Projekt Sieci Lan I Wlan Dla Hotelu

In: Computers and Technology

Submitted By alienatwork
Words 752
Pages 4
1. Informacje ogólne o sieciach bezprzewodowych 2.1 Zasada działania 2.2 Zalety i wady 2.3 Topologie WLAN
1.4 Główne standardy w sieciach bezprzewodowych

2. Zabezpieczenia wykorzystywane w sieciach komputerowych 3.4 Protokoły szyfrowania 3.5 Usługi ochronne

3. Urządzenia 4.6 Hosty 4.7 Serwery 4.8 Oprogramowanie 4.9 Sprzęt sieciowy 4.10 Anteny

4. Projekt sieci bezprzewodowej dla budynku hotelowego 5.11 Projekt logiczny sieci 5.12 Plan budynku (hotelu) 5.13 Stacje robocze, komputery przenośne, drukarki. 5.14 Konfiguracja serwera sieciowego 5.15 Analiza bezpieczeństwa 5.16 Kosztorys

5. Podsumowanie 6. Literatura

WSTĘP

Sieć komputerową możemy najogólniej zdefiniować jako zbiór urządzeń elektronicznych połączonych ze sobą w sposób umożliwiający im wymianę informacji o różnym przeznaczeniu i formacie oraz pozwalający na dzielenie sie rozmaitymi zasobami.

Przykłady urządzeń sieciowych:
- komputer, laptop
- serwer
- drukarka
- router, most (bridge), brama (gateway)
- przełącznik (switch) i koncentrator (hub)

Zasoby współdzielone przez urządzenia sieciowe i ich użytkowników można rozumieć wielopłaszczyznowo, miedzy innymi jako:
- sprzęt, np. drukarki i skanery
- pojedyncze pliki lub ich zbiory
- programy
- bazy danych plików i użytkowników
- moc obliczeniowa
- przestrzeń dyskowa

Bezprzewodowa sieć lokalna WLAN (Wireless Local Area Network) W ciągu kilku ostatnich lat sieci bezprzewodowe stały się powszechnie używanym i ogólnodostępnym narzędziem, umożliwiającym komunikację użytkownikom komputerów. Temu zjawisku sprzyjają ciągle spadające ceny urządzeń bezprzewodowych. Dzięki nim obecnie już za niewielkie pieniądze, każdy może stworzyć swoją własną bezprzewodową sieć i korzystać ze wszystkich…...

Similar Documents

Lans and Wans

...hardware and software needed to create and secure the networks. Each location will be set up with its own Wireless local area connection and they will all utilize the Internet to provide a Wide Area connection for the company as a whole. LAN, WAN and Wireless technologies Local Area Networks, or LANs, are a grouping of computers networked together in a generally small geographic area. LAN technology refers to the hardware and software used to create a local area network. The most common wired methods are Ethernet and Token Ring, and WLAN technologies using IEEE 802.11. WAN or Wide Area Network technologies include ATM. TCP/IP, and Frame Relay to connect and transfer data across large distances. Using a cable such as an Ethernet cable computers on a LAN are required to share the network when passing data packets back and forth. Before sending data across the network each computer checks the line for other transmissions. If the line is clear the computer sends the data, if not the computer waits. This method is called CSMA/CD. Wireless LANs or WLANs use RF signals to transmit data across the network. Every computer on a wireless local area network share the same frequency and take turns sending data just like using a cable. Wireless LANs use CSMA/CA to check for an open line of communication to it intended target. The sending device will send out a signal to the receiving device called a Request to Send. If the receiving device is available it will send a clear to......

Words: 1327 - Pages: 6

Algernon Projekt

...introvertált, az anyához vagy az apához kötődik-e jobban, milyen képességekkel rendelkezik szellemi illetve gyakorlati téren, hogyan alakít ki és tart meg kapcsolatokat, milyen módon viselkedik másokkal, vannak-e agresszív késztetései, milyen a munkamódja, tűri-e a monotóniát, pontos illetve megbízható-e, milyen az energia-beosztása, mennyire rendszerető, inkább stabil vagy inkább labilis személyiségnek mondható, hajlamos-e szorongásra vagy depresszióra, erős-e az önkontrollja, szellemi vagy inkább gyakorlati pályára érdemes irányítani stb. A megszerzett ismeretek birtokában a pedagógusoknak képesnek kell lenniük az adott írás- és rajzminta elemzése során a társas viselkedés, érzelmi élet, mentális képességek jeleinek azonosítására. Az Algernon projekt ennél többet nyújt azzal, hogy megalkotói egy olyan rendszert hoztak létre a tudományos íráselemzés és az informatika módszereit ötvözve, mely a számítógépes egér finommozgás elemzése (Electronic Slight Movement, vagyis e-SM) révén képes megkülönböztetni a felhasználókat. A megalkotók szerint a "jövő grafológiája" a számítógépes egérmozgatás, amely ugyanúgy egyéni, mint a kézírás. Az aláírást és a kézzel írt szöveget már régóta használják a személyiségjegyek megismerésére és személyazonosításra. A manapság egyre inkább tért hódító elektronikus környezetben viszont az egérhasználat módja árulkodhat rólunk. Az egérrel való kattintgatással ugyanolyan mikromozgásokat végzünk, mint például kézíráskor. Az ELTE TTK......

Words: 1689 - Pages: 7

Lans

...the transmission of the uncompressed video stream? b. How much data storage space is needed to record two minutes of the video stream? An MPEG-encoded video stream with a resolution of 720 × 480 pixels and a frame rate of 30 fps is transmitted over a network. An old workstation is meant to receive and display the video stream. It takes 56 milliseconds for the workstation to decode each received frame and display it on the screen. Will this workstation display the video stream successfully? Why or why not? Refer to Table 2.4 for a list and description of general system response time categories. Assume you are providing five computer systems for video game developer and the budget for hardware (e.g., CPU clock speed, RAM, bus data rate, disc I/O data rate, etc.) is limited by the consumer. The base price of a system is $1.5K (providing basic >15 s response time for all application scenarios) and each increase in response time range adds $0.5K to the cost of the system hardware. Make a case for the classification of each of the systems running the application scenarios listed that will keep the customer’s total cost for the five systems below $15K. a. System 1—word-processing application and basic Internet access b. System 2—skateboard equipment checkout terminal (for gamer recreation) c. System 3—graphic design and basic Internet access d. System 4—programming and basic Internet access e. System 5—video game testing Note: There is no unique solution. In your answer, each......

Words: 9067 - Pages: 37

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from http://www.comparebusinessproducts.com/briefs/secure-wireless-lan...

Words: 254 - Pages: 2

Wlan Security

...WLAN Security First of all I want to talk about WPA. There are two types of WPA authentication: WPA and WPA2. WPA is designed to work with all wireless network adapters, but it might not work with older routers or access points. WPA2 is more secure than WPA, but it will not work with some older network adapters. WPA is designed to be used with an 802.1X authentication server, which distributes different keys to each user. This is referred to as WPA-Enterprise orWPA2-Enterprise. It can also be used in a pre-shared key (PSK) mode, where every user is given the same passphrase. This is referred to as WPA-Personal or WPA2-Personal. The third type of security is WEP. WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack, and I recommend using WPA2, if possible. WPA or WPA2 are more secure. Stating that above I recommend using WPA2 for everything Sure maybe WPA2 isn’t the “best” option for home use but it’s better to be safe than sorry. Next are the security features other than encryption that can be used on wireless LANs. I suggest changing the default network name. When you set up your network equipment, change the default name to make it more difficult for hackers to find. Do not choose a name that is......

Words: 501 - Pages: 3

,, Projekt Wdrożenia Zintegrowanego Systemu Informatycznego Zarządzania W Firmie New Style and Technology

...Projekt zaliczeniowy ,,Informatyczne Systemy Zarządzania,, Temat Pracy: ,,Projekt wdrożenia zintegrowanego systemu informatycznego zarządzania w firmie NEW STYLE AND TECHNOLOGY,, NEW STYLE AND TECHNOLOGY jest niedlugo istniejącą firmą na rynku, od 2011 roku. Firma ta zatrudnia niespełna 30 osób,w tym wliczając kadrę zarządzającą. NSAT zajmuje się sprzedażą wszelkiego rodzaju produktów AGD,RTV. Jest to sprzedaż pośrednia w firmowych sklepach, jak również pozyskiwanie nowych klientów po przez sprzedaż bezpośrednią.Do tej pory właściciel NSAT zarządzał 3 sklepami firmowymi oraz wspolpracowal z dziesięcioma sprzedawca bezpośrednimi na terenie Wałbrzycha. Na przełomie 2012/2013 firma NSAT nawiazała kontakt z dystruborem artykułów AGD,RTV oraz wszelakiej elektronik pochodzących z Chin. Po uprzednim zbadaniu rynku NSAT podjęło decyzje o wspópracy z firmą z Chin, co miało się wiązać z wzrostem sprzedaży nowych artykułów, jak i powiększeniu sprzedaży na całą Polskę. Po zawarciu kontraktu firma podjeła decyzję o restrukturyzacji firmy,zatrudnieniu nowych sprzedawców jak i osób do działu marketingowego i rozpoczęcia sprzedaży ,, on line,,. Jak do tej pory głowną rolę w firmie odgrywały źródła informacji istniejące wewnątrz organizacji. Pozyskiwanie informacji ze źródeł wewnętrznych było najłatwiejsze i najtańsze, a służyły one przede wszystkim analizom strategicznym przedsiębiorstwa NEW STYLE AND TECHNOLOGY, konfrontacji oferty......

Words: 2373 - Pages: 10

Wlan Security

...Two ways to secure a WLAN, and the ramification if the WLAN is breached. Sebastian Bach Two ways to secure a WLAN, and the ramification if the WLAN is breached. There is an added vulnerability when securing a WLAN than there is with a LAN. The multitude of packets floating around going from one or more access points to a variety of electronic devices can be a tempting arena for those wanting to gain illicit access. There are several ways to increase the security level of a WLAN. The most basic of these would be a router with an integrated firewall. This is almost exclusively found in residential settings. Keeping to the same architecture, firewalls can be quite complex in their modus operandi. Where basic firewalls work on the first three or four layers of the OSI model, the more complex firewalls operate on all seven levels of the OSI model. Often times accompanying these higher end firewalls, there is what is known as a bastion. A bastion is located on the public side of the firewall and acts as bait for would be attackers. The thought behind a bastion is to get the would-be attackers to go there, thinking they have accessed the protected network. Bastions are completely unguarded to make this process easier. Another method of making a WLAN secure is to encrypt data that is on the network. If this is done, the users will authenticated, which will yet again further strengthen the WLAN. For this it is recommended to utilize either WPA or WPA 2 wireless......

Words: 504 - Pages: 3

Wlan

...Week 3 iLab Report Mark Mayle DeVry University NETW360: Wireless Technologies and Services MIXED 11B/11G WLAN PERFORMANCE Submitted to: Professor: Raef Yassin Date: 7/26/2014 Mixed 11b/11g WLAN Performance Specific questions from iLab Guidelines * Answer each of the following questions using the sequence and data from the iLab instructions. Answer all questions in full college-level sentences. 1. In your opinion, what is the purpose of our dropping the transmit power to such a low level? Dropping the transmit power does not affect the speed of the signal, it changes the distance the signal will travel. For example, if you want to protect your network so that the signal doesn’t extend far from your house you would lower the transmit power. 2. What do access point connectivity statistics collected for the roaming station show? 3. What do you think the Wireless LAN control traffic received by the roaming 11b node when it is in the engineering building is composed of? 4. How much did our roaming node reduce the total throughput in our heavily loaded WLAN? 5. What caused this reduction in “goodput” on the 11g WLAN? General questions concerning mixing 11b and 11g clients Guidelines: Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full college-level sentences and paragraphs. 6. Supposedly, 802.11b is......

Words: 450 - Pages: 2

Wireless Lan Security

...SEMINAR REPORT ON WIRELESS LAN SECURITY Contents: I. Introduction…………………………………………………………………1 II. Wireless LAN Deployment……………………………………………7 III. Wireless LAN Security Overview…………………………………10 IV. Protecting Wireless LANs…………………………………………...13 V. Wireless LAN Security Summary……………………………………18 I. Introduction a. The 802.11 Wireless LAN Standard In 1997, the IEEE ratified the 802.11 Wireless LAN standards, establishing a global standard for implementing and deploying Wireless LANS. The throughput for 802.11 is 2Mbps, which was well below the IEEE 802.3 Ethernet counterpart. Late in 1999, the IEEE ratified the 802.11b standard extension, which raised the throughput to 11 Mbps, making this extension more comparable to the wired equivalent. The 802.11b also supports the 2 Mbps data rate and operates on the 2.4GHz band in radio frequency for high-speed data communications As with any of the other 802 networking standards (Ethernet, Token Ring, etc.), the 802.11 specification affects the lower layers of the OSI reference model, the Physical and Data Link layers. The Physical Layer defines how data is transmitted over the physical medium. The IEEE assigned 802.11 two transmission methods for radio frequency (RF) and one for Infrared. The two RF methods are frequency hopping spread-spectrum (FHSS) and direct sequence spread-spectrum (DSSS). These transmission methods operate within the ISM (Industrial, Scientific, and Medical) 2.4 GHz band for unlicensed......

Words: 4933 - Pages: 20

Lan Topologies

...LAN Topologies Jason Smith IT/240 September 7 2014 TAMMY FLEMONS LAN Topologies Case Project 2-1 You have been hired to upgrade a network of 50 computers currently connected to 10 Mbps hubs. This long-overdue upgrade is necessary because of poor network response time caused by a lot of collisions occurring during long file transfers between clients and servers. How do you recommend upgrading this network? What interconnecting devices will you use, and what benefit will you get from using these devices? Write a short memo describing the upgrade and, if possible, include a drawing of the new network. This system ought to have a central server that can control approaching and cordial transmissions. A central server would prevent the whole system from being hindered due to information parcels being sent and acquired. What's more, the center points ought to be moved up to handle 1000 Mbps. The following is a sample of what a littler variant would look like. I think I would use the physical star topology for this setup. Case Project 2-2 Two hundred workstations and four servers on a single LAN are connected by a number of switches. You’re seeing an excessive number of broadcast packets Throughout the LAN and want to decrease the effect this broadcast traffic has on your network. What steps must you take to achieve this goal? Utilizing an expanded star topology would diminish the impacts of the......

Words: 677 - Pages: 3

Mixed 11b/11g Wlan Performance

...Mixed 11b/11g WLAN Performance Specific questions from iLab Guidelines • Answer each of the following questions using the sequence and data from the iLab instructions. Answer all questions in full graduate-level sentences. 1. In your opinion, what is the purpose of our dropping the transmit power to such a low level? 2. What do access point connectivity statistics collected for the roaming station show? 3. What do you think the Wireless LAN control traffic received by the roaming 11b node when it is in the engineering building is composed of? 4. How much did our roaming node reduce the total throughput in our heavily loaded WLAN? 5. What caused this reduction in “goodput” on the 11g WLAN?   General questions concerning mixing 11b and 11g clients Guidelines • Answer each of the following questions using knowledge gained from the iLab, readings from the textbook, and individual research on the Web. Answer all questions in full graduate-level sentences and paragraphs. 6. Supposedly, 802.11b is “backwards compatible” with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary “incompatibility” between b and g? 7. There is another mechanism besides RTS/CTS that helps the incompatibility. Explain briefly the difference between RTS/CTS and CTS-to-self and when each is used. 8. What is the “protection” scheme talked about in the standard? In short, how do 11g nodes......

Words: 366 - Pages: 2

Lan Lan Lan Aland

...LAN Operating Systems Scenarios Read the three scenarios below and answer the questions that follow each scenario. 1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights. What kind of network would you install? How would the pieces and components of this network relate to each other? Define each component. 1.2. I would install a client/server network on a local area network (LAN). Every computer connected to the network would have a network interface card (NIC) and through the use of Ethernet cables, connect to the company server. Users would be able to store files and share company resources through the server. Implementing a Windows based operating system on the server will allow for the network administrator to assign different security rights and privileges to different users. I think that for this particular situation I would set up an extended star network. I would choose this one because the business is relatively small and plans to grow, this type of network setup is very easy to add users onto and also still provides the access restriction needed for lower level employees and the ease of access for higher level employees without them being able to see what the other is able to access. “As the name implies, this topology is a star of stars. A central device, usually a switch, sits in the middle...

Words: 583 - Pages: 3

Problemy Z Czasem I Kwantami

...z kwantami, determinizmem i chaosem Dzisiejsza fizyka pokazuje nam, że świat chyba nie jest ciągły, a dyskretny. Świat rozumiany jest tutaj jako czasoprzestrzeń, a co za tym idzie sam czas musi być nieciągły. Jak się przedtem przyjmowało. Z nieciągłości czasu właściwie wynikać ma nieciągłość materii. A zatem wszyscy jesteśmy dyskretni. Nasza dyskretność nie polega na dobrych manierach i tym, że potrafimy się zachować w towarzystwie nie zadając trudnych pytań, dotyczących życia osobistego. Dyskretność to również pojęcie matematyczne. Jest to odwrotność ciągłości. Dobrym obrazowym przykładem dyskretności są światła drogowe. Mają one trzy stopnie: zielone, pomarańczowe i czerwone, nie ma płynnego, ciągłego przejście między poszczególnymi kolorami. Ciągłe, jeśli jesteśmy już przy kolorach, jest przejście między kolorami tęczy. Mówimy, że tęcza ma siedem kolorów, jednak miedzy poszczególnymi wyróżnionymi i nazwanymi kolorami są stany pośrednie, które przynajmniej teoretycznie możemy dzielić w nieskończoność. Nie jest to zbyt fortunny przykład przy założeniu, że cały świat ma być dyskretny. Jeśli tak jest to i kolory tęczy są zbiorem dyskretnym, a nie ciągłym. Sądzę jednak, że jest to dla czytelnika adekwatny obrazowo przykład, aby zrozumieć pojęcia ciągłości i dyskretności. Przestrzeń ma być skwantowana. Wartości pola powierzchni i objętości kwantów przestrzeni mają być pochodnymi długości Plancka. Ta zaś wynika ze stałej grawitacyjnej i prędkości światła.......

Words: 1905 - Pages: 8

Wlan Security

...Practical WLAN security Abstract This report covers the basics security standards in today’s wireless networks, how they work, existing flaws and vulnerability’s. We will go trough the basic architecture of 802.11, the security it provides like WEP, WPA and WPA2. Further more we will go trough some practical experiment exploiting the flaws described in the article. The result of our practical experiments show upon how easy it is to break encryptions and deploying Evil twins, even with very little understanding of the security structure. 2.1 802.11 Standards The architecture of the wireless LANs is specified by the 802.11 standard created by IEEE [1]. There are a few versions of the standard with differences in frequency and speed. Briefly these are a few of the current standards 802.11 (1997): 2.4Ghz, 2Mbps 802.11a (1999): 5Ghz, 54Mbps 802.11b (1999): 2.4Ghz, 11Mbps 802.11g (2003): 2.4Ghz, 54Mbps Even when things like speed and frequency differ, most things are the same as the original 802.11 standard. They all are using the same medium access protocol, CSMA/CS and have features for increasing range by the cost of speed. They also support the two connection modes of ad-hoc and infrastructure, but since this reports is about practical WLAN security we'll not go any further in on that and just care about the infrastructure mode. 1. Introduction Where ever you go, either it’s an workplace, coffeeshop, library or even a park there is a high chance today......

Words: 4798 - Pages: 20

Lan Topologies

...LAN Topologies Lord Bones IT240 Jan 01, University of Phoenix - AXIA College LAN Topologies With this assignment I will discuss some topologies of a LAN as requested by questions 11, 12, and 13, chapter three from the textbook Local Area Networks. A “LAN (Local Area Network) topology is the appearance or layout of a network” (Regan, 2006). There are two forms of topologies of a network, namely, the physical- and logical topology with each its own types of topologies. The physical topology is what someone can see with his or her own eyes, i.e. a workstation, servers, cables, etc. while the logical topology is the dataflow of the network, how the data is moving from one point to another (Regan, 2006). In the following I will describe two physical topology types and one logical topology type, following the scenarios in the question’s mentioned above. In the first scenario there are four servers in the network with no hub present. The first (A) server is connected to the second (B), third (C), and the fourth (D). The second is connected to the third and fourth, while the third is connected to the fourth. (See figure 1.) This type of physical topology is called a Mesh Topology. A Mesh Topology is a topology where “every computer is linked to every other computer” (Regan, 2006). With this type of topology there is no hub or a similar device present. Also this type is difficult to install and certainly when it has to be reconfigured when a new computer is added to the......

Words: 817 - Pages: 4