 Networks A visit to the admin block…. Network Topology  Our school uses the flat topology.  All devices are connected directly to one another in this.

Slides:



Advertisements
Similar presentations
Purpose of the Main Components of an Information System Hardware, Software and Communication Links.
Advertisements

Basic Concepts of a Computer Network
NETWORKS Review + Topology.
Transmitting & Receiving Contents  Hardware for Transmitting & Receiving:By Ryan Caulfield  Software for Transmitting & Receiving: By Todd John  Non-Computer.
Networks By the end of this session, you will:
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
1 Version 3.0 Module 8 Virtual LANs. 2 Version 3.0.
Washington District Networking Project Presented by Pat Kearney Pauric Fahey Seamus Leyden.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Introduction to Metropolitan Area Networks and Wide Area Networks TDC 362 / TDC 460.
Computer Networks IGCSE ICT Section 4.
How to Build a CAN Last Update Copyright Kenneth M. Chipps PhD 1.
Networks (Part 2) Use of a Modem The different modems Baud Rate Bandwidth Server and Client machines Network Topologies ( Bus, Ring and Star)
SAN VS NAS What the HECK you talking about???. NAS – Various Devices (CD Towers, SCSI Towers, Specialty Servers) Each Device Connected Directly to network,
Exploring Microsoft Office Essential Computing Concepts1 Getting Started Essential Computing Concepts By Robert T. Grauer Maryann Barber.
Chapter Overview Network Communications.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Computer networks 2 A Informatica prof.sse ALLEMANI e CARUSO.
Networking By Nachiket Agrawal 10DD.
IT Infrastructure Chap 1: Definition
Networking By Nachiket Agrawal 10DD Contents Network Stand Alone LAN Advantages and Disadvantages of LAN Advantages and Disadvantages of LAN Cabled LAN.
BISJ Networking Areka Raza. Topology The topology used in BISJ is called Flat network Everyone is connected to everything.
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
Computer Networks. What are Networks? A computer network is a group of connected computers. Networks allow:  the sharing of information, such as files.
Networks.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
What does LAN stand for? Local Area Network. A LAN supplies networking capability to a group of computers close to each other. A LAN is useful for sharing.
Understand the Components of a Network Mrs. Whaley.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Communications & Networks National 4 & 5 Computing Science.
Network Topologies.
 LAN ADVANTAGE  Workstations can share peripherals devices like printers. Cheaper that providing a printer for each computer.  Workstations do not.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Introduction to Networks Mr. Grimming. Types of Networks Wide Area Network (WAN) Cover large geographic area Nodes connected by coaxial cable, microwave.
NETWORKING COMPONENTS lLTEC 4550 JGuadalupe. HUB -THIS IS A HARDWARE DEVICE THAT IS USED TO NETWORK MULTIPLE COMPUTERS TOGETHER. IT IS A CENTRAL CONNECTION.
Different computer networks. Star network The star network is local area network mostly used at home, school and offices. Star network has 5 or 6 workstations.
Networks. What is a Network? A network is a collection of computers and other devices that allow computer users to send and receive information to and.
Networking Computers Types of Network. Learning Objectives: By the end of this topic you should be able to: compare the characteristics of a local area.
Introduction to Networking. What is a Network? Discuss in groups.
Networks Unit 5 Digital Literacy Computer Technology (S3 Obj 2-1, 2-2 & 2-3)
Elements of an ICT networks COMMUNICATION DEVICES: 1.Network interface card 2.Hub 3.Switch 4.Router STANDARDS AND PROCEDURES: 1.Enable devices to communicate.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Unit Communication Hardware
Unit 5 Introduction to Networking
3.1 Types of Servers.
ICT II Unit 6 Networking.
Unit 5 Introduction to Networking
Networks 1 Key Revision Points.
Computer Networks Part 1
3.2 Virtualisation.
Computer Technology Notes #4
Chapter 7.
Topic 5: Communication and the Internet
An Introduction to Computer Networking
BASIC NETWORK CONCEPTS
Department of Computer Science Course : Pre Computer Skills
09/12/2018 Virtual Networks.
Networks 1 Key Revision Points.
Unit 2 Introduction to Networking
Communications & Computer Networks Resource Notes - Introduction
INDEX Introduction What is OST file? What is the default location of OST file in MS Outlook? Causes behind OST file corruption How to fix these errors?
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Networking 101.
Presentation transcript:

 Networks A visit to the admin block…

Network Topology  Our school uses the flat topology.  All devices are connected directly to one another in this type of topology except when hubs or switches are used.  The main threat or issue for this type of topology is securing this network from inside attack.  Since every devices are directly connected, access restriction to certain information is more lenient.

VLANS  VLAN stands for Virtual Local Area Network or simply Virtual LANs.  It allows the network system to be split up into virtual environments.  The PCs for teachers, students, accounts department etc. all operate under separate LANs.  However, it looks as if they are all on the same network since the LANs are connected to each other and forms a Virtual Lans (VLAN).  Teachers do not have access to information on the PCs in the accounts department and students don’t have access to information shared between teachers and vice versa.

VLAN illustration Source:

System storage  IBM system storage is used to backup data stored in the network.  Data is backed up on tapes using incremental backup method.  There are slots for tapes to be inserted in the device.  New data are backed up every night during weekdays and all of the data will be backed up on weekends.  At the end of every term, all data are stored on fireproof tapes and are brought to an off site territory.

Servers  These are the servers stacked next to each other in the rack.  The servers on the top are the older ones. They store applications shared between all the computers e.g Microsoft outlook.  The bottom ones are called the blade servers. They are more compact and dense which allows the size to be reduced.  The servers process very large amount of data and heat up very quickly hence they are stored in an air conditioned room.

HUBs  This is the hub that connects all the devices and workstations and form a network.  The school uses fiber optic cables that runs underground and connect to devices in different blocks of the school.  Fiber optic cables transmit data at the speed of light.

VMware  The software used to control the operation of the servers are called the VMware.  They allowed the virtualization of the network which is the concept of the VLAN.  The software allows user to control and monitor the operations of all the servers.  Since a virtual network is used, errors in any server would not be a problem since the data and files can simply be transferred to another one using this software.

Symantec  Data transferred within the network is protected using a software called Symantec.  The server in the network is also protected by this software.  Up to a million or 97% of all s received by users in the network are spams.  The software blocks 99% of all spam mails. Mails without a subject are considered as spam mails and will be blocked.  Rogue mails are those which they are uncertain of. Users will be notified that they received these s and will be able to accept or decline.