Академический Документы
Профессиональный Документы
Культура Документы
Networking Fundamentals
Computer network Two or more computers connected together Devices connected to networks: nodes Benefits of a network Sharing resources and peripherals Transferring files Sharing of broadband connection with use of a router Downsides of a network Extra cost, administration
Network Architecture
Network designs Locally administered Peer-to-peer (P2P) Centrally administered Client/server
Peer-to-Peer Networks
Client/Server Networks
Client computers Users who make requests Server computers Provide resources to clients
Local area network (LAN) Nodes are within a small geographic region Schools Small businesses
Network Components
Transmission media Network communication devices Software
Transmission Media
Provide communications channel between nodes
Forms of media Twisted pair cable Coaxial cable Fiber-optic cable Radio waves (wireless)
Bandwidth Data transfer rate Throughput Always less than or equal to the DTR Usually measured in Mbps (1 million bits per second)
Network Adapters
Devices connected to or installed in nodes Network interface cards (NICs) External or internal network adapters Enable communication between nodes
Networking Software
Peer-to-peer software Built into operating systems that support networking Windows Mac OS X Linux Client/server software Network operating system (NOS) software Windows Server 2008 SUSE Linux Enterprise
Wired Ethernet
Ethernet network adapters are used to connect nodes NIC card ExpressCard USB adapter Computers are connected to each other using unshielded twisted pair cable
Ethernet Switches
Keep track of data packets
Ethernet Routers
Transfer packets from one network to another Home internet routers transfer data from the internet to the home network
Allows for network-ready devices such as network printers or network attached storage (NAS)
Power-Line Networks
Computers are connected to a houses electrical wiring to create a network A power-line network adapter connects nodes to electrical outlets
Extranet is an area of an intranet reserved for certain subgroup (i.e. staff) VPN virtual private network Uses public infrastructure as a means of communicating but is encrypted using tunneling
2.For a wired network, plug all the cables into the router, network adapters, and so on 3.Make sure your cable/DSL modem is connected to your router and the Internet 4.Turn on your equipment in the following order: a. Cable/DSL modem b. Router c. All computers and peripherals (printers, scanners, and so on)
Contact ISP for special settings Access router from web browser Enter username and password Use routers wizard to set up connection using settings and information provided by ISP
Network Topologies
The physical or logical layout of computers, transmission media, and other components. Types of network topologies Bus Ring Star Hybrid
Bus Topology
All nodes are connected in sequence on a single cable Networked computers communicate with each other One computer transmits data at a time Collisions are frequent Becoming obsolete
Ring Topology
Nodes are laid out in a ring A token (Data packet) flows in one direction from device to device Recent versions have data transfer rates of up to 100 Mbps
Star Topology
Most widely deployed client/server layout Nodes connect to a central communication device (switch) A node sends a signal to the switch, which retransmits it to the other nodes A node accepts only signals addressed to it
Comparing Technologies
Topology Advantages Disadvantages
Bus
Large numbers of users will greatly decrease performance because of high volumes of data traffic
Ring
Allocates access to the network fairly Performance remains acceptable even with large number of users
Star
Requires more cable (and possibly higher installation costs) than a bus or ring
troubleshooting and repairs Easy to add more computers or groups of computers as needed (high scalability) Performance remains acceptable even with large numbers of users
topology The switch is a central point of failure. If it fails, all computers connect to that switch are affected
Network Security
Authentication User ID and password used to access the network Use of biometric devices Use of a possessed object for access Access privileges Enable access to certain network systems Physical protection measures Restrict physical access to sensitive network equipment Magnetic card readers Biometric access devices Firewalls Prevent access to the network by unauthorized users Composed of software and/or hardware Screen and validate data packets Bastion host/proxy server