Download Chapter 1 THE INFORMATION AGE IN WHICH YOU LIVE Changing

Document related concepts

Peering wikipedia , lookup

Net neutrality law wikipedia , lookup

Net bias wikipedia , lookup

Policies promoting wireless broadband in the United States wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Computer network wikipedia , lookup

Wireless security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Network tap wikipedia , lookup

Airborne Networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
Extended Learning Module E
NETWORK BASICS
McGraw-Hill
© 2008 The McGraw-Hill Companies, Inc. All rights reserved.
STUDENT LEARNING OUTCOMES
1.
2.
Identify and describe the four basic concepts on
which networks are built and describe what is
needed to set up a small peer-to-peer network at
home.
Describe the components used to build large
business networks and define and compare local
area networks (LANs), wide area networks
(WANs), and metropolitan area networks (MANs).
E-2
STUDENT LEARNING OUTCOMES
3.
4.
Compare and contrast the various Internet
connection possibilities.
Compare and contrast the types of
communications media.
E-3
STUDENT LEARNING OUTCOMES
5.
6.
State the four principles of computer security and
describe how different network security devices
reflect those principles.
Describe client/server business networks from a
business and physical point of view.
E-4
INTRODUCTION
network – two or more computers
connected so that they can communicate with each
other and share information, software, peripheral
devices, and/or processing power
 Computer
E-5
INTRODUCTION
E-6
Basic Principles of Networks

1.
2.
3.
Four main principles
Each computer must have a network interface to
provide a doorway for information
The network usually has at least one connecting
device
The network must have communications media to
transport information
E-7
Basic Principles of Networks
4.
Each computer must have software to move
information in and out of the computer

These four principles apply to all networks, large
and small
E-8
HOME NETWORKS

A typical home network setup has
1.
2.
3.
An Ethernet network card in each computer or a
wireless card in each laptop
Network cables to transmit signals, or no cables for
wireless
A DSL or cable modem connection and a
broadband/home router
E-9
Network Cards
interface card (NIC) – an expansion card
or PC card that connects your computer to a
network
 Network
Ethernet card – the most common type of network
interface card
 Built into the motherboards of many new computers –
looks like a telephone jack, but wider

E-10
Wired Transmission Media
5 (Category 5) cable – better-constructed
version of phone twisted-pair cable
 Cat
E-11
Wireless Transmission Media
Access Point (WAP) – device that allows
a computer to use radio waves to access a network
 Connects to hub or switch with a cable like a wired
computer
 May be built into broadband router and not require
separate cabling
 Wireless
E-12
Home Internet Service
router or home router – a device to
connect computers together to share DSL or cable
Internet service in a home or small office
 Broadband
One port to plug into DSL or cable connection to
connect to the Internet
 Usually several ports to build a network for home
computers or printers and share Internet connection

E-13
Network Software
 Makes
each computer's hardware work
 Can use Windows
 Turn on filesharing to make files available to other
computers on the network
E-14
NETWORK COMPONENTS
– a device that connects computers into a
network and repeats all transmissions to every
connected computer
 Hub
Only one computer can transmit at a time
 All computers see every message
 Can have collisions when two computers try to
transmit at the same time

E-15
NETWORK COMPONENTS
– a device that connects computers and
repeats transmissions only to intended recipient
 Switch
Multiple conversations can occur simultaneously
between different sets of computers
 Only recipient computer sees each message
 Computers can still broadcast messages to all other
computers on the network

E-16
NETWORK COMPONENTS
– a device that connects subnetworks
(subnets) of a larger network
 Router
Can connect different buildings at same or different
locations
 Passes transmissions from one network to another
 May pass through multiple routers on the way from
source to destination

E-17
NETWORK COMPONENTS
 More
on routers
Home/broadband routers often have built-in switches
or hubs
 Corporate routers generally require separate switches
or hubs
 Routers must be configured with information about the
networks they connect

E-18
NETWORKS BY DISTANCE
 Large
networks can be classified by the proximity of
the area(s) they serve:

Local Area Network (LAN) – network that serves a
building or buildings in a contiguous area
E-19
NETWORKS BY DISTANCE
 More
networks by distance
Wide Area Network (WAN) – a set of connected
networks serving areas not immediately contiguous
 Metropolitan Area Network (MAN) – a set of
connected networks within the same city or
metropolitan area but not in immediate proximity to
each other

E-20
THE INTERNET
A
vast network of computers that connects people
all over the world
 Computers pass messages through routers to their
ultimate destinations
 Each router determines whether it has a direct path
to the recipient or whether to send the message on
to another router
E-21
Bandwidth
 The
amount of information that can be transferred in
a given amount of time
 Usually expressed as bits per second (bps)
 Higher bandwidths expressed as
kilobits per second (Kbps) – thousands of bits per
second
 megabits per second (Mbps) – millions of bits per
second
 gigabits per second (Gbps) – billions of bits per
second

E-22
Internet Connection Types
 Phone
line and dialup modem
 Phone line and DSL modem
 Cable TV line and cable modem
 Satellite modem
 Dedicated high-speed business lines
E-23
Broadband Internet Connection
– high-capacity telecommunications line
capable of providing high-speed Internet service
 All Internet access methods on the previous slide
are broadband except the dialup modem
 Broadband
E-24
Dialup Connection
– connects a computer to a phone line to
access another computer or network
 Modulates outgoing signal from digital to analog form
 Demodulates incoming signal from analog to digital
form
 Modem
E-25
Digital Subscriber Line (DSL)
Subscriber Line (DSL) – high-speed
Internet connection using phone lines, which allows
you to use your phone for voice communications at
the same time
 Runs at a higher frequency than voice
conversations, so not supported on some older
phone lines
 Digital
E-26
Cable Modem
modem – uses your TV cable to deliver an
Internet connection
 Cable
E-27
Satellite Modem
modem – delivers Internet access from
satellite dish
 Satellite TV and modem may share same dish or
may be separate
 Connects to computer or broadband router like
cable modem
 Satellite
E-28
T1 and DS3 Business Lines
 T1
and DS3 developed by phone companies to
carry many long-distance voice conversations
 T1 runs up to about 1.5 Mbps
 DS3 runs up to about 45 Mbps
 Can carry both voice and network over the same
lines
E-29
Frame Relay and ATM Business
Services
 Frame
Relay and ATM are used to
connect many branch offices to the
main office
 Use virtual circuits to simulate having
a line from every office to every other
office
Virtual Circuits
E-30
Comparison of Connection Types
 Telephone
modem
+ Inexpensive and available anywhere there's a phone
line
 - Slow, and ties up the line for voice calls too

 DSL
+ Higher-speed connection, doesn't tie up the phone
line for voice calls, and can be left on all the time
 - Not available in all areas or on all lines

E-31
Comparison of Connection Types
 Cable
modem
+ Higher-speed connection, doesn't use the phone
line at all, and always-on
 - Connection shared with the neighborhood, so speed
may vary

 Satellite
modem
+ Available in remote locations where DSL and cable
aren't
 - High cost

E-32
Comparison of Connection Types
 T1
and DS3
+ High-speed to very-high-speed connections, can
transmit both voice and data
 - High cost that may be mileage-dependent

 Frame
relay and ATM
+ Use virtual circuits to simulate more inter-office
connections than are physically present
 - High cost normally affordable only by mid- to largescale enterprises

E-33
Voice Over IP
over IP – allows you to send voice
communications over the Internet and avoid longdistance toll charges
 No long-distance calling cost
 Voice
E-34
NETWORK COMMUNICATIONS
MEDIA
media – the paths in a network
over which information travels
 Wired communications media – transmit
information over a closed, connected path
 Wireless communications media – transmit
information through the air
 Communications
E-35
Wired Communications Media
cable – a bundle of copper wires for
transmitting voice or data
 Cat 5 and Cat 5e are common for modern networks
 Coaxial cable (coax) – one central wire surrounded
by insulation, a metallic shield, and a covering of
insulation
 Twisted-pair
E-36
Wired Communications Media
fiber – uses a very thin glass or plastic fiber
through which pulses of light travel
 Optical
E-37
Wireless Communications Media
– uses red light to send and receive
information
 Bluetooth – a standard for transmitting information
in the form of short-range radio waves over
distances of up to 30 feet and is used for purposes
such as wirelessly connecting a cell phone or PDA
to a computer
 Microwave – a type of radio transmission
 Infrared

Repeater – receives a radio signal, strengthens it, and
sends it on
E-38
Wireless Communications Media
E-39
Wireless Communications Media
 Communications
Satellite – microwave repeater in
space
E-40
NETWORK SECURITY

The four principles of network security are:
1.
2.
3.
4.
Confidentiality
Authenticity
Integrity
Availability
E-41
NETWORK SECURITY
– information can be obtained only by
those authorized to access it
 Confidentiality
Bank statements, credit reports, employee evaluations
 Threatened by capture of network transmissions and
easily-guessed passwords

E-42
NETWORK SECURITY
– information really comes from the
source it claims to come from
 Authenticity
Military orders, medical diagnoses, stockbroker
directions
 Threatened by fraudulent e-mails and misspellings of
popular Web site names

E-43
NETWORK SECURITY
 Integrity
– information has not been altered
Bank balance, corporate Web site, prescriptions,
credit card charges
 Threatened by forged network transmissions and
faulty server software

E-44
NETWORK SECURITY
– a service or resource is available when
it's supposed to be
 Availability
Mail-order Web site, corporate e-mail server
 Threatened by network failures, faulty server software,
and high volumes of malicious network traffic

E-45
Firewalls & Intrusion Detection
Systems
– protects a computer from intruders
 Intrusion detection system (IDS) – watches for
and reports intrusion attempts
 Intrusion prevention system (IPS) – type of IDS
that also takes action against intrusion attempts
 Firewall
E-46
Encryption
– scrambles data so you can't read it
without having the decryption key
 Virtual Private Network (VPN) – encrypts all
network transmissions between two endpoints to
protect confidentiality and integrity of data
 Encryption
E-47
Firewalls & Intrusion Detection
Systems
E-48
Malware

Malware – software designed to harm your
computer or security
1.
2.
3.
Virus – software written with malicious intent to
cause annoyance or damage
Worm – spreads itself from computer to computer
via e-mail and other network traffic
Spyware – collects information about you and
reports it to someone else without your permission
E-49
CLIENT/SERVER SOFTWARE
MODEL
network – a network in which one or
more computers are servers and provide services to
the other computers, called clients
 Client/server
E-50
Client/Server: A Business View

Client/server networks differ according to
1.
2.
3.
Where the processing for the presentation of
information occurs
Where the processing of logic or business rules
occurs
Where the data management component (DBMS)
and information (database) are located
E-51
Client/Server: Model 5
E-52
Five Models of Client/Server
E-53
Five Models of Client/Server
1.
Distributed Presentation

2.
Remote Presentation

3.
The server handles almost all functions, including a
major portion of the presentation
The client handles all presentation functions
Distributed Logic

The server handles all data management, the client
handles all presentation formatting, and the logic
processing is shared
E-54
Five Models of Client/Server
4.
Remote Data Management

5.
The server handles data management only, and the
client processes business rules and formats the
presentation of results
Distributed Data Management

The client handles all presentation formatting and
business rule processing, and both the server and
client share data management duties
E-55