Download presentation
Presentation is loading. Please wait.
Published byCameron Cox Modified over 9 years ago
1
W-220 Networking
2
February 10, 2003Riad S. Twal2 Why create a network Share limited resources Share limited resources Files Printers Scanner Communication Communication Internet / Intranet Email WWW FTP
3
February 10, 2003Riad S. Twal3 Types of networks Peer to Peer (P2P) Peer to Peer (P2P) No centralized control High level of management for security Client / Server Client / Server Centralized control Security easily managed
4
February 10, 2003Riad S. Twal4 Practical concerns Cable routing Cable routing Server location Server location Network switch location Network switch location Future expansion Future expansion
5
February 10, 2003Riad S. Twal5 How PC’s are organized… Client Client Microsoft Netware Service Service File and Printer Sharing for Microsoft Networking QoS Packet Scheduler SAP Agent Protocol Protocol TCP/IP AppleTalk NetBEUI NWLink IPX/SPX
6
February 10, 2003Riad S. Twal6 How PC’s are organized… Client log on Client log on Directly to the machine Common with WinNT, Win2000, WinXP Usually for administrative access to the ‘box’ Can be used for multiple users on one ‘box’ Account on the ‘box’ (local machine) Network log on Network log on Network account, log on to the network Common with WinNT, Win2000, WinXP Used for ‘user’ access to the ‘box’ and the network Account on the network (on the main server)
7
February 10, 2003Riad S. Twal7 Protocols TCP/IP TCP/IP - TCP and IP were developed by a Department of Defense (DOD) research project to connect a number different networks designed by different vendors into a network of networks (the "Internet") http://www.yale.edu/pclt/COMM/TCPIP.HTM http://www.yale.edu/pclt/COMM/TCPIP.HTM AppleTalk AppleTalk – protocol suite to implement file transfer, printer sharing, and mail service among Apple systems using the LocalTalk interface built into Apple hardware http://www.protocols.com/pbook/appletalk.htm http://www.protocols.com/pbook/appletalk.htm IPX/SPX IPX/SPX - Internetwork Packet Exchange / Sequenced Packet Exchange, created for use with the Novell NetWare network operating system http://www.protocols.com/pbook/novel.htm http://www.protocols.com/pbook/novel.htm
8
February 10, 2003Riad S. Twal8 Resources… Protocol Directory - http://www.protocols.com/protoc.shtml http://www.protocols.com/protoc.shtml Computer Networking http://compnetworking.about.com/cs/basicnet working/ http://compnetworking.about.com/cs/basicnet working/
9
Network Security
10
February 10, 2003Riad S. Twal10 Computer Security: Process of preventing and detecting unauthorized use of your computer Process of preventing and detecting unauthorized use of your computer Prevention measures help stop unauthorized users (aka "intruders") from accessing your computer system Detection measures helps determine whether or not: attempted to break into your system if they were successful what they may have done.
11
February 10, 2003Riad S. Twal11 Why should I care? Banking / investing e-Mail Class Rosters Class Gradebook Faculty memo’s
12
February 10, 2003Riad S. Twal12 Why my computer? Random intruders Random intruders Hackers looking for a system from which to launch an attack on another system Direct Intruders Direct Intruders Someone looking for private information that you have Credit card info Banking info Gradebooks Faculty / staff / school district memo’s (not intended for student viewing) Lesson plan files / course delivery material
13
February 10, 2003Riad S. Twal13 How easy is it to break into my computer? “Holes” in any security system are unavoidable (at least when humans are at the controls) OS and Applications both have ‘Holes’ in security “Patches” for OS and Applications are constantly being developed They are available via the Windows Update website, or from the software manufacturers website (ie. Adobe, Macromedia,…) ‘Patches’ do no good if they are not installed and updated.
14
February 10, 2003Riad S. Twal14 Internet Technology Broadband Cable Modem DSL Narowband Analog dialup modem
15
February 10, 2003Riad S. Twal15 What does broadband mean? "Broadband" is the general term used to refer to high-speed network connections. DSL (Digital Subscriber Line) Cable Modem Ethernet connection Generally anything over 1Mbps
16
February 10, 2003Riad S. Twal16 What is DSL? Digital Subscriber Line (DSL) Dedicated bandwidth between your location and the Internet Service Provider (ISP) No guarantee of bandwidth from provider to the rest of the Internet
17
February 10, 2003Riad S. Twal17 What is cable modem? A cable modem allows a single computer (or network of computers) to connect to the Internet via the cable TV network. The cable modem usually has an Ethernet LAN connection to the computer, and is capable of speeds in excess of 5 Mbps Typical speeds tend to be lower than the maximum entire neighborhoods are turned into LANs which share the same bandwidth shared-medium topology means that cable modem users may experience somewhat slower network access during periods of peak demand
18
February 10, 2003Riad S. Twal18 Broadband vs. dial-up service Dial-up Internet services Dial-up Internet services "dial-on-demand" service your computer only connects to the Internet when it has something to send, such as email or a request to load a web page. Once there is no more data to be sent, or after a certain amount of idle time, the computer disconnects the call modem IP addresses are dynamically assigned, your computer is usually assigned a different IP address on each call. Broadband services Broadband services "always-on" services There is no call setup when your computer has something to send. The computer is always on the network, ready to send or receive data through its network interface card (NIC). Since the connection is always up, your computer’s IP address will change less frequently (if at all), thus making it more of a fixed target for attack
19
February 10, 2003Riad S. Twal19 How do I secure my computer? When not in use, TURN IT OFF!!! Someone walking by would have to turn it on before anything could be done Secure the location Best physical security is behind a dead-bolt Secure the Network Connection If you are not utilizing network resources, don’t be on the network
20
February 10, 2003Riad S. Twal20 How do I secure my computer? Secure the Network Connection If you are utilizing network resources, don’t share unnecessary files Sharing the “My Documents” folder automatically shares all sub-folders as well… Use a Firewall to ‘hide’ your computer Software Hardware
21
February 10, 2003Riad S. Twal21 Practical implications… We are living in the information age. Information has power (like money use to have), and others will want to have access to that power. While cooperation and sharing is necessary, it is not necessary to share all information with everyone.
22
February 10, 2003Riad S. Twal22 Resources… NETg@IU Tutorials – Networking Tech. Network Security http://www.indiana.edu/~netg/ CERT/CC – Carnegie Mellon University http://www.cert.org/tech_tips/home_networks.html Internet Security Alliance http://www.isalliance.org/
23
Network Control Panel
24
February 10, 2003Riad S. Twal24 Controls to look for… Machine identification Network identification NIC configuration TCP/IP properties DNS properties File Sharing access
25
February 10, 2003Riad S. Twal25 Where are the control panels … Windows 98 Windows 98 Start, Settings, Control Panel, Network Control PanelOr Right click on Network Neighborhood, Properties Windows 2000 Windows 2000 Start, Settings, Network and Dial-up Connections, New ConnectionsOr Right click on My Network Places, Properties Right click on My Computer, Properties for Network ID
26
February 10, 2003Riad S. Twal26 Windows 98… Clients, Adapters, and Protocols have their own icons Primary Network Logon: Client for Network Machine Sharing
27
February 10, 2003Riad S. Twal27 Windows 98… Computer name – machine name on the network Workgroup – where the machine operates Computer description – unique computer description, allows others to determine what might be shared by the machine
28
February 10, 2003Riad S. Twal28 Windows 98… Shared level access High user maintenance Individual passwords given to each share User level access Users granted access based upon participation in the network (users picked from a network list)
29
February 10, 2003Riad S. Twal29 Windows 98… Properties for Client for Microsoft Network Determine which domain to log on to
30
February 10, 2003Riad S. Twal30 Windows 98… Properties for Ethernet Adapter Advanced properties
31
February 10, 2003Riad S. Twal31 Windows 98… Properties for TCP/IP settings DHCP vs. Static IP DNS WINS
32
February 10, 2003Riad S. Twal32 Windows 2000… Clients, Services, and Protocols have their own icons NIC configuration Sharing
33
February 10, 2003Riad S. Twal33 Windows 2000… NIC Advanced Properties Device drivers…
34
February 10, 2003Riad S. Twal34 Windows 2000… TCP/IP Properties This has been streamlined from the Win98 interface Advanced tab ‘hides’ controls that were overwhelming in Win98
35
February 10, 2003Riad S. Twal35 Windows 2000… IP, DNS, WINS, and Advanced Options Win98 has these controls plus TCP/IP Bindings and other low level controls in one window (7 options in total)
36
February 10, 2003Riad S. Twal36 Windows 2000 The name of the computer is within the System Properties of Windows 2000. Windows 98 has the computer name within the network control panel.
37
February 10, 2003Riad S. Twal37 Windows 2000 Computer name must be unique on the network Workgroup A workgroup is a logical collection of computers that share resources Domain Same as workgroup; however there is one single server responsible for managing security
38
February 10, 2003Riad S. Twal38 Windows XP Network Control Panel
39
February 10, 2003Riad S. Twal39 Windows XP LAN Properties
40
February 10, 2003Riad S. Twal40 Windows XP TCP / IP Properties
41
February 10, 2003Riad S. Twal41 Windows XP Computer Name Defined within System Properties Right click on ‘my computer’ Or Control Panel, system properties
42
February 10, 2003Riad S. Twal42 Useful DOS Commands… winipcfg Windows 98winipcfg ipconfig Windows 2000ipconfig ipconfig Windows XPipconfigipconfig/all
43
February 10, 2003Riad S. Twal43 Windows 2000… ipconfig ipconfig
44
February 10, 2003Riad S. Twal44 Windows 2000… Ipconfig/all Ipconfig/all
45
February 10, 2003Riad S. Twal45 Windows 2000… Ipconfig – IUB VPN Ipconfig – IUB VPN
46
February 10, 2003Riad S. Twal46 Windows XP Ipconfig Ipconfig
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.