Chapter 7 part 2 I. II. III. IV. V. Why would I ever consider a wired network connection over a wireless? a. Wireless signals are more __________ to interference from magnetic and electrical sources. b. Other wireless networks can interfere with the signals on your network c. Certain building materials (concrete/cinder blocks, metal) can decrease throughput. d. Distance from the networking equipment can lessen __________. How is data sent through a network? a. Network navigation devices facilitate and control the flow of data through a network. Data is sent over transmission media in bundles. Each bundle is called a __________. b. Router – transfers packets of data between two or more __________. (example: home network and the internet would be 2 networks) c. Switch—a “__________” receiving packets of data and sending them where they are intended to go. (Routers for home use have switches integrated into them). Networking software a. What software do home networks require? i. Home networks need operating system software that supports __________. Windows, OS X, and Linux all support P2P. ii. You can connect computers running any of these OSs to the same network. b. Is the same software used in client/server networks? i. The centralized servers in a client/server network have specialized network operating systems (__________). This software handles that requests for information, internet access, and the use of peripherals for the rest of the nodes. Some examples of NOSs are Windows Server 2008, __________, and SUSE Linux Enterprise Server. Ethernets a. An Ethernet is a network named because it uses the Ethernet __________ as the means or standard by which the nodes on the network communicate. The Ethernet protocol was developed by the Institute of Electrical and Electronics Engineers (IEEE). i. Each standard that the IEEE develops is numbered with 802.11 being wireless, and 802.3 being wired. ii. The 802.11 standard is also known as __________. b. UTP-unsheilded twisted pair wire like cat5, cat5e, and cat6 are often used for data transmission in a network. Some __________ to take when running UTP cable: i. Do not put sharp bends into the cable ii. Avoid putting the cables in a location where there is foot traffic. iii. UTP cannot exceed __________ meters per run (328ft) or the signal will degrade. Connecting devices to Routers a. How many devices can be connected to a router in a home network? VI. VII. VIII. IX. i. Most home wireless routers can support up to __________ wireless connections at the same time. This a theoretical maximum (most home networks have fewer than __________ wireless devices) Network-Ready Devices a. A network-ready device is a device that can be connected directly to the __________, no need to connect it to another computer on the network. i. Examples: Xbox 360, many DVRs b. A few devices still have network adapters, but they are being __________ out. Network Attached Storage device a. (NAS) a network attached storage device is a specialized computing device used to store data. They are popular with __________ networks. Think of them as specialized external hard drives. i. Examples include MyBook from WD (Western Digital). They connect directly to the router. ii. For apple, Time Capsule operates as a wireless router and NAS. (__________ is just a wireless router for Apple.) Home Network Server a. This is a step up from a NAS, but it does not turn a peer-to-peer network into a __________ network because the functions are more limited. i. Example: Acer Aspire Easy Store Server. It connects as a node on the router and provides: 1. Auto back up 2. Shared file storage for the network 3. Access __________ to the network Securing a Wireless Network a. All computers connected to the internet need protection from __________. This is usually accomplished by a firewall. A firewall is either a piece of hardware or software that acts as a shield to your home network. b. Wireless network present added vulnerabilities. With a wired network it is easy to tell if a hacker is using your network (they would have to physically wire themselves into it). A wireless network is invisible and extends beyond the __________ of a house or apartment. c. Piggybacking-a term used to describe illegally using a wireless connection. i. Why might a person be piggybacking? 1. __________: most devices are set to use the strongest signal available. In this case, a person may be on the opposite side of their house from the WiFi signal, and they can pick up their neighbor’s more easily. 2. Without permission: they can use your signal so they do not have to pay for their own. 3. For cyber attacks: if a person wishes to launch a cyber attack, they do not want it traced back to them. They will piggyback on your signal so that it gets traced back to your __________. X. XI. Steps in securing your wireless network a. Change your network __________ (SSID). The default Service Set Identifier is linked to default access codes by the manufacturer. Changing your network name will make it more difficult for hackers to find your access code. b. Disable SSID broadcast. Most routers are set up to broadcast their SSIDs so they are “__________” or other devices can find them. (This would be good protection from the accidental piggybacking. c. Change the default password d. Turn on security protocols. (WEP) wired equivalent privacy or (WPA) Wi-Fi Protected Access. These __________ data sent into code. You will need to set up a passphrase to allow decryption. e. Implement (MAC) Media Access Control. There is a serial number associated with network adapters. You can specify which of these “addresses” are allowed access to your __________. f. Limit signal __________. You can adjust the range at which you broad cast the wireless signal. Settings are low, medium, high. g. Apply firmware updates. As bugs are discovered, hackers may try to exploit these __________ so patches are made in the form of an update that fixes the bug. How can I test the __________ of my Internet connection? a. Your ISP may have promised certain uploading and downloading speeds. You can check the actual throughput using some online applications. i. Speedtest.net and broadband.gov can test the actual speed and they allow you to compare it to others in your area or all over the US.