* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Computer Networks
Net neutrality law wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Deep packet inspection wikipedia , lookup
IEEE 802.1aq wikipedia , lookup
Internet protocol suite wikipedia , lookup
Distributed firewall wikipedia , lookup
Network tap wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Computer network wikipedia , lookup
Recursive InterNetwork Architecture (RINA) wikipedia , lookup
Airborne Networking wikipedia , lookup
Peer-to-peer wikipedia , lookup
Zero-configuration networking wikipedia , lookup
In information technology, a network is a series of points or nodes interconnected by communication paths. In a network, a node is a connection point. In general, a node has programmed or engineered capability to recognize and process or forward transmissions to other nodes. A network is an interconnected system of things or people ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ Religions Business contacts Snail Mail Social Media Broadcasting - NBC, CBS, ABC, PBS Transportation (highways & rail) Cellular phone service …and of course computer based (internet) The Internet is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer. Intranet ◦ An organizations restricted computer network ◦ Private, yet using WWW software Extranet ◦ Part of a organization‘s intranet that is extended to users outside the organization – usually via WWW. ◦ Customer access Internet ◦ A worldwide computer network using TCP/IP protocol to transmit and exchange data. (TCP/IP is a set of communication protocols used by networks.) Transmission Control Protocol/Internet Protocol. Simultaneous Access ◦ Software/Programs ◦ Data Device Sharing ◦ Printers ◦ NAS – Network Access Storage Communication ◦ Email ◦ VOIP – Voice over internet protocol (Skype) Archiving ◦ Backups of multiple clients by a single server In communication networks, a topology is a schematic description of the arrangement of a network, including its nodes and connecting lines. The topology of a network is a diagram of the network and the way it connects. Topologies ◦ Physical connectivity Nodes and Addressing Work Load ◦ Server networks use the nodes to disperse the workload Network topology is the physical system of interconnections of the elements of a computer network (Links, Nodes, Clients, etc.) Main Types of Network Topology ◦ ◦ ◦ ◦ ◦ Star Bus Ring Wireless Hybrid Star topology is the most common topology used in today’s workplace. North Greenville University in Tigerville uses star topology. Bus topology is where in a computer network, a bus is a transmission path on which signals are dropped off or picked up at every device attached to the line. WAP (wireless access points) are not necessary needed. A ring is a network topology or circuit arrangement in which each device is attached along the same signal path to two other devices, forming a path in the shape of a ring. A wireless Internet service provider (WISP) is an Internet service provider (ISP) that allows subscribers to connect to a server at designated hot spots (access points) using a wireless connection such as Wi-Fi. Standards – IEEE 802.11 ◦ ◦ ◦ ◦ 802.11a 802.11b 802.11g 802.11n 802.11n has a higher frequency and transmits fastest and the longest range Coax cable is the kind of copper cable used by cable TV companies between the community antenna and user homes and businesses. ◦ Benefit is one wire for all computers Ethernet is the most widely-installed local area network ( LAN) technology. ◦ One wire per node/client Ethernet twisted pair cable is faster than Wireless and is very commonly used in businesses Fiber optic (or "optical fiber") refers to the medium and the technology associated with the transmission of information as light impulses along a glass or plastic wire or fiber. Each node needs antenna to connect ◦ Low frequency – reliable but slower transmission ◦ High frequency – less reliable but higher speed transmission Fiber is the fastest - pricey Ethernet twisted pair – cheaper and faster COAX – still needed Wireless – price greater than Ethernet twisted pair Node – Client ◦ ◦ ◦ ◦ ◦ ◦ ◦ Printers Desktops Laptops Copiers Network storage devices Routers Anything that can connect to a network Cell phone GPS device IPOD/PSP/XBOX/PS3/Tivo/DVR/Slingbox… How does the network identify a node? ◦ NIC MAC address – every node’s is unique NIC = (Network Interface Card) MAC = (Media Access Control) Format: 01-23-45-67-89-ab, 01:23:45:67:89:ab Hardware address Translated into a software address (IP address) Two standards for Internet Protocol (IP) IP V4 IP V6 IP Addresses ◦ IP addresses are four octets of the form and range (0-255).(0-255).(0-255).(0-255) ◦ Each domain name translates to a unique IP address www.google.com translates to 208.67.217.231 ◦ ICANN.org is in charge of DNS ◦ A profound shortage of addresses with IP V4 4.3 billion addresses with some reserved Usefulness of static addresses IP Addresses ◦ Addresses structure:(8 groups of 4 base16 digits) 2001:0db8:85a3:0000:0000:8a2e:0370:7334 ◦ Version 6 provides enough addresses for every atom in the universe - provided they buy a computer LAN – Local Area Network ◦ Ex. – NGU VLAN – Virtual LAN (act as a LAN due to common set of needs - collaboration) ◦ In computer networking, a single layer-2 network may be partitioned to create multiple distinct broadcast domains, which are mutually isolated so that packets can only pass between them via one or more routers; such a domain is referred to as a virtual local area network, virtual LAN or VLAN. MAN – Metropolitan Area Network ◦ Ex. - City of Greenville WAN – Wide Area Network ◦ Ex. – Internet Server Based ◦ Thin client - relies heavily on server processing ◦ Ex. – NGU email server Client Server Based ◦ Fat client – shares in the work load with less expensive server ◦ Ex. – NGU CAMS (clients process the reports) Peer to Peer Based ◦ Each computer can act as client or server ◦ Ex. - Home network All networks ◦ Authentication User name and password ◦ Encryption https – encrypts credit card account #s, email ◦ Firewall Software What can network users get to on your machine ◦ Anti-virus Software Protect against malware Vendors – McAfee, Symantec, AVG, etc… ◦ Finger Print Scanner ◦ Contingency planning – what if the unexpected happens Backups, backups, backups Wireless ◦ WEP – Wired Equivalency Protocol NOT secure (Google “breaking wep encryption”) ◦ WPA – Wireless Protected Access WPA & WPA2 – secure provided you use good pass phrases What do we transmit/exchange? ◦ Text Emails Print jobs Chat ◦ Graphics Pictures ◦ Video Movies Live Streaming ◦ Audio Songs Voice How is it transmitted? ◦ Broken into packets Header – Packet 1 Trailer – Last Packet Those in between ◦ Not all packets take the same route ◦ Reassembled on receipt to match that sent Who owns the internet? ◦ Many companies – Sprint, Verizon, Time-Warner, Walmart, etc. We’re just renting space ◦ Transmission is not perfect Must have schemes for re-sending dropped packets What about audio & video – is there any reason to resend? What about your debit card atm transmission Easier to resend the whole thing or just what’s missing? TCP/IP – Transmission Control Protocol/Internet Protocol ◦ Standard network data exchange protocol(standard) ◦ TCP applications FTP – File transfer protocol (transfer files) Telnet – Terminal connections SMTP – email transmission POP3 – email transmission ◦ IP applications HTTP – Hypertext transfer protocol VOIP – Voice over IP ISP – Internet service provider ◦ Types of connection for the home Cable Modem DSL Modem ISDN Modem 56K Dial-up Modem Home satellite Cable Modem – higher capacity than home DSL Modem – “ “ “ DS1/T1 High speed line (DS3 /T3 even better) Satellite ◦ Types of connection for business ◦ Businesses concerned with throughput ◦ Become a node on ISP’s network Domains ◦ Common .com, .net, .org, .edu, .gov ◦ Not so common .uk, .us, .tv, .biz, info (checkout godaddy.com) Sub Domains ◦ Part of the larger domain ◦ Ex. www.ngu.blackboard.com Domain is www.blackboard.com Sub domain is ngu Accessed via ngu.blackboard.com Websites are designed using html (hypertext markup language) ◦ Easy enough for anyone to create Write html Use applications like Dreamweaver or Microsoft Expression Can save MS Office 2007 files as web pages ◦ Store cookies Ease of use User names Passwords (not so good if not secure – https) ◦ Store temporary files Faster browsing Fills up hard drive Fragmentation ◦ Your browser will let you purge cookies and files. Data specific Websites are encoded using XML (Extensible Markup Language) often used for transmitting sensitive data. http://wordnetweb.princeton.edu http://compnetworking.about.com http://en.wikipedia.org/ http://www.emailclients.net/