single wire (or bus) runs to all machines
Any computer can send info to another
computer
Header – intended recipient
All computers receive all communications,
however only intended computer saves
material
Ethernet Networks
 Rules or Protocols


One computer does not interfere with
communications by another
Each computer ‘listens’ to the network as it
transmits it message



If the message received is different, another
computer sent message at same time
Wait random amount of time and resend
Maximum length for any message
Expansion of networks
 Variations in degree to which
networks are used
 To keep demand low on networks,
many organizations maintain
separate small networks and connect
those networks
 Ethernet networks



Cabling limited to 100 meters (328
feet)
Hubs - A common connection point
Repeaters – amplify electrical signals
Wireless Technology
 Wireless communications




Infrared signals or radio waves
Devices on a wireless network form a logical
Ethernet network
Messages are divided into packets
Packet contains a header


IDs which machine is to receive the data
All wireless computers in an area share the
airwaves, receive the same messages and
determine if they are the recipient
Wireless Technology
 Access Point
 Computer directly to the Internet (acts as intermediary)
 Example: on a 2.4 GHz radio frequency band
 Beacon
 Repeating of identifying information by access point
 Association – Portable wishes to make connection
 Portable computers use radio waves or infrared
signals to communicate with access point
 As portable computers move, interact with new
access point
 If no computers have direct access to the Internet,
portable computers still can interact with each other,
but not with the Internet
Types of Wireless Network Attacks - 1
 Insertion attacks: When a wireless device
connects to an access point without
authorization
 Interception /monitoring of wireless traffic:
The network traffic across a WLAN is
intercepted and monitored without
authorization.
 Mis-configuration: Many access points ship
in an unsecured configuration
Types of Wireless Network Attacks - 2
 Client-to-client attacks: Two wireless clients
can communicate with each other directly.
One may attack another.
 Jamming: DoS (Denial of Service) legitimate
traffic overwhelms the frequencies, making
the network not usable.
WLAN Security
 SSID




Service Set Identifier or Network Name
Name of a wireless local area network
All wireless devices on a WLAN must employ
the same SSID
NOT broadcast SSID in access points
 MAC Filtering


MAC: hardware/physical address of wireless
network card
Only allow specified MAC addresses for
connections
WLAN Security
 WEP: Wired Equivalent Privacy
 WPA: Wi-Fi Protected Access
 WPA2: Best protection for home WLAN.
WEP: Wired Equivalent Privacy
 Purpose:


Protect wireless network from eavesdropping.
Prevent unauthorized access to the network
 How Does It Work


A secret key between laptop and access point
The secret key to encrypt packets
 Length of Key


64-bit encryption
128-bit encryption
WPA: Wi-Fi Protected Access
 Two types of WPA
 WPA-PSK (WPA Personal) - Home &Small Offices
 WPA-RADIUS (WPA Enterprise) – Large Organizations
 WPA-PSK: Pre-Shared Key


Extra-strong encryption
Encryption keys are automatically changed


after a specified period of time
after a specified number of packets
 Implements a subset of IEEE 802.11i.
WPA2: Wi-Fi Protected Access
 WPA2: Best protection for home WLAN.




Fully compatible with IEEE 802.11i security
standard.
Stronger encryption protocol
Not all wireless cards and access points support
WPA2 certification is mandatory for all new
devices wishing to be Wi-Fi certified.
Download