Net 301 LECTURE12 12/3/2015 Lect14 NET301.

Slides:



Advertisements
Similar presentations
Wireless network Usually use Radio Frequency (RF) technology Adv :
Advertisements

Networks By the end of this session, you will:
Mr C Johnston ICT Teacher
VLANs Virtual LANs CIS 278.
Designing and Installing a Network Peer to Peer or Server –Number of workstations vs. Cost –Administration, distributed or centralized –Security considerations.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
ROYAL PALM NETWORK PROJECT John Healy Tom Jamieson
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
Computer Networking By Brian Bogue. Internet Service Provider [ISP] Satellite, Wireless, Cable and Dial-up Direcway Satellite is our ISP with a connection.
LECTURE16 NET 301. HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the key considerations are:
 All of you should be able to describe how a network works.  Most of you will be able to identify the main devices necessary for a network.  Some of.
Network Done by: Athra sultan.
What is a Computer Network? Two or more computers which are connected together.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Local and Wide Area Networks: Understanding the Pieces John H. Porter University of Virginia Coastal Research Center.
Computer Networks All you need to know. What is a computer network? Two or more computers connected together so that they can communicate with each other.
NETWORK Topologies An Introduction.
Networking and Operating Systems. Networking What is it? Things that are hooked together. Computer Network- Computers that are connected together.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
0 If you have set-up the equipment and are unable to access your service, call 1(888)ONE-ATT0/1(888) or for
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the  Bus  Ring  Star.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
CANBus Hardware Setup. CANBus CANBus is a control system method that can be used instead of the conventional PWM system. It uses RJ12 cable, which is.
Networks.
Chapter 7 Connecting to the Internet. 2Practical PC 5 th Edition Chapter 7 Getting Started In this Chapter, you will learn: − What is the Internet − Options.
Intro to Switching Lecture # 3 Hassan Shuja 03/14/2006.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Connectivity Devices. Network Interface Card (NIC) Allow user to connect to networks via Ethernet cable or Wi-Fi Nowadays integrally fitted into the.
Network Anatomy By: Roland J. Boutte. Ethernet Cable cable used to connect computing devices together directly. two hosts or two switches to each other.
1 Networks: A group of two or more computer systems linked together. There are many types of computer networks, including: local-area networks (LANs) :
Networks. What is a computer network? A network is two or more computers that are linked together so that they are able to share resources.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Network Devices Mr Conti Year 9 Lesson 5. Every computer on a network needs a network interface card (NIC) which is connected to the motherboard inside.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
FIREWALLS What Is A Firewall? A computer firewall protects networked computers from intentional hostile intrusion that could compromise confidentiality.
NETWORKING & SYSTEM UPDATES
LECTURE14 NET /3/2015Lect14 NET HOW TO SET UP A SECURE LOCAL NETWORK Step 1: Identify Your Networking Needs This is a very important step.the.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Planning a Network Upgrade Working at a Small-to-Medium Business or.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Use appropriate tools for network cabling and connections. Objective – 2%
Learning to read Installing a wired modem router.
Example of a LAN Last Update Copyright 2009 Kenneth M. Chipps Ph.D.
LAN, WAN, and Network Topologies
Networking Objectives
Featrues of Compputer Networks
ICT II Unit 6 Networking.
Networks and Communication
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Net 301 LECTURE14 12/3/2015 Lect14 NET301.
Wireless Network Computer Science Engineering Technical English II
Installing an Xbox 360.
Networking Devices.
Computer Data Security & Privacy
NETWORK TOPOLOGIES There are three basic configurations used to connect computers they are the Bus Ring Star.
Institution Affiliated
Wired Networks CIT 1100 Chapter4.
Tool Server Workstation Router Universal
Chapter 7 Connecting to the Internet
IT Vocab IT = information technology Server Client or host
Networks Learning Outcome 1
Planning and Cabling Networks
Connecting your network
Distribution of access
Networks By the end of this session, you will:
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
Principles of Information Technology
Presentation transcript:

Net 301 LECTURE12 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 1: Identify Your Networking Needs This is a very important step.the key considerations are: How many wired Ethernet ports, if any, will you need? Where will these Ethernet ports need to be located? (In other words, where will the PCs and other equipment that will be plugged into these Ethernet ports be located?) Where will the router and high-speed modems be located? Answering these questions will help you understand what types of equipment you need, as well as how much cable you’ll need. 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 2: Determine Where To Put Your Equipment Before you begin any installation, commit to the location for each piece of equipment in your network. This is critical if you’re going to run a cable beneath drywall or over a ceiling, because you won’t be able to change the cable lengths if something goes wrong. 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 3: Gather Your Tools And Supplies Ethernet Cable.. Cable Connectors.. Crimper.. Cable/DSL Modem. Wired/Wi-Fi Router Ethernet Hub 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 4: Run The Cables In this step, we’ll create the “cable runs” that will establish wired connections between the Ethernet ports on the ground floor and the router and cable modem upstairs. 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 4: Run The Cables Run cable from the router and cable/DSL modem location to the area where each Ethernet port will be located. As you run the cable to these locations, make sure you temporarily affix the cable to the wall or floor so that you have a realistic idea of how much cable you’ll need. Also: Leave yourself five or 10 extra feet at the end of the cable, just in case. 12/3/2015 Lect14 NET301

How To Set Up A Secure Local Network Step 5: Crimp The Cables Step 6: Connect All The Cables Together Step 7: Test Your Network Connection Step 8: Set Up Your Router 12/3/2015 Lect14 NET301

Applications Applications on a LAN can range from word processing to data base management systems. The most universally used application is E-mail. An important security note is that on some systems it is also possible to restrict mail users from attaching files as a part of an antivirus program. 12/3/2015 Lect14 NET301

Applications Many application systems have their own set of security features, in addition to the protection provided by the network operating system. Data base management systems, in particular, have comprehensive security controls built in to limit access to authorized users. 12/3/2015 Lect14 NET301

Access Control Mechanisms Network operating systems have access control mechanisms that are crucial for LAN security. For example, access controls can limit: who can log on, what resources will be available, what each user can do with these resources, and when and from where access is available. Management, LAN, security, and key user personnel should cooperate closely to implement access controls. 12/3/2015 Lect14 NET301

THREATS TO LAN SECURITY People Threats.. Costly System administration error Software/programming error (bugs) Unauthorized use Modification of data Theft of computer assets Hardware failure ( or any physical ) 12/3/2015 Lect14 NET301

http://www.acsa-admin.org/secshelf/book001/16.pdf 12/3/2015 Lect14 NET301