Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg

607 views
524 views

Published on

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
607
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg

  1. 1. Chapter 9 Complex Networks Networking Concepts – Eric Vanderburg ©2005
  2. 2. Multivendor Solutions  Client Based Separate redirector for each vendor  Clients ship with vendor’s redirector   Server Based Gateway Services for Macintosh  File & Print Services for Macintosh  Gateway Services for UNIX  Gateway Services for Netware (GSNW)   Internet utilities are essentially cross-platform Networking Concepts – Eric Vanderburg ©2005
  3. 3. Multivendor Solutions  File & Print Services – Taking windows shares and making them look like shares for another OS.  Gateway – Making other OS shares look like Windows shares. Networking Concepts – Eric Vanderburg ©2005
  4. 4. Macintosh  Converts file formats  Emulates a Macintosh server  LocalTalk & DOS requires AppleShare & LocalTalk adapter Networking Concepts – Eric Vanderburg ©2005
  5. 5. Netware  IPX/SPX and client software needed  Versions 5 and above use TCP/IP & require the newer Novell client (downloadable) Networking Concepts – Eric Vanderburg ©2005
  6. 6. UNIX  DOS clients need UNIX interface (Sun uses PC-NFS)  Samba  NFS – NFS volumes mounted like mapped drives (called a mount point) Networking Concepts – Eric Vanderburg ©2005
  7. 7. Concerns  Permissions  May use single account for access  Permissions may be incompatible Networking Concepts – Eric Vanderburg ©2005
  8. 8. Portables  Palm & Pocket PC  Wireless connection or cable with periodic sync  Move from WEP to WPA (WiFi Protected Access) / WPA2 Improved data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with.  User authentication, which is generally missing in WEP  Networking Concepts – Eric Vanderburg ©2005
  9. 9. Terminal Services  Massive network traffic Screens sent back and forth continuously  Keystrokes generate traffic   Cheap clients – thin clients  Expensive server (mainframe)  Increased client security  Remote Administration  Windows, Citrix  Good for mobile devices – Telxon Networking Concepts – Eric Vanderburg ©2005
  10. 10. Databases  DBMS (Database Management System)  SQL *Sequel (Structured Query Language)  Front end – client  Back end - server Networking Concepts – Eric Vanderburg ©2005
  11. 11. Requesting Data 1. 2. 3. 4. 5. 6. User requests data Client translates into SQL SQL request sent to the server Server processes the request Results sent back to client software Results presented to the user Networking Concepts – Eric Vanderburg ©2005
  12. 12. Terms  WebDAV (Web-based Distributed Authoring & Versioning)  ASP (Application Service Provider) Networking Concepts – Eric Vanderburg ©2005

×