Download THE INFORMATION AGE IN WHICH YOU LIVE Changing the Face

Document related concepts

Lag wikipedia , lookup

Peering wikipedia , lookup

Net neutrality law wikipedia , lookup

Net bias wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Lecture 13
NETWORK BASICS
1
STUDENT LEARNING
OUTCOMES
1. Identify and describe the four basic concepts
on which networks are built and describe
what is needed to set up a small peer-topeer network at home.
2. Describe the components used to build large
business networks and define and compare
local area networks (LANs), wide area
networks (WANs), and metropolitan area
networks (MANs).
2
STUDENT LEARNING
OUTCOMES
3. Compare and contrast the various Internet
connection possibilities.
4. Compare and contrast the types of
communications media.
3
STUDENT LEARNING
OUTCOMES
5. State the four principles of computer security
and describe how different network security
devices reflect those principles.
6. Describe client/server business networks
from a business and physical point of view.
4
INTRODUCTION
o Computer network – two or more computers
connected so that they can communicate with
each other and share information, software,
peripheral devices, and/or processing power
5
INTRODUCTION
6
Basic Principles of Networks
Four main principles
1. Each computer must have a network
interface to provide a doorway for
information
2. The network usually has at least one
connecting device
3. The network must have communications
media to transport information
7
Basic Principles of Networks
4. Each computer must have software to move
information in and out of the computer
These four principles apply to all networks,
large and small
8
HOME NETWORKS
A typical home network setup has
1. An Ethernet network card in each computer or a
wireless card in each laptop
2. Network cables to transmit signals, or no cables
for wireless
3. A DSL or cable modem connection and a
broadband/home router
9
Network Cards
Network interface card (NIC) – an expansion
card or PC card that connects your computer
to a network
– Ethernet card – the most common type of network
interface card
– Built into the motherboards of many new computers
– looks like a telephone jack, but wider
10
Wired Transmission Media
Cat 5 (Category 5) cable – better-constructed
version of phone twisted-pair cable
11
Wireless Transmission Media
o Wireless Access Point (WAP) – device that
allows a computer to use radio waves to access
a network
o Connects to hub or switch with a cable like a
wired computer
o May be built into broadband router and not
require separate cabling
12
Home Internet Service
o Broadband router or home router – a device to
connect computers together to share DSL or
cable Internet service in a home or small office
– One port to plug into DSL or cable connection to connect
to the Internet
– Usually several ports to build a network for home
computers or printers and share Internet connection
13
Network Software
o Makes each computer's hardware work
o Can use Windows
o Turn on file sharing to make files available to
other computers on the network
14
NETWORK COMPONENTS
o Hub – a device that connects computers into
a network and repeats all transmissions to
every connected computer
– Only one computer can transmit at a time
– All computers see every message
– Can have collisions when two computers try to
transmit at the same time
15
NETWORK COMPONENTS
o Switch – a device that connects computers
and repeats transmissions only to intended
recipient
– Multiple conversations can occur simultaneously
between different sets of computers
– Only recipient computer sees each message
– Computers can still broadcast messages to all
other computers on the network
16
NETWORK COMPONENTS
o Router – a device that connects subnetworks
(subnets) of a larger network
– Can connect different buildings at same or different
locations
– Passes transmissions from one network to another
– May pass through multiple routers on the way from
source to destination
17
NETWORK COMPONENTS
o More on routers
– Home/broadband routers often have built-in
switches or hubs
– Corporate routers generally require separate
switches or hubs
– Routers must be configured with information about
the networks they connect
18
NETWORKS BY DISTANCE
o Large networks can be classified by the
proximity of the area(s) they serve:
– Local Area Network (LAN) – network that serves
a building or buildings in a contiguous area
19
NETWORKS BY DISTANCE
o More networks by distance
– Wide Area Network (WAN) – a set of connected
networks serving areas not immediately contiguous
– Metropolitan Area Network (MAN) – a set of
connected networks within the same city or
metropolitan area but not in immediate proximity to
each other
20
THE INTERNET
o A vast network of computers that connects
people all over the world
o Computers pass messages through routers to
their ultimate destinations
o Each router determines whether it has a
direct path to the recipient or whether to send
the message on to another router
21
Bandwidth
o The amount of information that can be
transferred in a given amount of time
o Usually expressed as bits per second (bps)
o Higher bandwidths expressed as
– kilobits per second (Kbps) – thousands of bits per
second
– megabits per second (Mbps) – millions of bits per
second
– gigabits per second (Gbps) – billions of bits per
second
22
Internet Connection Types
o
o
o
o
o
Phone line and dialup modem
Phone line and DSL modem
Cable TV line and cable modem
Satellite modem
Dedicated high-speed business lines
23
Broadband Internet Connection
o Broadband – high-capacity
telecommunications line capable of providing
high-speed Internet service
o All Internet access methods on the previous
slide are broadband except the dialup modem
24
Dialup Connection
o Modem – connects a computer to a phone line
to access another computer or network
o Modulates outgoing signal from digital to analog
form
o Demodulates incoming signal from analog to
digital form
25
Digital Subscriber Line (DSL)
o Digital Subscriber Line (DSL) – highspeed Internet connection using phone
lines, which allows you to use your phone
for voice communications at the same
time
o Runs at a higher frequency than voice
conversations, so not supported on some
older phone lines
26
Cable Modem
o Cable modem – uses your TV cable to deliver
an Internet connection
27
Satellite Modem
o Satellite modem – delivers Internet access
from satellite dish
o Satellite TV and modem may share same
dish or may be separate
o Connects to computer or broadband router
like cable modem
28
T1 and DS3 Business Lines
o T1 and DS3 developed by phone companies
to carry many long-distance voice
conversations
o T1 runs up to about 1.5 Mbps
o DS3 runs up to about 45 Mbps
o Can carry both voice and network over the
same lines
29
Frame Relay and ATM Business
Services
o Frame Relay and ATM are used to
connect many branch offices to the
main office
o Use virtual circuits to simulate
having a line from every office to
every other office
Virtual Circuits
30
Comparison of Connection Types
o Telephone modem
– + Inexpensive and available anywhere there's a
phone line
– - Slow, and ties up the line for voice calls too
o DSL
– + Higher-speed connection, doesn't tie up the
phone line for voice calls, and can be left on all the
time
– - Not available in all areas or on all lines
31
Comparison of Connection Types
o Cable modem
– + Higher-speed connection, doesn't use the phone
line at all, and always-on
– - Connection shared with the neighborhood, so
speed may vary
o Satellite modem
– + Available in remote locations where DSL and
cable aren't
– - High cost
32
Comparison of Connection Types
o T1 and DS3
– + High-speed to very-high-speed connections, can
transmit both voice and data
– - High cost that may be mileage-dependent
o Frame relay and ATM
– + Use virtual circuits to simulate more inter-office
connections than are physically present
– - High cost normally affordable only by mid- to
large-scale enterprises
33
Voice Over IP
o Voice over IP – allows you to send voice
communications over the Internet and avoid
long-distance toll charges
o No long-distance calling cost
34
NETWORK COMMUNICATIONS
MEDIA
o Communications media – the paths in a
network over which information travels
o Wired communications media – transmit
information over a closed, connected path
o Wireless communications media – transmit
information through the air
35
Wired Communications Media
o Twisted-pair cable – a bundle of copper wires
for transmitting voice or data
o Cat 5 and Cat 5e are common for modern
networks
o Coaxial cable (coax) – one central wire
surrounded by insulation, a metallic shield, and
a covering of insulation
36
Wired Communications Media
o Optical fiber – uses a very thin glass or plastic
fiber through which pulses of light travel
37
Wireless Communications Media
o Infrared – uses red light to send and
receive information
o Bluetooth – a standard for transmitting
information in the form of short-range radio
waves over distances of up to 30 feet and
is used for purposes such as wirelessly
connecting a cell phone or PDA to a
computer
o Microwave – a type of radio transmission
– Repeater – receives a radio signal, strengthens
it, and sends it on
38
Wireless Communications Media
39
Wireless Communications Media
o Communications Satellite – microwave
repeater in space
40
NETWORK SECURITY
The four principles of network security are:
1.
2.
3.
4.
Confidentiality
Authenticity
Integrity
Availability
41
NETWORK SECURITY
o Confidentiality – information can be obtained
only by those authorized to access it
– Bank statements, credit reports, employee
evaluations
– Threatened by capture of network transmissions
and easily-guessed passwords
42
NETWORK SECURITY
o Authenticity – information really comes from
the source it claims to come from
– Military orders, medical diagnoses, stockbroker
directions
– Threatened by fraudulent e-mails and misspellings
of popular Web site names
43
NETWORK SECURITY
o Integrity – information has not been altered
– Bank balance, corporate Web site, prescriptions,
credit card charges
– Threatened by forged network transmissions and
faulty server software
44
NETWORK SECURITY
o Availability – a service or resource is
available when it's supposed to be
– Mail-order Web site, corporate e-mail server
– Threatened by network failures, faulty server
software, and high volumes of malicious network
traffic
45
Firewalls & Intrusion Detection
Systems
o Firewall – protects a computer from intruders
o Intrusion detection system (IDS) – watches
for and reports intrusion attempts
o Intrusion prevention system (IPS) – type of
IDS that also takes action against intrusion
attempts
46
Encryption
o Encryption – scrambles data so you can't
read it without having the decryption key
o Virtual Private Network (VPN) – encrypts all
network transmissions between two
endpoints to protect confidentiality and
integrity of data
47
Firewalls & Intrusion
Detection Systems
48
Malware
o Malware – software designed to harm your
computer or security
1. Virus – software written with malicious intent to
cause annoyance or damage
2. Worm – spreads itself from computer to computer
via e-mail and other network traffic
3. Spyware – collects information about you and
reports it to someone else without your permission
49
CLIENT/SERVER SOFTWARE
MODEL
o Client/server network – a network in which
one or more computers are servers and
provide services to the other computers,
called clients
50
Client/Server: A Business View
Client/server networks differ according to
1. Where the processing for the presentation of
information occurs
2. Where the processing of logic or business rules
occurs
3. Where the data management component (DBMS)
and information (database) are located
51
Client/Server: Model 5
52
Five Models of Client/Server
53
Five Models of Client/Server
1. Distributed Presentation
–
The server handles almost all functions, including
a major portion of the presentation
2. Remote Presentation
–
The client handles all presentation functions
3. Distributed Logic
–
The server handles all data management, the
client handles all presentation formatting, and the
logic processing is shared
54
Five Models of Client/Server
4. Remote Data Management
–
The server handles data management only, and
the client processes business rules and formats
the presentation of results
5. Distributed Data Management
–
The client handles all presentation formatting and
business rule processing, and both the server and
client share data management duties
55