NETWORKS – DIGITAL SILK SOFTWARE DEVELOPMENT UNIT 4 – OUTCOME 2.

Slides:



Advertisements
Similar presentations
Basic Concepts of a Computer Network
Advertisements

Networks Unit 3 & 4 IP&M JEOPARDY Acknowledgements: VITTA for the jeopardy pro-forma Mark Kelly’s Network slideshow.
Computer networks Fundamentals of Information Technology Session 6.
VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
Networking Basics lesson 17. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network Topologies for LANs.
2 An Overview of Telecommunications and Networks Telecommunications: the _________ transmission of signals for communications (home net) (home net)
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
1 Networking For VCE IT By Mark Kelly VCE IT Lecture notes: Vceit.com.
IS 247 Introduction to Web Application Development Tim Wu.
Communications and Networks
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Computer Networks IGCSE ICT Section 4.
OCR Computing for GCSE © Hodder Education 2011
4 Network Hardware & Software Network Operating systems: software controlling traffic on the network 2 types of s.ware: server software &client software.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Lecture 5 Title: Networks and Businesses
BUS1MIS Management Information Systems Semester 1, 2012 Week 5 Lecture 1.
PowerPoint Presentation to Accompany Chapter 9 Networks & Communications Visualizing TechnologyCopyright © 2014 Pearson Education, Inc. Publishing as Prentice.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 7: Using Windows Servers to Share Information.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Slide 1 What is a Computer Network? A computer network is a linked set of computer systems capable of sharing computer power and resources such as printers,
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B5 Networks and Telecommunications.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
Common Devices Used In Computer Networks
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Networking Basics lesson 4 essential concepts. This lesson includes the following sections: The Uses of a Network How Networks are Structured Network.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
1 INTERNET AND WORLD WIDE WEB TECHNOLOGIES BUS Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
NETWORKS.
Networks QUME 185 Introduction to Computer Applications.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Networks. A network is formed when a group of computers are connected together. Computers in a Local Area Network (LAN) are fairly close together, generally.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Networking Network Classification, by there: 3 The Rules they use to exchange data: Protocols.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Higher Computing Networking. Networking – Local Area Networks.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Networks. Local area network (LAN( Wide-area network (WAN( Networks Topology.
Activity 1 5 minutes to discuss and feedback on the following:
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
VCE IT Theory Slideshows
Chapter Objectives In this chapter, you will learn:
3.1 Types of Servers.
Computer Networks.
Network Models, Hardware, Protocols and number systems
Firewalls Routers, Switches, Hubs VPNs
OCR GCSE Computing © Hodder Education 2013 Slide 1
Unit 11- Computer Networks
GCSE OCR 3 A451 Computing Client-server and peer-to-peer networks
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
Presentation transcript:

NETWORKS – DIGITAL SILK SOFTWARE DEVELOPMENT UNIT 4 – OUTCOME 2

NETWORKS At its simplest, a network is two or more computers that are connected so they can exchange information and share resources. Networks can be classified by: Their size (LAN, WAN, Internet) Their servers (Client-server, P2P) The rules they use to exchange data (Protocols – TCP/IP) How they are linked together (cable, wireless) Their logical shape (Bus, Star, Ring) How network messages travel (Ethernet, CSMA/CD)

NETWORKS Efficiency – Better, faster communication – , videoconferencing Cost savings ( vs phone calls, physical travel), Staff savings (e.g. networked helpdesk), Equipment savings: printers, internet connections, internet cache, CD drives Effectiveness – collaborative work is easier, access to resources is broader, group calendaring

NETWORKS Management - control over internet & printing, staff monitoring Company image and “reach” – internet visibility makes any company international and accessible and “with it” Customer service – many more ways to help customers (e.g. FAQ, downloads, online advice, contact)

NETWORKS Types of Networks Local Area Network Wide Area Network Internet Personal Area Network

NETWORKS Server Based Networks Client/Server model Automatically a pretty expensive choice compared to P2P File server at the heart of the network Server runs the Network Operating System (NOS) Controls access to data and equipment Runs ‘community’ programs Offers control, security, centralisation, automation

NETWORKS Peer to Peer Networks No server, cheap, simple, easy to run All users have equal authority and rights Little protection from each other Used at home or in small orgs with trusted users Share files, internet connection, printer Internet music sharing networks (e.g. Kazaa) are P2P - no central computer; data and software on users’ computers. P2P built into Win, Linux, Mac

NETWORKS Network Addressing Like telephones, every node on a network must have a unique identifier so the file server knows who is requesting information, and who is to be sent information. This unique network address is hardwired into the network card of each computer. Also, every active node of the internet needs a unique identifying address so TCP/IP knows where packets are to be sent. This is an I nternet P rotocol, or IP address.

NETWORKS Humans like working with names (e.g. but computers use IP numbers (e.g ). IP address has four ‘octets’ separated by dots, each octet can be between 0 and 255. Remember - all internet communications use IP addresses, not URLs. Only humans use URLs. Domain name servers (DNS) – a distributed database on thousands of computers across the world - convert URLs into IP addresses. Like a phone book – look up a name (URL) to get a number (IP address).

NETWORKS Network Physical Security File server failure can severely affect network users. Server security: Locked in air-conditioned, alarmed room with barred windows, restricted keys No user access to server Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. Accessible fire fighting equipment. Locked floppy disk drives

NETWORKS Network Electronic Security Passwords are not strong protection – they can be guessed, forgotten or stolen. Daily backups are vital. Massive cost and effort to recover a single megabyte of lost data. Organisations need a data disaster recovery plan so they know what to do to recover from catastrophic data loss. A form of Electronic Security Makes data unreadable to unauthorised people even if a file is stolen. Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site.

NETWORKS Security Threats TROJAN HORSES attempting to report ‘home’ or start a DOS/DDOS attack - can be blocked by a firewall. FIREWALLS in hardware (routers) or software (e.g. Zone Alarm) check for unauthorised incoming or outgoing network traffic, e.g. port scanning, being enslaved to help with a distributed denial-of-service (DDOS) or spam attacks. VIRUSES can disclose user passwords, steal information, destroy data, install “back doors” to let hackers in, clog print queues, disrupt Internet traffic, overload servers etc. Keep scanners up to date.

NETWORKS – DIGITAL SILK Internet Intranet VPN What is the difference?

Do all industries rely on the “net”?

INTERNET Worldwide network of WANs Uses TCP/IP protocol World Wide Web – only part of the internet – uses HTTP to send/receive web pages. Each device needs a unique IP address (e.g )

INTERNET Other services are provided by the Internet: Usenet - a network of discussion groups File sharing networks – torrent sites, Kazaa, Limewire etc FTP Closed networks like Facebook, Twitter Blogs RSS feeds

DOMAINS Human readable URLs with domain names (e.g. microsoft.com) are not computer friendly Domain names are converted to an IP address to find the destination server. DNS (Domain Name System) does the conversion DNS = massive ‘phonebook’ with all domain names and matching IP addresses

WEB SERVER Computer that stores web pages making up a site. Visitors use web browsers to make requests for web pages using HTTP. Web server uses HTTP to return requested page to visitor.

INTRANET Local, private version of the internet Uses the Internet Protocol to securely share information within an organisation’s Local Area Network. May involve local websites, , collaboration tools, databases that are not available to those who are not within the LAN.

INTRANET Can be as simple as webpages stored on a shared network drive. Uses page references to files on the file server rather than on a webserver. Simple to access with only a web browser.

INTRANET Intranet is protected by a network gateway and firewall to keep outsiders out. Intranet can be made safe by using privatem, local IP addresses (e.g xx or x) which cannot be used by outsiders to refer to computers within the LAN.

INTRANET In some cases the intranet has a public face on the internet, but a password-protected login is needed to gain access. INTRANET USES Collaboration – tools (e.g. Google docs, and shared documents) Communication ( , VoIP, messaging) Resource sharing Training

VPN Virtual Private Network Used to provide access to a LAN or intranet to off-site people. A secure, private link using normal internet infrastructure. A VPN box creates the encrypted tunnel between the box and a same-keyed box elsewhere on the internet.

CORPORATE VPN Corporate VPN box can support hundreds of simultaneous encrypted remote access connections. VPN can also be done with software (e.g. in MS Server) but is slower and less robust A 200-user VPN box can cost $7,000