* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 1 THE INFORMATION AGE IN WHICH YOU LIVE Changing
Survey
Document related concepts
Net neutrality law wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Computer security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Transcript
Extended Learning Module E NETWORK BASICS McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. STUDENT LEARNING OUTCOMES 1. 2. Identify and describe the four basic concepts on which networks are built and describe what is needed to set up a small peer-to-peer network at home. Describe the components used to build large business networks and define and compare local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). E-2 STUDENT LEARNING OUTCOMES 3. 4. Compare and contrast the various Internet connection possibilities. Compare and contrast the types of communications media. E-3 STUDENT LEARNING OUTCOMES 5. 6. State the four principles of computer security and describe how different network security devices reflect those principles. Describe client/server business networks from a business and physical point of view. E-4 INTRODUCTION network – two or more computers connected so that they can communicate with each other and share information, software, peripheral devices, and/or processing power Computer E-5 INTRODUCTION E-6 Basic Principles of Networks 1. 2. 3. Four main principles Each computer must have a network interface to provide a doorway for information The network usually has at least one connecting device The network must have communications media to transport information E-7 Basic Principles of Networks 4. Each computer must have software to move information in and out of the computer These four principles apply to all networks, large and small E-8 HOME NETWORKS A typical home network setup has 1. 2. 3. An Ethernet network card in each computer or a wireless card in each laptop Network cables to transmit signals, or no cables for wireless A DSL or cable modem connection and a broadband/home router E-9 Network Cards interface card (NIC) – an expansion card or PC card that connects your computer to a network Network Ethernet card – the most common type of network interface card Built into the motherboards of many new computers – looks like a telephone jack, but wider E-10 Wired Transmission Media 5 (Category 5) cable – better-constructed version of phone twisted-pair cable Cat E-11 Wireless Transmission Media Access Point (WAP) – device that allows a computer to use radio waves to access a network Connects to hub or switch with a cable like a wired computer May be built into broadband router and not require separate cabling Wireless E-12 Home Internet Service router or home router – a device to connect computers together to share DSL or cable Internet service in a home or small office Broadband One port to plug into DSL or cable connection to connect to the Internet Usually several ports to build a network for home computers or printers and share Internet connection E-13 Network Software Makes each computer's hardware work Can use Windows Turn on filesharing to make files available to other computers on the network E-14 NETWORK COMPONENTS – a device that connects computers into a network and repeats all transmissions to every connected computer Hub Only one computer can transmit at a time All computers see every message Can have collisions when two computers try to transmit at the same time E-15 NETWORK COMPONENTS – a device that connects computers and repeats transmissions only to intended recipient Switch Multiple conversations can occur simultaneously between different sets of computers Only recipient computer sees each message Computers can still broadcast messages to all other computers on the network E-16 NETWORK COMPONENTS – a device that connects subnetworks (subnets) of a larger network Router Can connect different buildings at same or different locations Passes transmissions from one network to another May pass through multiple routers on the way from source to destination E-17 NETWORK COMPONENTS More on routers Home/broadband routers often have built-in switches or hubs Corporate routers generally require separate switches or hubs Routers must be configured with information about the networks they connect E-18 NETWORKS BY DISTANCE Large networks can be classified by the proximity of the area(s) they serve: Local Area Network (LAN) – network that serves a building or buildings in a contiguous area E-19 NETWORKS BY DISTANCE More networks by distance Wide Area Network (WAN) – a set of connected networks serving areas not immediately contiguous Metropolitan Area Network (MAN) – a set of connected networks within the same city or metropolitan area but not in immediate proximity to each other E-20 THE INTERNET A vast network of computers that connects people all over the world Computers pass messages through routers to their ultimate destinations Each router determines whether it has a direct path to the recipient or whether to send the message on to another router E-21 Bandwidth The amount of information that can be transferred in a given amount of time Usually expressed as bits per second (bps) Higher bandwidths expressed as kilobits per second (Kbps) – thousands of bits per second megabits per second (Mbps) – millions of bits per second gigabits per second (Gbps) – billions of bits per second E-22 Internet Connection Types Phone line and dialup modem Phone line and DSL modem Cable TV line and cable modem Satellite modem Dedicated high-speed business lines E-23 Broadband Internet Connection – high-capacity telecommunications line capable of providing high-speed Internet service All Internet access methods on the previous slide are broadband except the dialup modem Broadband E-24 Dialup Connection – connects a computer to a phone line to access another computer or network Modulates outgoing signal from digital to analog form Demodulates incoming signal from analog to digital form Modem E-25 Digital Subscriber Line (DSL) Subscriber Line (DSL) – high-speed Internet connection using phone lines, which allows you to use your phone for voice communications at the same time Runs at a higher frequency than voice conversations, so not supported on some older phone lines Digital E-26 Cable Modem modem – uses your TV cable to deliver an Internet connection Cable E-27 Satellite Modem modem – delivers Internet access from satellite dish Satellite TV and modem may share same dish or may be separate Connects to computer or broadband router like cable modem Satellite E-28 T1 and DS3 Business Lines T1 and DS3 developed by phone companies to carry many long-distance voice conversations T1 runs up to about 1.5 Mbps DS3 runs up to about 45 Mbps Can carry both voice and network over the same lines E-29 Frame Relay and ATM Business Services Frame Relay and ATM are used to connect many branch offices to the main office Use virtual circuits to simulate having a line from every office to every other office Virtual Circuits E-30 Comparison of Connection Types Telephone modem + Inexpensive and available anywhere there's a phone line - Slow, and ties up the line for voice calls too DSL + Higher-speed connection, doesn't tie up the phone line for voice calls, and can be left on all the time - Not available in all areas or on all lines E-31 Comparison of Connection Types Cable modem + Higher-speed connection, doesn't use the phone line at all, and always-on - Connection shared with the neighborhood, so speed may vary Satellite modem + Available in remote locations where DSL and cable aren't - High cost E-32 Comparison of Connection Types T1 and DS3 + High-speed to very-high-speed connections, can transmit both voice and data - High cost that may be mileage-dependent Frame relay and ATM + Use virtual circuits to simulate more inter-office connections than are physically present - High cost normally affordable only by mid- to largescale enterprises E-33 Voice Over IP over IP – allows you to send voice communications over the Internet and avoid longdistance toll charges No long-distance calling cost Voice E-34 NETWORK COMMUNICATIONS MEDIA media – the paths in a network over which information travels Wired communications media – transmit information over a closed, connected path Wireless communications media – transmit information through the air Communications E-35 Wired Communications Media cable – a bundle of copper wires for transmitting voice or data Cat 5 and Cat 5e are common for modern networks Coaxial cable (coax) – one central wire surrounded by insulation, a metallic shield, and a covering of insulation Twisted-pair E-36 Wired Communications Media fiber – uses a very thin glass or plastic fiber through which pulses of light travel Optical E-37 Wireless Communications Media – uses red light to send and receive information Bluetooth – a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet and is used for purposes such as wirelessly connecting a cell phone or PDA to a computer Microwave – a type of radio transmission Infrared Repeater – receives a radio signal, strengthens it, and sends it on E-38 Wireless Communications Media E-39 Wireless Communications Media Communications Satellite – microwave repeater in space E-40 NETWORK SECURITY The four principles of network security are: 1. 2. 3. 4. Confidentiality Authenticity Integrity Availability E-41 NETWORK SECURITY – information can be obtained only by those authorized to access it Confidentiality Bank statements, credit reports, employee evaluations Threatened by capture of network transmissions and easily-guessed passwords E-42 NETWORK SECURITY – information really comes from the source it claims to come from Authenticity Military orders, medical diagnoses, stockbroker directions Threatened by fraudulent e-mails and misspellings of popular Web site names E-43 NETWORK SECURITY Integrity – information has not been altered Bank balance, corporate Web site, prescriptions, credit card charges Threatened by forged network transmissions and faulty server software E-44 NETWORK SECURITY – a service or resource is available when it's supposed to be Availability Mail-order Web site, corporate e-mail server Threatened by network failures, faulty server software, and high volumes of malicious network traffic E-45 Firewalls & Intrusion Detection Systems – protects a computer from intruders Intrusion detection system (IDS) – watches for and reports intrusion attempts Intrusion prevention system (IPS) – type of IDS that also takes action against intrusion attempts Firewall E-46 Encryption – scrambles data so you can't read it without having the decryption key Virtual Private Network (VPN) – encrypts all network transmissions between two endpoints to protect confidentiality and integrity of data Encryption E-47 Firewalls & Intrusion Detection Systems E-48 Malware Malware – software designed to harm your computer or security 1. 2. 3. Virus – software written with malicious intent to cause annoyance or damage Worm – spreads itself from computer to computer via e-mail and other network traffic Spyware – collects information about you and reports it to someone else without your permission E-49 CLIENT/SERVER SOFTWARE MODEL network – a network in which one or more computers are servers and provide services to the other computers, called clients Client/server E-50 Client/Server: A Business View Client/server networks differ according to 1. 2. 3. Where the processing for the presentation of information occurs Where the processing of logic or business rules occurs Where the data management component (DBMS) and information (database) are located E-51 Client/Server: Model 5 E-52 Five Models of Client/Server E-53 Five Models of Client/Server 1. Distributed Presentation 2. Remote Presentation 3. The server handles almost all functions, including a major portion of the presentation The client handles all presentation functions Distributed Logic The server handles all data management, the client handles all presentation formatting, and the logic processing is shared E-54 Five Models of Client/Server 4. Remote Data Management 5. The server handles data management only, and the client processes business rules and formats the presentation of results Distributed Data Management The client handles all presentation formatting and business rule processing, and both the server and client share data management duties E-55