Download presentation
Presentation is loading. Please wait.
Published byMaximillian Hampton Modified over 8 years ago
1
Module 6: Networking
2
Unit 18: Networking
3
Basic Networking Topologies ● There are six basic network topologies, any other is classified as a hybrid network ● Bus ● Ring ● Star ● Hierarchical ● Mesh ● Extended Star
4
Network Threats ● A Network is under constant threats such as Trojan Horses, Worms, and Viruses, but the biggest threat are the users. The user is the main threat because they may open up an opportunity for any other threat to come in.
5
Knowledge of the Networks Physical Layer ● The Following are the main responsibilities of the Physical Layer – Definition of Hardware Specifications: This could be hardware such as Voltages, Connector types, or Cable Types. – Encoding and Signaling: Transferring the data into bits and now has the ability to send. – Data Transmission and Reception: Sending and receiving data. – Topology and Physical Network Design
6
Network Connectivity Basics ● The Network may be two types, Unidirectional or Bidirectional. – Unidirectional: Mainly used to keep data private. – Bidirectional: Most Networks use for two way traffic. ● Although a firewall may keep threats out, it may also prevent you from accessing a network. The firewall may not know about new updates.
7
IP addressing schemes
8
Unit 19: Network Architectures
9
Network Architecture Basics ● There are Seven OSI layers, the layers are shown to the right.
10
Ethernet Technology Basics ● There are many different types of cables that may be used, such as fiber or Cat5 or Cat6. Each has a different speed. ● Cat5e: Bandwidth: 350 MHz ● Cat6: Bandwidth: 500 MHz
11
Unit 20: Network Operating Systems
12
Networking Operating System Characteristics ● It provides necessary operating system attributes such as different protocols, support for processors, support multi-processing of applications, automatic hardware detection etc. ● It calculates the safety parameters such as authorization, authentication, logging on restrictions and controlling the access. ● It provides file and directory services and user name ● It provides web services, printing facility, back-ups and duplication services. ● NOS carry Internetworking for example WAN ports and routing. ● It helps in management of the user and maintains additional support for logoff and logon provides administration, system management, and remote access and examination tools along with graphical interfaces.
13
Unit 21: Wide-Area Networks
14
Basic Telecommunications and Interconnection of Networks ● A Network is made up of two or more computers linked together. An example could be an office workplace or the World Wide Web.
15
User Needs for a WAN ● Optimization may be able to speed up a WAN because of several reasons – Deduplication – Compression – Bandwidth Management ● WAN stands for Wide Area Network ● WANs often use Frame Relay, ATM, and X.25
16
Unit 22: Network Management
17
Network Management Activities and Procedures ● Make sure to Document everything, such as any changes to the hardware or software. ● The main protocols for network management are – SNVPv – NetCon
18
Network Applications ● At first glance some may think that a network application is an application used throughout the network, this is not the case. It is an application specialized for a network.
19
Unit 30: System Installation and Maintenance
20
Life Cycle of an Information System ● The life cycle has a few different organizations. However, the general order is: Launch, Developing / Spreading, Produce, Decline – Waterfall – Fountain – Spiral – Build and Fix – Incremental
21
Monitoring the Information System ● Network must be monitored and have many things that may be harmful to it. These may be: – Users – Hackers – Malware – Hardware Malfunction
22
Performing System Maintenance ● Eventually a network will need maintenance and/or upgrades ● In order to do so you must follow a procedure. A few of the steps are shown to the right ● Back up data ● Generate a system report ● Restart
23
Troubleshooting problems ● A Network can fail anywhere, so there are many different ways to troubleshoot. Troubleshooting may take time in order to fix the problem.
24
Evaluating Problem-Solving Processes and Results ● Before starting to evaluate a problem you must document the data and try to recreate the problem. By recreating the problem you can see what went wrong and then fix it.
25
Unit 31: System Administration and Control
26
Analyze and Perform General System Administration Tasks ● A Network may be a Homogenous System Copy or An Heterogeneous System Copy. ● Homogenous: Where every system of a network is the same. ● Heterogeneous: Where the networks systems are not exactly the same
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.