Introduction To Networking
Upcoming SlideShare
Loading in...5

Introduction To Networking






Total Views
Views on SlideShare
Embed Views



2 Embeds 7 6 1



Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
Post Comment
Edit your comment

Introduction To Networking Introduction To Networking Presentation Transcript

  • Introduction to Networking
    • Why use networks?
    • Physical network structure
    • Network Servers
    • Network Clients
    • Network Operating Systems
    • LANs and WANs
  • What Is A Network?
  • Why Use Networks?
    • Sharing…
      • Data
      • Software
      • Printers
      • Processing power
      • Access to the Internet
    • Controlling…
      • Security
      • Administration
  • The Network Server Printing Data Software Access to the Internet
  • The Network Client Uses Resources Write file to drive C: Write file to drive X:
  • Peer-To-Peer Networks Using Using Using Using Sharing Sharing Sharing
  • Limitations
    • 300 ft. effective range from access point
      • 1400 ft maximum range
    • Structural interference
    • Interference from other devices such as cordless phones.
  • Client/Server Networks Using Sharing Using Using
  • Network Operating Systems
    • Several products
      • Microsoft Windows NT/2000/2003
      • Novell Netware
      • Banyan Vines etc
    • All run on the server and share resources
      • Hard disk space
      • Printers etc
  • Directory Services
    • Centralized control of all network resources
      • Microsoft Windows 2000
        • Active Directory
      • Novell Netware
        • Network Directory Services (NDS)
      • Banyan Vines
  • Network Interface Card
    • Physical interface for the PC to the cable
    • Can be add-on adapter
      • PCMCIA/Cardbus
      • ISA/EISA
      • PCI
    • Often built into motherboard
    • Has a unique physical address
      • (MAC Address)
  • Network Cables
    • Coaxial
      • Thin and Thick Ethernet (10Base2, 10Base5) – used to transmit video
    • Unshielded Twisted Pair (UTP)
      • 10baseT, 100baseT (most common
    • Shielded Twisted Pair (STP)
    • Fiber-optic
  • Local Area Networks (LANs)
  • Wide Area Networks (WANs)
  • Cable-Less (i.e. Wireless) Connections
    • Narrow band radio transmission (RF)
      • Subject to interference
      • Security issues
    • Infra-red transmission (IR)
      • Line of sight required
      • Other light sources can interfere
      • Ex. Palm beaming/CPS “clickers”
  • Standards
    • IEEE 802.11.b –2.4GHz – 11Mbps
    • IEEE 802.11.a – 5GHz – 54 Mbps
    • IEEE 802.11g – 2.4Ghz – Hybrid 11/54Mbps (most common)
    • New! IEEE 802.11n – up to 100 Mbps
  • Security Overview
    • WEP - Wired Equivalent Privacy
      • 40 bit vs. 128 bit
      • Is Encryption Necessary?
    • Open access vs. Secured
    • Other Security Measures
      • Content Filtering
      • Network Partitioning
  • Applications
    • Any application currently used on a traditional wired network can be used on a wireless network.
    • New applications may be available or can be developed to take advantage of wireless, such as Wireless PDA access to a card catalog.
  • Wireless Network Components
    • Access Points
    • NICs – Network Interface Cards
      • PCMCIA
      • USB
      • PCI
      • CompactFlash
    • Other Wireless Devices
      • Bridges and Routers
      • Print Servers
    • PCs, Laptops, PDAs, even Projectors
  • Security (Encryption, Content Filtering, Privacy, etc.)
    • Content Filtering & Proxy Servers
      • Web content filtering that has generally been software on the desktop would have to be handled by a server if people are allowed to use their own laptops. Note: This is required by CIPA for all government organizations, including schools.
      • Proxy servers allow you to control what information people have access to. This is a good practice anyway, allowing you to control at a global level what information travels over your network. It also allows you to track usage.
  • Security (Encryption, Content Filtering, Privacy, etc.)
    • Viruses and Hacker
      • Wireless does not add any additional threat in the way of viruses.
      • Anyone, anywhere can attack a network that is connected to the Internet. Wireless does not increase that chance. Security measures such as firewalls, can reduce the risk.
  • Why Deploy Wireless?
    • Cost savings over wireline.
    • Can not run wire to locations needed.
    • To enable patrons to bring their own laptop, therefore reducing the cost of owning many PCs.
    • To enable you to easily move PCs.
    • To be on the leading edge.
  • Cost
    • 802.11b Wireless Access Points start around $100.00 for basic connectivity and run up to $500.00 for more management features.
    • 802.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB, PCI (desktop), PCMCIA (laptop) and CompactFlash versions.
  • Bluetooth – 802.15
    • Bluetooth is the standard for wireless personal area networks or WPAN. It allows high speed transmission of data over very short distances.
    • Bluetooth is normally used for transferring data between laptops or devices, or in Internet Kiosk type applications where roaming is not needed.
  • Networking Technology Review
    • Why use networks?
    • Physical network structure
    • Network Servers
    • Network Clients
    • Network Operating Systems
    • LANs and WANs