Escolar Documentos
Profissional Documentos
Cultura Documentos
Review
Network LANs IP Configuration Internet TCP/IP DSL/Cable Modem with a Router
What is a network?
A computer network is a series of computers and other devices
interconnected by communication paths. Computer networks include: LANs and WANs
http://www.albany.edu
A LAN:
Operates within a limited geographical area Controlled by local administration Allows local users to: Share printers Access local file servers with software and data Access the Internet
Rick Graziani graziani@cabrillo.edu 4
IP Configuration
To communicate with other computers
on your network you need to properly configure: IP Address (of your computer) Subnet Mask (of your computer) To communicate with computers outside your network you need to properly configure: Default Gateway IP Address To be able to use domain names, like www.cabrillo.edu, instead of IP addresses you need to properly configure: DNS (Domain Name System) Server IP Address
6
192.168.1.10
To the Internet
192.168.1.1
IP Configuration: DNS
Hey, 207.62.87.54, what is the IP Address for www.yahoo.com?
It is 66.94.230.47
IP information can be configured: Statically Dynamically Using a DHCP (Dynamic Host Configuration Protocol) Server
DHCP Server
Here is your IP Address, Subnet Mask, IP Address for the Default Gateway (router), and IP Address for the DNS Server!
10
The Internet was originally designed by DARPA (Defense Advanced Research Projects Agency) in response to the U.S.S.R. launching Sputnik, the first satellite. Out of this came the Internet, a way for computers to communicate from different parts of the world. These computers can be any type of computer using any type of operating system, as long as they are using the protocol TCP/IP.
11
govern a way of communicating. The sender and receiver, and everyone in between, must agree on the rules, the protocol.
12
13
192.168.1.10
14
Routers can help protect your DSL or Cable Modem Network. 204.180.205.1 Public Address
Hacker can only get to public address and not private address
15
Internet Hackers can only get to public addresses and not private addresses
Rick Graziani graziani@cabrillo.edu 16
Bandwidth
17
Networking Part 2
Circuit Switching versus Packet Switching Wireless Careers in Information Technology
18
19
Circuit Switched
Circuit Switching: A form of data communication which establishes a
single connection or circuit between source and destination to carry the data stream. Like a conventional telephone system. When a subscriber makes a telephone call the dialed number is used to set switches in the exchanges along the route of the call so that there is a continuous circuit from the originating caller to that of the called party.
20
Packet Switching
Packet Switching: A form of data communications which breaks
a data stream into small sections, sends them separately by the best available channels and reassembles the original data stream at its destination. An alternative is to allocate the capacity to the traffic only when it is needed, and share the available capacity between many users.
A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usually an Ethernet LAN.
22
In our example the wireless access point (AP) will include a Router.
23
Putting it together
25
SSID
The SSID is what will be displayed when people with wireless computers are looking for a wireless LAN.
26
Linksys WRT54G
Router Information IP Address from ISP Connects to your DSL/Cable Modem NAT (Network Address Translation) Local Network Switch or Hub Connect wired computers DHCP Server (optional) Wireless SSID: MyHomeNetwork DHCP Server: (optional) Channel: 11
You choose
There are many resources to discuss the possible health risks or wireless LANs. As a networking and WLAN user and instructor I have my own thoughts which I will share. If you are concerned, then research the information and come to your own conclusions. The following information is from my own research and experience.
28
Wireless Frequency
Wireless APs operate at:
2.4 GHz 5 GHz 2 GHZ! Thats the same as my microwave oven, isnt that dangerous? Answer: No. Electromagnetic waves happen naturally. Light is an electromagnetic wave It is not the frequency, but the wattage, the power. Any electromagnetic wave can be dangerous with too much power. A 25 watt light bulb is safe, but it wouldnt be safe at 250,000 watts Wireless access points generate signals at 1/10th of a watt. Like all electromagnetic waves, the signal does not fade in a linear manner, but inversely as the square of the distance.
29
www.britishlibrary.net
30
Point A
10 times the distance 1/100 the power of A 5 times the distance 1/25 the power of Point A
31
33
34
35
36
Wireless Security
Without any security, anyone can: Use your wireless access point to access your network and the Internet. Capture your information from your wireless computer.
37
Wireless Security
CommView DriftNet
38
Wireless Security
Your web browsing or email access should already be secured. Look for the lock
39
40
41
Installing, configuring, and maintaining network servers UNIX, LINUX, Microsoft Web, DNS, DHCP, Mail Servers Backup and recovery, user administration Security
Rick Graziani graziani@cabrillo.edu 43
Routers, Switches, Cables, Wireless Access Points Issues: Security, Quality of Service, Video On Demand, Voice over IP
44
Keeping up on technology
Wireless Security
Rick Graziani graziani@cabrillo.edu 45
Safe Surfing
Adware
Pop-ups Spyware Blocking Pop-ups Java Traps or Pop-Up Hell Spyware Blocking Spyware Cookies Virus Protection Spam Blocking Spam
47
Adware
48
Pop-up ads are a form of online advertising on the Web where certain
websites open a new web browser window to display advertisements. Usually generated by JavaScript A less intrusive variation on the pop-up window is the pop-under advertisement. This opens a new browser window, but in the background, so as not to interrupt the user's page-view.
49
50
Most users regard pop-ups as a nuisance. In the early 2000s, all major web browsers except Internet Explorer
allowed the user to block pop-ups almost completely. In 2004, Microsoft released Windows XP SP2, which added pop-up blocking to Internet Explorer. Some users install non-Microsoft ad-blocking software instead. Advertisers continually seek ways to circumvent such restrictions. Many of the latest pop-ups are created using Flash and have extensive animation and trickery.
52
53
From Microsoft
to prevent most pop-up windows from appearing over pages you want to view while you're using the Internet. When you install SP2, Pop-up Blocker is turned on in Internet Explorer and set to the medium setting, which means it will block most automatic pop-ups.
54
http://www.microsoft.com/windowsxp/using/web/sp2_popupblocker.mspx
Rick Graziani graziani@cabrillo.edu 55
56
apart from the browser) on the user's local computer. This is typically because of a spyware infestation, or because the user has voluntarily (or involuntarily) installed adware.
58
Spyware (Wikipedia.org)
about a computer user without the user's knowledge or consent. May perform many different functions, including: the delivery of unrequested advertising (pop-up ads in particular), harvesting private information re-routing page requests to illegally claim commercial site referal fees Spyware as a category overlaps with adware Spyware or Malware in a broader sense can include: adware, remote access trojans (RATs), keystroke loggers, denial-of-service (DoS) attack agents, probe tools, and other backdoor network threats (including most popular remote access tools).
Rick Graziani graziani@cabrillo.edu 59
Fighting Spyware
Cookies
A cookie is information sent by a
server to a browser and then sent back to the server each time it accesses that server. They were invented by Lou Montulli, a former employee of Netscape Communications. Amongst other uses, cookies enable websites to be customized for individual users once browsing patterns have been established. Cookies can however cause potential security problems as information such as credit card details might be collected via a cookie. Cookies can however, only store information that you provide.
61
Cookies - Purpose
Cookies - Permissions
A browser may or may not allow the use of cookies. The user can usually choose a setting. Microsoft Internet Explorer
Tools > Internet Options > Privacy Tab Use slider to set options, or use advanced options
Rick Graziani graziani@cabrillo.edu 63
Virus Protection
In computer security technology, a virus is a selfreplicating program that spreads by inserting copies of itself into other executable code or documents
64
Spam (Wikipedia)
Anti-Spam
Spam
68