* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Chapter 1 THE INFORMATION AGE IN WHICH YOU LIVE Changing
Net neutrality law wikipedia , lookup
Policies promoting wireless broadband in the United States wikipedia , lookup
Computer security wikipedia , lookup
Distributed firewall wikipedia , lookup
Computer network wikipedia , lookup
Wireless security wikipedia , lookup
Wake-on-LAN wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Network tap wikipedia , lookup
Airborne Networking wikipedia , lookup
Extended Learning Module E NETWORK BASICS McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. STUDENT LEARNING OUTCOMES 1. 2. Identify and describe the four basic concepts on which networks are built and describe what is needed to set up a small peer-to-peer network at home. Describe the components used to build large business networks and define and compare local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). E-2 STUDENT LEARNING OUTCOMES 3. 4. Compare and contrast the various Internet connection possibilities. Compare and contrast the types of communications media. E-3 STUDENT LEARNING OUTCOMES 5. 6. State the four principles of computer security and describe how different network security devices reflect those principles. Describe client/server business networks from a business and physical point of view. E-4 INTRODUCTION network – two or more computers connected so that they can communicate with each other and share information, software, peripheral devices, and/or processing power  Computer E-5 INTRODUCTION E-6 Basic Principles of Networks  1. 2. 3. Four main principles Each computer must have a network interface to provide a doorway for information The network usually has at least one connecting device The network must have communications media to transport information E-7 Basic Principles of Networks 4. Each computer must have software to move information in and out of the computer  These four principles apply to all networks, large and small E-8 HOME NETWORKS  A typical home network setup has 1. 2. 3. An Ethernet network card in each computer or a wireless card in each laptop Network cables to transmit signals, or no cables for wireless A DSL or cable modem connection and a broadband/home router E-9 Network Cards interface card (NIC) – an expansion card or PC card that connects your computer to a network  Network Ethernet card – the most common type of network interface card  Built into the motherboards of many new computers – looks like a telephone jack, but wider  E-10 Wired Transmission Media 5 (Category 5) cable – better-constructed version of phone twisted-pair cable  Cat E-11 Wireless Transmission Media Access Point (WAP) – device that allows a computer to use radio waves to access a network  Connects to hub or switch with a cable like a wired computer  May be built into broadband router and not require separate cabling  Wireless E-12 Home Internet Service router or home router – a device to connect computers together to share DSL or cable Internet service in a home or small office  Broadband One port to plug into DSL or cable connection to connect to the Internet  Usually several ports to build a network for home computers or printers and share Internet connection  E-13 Network Software  Makes each computer's hardware work  Can use Windows  Turn on filesharing to make files available to other computers on the network E-14 NETWORK COMPONENTS – a device that connects computers into a network and repeats all transmissions to every connected computer  Hub Only one computer can transmit at a time  All computers see every message  Can have collisions when two computers try to transmit at the same time  E-15 NETWORK COMPONENTS – a device that connects computers and repeats transmissions only to intended recipient  Switch Multiple conversations can occur simultaneously between different sets of computers  Only recipient computer sees each message  Computers can still broadcast messages to all other computers on the network  E-16 NETWORK COMPONENTS – a device that connects subnetworks (subnets) of a larger network  Router Can connect different buildings at same or different locations  Passes transmissions from one network to another  May pass through multiple routers on the way from source to destination  E-17 NETWORK COMPONENTS  More on routers Home/broadband routers often have built-in switches or hubs  Corporate routers generally require separate switches or hubs  Routers must be configured with information about the networks they connect  E-18 NETWORKS BY DISTANCE  Large networks can be classified by the proximity of the area(s) they serve:  Local Area Network (LAN) – network that serves a building or buildings in a contiguous area E-19 NETWORKS BY DISTANCE  More networks by distance Wide Area Network (WAN) – a set of connected networks serving areas not immediately contiguous  Metropolitan Area Network (MAN) – a set of connected networks within the same city or metropolitan area but not in immediate proximity to each other  E-20 THE INTERNET A vast network of computers that connects people all over the world  Computers pass messages through routers to their ultimate destinations  Each router determines whether it has a direct path to the recipient or whether to send the message on to another router E-21 Bandwidth  The amount of information that can be transferred in a given amount of time  Usually expressed as bits per second (bps)  Higher bandwidths expressed as kilobits per second (Kbps) – thousands of bits per second  megabits per second (Mbps) – millions of bits per second  gigabits per second (Gbps) – billions of bits per second  E-22 Internet Connection Types  Phone line and dialup modem  Phone line and DSL modem  Cable TV line and cable modem  Satellite modem  Dedicated high-speed business lines E-23 Broadband Internet Connection – high-capacity telecommunications line capable of providing high-speed Internet service  All Internet access methods on the previous slide are broadband except the dialup modem  Broadband E-24 Dialup Connection – connects a computer to a phone line to access another computer or network  Modulates outgoing signal from digital to analog form  Demodulates incoming signal from analog to digital form  Modem E-25 Digital Subscriber Line (DSL) Subscriber Line (DSL) – high-speed Internet connection using phone lines, which allows you to use your phone for voice communications at the same time  Runs at a higher frequency than voice conversations, so not supported on some older phone lines  Digital E-26 Cable Modem modem – uses your TV cable to deliver an Internet connection  Cable E-27 Satellite Modem modem – delivers Internet access from satellite dish  Satellite TV and modem may share same dish or may be separate  Connects to computer or broadband router like cable modem  Satellite E-28 T1 and DS3 Business Lines  T1 and DS3 developed by phone companies to carry many long-distance voice conversations  T1 runs up to about 1.5 Mbps  DS3 runs up to about 45 Mbps  Can carry both voice and network over the same lines E-29 Frame Relay and ATM Business Services  Frame Relay and ATM are used to connect many branch offices to the main office  Use virtual circuits to simulate having a line from every office to every other office Virtual Circuits E-30 Comparison of Connection Types  Telephone modem + Inexpensive and available anywhere there's a phone line  - Slow, and ties up the line for voice calls too   DSL + Higher-speed connection, doesn't tie up the phone line for voice calls, and can be left on all the time  - Not available in all areas or on all lines  E-31 Comparison of Connection Types  Cable modem + Higher-speed connection, doesn't use the phone line at all, and always-on  - Connection shared with the neighborhood, so speed may vary   Satellite modem + Available in remote locations where DSL and cable aren't  - High cost  E-32 Comparison of Connection Types  T1 and DS3 + High-speed to very-high-speed connections, can transmit both voice and data  - High cost that may be mileage-dependent   Frame relay and ATM + Use virtual circuits to simulate more inter-office connections than are physically present  - High cost normally affordable only by mid- to largescale enterprises  E-33 Voice Over IP over IP – allows you to send voice communications over the Internet and avoid longdistance toll charges  No long-distance calling cost  Voice E-34 NETWORK COMMUNICATIONS MEDIA media – the paths in a network over which information travels  Wired communications media – transmit information over a closed, connected path  Wireless communications media – transmit information through the air  Communications E-35 Wired Communications Media cable – a bundle of copper wires for transmitting voice or data  Cat 5 and Cat 5e are common for modern networks  Coaxial cable (coax) – one central wire surrounded by insulation, a metallic shield, and a covering of insulation  Twisted-pair E-36 Wired Communications Media fiber – uses a very thin glass or plastic fiber through which pulses of light travel  Optical E-37 Wireless Communications Media – uses red light to send and receive information  Bluetooth – a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet and is used for purposes such as wirelessly connecting a cell phone or PDA to a computer  Microwave – a type of radio transmission  Infrared  Repeater – receives a radio signal, strengthens it, and sends it on E-38 Wireless Communications Media E-39 Wireless Communications Media  Communications Satellite – microwave repeater in space E-40 NETWORK SECURITY  The four principles of network security are: 1. 2. 3. 4. Confidentiality Authenticity Integrity Availability E-41 NETWORK SECURITY – information can be obtained only by those authorized to access it  Confidentiality Bank statements, credit reports, employee evaluations  Threatened by capture of network transmissions and easily-guessed passwords  E-42 NETWORK SECURITY – information really comes from the source it claims to come from  Authenticity Military orders, medical diagnoses, stockbroker directions  Threatened by fraudulent e-mails and misspellings of popular Web site names  E-43 NETWORK SECURITY  Integrity – information has not been altered Bank balance, corporate Web site, prescriptions, credit card charges  Threatened by forged network transmissions and faulty server software  E-44 NETWORK SECURITY – a service or resource is available when it's supposed to be  Availability Mail-order Web site, corporate e-mail server  Threatened by network failures, faulty server software, and high volumes of malicious network traffic  E-45 Firewalls & Intrusion Detection Systems – protects a computer from intruders  Intrusion detection system (IDS) – watches for and reports intrusion attempts  Intrusion prevention system (IPS) – type of IDS that also takes action against intrusion attempts  Firewall E-46 Encryption – scrambles data so you can't read it without having the decryption key  Virtual Private Network (VPN) – encrypts all network transmissions between two endpoints to protect confidentiality and integrity of data  Encryption E-47 Firewalls & Intrusion Detection Systems E-48 Malware  Malware – software designed to harm your computer or security 1. 2. 3. Virus – software written with malicious intent to cause annoyance or damage Worm – spreads itself from computer to computer via e-mail and other network traffic Spyware – collects information about you and reports it to someone else without your permission E-49 CLIENT/SERVER SOFTWARE MODEL network – a network in which one or more computers are servers and provide services to the other computers, called clients  Client/server E-50 Client/Server: A Business View  Client/server networks differ according to 1. 2. 3. Where the processing for the presentation of information occurs Where the processing of logic or business rules occurs Where the data management component (DBMS) and information (database) are located E-51 Client/Server: Model 5 E-52 Five Models of Client/Server E-53 Five Models of Client/Server 1. Distributed Presentation  2. Remote Presentation  3. The server handles almost all functions, including a major portion of the presentation The client handles all presentation functions Distributed Logic  The server handles all data management, the client handles all presentation formatting, and the logic processing is shared E-54 Five Models of Client/Server 4. Remote Data Management  5. The server handles data management only, and the client processes business rules and formats the presentation of results Distributed Data Management  The client handles all presentation formatting and business rule processing, and both the server and client share data management duties E-55
 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
									 
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                             
                                            