Download presentation
Presentation is loading. Please wait.
1
© 2008 Prentice-Hall, Inc. 1 Technology in Action 1
2
© 2008 Prentice-Hall, Inc. 2 Technology in Action Chapter 12 Behind the Scenes: Networking and Security
3
© 2008 Prentice-Hall, Inc. 3 Chapter Topics Advantages of business networksAdvantages of business networks Client/server vs. peer-to-peer networksClient/server vs. peer-to-peer networks Classifications of client/server networksClassifications of client/server networks Client/server network componentsClient/server network components Types of serversTypes of servers Network topologiesNetwork topologies Types of transmission mediaTypes of transmission media Network softwareNetwork software Network adaptersNetwork adapters Moving data in a client/server networkMoving data in a client/server network Securing networksSecuring networks
4
© 2008 Prentice-Hall, Inc. 4 Networking Advantages NetworksNetworks –Increase productivity –Enable the sharing of hardware resources –Enable the sharing of software –Facilitate Internet connectivity
5
© 2008 Prentice-Hall, Inc. 5 Client/Server Networks Server-based networkServer-based network –Clients and servers Data flows efficientlyData flows efficiently Servers respond to requests from clientsServers respond to requests from clients Servers perform specific tasksServers perform specific tasks Scalable networkScalable network CentralizedCentralized
6
© 2008 Prentice-Hall, Inc. 6 Classifications of Client/Server Networks LANLAN –Local area network –Computers linked together over a small geographic region
7
© 2008 Prentice-Hall, Inc. 7 Classifications of Client/Server Networks WANWAN –Wide area network –Computers linked over large geographic locations MANMAN –Metropolitan area network –Computers linked together within a city or county
8
© 2008 Prentice-Hall, Inc. 8 Classifications of Client/Server Networks PANPAN –Personal area network –Wireless devices connected in close proximity to each other IntranetIntranet –Private corporate network –Protected by a firewall
9
© 2008 Prentice-Hall, Inc. 9 Constructing Client/Server Networks ServersServers Network topologiesNetwork topologies Transmission mediaTransmission media Network operating system (NOS)Network operating system (NOS) Network adaptersNetwork adapters Network navigation devicesNetwork navigation devices
10
© 2008 Prentice-Hall, Inc. 10 Servers Number and type of servers depend on network size and workloadNumber and type of servers depend on network size and workload Dedicated serverDedicated server –Performs one specific function Authentication serverAuthentication server –Keeps track of network logins and services available File serverFile server –Stores and manages files
11
© 2008 Prentice-Hall, Inc. 11 Dedicated Servers Print serverPrint server –Manages client-requested printing jobs –Creates print queue (prioritizes print jobs) Applications serverApplications server –Acts as a storage area for application software Database serverDatabase server –Provides clients with access to database information E-mail serverE-mail server –Processes and delivers incoming and outgoing e-mail
12
© 2008 Prentice-Hall, Inc. 12 Dedicated Servers Communications serverCommunications server –Handles communications between networks including the Internet –Often the only device on the network directly connected to the Internet Web serverWeb server –Hosts a Web site available through the Internet
13
© 2008 Prentice-Hall, Inc. 13 Network Topologies The physical layout of computers, transmission media, and other componentsThe physical layout of computers, transmission media, and other components Types of network topologiesTypes of network topologies –Bus topology –Ring topology –Star topology –Hybrid topology
14
© 2008 Prentice-Hall, Inc. 14 Bus Topology All nodes are connected in sequence on a single cableAll nodes are connected in sequence on a single cable Used most often on peer-to-peer networksUsed most often on peer-to-peer networks Networked computers communicate with each otherNetworked computers communicate with each other One computer transmits data at a timeOne computer transmits data at a time –Access methods avoid data collisions –Data is transmitted in “packets”
15
© 2008 Prentice-Hall, Inc. 15 Ring Topology Nodes are laid out in a ringNodes are laid out in a ring Token (data packet) flows in one direction from device to deviceToken (data packet) flows in one direction from device to device Recent versions have data transfer rates up to 100 MbpsRecent versions have data transfer rates up to 100 Mbps
16
© 2008 Prentice-Hall, Inc. 16 Star Topology Nodes connect to a central communications device (switch)Nodes connect to a central communications device (switch) A node sends a signal to the switch, which retransmits it to the other nodesA node sends a signal to the switch, which retransmits it to the other nodes A node accepts only signal addressed to itA node accepts only signal addressed to it
17
© 2008 Prentice-Hall, Inc. 17 Avoiding Data Collisions on an Ethernet Network
18
© 2008 Prentice-Hall, Inc. 18 Transmission Media The routes data takes to flow between devices on a networkThe routes data takes to flow between devices on a network WiredWired WirelessWireless –Wireless Fidelity (Wi-Fi) –Uses radio waves –802.11 standard
19
© 2008 Prentice-Hall, Inc. 19 Choosing a Cable Maximum run lengthMaximum run length BandwidthBandwidth Bend radiusBend radius Cable costCable cost Installation costs Susceptibility to interference Signal transmission methods Comparison of Characteristics of Major Cable Types Cable Characteristics Twisted Pair (Cat 6)Coaxial (ThinNet)Coaxial (ThickNet)Fiber-Optic Maximum Run Length 328 feet (100 m)607 feet (185 m)1,640 feet (500m)Up to 62 miles (100 km) Bandwidth 1,000 Mbps10 Mbps 100 Mbps to 2 Gbps Bend Radius (Flexibility) No limit360 degrees/foot30 degrees/foot Cable Cost Very lowLowModerateHigh Installation Cost Very lowLowSlightly higher than ThinNet Most expensive because of Installation training required Susceptibility to Interference HighLowVery lowNone (not susceptible to EMI and RFI)
20
© 2008 Prentice-Hall, Inc. 20 Twisted Pair Cable Pairs of copper wire twisted around each otherPairs of copper wire twisted around each other Twists make the wires less susceptible to interferenceTwists make the wires less susceptible to interference Shielded twisted pair (STP)Shielded twisted pair (STP) –Layer of foil shielding Unshielded twisted pair (UTP)Unshielded twisted pair (UTP) –Cat 5E: Bandwidth 200 Mbps –Cat 6: Bandwidth 1 Gbps –No foil layer UTP STP
21
© 2008 Prentice-Hall, Inc. 21 Coaxial Cable Four componentsFour components –Copper core –Nonconductive insulating material –Braided metal –Plastic cover
22
© 2008 Prentice-Hall, Inc. 22 Fiber-Optic Cable Components includeComponents include –Glass or plastic fibers –Cladding –Outer jacket Uses light impulses to transmit dataUses light impulses to transmit data Immune to interferenceImmune to interference
23
© 2008 Prentice-Hall, Inc. 23 Wireless Media 802.11 Standard Wi-Fi, short for Wireless FidelityWi-Fi, short for Wireless Fidelity –802.11b – –802.11b – first cost-effective wireless devices. –802.11a, 802.11g – bandwidth increased to 54 Mbps –Super G – bandwidth to 108 Mbps –802.11n – –802.11n – will support higher throughput and greatly increased range
24
© 2008 Prentice-Hall, Inc. 24 Network Operating Systems (NOS) Provide the protocol that controls the communication between devices on the networkProvide the protocol that controls the communication between devices on the network Major network operating systemsMajor network operating systems –Windows Server 2003 –UNIX –Novell NetWare
25
© 2008 Prentice-Hall, Inc. 25 Network Adapters Devices that enable computers to communicate on a networkDevices that enable computers to communicate on a network Network interface cards (NICs)Network interface cards (NICs) Three functionsThree functions –Generate network transmission signals –Create data packets –Act as information gatekeepers Ethernet compliantEthernet compliant Wireless NICsWireless NICs
26
© 2008 Prentice-Hall, Inc. 26 Network Navigation Devices Media Access Control (MAC) addressMedia Access Control (MAC) address –Six two-digit numbers (01:40:87:44:79:A5) –Physical address of network adapter –Internal network identification Repeaters and HubsRepeaters and Hubs –Amplify signals and retransmit them
27
© 2008 Prentice-Hall, Inc. 27 Network Navigation Devices Switches and BridgesSwitches and Bridges –Send data on a specific route through the network –Bridges send data between collision domains RoutersRouters –Send information between two networks
28
© 2008 Prentice-Hall, Inc. 28 Network Security Threats Human Errors and MistakesHuman Errors and Mistakes –Accidents and mistakes Malicious Human ActivityMalicious Human Activity –Current and former employees hacking or planting viruses Natural Events and DisastersNatural Events and Disasters –Hurricanes, floods, fire
29
© 2008 Prentice-Hall, Inc. 29 Network Security AuthenticationAuthentication –User ID and password used to access the network –Use of a possessed object for access Access privilegesAccess privileges –Enable access to certain network systems Physical protection measuresPhysical protection measures –Restrict physical access to sensitive network equipment –Magnetic card readers –Biometric access devices
30
© 2008 Prentice-Hall, Inc. 30 Network Security FirewallsFirewalls –Prevent access to the network by unauthorized users –Composed of software and/or hardware –Screen and validate data packets –Bastion host/proxy server
31
© 2008 Prentice-Hall, Inc. 31 Network Firewall Layout
32
© 2008 Prentice-Hall, Inc. 32 Chapter 12 Summary Questions What are the advantages of a business network?What are the advantages of a business network?
33
© 2008 Prentice-Hall, Inc. 33 Chapter 12 Summary Questions How does a client/server network differ from a peer-to-peer network?How does a client/server network differ from a peer-to-peer network?
34
© 2008 Prentice-Hall, Inc. 34 Chapter 12 Summary Questions What are the different classifications of client/server networks?What are the different classifications of client/server networks?
35
© 2008 Prentice-Hall, Inc. 35 Chapter 12 Summary Questions What components are needed to construct a client/server network?What components are needed to construct a client/server network?
36
© 2008 Prentice-Hall, Inc. 36 Chapter 12 Summary Questions What do the various types of servers do?What do the various types of servers do?
37
© 2008 Prentice-Hall, Inc. 37 Chapter 12 Summary Questions What are the various network topologies?What are the various network topologies?
38
© 2008 Prentice-Hall, Inc. 38 Chapter 12 Summary Questions What types of transmission media are used in client/server networks?What types of transmission media are used in client/server networks?
39
© 2008 Prentice-Hall, Inc. 39 Chapter 12 Summary Questions What software needs to be running on computers attached to a client/server network?What software needs to be running on computers attached to a client/server network?
40
© 2008 Prentice-Hall, Inc. 40 Chapter 12 Summary Questions How do network adapters enable computers to participate in a client/server network?How do network adapters enable computers to participate in a client/server network?
41
© 2008 Prentice-Hall, Inc. 41 Chapter 12 Summary Questions What devices assist in moving data around a client/server network?What devices assist in moving data around a client/server network?
42
© 2008 Prentice-Hall, Inc. 42 Chapter 12 Summary Questions What measures are employed to keep large networks secure?What measures are employed to keep large networks secure?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.