Вы находитесь на странице: 1из 13

Cisco Certified Network

Associate
Cisco Networking Academy
Turku Polytechnic
CCNA1 – Module 3 – Media
• Copper media
– Data is coded with electricity
– Cable specifications (10BASE-T)
– Coaxial cable, shielded twisted-pair cable,
screened twisted pair cable,
unshielded twisted pair cable (most popular)
– Three different types of twisted pair cables:
• Straight-through, crossover and rollover
CCNA1 – Module 3 – Media
• Optical media
– Data is coded with light
– Wavelength used in fiber is either 850nm, 1310
nm or 1550nm (visible light is between 400 –
700 nm)
– Only one ray (created by LED or LASER) of
light is in use (compare to light bulb)
CCNA1 – Module3 – Media
• Data transmission is based on reflection
• Reflected ray will always refract when
traveling through transparent material (e.g.
Class)
• Fiber optic
– Multimode fiber, core 50 or 62,5 microns
– Single-mode fiber, core 8,3 to 10 microns
– Cladding in both 125 microns
CCNA1 – Module 3 – Media
• Problems with fiber
– Attenuation
– Scattering
– Absorption
– Dispersion
– Microbend and macrobend
– Splicing
CCNA1 – Module 3 – Media
• Wireless LAN
– 802.11, 1997, 1 to 2 Mbps, 2,4 GHz
– 802.11b, 1999, WI-FI, up to 11 Mbps, 2,4 GHz
– 802.11a, 1999, up to 54 Mbps, 5 GHz
– 802.11g, 2003, up to 54Mbps, 2,4 GHz
– Rate doubling (108 Mbps) with proprietary
technology
CCNA1 – Module 3 – Media
• There is three different types of radio transmission
within 2,4 GHz:
– Frequency hopping spread spectrum (FHSS)
– Direct sequence spread spectrum (DSSS) 802.11,
802.11b
– Orthogonal frequency-division multiplexing (OFDM)
802.11g

• And one within 5 GHz: OFDM 802.11a


CCNA1 – Module 3 – Media
• 802.11 differ from traditional Ethernet by
frames. Only data frame have some
similarities to Ethernet frame.
• Two other frame types are:
– Management frame
– Control frame
CCNA1 – Module 3 – Media
• Authentication can be null process or can be
handled e.g. with authentication server.
• Two methods of authentication
– Open connectivity with SSID
– Shared key connection with Wireless
Equivalency protocol (WEP) encryption
– Either doesn’t prevent hacking
CCNA1 – Module 3 – Media
• Association happens after authentication.
There are three different types:
– Unauthenticated and unassociated
– Authenticated and unassociated
– Authenticated and associated
CCNA1 – Module 3 – Media
• Wireless security
– VPN technologies
– EAP-MD5 challenge (=CHAP)
– LEAP (Cisco), Lightweight Extensible
Authentication Protocol
– User authentication
– Encryption
– Data authentication
UTP
Fiber

Вам также может понравиться