Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Systems 3.02 Understand network management.

Similar presentations


Presentation on theme: "Network Systems 3.02 Understand network management."— Presentation transcript:

1 Network Systems 3.02 Understand network management.

2 Networks and the Internet
Course Content Networks and the Internet Network Admins Network Types Data Flow Internet Speed Security Risks

3 Goals Protect The Data Learn How Data Flows Understand Media

4 Network administrator
Definition Is responsible for configuring a network system and managing its operations. Responsibilities include: Network configuration Network design and supervision Monitoring and filtering Maintaining and securing Updating and backing up

5 Network administrator
Network configuration Is the overall design of a communications network Software and hardware are arranged in a way that allows efficiency in the process of transmitting data across the network.

6 Network administrator
Designing, setting up and maintaining networks Network admin selects and sets up hardware networks (often cabling done by laborers) Network admin selects and utilizes network storage, both client and sever, on a variety of platforms for upgrading and maintaining networks and telecommunications.

7 Network administrator
Manages networks using Network Operating Systems Network Operating System (NOS) is an operating system that includes special functions for connecting computers and devices into a local-area network. Examples of client-server NOS include: Novell Windows Linux Examples of NOS that are embedded in network devices and firewalls Cisco IOS NOS for peer-to-peer Windows workgroup AppleShare

8 Network administrator
Monitors the network using monitoring and filtering software Networking monitoring software uses TCP (Transmission Control Protocol) ports to monitor and report on network activities and systems availability. Network monitoring systems are used to monitor network devices and printers, computer temperature, network interfaces, and disk memory. The software can prevent malicious attacks on a computer.

9 Network administrator
Security and analytics Ensures the security of the network using software that protects computers from malicious software attacks. Analyzes the network using system analyzing software identifies and reports locations where computers are experiencing difficulties like slow downs, viral attacks or hacking.

10 Network administrator
Maintaining network operations and software applications, and server backups Workstations are often set up to be uniform through the use of ghosting or imaging software. A single computer is configured and the computer’s image is transferred to other computers. Back up software and hardware provides a way to recover files. Virtual desktops or thin client software can be used to provide the same desktop configuration to groups of users. Recommends equipment, software, supplies and materials.

11 Network administrator
Network access Network admin must determine the amount of access given to users on the network. Network access involves setting roles, privileges and rights. Roles can permit a user to temporarily receive certain rights. Rights are permissions to a resource. Rights are typically granted to either users or groups. A privilege is often used to reference specific tasks that a user can perform. Rights, permissions and privileges impact the ability of users to access directories, files, applications and devices on a network.

12 Network administrator
Defining roles System Administrator or Sys Admin is defined as the administrator role in a given system. This role creates user accounts and other network objects. Network user is the account that gives a user access to a network. Application roles are defined for users who have the privileges to use and modify applications, such as databases. User roles can be defined for individuals or groups.

13 Network administrator
Defining profiles Profiles contain settings for the network environment, such as desktop configuration and menu options. Profiles are used to identify common conditions under which a user group, identified by roles, can access resources or provide a desktop arrangement.

14 Limited network Connectivity
Intranet A private network that facilitates communication between departments of an organization or business Intranets are accessible by employees inside the organization. Cannot be accessed from the outside without the use of an extranet Admin Shipping Personnel

15 Limited network Connectivity
Extranet A network that allows limited access from outside a private network associated with a company Used for business partners and employees to conduct business from remote locations Allows business partners to access data to speed up shipping or manage services. Admin Shipping Personnel Home Extranet

16 Internet Connectivity
Based on data flow Data flow is the flow of bits of data from one device on the network to another. Encapsulation – The creating and formatting of the data to be sent. De-encapsulation – The removal of the control information of the message once it reaches the destination.

17 Measuring internet data flow
Bandwidth – Theoretical amount of data that can be transmitted across a given medium Throughput – The actual amount of data that can be transmitted across a given medium Units of Measurement: Bits per second (bps) = a small text message Kilobits per second (Kbps) = a text document Megabits per second (Mbps) = one or two photos Gigabits per second (Gbps) = a movie

18 Measuring internet data flow
Estimated bandwidth through different transmission Dial-up connection with modem – 56 Kbitsps DSL (digital subscriber line) – 10 Mbitsps Cable connection – 30 Mbitsps T1 line – Mbitsps A T1 line is dedicated to a certain location often reaching speeds higher than DSL or cable. Ethernet – 10 Mbitsps Fast Ethernet – 100 Mbitsps Fiber optics – 100 Gbitsps Satelittle – 400 Kbitsps *all speeds are listed in their max states

19 bandwidth Bandwidth refers to ideal conditions for network speed.
How fast could you go if you were the only car on the highway? Some providers charge extra for overage of bandwidth limits. High speed internet users may have their connection reduced when they reach the limit of the connection to help providers ensure that all users have access. Internet connections will only travel as fast as your cable will allow.

20 throughput Throughput is the actual amount of data that can be transmitted across a given media relative to the restrictions and resistance of the media. What if the road wasn’t straight, or there was road construction? Network Limitations: Data type Topology Congestion Computer processing

21 Osi model A seven layered model used as an educational tool to simplify network communications. Let’s look at the first four layers.

22 Transport layer Layer 4 is the “hand shake” layer. This layer establishes the type of connection necessary to complete your internet request. If you are going to Skype, video chat or audio chat then your connection would be connectionless. If you are going to read articles, look at images, play music and videos your connection would connection oriented. TCP (transmission control protocol) is a connection oriented service. UDP (user datagram protocol) is a connectionless oriented service.

23 Network layer Layer 3 is the network layer.
It provides the routing information of the data. It handles IP addresses. Computer: Can you get to Router: Is that even on my network? Router: Uh, you’ll need an IP address for that website.

24 Data Link layer Layer 2 is the data link layer.
It converts the logical data into electronic pulses. It handles MAC addresses. PC says: User is asking for me to print. PC asks: Who’s the printer? Printer says: I am. PC asks for MAC address and printer replies 0B-5A C1. PC says here is the print in bits.

25 Physical layer Layer 1 is the data link layer.
It is the physical link between devices on the network. It is the coaxial, fiber, and utp media connections.

26 Categories of internet speed

27 Download speed The speed at which a user can retrieve data from the Internet

28 Upload speed The speed at which a user can send data to a remote location on the Internet

29 latency The lag, or length of time, that occurs between each point during information transfer

30 Linking to the internet

31 Internet service provider
To link to the Internet, the user needs to set up service with a company that has a permanent connection and that can provide temporary access to users I S P

32 Internet protocol address
To connect to the Internet, a computer must have a unique identifier I P Address

33 Security risks

34 virus A computer program that replicates itself. Often with malicious intent to destroy critical system files.

35 worm A form of malware that uses the network to spread from host to host

36 Trojan horse A standalone, malicious program that gives access from the infected computer to another computer. Often disguised as popular apps or download illegal copies. Sometimes key stroke loggers and unwanted advertisements will be present.

37 Botnet attacks The word Botnet is derived from robot and network.
A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or DDos (Distributed Denial of Service attacks). A Trojan horse may be the vehicle to breach the security on a computer. After infection the computer would then be organized into a network of bots that can be remotely managed.

38 Unauthorized access An intrusion to the network Types: Hacker Phishing
Malware Spyware Adware

39 hacker A person who finds and exploits weaknesses of a computer

40 phishing The act of masquerading as a trustworthy website or other entity to acquire user information

41 malware Malicious software meant to gain access, disrupt computer operation, or gather sensitive information

42 spyware A type of malware that collects user information by tracking the habits of users

43 adware Advertising software that automatically generates advertisements

44 Denial of service Denial of Service (Dos) or Distributed Denial of Service (DDoS) is an attempt to make a machine or network resource unavailable to its intended users.

45 Identity fraud An attempt to use another’s identity to commit a crime

46 Prevention methods User awareness and education Anti-virus software
Firewalls Passwords Authentication

47 User awareness User awareness and education
User should remain educated about computer risks. Internet resources Public news networks

48 Antivirus software Antivirus software is an application used to prevent infection from risks. Commonly, antivirus software updates at regular intervals to guard against newly-created risks.

49 Firewalls A firewall is a physical device or application designed to deny incoming or outgoing traffic on a network.

50 Passwords A string of characters that allows access to a computer, interface or system. Passwords should be complex, including letters, numbers, and/or special characters. Passwords should be kept confidential. Passwords should be changed regularly and not be used repeatedly for other applications. An alternative that is strongly recommended is to use a passphrase.

51 Passwords and phrases

52 Authentication The process of verifying that “you are who you say you are”. Two-step verification or authentication is available for some services. It adds a section check to make sure of the user’s identity. A bank card and a PIN number is a two-step verification system.


Download ppt "Network Systems 3.02 Understand network management."

Similar presentations


Ads by Google