* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download THE INFORMATION AGE IN WHICH YOU LIVE Changing the Face
Survey
Document related concepts
Net neutrality law wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Computer security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Transcript
Lecture 13 NETWORK BASICS 1 STUDENT LEARNING OUTCOMES 1. Identify and describe the four basic concepts on which networks are built and describe what is needed to set up a small peer-topeer network at home. 2. Describe the components used to build large business networks and define and compare local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). 2 STUDENT LEARNING OUTCOMES 3. Compare and contrast the various Internet connection possibilities. 4. Compare and contrast the types of communications media. 3 STUDENT LEARNING OUTCOMES 5. State the four principles of computer security and describe how different network security devices reflect those principles. 6. Describe client/server business networks from a business and physical point of view. 4 INTRODUCTION o Computer network – two or more computers connected so that they can communicate with each other and share information, software, peripheral devices, and/or processing power 5 INTRODUCTION 6 Basic Principles of Networks Four main principles 1. Each computer must have a network interface to provide a doorway for information 2. The network usually has at least one connecting device 3. The network must have communications media to transport information 7 Basic Principles of Networks 4. Each computer must have software to move information in and out of the computer These four principles apply to all networks, large and small 8 HOME NETWORKS A typical home network setup has 1. An Ethernet network card in each computer or a wireless card in each laptop 2. Network cables to transmit signals, or no cables for wireless 3. A DSL or cable modem connection and a broadband/home router 9 Network Cards Network interface card (NIC) – an expansion card or PC card that connects your computer to a network – Ethernet card – the most common type of network interface card – Built into the motherboards of many new computers – looks like a telephone jack, but wider 10 Wired Transmission Media Cat 5 (Category 5) cable – better-constructed version of phone twisted-pair cable 11 Wireless Transmission Media o Wireless Access Point (WAP) – device that allows a computer to use radio waves to access a network o Connects to hub or switch with a cable like a wired computer o May be built into broadband router and not require separate cabling 12 Home Internet Service o Broadband router or home router – a device to connect computers together to share DSL or cable Internet service in a home or small office – One port to plug into DSL or cable connection to connect to the Internet – Usually several ports to build a network for home computers or printers and share Internet connection 13 Network Software o Makes each computer's hardware work o Can use Windows o Turn on file sharing to make files available to other computers on the network 14 NETWORK COMPONENTS o Hub – a device that connects computers into a network and repeats all transmissions to every connected computer – Only one computer can transmit at a time – All computers see every message – Can have collisions when two computers try to transmit at the same time 15 NETWORK COMPONENTS o Switch – a device that connects computers and repeats transmissions only to intended recipient – Multiple conversations can occur simultaneously between different sets of computers – Only recipient computer sees each message – Computers can still broadcast messages to all other computers on the network 16 NETWORK COMPONENTS o Router – a device that connects subnetworks (subnets) of a larger network – Can connect different buildings at same or different locations – Passes transmissions from one network to another – May pass through multiple routers on the way from source to destination 17 NETWORK COMPONENTS o More on routers – Home/broadband routers often have built-in switches or hubs – Corporate routers generally require separate switches or hubs – Routers must be configured with information about the networks they connect 18 NETWORKS BY DISTANCE o Large networks can be classified by the proximity of the area(s) they serve: – Local Area Network (LAN) – network that serves a building or buildings in a contiguous area 19 NETWORKS BY DISTANCE o More networks by distance – Wide Area Network (WAN) – a set of connected networks serving areas not immediately contiguous – Metropolitan Area Network (MAN) – a set of connected networks within the same city or metropolitan area but not in immediate proximity to each other 20 THE INTERNET o A vast network of computers that connects people all over the world o Computers pass messages through routers to their ultimate destinations o Each router determines whether it has a direct path to the recipient or whether to send the message on to another router 21 Bandwidth o The amount of information that can be transferred in a given amount of time o Usually expressed as bits per second (bps) o Higher bandwidths expressed as – kilobits per second (Kbps) – thousands of bits per second – megabits per second (Mbps) – millions of bits per second – gigabits per second (Gbps) – billions of bits per second 22 Internet Connection Types o o o o o Phone line and dialup modem Phone line and DSL modem Cable TV line and cable modem Satellite modem Dedicated high-speed business lines 23 Broadband Internet Connection o Broadband – high-capacity telecommunications line capable of providing high-speed Internet service o All Internet access methods on the previous slide are broadband except the dialup modem 24 Dialup Connection o Modem – connects a computer to a phone line to access another computer or network o Modulates outgoing signal from digital to analog form o Demodulates incoming signal from analog to digital form 25 Digital Subscriber Line (DSL) o Digital Subscriber Line (DSL) – highspeed Internet connection using phone lines, which allows you to use your phone for voice communications at the same time o Runs at a higher frequency than voice conversations, so not supported on some older phone lines 26 Cable Modem o Cable modem – uses your TV cable to deliver an Internet connection 27 Satellite Modem o Satellite modem – delivers Internet access from satellite dish o Satellite TV and modem may share same dish or may be separate o Connects to computer or broadband router like cable modem 28 T1 and DS3 Business Lines o T1 and DS3 developed by phone companies to carry many long-distance voice conversations o T1 runs up to about 1.5 Mbps o DS3 runs up to about 45 Mbps o Can carry both voice and network over the same lines 29 Frame Relay and ATM Business Services o Frame Relay and ATM are used to connect many branch offices to the main office o Use virtual circuits to simulate having a line from every office to every other office Virtual Circuits 30 Comparison of Connection Types o Telephone modem – + Inexpensive and available anywhere there's a phone line – - Slow, and ties up the line for voice calls too o DSL – + Higher-speed connection, doesn't tie up the phone line for voice calls, and can be left on all the time – - Not available in all areas or on all lines 31 Comparison of Connection Types o Cable modem – + Higher-speed connection, doesn't use the phone line at all, and always-on – - Connection shared with the neighborhood, so speed may vary o Satellite modem – + Available in remote locations where DSL and cable aren't – - High cost 32 Comparison of Connection Types o T1 and DS3 – + High-speed to very-high-speed connections, can transmit both voice and data – - High cost that may be mileage-dependent o Frame relay and ATM – + Use virtual circuits to simulate more inter-office connections than are physically present – - High cost normally affordable only by mid- to large-scale enterprises 33 Voice Over IP o Voice over IP – allows you to send voice communications over the Internet and avoid long-distance toll charges o No long-distance calling cost 34 NETWORK COMMUNICATIONS MEDIA o Communications media – the paths in a network over which information travels o Wired communications media – transmit information over a closed, connected path o Wireless communications media – transmit information through the air 35 Wired Communications Media o Twisted-pair cable – a bundle of copper wires for transmitting voice or data o Cat 5 and Cat 5e are common for modern networks o Coaxial cable (coax) – one central wire surrounded by insulation, a metallic shield, and a covering of insulation 36 Wired Communications Media o Optical fiber – uses a very thin glass or plastic fiber through which pulses of light travel 37 Wireless Communications Media o Infrared – uses red light to send and receive information o Bluetooth – a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet and is used for purposes such as wirelessly connecting a cell phone or PDA to a computer o Microwave – a type of radio transmission – Repeater – receives a radio signal, strengthens it, and sends it on 38 Wireless Communications Media 39 Wireless Communications Media o Communications Satellite – microwave repeater in space 40 NETWORK SECURITY The four principles of network security are: 1. 2. 3. 4. Confidentiality Authenticity Integrity Availability 41 NETWORK SECURITY o Confidentiality – information can be obtained only by those authorized to access it – Bank statements, credit reports, employee evaluations – Threatened by capture of network transmissions and easily-guessed passwords 42 NETWORK SECURITY o Authenticity – information really comes from the source it claims to come from – Military orders, medical diagnoses, stockbroker directions – Threatened by fraudulent e-mails and misspellings of popular Web site names 43 NETWORK SECURITY o Integrity – information has not been altered – Bank balance, corporate Web site, prescriptions, credit card charges – Threatened by forged network transmissions and faulty server software 44 NETWORK SECURITY o Availability – a service or resource is available when it's supposed to be – Mail-order Web site, corporate e-mail server – Threatened by network failures, faulty server software, and high volumes of malicious network traffic 45 Firewalls & Intrusion Detection Systems o Firewall – protects a computer from intruders o Intrusion detection system (IDS) – watches for and reports intrusion attempts o Intrusion prevention system (IPS) – type of IDS that also takes action against intrusion attempts 46 Encryption o Encryption – scrambles data so you can't read it without having the decryption key o Virtual Private Network (VPN) – encrypts all network transmissions between two endpoints to protect confidentiality and integrity of data 47 Firewalls & Intrusion Detection Systems 48 Malware o Malware – software designed to harm your computer or security 1. Virus – software written with malicious intent to cause annoyance or damage 2. Worm – spreads itself from computer to computer via e-mail and other network traffic 3. Spyware – collects information about you and reports it to someone else without your permission 49 CLIENT/SERVER SOFTWARE MODEL o Client/server network – a network in which one or more computers are servers and provide services to the other computers, called clients 50 Client/Server: A Business View Client/server networks differ according to 1. Where the processing for the presentation of information occurs 2. Where the processing of logic or business rules occurs 3. Where the data management component (DBMS) and information (database) are located 51 Client/Server: Model 5 52 Five Models of Client/Server 53 Five Models of Client/Server 1. Distributed Presentation – The server handles almost all functions, including a major portion of the presentation 2. Remote Presentation – The client handles all presentation functions 3. Distributed Logic – The server handles all data management, the client handles all presentation formatting, and the logic processing is shared 54 Five Models of Client/Server 4. Remote Data Management – The server handles data management only, and the client processes business rules and formats the presentation of results 5. Distributed Data Management – The client handles all presentation formatting and business rule processing, and both the server and client share data management duties 55