© 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 12 Behind the Scenes: Networking and...

43
1 © 2009 Prentice-Hall, Inc. 1

Transcript of © 2009 Prentice-Hall, Inc. 11. 2 Technology in Action Chapter 12 Behind the Scenes: Networking and...

1© 2009 Prentice-Hall, Inc. 1

2© 2009 Prentice-Hall, Inc.

Technology in ActionTechnology in Action

Chapter 12Chapter 12

Behind the Scenes: Behind the Scenes: Networking and SecurityNetworking and Security

3© 2009 Prentice-Hall, Inc.

Chapter TopicsChapter Topics

• Advantages of business networksAdvantages of business networks

• Client/server vs. peer-to-peer networksClient/server vs. peer-to-peer networks

• Classifications of client/server networksClassifications of client/server networks

• Client/server network componentsClient/server network components

• Types of serversTypes of servers

• Network topologiesNetwork topologies

4© 2009 Prentice-Hall, Inc.

Chapter Topics (cont.)Chapter Topics (cont.)

• Types of transmission mediaTypes of transmission media

• Network softwareNetwork software

• Network adaptersNetwork adapters

• Moving data in a client/server networkMoving data in a client/server network

• Securing networksSecuring networks

5© 2009 Prentice-Hall, Inc.

Networking AdvantagesNetworking Advantages

• NetworksNetworks– Increase productivityIncrease productivity– Enable the sharing of hardware resourcesEnable the sharing of hardware resources– Facilitate knowledge sharingFacilitate knowledge sharing– Enable the sharing of softwareEnable the sharing of software– Facilitate Internet connectivityFacilitate Internet connectivity– Enable enhanced communicationEnable enhanced communication

6© 2009 Prentice-Hall, Inc.

Client/Server NetworksClient/Server Networks

• Server-based networkServer-based network– Clients and serversClients and servers

• Data flows efficiently Data flows efficiently • Servers respond to Servers respond to

requests from clientsrequests from clients• Servers perform Servers perform

specific tasksspecific tasks• ScalableScalable• CentralizedCentralized

7© 2009 Prentice-Hall, Inc.

Classifications of Classifications of Client/Server NetworksClient/Server Networks

• LANLAN– Local area Local area

networknetwork– Computers Computers

linked over linked over a small a small geographic geographic regionregion

8© 2009 Prentice-Hall, Inc.

Classifications of Classifications of Client/Server NetworksClient/Server Networks

• WANWAN– Wide area Wide area

networknetwork– Computers Computers

linked over large linked over large geographic geographic locationslocations

• MANMAN– Metropolitan Metropolitan

area networkarea network– Computers Computers

linked within a linked within a city or countycity or county

9© 2009 Prentice-Hall, Inc.

Classifications of Classifications of Client/Server NetworksClient/Server Networks

• PANPAN– Personal area networkPersonal area network– Wireless devices connected in close proximity Wireless devices connected in close proximity

to each otherto each other

• IntranetIntranet– Private corporate networkPrivate corporate network– Protected by a firewallProtected by a firewall

10© 2009 Prentice-Hall, Inc.

Constructing Constructing Client/Server NetworksClient/Server Networks

• ServersServers• Network Network

topologiestopologies• Transmission Transmission

mediamedia• Network operating Network operating

system softwaresystem software• Network adaptersNetwork adapters• Network Network

navigation devicesnavigation devices

11© 2009 Prentice-Hall, Inc.

Servers Servers

• Number and type of servers depend on network Number and type of servers depend on network size and workloadsize and workload

• Dedicated serversDedicated servers– Perform one specific functionPerform one specific function

• Authentication serversAuthentication servers– Keep track of network logins and services availableKeep track of network logins and services available

• File serversFile servers– Store and manage filesStore and manage files

12© 2009 Prentice-Hall, Inc.

ServersServers

• Print serversPrint servers– Manage client-requested printing jobsManage client-requested printing jobs– Create print queue (prioritize print jobs)Create print queue (prioritize print jobs)

• Applications serversApplications servers– Act as a storage area for application softwareAct as a storage area for application software

• Database serversDatabase servers– Provide clients with access to database informationProvide clients with access to database information

• E-mail serversE-mail servers– Process and deliver incoming and outgoing Process and deliver incoming and outgoing

e-maile-mail

13© 2009 Prentice-Hall, Inc.

ServersServers

• Communications serversCommunications servers– Handle communications between networks Handle communications between networks

including the Internetincluding the Internet– Often the only device on the network directly Often the only device on the network directly

connected to the Internetconnected to the Internet

• Web serversWeb servers– Host a Web site available through Host a Web site available through

the Internetthe Internet

14© 2009 Prentice-Hall, Inc.

Network TopologiesNetwork Topologies

• The physical layout of computers, The physical layout of computers, transmission media, and other transmission media, and other componentscomponents

• Types of network topologiesTypes of network topologies– Bus topologyBus topology– Ring topologyRing topology– Star topologyStar topology– Hybrid topologyHybrid topology

15© 2009 Prentice-Hall, Inc.

Bus TopologyBus Topology• All nodes are connected in All nodes are connected in

sequence on a single cablesequence on a single cable• Used most often on Used most often on

peer-to-peer networkspeer-to-peer networks• Networked computers Networked computers

communicate with each communicate with each otherother

• One computer transmits One computer transmits data at a timedata at a time– Access methods avoid data Access methods avoid data

collisionscollisions– Data is transmitted in Data is transmitted in

“packets”“packets”

16© 2009 Prentice-Hall, Inc.

Ring TopologyRing Topology• Nodes are laid out in Nodes are laid out in

a ringa ring• Token (data packet) Token (data packet)

flows in one flows in one direction from direction from device to devicedevice to device

• Recent versions Recent versions have data transfer have data transfer rates up to 100 rates up to 100 MbpsMbps

17© 2009 Prentice-Hall, Inc.

Star TopologyStar Topology

• Nodes connect to a central Nodes connect to a central communications device communications device (switch)(switch)

• A node sends a signal to A node sends a signal to the switch, which the switch, which retransmits it to the retransmits it to the other nodesother nodes

• A node accepts only A node accepts only signals addressed to itsignals addressed to it

18© 2009 Prentice-Hall, Inc.

Avoiding Data CollisionsAvoiding Data Collisions on an Ethernet Network on an Ethernet Network

19© 2009 Prentice-Hall, Inc.

Transmission MediaTransmission Media

• The routes data takes to flow between The routes data takes to flow between devices on a networkdevices on a network

• Wired Wired

• WirelessWireless

20© 2009 Prentice-Hall, Inc.

Choosing a CableChoosing a Cable

• Maximum run lengthMaximum run length• Bandwidth Bandwidth • Bend radiusBend radius• Cable costCable cost• Cable and installation costsCable and installation costs• Susceptibility to interferenceSusceptibility to interference• Signal transmission methodsSignal transmission methods

21© 2009 Prentice-Hall, Inc.

Twisted Pair CableTwisted Pair Cable

• Pairs of copper wire twisted Pairs of copper wire twisted around each otheraround each other

• Twists make the wires less Twists make the wires less susceptible to interferencesusceptible to interference

• Shielded twisted pair (STP)Shielded twisted pair (STP)– Layer of foil shieldingLayer of foil shielding

• Unshielded twisted pair (UTP)Unshielded twisted pair (UTP)– Cat 5E: Bandwidth 200 MbpsCat 5E: Bandwidth 200 Mbps– Cat 6: Bandwidth 1 GbpsCat 6: Bandwidth 1 Gbps– No foil layerNo foil layer

STP

22© 2009 Prentice-Hall, Inc.

Coaxial CableCoaxial Cable

• Four componentsFour components– Copper coreCopper core– Nonconductive insulating materialNonconductive insulating material– Braided metalBraided metal– Plastic coverPlastic cover

23© 2009 Prentice-Hall, Inc.

Fiber-Optic CableFiber-Optic Cable

• Components includeComponents include– Glass or plastic fibersGlass or plastic fibers– CladdingCladding– Outer jacketOuter jacket

• Uses light impulses Uses light impulses to transmit datato transmit data

• Immune to Immune to interferenceinterference

24© 2009 Prentice-Hall, Inc.

Wireless MediaWireless Media802.11 Standard802.11 Standard

• Wi-Fi, short for Wireless FidelityWi-Fi, short for Wireless Fidelity– 802.11b802.11b– 802.11a802.11a– 802.11g802.11g– Super GSuper G– 802.11n802.11n

25© 2009 Prentice-Hall, Inc.

Network Operating Systems (NOS)Network Operating Systems (NOS)

• Provide the protocol that controls the Provide the protocol that controls the communication between devices on the networkcommunication between devices on the network

• Many modern OSs include NOS client software Many modern OSs include NOS client software • Major network operating systemsMajor network operating systems

– Windows Server 2003Windows Server 2003– UNIXUNIX– Novell NetWareNovell NetWare

26© 2009 Prentice-Hall, Inc.

Network AdaptersNetwork Adapters• Devices that enable computers to Devices that enable computers to

communicate on a networkcommunicate on a network• Network interface cards (NICs)Network interface cards (NICs)• Three functionsThree functions

– Generate network transmission Generate network transmission signalssignals

– Create data packetsCreate data packets– Act as information gatekeepersAct as information gatekeepers

• Ethernet compliantEthernet compliant• Wireless NICsWireless NICs

27© 2009 Prentice-Hall, Inc.

Network Navigation DevicesNetwork Navigation Devices

• Media Access Control Media Access Control (MAC) address(MAC) address– Six two-digit numbers Six two-digit numbers

(01:40:87:44:79:A5)(01:40:87:44:79:A5)– Physical address of Physical address of

network adapternetwork adapter– Internal network Internal network

identificationidentification

• Repeaters and HubsRepeaters and Hubs– Amplify signals and Amplify signals and

retransmit themretransmit them

28© 2009 Prentice-Hall, Inc.

Network Navigation DevicesNetwork Navigation Devices

• Switches and Switches and BridgesBridges– Send data on a Send data on a

specific route specific route through the networkthrough the network

– Bridges send data Bridges send data between collision between collision domainsdomains

• RoutersRouters– Send information Send information

between two between two networksnetworks

29© 2009 Prentice-Hall, Inc.

Network Security ThreatsNetwork Security Threats

• Human errors and mistakesHuman errors and mistakes– Accidents and mistakesAccidents and mistakes

• Malicious human activityMalicious human activity– Current and former employees hacking or Current and former employees hacking or

planting virusesplanting viruses

• Natural events and disastersNatural events and disasters– Hurricanes, floods, fireHurricanes, floods, fire

30© 2009 Prentice-Hall, Inc.

Network SecurityNetwork Security

• AuthenticationAuthentication– User ID and password used to access the networkUser ID and password used to access the network– Use of a possessed object for accessUse of a possessed object for access

• Access privilegesAccess privileges– Enable access to certain network systemsEnable access to certain network systems

• Physical protection measuresPhysical protection measures– Restrict physical access to sensitive network Restrict physical access to sensitive network

equipmentequipment– Magnetic card readersMagnetic card readers– Biometric access devicesBiometric access devices

31© 2009 Prentice-Hall, Inc.

Network SecurityNetwork Security

• FirewallsFirewalls– Prevent access to the network by Prevent access to the network by

unauthorized usersunauthorized users– Composed of software and/or hardwareComposed of software and/or hardware– Screen and validate data packetsScreen and validate data packets– Bastion host/proxy serverBastion host/proxy server

32© 2009 Prentice-Hall, Inc.

Network Firewall LayoutNetwork Firewall Layout

33© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What are the advantages of a business What are the advantages of a business network?network?

34© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• How does a client/server network differ How does a client/server network differ from a peer-to-peer network?from a peer-to-peer network?

35© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What are the different classifications of What are the different classifications of client/server networks?client/server networks?

36© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What components are needed to construct What components are needed to construct a client/server network?a client/server network?

37© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What do the various types of servers do?What do the various types of servers do?

38© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What are the various network topologies What are the various network topologies (layouts), and why is network topology (layouts), and why is network topology important in planning a network?important in planning a network?

39© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What types of transmission media are What types of transmission media are used in client/server networks?used in client/server networks?

40© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What software needs to be running on What software needs to be running on computers attached to a client/server computers attached to a client/server networknetwork, and how does this software , and how does this software control network communicationscontrol network communications??

41© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• How do network adapters enable How do network adapters enable computers to participate in a client/server computers to participate in a client/server network?network?

42© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What devices assist in moving data What devices assist in moving data around a client/server network?around a client/server network?

43© 2009 Prentice-Hall, Inc.

Chapter 12 Summary QuestionsChapter 12 Summary Questions

• What measures are employed to keep What measures are employed to keep large networks secure?large networks secure?