Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Lesson 6 - Virtual Networks and WiFi

Task

VPN - Virtual private network

The ability to access a LAN via a WAN!

Virtual networks

The use of VPN software enables remote access to an internal network via the internet

There is another kind of LAN that makes use of software rather than hardware to create its network.

These kinds of networks are called VLAN's (Virtual Local Area Network's)

Virtual networks

VPN

VLAN's

Now answer the exam style questions on this topic

Of course, the network is still physically connected, but software 'divides' the physical network into separate segments that cannot communicate with each other

In the diagram we have red, blue and yellow nodes representing the three VLAN's

A secure connection is established between the LAN and the external device.

Data packets sent between the LAN and the connecting node are encrypted so that only the LAN and device can understand them

This is known as VPN tunneling

VLAN's

Can you think of any reasons why we want to have our larger network split up into smaller networks that don't communicate with each other?

So far we have looked at topologies and the hardware (physical equipment) needed to create them

Name me some pieces of network hardware required to make a network.......

HINT - Think about the school network!

Once logged in, the user see's the same network as if they were accessing it internally

Advantages - VLAN's

Flexibility - it is easy to add nodes to the VLAN with just a few commands rather than having to use cables

Installing software - easier as a technician could just install the required software on one VLAN (i.e. finance software)

Security - if a virus was on one VLAN it couldn't spread

Faster - Network traffic is limited to that VLAN

WiFi

Learning Objectives

WiFi Encryption

Encryption is the process of scrambling data so that it becomes unreadable - unless you have a key

On an open or public WiFi network anyone can join and sniff out packets of data from other users.

Encryption ensures that if data was intercepted it would be unreadable.

Content encryption

To understand the concept of virtual networks

To understand the role of frequencies and channels when talking about wireless technology

To understand the importance of encryption when using wireless devices.

3,2,1 Starter

We send a lot of personal data over the internet such as banking details when making purchases

The encryption used on the internet is called SSL (Secure socket layer)

You have probably seen this as a tiny padlock appears in your browser window and URL's start with https

Content encryption

WiFi operates on one of two frequencies - 2.4 or 5Ghz

These frequencies are sub divided up into 'channels' for us to connect our devices to.

Selecting the best channel is important if we want to get the best performance out of our wireless devices

If I were to log into my social media account, I would be using https

Why does this data need to be encrypted?

What could happen if it wasn't encrypted?

On your scrap paper, write down:

3 different network topologies

2 disadvantages of each topology

1 reason why we tend to use wireless technology to facilitate the mesh topology

Sum it up

In exaclty 100 words, sum up

  • WiFi frequency and channels

  • Wifi Encryption

  • Content Encryption

Finish this for homework if necessary and email to me

Learn more about creating dynamic, engaging presentations with Prezi