Download presentation
Presentation is loading. Please wait.
Published byBethanie Evans Modified over 8 years ago
1
NETWORKS – DIGITAL SILK SOFTWARE DEVELOPMENT UNIT 4 – OUTCOME 2
2
NETWORKS At its simplest, a network is two or more computers that are connected so they can exchange information and share resources. Networks can be classified by: Their size (LAN, WAN, Internet) Their servers (Client-server, P2P) The rules they use to exchange data (Protocols – TCP/IP) How they are linked together (cable, wireless) Their logical shape (Bus, Star, Ring) How network messages travel (Ethernet, CSMA/CD)
3
NETWORKS Efficiency – Better, faster communication – email, videoconferencing Cost savings (email vs phone calls, physical travel), Staff savings (e.g. networked helpdesk), Equipment savings: printers, internet connections, internet cache, CD drives Effectiveness – collaborative work is easier, access to resources is broader, group calendaring
4
NETWORKS Management - control over internet & printing, staff monitoring Company image and “reach” – internet visibility makes any company international and accessible and “with it” Customer service – many more ways to help customers (e.g. FAQ, downloads, online advice, email contact)
5
NETWORKS Types of Networks Local Area Network Wide Area Network Internet Personal Area Network
6
NETWORKS Server Based Networks Client/Server model Automatically a pretty expensive choice compared to P2P File server at the heart of the network Server runs the Network Operating System (NOS) Controls access to data and equipment Runs ‘community’ programs Offers control, security, centralisation, automation
7
NETWORKS Peer to Peer Networks No server, cheap, simple, easy to run All users have equal authority and rights Little protection from each other Used at home or in small orgs with trusted users Share files, internet connection, printer Internet music sharing networks (e.g. Kazaa) are P2P - no central computer; data and software on users’ computers. P2P built into Win, Linux, Mac
8
NETWORKS Network Addressing Like telephones, every node on a network must have a unique identifier so the file server knows who is requesting information, and who is to be sent information. This unique network address is hardwired into the network card of each computer. Also, every active node of the internet needs a unique identifying address so TCP/IP knows where packets are to be sent. This is an I nternet P rotocol, or IP address.
9
NETWORKS Humans like working with names (e.g. www.microsoft.com) but computers use IP numbers (e.g. 10.77.91.19). IP address has four ‘octets’ separated by dots, each octet can be between 0 and 255. Remember - all internet communications use IP addresses, not URLs. Only humans use URLs. Domain name servers (DNS) – a distributed database on thousands of computers across the world - convert URLs into IP addresses. Like a phone book – look up a name (URL) to get a number (IP address).
10
NETWORKS Network Physical Security File server failure can severely affect network users. Server security: Locked in air-conditioned, alarmed room with barred windows, restricted keys No user access to server Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. Accessible fire fighting equipment. Locked floppy disk drives
11
NETWORKS Network Electronic Security Passwords are not strong protection – they can be guessed, forgotten or stolen. Daily backups are vital. Massive cost and effort to recover a single megabyte of lost data. Organisations need a data disaster recovery plan so they know what to do to recover from catastrophic data loss. A form of Electronic Security Makes data unreadable to unauthorised people even if a file is stolen. Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site.
12
NETWORKS Security Threats TROJAN HORSES attempting to report ‘home’ or start a DOS/DDOS attack - can be blocked by a firewall. FIREWALLS in hardware (routers) or software (e.g. Zone Alarm) check for unauthorised incoming or outgoing network traffic, e.g. port scanning, being enslaved to help with a distributed denial-of-service (DDOS) or spam attacks. VIRUSES can disclose user passwords, steal information, destroy data, install “back doors” to let hackers in, clog print queues, disrupt Internet traffic, overload email servers etc. Keep scanners up to date.
13
NETWORKS – DIGITAL SILK Internet Intranet VPN What is the difference?
14
Do all industries rely on the “net”?
15
INTERNET Worldwide network of WANs Uses TCP/IP protocol World Wide Web – only part of the internet – uses HTTP to send/receive web pages. Each device needs a unique IP address (e.g. 209.33.1.102)
16
INTERNET Other services are provided by the Internet: Usenet - a network of discussion groups File sharing networks – torrent sites, Kazaa, Limewire etc Email FTP Closed networks like Facebook, Twitter Blogs RSS feeds
17
DOMAINS Human readable URLs with domain names (e.g. microsoft.com) are not computer friendly Domain names are converted to an IP address to find the destination server. DNS (Domain Name System) does the conversion DNS = massive ‘phonebook’ with all domain names and matching IP addresses
18
WEB SERVER Computer that stores web pages making up a site. Visitors use web browsers to make requests for web pages using HTTP. Web server uses HTTP to return requested page to visitor.
19
INTRANET Local, private version of the internet Uses the Internet Protocol to securely share information within an organisation’s Local Area Network. May involve local websites, email, collaboration tools, databases that are not available to those who are not within the LAN.
20
INTRANET Can be as simple as webpages stored on a shared network drive. Uses page references to files on the file server rather than on a webserver. Simple to access with only a web browser.
21
INTRANET Intranet is protected by a network gateway and firewall to keep outsiders out. Intranet can be made safe by using privatem, local IP addresses (e.g. 192.168.1.xx or 10.1.1.x) which cannot be used by outsiders to refer to computers within the LAN.
22
INTRANET In some cases the intranet has a public face on the internet, but a password-protected login is needed to gain access. INTRANET USES Collaboration – tools (e.g. Google docs, and shared documents) Communication (email, VoIP, messaging) Resource sharing Training
23
VPN Virtual Private Network Used to provide access to a LAN or intranet to off-site people. A secure, private link using normal internet infrastructure. A VPN box creates the encrypted tunnel between the box and a same-keyed box elsewhere on the internet.
24
CORPORATE VPN Corporate VPN box can support hundreds of simultaneous encrypted remote access connections. VPN can also be done with software (e.g. in MS Server) but is slower and less robust A 200-user VPN box can cost $7,000
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.