dcn286 introduction to data communication technology
DESCRIPTION
DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY. Network Physical Layer Connection. Purpose of Physical Layer. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/1.jpg)
DCN286 INTRODUCTION TO DATA COMMUNICATION
TECHNOLOGY
Network Physical Layer
Connection
![Page 2: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/2.jpg)
Purpose of Physical Layer
The role of the OSI physical layer is to encode the binary digits that represent data link layer frames into signals and to transmit and receive these signals across the physical media---- cooper wires, optical fiber, and wireless that connect network devices.
![Page 3: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/3.jpg)
Network Access Layer
The network access layer is concerned with all of the issues that an IP packet requires to actually make a physical link to the network media.
It includes the LAN and WAN technology details, and all the details contained in the OSI physical and data link layers.
![Page 4: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/4.jpg)
Popular Copper Media Standards
TIA (Telecommunications Industry Association) and EIA (Electronic Industries Alliance) work together to publish commercial building telecommunications cabling standards TIA/EIA-568-B which defines how to use the pins on the connectors on the ends of the cables.
IEEE (Institute of Electrical and Electronic Engineers) publishes LAN standards such as IEEE802.3 which will define cable requirement.
![Page 5: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/5.jpg)
Coaxial cable
Gradually outdated from LANCan run for longer distances than either
STP or UTPLess expensive than fiber-optic cable
though it is expensive than STP or UTPStill popular for TV and home internet
service
![Page 6: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/6.jpg)
STP (Shielded Twisted Pair) cable
Shielding provides better electrical signals by reducing noise and attenuation.
Shielding makes the cable more expensive, heavier and hard to bend.
![Page 7: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/7.jpg)
UTP (Unshielded Twisted Pair)
Flexible and easy installOffer the same data speedsInexpensiveRJ45 connector (RJ11 is for phone cable).
![Page 8: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/8.jpg)
UTP Implementation
![Page 9: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/9.jpg)
UTP Implementation
Straight-through CableSwitch to RouterSwitch to PC or ServerHub to PC or Server
Cross-over CableSwitch to Switch; Switch to Hub; Hub to HubRouter to Router; PC to PC; Router to PC
Roll-over Cable (Configuration Purposes)PC to Router; PC to Switch
![Page 10: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/10.jpg)
UTP Implementation
Straight-Through cableA cable that maintains the pin connection all the
way through the cable.Cat 5 and Cat5e: Only wires 1, 2, 3, and 6 are
usedGigabit Ethernet uses all the wiresTo connect devices such as PC or routers to
other devices as hub or switches.
![Page 11: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/11.jpg)
UTP Implementation
Cross-over cableA cable that crosses the critical pair to properly align,
transmit, and receive signals on the device with line connections
Pin 1 at one end and Pin 3 at the other endPin 2 at one end and Pin 6 at the other endUsed to connect similar devices:
Switch to switchHub to hub
![Page 12: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/12.jpg)
TIA/EIA568-A and B pin outs
Pin # Function 568A wire color 568 B wire color
1 TD+ White/Green White/Orange
2 TD- Green Orange
3 RD+ White/Orange White/Green
4 Unused Blue Blue
5 Unused White/Blue White/Blue
6 RD- Orange Green
7 Unused White/Brown White/Brown
8 Unused Brown Brown
![Page 13: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/13.jpg)
Straight through cable
Can be used to connect PC and other network equipments to LAN hub/switch
Wire 1 and 2 are used to transmit dataWire 3 and 6 are used to receive data
![Page 14: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/14.jpg)
Cross-over cable
It is used to connect two same equipments such as PC-to-PC.
Both ends need to send data on pin 1 and 2; receive data on pin 3 and 6.
In 568B, one end has white/orange and orange on pin 1 and 2; another has white/orange and orange on pin 3 and 6.
In 568B, one end has white/green and green on pin 3 and 6; another end has them on pin 1 and 2.
![Page 15: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/15.jpg)
Rollover cable
Usually used as console cable.Change the sequence on another end.
![Page 16: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/16.jpg)
Rollover or Console Cable
The cable used between a terminal and a console port is a rollover cable with RJ-45 connectors.
Rollover cable (or Console cable) has a different pinout than the straight-through or crossover cable.
The pinout for a rollover cable is:1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2,
and 8 to 1.
![Page 17: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/17.jpg)
Connector and Adapter
The 8 Position 8 Contact (8P8C) (often called RJ45) connector
Cross over adapter
![Page 18: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/18.jpg)
Optic media
Fiber-optic cable has the strongest ability to resist EMI (electromagnetic interference), RFI (Radio Frequency Interference)
Fiber’s bandwidth is much higher than any other media.
Fiber is highly secure and it is easy to detect intrusion.
Fiber uses light signal transmission and its attenuation is much less than electrical signals. Its length could be very long
![Page 19: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/19.jpg)
Optical fiber cable components
Core: usually made by silicon dioxide (from sand)
Cladding: coated on the core to reflect light and seal it inside
Buffer: physical protect cladding and core
Jacket: prevent damage from abrasion, solvents and other contaminants
![Page 20: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/20.jpg)
Optical Fiber Connector (Optional)
LC/PC connector and SC/PC connectors have caps covering the ferrules
Other connectors are ST, SC, MT, MT-RJ, MU, etc, etc
![Page 21: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/21.jpg)
Multimode fiber
Fiber with large (greater than 10 μm) core diameter may allow light coming in with different angles. (It must be in limit of acceptance cone)
![Page 22: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/22.jpg)
Single mode fiber
Fiber with a core diameter less than about ten times the wavelength of the propagating light and it can only allow light coming in from one direction.
![Page 23: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/23.jpg)
LAN Connectivity Devices
RepeatersHubsSwitchesBridgesRouters
![Page 24: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/24.jpg)
Repeaters
A repeater can be used to increase the length of your network by eliminating the effect of attenuation on the signal.
It connects two segments of the same network, overcoming the distance limitations of the transmission media.
Some repeaters also serve as transmission media adapters, connecting two different types of media.
![Page 25: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/25.jpg)
Repeaters
Repeaters can connect segments that have the same access method. (CSMA/CD, Token Passing, Polling, etc.)
DisadvantagesRepeaters do not filter data Its use is inappropriate when there is a heavy network traffic.
![Page 26: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/26.jpg)
Repeater
10base5 – 500meter cable length limit;10base2 - 200meter cable length limit;10BaseT - 100meter cable length limit;
Repeater is to amplify signal and extend the cabling distance.
Working in layer 1 (Physical) of TCP/IP model
![Page 27: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/27.jpg)
Repeaters
Figure11-6
![Page 28: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/28.jpg)
Hub
Central connection of Ethernet LAN.Physically Star topology and could be
logically RING, Bus and/or StarMay have built-in repeaterWorking in layer 1 (Physical) of TCP/IP
model
![Page 29: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/29.jpg)
Hubs
A hub is used as a central point of connection among media segments.
Cables from network devices plug in to the ports on the hub.
Hubs are referred as Concentrators or multi-port repeater
Hubs receive signals from connected devices and transmit them to the other connected devices
![Page 30: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/30.jpg)
Hubs
Regenerate and repeat signalsPropagate signals through the networkCan not filter network trafficCan not determine the best pathAre used as network concentration points.
![Page 31: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/31.jpg)
Hubs
![Page 32: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/32.jpg)
Types of Hubs
Passive Hubs
Active Hubs
Intelligent Hubs (Switches)
![Page 33: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/33.jpg)
Passive Hub
It functions only as a connection point for the signals
The signal pass through a passive hub without regeneration or amplification.
![Page 34: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/34.jpg)
Active Hub
It regenerates or amplifies the signal before they are retransmitted.
Drawback:The noise is also regenerated
![Page 35: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/35.jpg)
Switch
Think switch as a hub with bridge functioning on each port (interface):
1. Switch will offer central connection to all hosts.
2. Switch will only forward frame according to destination MAC address on per-port base.
3. Will regenerate signals (repeater function)
4. Most switches are working in layer 2 (Data Link) of TCP/IP model.
![Page 36: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/36.jpg)
Switches
GOLDMAN: DATACOMM FIG. 11-03
broadcast source
LAN switch
B
B
B
broadcast source
LAN switch
LAN Switch
broadcast traffic
Broadcasts to all ports on LAN switch.
Single Switch Virtual LANs
Broadcasts only to members of Virtual LAN.
broadcast traffic
A
Virtual LAN assignments
Virtual LAN "A" is a multi-switch Virtual LAN
B
B
B
broadcast source
LAN switch
Multi-Switch Virtual LANs
A
C
C
LAN switch
C
C
Proprietary switch-to-switch communications
high-speed backbone network
A
A
A
A
A
A
A
![Page 37: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/37.jpg)
Forwarding Frame based on DestinationMAC Address
The switch maintain table, called a MAC table, that maps destination MAC addresses with ports used to connect to each node. For each incoming frame, the destination MAC address in the frame header is compared to the list of addresses in the MAC table. If a match is found, the port number in the table that is paired with MAC address is used as exit port for the frame.
The MAC table can be referred to by many different name. It also called Switch table or Bridge table.
![Page 38: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/38.jpg)
Switch Operation
To accomplish Frame Forwarding, Ethernet LAN switches use five basic operations:
Learning: The Mac table must be populated with MAC addresses and their corresponding ports. The learning process allows these mappings to be dynamically acquired during normal operation.
Aging: The entries in the MAC table acquired by the learning process are time stamped. This time stamp is used as a means for removing old
![Page 39: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/39.jpg)
Continues Slide-37
entries in the MAC table. After it is made in the MAC table, a procedure begins count down, once it reaches count 0, the entry is aged out and remove from the table.
Flooding: If a switch does not have a MAC address entry in its MAC table that matches the destination MAC address of received frame, the switch will flood the frame. Flooding involves sending a frame to all ports except the port on which the frame arrived.
![Page 40: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/40.jpg)
Switch Continues
Selective Forwarding:
Selective forwarding is the process of examining the destination MAC address of a frame and forwarding it out to the appropriate port.
Filtering: In some cases, a frame is not forwarded. This process is called frame filtering e.g. a switch does not forward a frame to the same port on which it arrived. A switch will also drop a corrupt frame. If a frame fails a CRC check, the frame is dropped.
![Page 41: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/41.jpg)
Ethernet Bridge
Intelligent device to forward frame according to destination Media Access Control (MAC) address
Forwarding: If the destination MAC address has a port different to the originate port, the frame will be sent.
Filtering: If the destination MAC address is reachable with the same interface when it arrived, the frame will be discarded.
Working in layer 2 (Data Link) of TCP/IP model
![Page 42: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/42.jpg)
Layer 2 Bridging
![Page 43: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/43.jpg)
Bridges
GOLDMAN: DATACOMM FIG. 09-01
20% of LAN traffic travels
between LANs
80% of LAN traffic stays on local LAN
bridge LAN B
Segmentation
Micro-Segmentation
LAN switch
FDDI modules (100 Mbps)
backbone network router
backbone network router
10BaseT module (10Mbps)
10BaseT module (10Mbps)
LAN A
Server Isolation
LAN switch or router
hub hub
Hierarchical Networking
10BaseT hub 10BaseT hub
![Page 44: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/44.jpg)
Router
Redirect packets according to destination logical address (IP address).
Can build routing path between different network segments (subnets)
Can act as firewallCan work as VPN (server) connectionWorking in layer 3 (Network) of TCP/IP
model
![Page 45: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/45.jpg)
Routers
Figure 11-7
![Page 46: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/46.jpg)
![Page 47: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/47.jpg)
Wireless tech introduction
InfraredBluetoothMicrowaveRadioWi-Fi
In general, wireless network is secondary because of two concerns: speed and security. But, it does offer mobility and convenience.
![Page 48: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/48.jpg)
Wireless Networking MediaRadio frequency (RF)LaserInfrared (IR)Satellite/Microwaves
Wireless transmission techniques to carry wireless signals
Wireless signals are electromagnetic waves that travel through the air.
![Page 49: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/49.jpg)
Wireless Networking Media
InfraredLine of sightShort distancesNo obstacles between transmitter and receiver
RadiofrequencyAllows devices to be in different room or even
buildingsLimited radioCan be single or multiple (Spread spectrum)
frequencies
![Page 50: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/50.jpg)
Single Frequency
Is subject to outside interference and geographic obstructions
Insecure (Easily monitored by others)
![Page 51: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/51.jpg)
Spread Spectrum
Multiple frequenciesMore secure
![Page 52: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/52.jpg)
Security in the Wireless Environment
The first level of security in a wireless LAN consists of protecting the radio frequency waveform itself.
![Page 53: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/53.jpg)
Security in the Wireless Environment
Wireless Access PointsWireless BridgesEncryption WEP – Wireless Equivalence PrivacyEAP – Extensible Authentication Protocol
(IEEE 802.1X)
![Page 54: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/54.jpg)
Wireless LAN Topology
![Page 55: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/55.jpg)
Wireless Bridges
![Page 56: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/56.jpg)
Wireless Security
If you think someone might eavesdrop on your LAN radio links…..
Encryption is the key
![Page 57: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/57.jpg)
Wireless Security Approaches
WEP – Wired Equivalency Privacy
IEEE 802.1X or Extensible Authentication Protocol (EAP)
![Page 58: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/58.jpg)
Wireless Equivalent Privacy
WEPIt is a security mechanism defined with the IEEE
802.11 standard.Designed to protect over the over-the-air
transmissions between wireless LAN access points and NICs.
IEEE 802.11b requires 40-bit encryption keysCisco supports the optional 128-bit standard.
![Page 59: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/59.jpg)
WEP Goals
Deny access to the network by unauthorized users who do not possess the appropriate WEP key.
Prevent the decoding of captured WLAN traffic hat is WEP-encrypted without the possession of the WEP key.
Should be supplemented with additional higher-level security mechanisms such as VPNs or Firewalls.
![Page 60: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/60.jpg)
802.1X/EAPExtensible Authentication Protocol
It is an alternative WLAN security approach to WEP
802.1X/EAP focuses on providing:Centralized authenticationDynamic key distribution
It is a standard for port-based network access control
![Page 61: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/61.jpg)
Cabling the WAN
Wide Area Network (WAN) Services
To connect one network to a remote network
Provide different connection methods
Different cabling standards from those of LANs
![Page 62: DCN286 INTRODUCTION TO DATA COMMUNICATION TECHNOLOGY](https://reader035.vdocuments.us/reader035/viewer/2022062322/568146a4550346895db3c1a3/html5/thumbnails/62.jpg)