Introduction To Networking
Upcoming SlideShare
Loading in...5
×
 

Introduction To Networking

on

  • 871 views

 

Statistics

Views

Total Views
871
Views on SlideShare
864
Embed Views
7

Actions

Likes
0
Downloads
68
Comments
0

2 Embeds 7

http://bb.desales.edu 6
http://www.slideshare.net 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Introduction To Networking Introduction To Networking Presentation Transcript

  • Introduction to Networking
    • Why use networks?
    • Physical network structure
    • Network Servers
    • Network Clients
    • Network Operating Systems
    • LANs and WANs
  • What Is A Network?
  • Why Use Networks?
    • Sharing…
      • Data
      • Software
      • Printers
      • Processing power
      • Access to the Internet
    • Controlling…
      • Security
      • Administration
  • The Network Server Printing Data Software Access to the Internet
  • The Network Client Uses Resources Write file to drive C: Write file to drive X:
  • Peer-To-Peer Networks Using Using Using Using Sharing Sharing Sharing
  • Limitations
    • 300 ft. effective range from access point
      • 1400 ft maximum range
    • Structural interference
    • Interference from other devices such as cordless phones.
  • Client/Server Networks Using Sharing Using Using
  • Network Operating Systems
    • Several products
      • Microsoft Windows NT/2000/2003
      • Novell Netware
      • Banyan Vines etc
    • All run on the server and share resources
      • Hard disk space
      • Printers etc
  • Directory Services
    • Centralized control of all network resources
      • Microsoft Windows 2000
        • Active Directory
      • Novell Netware
        • Network Directory Services (NDS)
      • Banyan Vines
  • Network Interface Card
    • Physical interface for the PC to the cable
    • Can be add-on adapter
      • PCMCIA/Cardbus
      • ISA/EISA
      • PCI
    • Often built into motherboard
    • Has a unique physical address
      • (MAC Address)
  • Network Cables
    • Coaxial
      • Thin and Thick Ethernet (10Base2, 10Base5) – used to transmit video
    • Unshielded Twisted Pair (UTP)
      • 10baseT, 100baseT (most common
    • Shielded Twisted Pair (STP)
    • Fiber-optic
  • Local Area Networks (LANs)
  • Wide Area Networks (WANs)
  • Cable-Less (i.e. Wireless) Connections
    • Narrow band radio transmission (RF)
      • Subject to interference
      • Security issues
    • Infra-red transmission (IR)
      • Line of sight required
      • Other light sources can interfere
      • Ex. Palm beaming/CPS “clickers”
  • Standards
    • IEEE 802.11.b –2.4GHz – 11Mbps
    • IEEE 802.11.a – 5GHz – 54 Mbps
    • IEEE 802.11g – 2.4Ghz – Hybrid 11/54Mbps (most common)
    • New! IEEE 802.11n – up to 100 Mbps
  • Security Overview
    • WEP - Wired Equivalent Privacy
      • 40 bit vs. 128 bit
      • Is Encryption Necessary?
    • Open access vs. Secured
    • Other Security Measures
      • Content Filtering
      • Network Partitioning
  • Applications
    • Any application currently used on a traditional wired network can be used on a wireless network.
    • New applications may be available or can be developed to take advantage of wireless, such as Wireless PDA access to a card catalog.
  • Wireless Network Components
    • Access Points
    • NICs – Network Interface Cards
      • PCMCIA
      • USB
      • PCI
      • CompactFlash
    • Other Wireless Devices
      • Bridges and Routers
      • Print Servers
    • PCs, Laptops, PDAs, even Projectors
  • Security (Encryption, Content Filtering, Privacy, etc.)
    • Content Filtering & Proxy Servers
      • Web content filtering that has generally been software on the desktop would have to be handled by a server if people are allowed to use their own laptops. Note: This is required by CIPA for all government organizations, including schools.
      • Proxy servers allow you to control what information people have access to. This is a good practice anyway, allowing you to control at a global level what information travels over your network. It also allows you to track usage.
  • Security (Encryption, Content Filtering, Privacy, etc.)
    • Viruses and Hacker
      • Wireless does not add any additional threat in the way of viruses.
      • Anyone, anywhere can attack a network that is connected to the Internet. Wireless does not increase that chance. Security measures such as firewalls, can reduce the risk.
  • Why Deploy Wireless?
    • Cost savings over wireline.
    • Can not run wire to locations needed.
    • To enable patrons to bring their own laptop, therefore reducing the cost of owning many PCs.
    • To enable you to easily move PCs.
    • To be on the leading edge.
  • Cost
    • 802.11b Wireless Access Points start around $100.00 for basic connectivity and run up to $500.00 for more management features.
    • 802.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB, PCI (desktop), PCMCIA (laptop) and CompactFlash versions.
  • Bluetooth – 802.15
    • Bluetooth is the standard for wireless personal area networks or WPAN. It allows high speed transmission of data over very short distances.
    • Bluetooth is normally used for transferring data between laptops or devices, or in Internet Kiosk type applications where roaming is not needed.
  • Networking Technology Review
    • Why use networks?
    • Physical network structure
    • Network Servers
    • Network Clients
    • Network Operating Systems
    • LANs and WANs