#1
a. LAN
b. MAN
c. WAN
#3
MAC- media access control
#5 WAN wide area network
#7 Topology- the architecture of a network
#9 D. token-ring hub
#11 hub- broadcasts the data it receives t oall devices connected to its ports
Switch- forwards a fram it receives directly out the port associated with its destination address
#13
A. frame size
#15 64 and 1518 bytes
#17 organizationally unique identifier- the first 6 digits of an address which are used to indicate the vendor of the network interface.
#19
a. 00-C0-4F-49-68-AB: dell computer
b. 00-0A-27-B7-3E-F8: apple computer inc.
c. 00-04-76-B6-9D-06: com corporation
d. 00-00-36-69-42-27: ATARI corporation
#21 TCP/IP transmission control protocol/ internet protocol
#23
…show more content…
This gives hackers more time to crack the encryption.
Advantages of WPA over WEP are:
Length of IV (initialization vector) is now 48, comparing to WEP’s 24. This gives you over 500 trillion possible key combinations.
IV has much better protection with better encryption methods. This is prevention of reuse of IV keys.
Master keys are never directly used. Better key management. Impressive message integrity checking.
#33 The SSID (or Service Set IDentifier) names and identifies a wireless network,
It is something that access points broadcast to client devices to announce the presence of the access point.
The SSID denotes the name of a network on a Wireless Local Area Network (WLAN), and could be any name up to thirty-two (32) characters in lenght.
For security reasons, broadcasting of this SSID is commonly turned off on some routers.
#35 the IP addresses are handled by by the router which will give a private IP address this allows all home computers to have access to the internet. NAT translates the private IP address to a public address for routing over the internet.
#37 a VPN establishes a secure network connection and protects the LAN’s data from being seen by outsiders. The VPN connection enables a remote or mobile user to access the network as if they were actually at the network, the connection is encrypted providing privacy for the data packets being transmitted.
#39 a port number tracked with the client computer’s private address when
Virtual Private Networks (VPNs) are used to allow a remote public connection to an internal network. A VPN is essentially a virtual tunnel connecting a remote user (Tunnel Vision). The traffic within the VPN tunnel is encrypted, and there are two ways to do this. One way is Internet Protocol Security (IPsec) and the other is Secure Sockets Layer (SSL).
A: LAN: LAN stands for Local Area Network. LAN is a network which cover a small area like colleges, schools or buildings.
There are 9 IEEE 802.11 services in total which can be classified into to categories:
IP stands for ‘Internet Protocol’ and is made of numbers and periods. It is the
Each IP that accesses the internet will be under a NAT protocol to help protect the users accessing the internet.
This utilizations two sorts of assaults Dictionary assault and Brute Force Attack for hacking wifi passwords.
A VPN is a private network that uses a public network (usually the Internet) to connect
VPN is the abbreviation of Virtual Private Network. A VPN can extend a private network (like local network) across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus benefit from the functionality, security and management policies of the private network [7].
Wi-Fi Protected Access 2, the follow on security method to WPA for wireless networks that provides stronger data protection and network access control. It provides enterprise and consumer Wi-Fi users with a high level of assurance that only authorized users can access their wireless networks. Based on the IEEE 802.11i standard, WPA2 provides government grade security by implementing the National Institute of Standards and Technology (NIST) FIPS 140-2 compliant AES encryption algorithm and 802.1x-based authentication.
36. The two-factor authentication generally combines “something you have” and “something you know” or “something you have” and “something you are.”
A wireless network is any type of computer network that uses wireless data connections for connecting network nodes .Wireless networking is a method by which homes, telecommunications networks and enterprise (business).Installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations. Wireless telecommunications networks are generally implemented and administered using radio communication. This implementation takes place at the physical level (layer) of the OSI model network structure.
Physical media is what physically connects the computers connected on the internet. For this network two physical media will be used to allow access to the application layers of the system. The coaxial cables will be used to create a WAN. While a wireless protocol will be used in allowing users to roam within the network. A LAN will be represented as follows;
WiMAX, is an abbreviation of “Worldwide Interoperability for Microwave Access”. WiMAX is a telecommunication standards designed to enable the wireless transmission of data in a variety of ways. It supports the transmission of voice, video, Voice Over IP (VOIP), data, as well as several multimedia applications. WiMAX provides wireless broadband services alternative to cable and digital subscriber line (DSL). Also, it provides mobile communication and wireless broadband services
Router ID: In OSPF this is a unique 32-bit number assigned to each router used to identify themselves and others in the LSDB.