Local
Area Networks (LANs)
A network is any collection of
independent computers that exchange information with each other over a shared
communication medium. Local Area Networks or LANs are usually confined to a
limited geographic area, such as a single building or a college campus. LANs
can be small, linking as few as three computers, but can often link hundreds of
computers used by thousands of people. The development of standard networking
protocols and media has resulted in worldwide proliferation of LANs throughout
business and educational organizations.
Wide
Area Networks (WANs)
Often elements of a network are
widely separated physically. Wide area networking combines multiple LANs that
are geographically separate. This is accomplished by connecting the several
LANs with dedicated leased lines such as a T1 or a T3, by dial-up phone lines
(both synchronous and asynchronous), by satellite links and by data packet
carrier services. WANs can be as simple as a modem and a remote access server
for employees to dial into, or it can be as complex as hundreds of branch
offices globally linked. Special routing protocols and filters minimize the
expense of sending data over vast distances.
Wireless
Local Area Networks (WLANs)
Wireless LANs, or WLANs, use radio
frequency (RF) technology to transmit and receive data over the air. This
minimizes the need for wired connections. WLANs give users mobility as they
allow connection to a local area network without having to be physically
connected by a cable. This freedom means users can access shared resources
without looking for a place to plug in cables, provided that their terminals
are mobile and within the designated network coverage area. With mobility,
WLANs give flexibility and increased productivity, appealing to both
entrepreneurs and to home users. WLANs may also enable network administrators
to connect devices that may be physically difficult to reach with a cable.
The Institute for Electrical and
Electronic Engineers (IEEE) developed the 802.11 specification for wireless LAN
technology. 802.11 specifies over-the-air interface between a wireless client
and a base station, or between two wireless clients. WLAN 802.11 standards also
have security protocols that were developed to provide the same level of
security as that of a wired LAN.
The first of these protocols is Wired Equivalent Privacy (WEP). WEP provides security by encrypting data sent over radio waves from end point to end point.
The first of these protocols is Wired Equivalent Privacy (WEP). WEP provides security by encrypting data sent over radio waves from end point to end point.
The second WLAN security protocol is
Wi-Fi Protected Access (WPA). WPA was developed as an upgrade to the security
features of WEP. It works with existing products that are WEP-enabled but
provides two key improvements: improved data encryption through the temporal
key integrity protocol (TKIP) which scrambles the keys using a hashing
algorithm. It has means for integrity-checking to ensure that keys have not
been tampered with. WPA also provides user authentication with the extensible
authentication protocol (EAP).
Wireless
Protocols
Specification
|
Data Rate
|
Modulation Scheme
|
Security
|
802.11
|
1 or 2 Mbps in the 2.4 GHz band
|
FHSS, DSSS
|
WEP and WPA
|
802.11a
|
54 Mbps in the 5 GHz band
|
OFDM
|
WEP and WPA
|
802.11b/High Rate/Wi-Fi
|
11 Mbps (with a fallback to 5.5,
2, and 1 Mbps) in the 2.4 GHz band
|
DSSS with CCK
|
WEP and WPA
|
802.11g/Wi-Fi
|
54 Mbps in the 2.4 GHz band
|
OFDM when above 20Mbps, DSSS with
CCK when below 20Mbps
|
WEP and WPA
|
Internet Vs Intranet Vs Extranet
The
Internet: The Largest Network of All
With the meteoric rise in demand for
connectivity, the Internet has become a major communications highway for
millions of users. It is a decentralized system of linked networks that are
worldwide in scope. It facilitates data communication services such as remote
log-in, file transfer, electronic mail, the World Wide Web and newsgroups. It
consists of independent hosts of computers that can designate which Internet
services to use and which of their local services to make available to the
global community.
Initially restricted to military and
academic institutions, the Internet now operates on a three-level hierarchy
composed of backbone networks, mid-level networks and stub networks. It is a
full-fledged conduit for any and all forms of information and commerce.
Internet websites now provide personal, educational, political and economic
resources to virtually any point on the planet.
Intranet:
A Secure Internet-like Network for Organizations
With advancements in browser-based
software for the Internet, many private organizations have implementedintranets.
An intranet is a private network utilizing Internet-type tools, but available
only within that organization. For large organizations, an intranet provides
easy access to corporate information for designated employees.
Extranet:
A Secure Means for Sharing Information with Partners
While an intranet is used to
disseminate confidential information within a corporation,
an extranet is commonly used by companies to share data in a secure
fashion with their business partners. Internet-type tools are used by content
providers to update the extranet. Encryption and user authentication means are
provided to protect the information, and to ensure that designated people with
the proper access privileges are allowed to view it.
No comments:
Post a Comment