SlideShare a Scribd company logo
1 of 36
1
NetworkingNetworking
For VCE ITFor VCE IT
By
Mark Kelly
mark@vceit.com
VCE IT Lecture notes: Vceit.com
2
NetworkingNetworking
Year 11 IT – all of the topics can be covered atYear 11 IT – all of the topics can be covered at
a relatively simple levela relatively simple level
ITA – topologies and protocols are not in theITA – topologies and protocols are not in the
study design and cannot be directly assessedstudy design and cannot be directly assessed
Software Development – all topics are relevantSoftware Development – all topics are relevant
Note – several complex issues have beenNote – several complex issues have been
grossly simplified in this presentation. Forgrossly simplified in this presentation. For
example, detailed differences between switchesexample, detailed differences between switches
and routers at the transport level are notand routers at the transport level are not
necessary in any VCE course and will only servenecessary in any VCE course and will only serve
to frighten sensitive souls.to frighten sensitive souls.
3
What is a network – should I panic?What is a network – should I panic?
At its simplest, a network is two or more
computers that are connected so they can
exchange information and share resources.
4
Networks can be classified by:
Types of networksTypes of networks
(LAN, WAN, Internet);
(Client-Server, P2P);
•Their size
•Their servers
•How they are linked together (cable, wireless);
•Their ‘logical’ shape (bus, star, tree);
•How network messages travel (Ethernet’s CSMA/CD)
•The rules they use to exchange data (protocols – TCP/IP).
5
Why network?
Efficiency – Better, faster communication – email,
videoconferencing
•Cost savings (email vs phone calls, physical travel),
•Staff savings (e.g. networked helpdesk),
•Equipment savings: printers, internet connections,
internet cache, CD drives
Effectiveness – collaborative work is easier, access
to resources is broader, group calendaring
6
Why network?
Management - control over internet & printing, staff
monitoring
Company image and “reach” – internet visibility
makes any company international and accessible
and “with it”
Customer service – many more ways to help
customers (e.g. FAQ, downloads, online advice,
email contact)
Types of networks
LAN = Local Area Network
Geographically limited in size.
Usually in a single building or on a single
site.
Spread limited to a few hundred metres.
e.g. the computers in the McKinnon branch
of the Commonwealth bank
Size 2
• WAN = Wide Area Network
• Geographically widespread (e.g. across
cities, states, countries)
• Usually made up of interconnected LANs
• E.g. the interconnected LANs of every
branch of the Commonwealth Bank in
Australia.
Size 3
• The Internet
• What you get when WANs join together
• There is nothing that is “the internet”
except for the computers that are
interconnected at any single moment
A ‘standalone’ computer
PC
A LAN
PC PC
PC
A WAN
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
An internet
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN LAN
P
C
P
C
P
C
P
C
P
C
P
C
LAN
LAN
P
C
P
C
P
C
P
C
P
C
P
C
14
The internetThe internet
Made up of inter-networked WANs.
No central boss. Users make and enforce rules.
Uses all forms of media
Mesh topology (many possible routes from A to B)
15
Server-Based Networks
• Client/Server model
• Automatically a pretty expensive choice
compared to P2P
• File server at the heart of the network
– Server runs the Network Operating System
(NOS)
– Controls access to data and equipment
– Runs ‘community’ programs
– Offers control, security, centralisation,
automation
16
Peer-to-Peer (P2P) networksPeer-to-Peer (P2P) networks
• No server, cheap, simple,
easy to run
• All users have equal
authority and rights
• Little protection from each
other
• Used at home or in small
orgs with trusted users
17
Peer-to-Peer (P2P) networksPeer-to-Peer (P2P) networks
• Share files, internet
connection, printer
• Internet music sharing
networks (e.g. Kazaa) are
P2P - no central computer;
data and software on users’
computers.
• P2P built into Win, Linux,
Mac
18
ProtocolsProtocols
See my separate slideshow
19
NetworkNetwork
AddressingAddressing
20
Network AddressingNetwork Addressing
•Like telephones, every node on a network must have
a unique identifier so the file server knows who is
requesting information, and who is to be sent
information.
•This unique network address is hardwired into the
network card of each computer.
•Also, every active node of the internet needs a unique
identifying address so TCP/IP knows where packets
are to be sent.
•This is an Internet Protocol, or IP address.
21
Humans like working with names (e.g.
www.microsoft.com) but computers use
IP numbers (e.g. 10.77.91.19).
IP address has four ‘octets’ separated by
dots, each octet can be between 0 and
255.
Remember - all internet communications
use IP addresses, not URLs. Only
humans use URLs.
22
AddressingAddressing
Domain name servers
(DNS) – a distributed
database on thousands of
computers across the
world - convert URLs into
IP addresses.
Like a phone book – look
up a name (URL) to get a
number (IP address).
23
Networking hardware
See the dedicated slideshow
24
Network TopologiesNetwork Topologies
A network topology is a logical (idealised) shape of
a network’s wiring. The main topologies:
•Bus
•Star
•Tree*
•Ring*
•Mesh*
Each has its pros and cons:
cost, complexity, reliability
and susceptibility to
congestion.
*not examinable
25
Bus TopologyBus Topology
Many devices connect to a
single cable backbone
cable as a daisychain. If the
backbone breaks, the entire
segment fails – like
Christmas tree lights.
DO NOT RECOMMEND IT
IN THE EXAM!
26
Bus TopologyBus Topology
•Relatively cheap and easy
to install
•Don't require much cabling
•Gets congested with too
many nodes
•Not good for schools
•OK for small LANs
•NEED COAXIAL CABLE
AND NICs so is EXTINCT
nowadays!
27
* Star Topology ** Star Topology *
•central connection point (a
switch) with cables branching
to many computers.
•Not a server with 4 NICs!!!
•If a cable fails, only one
node will fail.
•prone to traffic bottlenecks
at the centre of the star
•RECOMMEND THIS for
small networks!
28
Tree Topology*Tree Topology*
Combines bus and star topologies.
It looks like a tree.
Very common in larger networks.
*not examinable
e.g. one cable from a file server leads to a 24 port switch.
Many cables branch from this switch to the computers in
the computer room. They share the bandwidth of the
incoming cable.
29
Mesh Topology*Mesh Topology*
Multiple routes from one node to any other.
Hardly ever found cabled in real-life in real
networks: really only appears in The
Internet to give near-perfect reliability.
DO NOT RECOMMEND IT IN A TYPICAL
CASE STUDY
*not examinable
30
Network Physical SecurityNetwork Physical Security
File server failure can severely affect network users.
Server security:
•Locked in air-conditioned, alarmed room with barred
windows, restricted keys
•No user access to server
•Uninterruptible power supply (UPS) protects against
blackouts, brownouts and voltage spikes.
•Accessible fire fighting equipment.
•Locked floppy disk drives
31
Network Electronic SecurityNetwork Electronic Security
Passwords are not strong protection – they
can be guessed, forgotten or stolen.
32
Network SecurityNetwork Security
Daily backups are vital. Massive cost and
effort to recover a single megabyte of lost data.
Organisations need a data disaster recovery
plan so they know what to do to recover from
catastrophic data loss.
33
EncryptionEncryption
•A form of Electronic Security
•Makes data unreadable to unauthorised people even
if a file is stolen.
• Web browsers use encryption to connect to a
“Secure” SSL (Secure Socket Layers) site.
34
Network SecurityNetwork Security
TROJAN HORSES attempting to report ‘home’ or start a
DOS/DDOS attack - can be blocked by a firewall.
FIREWALLS in hardware (routers) or software (e.g.
Zone Alarm) check for unauthorised incoming or
outgoing network traffic, e.g. port scanning, being
enslaved to help with a distributed denial-of-service
(DDOS) or spam attacks.
VIRUSES can disclose user passwords, steal
information, destroy data, install “back doors” to let
hackers in, clog print queues, disrupt Internet traffic,
overload email servers etc. Keep scanners up to date.
35
Remember
• ITA U4O2 case study will be a small organisation’s
LAN.
• Choose between P2P or Client-Server
• If Client-Server, choose NOS - MS Server
• Recommend…
– STAR topology, not bus
– UTP - CAT5e or CAT6 cable, not coaxial
– SWITCHES, not hubs
– Wireless is now pretty cheap, reliable and flexible
36
Thanks!
Mark Kelly
McKinnon Secondary College
kel@mckinnonsc.vic.edu.au
VCEIT Lecture Notes:
vceit.com

More Related Content

What's hot

Introduction to computer networks for performance venues
Introduction to computer networks for performance venuesIntroduction to computer networks for performance venues
Introduction to computer networks for performance venuesartsit
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptOsama Yousaf
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home networkclcewing
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10APSU
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructureProf. Othman Alsalloum
 
Masters thesis presentation
Masters thesis presentationMasters thesis presentation
Masters thesis presentationCelestino Pempe
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals NotesCLSIG
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse networkcmorfoot
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing Ahmad Idrees
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingLiving Online
 
Stacey Rhodes-Current Resume
Stacey Rhodes-Current ResumeStacey Rhodes-Current Resume
Stacey Rhodes-Current ResumeStacey M Rhodes
 
Apoio doc tec - educationplb
Apoio   doc tec - educationplbApoio   doc tec - educationplb
Apoio doc tec - educationplbChris Valencia
 

What's hot (19)

Introduction to computer networks for performance venues
Introduction to computer networks for performance venuesIntroduction to computer networks for performance venues
Introduction to computer networks for performance venues
 
iGCSE networks
iGCSE networksiGCSE networks
iGCSE networks
 
Introduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides pptIntroduction to Computer Networks Lecture slides ppt
Introduction to Computer Networks Lecture slides ppt
 
Setting up a home network
Setting up a home networkSetting up a home network
Setting up a home network
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Igcse networks
Igcse networksIgcse networks
Igcse networks
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
The internet & the new information technology infrastructure
The internet & the new information technology infrastructureThe internet & the new information technology infrastructure
The internet & the new information technology infrastructure
 
Isd&d networks
Isd&d networksIsd&d networks
Isd&d networks
 
Masters thesis presentation
Masters thesis presentationMasters thesis presentation
Masters thesis presentation
 
Ch06
Ch06Ch06
Ch06
 
IT for Information Professionals Notes
IT for Information Professionals NotesIT for Information Professionals Notes
IT for Information Professionals Notes
 
A fieldtrip through the ladse network
A fieldtrip through the ladse networkA fieldtrip through the ladse network
A fieldtrip through the ladse network
 
What is computer Introduction to Computing
What is computer Introduction  to Computing What is computer Introduction  to Computing
What is computer Introduction to Computing
 
Practical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP NetworkingPractical Wireless, Ethernet and TCP/IP Networking
Practical Wireless, Ethernet and TCP/IP Networking
 
Stacey Rhodes-Current Resume
Stacey Rhodes-Current ResumeStacey Rhodes-Current Resume
Stacey Rhodes-Current Resume
 
Apoio doc tec - educationplb
Apoio   doc tec - educationplbApoio   doc tec - educationplb
Apoio doc tec - educationplb
 

Viewers also liked

GPS Tracking Devices
GPS Tracking DevicesGPS Tracking Devices
GPS Tracking DevicesGPS Insight
 
deep inside Sina App Engine cloud service
deep inside Sina App Engine cloud servicedeep inside Sina App Engine cloud service
deep inside Sina App Engine cloud servicecong lei
 
Bmc contact details 2013 MARATHI
Bmc contact details 2013 MARATHIBmc contact details 2013 MARATHI
Bmc contact details 2013 MARATHIMumbaikar Le
 
RCPsychAGM10 lord prescribing
RCPsychAGM10    lord prescribingRCPsychAGM10    lord prescribing
RCPsychAGM10 lord prescribingAlex J Mitchell
 
Global millennial survey - Campus Party Sao Paulo
Global millennial survey - Campus Party Sao PauloGlobal millennial survey - Campus Party Sao Paulo
Global millennial survey - Campus Party Sao PauloPaul Fabretti
 
Hicks Insurance Group Slide Show
Hicks Insurance Group Slide ShowHicks Insurance Group Slide Show
Hicks Insurance Group Slide ShowMikeCardilli
 
2010 Toyota Corolla
2010 Toyota Corolla2010 Toyota Corolla
2010 Toyota CorollaActon Toyota
 
Report On The Hostel Scene from Vancouver BC
Report On The Hostel Scene from Vancouver BCReport On The Hostel Scene from Vancouver BC
Report On The Hostel Scene from Vancouver BCGoMio.com
 
สิ่งที่ชอบและไม่ชอบ
สิ่งที่ชอบและไม่ชอบสิ่งที่ชอบและไม่ชอบ
สิ่งที่ชอบและไม่ชอบamfine09
 
2010 Toyota Tacoma
2010 Toyota Tacoma2010 Toyota Tacoma
2010 Toyota TacomaActon Toyota
 
How to make products that don't suck - RISE Austin - Mar 30 2012
How to make products that don't suck -  RISE Austin -  Mar 30 2012How to make products that don't suck -  RISE Austin -  Mar 30 2012
How to make products that don't suck - RISE Austin - Mar 30 2012CompellingPM
 
Grow Your Digital Video Comfort Zone - 4 Tips
Grow Your Digital Video Comfort Zone - 4 TipsGrow Your Digital Video Comfort Zone - 4 Tips
Grow Your Digital Video Comfort Zone - 4 TipsValueClick Media
 
2011 Audi A4 Audi of Nashua NH
2011 Audi A4 Audi of Nashua NH2011 Audi A4 Audi of Nashua NH
2011 Audi A4 Audi of Nashua NHAudi of Nashua
 
Schaefer10e ppt ch22
Schaefer10e ppt ch22Schaefer10e ppt ch22
Schaefer10e ppt ch22kamran
 
Publication impact factors and your scientific career
Publication impact factors and your scientific careerPublication impact factors and your scientific career
Publication impact factors and your scientific careerBarbara Janssens
 
Supplier Quality Improvement
Supplier Quality ImprovementSupplier Quality Improvement
Supplier Quality Improvementgstevick1980
 

Viewers also liked (20)

GPS Tracking Devices
GPS Tracking DevicesGPS Tracking Devices
GPS Tracking Devices
 
deep inside Sina App Engine cloud service
deep inside Sina App Engine cloud servicedeep inside Sina App Engine cloud service
deep inside Sina App Engine cloud service
 
Bmc contact details 2013 MARATHI
Bmc contact details 2013 MARATHIBmc contact details 2013 MARATHI
Bmc contact details 2013 MARATHI
 
RCPsychAGM10 lord prescribing
RCPsychAGM10    lord prescribingRCPsychAGM10    lord prescribing
RCPsychAGM10 lord prescribing
 
Global millennial survey - Campus Party Sao Paulo
Global millennial survey - Campus Party Sao PauloGlobal millennial survey - Campus Party Sao Paulo
Global millennial survey - Campus Party Sao Paulo
 
Hicks Insurance Group Slide Show
Hicks Insurance Group Slide ShowHicks Insurance Group Slide Show
Hicks Insurance Group Slide Show
 
Hpc
HpcHpc
Hpc
 
2010 Toyota Corolla
2010 Toyota Corolla2010 Toyota Corolla
2010 Toyota Corolla
 
Report On The Hostel Scene from Vancouver BC
Report On The Hostel Scene from Vancouver BCReport On The Hostel Scene from Vancouver BC
Report On The Hostel Scene from Vancouver BC
 
Caso Vial Chile Venezuela cvc ave
Caso  Vial Chile Venezuela cvc aveCaso  Vial Chile Venezuela cvc ave
Caso Vial Chile Venezuela cvc ave
 
สิ่งที่ชอบและไม่ชอบ
สิ่งที่ชอบและไม่ชอบสิ่งที่ชอบและไม่ชอบ
สิ่งที่ชอบและไม่ชอบ
 
2010 Toyota Tacoma
2010 Toyota Tacoma2010 Toyota Tacoma
2010 Toyota Tacoma
 
Marketstructure (1)
Marketstructure (1)Marketstructure (1)
Marketstructure (1)
 
How to make products that don't suck - RISE Austin - Mar 30 2012
How to make products that don't suck -  RISE Austin -  Mar 30 2012How to make products that don't suck -  RISE Austin -  Mar 30 2012
How to make products that don't suck - RISE Austin - Mar 30 2012
 
Grow Your Digital Video Comfort Zone - 4 Tips
Grow Your Digital Video Comfort Zone - 4 TipsGrow Your Digital Video Comfort Zone - 4 Tips
Grow Your Digital Video Comfort Zone - 4 Tips
 
2011 Audi A4 Audi of Nashua NH
2011 Audi A4 Audi of Nashua NH2011 Audi A4 Audi of Nashua NH
2011 Audi A4 Audi of Nashua NH
 
Schaefer10e ppt ch22
Schaefer10e ppt ch22Schaefer10e ppt ch22
Schaefer10e ppt ch22
 
Publication impact factors and your scientific career
Publication impact factors and your scientific careerPublication impact factors and your scientific career
Publication impact factors and your scientific career
 
Supplier Quality Improvement
Supplier Quality ImprovementSupplier Quality Improvement
Supplier Quality Improvement
 
Porsche
PorschePorsche
Porsche
 

Similar to Networking

Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - FerdonSusan Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorialSusan Ferdon
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxGambari Amosa Isiaka
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptxssuser5cb8d3
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)Tuan Yang
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technologyInexk Pedrero
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemVaughan Olufemi ACIB, AICEN, ANIM
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 

Similar to Networking (20)

Networking
NetworkingNetworking
Networking
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Topology.ppt
Topology.pptTopology.ppt
Topology.ppt
 
NW.pdf
NW.pdfNW.pdf
NW.pdf
 
Networking Basics - Ferdon
Networking Basics - FerdonNetworking Basics - Ferdon
Networking Basics - Ferdon
 
541ferdon networktutorial
541ferdon networktutorial541ferdon networktutorial
541ferdon networktutorial
 
EDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptxEDT 323 Internet and Intranet 2022 Final.pptx
EDT 323 Internet and Intranet 2022 Final.pptx
 
computer networks_fundamentals.pptx
computer networks_fundamentals.pptxcomputer networks_fundamentals.pptx
computer networks_fundamentals.pptx
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Computer network
Computer networkComputer network
Computer network
 
A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)A Deep Dive in the World of IT Networking (part 1)
A Deep Dive in the World of IT Networking (part 1)
 
Slides internet technology
Slides internet technologySlides internet technology
Slides internet technology
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
Networking lecture1
Networking lecture1Networking lecture1
Networking lecture1
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Networks Intro.ppt
Networks Intro.pptNetworks Intro.ppt
Networks Intro.ppt
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 

Networking

  • 1. 1 NetworkingNetworking For VCE ITFor VCE IT By Mark Kelly mark@vceit.com VCE IT Lecture notes: Vceit.com
  • 2. 2 NetworkingNetworking Year 11 IT – all of the topics can be covered atYear 11 IT – all of the topics can be covered at a relatively simple levela relatively simple level ITA – topologies and protocols are not in theITA – topologies and protocols are not in the study design and cannot be directly assessedstudy design and cannot be directly assessed Software Development – all topics are relevantSoftware Development – all topics are relevant Note – several complex issues have beenNote – several complex issues have been grossly simplified in this presentation. Forgrossly simplified in this presentation. For example, detailed differences between switchesexample, detailed differences between switches and routers at the transport level are notand routers at the transport level are not necessary in any VCE course and will only servenecessary in any VCE course and will only serve to frighten sensitive souls.to frighten sensitive souls.
  • 3. 3 What is a network – should I panic?What is a network – should I panic? At its simplest, a network is two or more computers that are connected so they can exchange information and share resources.
  • 4. 4 Networks can be classified by: Types of networksTypes of networks (LAN, WAN, Internet); (Client-Server, P2P); •Their size •Their servers •How they are linked together (cable, wireless); •Their ‘logical’ shape (bus, star, tree); •How network messages travel (Ethernet’s CSMA/CD) •The rules they use to exchange data (protocols – TCP/IP).
  • 5. 5 Why network? Efficiency – Better, faster communication – email, videoconferencing •Cost savings (email vs phone calls, physical travel), •Staff savings (e.g. networked helpdesk), •Equipment savings: printers, internet connections, internet cache, CD drives Effectiveness – collaborative work is easier, access to resources is broader, group calendaring
  • 6. 6 Why network? Management - control over internet & printing, staff monitoring Company image and “reach” – internet visibility makes any company international and accessible and “with it” Customer service – many more ways to help customers (e.g. FAQ, downloads, online advice, email contact)
  • 7. Types of networks LAN = Local Area Network Geographically limited in size. Usually in a single building or on a single site. Spread limited to a few hundred metres. e.g. the computers in the McKinnon branch of the Commonwealth bank
  • 8. Size 2 • WAN = Wide Area Network • Geographically widespread (e.g. across cities, states, countries) • Usually made up of interconnected LANs • E.g. the interconnected LANs of every branch of the Commonwealth Bank in Australia.
  • 9. Size 3 • The Internet • What you get when WANs join together • There is nothing that is “the internet” except for the computers that are interconnected at any single moment
  • 13. An internet LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C LAN LAN P C P C P C P C P C P C
  • 14. 14 The internetThe internet Made up of inter-networked WANs. No central boss. Users make and enforce rules. Uses all forms of media Mesh topology (many possible routes from A to B)
  • 15. 15 Server-Based Networks • Client/Server model • Automatically a pretty expensive choice compared to P2P • File server at the heart of the network – Server runs the Network Operating System (NOS) – Controls access to data and equipment – Runs ‘community’ programs – Offers control, security, centralisation, automation
  • 16. 16 Peer-to-Peer (P2P) networksPeer-to-Peer (P2P) networks • No server, cheap, simple, easy to run • All users have equal authority and rights • Little protection from each other • Used at home or in small orgs with trusted users
  • 17. 17 Peer-to-Peer (P2P) networksPeer-to-Peer (P2P) networks • Share files, internet connection, printer • Internet music sharing networks (e.g. Kazaa) are P2P - no central computer; data and software on users’ computers. • P2P built into Win, Linux, Mac
  • 20. 20 Network AddressingNetwork Addressing •Like telephones, every node on a network must have a unique identifier so the file server knows who is requesting information, and who is to be sent information. •This unique network address is hardwired into the network card of each computer. •Also, every active node of the internet needs a unique identifying address so TCP/IP knows where packets are to be sent. •This is an Internet Protocol, or IP address.
  • 21. 21 Humans like working with names (e.g. www.microsoft.com) but computers use IP numbers (e.g. 10.77.91.19). IP address has four ‘octets’ separated by dots, each octet can be between 0 and 255. Remember - all internet communications use IP addresses, not URLs. Only humans use URLs.
  • 22. 22 AddressingAddressing Domain name servers (DNS) – a distributed database on thousands of computers across the world - convert URLs into IP addresses. Like a phone book – look up a name (URL) to get a number (IP address).
  • 23. 23 Networking hardware See the dedicated slideshow
  • 24. 24 Network TopologiesNetwork Topologies A network topology is a logical (idealised) shape of a network’s wiring. The main topologies: •Bus •Star •Tree* •Ring* •Mesh* Each has its pros and cons: cost, complexity, reliability and susceptibility to congestion. *not examinable
  • 25. 25 Bus TopologyBus Topology Many devices connect to a single cable backbone cable as a daisychain. If the backbone breaks, the entire segment fails – like Christmas tree lights. DO NOT RECOMMEND IT IN THE EXAM!
  • 26. 26 Bus TopologyBus Topology •Relatively cheap and easy to install •Don't require much cabling •Gets congested with too many nodes •Not good for schools •OK for small LANs •NEED COAXIAL CABLE AND NICs so is EXTINCT nowadays!
  • 27. 27 * Star Topology ** Star Topology * •central connection point (a switch) with cables branching to many computers. •Not a server with 4 NICs!!! •If a cable fails, only one node will fail. •prone to traffic bottlenecks at the centre of the star •RECOMMEND THIS for small networks!
  • 28. 28 Tree Topology*Tree Topology* Combines bus and star topologies. It looks like a tree. Very common in larger networks. *not examinable e.g. one cable from a file server leads to a 24 port switch. Many cables branch from this switch to the computers in the computer room. They share the bandwidth of the incoming cable.
  • 29. 29 Mesh Topology*Mesh Topology* Multiple routes from one node to any other. Hardly ever found cabled in real-life in real networks: really only appears in The Internet to give near-perfect reliability. DO NOT RECOMMEND IT IN A TYPICAL CASE STUDY *not examinable
  • 30. 30 Network Physical SecurityNetwork Physical Security File server failure can severely affect network users. Server security: •Locked in air-conditioned, alarmed room with barred windows, restricted keys •No user access to server •Uninterruptible power supply (UPS) protects against blackouts, brownouts and voltage spikes. •Accessible fire fighting equipment. •Locked floppy disk drives
  • 31. 31 Network Electronic SecurityNetwork Electronic Security Passwords are not strong protection – they can be guessed, forgotten or stolen.
  • 32. 32 Network SecurityNetwork Security Daily backups are vital. Massive cost and effort to recover a single megabyte of lost data. Organisations need a data disaster recovery plan so they know what to do to recover from catastrophic data loss.
  • 33. 33 EncryptionEncryption •A form of Electronic Security •Makes data unreadable to unauthorised people even if a file is stolen. • Web browsers use encryption to connect to a “Secure” SSL (Secure Socket Layers) site.
  • 34. 34 Network SecurityNetwork Security TROJAN HORSES attempting to report ‘home’ or start a DOS/DDOS attack - can be blocked by a firewall. FIREWALLS in hardware (routers) or software (e.g. Zone Alarm) check for unauthorised incoming or outgoing network traffic, e.g. port scanning, being enslaved to help with a distributed denial-of-service (DDOS) or spam attacks. VIRUSES can disclose user passwords, steal information, destroy data, install “back doors” to let hackers in, clog print queues, disrupt Internet traffic, overload email servers etc. Keep scanners up to date.
  • 35. 35 Remember • ITA U4O2 case study will be a small organisation’s LAN. • Choose between P2P or Client-Server • If Client-Server, choose NOS - MS Server • Recommend… – STAR topology, not bus – UTP - CAT5e or CAT6 cable, not coaxial – SWITCHES, not hubs – Wireless is now pretty cheap, reliable and flexible
  • 36. 36 Thanks! Mark Kelly McKinnon Secondary College kel@mckinnonsc.vic.edu.au VCEIT Lecture Notes: vceit.com