ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.

Slides:



Advertisements
Similar presentations
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Advertisements

CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
+ Architecture, Firewalls and Proxy Servers Networks.
COEN 252: Computer Forensics Router Investigation.
Computer Networks IGCSE ICT Section 4.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web Proxy Server Anagh Pathak Jesus Cervantes Henry Tjhen Luis Luna.
ITGS Networks Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
NETWORKS BY SAUD, JUDE AND LATIVIA. NETWORK COMPONENTS.
Chapter 7: Using Windows Servers to Share Information.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Chapter 13 – Network Security
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Client-Server & Peer-to-Peer Networks
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Unit – I CLIENT / SERVER ARCHITECTURE. Unit Structure  Evolution of Client/Server Architecture  Client/Server Model  Characteristics of Client/Server.
Client – Server Architecture. Client Server Architecture A network architecture in which each computer or process on the network is either a client or.
How computer’s are linked together.
Objectives  To define network  To identify use of network  To differentiate major types of network  To identify basic networking terminologies  To.
Protecting Students on the School Computer Network Enfield High School.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
Security and Firewalls Ref: Keeping Your Site Comfortably Secure: An Introduction to Firewalls John P. Wack and Lisa J. Carnahan NIST Special Publication.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Module 10: Windows Firewall and Caching Fundamentals.
A Network Security -Firewall Bruce Turin.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Communications & Networks National 4 & 5 Computing Science.
Enterprise Network Systems Client/ Server Mark Clements.
Basic Computer Terms Introduction to Computer Applications Mrs. Sorrell.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Protocols Monil Adhikari. Agenda Introduction Port Numbers Non Secure Protocols FTP HTTP Telnet POP3, SMTP Secure Protocols HTTPS.
Client – Server Architecture A Basic Introduction 1.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Chapter 7: Using Windows Servers
CONNECTING TO THE INTERNET
Computer Data Security & Privacy
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls.
Welcome To : Group 1 VC Presentation
Providing Network Services
I. Basic Network Concepts
Firewalls Purpose of a Firewall Characteristic of a firewall
Communications & Computer Networks Resource Notes - Introduction
Internet Protocols IP: Internet Protocol
AbbottLink™ - IP Address Overview
LO3 – Understand Business IT Systems
Firewall Installation
Designing IIS Security (IIS – Internet Information Service)
Client/Server and Peer to Peer
Computer Networks Protocols
Presentation transcript:

ITGS Network Architecture

ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network - One or more computers act as servers that provide services to the rest of the network (the clients) –Many advantages because files are located on a server can be accessed by owners from any client »If a computer needs to be repaired, files are not lost since they are saved on the server, not the computer »Because the server authenticates users, security is improved

ITGS Thin client network - client computers rely heavily on a server not only to store files and applications, but run software on a client’s behalf (sometimes including even the OS) –The thin client merely acts as a terminal for accepting input and displaying output The client only contains enough software to initialize the hardware and network connection, and connect to the server Because this is all they do, clients have very low specifications –No secondary storage –Slow processors –Small amount of RAM

ITGS Peer-to-peer networks - every client (peer) has equal status, and there is no central authority or server –Common in homes and small businesses where a server is too expensive/ not necessary Each computer shares the files from its own hard disk, and other machines are able to access them With more than a few users, the lack of a server to aid in security and storage becomes a problem

ITGS Firewalls –Hardware or software that determines which data is allowed to enter and leave a network Can be dedicated computers or built into network routers –Firewalls help secure a computer by preventing network access from unauthorized users –They also control which users and programs are allowed to connect to an external network such as the Internet Firewalls can be configured to allow or block traffic using several methods: –IP addresses - IP addresses of specific computers can be allowed or denied access »Denial of Service (DoS) - an attack by malicious computer users that bombards a site’s servers until the site doesn’t work »In one of these attacks, the IP addresses of the attacking machines can be blocked

ITGS Domain names - access to particular websites such as social networks can be blocked by specifying their name Protocols and ports - different protocols can be blocked or allowed as needed: Web browsing (HTTP) Mail (SMTP and POP3) File transfer (FTP) These protocols use a standard port, and the ports can be blocked as well For example, HTTP is port 80 Application program - individual programs can be granted or denied network access This is most important for programs that try automatically to update themselves or update themselves

ITGS Controversy over firewalls –While they can be used for protections, governments can also use them to deny services Proxy servers –Act as a middle step between two computers Usually between a computer on a LAN and a web server on the internet –All communication through the two computers passes through the proxy »The proxy caches, filters, and logs data (like users’ web activity) Caching - (saves time and bandwidth) –A process used to speed up activities like web browsing »Proxy servers keep a copy of commonly requested material, such as a web page, in a storage area called a cache. »When a user requests the webpage, the proxy server provides it from the local cache rather than retrieving it from the internet