Computer Concepts



Computer ConceptsChapter Five: LANs and WLANsA Guide to this Instructor’s Manual:We have designed this Instructor’s Manual to supplement and enhance your teaching experience through classroom activities and a cohesive chapter summary. This document is organized chronologically, using the same heading in blue that you see in the textbook. Under each heading you will find (in order): Lecture Notes that summarize the section, Figures and Boxes found in the section (if any), Teacher Tips, Classroom Activities, and Lab Activities. Pay special attention to teaching tips, and activities geared towards quizzing your students, enhancing their critical thinking skills, and encouraging experimentation within the software. In addition to this Instructor’s Manual, our Instructor’s Resources CD also contains PowerPoint Presentations, Test Banks, and other supplements to aid in your teaching experience. For your students: Our latest online feature, CourseCasts, is a library of weekly podcasts designed to keep your students up to date with the latest in technology news. Direct your students to , where they can download the most recent CourseCast onto their mp3 player. Ken Baldauf, host of CourseCasts, is a faculty member of the Florida State University Computer Science Department, where he is responsible for teaching technology classes to thousands of FSU students each year. Ken is an expert in the latest technology and sorts through and aggregates the most pertinent news and information for CourseCasts so your students can spend their time enjoying technology, rather than trying to figure it out. Open or close your lecture with a discussion based on the latest CourseCast.Table of Contents HYPERLINK \l "_Chapter_Objectives" Chapter Objectives2Section A: Network Building Blocks2Section B: Wired Networks6Section C: Wireless Networks9Section D: Using LANs13Section E: Security Through Encryption15Glossary of Key Terms18Chapter ObjectivesStudents will have mastered the material in Chapter Five when they can answer the following questions:What are PANs, LANs, MANs, and WANs?Which devices are most common on LANs?On a network, how does file sharing mode differ from client/server mode?Why do networks have different topologies?What is the purpose of a communications protocol?Why do most networks transmit digital rather than analog signals?How does data find its way over a network to a specified destination?Is it easy to set up wired and wireless networks?Are there different kinds of wired and wireless LANs?What are the advantages and disadvantages of LANs?What makes a network a security risk and how can networks be secured?How does encryption work?READING ASSIGNMENT FASTPOLL T/F QUESTIONS:050100 In a network, a server is a computer that provides services to other computers called peers. (Answer: False) (249)050200 Star, ring, and mesh are examples of network topologies. (Answer: True) (250)050300 When you send an e-mail message over a network, it is chopped up into packets. (Answer: True) (253)050400 The IP address assigned to your computer on the Internet is derived from your computer’s MAC address. (Answer: False) (255)050500 Some network technologies use home telephone or electric cabling for computer networks. (Answer: True) (257)050600 The most popular type of wired network is Ethernet. (Answer: True) (258)050700 Network speeds are measured in megabytes and gigabytes. (Answer: False) (261)050800 Many wireless networks use radio waves to transmit data. (Answer: True) (265)050900 Bluetooth is a wireless technology used for WANs. (Answer: False) (267)051000 A wireless infrastructure network uses a centralized broadcasting device, such as a wireless access point or router. (Answer: True) (270)051100 Wireless networks are less secure than wired networks. (Answer: True) (273)051200 WEP, WPA, and PSK are examples of Wi-Fi networks. (Answer: False) (283)051300 Public key encryption uses a public key to encrypt messages, but a private key is required to decrypt messages. (Answer: True) (286)SECTION A: NETWORK BUILDING BLOCKSSECTION A OPENER QUESTION:052100 Networks come in many sizes and use many different technologies, yet they all need to communicate with each other. What is the key to network intercommunication?Packet switchingNetwork protocolsNetwork topologyPeer-to-peer technology(Answer: b)Network Classifications (246)LECTURE NOTESStress that early PCs were designed for solo use, yet the advantages of networking were identified as early as 1976. Discuss shared resources as an identifiable advantage of networking. Ask students to list the benefits and drawbacks of shared resources and information. Describe the different geographic scopes for networks. Which of these are familiar to students? Why is it important (or convenient) to describe networks in terms of their scope?TEACHER TIPPoint out what type of network(s) your school uses. If there is one network type used, explain why it was considered the best choice to meet the school’s needs. If your school has a variety of networks of different types, explain why the school has this mix of networks.LAB ACTIVITYRefer students to the New Perspectives Web site for a Student Edition Lab called “Networking Basics.”FIGURESFigure 5-1, Figure 5-2CLASSROOM ACTIVITIESClass Discussion: Networks have changed the way we communicate and share resources in a number of ways. Ask students to list examples from their own lives.Group Activity: Divide students into two groups. Ask each group to come up with a scenario in which each type of network (PAN, LAN, MAN, or WAN) is most appropriate. Have each group take turns in sharing a scenario from their group list and write it on a whiteboard. Quick Quiz:What type of network are you most likely to encounter in a school lab or small business setting? (Answer: LAN)How can computer networks be classified? (Answer: According to their geographic scope, mode, and/or physical topology.)LAN Standards (247)LECTURE NOTESDiscuss possible repercussions of the diversity of LAN technologies that previously existed.Discuss the advantages that exist in the consolidation around Ethernet technology and Wi-Fi work Devices (248)LECTURE NOTESPoint out that when students use a computer in the library to print a document or access the Internet, they are using a LAN. Note that in many cases, using a LAN is transparent.Discuss the role of network interface cards and “built-in networking” circuitry as providing the means to connect nodes to a network.Discuss the role of network devices, such as hubs, switches, routers, gateways, bridges and repeaters, in supporting the network.TEACHER TIPPoint out the different peripherals and computers that are networked in the classroom.FIGURESFigure 5-3CLASSROOM ACTIVITIESClass Discussion: Ask students about their experiences using a LAN. Point out that they very likely have used a LAN, in places like libraries, coffee shops and school labs, and been unaware of it.Quick Quiz:A(n) ___________ is any device that contains network circuitry to directly connect to a network. (Answer: networked peripheral)A(n) ___________ is any electronic device that broadcasts network data, boosts signals, or routes data to its destination. (Answer: network device)Clients, Servers, and Peers (249)LECTURE NOTESDiscuss the difference between peer-to-peer mode and client/server mode. Use Figures 5-4 and 5-5 to illustrate the difference between client/server and peer-to-peer networking. Explain what kind of mode your school network(s) use(s).FIGURESFigure 5-4, Figure 5-5CLASSROOM ACTIVITIESAssign a Project: Ask students to create simple sketches of client/server and peer-to-peer modes that include different types of nodes and networked peripherals.Quick Quiz:A(n) ___________ stores files and supplies them to workstations on request. (Answer: file server)A(n) ___________ handles jobs sent to network printers. (Answer: print server)A(n) ___________ runs application software for network workstations. (Answer: application server)Physical Topology (250)LECTURE NOTESReview the different types of topologies and the advantages and disadvantages of each. For example, a bus topology allows quick and cost-efficient communication of one signal to many users. Discuss the most common uses of different topologies. For example, star topologies are often used with telephone lines, bus topologies with cable lines, and tree topologies with larger LANs found in schools and businesses.Use Figure 5-6 to describe the major topologies. Describe how gateways can connect networks to one another, even those with different topologies.Discuss how a bridge is used to connect similar networks.TEACHER TIPConsider using the board to draw a series of interconnected networks using colors to differentiate between nodes and gateways.FIGURESFigure 5-6CLASSROOM ACTIVITIESAssign a Project: Ask students to create a chart that includes simple sketches of the five network topologies (star, ring, bus, mesh, and tree) and the advantages and disadvantages of each.Quick Quiz:The arrangement of devices in a network is called its ___________. (Answer: physical topology)Data traveling in a(n) ___________ network can take any of several possible paths from its source to its destination. (Answer: mesh)True/False: You can connect various types of networks. (Answer: True)Network Links (251)LECTURE NOTESDiscuss the role of the communications channel in providing a pathway between network devices. Explain the difference between physical and wireless communication links. Note that all networks, whatever their geographic scope, organizational mode or physical topology, rely on some form of link.Discuss the difference between physical (cable-based) links and wireless links (RF waves, microwaves, infrared light waves).Define bandwidth, using the highway example given in the book. TEACHER TIPDiscuss the bandwidths of the various forms of connections like twisted-pair cable, coaxial cable, fiber-optic cable, radio waves, infrared light, etc. Bring in examples of physical cables.FIGURESFigure 5-7CLASSROOM ACTIVITIESQuick Quiz:A(n) ___________ provides a pathway for signal transmissions. (Answer: communications channel or link)__________ is the transmission capacity of a communications channel. (Answer: Bandwidth)True/False: High-bandwidth communications systems are sometimes referred to as broadband. (Answer: True)Communications Protocols (252)LECTURE NOTESDefine a protocol as a set of rules that describe how parties should communicate. Describe what a communications protocol does, including dividing messages into packets, addressing packets, initiating and regulating the flow of transmission, checking for transmission errors, acknowledging receipt of transmitted data, etc.Define the term "packet" and identify the parts of a packet.Explain the process of packet switching and why this technique is used. Make sure students understand the difference between a circuit switching network (the telephone system) and a packet switching system (the Internet, and local area networks). Discuss the two most commonly used network addresses: the MAC address and the IP address.TEACHER TIPIt might be helpful to students’ understanding to compare protocols to spoken language. In order for two people to communicate, they must share a common language. If one person speaks only Danish and the other only Hebrew, they won’t be able to communicate. But if both also speak English, they could agree to use that as a common language. Likewise, networks must agree on a common language. Note that the language, or protocol, of the Internet is TCP/IP. While many networks use other communication protocols, they must also be able to “speak” TCP/IP in order to communicate over the Internet.FIGURESFigure 5-8, Figure 5-9, Figure 5-10, Figure 5-11CLASSROOM ACTIVITIESGroup Activity: Break students up into small groups. Give each group a simple multi-page letter and a few unaddressed envelopes. Have them create packets. Stress that each packet must include sender and recipient addresses, part of the message (‘data’), and sequence information (page number). Use one set of packets to illustrate how the message is sent across the Internet and reassembled at the destination once all packets have been received.Quick Quiz: What are three aspects of network communications that communications protocols are responsible for? (Answers: Setting standards for formatting (encoding and decoding) data, guiding data to its destination, and mitigating the effects of interference)True/False: Handshaking refers to the process through which two computers on a network negotiate their communications protocols. (Answer: True)SECTION B: WIRED NETWORKSSECTION B OPENER QUESTION:052200 Suppose you’re setting up a network in your home or apartment. You want all of the computers to access the cable modem that provides Internet access. What is the one additional component that you should purchase to tie the network together?A routerA network interface cardA file serverA HomePlug Ethernet port(Answer: a)Wired Network Basics (256)LECTURE NOTESDiscuss the advantages and disadvantages of a wired network.Explain that some wired networks technologies use communications channels that already may exist in homes. Discuss the advantages and disadvantages of wired networks.Mention that the most popular LAN technology today is Ethernet.FIGURESFigure 5-12CLASSROOM ACTIVITIESClass Discussion: Ask students if they have a wired home area network. What do they like about it? What do they dislike?HomePNA and Powerline Networks (257)LECTURE NOTESExplain that HomePNA is a network technology that utilizes existing telephone wires and coaxial cables to provide a communications channel between network devices.Review how HomePNA compares to Ethernet.Explain that a powerline network is a network technology that utilizes electrical wiring to provide a communications channel between network devices.FIGURESFigure 5-13, Figure 5-14CLASSROOM ACTIVITIESClass Discussion: The text mentions that some hotels have retrofitted their guest rooms to provide Internet access via a HomePNA. Ask students to think of similar situations where this strategy might work. Quick Quiz: True/False: HomePNA is faster than Ethernet. (Answer: False)A(n) _______ network uses premises electrical wiring to form the infrastructure for a LAN. (Answer: powerline)Ethernet (258)LECTURE NOTESExplain that Ethernet is the leading LAN technology in use today. Describe how Ethernet simultaneously broadcasts data packets to all network devices.Discuss what happens when packets collide, the speed at which packets travel, and what sort of cables and topology the network uses. Use Figures 5-15, 5-16, and 5-17 to discuss the specifics of Ethernet and its requirements.Discuss how the term Ethernet actually refers to the IEEE 802.3 family of standards.TEACHER TIPReview the reasons for the success of the Ethernet standard, as listed on page 259. Ask students which, if any, of these reasons stands out for them as the main reason why Ethernet became so popular.FIGURESFigure 5-15, Figure 5-16, Figure 5-17CLASSROOM ACTIVITIESAssign a Project: Have students list at least two reasons Ethernet is so popular. Can they come up with any reasons in addition to those listed on page 259? Quick Quiz: Today, most personal computers and LAN equipment work with ______________ Ethernet. (Answer: Gigabit)True/False: Ethernet simultaneously broadcasts data packets to all network devices. (Answer: True)What does CSMA/CD stand for? (Answer: Carrier Sense Multiple Access with Collision Detection)Ethernet Equipment (260)LECTURE NOTESDiscuss that, in order to connect to an Ethernet network, a computer must have supporting hardware installed. Explain that the computer can be Ethernet ready, which means it contains built-in Ethernet hardware (including an Ethernet port). If it is not Ethernet ready, then an Ethernet adapter (Ethercard or NIC) can be installed in one of three ways: via a USB port, a PC slot, or a PCI slot on the system board. Explain that the network adapter usually is connected by cable to a device called a network device (like a hub, switch or router).Explain the differences between hubs, switches and routers.Stress that the components of the Ethernet network (the Ethernet adapters and network devices) should all be chosen to work together efficiently.TEACHER TIPIf you have a network card that is not in use, bring it to class as a visual aid. Ask your tech support department if they have any "dead" network cards you could have. Other network devices, such as hubs, switches and routers, could also be used as visual aids. If possible bring a Cat 5 or Cat 6 cable with an RJ45 connector on one end.FIGURESFigure 5-18, Figure 5-19, Figure 5-20, Figure 5-21CLASSROOM ACTIVITIESAssign a Project: Have students list the network hardware needed for a typical home network that will be used to access the Internet. Quick Quiz: True/False: A network switch is a sophisticated connection device that sends data only to the devices specified as the destination. (Answer: True)What type of network device ships data from one network to another? (Answer: network router)True/False: Using a hub instead of a switch can increase a network’s performance and security. (Answer: False)Ethernet Setup (262)LECTURE NOTESAsk students whether they have set up a wired home network. Was it easy or difficult to set up?Explain how to set up a wired Ethernet home area network.Refer to the photographs in Figure 5-23. TEACHER TIPDemonstrate how to make folders and drives available to others when using Windows. FIGURESFigure 5-22, Figure 5-23, Figure 5-24LAB ACTIVITYThe New Perspectives Lab “Local Area Networks” deals with issues that relate to this section of the textbook. You might want to go through the lab during class time if you have a computer with a projection device. Otherwise, assign this lab for students to do outside of class.CLASSROOM ACTIVITIESClass Discussion: If your classroom has a computer that is connected to a campus network, allow the class to examine the connections. Is it a wired or wireless connection? If it is wired, what kind of cable is used? Can you identify the type of network device the computer is connected to (a hub, switch, or something else)? If the connection is wireless, where is the wireless hub? If necessary, take a field trip to the hub to see what it looks like. If your building has a cable room (or closet) where network connections come together, arrange a visit to that room as well. Quick Quiz:Ethernet network cables are terminated at each end with plastic _______________ connectors. (Answer: RJ45)True/False: To prevent unauthorized changes to your network, it is essential that you change the router’s password. (Answer: True)SECTION C: WIRELESS NETWORKSSECTION C OPENER QUESTION:052300 When you’re setting up a wireless network, you see an option asking if you want to broadcast the network SSID. You should:Change the default SSID and broadcast it while you set up the network.Turn SSID broadcasting off so that hackers don’t know the network’s encryption key.Make sure SSID is broadcasting so that your network is protected by strong encryption.Activate SSID broadcasting or else the network devices won’t be able to send data to the router.(Answer: a)Wireless Basics (265)LECTURE NOTESDiscuss how networks of all sizes (PANs, LANs, and WANs) can use wireless technologies.Use the following chart to discuss the advantages and disadvantages of various types of wireless network links:Communications LinkAdvantagesDisadvantagesRadio wavesLonger range; does not require line-of-sight transmissionBefore you can use a frequency for communication, it must be licensed from the FCCInfrared transmissionsAn FCC license is not requiredShort transmission range; requires line-of-sight transmissionMicrowave transmissionsLong range; can be aimed in one direction; has higher capacity when compared to radio wavesMicrowaves cannot penetrate metal; requires line-of-sight transmission; microwave stations cannot be more than 25 or 30 miles apartSatellite linksA GEO satellite provides continuous coverage over a particular area; an LEO satellite offers transmission delays of only a few hundredths of a secondA GEO satellite requires a delay of 24 seconds to transmit data; an LEO satellite requires a web of satellitesList the advantages and disadvantages of wireless networks.Explain that Wi-Fi specifies the hardware, the type of transmission medium, and the transmission speed. FIGURESFigure 5-25, Figure 5-26TEACHER TIPMost students will be familiar with the use of radio waves for data communication. Students also may be familiar with satellite transmission if they have used a GPS system. However, many will not be familiar with the use of infrared transmissions, even though they use some infrared devices, such as television remote controls. Discuss examples of each of these technologies.CLASSROOM ACTIVITIESClass Discussion: If your building has a wireless network, ask the class if they use it. Is it reliable?Quick Quiz: Most wireless networks transport data using which type of signal? (Answer: RF)True/False: Infrared light can be used to carry data signals, but only for short distances and between devices with clear line of sight. (Answer: True)True/False: Workstations, peripheral devices, and network devices can be equipped with transceivers to send and receive data on wireless networks. (Answer: True)Bluetooth (267)LECTURE NOTESExplain that the name Bluetooth is derived from the nickname of a 10th century Danish king, Harold Bluetooth. According to the inventors of the Bluetooth technology, the king engaged in diplomacy that led warring parties to negotiate with each other, making Bluetooth a fitting name for this technology, which allows different devices to talk to each other.Discuss how Bluetooth technology allows Bluetooth devices to form networks automatically when they come within range of each other.Discuss the term Bluejacking as it relates to one Bluetooth device sending a message to another Bluetooth device anonymously when they are within range of each other.Refer to Figure 5-28. Ask students whether there are other uses, beyond the wireless headset that clips to a motorcycle helmet, that they can envision for Bluetooth technology.TEACHER TIPAsk if any students have any Bluetooth devices with them in class. If so, have them show the devices to the class.FIGURESFigure 5-27, Figure 5-28CLASSROOM ACTIVITIESClass Discussion: Ask students to list as many Bluetooth devices as they can think of. Write them down on a whiteboard.Quick Quiz: What is another name for a Bluetooth network? (Answer: piconet)True/False: Bluetooth is typically used to connect a collection of workstations. (Answer: False)True/False: Bluetooth networks form automatically when Bluetooth devices are within range of each other. (Answer: True)Wi-Fi (268)LECTURE NOTESStress that Wi-Fi is a term used for a family of wireless standards know as IEEE 802.11.Note that some of the standards are cross compatible and some are not, as noted in the table in Figure 5-29. Emphasize that the maximums listed in the table in Figure 5-29 are theoretical maximums because of the obstacles that wireless signals face in the typical network environment (an office, for example).FIGURESFigure 5-29, Figure 5-30Wi-Fi Equipment (268)LECTURE NOTESCompare the equipment needed for a wired LAN with the equipment needed for a Wi-Fi LAN.Point out that most computers today come equipped with Wi-Fi circuitry.Discuss the different types of W-FI adapters.Survey students about the wireless capability of their own computers. Do their desktop computers have a Wi-Fi card or did they come pre-equipped with wireless capabilities? What capabilities do their laptops have?Discuss the advantages of a wireless ad-hoc network over a wireless infrastructure network. Present real-world scenarios to students that require one kind of solution or the other and ask them to identify which type of network would be preferred, and why.FIGURESFigure 5-31, Figure 5-32, Figure 5-33, Figure 5-34CLASSROOM ACTIVITIESClass Discussion: Ask student what Wi-Fi equipment they own. Have them refer to Figure 5-31 for ideas if they are unsure.Quick Quiz: True/False: All wireless networks require a router. (Answer: False)A(n) _______ is a wireless access point that also includes routing circuitry that can connect a Wi-Fi network to the Internet. (Answer: wireless router)Wi-Fi Setup (270)LECTURE NOTESPresent the basic procedure for setting up a wireless network.Discuss basic security options (changing router’s default password, changing the default SSID, and enabling encryption).Explain SSID. Note that an extremely weak form of wireless network security is to turn off the broadcast of the SSID. While to the average user there does not appear to be a network in use, a network protected in this way is still easily accessed by crackers using the appropriate tools. Explain that forms of encryption and authentication should also be used (at a minimum WEP but preferably WPA). Note that some newer wireless access points disable the automatic SSID broadcast feature in an attempt to improve network security. Note that some advanced wireless access points support broadcasting multiple SSIDs, allowing the creation of Virtual Access Points. This partitions a single physical access point into several logical access points, each of which can have a different set of security and network settings.TEACHER TIPExplain, or if possible, demonstrate the Wi-Fi setup at your school. Consider inviting someone from the IT department to come and further explain the setup to the class.FIGURESFigure 5-35, Figure 5-36, Figure 5-37, Figure 5-38LAB ACTIVITYRefer students to the New Perspectives Web site for a Student Edition Lab called “Wireless Networking.”CLASSROOM ACTIVITIESClass Discussion: What are some advantages and disadvantages of wireless networks? Is the connection always available? Do the advantages outweigh the disadvantages with regard to this technology? Is the answer contingent on circumstances? If so, list some of them.Quick Quiz:______ technology uses two or more antennae to essentially send multiple sets of signals between network devices and is used to improve Wi-Fi speed and range. (Answer: MIMO or multiple-input multiple-output)True/False: Microwaves can be aimed in a single direction and have more carrying capacity than radio waves. (Answer: True)The IEEE 802.11 family of standards is also known as ______.MIMOSSIDWi-FiBluetooth(Answer: c.)SECTION D: USING LANSSECTION D OPENER QUESTION:052400 There are many ways to share files among the computers on a network. Which one of the following is the LEAST secure way to share files?Use a file server.Activate file sharing for the root directory of all the computers in the network.Designate specific folders on your computer as shared.Put files you want to share in the Public folder.(Answer: b)LAN Advantages and Challenges (274)LECTURE NOTESReview the advantages alongside the challenges listed in the text. Refer to Figure 5-40 to point out the devices that can be used on a LAN.FIGURESFigure 5-39, Figure 5-40CLASSROOM ACTIVITIESClass Discussion: Ask whether students have experienced any of the benefits listed in the text (such as shared hardware, shared software, increased productivity). Discuss whether students have experienced any of the disadvantages listed in the text (such as network malfunctions, wireless LAN ‘snooping,’ malicious code received via a network connection).Quick Quiz: Hardware, software, and data accessible to authorized network users are called _____. (Answer: shared resources)True/False: Sharing networked hardware can reduce costs. (Answer: True)True/False: LANs are more vulnerable than standalone computers to malicious code. (Answer: True)Sharing Files (276)LECTURE NOTESDiscuss file servers for use on home networks. As the costs of file servers decline, and the number of computers in a single home continues to rise, file servers for home use can be something to consider. Explain that a blade server is a circuit board containing a processor, memory and a network connection designed to slide into a blade server unit. Discuss why businesses use blade server units (cost effective, energy efficient, flexible). Students may well be able to relate to having had a file exclusively on their laptop, for example, when the laptop failed; having had a file server at home that made backup as easy as dragging and dropping a file could have saved a significant hassle.TEACHER TIPRemind students that it’s not a good idea to allow shared access to the root directory (usually drive C) on their computers.FIGURESFigure 5-41, Figure 5-42, Figure 5-43, Figure 5-44CLASSROOM ACTIVITIESAssign a Project: Have students look for and identify the shared resources available on networked classroom or lab computers.Quick Quiz: ____________ assigns a drive letter to a storage device located on a network workstation. (Answer: Drive mapping)A(n) __________ is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations. (Answer: file server)True/False: You can limit access to viewing only in folders you’ve designated as shared. (Answer: True)Sharing Printers (278)LECTURE NOTESUse Figure 5-45 to consider the different ways in which a printer can be attached to a LAN.Use Figure 5-46 to talk about the options in the printer dialog box that permit the sharing of this resource across the network.FIGURESFigure 5-45, Figure 5-46, Figure 5-47LAN Parties (280)LECTURE NOTESNote that a controversy among those in the LAN party community is advertising at LAN parties; some events have gained a reputation as an advertising front for companies (e.g., Bawls, Alienware) in order to generate sales or demonstrate their products to the gaming audience. However, many large-scale LAN parties actively seek sponsorship in order to reduce operating risks to the organizers and to provide prizes for attendees.Note that LAN party attendees tend to be more experienced gamers as the setup required makes LAN parties too much of a commitment for casual players.FIGURESFigure 5-48CLASSROOM ACTIVITIESClass Discussion: Do any students have experience with LAN parties? If so, in what context? How many people were in attendance? Have them describe their experiences.Assign a Project: What kinds of LAN parties are open to gamers in the area where you are located? Ask students to use the Internet to find the Web site(s) of LAN parties in the area and learn about what is involved and what software/hardware is required for participation. How much does it cost to be a part of the event?Troubleshooting (280)LECTURE NOTES Discuss which of the problems listed on page 281 are most common. Discuss other problems not included in this list.TEACHER TIPDemonstrate how Windows tools can be used to troubleshoot network problems.FIGURESFigure 5-49CLASSROOM ACTIVITIESAssign a Project: Have students investigate troubleshooting resources available at their school or campus. Is there a Help Desk available via the telephone or email? Are there resource discs or a campus Web page with troubleshooting utility freeware software? Quick Quiz:True/False: Network computers are vulnerable to unauthorized access from many sources and locations. (Answer: True)For security reasons, it is not advisable to allow shared access to the __________ directory of drive C on your computer.roothomenetworkshared(Answer: a.)SECTION E: SECURITY THROUGH ENCRYPTIONSECTION E OPENER QUESTION:052500 As part of the process of setting up a wired network what should you remember to do?Assign an IP address to each network device.Remove the Ethernet card from any computer that has one.Enable wireless security.Disable the SSID.(Answer: c)Wi-Fi Security (282)LECTURE NOTESDiscuss LAN jacking. When the laptop's wireless adapter (NIC) is set to promiscuous mode, it will receive any packets within its range. The goal is to find vulnerable sites either to obtain free Internet service or to potentially gain illegal access to the organization's data. Note that the legality of war driving in the United States is not clearly defined at this point. There has never been a conviction for war driving, and there is the untested argument that the 802.11 and DHCP protocols operate on behalf of the owner giving consent to use the network, but not if the user has reason to know that there is no consent. Discuss the options for securing a wireless network.FIGURESFigure 5-50, Figure 5-51, Figure 5-52CLASSROOM ACTIVITIESAssign a Project: Give students a list of basic networking terms and ask them to create a personal glossary. Encourage students to investigate terms that they cannot clearly define.Quick Quiz: ____________ is another name for LAN jacking. (Answer: War driving)____________ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid encryption key. (Answer: Wireless encryption)True/False: All devices on a network must use the same type of encryption. (Answer: True)Encryption (285)LECTURE NOTESDiscuss why it is important to encrypt sensitive data that will be transmitted over a network.Use the code in Figure 5-53 as an example of weak encryption. Discuss the flaws of this technique and the ways in which a code has to be changed in order to be considered strong encryption.TEACHER TIPA good analogy for explaining public key encryption (PKE) is that of a locked front door to a building, and the door has a mail slot. The mail slot is exposed and accessible to the public; its location (the street address) is analogous to the public key. Anyone knowing the street address can go to the door and drop a written message through the slot. However, only the person who possesses the matching private key, the owner of the building in this example, can open the door and read the message.FIGURESFigure 5-53, Figure 5-54, Figure 5-55, Figure 5-56CLASSROOM ACTIVITIESAssign a Project: History abounds with fascinating stories about encryption and cryptography. Governments and militaries have long used encryption to ensure the secrecy of their communications. One notable example is the Enigma cipher machine used by the German military during World War II. Ask students to use the Internet to read about the Enigma machine and the role that it played in German dominance early in the war. How did the machine work to encrypt the messages of the German military?Quick Quiz:_________ key encryption uses the same key to encrypt the message as to decrypt it. (Answer: Symmetric)A(n) __________ is a procedure for encrypting or decrypting a message. (Answer: cryptographic algorithm)WHAT DO YOU THINK?053100 Have you ever accessed a free WLAN?a. Yesb. Noc. Not sure053200 Do you believe that rogue WLANs can survive alongside for-profit broadband ISPs?a. Yesb. Noc. Not sure053300 Are broadband providers justified in limiting the terms of their service agreements to “one subscription, one customer”?a. Yesb. Noc. Not sure HYPERLINK \l "Key_Terms" Glossary of Key TermsAES, 285Application server, 249Bandwidth, 251Bluetooth, 267Bridge, 250Broadband, 251Bus topology, 250Ciphertext, 285Circuit switching, 253Client/server mode, 249Communications channel, 251Communications protocol, 252Cryptographic algorithm, 285Cryptographic key, 285CSMA/CD, 259Decryption, 285DHCP, 255Drive mapping, 276Encryption, 285Ethernet, 258Ethernet adapter, 261File server, 249Gateway, 251Handshaking, 252HomePNA, 257Infrared light, 265IP address, 255LAN, 247LAN jacking, 282LAN party, 280MAC address, 254MAN, 247Mesh topology, 250Microwaves, 265MIMO, 268Narrowband, 251Network attached storage, 248Network device, 248Network hub, 261Network interface card, 248Network router, 261Network switch, 261Networked peripheral, 248Node, 248Octet, 255Packet, 253Packet switching, 253PAN, 246Peer-to-peer mode, 249PGP, 287Physical topology, 250Piconet, 267Plaintext, 285Powerline network, 258Print server, 249PSK, 283Public key encryption, 286RF signals, 265Ring topology, 250RJ45 connector, 262Shared resources, 274SSID, 272Star topology, 250Strong encryption, 285Symmetric key encryption, 286Transceiver, 265Tree topology, 250WAN, 247Weak encryption, 285WEP, 283Wi-Fi, 268Wi-Fi adapter, 269Wired network, 256Wireless access point, 270Wireless ad-hoc network, 270Wireless encryption, 283Wireless infrastructure network, 270Wireless network, 265Wireless network key, 284Wireless router, 270WPA, 283Top of Document ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download