extended learning module e network basics
DESCRIPTION
Extended Learning Module E NETWORK BASICS. STUDENT LEARNING OUTCOMES. Identify and describe the four basic concepts on which networks are built and describe what is needed to set up a small peer-to-peer network at home. - PowerPoint PPT PresentationTRANSCRIPT
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved.
Extended Learning Module EExtended Learning Module E NETWORK BASICS
E-2
STUDENT LEARNING OUTCOMES
1. Identify and describe the four basic concepts on which networks are built and describe what is needed to set up a small peer-to-peer network at home.
2. Describe the components used to build large business networks and define and compare local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs).
E-3
STUDENT LEARNING OUTCOMES
3. Compare and contrast the various Internet connection possibilities.
4. Compare and contrast the types of communications media.
E-4
STUDENT LEARNING OUTCOMES
5. State the four principles of computer security and describe how different network security devices reflect those principles.
6. Describe client/server business networks from a business and physical point of view.
E-5
INTRODUCTION
Computer network – two or more computers connected so that they can communicate with each other and share information, software, peripheral devices, and/or processing power
E-6
INTRODUCTION
E-7
Basic Principles of Networks
Four main principles1. Each computer must have a network interface to
provide a doorway for information2. The network usually has at least one connecting
device3. The network must have communications media to
transport information
E-8
Basic Principles of Networks
4. Each computer must have software to move information in and out of the computer
These four principles apply to all networks, large and small
E-9
HOME NETWORKS
A typical home network setup has1. An Ethernet network card in each computer or a
wireless card in each laptop2. Network cables to transmit signals, or no cables for
wireless3. A DSL or cable modem connection and a
broadband/home router
E-10
Network Cards
Network interface card (NIC) – an expansion card or PC card that connects your computer to a networkEthernet card – the most common type of network
interface cardBuilt into the motherboards of many new computers –
looks like a telephone jack, but wider
E-11
Wired Transmission Media
Cat 5 (Category 5) cable – better-constructed version of phone twisted-pair cable
E-12
Wireless Transmission Media
Wireless Access Point (WAP) – device that allows a computer to use radio waves to access a network
Connects to hub or switch with a cable like a wired computer
May be built into broadband router and not require separate cabling
E-13
Home Internet Service
Broadband router or home router – a device to connect computers together to share DSL or cable Internet service in a home or small officeOne port to plug into DSL or cable connection to
connect to the InternetUsually several ports to build a network for home
computers or printers and share Internet connection
E-14
Network Software
Makes each computer's hardware workCan use WindowsTurn on filesharing to make files available to other
computers on the network
E-15
NETWORK COMPONENTS
Hub – a device that connects computers into a network and repeats all transmissions to every connected computerOnly one computer can transmit at a timeAll computers see every messageCan have collisions when two computers try to
transmit at the same time
E-16
NETWORK COMPONENTS
Switch – a device that connects computers and repeats transmissions only to intended recipientMultiple conversations can occur simultaneously
between different sets of computersOnly recipient computer sees each messageComputers can still broadcast messages to all other
computers on the network
E-17
NETWORK COMPONENTS
Router – a device that connects subnetworks (subnets) of a larger networkCan connect different buildings at same or different
locationsPasses transmissions from one network to anotherMay pass through multiple routers on the way from
source to destination
E-18
NETWORK COMPONENTS
More on routersHome/broadband routers often have built-in switches
or hubsCorporate routers generally require separate switches
or hubsRouters must be configured with information about the
networks they connect
E-19
NETWORKS BY DISTANCE
Large networks can be classified by the proximity of the area(s) they serve:Local Area Network (LAN) – network that serves a
building or buildings in a contiguous area
E-20
NETWORKS BY DISTANCE
More networks by distanceWide Area Network (WAN) – a set of connected
networks serving areas not immediately contiguousMetropolitan Area Network (MAN) – a set of
connected networks within the same city or metropolitan area but not in immediate proximity to each other
E-21
THE INTERNET
A vast network of computers that connects people all over the world
Computers pass messages through routers to their ultimate destinations
Each router determines whether it has a direct path to the recipient or whether to send the message on to another router
E-22
Bandwidth
The amount of information that can be transferred in a given amount of time
Usually expressed as bits per second (bps) Higher bandwidths expressed as
kilobits per second (Kbps) – thousands of bits per second
megabits per second (Mbps) – millions of bits per second
gigabits per second (Gbps) – billions of bits per second
E-23
Internet Connection Types
Phone line and dialup modemPhone line and DSL modemCable TV line and cable modemSatellite modemDedicated high-speed business lines
E-24
Broadband Internet Connection
Broadband – high-capacity telecommunications line capable of providing high-speed Internet service
All Internet access methods on the previous slide are broadband except the dialup modem
E-25
Dialup Connection
Modem – connects a computer to a phone line to access another computer or network
Modulates outgoing signal from digital to analog formDemodulates incoming signal from analog to digital
form
E-26
Digital Subscriber Line (DSL)
Digital Subscriber Line (DSL) – high-speed Internet connection using phone lines, which allows you to use your phone for voice communications at the same time
Runs at a higher frequency than voice conversations, so not supported on some older phone lines
E-27
Cable Modem
Cable modem – uses your TV cable to deliver an Internet connection
E-28
Satellite Modem
Satellite modem – delivers Internet access from satellite dish
Satellite TV and modem may share same dish or may be separate
Connects to computer or broadband router like cable modem
E-29
T1 and DS3 Business Lines
T1 and DS3 developed by phone companies to carry many long-distance voice conversations
T1 runs up to about 1.5 MbpsDS3 runs up to about 45 MbpsCan carry both voice and network over the same
lines
E-30
Frame Relay and ATM Business Services
Frame Relay and ATM are used to connect many branch offices to the main office
Use virtual circuits to simulate having a line from every office to every other office
Virtual Circuits
E-31
Comparison of Connection Types
Telephone modem+ Inexpensive and available anywhere there's a phone
line- Slow, and ties up the line for voice calls too
DSL+ Higher-speed connection, doesn't tie up the phone
line for voice calls, and can be left on all the time- Not available in all areas or on all lines
E-32
Comparison of Connection Types
Cable modem+ Higher-speed connection, doesn't use the phone
line at all, and always-on- Connection shared with the neighborhood, so speed
may varySatellite modem
+ Available in remote locations where DSL and cable aren't
- High cost
E-33
Comparison of Connection Types
T1 and DS3+ High-speed to very-high-speed connections, can
transmit both voice and data- High cost that may be mileage-dependent
Frame relay and ATM+ Use virtual circuits to simulate more inter-office
connections than are physically present- High cost normally affordable only by mid- to large-
scale enterprises
E-34
Voice Over IP
Voice over IP – allows you to send voice communications over the Internet and avoid long-distance toll charges
No long-distance calling cost
E-35
NETWORK COMMUNICATIONS MEDIA
Communications media – the paths in a network over which information travels
Wired communications media – transmit information over a closed, connected path
Wireless communications media – transmit information through the air
E-36
Wired Communications Media
Twisted-pair cable – a bundle of copper wires for transmitting voice or data
Cat 5 and Cat 5e are common for modern networksCoaxial cable (coax) – one central wire surrounded
by insulation, a metallic shield, and a covering of insulation
E-37
Wired Communications Media
Optical fiber – uses a very thin glass or plastic fiber through which pulses of light travel
E-38
Wireless Communications Media
Infrared – uses red light to send and receive information
Bluetooth – a standard for transmitting information in the form of short-range radio waves over distances of up to 30 feet and is used for purposes such as wirelessly connecting a cell phone or PDA to a computer
Microwave – a type of radio transmissionRepeater – receives a radio signal, strengthens it, and
sends it on
E-39
Wireless Communications Media
E-40
Wireless Communications Media
Communications Satellite – microwave repeater in space
E-41
NETWORK SECURITY
The four principles of network security are:1. Confidentiality2. Authenticity3. Integrity4. Availability
E-42
NETWORK SECURITY
Confidentiality – information can be obtained only by those authorized to access itBank statements, credit reports, employee evaluationsThreatened by capture of network transmissions and
easily-guessed passwords
E-43
NETWORK SECURITY
Authenticity – information really comes from the source it claims to come fromMilitary orders, medical diagnoses, stockbroker
directionsThreatened by fraudulent e-mails and misspellings of
popular Web site names
E-44
NETWORK SECURITY
Integrity – information has not been alteredBank balance, corporate Web site, prescriptions,
credit card chargesThreatened by forged network transmissions and
faulty server software
E-45
NETWORK SECURITY
Availability – a service or resource is available when it's supposed to beMail-order Web site, corporate e-mail serverThreatened by network failures, faulty server software,
and high volumes of malicious network traffic
E-46
Firewalls & Intrusion Detection Systems
Firewall – protects a computer from intrudersIntrusion detection system (IDS) – watches for
and reports intrusion attempts Intrusion prevention system (IPS) – type of IDS
that also takes action against intrusion attempts
E-47
Encryption
Encryption – scrambles data so you can't read it without having the decryption key
Virtual Private Network (VPN) – encrypts all network transmissions between two endpoints to protect confidentiality and integrity of data
E-48
Firewalls & Intrusion Detection Systems
E-49
Malware
Malware – software designed to harm your computer or security
1. Virus – software written with malicious intent to cause annoyance or damage
2. Worm – spreads itself from computer to computer via e-mail and other network traffic
3. Spyware – collects information about you and reports it to someone else without your permission
E-50
CLIENT/SERVER SOFTWARE MODEL
Client/server network – a network in which one or more computers are servers and provide services to the other computers, called clients
E-51
Client/Server: A Business View
Client/server networks differ according to1. Where the processing for the presentation of
information occurs2. Where the processing of logic or business rules
occurs3. Where the data management component (DBMS)
and information (database) are located
E-52
Client/Server: Model 5
E-53
Five Models of Client/Server
E-54
Five Models of Client/Server
1. Distributed Presentation The server handles almost all functions, including a
major portion of the presentation2. Remote Presentation
The client handles all presentation functions 3. Distributed Logic
The server handles all data management, the client handles all presentation formatting, and the logic processing is shared
E-55
Five Models of Client/Server
4. Remote Data Management The server handles data management only, and the
client processes business rules and formats the presentation of results
5. Distributed Data Management The client handles all presentation formatting and
business rule processing, and both the server and client share data management duties