3.2 Understanding Wired and Wireless Networks Part 2 - MTAN
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Video Transcription
00:00
welcome to Sabri's Empty A 98 3 66 network and Fundamentals Suffocation Prep course.
00:09
Again, this is a continuation again of margin on the three. Now, if you will call and mother of three, we discuss.
00:16
Listen, three was dealt specifically with understanding. Why don't wireless networks?
00:21
Let's take a look at the objectives
00:25
that Dennis is particular presentation is the understand while is networking.
00:29
Now, if you remember that, the basic difference when a guided and unguided media is that in the gathered media again, which we dealing with wires wired network, the signal travels through a physical media went. And when you look at unguarded media,
00:44
the signal travels studio air. Good example. Be while it's networking that brings us to a very interesting pre assessment question here.
00:52
Wouldn't follow is the most secure encryption use. And while it's networks today, is it a weapon?
01:00
Is it B w p A. Is it c w p a two or d 802.1 x
01:07
if you say like the w p A. To your absolute correct several types of encryption available for wireless network, but the most secure is W P. A. To when it's used with A S advanced encryption standard. In other words,
01:21
so we look at while a squawk show. In other words, time on the wireless network type structure. We have an access point. Now it's a wireless transmitter and receiver that connects to your white network and provides a connection to the network for your wireless devices. When you think about the service that identify, it's a name of value assigned to identify a wildest land
01:41
from others.
01:42
You can actually as a security Magnum, but they're not the most efficient you can have High your s I. D. Is. Sometimes consider a security measure, but not effective, because S I D can still be learned using some type of wild sniffing device.
01:56
Then we have what we call the infrastructure mode versus the what we call the add hot move.
02:01
Now we think about infrastructure, but it requires a central access point, and all transmission go through that access point. We think about ad hoc mode does not have an access point, and devices communicate directly.
02:15
So again, this would talk about a service. That identifier
02:19
is a primary designed to diss deuce. Awhile, it's look every network
02:23
from other networks. In other words, is used a group and identified the E s s i s s that a new coast connecting to you. Advice can ease, identify and connect to it. For example, all exits point and Whole Station must specify the correct s idea of their E s s and order to a
02:40
vindicate and gain what we call
02:43
network connectivity
02:47
Now fourth Wallace techniques.
02:51
We have the idol to that 11. Basically again, it has frequent hopping spread spectrum and basic change. The frequency channel Every few suckers in a set of pat in a set pattern that both transmitter and receiver know up to two megabytes per second. We have also direct secret spread spectrum.
03:07
Basic expresses the transmission across the spectrum.
03:10
It's at the same time.
03:14
Then we also have what we call again. Another one called the O. F. D. M, which is a large number of closely space again sub, carries signals that carried out on several parallel data screens. Then we have another term called a v O F d m. Basically, this one issue special diversity
03:32
to increase the north
03:34
interference and multi pass. So these are the different types off. While it's techniques that you allies in NATO to that 11 type techniques continue on, we also have sell your mobile while it's type techniques as well. We have frequency division motive access, which divides to fix arranged into bands
03:53
I didn't have time to visit multiple access. Increase speed again over the gin, the freaks, the division multiple access point by dividing the channels into time slots and the science lots to calls.
04:05
We also have code division multiple access, which assigns a unique code to each call or transmission, and it spreads it out across the spectrum. Align the call to use all the frequencies.
04:17
Then again, we have the O F d the M es, which takes FDA if f d m. A a step further by subdividing Fuchs into sub channels. And it's a quiet about our 44 G type devices.
04:30
The last one we have is a global system for mobile communication is the vice. Contains subscribers, subscribers. Identity module chip
04:40
Cell phone cloning is a problem with this particular technique default global standard for mobile telecommunication. We also have satellite which revised TV service is an Internet access to your homes as well as your businesses.
04:53
That's basic to a wireless networks.
04:56
Again, we think about a wild network allows your wild advice a life or we call central connectivity of client computers and handheld devices.
05:03
Or, they might offer extension of continued to a pre existent Wallace never and could be used to connect local area networks to the inner. In fact, you can have your net could be part be part basically be wowed as well as Wallace. In fact, my network is that I actually haven't said what part of my network wired, but we remaining part of network is a basically
05:24
Wallace type
05:25
set up,
05:27
not addition. Someone is that can be connected, records each other in what we call the point the point type fashion.
05:32
The next thing I want to take a look at it's called a wireless access point
05:36
again is a hardware device or configuration on a local area network that allows while it's capable devices. And why isn't it was to connect to a while. It's standard, including WiFi, or perhaps even blue, too,
05:49
And so one far note for the four were known well. It's devices is a wireless access point a weapon
05:59
meant force are Wallace network adapters.
06:00
These allow us to be to connect our being our desktop computers to our wireless network.
06:08
They come in many shapes, form inside you. Can you have us be type connected for the wireless adapter? You can have work on a PC, card, express card and so forth.
06:16
Another thing that's very useful is called a wireless repeater is a network device for propagating. While its network signals beyond the typical boundary of a network, Wallace repeaters are generally passing devices and can Onley bridge connections between the resident network and the holes pursuing access to that network.
06:34
A wildest repeated may also be known as an expander.
06:39
Then we have a bridge
06:41
now basically a Wallace breathe similar to a wireless repeater
06:45
and basically allow you to join two networks so that they could communicate each other and serve as 1/2 what we call a single network.
06:51
As WiFi and other wireless networks expand in popularity, they need to link these networks with one another and with older what we call wide net with increase bridges make inter network connection possible, and this wireless bridging technology consists of a hardware as well as again network protocols. Support
07:12
didn't have a Wallace Land.
07:14
Now Wallace Land. Ah, what other words, while it's located, network is a term to refer to a local area network that does not need cables to connect the different devices. Instead, radio Waves and our Tripoli eight or two that 11 are used to communicate
07:30
a wildest look. Every network is a Wallace this distribution method for two or more devices
07:35
that use high frequency radio ways and often include an access point to the Internet. A wireless land allows users to move around the coverage area, often a home or small office. Why maintaining what we call network connection
07:50
Now Here, let's take a look at the wildest land type standard
07:55
Aggie again. We have the eight or 2011 which again, this this particular chart lists the standard.
08:00
It leaks this the frequency band
08:03
as well as speed as well.
08:05
And we are one of the this. I don't think this is the latest one, but they're able to that 11 in which has 2.45 gigahertz again. The speed is 600 megabytes per second. Here.
08:16
This is new guys. You're in Roger.
08:20
Continue on we get we look at it while its standards. Here we have Bluetooth,
08:26
which creates a personal area network or pad.
08:28
We have infrared basically used for short distance or short connection between two devices. They both have an infrared port
08:35
speed somewhere around four megabytes per second. The distances in where from up to five meters
08:43
now for security,
08:45
we have different types of security. Here we have open system authentication,
08:50
which again, based in this case, it contains only a station I D. And a vindication response. Then we have a shared kit that, in case it using what we call wept and share a secret key for authentication now obviously wept, is again is antiquated.
09:05
It can easily be hacked into
09:07
and are so literal. See too many individual you lies and well, unless, of course, they want a network to be hacking into.
09:13
So let's take a look at the different Wallace equip shin options that you have available.
09:18
Obviously we're not use well
09:20
is not the most secure. If you look at this chart here, the most secure one is W. P. A. To
09:26
and again has an encryption level 256 bits
09:30
absolutely make it much more secure if you use it with a s, which is advanced encryption standard.
09:37
Now here, get on the next start. Here we see again. Ah, looking at a while of security
09:43
W p A used T k i p for encryption was generates a new key for each package. And as I mentioned, the most secure one is W P. A. To again. You have the personal one here,
09:54
and he had a W p A. Two for the Enterprise.
09:58
Now force a while it's Moz. Now it's seven different ways you can connect to your wireless net. We could do it. They would mention the infrastructure mode,
10:05
which occurs when while its class connect to and are authenticated by Access Point.
10:11
Unlike their ad hoc mode, basically all of the client communicate directly with each other.
10:16
That brings us to a post assessment questions, and the questions follows what the followers used to identify a wireless network. Is it eh?
10:24
Network idea? Is it be freaks? Identifier isn't while it's password or is a s s i d.
10:31
If you say that this is I d. That's the correct answer so, in summary,
10:35
doing this particular present tasting we discussed Twisted Pair Cable's most common cable use,
10:41
we learned, is most common in all copper based type networks.
10:45
We learned that twisted pair cables are categorized according to the twist for foot that maximum data rate and the frequency.
10:52
We also learned that five optic cables use when Longwood business because, as compared to your twisted pair of cabling type,
11:00
we learned a five optic cable uses part of your backbone for of the faster networks
11:05
we learned a wireless network devices might allow for central connectivity of client computers and handheld device
11:11
order may often extend your current TV, too, in a pre existing tight Wallace network and can be used in the entire local area networks to the Internet.
11:18
Now obviously a couple different ways to connect to the wireless network primary. We haveto discuss infrastructure mode
11:24
as well as ad hoc move.
11:28
Well, we learned to recognize why networks and media types we get we talk, discuss twisted pair of cabling
11:33
again. We discuss again some different terms as where we learn that some of the basics about five optic cabling, as was the standards,
11:41
obviously to comprehend a while is that Would this include while we had had wise advice is that they understand the wallet, settings, configurations and standing. We also discussed the encryption method as well.
11:54
In the upcoming presentation, Martyr for we'll be discussing understanding Internet protocols, Part one.
Up Next
Instructed By
Similar Content