* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Notes - Andrew
Survey
Document related concepts
Net neutrality wikipedia , lookup
Wireless security wikipedia , lookup
Internet protocol suite wikipedia , lookup
Net neutrality law wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Deep packet inspection wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
Transcript
What is a Network 13 April 2015 15:09 A computer network is a number of computers linked together to allow them to share resources. Networked computers can share hardware, software and data. Most computer networks have at least one server. A server is a powerful computer that provides one or more services to a network and its users. For example, file storage and email. LANs and WANs There are two main types of network: 1. Local Area Network (LAN) 2. Wide Area Network (WAN) LANs and WANs There are two main types of network: 1. Local Area Network (LAN) 2. Wide Area Network (WAN) LAN A LAN covers a small area such as one site or building, eg a school or a college. WAN A WAN covers a large geographical area. Most WANs are made from several LANs connected together. The internet is a WAN. A network of bank cash dispensers is a WAN. A school network is usually a LAN. LANs are often connected to WANs, for example a school network could be connected to the internet. WANs can be connected together using the internet, leased lines or satellite links Advantages and disadvantages of networks Advantages Sharing devices such as printers saves money. Site (software) licences are likely to be cheaper than buying several standalone licences. Files can easily be shared between users. Network users can communicate by email and instant messenger. Security is good - users cannot see other users' files unlike on stand-alone machines. Data is easy to backup as all the data is stored on the file server. Disadvantages Purchasing the network cabling and file servers can be expensive. Managing a large network is complicated, requires training and a network manager usually needs to be employed. If the file server breaks down the files on the file server become inaccessible. Email might still work if it is on a separate server. The computers can still be used but are isolated. Viruses can spread to other computers throughout a computer network. There is a danger of hacking, particularly with wide area networks. Security procedures are needed to prevent such abuse, eg a firewall. From <http://www.bbc.co.uk/schools/gcsebitesize/ict/datacomm/2networksrev1.shtml> and following pages Teacher's URL: http://127.0.0.1:800/Networking%20And%20Servers%20And%20Security%20And%20HTML/www.bbc.co.uk/schools/gcsebitesize/ict/da tacomm/2networksrev1.shtml What is Client-Server 13 April 2015 15:10 Video: (Basics) Mr. Clarkson Talks About... Client-Server and Peer-Peer Network Models Notes: Server side is more powerful on the dynamic generation of pages Peer to Peer makes things a lot easier on servers when downloading. --------------------------------Structure of the Internet: Client server model The history of computing started off with centralised computers (in many cases mainframes) or servers performing all the calculations. Client computers were then attached to these centralised computers (servers) and if you wanted to calculate something, you would have to wait for the central computer to respond. As computing power got cheaper client nodes became more powerful and the central computer less important. However, with the growth of the internet, there has been a shift back to a client server model. Powerful central computers store information such as emails, documents, music and videos or offer services such as file hosting, printing, game hosting and internet access; client computers fetch information and use services from these central servers. In the next few years you are likely to see more and more software moving away from running on your desktop to running on remote servers and you accessing it as a client, this is called software as a service. the client-server model As an example of modern client server model consider a video sharing website. The website, let's call it mutube, has a server that stores all the videos that are uploaded to the site. The website is used by millions of clients a day and each of them connects to the server to watch videos. When a client connects to mutube the server and asks for a particular video, the server loads the video into RAM from a large array of hard disks and mutube sends the video to the client. The client on receiving the video, presses play and watches the video. Other examples of servers might be a shared printing service in a college. The print server will be hosted on a single computer, and when anyone in the college wants to print, the request is sent to the server. In this case the server will keep track of how much printing credit each user has and make sure that the print queue is dealt with properly. Extension: Cloud Computing The current client-server model is starting to change, with companies being less likely to offer services with a centralised server. Increasingly internet firms are reaching a global clientèle, it makes little sense to have a server or servers based in one location as if your servers are in America and some of your users in Armenia, these users will experience slow access to your services. Another problem is if a power cut affects your server or the connection to that one server or set of servers goes down then the service you are offering the internet will also stop. With cloud computing the services may be distributed all over the globe, meaning that wherever you are, you'll have a server reasonably close to you offering access to the data and services you need. It also means that if one server goes down other servers in different locations can keep the service running. Keeping databases synchronised across the globe, so your mail client has the same mails in Switzerland as in Swaziland, is a complex task and firms such as amazon and rackspace offer services to help you handle this. One downside with cloud computing is you are never quite sure where your data is, and if you're not careful you might find data being stored in countries that have less stringent data protection laws than your own. Server - a computer program running to serve the requests of other programs, the "clients" includes: Printing File sharing Game hosting Websites Other web services Client - an application or system that accesses a service made available by a server Clients are software programs and processes that connect to servers, sending requests and receiving responses. Client examples include: Web browser page requests Chat systems on mobile phones Online games From <http://en.wikibooks.org/wiki/Alevel_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Inter net/Client_server_model> Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML/en.wikibooks.org/wiki/A level_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/Client_serv er_model Client-Server - Examples (W) 13 April 2015 15:44 Below: SAP ORACLE ERP BANKS SARS GoogleDrive GoogleDocs MS Cloud SAAS What is the Internet, WWW, Intranet 13 April 2015 15:11 Video: Basics Mr. Clarkson Talks About... The WWW, The Internet & Intranets Notes: WWW Emails File Structures Newsgroups IRC FTP Distinction: o Internet: about computer o Collection of web pages on the Internet ====================================================== Structure of the Internet: Internet, Intranet and World Wide Web The Internet - a global system of interconnected computer networks that use the standard Internet Protocol suite (TCP/IP) The internet impacts heavily upon the way that we live, study and work. But it hasn't always been that way. In the 1960s ARPA, a part of the American Department of Defence, funded several large computing projects. These projects were very expensive and situated in different parts of the USA. It was unreasonable to expect research groups to travel to each of these sites, and it was far too expensive to build more of them, what was needed was a method to link them together so that information could be easily exchanged. ARPANET was created, basing communication on packet switching. This system of communication broke messages into chunks which were then passed to other sites using a network of interlinked computers. Due to the unreliable nature of connections, if any link in the network broke, a packet could be re-routed around the problem to reach its destination. The concept is similar to how drivers can take different routes when they meet a blocked off road. ARPANET logical map, March 1977 Extension: Cold War Rumours A popular myth is that the internet was started because the American Department of Defense were looking at how they could maintain control of military installations in the event that they were on the receiving end of a Soviet Nuclear strike. This would mean that communications between sites would have to be maintained even if one or more of the sites connecting installations were knocked out. A sound idea, but not the reason for starting ARPANET. The network never carried any classified material and was predominantly used for research purposes, connecting research institutions, including Universities in the UK. In the 70s ARPA funded other experimental networks and made an effort to unite them. At the same time the limits of the initial network to 63 nodes and 252 hosts were reached and so the TCP/IP protocol was created. This protocol, or set of rules, allowed different networks to talk to each other. This protocol still forms the main link between networks in the internet to this day. As the internet consists of many different networks interlinking with each other, the internet has no central structure or governing body. This makes it very robust, meaning that if one connection between two hosts is lost, you can probably find another route to send information by. It also poses a threat to some governments, as they struggle to restrict information available to their citizens. Countries such as North Korea and China funnel their internet links through a few connections to the outside world, this means the government can control what comes in an out of the country, giving them the ability to filter which websites are available and allow them to switch the internet 'off' at times of crisis, by cutting these connections. This happened during the 2011 Arab Spring, where Tunisia, Egypt and Libya tried to stop their citizens from getting information from the outside world. Diagram of routing paths through a portion of the Internet, notice the multiple routes you can take to get from one network to another World Wide Web (WWW)[edit] World Wide Web - a system of interlinked hypertext documents accessed via the Internet The first thing to notice is that the World Wide Web is not the internet, but a subset of what the internet offers. The internet hosts all forms of data, including games, video, telecommunications etc. while the WWW only transmits hypertext documents. The WWW is accessed through a web browser linking files together using hyperlinks and was invented by a British computer scientist, Sir Tim Berners-Lee in 1989. Intranet[edit] Intranet - a private network within an organisation which may offer printer sharing, file sharing, communication, private websites etc...which uses internet technologies such as TCP/IP and web browsers the relationships between the internet, intranets and the World Wide Web From <http://en.wikibooks.org/wiki/Alevel_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/ Internet,_Intranet_and_World_Wide_Web#The_Internet> Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML/en.wikibooks.org/wiki/Alevel_Computing/AQA/Computer_Components,_The_Stored_Program_Concept_and_the_Internet/Structure_of_the_Internet/Internet,_Intran et_and_World_Wide_Web#The_Internet Internet from Wiki - Comprehensive Overview 13 April 2015 15:53 (Comprehensive overview as well: http://en.wikipedia.org/wiki/Internet_access_ ) ================================== Internet From Wikipedia, the free encyclopedia T The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite(TCP/IP) to link several billion devices worldwide. It is a network of networks[1] that consists of millions of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), the infrastructure to supportemail, and peer-to-peer networks for file sharing and telephony. Many concepts and debates on technology, which shaped the Internet, date back to research commissioned by theUnited States government in the 1960s to build robust, fault-tolerant communication via computer networks.[2] This work evolved into efforts in the United Kingdom and France, that led to the primary precursor network, the ARPANET, in the United States. In the 1980s, the work of Tim Berners-Lee, in the United Kingdom on the World Wide Web, theorised the fact that protocols link hypertext documents into a working system,[3] hence marking the beginning the modern Internet.[4]From the early 1990s, the network experienced sustained exponential growth as generations of institutional, personal, and mobile computers were connected to it. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks.[5] Though the Internet has been widely used by academia since the 1980s, thecommercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of December 2014, 37.9 percent of the world's human population has used the services of the Internet within the past year--over 100 times more people than were using it in 1995.[6][7] Internet use grew rapidly in the West from the mid-1990s to early 2000s and from the late 1990s to present in the developing world. In 1994 only 3% of American classrooms had access to the Internet, while by 2002 that figure was 92%.[8] Most traditional communications media, including telephony and television, are being reshaped or redefined by the Internet, giving birth to new services such as voice over Internet Protocol (VoIP) and Internet Protocol television (IPTV). Newspaper, book, and other print publishing are adapting to website technology, or are reshaped into blogging and web feeds. The entertainment industry, including music, film, and gaming, was initially the fastest growing online segment. The Internet has enabled and accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has grown exponentially both for major retailers and small artisans and traders.Business-to-business and financial services on the Internet affect supply chains across entire industries. The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own policies.[9] Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System (DNS), are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.[10] From <http://en.wikipedia.org/wiki/Internet> Internet Architecture 13 April 2015 16:13 In Company: http://www.gcsecomputing.org.uk/support/network/NWB_SIM.swf Teacher's URL: http://127.0.0.1:800/Networking%20And%20Servers%20And%20Security%20And%20HTML/www.gcsecomputing.org.uk/support/network/NW B_SIM.swf Watch out for: What can you use: o PC o Printers o Servers: File, Multimedia, Email, Cache o Backups o o o o Connections Internet Switches Hubs Shared Resources: Printers, File Servers etc What makes it faster Switch or Hub or Fast Switch ======================================================================= Outside To understand the Internet, it helps to look at it as a system with two main components. The first of those components is hardware. That includes everything from the cables that carry terabits of information every second to the computer sitting in front of you. Other types of hardware that support the Internet include routers, servers, cell phone towers, satellites, radios, smartphones and other devices. All these devices together create the network of networks. The Internet is a malleable system -- it changes in little ways as elements join and leave networks around the world. Some of those elements may stay fairly static and make up the backbone of the Internet. Others are more peripheral. These elements are connections. Some are end points -- the computer, smartphone or other device you're using to read this may count as one. We call those end points clients. Machines that store the information we seek on the Internet are servers. Other elements are nodes which serve as a connecting point along a route of traffic. And then there are the transmission lines which can be physical, as in the case of cables and fiber optics, or they can be wireless signals from satellites, cell phone or 4G towers, or radios. http://www.conceptdraw.com/mosaic/draw-lan-and-wan ================================================================= : http://computer.howstuffworks.com/internet/basics/internet.htm and PP Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML/computer.howstuffworks.co m/internet/basics/internet.htm and PP ====================================================================================================== Cabling 13 April 2015 16:32 Types of Cable (NB: Watch the (Dis)Advantages) Coaxial cable This consists of a solid copper core surrounded by insulation which is then surrounded by a copper shielding and finally covered with a plastic sheath. Coaxial cable is widely used for television wiring as it has enough bandwidth to handle a television signal over a typical run from antenna to television.. Twisted Pair There are 8 colour-coded wires with each related pair twisted around one another. Twisting it in this way reduces signal loss over any given length of cable. Twisted pair cable is widely used in 100 Mbps and 1 Gbps networks. Shielded Twisted Pair In order to improve performance even more, shielded twisted pair cable (STP) has copper shielding wrapped around each twisted pair and another shield wrapped around the whole cable. Fibre Optic Fibre-optic cable has an astounding bandwidth, it is limited more by the electronics either side of the cable than the bandwidth of the cable itself. For instance in recent experiment, a 160 km length of high performance fibre-optic cable carried up to 14 Tera bits per second! Fibre optic cable uses light to transmit information rather than electrical signals. Unlike copper cable it is not prone to electrical interference. Wireless An alternative to setting up a network with copper or fibre cable is Wireless. Connection between computer and router is achieved using radio waves. This has the strong advantage of not requiring cables to be laid through a building. On the other hand radio is very prone to being weakened by walls and other objects. The bandwidth of a wireless network is lower than a physical network. Wireless technologies[edit] Computers are very often connected to networks using wireless links Main article: Wireless network Terrestrial microwave – Terrestrial microwave communication uses Earth-based transmitters and receivers resembling satellite dishes. Terrestrial microwaves are in the low-gigahertz range, which limits all communications to line-of-sight. Relay stations are spaced approximately 48 km (30 mi) apart. Communications satellites – Satellites communicate via microwave radio waves, which are not deflected by the Earth's atmosphere. The satellites are stationed in space, typically in geosynchronous orbit 35,400 km (22,000 mi) above the equator. These Earth-orbiting systems are capable of receiving and relaying voice, data, and TV signals. Cellular and PCS systems use several radio communications technologies. The systems divide the region covered into multiple geographic areas. Each area has a low-power transmitter or radio relay antenna device to relay calls from one area to the next area. Radio and spread spectrum technologies – Wireless local area networks use a high-frequency radio technology similar to digital cellular and a low-frequency radio technology. Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-standards wireless radio-wave technology known as Wifi. Free-space optical communication uses visible or invisible light for communications. In most cases, lineof-sight propagation is used, which limits the physical positioning of communicating devices. From <http://en.wikipedia.org/wiki/Computer_network> http://www.teachict.com/as_a2_ict_new/ocr/A2_G063/333_networks_coms/bandwidth/miniweb/pg2.htm and following pages Teacher's URL: http://127.0.0.1:800/Networking%20And%20Servers%20And%20Security%20And%20HTML/www.teachict.com/as_a2_ict_new/ocr/A2_G063/333_networks_coms/bandwidth/miniweb/index.htm and following pages =================================================================== Also See: http://en.wikipedia.org/wiki/Computer_network ================================================ Routing (Optional) 13 April 2015 17:04 Routing[edit] Routing calculates good paths through a network for information to take. For example from node 1 to node 6 the best routes are likely to be 1-8-7-6 or 1-8-10-6, as this has the thickest routes. Routing is the process of selecting network paths to carry network traffic. Routing is performed for many kinds of networks, including circuit switching networks and packet switched networks. In packet switched networks, routing directs packet forwarding (the transit of logically addressed network packets from their source toward their ultimate destination) through intermediate nodes. Intermediate nodes are typically network hardware devices such as routers, bridges, gateways, firewalls, or switches. General-purpose computers can also forward packets and perform routing, though they are not specialized hardware and may suffer from limited performance. The routing process usually directs forwarding on the basis of routing tables, which maintain a record of the routes to various network destinations. Thus, constructing routing tables, which are held in the router's memory, is very important for efficient routing. Most routing algorithms use only one network path at a time. Multipath routing techniques enable the use of multiple alternative paths. There are usually multiple routes that can be taken, and to choose between them, different elements can be considered to decide which routes get installed into the routing table, such as (sorted by priority): 1. Prefix-Length: where longer subnet masks are preferred (independent if it is within a routing protocol or over different routing protocol) 2. Metric: where a lower metric/cost is preferred (only valid within one and the same routing protocol) 3. Administrative distance: where a lower distance is preferred (only valid between different routing protocols) Routing, in a more narrow sense of the term, is often contrasted with bridging in its assumption that network addresses are structured and that similar addresses imply proximity within the network. Structured addresses allow a single routing table entry to represent the route to a group of devices. In large networks, structured addressing (routing, in the narrow sense) outperforms unstructured addressing (bridging). Routing has become the dominant form of addressing on the Internet. Bridging is still widely used within localized environments. From <http://en.wikipedia.org/wiki/Computer_network> =========================== Definitions: More on hubs, switches etc Hubs, Bridges, Switches and Routers are used to build networks. If you are trying to design your own LAN (Local Area Network) at home, then you probably need to know what they do and the main differences between them. I will try to cover all that in addition to some networking details to cultivate the article and provide better understanding of how the internet works. After all, always remember that the internet as you know it is nothing more than a network of networks! Hubs are used to build a LAN by connecting different computers in a star/hierarchal network topology, the most common type on LANs now a day. A hub is a very simple (or dumb) device, once it gets bits of data sent from computer A to B, it does not check the destination, instead, it forwards that signal to all other computers (B, C, D…) within the network. B will then pick it up while other nodes discard it. This amplify that the traffic is shared. There are mainly two types of hubs: 1. Passive: The signal is forwarded as it is (so it doesn’t need power supply). 2. Active: The signal is amplified, so they work as repeaters. In fact they have been called multiport repeaters. (use power supply) Hubs can be connected to other hubs using an uplink port to extend the network. OSI Model: Hubs work on the physical layer (lowest layer). That’s the reason they can’t deal with addressing or data filtering. Switches on the other hand are more advanced. Instead of broadcasting the frames everywhere, a switch actually checks for the destination MAC address and forward it to the relevant port to reach that computer only. This way, switches reduce traffic and divide the collision domain into segments, this is very sufficient for busy LANs and it also protects frames from being sniffed by other computers sharing the same segment. They build a table of which MAC address belongs to which segment. If a destination MAC address is not in the table it forwards to all segments except the source segment. If the destination is same as the source, frame is discarded. Switches have built-in hardware chips solely designed to perform switching capabilities, therefore they are fast and come with many ports. Sometimes they are referred to as intelligent bridges or multiport bridges. Different speed levels are supported. They can be 10 Mb/s, 100 Mb/s, 1 Gb/s or more. Most common switching methods are: 1. Cut-through: Directly forward what the switch gets. 2. Store and forward: receive the full frame before retransmitting it. OSI: Switches are on the data link layer (just above physical layer) that’s why they deal with frames instead of bits and filter them based on MAC addresses. Switches are known to be used for their filtering capabilities. VLANs (Virtual LANs) and broadcast domains: Switches do not control broadcast domains by default, however, if a VLAN is configured in a switch it shall have its own broadcast domain. *VLAN is a logical group of network devices located on different LAN physical segments. However they are logically treated as if they were located on a single segment. Bridges are used to extend networks by maintaining signals and traffic. OSI: Bridges are on the data link layer so in principle they are capable to do what switches do like data filtering and separating the collision domain, but they are less advanced. They are known to be used to extend distance capabilities of networks. In a comparison with switches, they are slower because they use software to perform switching. They do not control broadcast domains and usually come with less number of ports. Routers are used to connect different LANs or a LAN with a WAN (e.g. the internet). Routers control both collision domains and broadcast domains. If the packet’s destination is on a different network, a router is used to pass it the right way, so without routers the internet could not functions. Routers use NAT (Network Address Translation) in conjunction with IP Masquerading to provide the internet to multiple nodes in the LAN under a single IP address. Now a day, routers come with hub or switch technology to connect computers directly. OSI: Routers work on the network layer so they can filter data based on IP addresses. They have route tables to store network addresses and forward packets to the right port. Gateways are very intelligent devices or else can be a computer running the appropriate software to connect and translate data between networks with different protocols or architecture, so their work is much more complex than a normal router. For instance, allowing communication between TCP/IP clients and IPX/SPX or AppleTalk. OSI: Gateways operate at the network layer and above, but most of them at the application layer. P.S. The term Gateway is used to refer to routers in some articles so beware. In this case, the router has gateway software. And Default Gateway is used to refer to the node (e.g. router) connecting the LAN to the outside (e.g. internet). Repeaters are simple devices that work at the physical layer of the OSI. They regenerate signals (active hubs does that too). There is an important rule to obey while using repeaters/hubs to extend a local network and is called the 5-4-3 rule or the IEEE way. The rule forces that in a single collision domain there shouldn’t be more than 5 segments, 4 repeaters between any two hosts in the network and only 3 of the segments can be populated (contain user connections). This rule ensures that a signal sent over the network will reach every part of it within an acceptable length of time. If the network is bigger, the collision domain can be divided into two parts or more using a switch or a bridge. Conclusion What have been introduced so far are the main traditional devices used to build networks, understanding how they work helps to understand the logic behind networks designing, however, now that technology advance quickly, it is possible to find new products in the market combining two or more of these devices into one. Examples are: – Brouter: Works as a Bridge and as a Router. – IP Switch or MultiLayer Switch (MLS): New switches with routing capabilities, they forward data based on IP addresses, work at the network layer too. References used are the following in addition to my previous readings and background study. [1] TCP IP in 24 hours by SAMS [2] http://www.techexams.net/technotes/ccna/lan_technologies.shtml From <http://blog.creativeitp.com/posts-and-articles/networking/hubs-switches-routers-and-bridges/comment-page-1/> Extra: Pages on Hardware And LAN 20 April 2015 12:12 Connectors: Modems Modem (from modulator-demodulator) is a device that turns the digital 1s and 0s of a personal computer into sounds that can be transmitted over the telephone lines of Plain Old Telephone Systems (POTS), and once received on the other side, converts those sounds back into a form used by a USB, Ethernet, serial, or network connection. Modems are generally classified by the amount of data they can send in a given time, normally measured in bits per second, or "bps". NIC (Network Interface Card) A network interface card is a computer hardware component designed to allow computers to communicate over a computer network. It is both an OSI layer 1 (physical layer) and layer 2 (data link layer) device, as it provides physical access to a networking medium and provides a low-level addressing system through the use of MAC addresses. It allows users to connect to each other either by using cables or wirelessly. Most motherboards today come equipped with a network interface card in the form of a controller, with the hardware built into the board itself, eliminating the need for a standalone card. Hub Hubs connect computers together in a star topology network. Due to their design, they increase the chances for collisions. Hubs operate in the physical layer of the OSI model and have no intelligence. Hubs flood incoming packets to all ports all the time. For this reason, if a network is connected using hubs, the chances of a collision increases linearly with the number of computers (assuming equal bandwidth use). Hubs pose a security risk since all packets are flooded to all ports all the time. If a user has packet sniffing software, they can extract data from the network and potentially decode it and use it. Hubs make it easy to "spy" on users on the same LAN as you. Routers Routers operate at the network layer of the OSI model and efficiently route information between Local Area Networks. Since routers operate in the third layer, the network layer, they must understand layer 3 addressing... such as TCP/IP. A router will divide a broadcast domain by not forwarding broadcasts on one connected network to another connected network. Routers operate in two different planes: the control plane, in which the router learns the outgoing interface that is most appropriate for forwarding specific packets to specific destinations, and the forwarding plane, which is responsible for the actual process of sending a packet received on a logical interface to an outbound logical interface. Bridges Bridges can be identified by the fact that they operate at the data link layer of the OSI model. Bridges have intelligence and can "bridge" two of their ports together at very high speed. They use a database of MAC addressesto determine where computers are located and very efficiently send frames only where they need to go. The database is created dynamically as computers communicate on the network. A bridge simply watches the incoming frame and memorizes the MAC address and port a frame arrives on. It uses this information to locate a computer if a packet comes in that must be forwarded to it. If a frame arrives at the bridge and the bridge does not know where to send it, the bridge will flood the frame just like a hub does. Bridging is often inaccurately called switching. Switches Switches are often confused with bridges because they also operate at the data link layer of the OSI model. Similar to a hub, switches provide a central connection between two or more computers on a network, but with some intelligence. They provide traffic control for packets; rather than forwarding data to all the connected ports, a switch forwards data only to the port on which the destination system is connected. They use a database of MAC addresses to determine where computers are located and very efficiently send packets only where they need to go. The database is created dynamically as computers communicate on the network. The switch simply watches the incoming packets and memorizes the MAC address and port a packet arrives on. If a packet arrives with a destination computer that the switch does not have an address for in its MAC address table, it will flood the packet out all connected ports. A switch creates separate collision domains for each physical connection. A switch will only create separate broadcast domains if separate VLANs (Virtual Local Area Networks) are assigned to different ports on the switch. Otherwise, a broadcast received on one port will be flooded out all ports except the one it came in on. Firewalls A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting outward communication. It is also a device or set of devices configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the Local Area Networkpass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. From <http://en.wikibooks.org/wiki/Network_Plus_Certification/Devices/Common_Devices> From <http://en.wikibooks.org/wiki/Network_Plus_Certification/Devices/Common_Devices> http://en.wikiversity.org/wiki/Network_Administration Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML%20and%20IP%20Address%20 and%20URL/en.wikibooks.org/wiki/Network_Plus_Certification/Devices/Common_Devices Activity: PSTN, Telkom, ISP, Cell Phone Providers (45mi) 13 April 2015 16:31 Find the definitions and the uses for the following: a. Network b. Router c. Bridge d. e. f. g. Gateway Server PSTN ISP Prepare a diagram about how they fit together Comprehensive Reference 13 April 2015 17:18 Contents [hide] 1 History 2 Properties 3 Network packet 4 Network topology 4.1 Network links 4.2 Network nodes 4.3 Network structure 5 Communications protocols 5.1 IEEE 802 5.2 Internet Protocol Suite 5.3 SONET/SDH 5.4 Asynchronous Transfer Mode 6 Geographic scale 7 Organizational scope 7.1 Intranets 7.2 Extranet 7.3 Internetwork 7.4 Internet 7.5 Darknet 8 Routing 9 Network service 10 Network performance 10.1 Quality of service 10.2 Network congestion 10.3 Network resilience 11 Security 11.1 Network security 11.2 Network surveillance 11.3 End to end encryption 12 Views of networks 13 See also 14 References 15 Further reading 16 External links From <http://en.wikipedia.org/wiki/Computer_network> Streaming 13 April 2015 17:33 Background Streaming media is multimedia that is constantly received by and presented to an end-user while being delivered by a provider. The verb "to stream" refers to the process of delivering media in this manner; the term refers to the delivery method of the medium rather than the medium itself. A client media player can begin playing the data (such as a movie) before the entire file has been transmitted. Distinguishing delivery method from the media distributed applies specifically to telecommunications networks, as most of the delivery systems are either inherently streaming (e.g., radio, television) or inherently non streaming (e.g., books, video cassettes, audio CDs). For example, in the 1930s, elevator music was among the earliest popularly available streaming media; nowadays Internet television is a common form of streamed media. The term "streaming media" can apply to media other than video and audio such as live closed captioning, ticker tape, and real-time text, which are all considered "streaming text". The term "streaming" was first used in the early 1990s as a better description for video on demand on IP networks; at the time such video was usually referred to as "store and forward video",[1] which was misleading nomenclature. From <http://en.wikipedia.org/wiki/Streaming_media> Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML/en.wikipedia.org/wiki/Stream ing_media Note: The file does not have to be completely downloaded before it can be played Watch the bandwidth! Applications: lectures, seminars on-demand instruction entertainment: specialty content remote digital editing voice mail YouTube! http://www.cs.columbia.edu/~hgs/teaching/ais/slides/2003/RTSP.pdf Advantages / Disadvantages: Advantages: Can access when needed Power business-enhancement tool Disadvantages: Very high bandwidth requirements Special equipment Can be very expensive Billing can be complex (See e.g. MTN) Can be "Lossy" - Poor quality - due to packet loss Protocol Problems http://www.cs.columbia.edu/~hgs/teaching/ais/slides/2003/RTSP.pdf http://en.wikipedia.org/wiki/Streaming_media Real-Time and On-Demand On-demand streaming is provided by a means called progressive streaming orprogressive download. Progressive streaming saves the file to a hard disk and then is played from that location. Ondemand streams are often saved to hard disks and servers for extended amounts of time; On-demand streaming is provided by a means called progressive streaming orprogressive download. Progressive streaming saves the file to a hard disk and then is played from that location. Ondemand streams are often saved to hard disks and servers for extended amounts of time; Live streaming (Real-Time) are only available at one time only (e.g., during the football game).[8] Live streaming, which refers to content delivered live over the Internet, requires a form of source media (e.g. a video camera, an audio interface, screen capture software), an encoder to digitize the content, a media publisher, and a content delivery network to distribute and deliver the content. Note: they are the same size. It is only the delivery that is different From <http://en.wikipedia.org/wiki/Streaming_media> Bitrates and Bandwidth Note the difference between MB (MegaByte), Mb (Megabit), KB (KiloByte), Kb (Kilobit) FM Radio: 56kb/sec Ticker-tape: Very little Video: 1.5Mb/sec Blue-Ray: 2.5Mb/sec Dolby True HD : 18Mb/sec HD Video: 10Mb/s (Check iTunes Playback) http://en.wikipedia.org/wiki/Dolby_TrueHD Bandwidth and storage[edit] A broadband speed of 2.5 Mbit/s or more is recommended for streaming movies, for example to a Roku, Apple TV, Google TV or a Sony TV Blu-ray Disc Player, 10 Mbit/s for High Definition content.[10] Unicast connections require multiple connections from the same streaming server even when it streams the same content Streaming media storage size is calculated from the streaming bandwidth and length of the media using the following formula (for a single user and file): storage size (in megabytes) = length (in seconds) × bit rate (in bit/s) / (8 × 1024 × 1024) 8bits per Byte 1024 Bytes per KiloByte 1024 KiloBytes per MegaByte Real world example: One hour of video encoded at 300 kbit/s (this was a typical broadband video in 2005 and it was usually encoded in a 320 × 240 pixels window size) will be: (3,600 s × 300,000 bit/s) / (8×1024×1024) requires around 128 MB of storage. If the file is stored on a server for on-demand streaming and this stream is viewed by 1,000 people at the same time using aUnicast protocol, the requirement is: 300 kbit/s × 1,000 = 300,000 kbit/s = 300 Mbit/s of bandwidth This is equivalent to around 135 GB per hour. Using a multicast protocol the server sends out only a single stream that is common to all users. Therefore such a stream would only use 300 kbit/s of serving bandwidth. See below for more information on these protocols. The calculation for live streaming is similar. Assumptions: speed at the encoder, is 500 kbit/s. If the show lasts for 3 hours with 3,000 viewers, then the calculation is: Number of MBs transferred = encoder speed (in bit/s) × number of seconds × number of viewers / (8*1024*1024) Number of MBs transferred = 500 x 1024 (bit/s) × 3 × 3,600 ( = 3 hours) × 3,000 (number of viewers) / (8*1024*1024) = 1,977,539 MB From <http://en.wikipedia.org/wiki/Streaming_media> Adaptive bitrate streaming is a technique used in streaming multimedia over computer networks. While in the past most video streaming technologies utilized streaming protocols such as RTP with RTSP, today's adaptive streaming technologies are almost exclusively based on HTTP[1] and designed to work efficiently over large distributed HTTP networks such as the Internet. It works by detecting a user's bandwidth and CPU capacity in real time and adjusting the quality of a video stream accordingly. It requires the use of an encoder which can encode a single source video at multiple bit rates. The player client[2] switches between streaming the different encodings depending on available resources.[3] "The result: very little buffering, fast start time and a good experience for both high-end and lowend connections."[4] More specifically, and as the implementations in use today are, adaptive bitrate streaming is a method of video streaming over HTTP where the source content is encoded at multiple bit rates, then each of the different bit rate streams are segmented into small multi-second parts.[5] The streaming client is made aware of the available streams at differing bit rates, and segments of the streams by a manifest file. When starting, the client requests the segments from the lowest bit rate stream. If the client finds the download speed is greater than the bit rate of the segment downloaded, then it will request the next higher bit rate segments. Later, if the client finds the download speed for a segment is lower than the bit rate for the segment, and therefore the network throughput has deteriorated, then it will request a lower bit rate segment. The segment size can vary depending on the particular implementation, but they are typically between two (2) and ten (10) seconds.[3][5] From <http://en.wikipedia.org/wiki/Adaptive_bitrate_streaming> Teacher's URL: http://127.0.0.1:800/Networking%20AND%20Internet%20And%20Servers%20And%20Security%20And%20HTML/en.wikipedia.org/wiki/Adapti ve_bitrate_streaming Extra: Build a Network 16 April 2015 13:06 http://www.gcsecomputing.org.uk/support/network/NWB_SIM.swf Teacher's URL: http://127.0.0.1:800/Networking%20And%20Servers%20And%20Security%20And%20HTML/www.gcsecomputing.org.uk/support/network/NW B_SIM.swf Watch out for: What can you use: o PC o Printers o Servers: File, Multimedia, Email, Cache o Backups o Connections o Internet o Switches o Hubs Shared Resources: Printers, File Servers etc What makes it faster Switch or Hub or Fast Switch Review Mindmap 13 April 2015 14:52 • explain the client-server model of networked computers • give examples of applications which use the client-server model • describe what is meant by the World Wide Web (www) and the internet