Introduction To Networking
-
Upload
tsmithnasd -
Category
Technology
-
view
454 -
download
2
Transcript of Introduction To Networking
![Page 1: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/1.jpg)
Introduction to Networking
Why use networks?Physical network structureNetwork ServersNetwork ClientsNetwork Operating SystemsLANs and WANs
![Page 2: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/2.jpg)
What Is A Network?
![Page 3: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/3.jpg)
Why Use Networks?Sharing…
DataSoftwarePrintersProcessing powerAccess to the Internet
Controlling…SecurityAdministration
![Page 4: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/4.jpg)
The Network Server
Printing
Data
Software
Access to the Internet
![Page 5: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/5.jpg)
The Network Client
Uses Resources
Write file to drive C:
Write file to drive X:
![Page 6: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/6.jpg)
Peer-To-Peer Networks
Using
Using
Using
Using
Sharing
Sharing Sharing
![Page 7: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/7.jpg)
Limitations
300 ft. effective range from access point1400 ft maximum range
Structural interferenceInterference from other devices such as
cordless phones.
![Page 8: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/8.jpg)
Client/Server Networks
Using
Sharing
Using Using
![Page 9: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/9.jpg)
Network Operating Systems
Several productsMicrosoft Windows NT/2000/2003Novell NetwareBanyan Vines etc
All run on the server and share resourcesHard disk spacePrinters etc
![Page 10: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/10.jpg)
Directory Services
Centralized control of all network resourcesMicrosoft Windows 2000
Active DirectoryNovell Netware
Network Directory Services (NDS)Banyan Vines
![Page 11: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/11.jpg)
Network Interface Card
Physical interface for the PC to the cable
Can be add-on adapter PCMCIA/Cardbus ISA/EISA PCI
Often built into motherboard Has a unique physical address
(MAC Address)
![Page 12: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/12.jpg)
Network Cables
CoaxialThin and Thick Ethernet (10Base2,
10Base5) – used to transmit videoUnshielded Twisted Pair (UTP)
10baseT, 100baseT (most commonShielded Twisted Pair (STP)Fiber-optic
![Page 13: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/13.jpg)
Local Area Networks (LANs)
![Page 14: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/14.jpg)
Wide Area Networks (WANs)
![Page 15: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/15.jpg)
Cable-Less (i.e. Wireless) Connections
Narrow band radio transmission (RF)Subject to interferenceSecurity issues
Infra-red transmission (IR) Line of sight requiredOther light sources can interfereEx. Palm beaming/CPS “clickers”
![Page 16: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/16.jpg)
Standards
IEEE 802.11.b –2.4GHz – 11MbpsIEEE 802.11.a – 5GHz – 54 MbpsIEEE 802.11g – 2.4Ghz – Hybrid
11/54Mbps (most common)New! IEEE 802.11n – up to 100
Mbps
![Page 17: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/17.jpg)
Security Overview
WEP - Wired Equivalent Privacy 40 bit vs. 128 bit
Is Encryption Necessary?
Open access vs. Secured
Other Security MeasuresContent Filtering
Network Partitioning
![Page 18: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/18.jpg)
Applications
Any application currently used on a traditional wired network can be used on a wireless network.
New applications may be available or can be developed to take advantage of wireless, such as Wireless PDA access to a card catalog.
![Page 19: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/19.jpg)
Wireless Network Components
Access Points NICs – Network Interface Cards
PCMCIA USB PCI CompactFlash
Other Wireless Devices Bridges and Routers Print Servers
PCs, Laptops, PDAs, even Projectors
![Page 20: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/20.jpg)
Security (Encryption, Content Filtering, Privacy, etc.)
Content Filtering & Proxy ServersWeb content filtering that has generally been
software on the desktop would have to be handled by a server if people are allowed to use their own laptops. Note: This is required by CIPA for all government organizations, including schools.
Proxy servers allow you to control what information people have access to. This is a good practice anyway, allowing you to control at a global level what information travels over your network. It also allows you to track usage.
![Page 21: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/21.jpg)
Security (Encryption, Content Filtering, Privacy, etc.)
Viruses and HackerWireless does not add any additional threat
in the way of viruses. Anyone, anywhere can attack a network
that is connected to the Internet. Wireless does not increase that chance. Security measures such as firewalls, can reduce the risk.
![Page 22: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/22.jpg)
Why Deploy Wireless?
Cost savings over wireline.Can not run wire to locations needed.To enable patrons to bring their own
laptop, therefore reducing the cost of owning many PCs.
To enable you to easily move PCs.To be on the leading edge.
![Page 23: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/23.jpg)
Cost
802.11b Wireless Access Points start around $100.00 for basic connectivity and run up to $500.00 for more management features.
802.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB, PCI (desktop), PCMCIA (laptop) and CompactFlash versions.
![Page 24: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/24.jpg)
Bluetooth – 802.15
Bluetooth is the standard for wireless personal area networks or WPAN. It allows high speed transmission of data over very short distances.
Bluetooth is normally used for transferring data between laptops or devices, or in Internet Kiosk type applications where roaming is not needed.
![Page 25: Introduction To Networking](https://reader036.fdocuments.us/reader036/viewer/2022062514/557e28c7d8b42ad0098b49f3/html5/thumbnails/25.jpg)
Networking Technology Review
Why use networks?Physical network structureNetwork ServersNetwork ClientsNetwork Operating SystemsLANs and WANs