(part 4).  Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending.

Slides:



Advertisements
Similar presentations
Networking at Home the Office and Globe
Advertisements

Any Questions?.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Networking at Home and Abroad
IST 201 Chapter 5. LAN Technologies Ethernet – most widely used technology in LANS In 1970, developed and implemented by: Digital Intel Xerox IEEE
Presented by Serge Kpan LTEC Network Systems Administration 1.
Chapter 6 Telecommunications & Networks.
Networks Adapting Computers to Telecommunications Media.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
CCNA 1 v3.1 Module 5 Review.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
Hardware & Software Needed For LAN and WAN
A Guide to major network components
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
For more notes and topics visit: eITnotes.com.
Power point presentation on internet Presentation by: Tenzin wangda.
Networking Hardware and Components By: Sean Bell.
Lecture 9 Modems and Access Devices. Overview Computers are connected to telephone lines through the use of modems –modems: are connecting devices between.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Networking Technologies
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Network Components 101 Travis Hill.
Module CT3004N: Wide Area Networks Lecture Week 1.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
NETWORKING COMPONENTS By Cleve Rosser. Hubs allow large numbers of computers to be connected on a single or multiple LAN. Each computer plugs into the.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Unit 1—Computer Basics Lesson 7 Networks.
WANs and Remote Connectivity
HUB Connects multiple workstations, servers, and other devices to a network. Can be used to connect two or more computers to one network port. Handles.
Living Online Module Lesson 23 — Networks and Telecommunication
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
Company LOGO Networking Components Hysen Tmava LTEC 4550.
Copyright CCNA 1 Chapter 4, Part 2 Cabling LANs and WANs By Your Name.
Information Flow Across the Internet. What is the Internet? A large group of computers that link together to form the Worldwide Area Network (WAN)
 The devices which each intercorrect several computer or different to each other, each nones network devices.  There are various types of Network devices.
Telecommunications, the Internet, and Wireless Technology.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Components of wireless LAN & Its connection to the Internet
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Connecting to the Network Introduction to Networking Concepts.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Presented to:-Sir.Ali Presented by:-Mahmood Khan Roll No:-2801.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Chapter 3.  Upon completion of this chapter, you should be able to:  Select and install network cards to meet network connection requirements  Connect.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Network Components Basics!. Network HUB  Used to connect multiple Ethernet devices together  Layer 1 of the OSI model  Not used much today.
Chapter 6 Telecommunications and Networking Slide 1 Well, Sort-of.
Communications and Networks 2 Compiled by Maududie Reference: Practicum Module Application Training Institut Teknologi Bandung
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Kevin Harrison LTEC 4550 Assignment 3.  Ethernet Hub  An unsophisticated device that is used for connecting multiple Ethernet devices together.  Typically.
ASSIGNMENT 3 - NETWORKING COMPONENTS BY JONATHAN MESA.
Virtual Circuit Networks: Frame Relay And ATM UNIT 5 Chapter 18 Forouzan.
ICT Unit 4: Network and the effects of using them
Intro to MIS – MGS351 Network Basics
Connecting Networks Repeater: physical layer Bridge: data link layer
Computer Technology Notes #4
Network Basics Extended Learning Module E
Networking at Home and Abroad
Presentation transcript:

(part 4)

 Gateways  A gateway is responsible for translating information from one format to another and can run at any layer of the OSI model, depending on what information the gateway translates.  A typical use of a gateway is to ensure that systems in one environment can access information in another environment.

 For example, you want to make sure that your PC environment can access information on the company’s mainframe.  As shown in Figure 3-26, when the packet reaches the gateway, the gateway strips the packet down and repackages it so that it is understood on the other side of the gateway.  In Figure 3-26, notice that the information sent by Workstation 1 has been reformatted after reaching the gateway.

 Gateways do this by stripping the packet down to just the data and then rebuilding the packet so that it is understood at the destination.  It is also important to note that when you configure TCP/IP and you configure the “default gateway” setting, you are pointing to the address of the router on the network. It really has nothing to do with an actual “gateway” device.

 Firewalls  Firewalls are a networking component responsible for protecting the network from outside intruders.  The firewall is designed to block specific types of traffic while allowing certain information to pass through.  Routers are typically use as firewall device.

 Intrusion Detection Systems  An intrusion detection system (IDS) is a security device that monitors system or network activity and then notifies the administrator of any suspicious activity.  Intrusion detection systems are important devices that will complement other security devices such as firewalls.  The IDS is an important device because it will notify you not only of suspicious activity against the firewall, but also of suspicious activity inside the network.

 There are two types of intrusion detection systems:  Host based  Host-based intrusion detection systems monitor the local system for suspicious activity.  A host-based IDS is typically a piece of software installed on the system and can only monitor activity on the system the IDS was installed on.

 Network based  A network-based IDS monitors network traffic for suspicious behavior.  A network-based IDS has the capability of monitoring the entire network and comparing that traffic to known malicious traffic patterns.  When a match is found an alert can be triggered.  Network-based IDSs can be software loaded on a system that monitors network traffic or can be a hardware device.

 Intrusion detection systems can be either active or passive.  An active IDS will monitor activity, log any suspicious activity, and then take some form of corrective action.  A passive intrusion detection system does not take any corrective action when suspicious activity has been identified.

 Wireless Access Points  Wireless access points (WAPs) are network devices that can be connected to the wired network to allow a wireless client to pass through to get access to the wired network and its resources.  A wireless access point also is known as a cell, which is a device that transmits and receives radio frequencies between the PCs and network devices with wireless transmitters connected to them.

 The wireless access point is connected to a physical cable, which connects the WAP device to the rest of the network.  Figure 3-27 shows an example of a Linksys home router that is a wireless access point as well. Notice the wireless antennas attached to the access point.  The typical home router is a multifunctional device; it acts as a wireless access point, firewall, switch, and router, all wrapped up in one device.

 Modems  There are other forms of networking devices beyond the typical network card; for instance, modems can be used to communicate with other systems across the public switched telephone network (PSTN).  They are used to convert digital data from the PC to analog transmission so that the information can be transmitted over the analog phone lines.  The modem on the receiving end is designed to convert the analog signal to a digital format readable by the system.

 CSU/DSU  A channel service unit/data service unit (CSU/DSU) is either one device or a pair of devices that allows an organization to get a very-high-speed WAN connection from the telephone company, such as a T1 or T3 link.  The CSU is used at the business end to get the connection to the WAN, and the DSU may be used at the provider’s end to allow the CSU to connect.

 ISDN  The Integrated Services Digital Network (ISDN) is a communication standard for sending voice and data over normal telephone lines or digital telephone lines.  In order to connect to the ISDN lines, a system will need an ISDN modem, which doesn’t really act like a modem because, whereas a modem converts digital data to analog, the ISDN modem carries digital data from one digital system to another, and so it really is acting as a terminal adapter connecting you to the ISDN lines.

 There are two popular types of ISDN connections:  Basic rate interface (BRI) This is a 128 Kbps connection that is made up of two 64 Kbps channels (known as B-channels) and one 16 Kbps control channel (known as a D-channel).  Primary rate interface (PRI) This is a 1.55 Mbps connection that is made up of twenty- three 64 Kbps channels (B-channels) and one 64 Kbps D-channel for signaling and control information.

 Wiring Distribution  Plenum vs. Nonplenum  Plenum refers to the space between the ceiling tiles and the floor located above them.  This space is typically used to route power and network cables.  It is important to use plenum grade cables in this space because if there is a fire and you are not using plenum grade cables, a toxin is given off that could be carried throughout the building, causing harm to individuals.  Plenum-grade cabling uses a low-toxicity material for the jacket of the cable in case of fire.

 Patch Panel  Most companies have network jacks located in the walls that allow systems to connect to the network.  These jacks have cables connected to them that are then routed a long distance to a patch panel in a server room.  The patch panel then has a patch cable that connects to the front of the patch panel and a port on a switch.

 When a computer connects to the network jack in the wall, the patch cable is used to map that system to the port on the switch.  The concept of the patch panel allows ease of administration and flexibility in moving systems from one switch to another without visiting the workstation.

 Cross Connects, MDF, and IDF  When wiring the network you will typically have the outside line coming into the building connect to a panel; this panel is known as the main distribution frame, or MDF.  From the MDF you would typically connect to other panels, known as intermediate distribution frames (IDFs), which is what the workstations connect to.  This hierarchy of MDF and IDF panels allows greater flexibility when rearranging the network at a later time.