SlideShare a Scribd company logo
1 of 40
īļWhat is a Network?
A network consists of two or more computers that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables,
telephone lines, radio waves, satellites, or infrared light beams.
Two very common types of networks include:
â€ĸLocal Area Network (LAN)
â€ĸWide Area Network (WAN)
īƒ˜ You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN
(WLAN), or a Wireless WAN (WWAN)
īļLocal area network (LAN)
īƒ˜ Stands for "Local Area Network" and is pronounced "lan." A LAN
is a network of connected devices that exist within a specific
location. LANs may be found in homes, offices, educational
institution, or other areas
īƒ˜ A LAN may be wired, wireless, or a combination of the two. A
standard wired LAN uses Ethernet to connect devices together.
Wireless LANs are typically created using a Wi-Fi signal. If
a router supports both Ethernet and Wi-Fi connections, it can be
used to create a LAN with both wired and wireless devices.
īļ Advantages of Installing a Network
īąUser access control.
īƒ˜ Modern networks almost always have one or more servers which allows centralized management for users and for
network resources to which they have access. User credentials on a privately-owned and operated network may be
as simple as a user name and password, but with ever-increasing attention to computing security issues, these
servers are critical to ensuring that sensitive information is only available to authorized users.
īąInformation storing and sharing.
īƒ˜ Computers allow users to create and manipulate information. Information takes on a life of its own on a network.
The network provides both a place to store the information and mechanisms to share that information with other
network users.
īąConnections.
īƒ˜ Administrators, instructors, and even students and guests can be connected using the campus network.
īąServices.
īƒ˜ The school can provide services, such as registration, school directories, course schedules, access to research, and
email accounts, and many others. (Remember, network services are generally provided by servers).
īą Internet.
īƒ˜ The school can provide network users with access to the internet, via an internet gateway.
īą Computing resources.
īƒ˜ The school can provide access to special purpose computing devices which individual users would not
normally own. For example, a school network might have high-speed high quality printers strategically
located around a campus for instructor or student use.
īą Flexible Access.
īƒ˜ School networks allow students to access their information from connected devices throughout the
school. Students can begin an assignment in their classroom, save part of it on a public access area of
the network, then go to the media center after school to finish their work. Students can also work
cooperatively through the network.
īą Workgroup Computing.
īƒ˜ Collaborative software allows many users to work on a document or project concurrently. For example,
educators located at various schools within a county could simultaneously contribute their ideas about
new curriculum standards to the same document, spreadsheets, or website.
īļ Disadvantages of Installing a School Network
īą Expensive to Install.
īƒ˜ Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software
can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a
simple network with internet access can be setup for a small campus in an afternoon.
īą Requires Administrative Time.
īƒ˜ Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they
did not budget for the necessary administrative support.
īą Servers Fail.
īƒ˜ Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network
may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the
network whenever possible.
īą Cables May Break.
īƒ˜ The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to
minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network.
īą Security and compliance.
īƒ˜ Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security
requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of
network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network
services to ensure all network content is appropriate for the network community it serves.
īļ What is a Protocol?
īƒ˜ A protocol is a set of rules that governs the communications between computers on a network. In order for two
computers to talk to each other, they must be speaking the same language. Many different types of network
protocols and standards are required to ensure that your computer (no matter which operating system, network
card, or application you are using) can communicate with another computer located on the next desk or half-way
around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of
networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be
simplified into four layers to help identify some of the protocols with which you should be familiar
OSI Layer Name Common Protocols
7 Application
HTTP | FTP | SMTP |
DNS | Telnet
6 Presentation
5 Session
4 Transport TCP | SPX
3 Network IP | IPX
2 Data Link
Ethernet
1 Physical
īƒ˜ OSI model related to common
network protocols
īƒ˜ the OSI model in order to
communicate via the Internet. In this
model, there are four layers, including
ī‚§ Ethernet (Physical/Data Link Layers)
ī‚§ IP/IPX (Network Layer)
ī‚§ TCP/SPX (Transport Layer)
ī‚§ HTTP, FTP, Telnet, SMTP, and
DNS(combined
Session/Presentation/Application Layers)
īļWhat is Networking Hardware ?
īƒ˜ Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data-
processing and communications within the network. CLICK on the terms below to learn more about those pieces of
networking hardware
īļ This section provides information on the following
components:
ī‚§ Network Servers
ī‚§ Workstations
ī‚§ Network Interface Cards
ī‚§ Switches
ī‚§ Repeaters
ī‚§ Bridges
ī‚§ Routers
ī‚§ Firewalls
īļFile/Network Servers
One or more network servers is a part of nearly every local area network. These are very fast
computers with a large amount of RAM and storage space, along with a one or more fast network interface
card(s). The network operating system provides tools to share server resources and information with
network users. A sophisticated permissions-handling system is included, so that access to sensitive
information can be carefully tailored to the needs of the users. For small networks, a singe network server
may provide access control, file sharing, printer sharing, email, database, and other services.
ī‚§ Fastest processor(s)
ī‚§ Large amount of RAM
ī‚§ multiple large, fast hard drives
ī‚§ Extra expansion slots
ī‚§ Fast network interface card(s)
īļ Workstations
īƒ˜ Computers that humans use are broadly categorized as workstations. A typical workstation is a
computer that is configured with a network interface card, networking software, and the appropriate
cables. Workstations do not necessarily need large storage hard drives, because files can be saved on
the file server. Almost any computer can serve as a network workstation.
īļ Laptops/Mobile Devices
īƒ˜ Laptops and other mobile devices are becoming more and more common. These devices typically
have modest internal storage, but enough power to serve as a workstation for users on the go. These
machines nearly always have a wireless adapter to allow quick network connections without
cumbersome cabling. In a school environment with good wireless coverage, a mobile device user can
move about the campus freely, and remain continuously connected to the network.
īļNetwork Interface Cards
īƒ˜ The network interface card (NIC) provides the physical connection between the
network and the computer workstation. Most NICs are internal, and they are
included in the purchase of most computers. Network interface cards are a major
factor in determining the speed and performance of a network. It is a good idea to
use the fastest network card available for the type of workstation you are using.
īƒ˜ The most common network interface connections are Ethernet cards and wireless
adapters.
īļWireless Adapters
īƒ˜Wireless adapters are found in most portable devices, such as
laptops, smart phones, and tablet devices. External wireless
adapters can be purchased and installed on most computers having
an open USB (Universal Serial Bus) port, or unused expansion
slot. (See the Cabling section for more information on connectors.)
īļRepeaters
īƒ˜ Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a
device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it.
Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when
the total length of your network cable exceeds the standards set for the type of cable being used.
īƒ˜ A good example of the use of repeaters would be in a local area network using a star topology with
unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The
most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port
active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total
length of cable on the network to exceed the 100 meter limit.
īļ Bridges
īļ A bridge is a device that allows you to segment a large network into two
smaller, more efficient networks. If you are adding to an older wiring scheme
and want the new network to be up-to-date, a bridge can connect the two.
A bridge monitors the information traffic on both sides of the network so that it can
pass packets of information to the correct location. Most bridges can "listen" to the
network and automatically figure out the address of each computer on both sides of
the bridge. The bridge can inspect each message and, if necessary, broadcast it on
the other side of the network.
īļ The bridge manages the traffic to maintain optimum performance on both sides
of the network. You might say that the bridge is like a traffic cop at a busy
intersection during rush hour. It keeps information flowing on both sides of the
network, but it does not allow unnecessary traffic through. Bridges can be used
to connect different types of cabling, or physical topologies. They must,
however, be used between networks with the same protocol.
īļ Routers
īƒ˜ A router has a lot more capabilities than other network devices, such as a hub or a switch that are only
able to perform basic network functions. For example, a hub is often used to transfer data between
computers or network devices, but does not analyze or do anything with the data it is transferring. By
contrast, routers can analyze the data being sent over a network, change how it is packaged, and send it to
another network or over a different network. For example, routers are commonly used in home networks
to share a single Internet connection between multiple computers.
īļ Firewalls
īƒ˜ A firewall is a networking device that is installed at the entrance to a LAN when connecting a networks together,
particularly when connecting a private network to a public network, such as the internet. The firewall uses rules to
filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers.
īƒ˜ Firewalls are either hardware or software, depending on their intended use. A firewall used to protect a network is a
hardware device that should be installed in the network between the router and the network. Almost all hardware
firewalls will have at least two ports, labeled "Trusted" and "Untrusted". These terms imply the true nature of the
firewall's responsibility to the private network. The public network is connected to the untrusted network port, and the
private network is connected to the trusted port.
īƒ˜ Firewall rules are usually simple, consisting of a verb, either allow or deny, the direction of the traffic, either inbound
or outbound, and an address or other network traffic identifier. Firewall rules are cumulative, so general rules may be
specified, and exceptions added as necessary. Some examples are:
ī‚§ Allow outbound all (all private network users can do anything on the public network)
ī‚§ Deny inbound all (default setting to prevent all traffic from the public or untrusted port, to the private port)
ī‚§ Allow inbound port 80 (allow internet web traffic to come into network to find web servers)
ī‚§ Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a specific web server on your
private network)
ī‚§ Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or range of addresses)
īƒ˜Software firewalls are commonly included in modern workstation and server
operating systems. They operate in a similar way as hardware firewalls, except that
they filter traffic in and out of the machine itself. These software firewalls are
typically unnoticed by machine users, and only need attention occasionslly when an
internet-connected application don't work as expected. The software firewall should
always be considered a "suspect" in such cases. The problem is easily resolved, by
setting an exception rule in the firewall for the software that is attempting to
communicate.
īļ What is Network Cabling?
īƒ˜ Cable is the medium through which information usually moves from one network device to another.
There are several types of cable which are commonly used with LANs. In some cases, a network will
utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen
for a network is related to the network's topology, protocol, and size. Understanding the characteristics of
different types of cable and how they relate to other aspects of a network is necessary for the development
of a successful network.
īƒ˜ The following sections discuss the types of cables used in networks and other related topics.
ī‚§ Unshielded Twisted Pair (UTP) Cable
ī‚§ Shielded Twisted Pair (STP) Cable
ī‚§ Coaxial Cable
ī‚§ Fiber Optic Cable
ī‚§ Cable Installation Guides
ī‚§ Wireless LANs
ī‚§ Unshielded Twisted Pair (UTP) Cable
īƒ˜ Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded
twisted pair (UTP) is the most popular and is generally the best option for school
networks
īƒ˜ The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four
pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help
eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher
the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry
Association/Telecommunication Industry Association) has established standards of UTP and rated six
categories of wire (additional categories are emerging).
īļ Categories of Unshielded Twisted Pair
Category Speed Use
1 1 Mbps Voice Only (Telephone Wire)
2 4 Mbps
LocalTalk & Telephone
(Rarely used)
3 16 Mbps 10BaseT Ethernet
4 20 Mbps Token Ring (Rarely used)
5
100 Mbps (2 pair) 100BaseT Ethernet
1000 Mbps (4 pair) Gigabit Ethernet
5e 1,000 Mbps Gigabit Ethernet
6 10,000 Mbps Gigabit Ethernet
īļ Unshielded Twisted Pair Connector
īƒ˜ The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic
connector that looks like a large telephone-style connector A slot allows the RJ-45 to be inserted
only one way. RJ stands for Registered Jack, implying that the connector follows a standard
borrowed from the telephone industry. This standard designates which wire goes with each pin
inside the connector.
īļ Shielded Twisted Pair (STP) Cable
īƒ˜ Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical
frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you
must place cable in environments with lots of potential interference, or if you must place cable in
extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded
twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the
cables.
īƒ˜ Shielded twisted pair cable is available in three different configurations:
1.Each pair of wires is individually shielded with foil.
2.There is a foil or braid shield inside the jacket covering all wires (as a group).
3.There is a shield around each individual pair, as well as around the entire group of wires (referred
to as double shield twisted pair).
īļ Coaxial Cable
īƒ˜ Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation
between the center conductor and a braided metal shield . The metal shield helps to block any
outside interference from fluorescent lights, motors, and other computers.
īƒ˜ Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support
greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick
coaxial and thin coaxial.
īƒ˜ Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying
Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the
maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear
bus networks.
īƒ˜ Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable
carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has
an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial
a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does
not bend easily and is difficult to install.
īļ Coaxial Cable Connectors
īƒ˜ The most common type of connector used with coaxial cables is the Bayone-Neill-
Concelman (BNC) connector . Different types of adapters are available for BNC
connectors, including a T-connector, barrel connector, and terminator. Connectors on
the cable are the weakest points in any network. To help avoid problems with your
network, always use the BNC connectors that crimp, rather screw, onto the cable.
īļ Fiber Optic Cable
īƒ˜ Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig.
5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it
ideal for certain environments that contain a large amount of electrical interference. It has also made it the
standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting.
īƒ˜ Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It
also has the capability to carry information at vastly greater speeds. This capacity broadens communication
possibilities to include services such as video conferencing and interactive services. The cost of fiber optic
cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the
specifications for fiber optic cable carrying Ethernet signals.
īƒ˜ The center core of fiber cables is made from glass or plastic fibers (see fig 5). A plastic coating then cushions the
fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket
made of teflon or PVC.
īƒ˜There are two common types of fiber cables -- single mode and multimode.
Multimode cable has a larger diameter; however, both cables provide high
bandwidth at high speeds. Single mode can provide more distance, but it is
more expensive.
Specification Cable Type
10BaseT Unshielded Twisted Pair
10Base2 Thin Coaxial
10Base5 Thick Coaxial
100BaseT Unshielded Twisted Pair
100BaseFX Fiber Optic
100BaseBX Single mode Fiber
100BaseSX Multimode Fiber
1000BaseT Unshielded Twisted Pair
1000BaseFX Fiber Optic
1000BaseBX Single mode Fiber
1000BaseSX Multimode Fiber
īļInstalling Cable - Some Guidelines
īƒ˜When running cable, it is best to follow a few simple rules:
ī‚§ Always use more cable than you need. Leave plenty of slack.
ī‚§ Test every part of a network as you install it. Even if it is brand new, it may have problems that
will be difficult to isolate later.
ī‚§ Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference.
ī‚§ If it is necessary to run cable across the floor, cover the cable with cable protectors.
ī‚§ Label both ends of each cable.
ī‚§ Use cable ties (not tape) to keep cables in the same location together.
īļWireless LANs
īƒ˜ More and more networks are operating without cables, in the wireless mode. Wireless LANs use high frequency
radio signals, infrared light beams, or lasers to communicate between the workstations, servers, or hubs. Each
workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data.
Information is relayed between transceivers as if they were physically connected. For longer distance, wireless
communications can also take place through cellular telephone technology, microwave transmission, or by satellite.
īƒ˜ Wireless networks are great for allowing laptop computers, portable devices, or remote computers to connect to the
LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install
cables.
īƒ˜ The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast.
Line-of-sight communication means that there must be an unblocked direct line between the workstation and the
transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to
be sent again. This kind of obstruction can slow down the wireless network. Scattered infrared communication is a
broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it
eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared
networks.
īļWireless standards and speeds
īƒ˜ The Wi-Fi Alliance is a global, non-profit organization that helps to ensure standards and interoperability for
wireless networks, and wireless networks are often referred to as WiFi (Wireless Fidelity). The original Wi-Fi
standard (IEEE 802.11) was adopted in 1997. Since then many variations have emerged (and will continue to
emerge). Wi-Fi networks use the Ethernet protocol.
Standard Max Speed Typical Range
802.11a 54 Mbps 150 feet
802.11b 11 Mbps 300 feet
802.11g 54 Mbps 300 feet
802.11n 100 Mbps 300+ feet
īļWhat is a Topology?
īƒ˜ The physical topology of a network refers to the configuration of cables, computers, and other peripherals.
Physical topology should not be confused with logical topology which is the method used to pass information
between workstations. Logical topology was discussed in the Protocol chapter.
īļ Main Types of Physical Topologies
ī‚§ Linear Bus
ī‚§ Star
ī‚§ Tree (Expanded Star)
ī‚§ Considerations When Choosing a Topology
ī‚§ Summary Chart
īļ Linear Bus
īƒ˜ A linear bus topology consists of a main run of cable with a terminator at each
end . All nodes (file server, workstations, and peripherals) are connected to the
linear cable.
īļ Advantages of a Linear Bus Topology
ī‚§ Easy to connect a computer or peripheral to a linear
bus.
ī‚§ Requires less cable length than a star topology.
īļDisadvantages of a Linear Bus
Topology
â€ĸEntire network shuts down if there is a break in the main
cable.
â€ĸTerminators are required at both ends of the backbone
cable.
â€ĸDifficult to identify the problem if the entire network
shuts down.
â€ĸNot meant to be used as a stand-alone solution in a large
building.
īļStar
īƒ˜ A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central
network hub, switch, or concentrator .
īƒ˜ Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub,
switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow.
This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic
cable.
īļ Advantages of a Star Topology
ī‚§ Easy to install and wire.
ī‚§ No disruptions to the network
when connecting or removing
devices.
ī‚§ Easy to detect faults and to remove
parts.
īļ Disadvantages of a Star Topology
ī‚§ Requires more cable length than a
linear topology.
ī‚§ If the hub, switch, or concentrator
fails, nodes attached are disabled.
ī‚§ More expensive than linear bus
topologies because of the cost of the
hubs, etc.
īļTree or Expanded Star
īƒ˜ A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star-
configured workstations connected to a linear bus backbone cable . Tree topologies allow for the expansion of
an existing network, and enable schools to configure a network to meet their needs.
īą Advantages of a Tree Topology
ī‚§ Point-to-point wiring for individual segments.
ī‚§ Supported by several hardware and software venders.
īą Disadvantages of a Tree Topology
ī‚§ Overall length of each segment is limited by the type of
cabling used.
ī‚§ If the backbone line breaks, the entire segment goes down.
ī‚§ More difficult to configure and wire than other topologies.
īļConsiderations When Choosing a Topology
ī‚§ Money. A linear bus network may be the least expensive way to install a network; you do not have to
purchase concentrators.
ī‚§ Length of cable needed. The linear bus network uses shorter lengths of cable.
ī‚§ Future growth. With a star topology, expanding a network is easily done by adding another
concentrator.
ī‚§ Cable type. The most common cable in schools is unshielded twisted pair, which is most often used
with star topologies.
Physical Topology Common Cable Common Protocol
Linear Bus
Twisted Pair
Coaxial
Fiber
Ethernet
Star
Twisted Pair
Fiber
Ethernet
Tree
Twisted Pair
Coaxial
Fiber
Ethernet
īļWhat is a Network Operating System?
īƒ˜ Unlike operating systems, such as Windows, that are designed for single users to control one computer,
network operating systems (NOS) coordinate the activities of multiple computers across a network. The
network operating system acts as a director to keep the network running smoothly.
īƒ˜ The two major types of network operating systems are:
ī‚§ Peer-to-Peer
ī‚§ Client/Server
īƒ˜ Nearly all modern networks are a combination of both. The networking design can be considered
independent of the servers and workstations that will share it
īļ Peer-to-Peer
īƒ˜ Peer-to-peer network operating systems allow users to share resources and files located on their computers
and to access shared resources found on other computers. However, they do not have a file server or a
centralized management source (See fig. 1). In a peer-to-peer network, all computers are considered equal;
they all have the same abilities to use the resources available on the network. Peer-to-peer networks are
designed primarily for small to medium local area networks. Nearly all modern desktop operating systems,
such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems.
īą Advantages of a peer-to-peer network:
ī‚§ Less initial expense - No need for a dedicated server.
ī‚§ Setup - An operating system (such as Windows XP) already in
place may only need to be reconfigured for peer-to-peer
operations.
īą Disadvantages of a peer-to-peer network:
ī‚§ Decentralized - No central repository for files and applications.
ī‚§ Security - Does not provide the security available on a
client/server network.
īļ Client/Server
īƒ˜ Client/server network operating systems allow the network to centralize
functions and applications in one or more dedicated file servers (See fig. 2).
The file servers become the heart of the system, providing access to resources
and providing security. Individual workstations (clients) have access to the
resources available on the file servers. The network operating system provides
the mechanism to integrate all the components of the network and allow
multiple users to simultaneously share the same resources irrespective of
physical location. UNIX/Linux and the Microsoft family of Windows Servers
are examples of client/server network operating systems.
īļ Advantages of a client/server network:
ī‚§ Centralized - Resources and data security are controlled through the
server.
ī‚§ Scalability - Any or all elements can be replaced individually as needs
increase.
ī‚§ Flexibility - New technology can be easily integrated into system.
ī‚§ Interoperability - All components (client/network/server) work together.
ī‚§ Accessibility - Server can be accessed remotely and across multiple
platforms.
īļ Disadvantages of a client/server network:
ī‚§ Expense - Requires initial investment in dedicated
server.
ī‚§ Maintenance - Large networks will require a staff to
ensure efficient operation.
ī‚§ Dependence - When server goes down, operations
will cease across the network.
īļ Network Operating System Software
īƒ˜ The following links include some of the more popular peer-to-
peer and client/server network operating systems.
ī‚§ Macintosh OS X
ī‚§ Microsoft Windows Server
ī‚§ UNIX/Linux
Network & Networking

More Related Content

Similar to Network & Networking

UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfshubhangisonawane6
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
Computer networking
Computer networkingComputer networking
Computer networkingtdsparks3
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Kyle
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Naruin
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2ekul
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basicsDavid Kibuki
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 

Similar to Network & Networking (20)

Basic lecture
Basic lectureBasic lecture
Basic lecture
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
Computer network
Computer networkComputer network
Computer network
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Hardware1
Hardware1Hardware1
Hardware1
 
Hardware1
Hardware1Hardware1
Hardware1
 
Networking
NetworkingNetworking
Networking
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2Hcs Topic 4 Networks V2
Hcs Topic 4 Networks V2
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
My project-new-2
My project-new-2My project-new-2
My project-new-2
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 

Recently uploaded

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 

Recently uploaded (20)

Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 

Network & Networking

  • 1.
  • 2. īļWhat is a Network? A network consists of two or more computers that are linked in order to share resources (such as printers and CDs), exchange files, or allow electronic communications. The computers on a network may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams. Two very common types of networks include: â€ĸLocal Area Network (LAN) â€ĸWide Area Network (WAN) īƒ˜ You may also see references to a Metropolitan Area Networks (MAN), a Wireless LAN (WLAN), or a Wireless WAN (WWAN)
  • 3. īļLocal area network (LAN) īƒ˜ Stands for "Local Area Network" and is pronounced "lan." A LAN is a network of connected devices that exist within a specific location. LANs may be found in homes, offices, educational institution, or other areas īƒ˜ A LAN may be wired, wireless, or a combination of the two. A standard wired LAN uses Ethernet to connect devices together. Wireless LANs are typically created using a Wi-Fi signal. If a router supports both Ethernet and Wi-Fi connections, it can be used to create a LAN with both wired and wireless devices.
  • 4. īļ Advantages of Installing a Network īąUser access control. īƒ˜ Modern networks almost always have one or more servers which allows centralized management for users and for network resources to which they have access. User credentials on a privately-owned and operated network may be as simple as a user name and password, but with ever-increasing attention to computing security issues, these servers are critical to ensuring that sensitive information is only available to authorized users. īąInformation storing and sharing. īƒ˜ Computers allow users to create and manipulate information. Information takes on a life of its own on a network. The network provides both a place to store the information and mechanisms to share that information with other network users. īąConnections. īƒ˜ Administrators, instructors, and even students and guests can be connected using the campus network. īąServices. īƒ˜ The school can provide services, such as registration, school directories, course schedules, access to research, and email accounts, and many others. (Remember, network services are generally provided by servers).
  • 5. īą Internet. īƒ˜ The school can provide network users with access to the internet, via an internet gateway. īą Computing resources. īƒ˜ The school can provide access to special purpose computing devices which individual users would not normally own. For example, a school network might have high-speed high quality printers strategically located around a campus for instructor or student use. īą Flexible Access. īƒ˜ School networks allow students to access their information from connected devices throughout the school. Students can begin an assignment in their classroom, save part of it on a public access area of the network, then go to the media center after school to finish their work. Students can also work cooperatively through the network. īą Workgroup Computing. īƒ˜ Collaborative software allows many users to work on a document or project concurrently. For example, educators located at various schools within a county could simultaneously contribute their ideas about new curriculum standards to the same document, spreadsheets, or website.
  • 6. īļ Disadvantages of Installing a School Network īą Expensive to Install. īƒ˜ Large campus networks can carry hefty price tags. Cabling, network cards, routers, bridges, firewalls, wireless access points, and software can get expensive, and the installation would certainly require the services of technicians. But, with the ease of setup of home networks, a simple network with internet access can be setup for a small campus in an afternoon. īą Requires Administrative Time. īƒ˜ Proper maintenance of a network requires considerable time and expertise. Many schools have installed a network, only to find that they did not budget for the necessary administrative support. īą Servers Fail. īƒ˜ Although a network server is no more susceptible to failure than any other computer, when the files server "goes down" the entire network may come to a halt. Good network design practices say that critical network services (provided by servers) should be redundant on the network whenever possible. īą Cables May Break. īƒ˜ The Topology chapter presents information about the various configurations of cables. Some of the configurations are designed to minimize the inconvenience of a broken cable; with other configurations, one broken cable can stop the entire network. īą Security and compliance. īƒ˜ Network security is expensive. It is also very important. A school network would possibly be subject to more stringent security requirements than a similarly-sized corporate network, because of its likelihood of storing personal and confidential information of network users, the danger of which can be compounded if any network users are minors. A great deal of attention must be paid to network services to ensure all network content is appropriate for the network community it serves.
  • 7. īļ What is a Protocol? īƒ˜ A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar OSI Layer Name Common Protocols 7 Application HTTP | FTP | SMTP | DNS | Telnet 6 Presentation 5 Session 4 Transport TCP | SPX 3 Network IP | IPX 2 Data Link Ethernet 1 Physical īƒ˜ OSI model related to common network protocols īƒ˜ the OSI model in order to communicate via the Internet. In this model, there are four layers, including ī‚§ Ethernet (Physical/Data Link Layers) ī‚§ IP/IPX (Network Layer) ī‚§ TCP/SPX (Transport Layer) ī‚§ HTTP, FTP, Telnet, SMTP, and DNS(combined Session/Presentation/Application Layers)
  • 8. īļWhat is Networking Hardware ? īƒ˜ Networking hardware includes all computers, peripherals, interface cards and other equipment needed to perform data- processing and communications within the network. CLICK on the terms below to learn more about those pieces of networking hardware īļ This section provides information on the following components: ī‚§ Network Servers ī‚§ Workstations ī‚§ Network Interface Cards ī‚§ Switches ī‚§ Repeaters ī‚§ Bridges ī‚§ Routers ī‚§ Firewalls
  • 9. īļFile/Network Servers One or more network servers is a part of nearly every local area network. These are very fast computers with a large amount of RAM and storage space, along with a one or more fast network interface card(s). The network operating system provides tools to share server resources and information with network users. A sophisticated permissions-handling system is included, so that access to sensitive information can be carefully tailored to the needs of the users. For small networks, a singe network server may provide access control, file sharing, printer sharing, email, database, and other services. ī‚§ Fastest processor(s) ī‚§ Large amount of RAM ī‚§ multiple large, fast hard drives ī‚§ Extra expansion slots ī‚§ Fast network interface card(s)
  • 10. īļ Workstations īƒ˜ Computers that humans use are broadly categorized as workstations. A typical workstation is a computer that is configured with a network interface card, networking software, and the appropriate cables. Workstations do not necessarily need large storage hard drives, because files can be saved on the file server. Almost any computer can serve as a network workstation.
  • 11. īļ Laptops/Mobile Devices īƒ˜ Laptops and other mobile devices are becoming more and more common. These devices typically have modest internal storage, but enough power to serve as a workstation for users on the go. These machines nearly always have a wireless adapter to allow quick network connections without cumbersome cabling. In a school environment with good wireless coverage, a mobile device user can move about the campus freely, and remain continuously connected to the network.
  • 12. īļNetwork Interface Cards īƒ˜ The network interface card (NIC) provides the physical connection between the network and the computer workstation. Most NICs are internal, and they are included in the purchase of most computers. Network interface cards are a major factor in determining the speed and performance of a network. It is a good idea to use the fastest network card available for the type of workstation you are using. īƒ˜ The most common network interface connections are Ethernet cards and wireless adapters.
  • 13. īļWireless Adapters īƒ˜Wireless adapters are found in most portable devices, such as laptops, smart phones, and tablet devices. External wireless adapters can be purchased and installed on most computers having an open USB (Universal Serial Bus) port, or unused expansion slot. (See the Cabling section for more information on connectors.)
  • 14. īļRepeaters īƒ˜ Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with a device called a repeater. The repeater electrically amplifies the signal it receives and rebroadcasts it. Repeaters can be separate devices or they can be incorporated into a concentrator. They are used when the total length of your network cable exceeds the standards set for the type of cable being used. īƒ˜ A good example of the use of repeaters would be in a local area network using a star topology with unshielded twisted-pair cabling. The length limit for unshielded twisted-pair cable is 100 meters. The most common configuration is for each workstation to be connected by twisted-pair cable to a multi-port active concentrator. The concentrator amplifies all the signals that pass through it allowing for the total length of cable on the network to exceed the 100 meter limit.
  • 15. īļ Bridges īļ A bridge is a device that allows you to segment a large network into two smaller, more efficient networks. If you are adding to an older wiring scheme and want the new network to be up-to-date, a bridge can connect the two. A bridge monitors the information traffic on both sides of the network so that it can pass packets of information to the correct location. Most bridges can "listen" to the network and automatically figure out the address of each computer on both sides of the bridge. The bridge can inspect each message and, if necessary, broadcast it on the other side of the network. īļ The bridge manages the traffic to maintain optimum performance on both sides of the network. You might say that the bridge is like a traffic cop at a busy intersection during rush hour. It keeps information flowing on both sides of the network, but it does not allow unnecessary traffic through. Bridges can be used to connect different types of cabling, or physical topologies. They must, however, be used between networks with the same protocol.
  • 16. īļ Routers īƒ˜ A router has a lot more capabilities than other network devices, such as a hub or a switch that are only able to perform basic network functions. For example, a hub is often used to transfer data between computers or network devices, but does not analyze or do anything with the data it is transferring. By contrast, routers can analyze the data being sent over a network, change how it is packaged, and send it to another network or over a different network. For example, routers are commonly used in home networks to share a single Internet connection between multiple computers.
  • 17. īļ Firewalls īƒ˜ A firewall is a networking device that is installed at the entrance to a LAN when connecting a networks together, particularly when connecting a private network to a public network, such as the internet. The firewall uses rules to filter traffic into and out of the private network, to protect the private network users and data from malevolent hackers. īƒ˜ Firewalls are either hardware or software, depending on their intended use. A firewall used to protect a network is a hardware device that should be installed in the network between the router and the network. Almost all hardware firewalls will have at least two ports, labeled "Trusted" and "Untrusted". These terms imply the true nature of the firewall's responsibility to the private network. The public network is connected to the untrusted network port, and the private network is connected to the trusted port. īƒ˜ Firewall rules are usually simple, consisting of a verb, either allow or deny, the direction of the traffic, either inbound or outbound, and an address or other network traffic identifier. Firewall rules are cumulative, so general rules may be specified, and exceptions added as necessary. Some examples are: ī‚§ Allow outbound all (all private network users can do anything on the public network) ī‚§ Deny inbound all (default setting to prevent all traffic from the public or untrusted port, to the private port) ī‚§ Allow inbound port 80 (allow internet web traffic to come into network to find web servers) ī‚§ Allow inbound port 80 destined to 170.200.201.25 (allow inbound web traffic to a specific web server on your private network) ī‚§ Deny inbound from 201.202.1.1/24 (deny all inbound traffic from a specific IP address or range of addresses)
  • 18. īƒ˜Software firewalls are commonly included in modern workstation and server operating systems. They operate in a similar way as hardware firewalls, except that they filter traffic in and out of the machine itself. These software firewalls are typically unnoticed by machine users, and only need attention occasionslly when an internet-connected application don't work as expected. The software firewall should always be considered a "suspect" in such cases. The problem is easily resolved, by setting an exception rule in the firewall for the software that is attempting to communicate.
  • 19. īļ What is Network Cabling? īƒ˜ Cable is the medium through which information usually moves from one network device to another. There are several types of cable which are commonly used with LANs. In some cases, a network will utilize only one type of cable, other networks will use a variety of cable types. The type of cable chosen for a network is related to the network's topology, protocol, and size. Understanding the characteristics of different types of cable and how they relate to other aspects of a network is necessary for the development of a successful network. īƒ˜ The following sections discuss the types of cables used in networks and other related topics. ī‚§ Unshielded Twisted Pair (UTP) Cable ī‚§ Shielded Twisted Pair (STP) Cable ī‚§ Coaxial Cable ī‚§ Fiber Optic Cable ī‚§ Cable Installation Guides ī‚§ Wireless LANs ī‚§ Unshielded Twisted Pair (UTP) Cable
  • 20. īƒ˜ Twisted pair cabling comes in two varieties: shielded and unshielded. Unshielded twisted pair (UTP) is the most popular and is generally the best option for school networks īƒ˜ The quality of UTP may vary from telephone-grade wire to extremely high-speed cable. The cable has four pairs of wires inside the jacket. Each pair is twisted with a different number of twists per inch to help eliminate interference from adjacent pairs and other electrical devices. The tighter the twisting, the higher the supported transmission rate and the greater the cost per foot. The EIA/TIA (Electronic Industry Association/Telecommunication Industry Association) has established standards of UTP and rated six categories of wire (additional categories are emerging).
  • 21. īļ Categories of Unshielded Twisted Pair Category Speed Use 1 1 Mbps Voice Only (Telephone Wire) 2 4 Mbps LocalTalk & Telephone (Rarely used) 3 16 Mbps 10BaseT Ethernet 4 20 Mbps Token Ring (Rarely used) 5 100 Mbps (2 pair) 100BaseT Ethernet 1000 Mbps (4 pair) Gigabit Ethernet 5e 1,000 Mbps Gigabit Ethernet 6 10,000 Mbps Gigabit Ethernet
  • 22. īļ Unshielded Twisted Pair Connector īƒ˜ The standard connector for unshielded twisted pair cabling is an RJ-45 connector. This is a plastic connector that looks like a large telephone-style connector A slot allows the RJ-45 to be inserted only one way. RJ stands for Registered Jack, implying that the connector follows a standard borrowed from the telephone industry. This standard designates which wire goes with each pin inside the connector.
  • 23. īļ Shielded Twisted Pair (STP) Cable īƒ˜ Although UTP cable is the least expensive cable, it may be susceptible to radio and electrical frequency interference (it should not be too close to electric motors, fluorescent lights, etc.). If you must place cable in environments with lots of potential interference, or if you must place cable in extremely sensitive environments that may be susceptible to the electrical current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help to extend the maximum distance of the cables. īƒ˜ Shielded twisted pair cable is available in three different configurations: 1.Each pair of wires is individually shielded with foil. 2.There is a foil or braid shield inside the jacket covering all wires (as a group). 3.There is a shield around each individual pair, as well as around the entire group of wires (referred to as double shield twisted pair).
  • 24. īļ Coaxial Cable īƒ˜ Coaxial cabling has a single copper conductor at its center. A plastic layer provides insulation between the center conductor and a braided metal shield . The metal shield helps to block any outside interference from fluorescent lights, motors, and other computers. īƒ˜ Although coaxial cabling is difficult to install, it is highly resistant to signal interference. In addition, it can support greater cable lengths between network devices than twisted pair cable. The two types of coaxial cabling are thick coaxial and thin coaxial. īƒ˜ Thin coaxial cable is also referred to as thinnet. 10Base2 refers to the specifications for thin coaxial cable carrying Ethernet signals. The 2 refers to the approximate maximum segment length being 200 meters. In actual fact the maximum segment length is 185 meters. Thin coaxial cable has been popular in school networks, especially linear bus networks. īƒ˜ Thick coaxial cable is also referred to as thicknet. 10Base5 refers to the specifications for thick coaxial cable carrying Ethernet signals. The 5 refers to the maximum segment length being 500 meters. Thick coaxial cable has an extra protective plastic cover that helps keep moisture away from the center conductor. This makes thick coaxial a great choice when running longer lengths in a linear bus network. One disadvantage of thick coaxial is that it does not bend easily and is difficult to install.
  • 25. īļ Coaxial Cable Connectors īƒ˜ The most common type of connector used with coaxial cables is the Bayone-Neill- Concelman (BNC) connector . Different types of adapters are available for BNC connectors, including a T-connector, barrel connector, and terminator. Connectors on the cable are the weakest points in any network. To help avoid problems with your network, always use the BNC connectors that crimp, rather screw, onto the cable.
  • 26. īļ Fiber Optic Cable īƒ˜ Fiber optic cabling consists of a center glass core surrounded by several layers of protective materials (See fig. 5). It transmits light rather than electronic signals eliminating the problem of electrical interference. This makes it ideal for certain environments that contain a large amount of electrical interference. It has also made it the standard for connecting networks between buildings, due to its immunity to the effects of moisture and lighting. īƒ˜ Fiber optic cable has the ability to transmit signals over much longer distances than coaxial and twisted pair. It also has the capability to carry information at vastly greater speeds. This capacity broadens communication possibilities to include services such as video conferencing and interactive services. The cost of fiber optic cabling is comparable to copper cabling; however, it is more difficult to install and modify. 10BaseF refers to the specifications for fiber optic cable carrying Ethernet signals. īƒ˜ The center core of fiber cables is made from glass or plastic fibers (see fig 5). A plastic coating then cushions the fiber center, and kevlar fibers help to strengthen the cables and prevent breakage. The outer insulating jacket made of teflon or PVC.
  • 27. īƒ˜There are two common types of fiber cables -- single mode and multimode. Multimode cable has a larger diameter; however, both cables provide high bandwidth at high speeds. Single mode can provide more distance, but it is more expensive. Specification Cable Type 10BaseT Unshielded Twisted Pair 10Base2 Thin Coaxial 10Base5 Thick Coaxial 100BaseT Unshielded Twisted Pair 100BaseFX Fiber Optic 100BaseBX Single mode Fiber 100BaseSX Multimode Fiber 1000BaseT Unshielded Twisted Pair 1000BaseFX Fiber Optic 1000BaseBX Single mode Fiber 1000BaseSX Multimode Fiber
  • 28. īļInstalling Cable - Some Guidelines īƒ˜When running cable, it is best to follow a few simple rules: ī‚§ Always use more cable than you need. Leave plenty of slack. ī‚§ Test every part of a network as you install it. Even if it is brand new, it may have problems that will be difficult to isolate later. ī‚§ Stay at least 3 feet away from fluorescent light boxes and other sources of electrical interference. ī‚§ If it is necessary to run cable across the floor, cover the cable with cable protectors. ī‚§ Label both ends of each cable. ī‚§ Use cable ties (not tape) to keep cables in the same location together.
  • 29. īļWireless LANs īƒ˜ More and more networks are operating without cables, in the wireless mode. Wireless LANs use high frequency radio signals, infrared light beams, or lasers to communicate between the workstations, servers, or hubs. Each workstation and file server on a wireless network has some sort of transceiver/antenna to send and receive the data. Information is relayed between transceivers as if they were physically connected. For longer distance, wireless communications can also take place through cellular telephone technology, microwave transmission, or by satellite. īƒ˜ Wireless networks are great for allowing laptop computers, portable devices, or remote computers to connect to the LAN. Wireless networks are also beneficial in older buildings where it may be difficult or impossible to install cables. īƒ˜ The two most common types of infrared communications used in schools are line-of-sight and scattered broadcast. Line-of-sight communication means that there must be an unblocked direct line between the workstation and the transceiver. If a person walks within the line-of-sight while there is a transmission, the information would need to be sent again. This kind of obstruction can slow down the wireless network. Scattered infrared communication is a broadcast of infrared transmissions sent out in multiple directions that bounces off walls and ceilings until it eventually hits the receiver. Networking communications with laser are virtually the same as line-of-sight infrared networks.
  • 30. īļWireless standards and speeds īƒ˜ The Wi-Fi Alliance is a global, non-profit organization that helps to ensure standards and interoperability for wireless networks, and wireless networks are often referred to as WiFi (Wireless Fidelity). The original Wi-Fi standard (IEEE 802.11) was adopted in 1997. Since then many variations have emerged (and will continue to emerge). Wi-Fi networks use the Ethernet protocol. Standard Max Speed Typical Range 802.11a 54 Mbps 150 feet 802.11b 11 Mbps 300 feet 802.11g 54 Mbps 300 feet 802.11n 100 Mbps 300+ feet
  • 31. īļWhat is a Topology? īƒ˜ The physical topology of a network refers to the configuration of cables, computers, and other peripherals. Physical topology should not be confused with logical topology which is the method used to pass information between workstations. Logical topology was discussed in the Protocol chapter. īļ Main Types of Physical Topologies ī‚§ Linear Bus ī‚§ Star ī‚§ Tree (Expanded Star) ī‚§ Considerations When Choosing a Topology ī‚§ Summary Chart
  • 32. īļ Linear Bus īƒ˜ A linear bus topology consists of a main run of cable with a terminator at each end . All nodes (file server, workstations, and peripherals) are connected to the linear cable. īļ Advantages of a Linear Bus Topology ī‚§ Easy to connect a computer or peripheral to a linear bus. ī‚§ Requires less cable length than a star topology. īļDisadvantages of a Linear Bus Topology â€ĸEntire network shuts down if there is a break in the main cable. â€ĸTerminators are required at both ends of the backbone cable. â€ĸDifficult to identify the problem if the entire network shuts down. â€ĸNot meant to be used as a stand-alone solution in a large building.
  • 33. īļStar īƒ˜ A star topology is designed with each node (file server, workstations, and peripherals) connected directly to a central network hub, switch, or concentrator . īƒ˜ Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network. It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable. īļ Advantages of a Star Topology ī‚§ Easy to install and wire. ī‚§ No disruptions to the network when connecting or removing devices. ī‚§ Easy to detect faults and to remove parts. īļ Disadvantages of a Star Topology ī‚§ Requires more cable length than a linear topology. ī‚§ If the hub, switch, or concentrator fails, nodes attached are disabled. ī‚§ More expensive than linear bus topologies because of the cost of the hubs, etc.
  • 34. īļTree or Expanded Star īƒ˜ A tree topology combines characteristics of linear bus and star topologies. It consists of groups of star- configured workstations connected to a linear bus backbone cable . Tree topologies allow for the expansion of an existing network, and enable schools to configure a network to meet their needs. īą Advantages of a Tree Topology ī‚§ Point-to-point wiring for individual segments. ī‚§ Supported by several hardware and software venders. īą Disadvantages of a Tree Topology ī‚§ Overall length of each segment is limited by the type of cabling used. ī‚§ If the backbone line breaks, the entire segment goes down. ī‚§ More difficult to configure and wire than other topologies.
  • 35. īļConsiderations When Choosing a Topology ī‚§ Money. A linear bus network may be the least expensive way to install a network; you do not have to purchase concentrators. ī‚§ Length of cable needed. The linear bus network uses shorter lengths of cable. ī‚§ Future growth. With a star topology, expanding a network is easily done by adding another concentrator. ī‚§ Cable type. The most common cable in schools is unshielded twisted pair, which is most often used with star topologies. Physical Topology Common Cable Common Protocol Linear Bus Twisted Pair Coaxial Fiber Ethernet Star Twisted Pair Fiber Ethernet Tree Twisted Pair Coaxial Fiber Ethernet
  • 36. īļWhat is a Network Operating System? īƒ˜ Unlike operating systems, such as Windows, that are designed for single users to control one computer, network operating systems (NOS) coordinate the activities of multiple computers across a network. The network operating system acts as a director to keep the network running smoothly. īƒ˜ The two major types of network operating systems are: ī‚§ Peer-to-Peer ī‚§ Client/Server īƒ˜ Nearly all modern networks are a combination of both. The networking design can be considered independent of the servers and workstations that will share it
  • 37. īļ Peer-to-Peer īƒ˜ Peer-to-peer network operating systems allow users to share resources and files located on their computers and to access shared resources found on other computers. However, they do not have a file server or a centralized management source (See fig. 1). In a peer-to-peer network, all computers are considered equal; they all have the same abilities to use the resources available on the network. Peer-to-peer networks are designed primarily for small to medium local area networks. Nearly all modern desktop operating systems, such as Macintosh OSX, Linux, and Windows, can function as peer-to-peer network operating systems. īą Advantages of a peer-to-peer network: ī‚§ Less initial expense - No need for a dedicated server. ī‚§ Setup - An operating system (such as Windows XP) already in place may only need to be reconfigured for peer-to-peer operations. īą Disadvantages of a peer-to-peer network: ī‚§ Decentralized - No central repository for files and applications. ī‚§ Security - Does not provide the security available on a client/server network.
  • 38. īļ Client/Server īƒ˜ Client/server network operating systems allow the network to centralize functions and applications in one or more dedicated file servers (See fig. 2). The file servers become the heart of the system, providing access to resources and providing security. Individual workstations (clients) have access to the resources available on the file servers. The network operating system provides the mechanism to integrate all the components of the network and allow multiple users to simultaneously share the same resources irrespective of physical location. UNIX/Linux and the Microsoft family of Windows Servers are examples of client/server network operating systems. īļ Advantages of a client/server network: ī‚§ Centralized - Resources and data security are controlled through the server. ī‚§ Scalability - Any or all elements can be replaced individually as needs increase. ī‚§ Flexibility - New technology can be easily integrated into system. ī‚§ Interoperability - All components (client/network/server) work together. ī‚§ Accessibility - Server can be accessed remotely and across multiple platforms. īļ Disadvantages of a client/server network: ī‚§ Expense - Requires initial investment in dedicated server. ī‚§ Maintenance - Large networks will require a staff to ensure efficient operation. ī‚§ Dependence - When server goes down, operations will cease across the network.
  • 39. īļ Network Operating System Software īƒ˜ The following links include some of the more popular peer-to- peer and client/server network operating systems. ī‚§ Macintosh OS X ī‚§ Microsoft Windows Server ī‚§ UNIX/Linux