Chapter 7 part 2 Why would I ever consider a wired network

advertisement
Chapter 7 part 2
I.
II.
III.
IV.
V.
Why would I ever consider a wired network connection over a wireless?
a. Wireless signals are more __________ to interference from magnetic and electrical
sources.
b. Other wireless networks can interfere with the signals on your network
c. Certain building materials (concrete/cinder blocks, metal) can decrease throughput.
d. Distance from the networking equipment can lessen __________.
How is data sent through a network?
a. Network navigation devices facilitate and control the flow of data through a network.
Data is sent over transmission media in bundles. Each bundle is called a __________.
b. Router – transfers packets of data between two or more __________. (example: home
network and the internet would be 2 networks)
c. Switch—a “__________” receiving packets of data and sending them where they are
intended to go. (Routers for home use have switches integrated into them).
Networking software
a. What software do home networks require?
i. Home networks need operating system software that supports __________.
Windows, OS X, and Linux all support P2P.
ii. You can connect computers running any of these OSs to the same network.
b. Is the same software used in client/server networks?
i. The centralized servers in a client/server network have specialized network
operating systems (__________). This software handles that requests for
information, internet access, and the use of peripherals for the rest of the
nodes. Some examples of NOSs are Windows Server 2008, __________, and
SUSE Linux Enterprise Server.
Ethernets
a. An Ethernet is a network named because it uses the Ethernet __________ as the means
or standard by which the nodes on the network communicate. The Ethernet protocol
was developed by the Institute of Electrical and Electronics Engineers (IEEE).
i. Each standard that the IEEE develops is numbered with 802.11 being wireless,
and 802.3 being wired.
ii. The 802.11 standard is also known as __________.
b. UTP-unsheilded twisted pair wire like cat5, cat5e, and cat6 are often used for data
transmission in a network. Some __________ to take when running UTP cable:
i. Do not put sharp bends into the cable
ii. Avoid putting the cables in a location where there is foot traffic.
iii. UTP cannot exceed __________ meters per run (328ft) or the signal will
degrade.
Connecting devices to Routers
a. How many devices can be connected to a router in a home network?
VI.
VII.
VIII.
IX.
i. Most home wireless routers can support up to __________ wireless
connections at the same time. This a theoretical maximum (most home
networks have fewer than __________ wireless devices)
Network-Ready Devices
a. A network-ready device is a device that can be connected directly to the __________,
no need to connect it to another computer on the network.
i. Examples: Xbox 360, many DVRs
b. A few devices still have network adapters, but they are being __________ out.
Network Attached Storage device
a. (NAS) a network attached storage device is a specialized computing device used to store
data. They are popular with __________ networks. Think of them as specialized
external hard drives.
i. Examples include MyBook from WD (Western Digital). They connect directly to
the router.
ii. For apple, Time Capsule operates as a wireless router and NAS. (__________ is
just a wireless router for Apple.)
Home Network Server
a. This is a step up from a NAS, but it does not turn a peer-to-peer network into a
__________ network because the functions are more limited.
i. Example: Acer Aspire Easy Store Server. It connects as a node on the router
and provides:
1. Auto back up
2. Shared file storage for the network
3. Access __________ to the network
Securing a Wireless Network
a. All computers connected to the internet need protection from __________. This is
usually accomplished by a firewall. A firewall is either a piece of hardware or software
that acts as a shield to your home network.
b. Wireless network present added vulnerabilities. With a wired network it is easy to tell if
a hacker is using your network (they would have to physically wire themselves into it). A
wireless network is invisible and extends beyond the __________ of a house or
apartment.
c. Piggybacking-a term used to describe illegally using a wireless connection.
i. Why might a person be piggybacking?
1. __________: most devices are set to use the strongest signal available.
In this case, a person may be on the opposite side of their house from
the WiFi signal, and they can pick up their neighbor’s more easily.
2. Without permission: they can use your signal so they do not have to
pay for their own.
3. For cyber attacks: if a person wishes to launch a cyber attack, they do
not want it traced back to them. They will piggyback on your signal so
that it gets traced back to your __________.
X.
XI.
Steps in securing your wireless network
a. Change your network __________ (SSID). The default Service Set Identifier is linked to
default access codes by the manufacturer. Changing your network name will make it
more difficult for hackers to find your access code.
b. Disable SSID broadcast. Most routers are set up to broadcast their SSIDs so they are
“__________” or other devices can find them. (This would be good protection from the
accidental piggybacking.
c. Change the default password
d. Turn on security protocols. (WEP) wired equivalent privacy or (WPA) Wi-Fi Protected
Access. These __________ data sent into code. You will need to set up a passphrase to
allow decryption.
e. Implement (MAC) Media Access Control. There is a serial number associated with
network adapters. You can specify which of these “addresses” are allowed access to
your __________.
f. Limit signal __________. You can adjust the range at which you broad cast the wireless
signal. Settings are low, medium, high.
g. Apply firmware updates. As bugs are discovered, hackers may try to exploit these
__________ so patches are made in the form of an update that fixes the bug.
How can I test the __________ of my Internet connection?
a. Your ISP may have promised certain uploading and downloading speeds. You can check
the actual throughput using some online applications.
i. Speedtest.net and broadband.gov can test the actual speed and they allow you
to compare it to others in your area or all over the US.
Download