Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Similar documents
Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

INTRODUCTION TO ICT.

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Computer Networks and Internet

What is a Network? A connection of two or more computers so that they can share resources.

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

COMPUTER SKILLS COMP101

Discovering Computers Chapter 9 Communications and Networks

Outline: Connecting Many Computers

Dr./ Ahmed Mohamed Rabie Sayed

TYPES OF COMPUTER NETWORKS

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

It is the process of sharing data, programs, and information between two or more computers.

Networking interview questions

COMPUTER NETWORKING. By: Dr. Noor Dayana Abd Halim

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Networks: Communicating and Sharing Resources

Computer Network??? Why Computer Networks? Network Classification. Introduction to Computer Networks. Classification of a Computer network by Scale

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

Introduction to Computer Networks. Budditha Hettige

Introduction to LAN Protocols


Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

ก ก Information Technology II

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Introduction to Computer Science (I1100) Networks. Chapter 6

CHAPTER 2 - NETWORK DEVICES

Introduction to LAN Protocols

GAYATRI COMPUTERS Prepared by : VENKAT.G 1. Module 1: NETWORK BASICS

Module 15: Network Structures

Module 15: Network Structures

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CCNA Exploration Network Fundamentals. Chapter 10 Planning and Cabling Networks

Data Communication and Network. Introducing Networks

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

Networks. Computer Technology

Chapter 12. Network Organization and Architecture

1 Q1. Attempt any THREE 09 1 Give the difference between Human Network and

Local Area Network(LAN)

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Entry Level Assessment Blueprint Computer Networking Fundamentals

IT 2004 Data Communication & Networking

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Guide to Networking Essentials, 6 th Edition. Chapter 6: Network Reference Models and Standards

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

1: Review Of Semester Provide an overview of encapsulation.

ITEC 3800 Data Communication and Network. Introducing Networks

Computer Networks Question Bank

Computers Are Your Future

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Network basics. Unit objectives Describe the basic components of a network Identify characteristics of network technologies Analyze the OSI model

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Introduction to Networking Devices

Text Book. 1. Computer Networks & Internets by Douglas E Comer. 2. Data and Computer Communication by William Stalling, 5th or above edition.

Networking. Prof. Abdul Hameed

Data Communication. Introduction

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Different network topologies

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Lesson 1: Network Communications

Review: Networking Fall Final

Computer Networking Fundamentals

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Chapter 9 Introduction to Networks

NETWORK SECURITY ITEC 435

Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.

The Features and Uses of Computer Networking. Unit 11 Task 1

COMPONENTS OF DATA COMMUNICATION

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Computer Communication Networks Lecture No. 1

Computers: Tools for an Information Age. Chapter 7 Networking: Computer Connections

Distributed System Chapter 16 Issues in ch 17, ch 18

Introduction to Networking

ECE 333: Introduction to Communication Networks Fall Lecture 1: Introduction

E-Commerce. Infrastructure I: Computer Networks

Data Communication. Chapter # 1: Introduction. By: William Stalling

UNIT IV - COMPUTER NETWORK DEVICES AND OSI LAYERS

Communications and Networks

Comp277 Assignment 1 Fall 2011 Due 20 th December 2011 at 11:00am

Applied Information and Communication Technology Assessment Unit A2 13

Chapter 2. Network Classifications (Cont.)

Networking Fundamentals

Transcription:

Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter 12: Networking and Security (Behind the Scenes) 1 Chapter 12: Networking and Security (Behind the Scenes) 2 Network Definitions Network Advantages Network Two or more nodes connected so that data, information and resources are shared P2P Peers communicate in a decentralized manner ( < 10 nodes) Client/server Commonly associated with large business systems ( > 10 nodes) Chapter 12: Networking and Security (Behind the Scenes) 3 Increases productivity Sharing data and information Sharing peripherals Efficient communication Enables expensive resource sharing Eliminates the need for idle peripherals (printers) Generates cost savings because idle resources do not waste money Chapter 12: Networking and Security (Behind the Scenes) 4 1

Network Advantages Network Advantages Enables software sharing Eliminates the need for the same program on each computer (replaced by software license) Eliminates having to install new software on each machine (save time and space) Provides Internet connectivity sharing Eliminates dedicated connections for each computer Reduces expenses for Internet service Provides centralized operation With network administrators Maintain network integrity Allows for seamless transfer with new software installation or when new peripherals are added Chapter 12: Networking and Security (Behind the Scenes) 5 Chapter 12: Networking and Security (Behind the Scenes) 6 Client/server Networks Recall that servers are computers that provide access to network resources. Client computers request the network resources. Peripherals Software Storage space Advantages of Server-based Networks Data flows efficiently Large number of requests satisfied simultaneously Configured for specific requests or services Centralized security and data backups Scalable Add nodes without affecting other nodes Add servers without disruption of service Chapter 12: Networking and Security (Behind the Scenes) 7 Chapter 12: Networking and Security (Behind the Scenes) 8 2

Network Classifications Network Classifications Classified by size and physical distances LANs Local area network Small geographic area Example is computer lab on campus Chapter 12: Networking and Security (Behind the Scenes) 9 WANs Wide area network Example is a university-wide connection of labs MANs Metropolitan area network Example is linking city or county computers Chapter 12: Networking and Security (Behind the Scenes) 10 Network Classifications PANs Personal area networks Wireless and operate within personal operating space (within 30 of individual) Intranet Private corporation networks (groupware) Inaccessible from the outside world (firewalls) Chapter 12: Networking and Security (Behind the Scenes) 11 There are six main components in server-based networks Servers Computers functioning with one purpose Network topologies Layouts and structures of complex networks Transmission media Cable or wireless technology based on respective topology Chapter 12: Networking and Security (Behind the Scenes) 12 3

There are six main components in server-based networks cont d. Network operating system (NOS) software Installed on both the server and all computers Network adapters Installed on the network devices to enable communication Network navigation devices Needed to transport the network signal Chapter 12: Networking and Security (Behind the Scenes) 13 Servers Three main types of servers 1. Dedicated Perform only one function 2. Authentication Keep track of logins and available services 3. File Stores and manages files (seen with student accounts at a university) Does this sound familiar? Chapter 12: Networking and Security (Behind the Scenes) 14 Servers Common dedicated servers Print servers Manages client-requested printing of jobs Creates print queue (prioritizes print jobs) Frees up CPU time on individual computers Application servers Provides access to software not installed on the client s s computer Acts as a application software repository Chapter 12: Networking and Security (Behind the Scenes) 15 Servers Common dedicated servers Database servers Provides clients with access to database information E-mail servers Processes and delivers incoming and outgoing e-mail Communication servers Provides single-point access to the Internet Web servers Hosts web pages using specialized server software Chapter 12: Networking and Security (Behind the Scenes) 16 4

Terminator Bus topology All the nodes are connected in a linear sequence on a single cable. Terminator Bus topology cont d. Commonly used in P2P networks, not server-based networks s communicate directly with each other An access method coordinates the communication nodes nodes listen before transmitting Data collisions may occur easily Chapter 12: Networking and Security (Behind the Scenes) 17 Chapter 12: Networking and Security (Behind the Scenes) 18 Bus topology cont d. Data is broken down into packets and the nodes just move the data along (passive topology) When the media is clear, the transmitting node broadcasts to all other nodes When a node hears data addressed to it, the data is taken off the media and processed by that node Media is capped off by terminators that absorb the signal Chapter 12: Networking and Security (Behind the Scenes) 19 Bus topology cont d. Advantages Advantages Low cost Simplicity Disadvantages Signal disruption if cable breaks Hard to expand because of degrading signal Performance affected with large additions of nodes Chapter 12: Networking and Security (Behind the Scenes) 20 5

Ring topology Token Ring topology cont d. Data flows in one direction in a special packet or token (token-ring topology) s grab the token to transmit data and release it when finished Receiving nodes send acknowledgments The access method avoids data collisions Chapter 12: Networking and Security (Behind the Scenes) 21 Chapter 12: Networking and Security (Behind the Scenes) 22 Ring topology cont d. An active topology because each node has certain responsibilities passing passing the token Allows for fairer allocation of resources chatty nodes must pass the token Supports a large number of users but adding a node interrupts the network failure also interrupts the network Star topology Switch Chapter 12: Networking and Security (Behind the Scenes) 23 Chapter 12: Networking and Security (Behind the Scenes) 24 6

Star topology cont d. An Ethernet-based topology Widely deployed and most flexible of all client/server networks s are connected to a central switch The switch manages the data transmission All nodes examine the transmission but only pick up data addressed to them Star topology cont d. Uses an access method called CSMA/CD (Carrier Sense Multiple Access with Collision Detection) s listen before transmitting data Data collisions may happen Jam signals notify nodes a collision occurred and a random time-out is called Chapter 12: Networking and Security (Behind the Scenes) 25 Chapter 12: Networking and Security (Behind the Scenes) 26 Star topology cont d. More expensive and more complex failure does not interrupt the network Supports large number of users Addition of nodes does not interrupt service Switch centralizes communication and offers a troubleshooting point An active topology Chapter 12: Networking and Security (Behind the Scenes) 27 Chapter Topics Part 2 cont d. Transmission Media Network Operating System (NOS) Network Adapters Network Navigation Devices Network Security Digging Deeper: The OSI Model Chapter 12: Networking and Security (Behind the Scenes) 28 7

Transmission Media Recall that nodes on the network are connected by transmission media P2P networks incorporate existing wiring (phone or electric), cable and wireless Business networks mainly use cable Twisted pair Coaxial Fiber optic Chapter 12: Networking and Security (Behind the Scenes) 29 Transmission Media Considerations when choosing cable Maximum run length Bandwidth Bend radius or flexibility Cable cost Installation costs Susceptibility to interference Signal transmission methods Chapter 12: Networking and Security (Behind the Scenes) 30 Transmission Media Types of cable Twisted pair (UTP) Telephone line Coaxial Television cable Fiber-optic Glass or plastic Transmission Media Business networks use a combination of cables based on the following: Topologies Run lengths Presence of interference Need for wireless connectivity Chapter 12: Networking and Security (Behind the Scenes) 31 Chapter 12: Networking and Security (Behind the Scenes) 32 8

NOS This specialized software enables the communication between nodes Facilitates server services Controls network communication Manages peripherals and storage Provides the protocol (special rules) followed by the clients and server Network Adapters Critical functions of network adapters Enable network transmission by converting digital signals to high-powered signals that travel the network Break up data into packets for network travel and reassemble them for the recipient Control and guard data passed to clients Chapter 12: Networking and Security (Behind the Scenes) 33 Chapter 12: Networking and Security (Behind the Scenes) 34 Navigation Devices Recall that data is passed along the network in the form of packets Recall that a node receives packets addressed to it (based on topology) How are addresses assigned to nodes? Chapter 12: Networking and Security (Behind the Scenes) 35 Navigation Devices MAC addresses Media Access Control addresses Physically located on the network adapters (like VIN for vehicles) Allows for internal addressing within a network Allows for frame bundling by the NOS Chapter 12: Networking and Security (Behind the Scenes) 36 9

Navigation Devices Switches are used to move data transmissions inside a network Examples: LAN or Star topology Uses MAC addresses Routers are used to move data transmissions between networks Example: LAN to Internet Uses IP addressing (discussed later) Chapter 12: Networking and Security (Behind the Scenes) 37 Network Security Common security threats (SAs( list) Human error Malicious human activity Natural events or disasters Handled in different ways Authentication Access privileges Physical protection Firewalls Chapter 12: Networking and Security (Behind the Scenes) 38 Network Security - Authentication For network access a userid and password are required Periodically protected by password changes Failed attempts or brute force attacks cause network lockouts Prevents hackers from account access Network Security Access Privileges Account setup grants access to certain parts of the network Based on the status of the client Prevents unauthorized changes to files on the network Chapter 12: Networking and Security (Behind the Scenes) 39 Chapter 12: Networking and Security (Behind the Scenes) 40 10

Network Security Physical Protection Measures Locked rooms to protect servers and network equipment (routers, switches) Swipe cards to track access Biometrics to uniquely identify humans Network Security Firewalls Packet screening by routers on incoming and outgoing mail (IP address checks) Bastion servers are not on the internal network but secure the perimeter Proxy servers direct links outside the network Chapter 12: Networking and Security (Behind the Scenes) 41 Chapter 12: Networking and Security (Behind the Scenes) 42 Dig Deeper: The OSI Model OSI Model: Open Systems Interconnection Developed by the IEEE Gives protocol guidelines to the NOS Communication tasks are divided into layers Layers provide more efficient communication and interacts with layers above and below Chapter 12: Networking and Security (Behind the Scenes) 43 The OSI Model Layers Application Layer Interacts between application software and the network Formats the data for the Presentation layer Presentation Layer Performs data encryption if specified Reformats the data for the Session layer Chapter 12: Networking and Security (Behind the Scenes) 44 11

The OSI Model Layers Session Layer Sets up and manages a virtual connection between sender and receiver Tracks transmission until all data is sent Transport Layer Breaks up data into packets and sequences them Handles acknowledgment of packets Chapter 12: Networking and Security (Behind the Scenes) 45 The OSI Model Layers Network Layer Examines packet address Determines best route for transfer Data Link Layer Assembles data into frames Addresses the frames Passes the frames to the Physical layer Chapter 12: Networking and Security (Behind the Scenes) 46 The OSI Model Layers Physical Layer Converts data into a signal Transmits the data Delivers the data to the final destination Chapter 12: Networking and Security (Behind the Scenes) 47 12