Common Hardware Requirements for Computer Networking.

Slides:



Advertisements
Similar presentations
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Advertisements

Data Networking Fundamentals Unit 7 7/2/ Modified by: Brierley.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
TCP/IP Reference Model Host To Network Layer Transport Layer Application Layer Internet Layer.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
COMPUTER NETWORKS.
 The Open Systems Interconnection model (OSI model) is a product of the Open Systems Interconnection effort at the International Organization for Standardization.
CECS 474 Computer Network Interoperability Tracy Bradley Maples, Ph.D. Computer Engineering & Computer Science Cal ifornia State University, Long Beach.
Lecturer: Tamanna Haque Nipa
Chapter Overview TCP/IP Protocols IP Addressing.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Network Management Concepts and Practice Author: J. Richard Burke Presentation by Shu-Ping Lin.
Network Hardware for Expanding Network. Expanding Networks When do we need expansion:  Network cable is full of data movements  Printing tasks needs.
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
CLIENT A client is an application or system that accesses a service made available by a server. applicationserver.
15-1 More Chapter 15 Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of.
Networking Technologies
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
1 WHY NEED NETWORKING? - Access to remote information - Person-to-person communication - Cooperative work online - Resource sharing.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 1 Overview Review Overview of demonstration network
Presentation on Osi & TCP/IP MODEL
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 13 – Network Security
Common Devices Used In Computer Networks
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Huda AL_Omairl - Network 71 Protocols and Network Software.
©G. Millbery 2001Communications and Networked SystemsSlide 1 Purpose of Network Components  Switches A device that controls routing and operation of a.
Repeaters and Hubs Repeaters: simplest type of connectivity devices that regenerate a digital signal Operate in Physical layer Cannot improve or correct.
Computer Communication & Networks Lecture # 02 Nadeem Majeed Choudhary
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
Chap 9 TCP/IP Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
The OSI Model.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
TCP/IP TCP/IP LAYERED PROTOCOL TCP/IP'S APPLICATION LAYER TRANSPORT LAYER NETWORK LAYER NETWORK ACCESS LAYER (DATA LINK LAYER)
Chapter 6 – Connectivity Devices
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Computer Networks 15-1 Connecting Devices. Connecting Device We divide connecting devices into five different categories based on the layer in which they.
CHAPTER 5 TCP/IP PROTOCOLS. P ROTOCOL STANDARDS Protocols are formal rules of behavior When computers communicate, it is necessary to define a set of.
OS Services And Networking Support Juan Wang Qi Pan Department of Computer Science Southeastern University August 1999.
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
Data Networking Fundamentals Chapter 7. Objectives In this chapter, you will learn to: Discuss basic networking concepts, including the elements common.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
Chapter2 Networking Fundamentals
Prepared by Engr.Jawad Ali BSc(Hons)Computer Systems Engineering University of Engineering and Technology Peshawar.
Network Protocols and Standards (Part 2). The OSI Model In 1984, the International Organization for Standardization (ISO) defined a standard, or set of.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Open System Interconnection Describe how information from a software application in one computer moves through a network medium to a software application.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
NETWORK DEVICES Department of CE/IT.
Prepared by: PACE Academy ( Welcome to CCNAX Cisco Certified Network Associate Version 2 ( ) Recognize the purpose and functions.
TCP/IP Protocol Suite Suresh Kr Sharma 1 The OSI Model and the TCP/IP Protocol Suite Established in 1947, the International Standards Organization (ISO)
Network Models. The OSI Model Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO). Model for understanding.
The OSI Model. Understanding the OSI Model In early 1980s, manufacturers began to standardize networking so that networks from different manufacturers.
Lecture # 02 Network Models Course Instructor: Engr. Sana Ziafat.
Class Notes CS403- Internet Technology Prepared by: Gulrez Alam Khan.
Chapter Objectives In this chapter, you will learn:
Networking Devices.
Chapter 3 Computer Networking Hardware
The OSI Model and the TCP/IP Protocol Suite
CT1303 LAN Rehab AlFallaj.
Data Networking Fundamentals
The OSI Model and the TCP/IP Protocol Suite
Chapter 3: Open Systems Interconnection (OSI) Model
The OSI Model and the TCP/IP Protocol Suite
OSI Reference Model Unit II
OSI Model 7 Layers 7. Application Layer 6. Presentation Layer
Presentation transcript:

Common Hardware Requirements for Computer Networking

Network Interface Card : Also known as network adapter, interfaces a computer board with the network medium. Repeater : two-ports electronic device that just repeats what it receives from one port to the other. Bridge : a more sophisticated repeater with logic capabilities that filters packets Hub : multi-port repeater. Switch : multi-port bridge

Common Hardware Requirements for Computer Networking Router : links two or more networks (different types too), passing messages with appropriate routing information. Gateway : Similar to routers, links two networks. Modem :Converts digital data originating from a terminal or computer, to analog signals used by voice communication networks such as the telephone system Firewalls : Firewalls are systems that establish access control policies among networks.

Network Interface Card(nic) An expansion board you insert into a computer so the computer can be connected to a network. Most NICs are designed for a particular type of network, protocol, and media, although some can serve multiple networks

Network Interface Card

Repeaters A communications device that amplifies or regenerates the data signal in order to extend the transmission distance. Available for both analog and digital signals, it is used extensively in long distance transmission.

Bridges A Bridge is an electrical device which connects and passes packets between two network segments. In general, a bridge will forward or discard an incoming frame based on the MAC address of that frame.

Hubs Hub's major function is to replicate data it receives from one device attached to it to all others. Hubs differ in the amount of devices that can connect to them, the length of wire that can transmit on, and the type of media they support.

Switches Switch is a device used to link several separate LANs and provide packet filtering between them. Packets are filtered by the switch based on the destination address. Switches can also support numerous transmissions simultaneously.

Routers A device that forwards data packets from one local area network (LAN) or wide area network (WAN) to another. Routers read the network address in each transmitted frame and make a decision on how to send it based on the most expedient route (traffic load, line costs, speed,bad lines, etc.).

Gateways A computer that performs protocol conversion between different types of networks or applications. Gateways function at layer 4 and above in the OSI model.

Gateways (contd..) Examples of gateways found on today's markets are: VocalTec Gateway: A gateway that converts human speech traveling on analog phone lines into local area network protocol data, and visa-versa. RadVision Gateway: Converts video from digital phone lines into local area network protocol data, and visa-versa.

Modems "Modem" (MOdulator-DEModulator). A modem is a device that converts digital data originating from a terminal or computer, to analog signals used by voice communication networks such as the telephone system. At one end, modems convert the digital pulses to audible tones and convert audio tones back to digital pulses at the other.

Modems (contd..) Characteristics : Transmission speed Internal/External Error detection and correction Compression

Firewall Firewalls are systems that establish access control policies among networks. They can block information from entering a network or from getting out of that network, they can permit different users to perform different kinds of operations, according to the user's authorizations.

Firewall (contd..) There are two general types of firewalls: Packet Level Firewalls, which examine packets and decide according to filtering rules whether to pass them to the network. Application Level Firewalls, which monitor specific applications protocols.

Networking Software Networking support is typically provided by two software components: High-Level Networking Software. Network Driver Software.

High-Level Networking Software. Provides end-user-oriented functions that are associated with the Application layer through the Network layer of the OSI model. This is the software that the end user perceives.

Network Driver Software Provides an interface between the high-level networking software and the particular Network Interface Card (NIC) that is being used for physical LAN communication

Commonly Used High Level Networking Software Systems PPP SLIP FTP TELNET SMTP SNMP UDP TCP/IP

PPP Short for Point-to-Point Protocol, a method of connecting a computer to the Internet Developed by the Internet Engineering Task Force in 1991, it has become popular for Internet access as well as a method for carrying higher level protocols.

SLIP (Serial Line IP) A data link protocol for dial-up access to TCP/IP networks. It is commonly used to gain access to the Internet as well as to provide dial-up access between two LANs. SLIP transmits IP packets over any serial link (dial up or private lines)

FTP (File Transfer Protocol) A protocol used to transfer files over a TCP/IP network (Internet,UNIX, etc.). It includes functions to log onto the network, list directories and copy files. It can also convert between the ASCII and EBCDIC character codes.

TELNET A terminal emulation protocol commonly used on the Internet and TCP/IP-based networks. It allows a user at a terminal or computer to log onto a remote device and run a program. Telnet was originally developed for ARPAnet and is an inherent part of the TCP/IP communications protocol.

SMTP (Simple Mail Transfer Protocol) The standard e- mail protocol on the Internet. It is a TCP/IP protocol that defines the message format and the message transfer agent (MTA), which stores and forwards the mail. SMTP was originally designed for only ASCII text, but MIME and other encoding methods enable program and multimedia files to be attached to messages.

SNMP (Simple Network Management Protocol) A widely-used network monitoring and control protocol

UDP (User Datagram Protocol) A protocol within the TCP/IP protocol suite that is used in place of TCP when a reliable delivery is not required. For example, UDP is used for realtime audio and video traffic where lost packets are simply ignored, because there is no time to retransmit. If UDP is used and a reliable delivery is required, packet sequence checking and error notification must be written into the applications.

TCP/IP Transmission Control Protocol/Internet Protocol, the suite of communications protocols used to connect hosts on the Internet. TCP/IP uses several protocols, the two main ones being TCP and IP. TCP/IP is built into the UNIX operating system and is used by the Internet, making it the de facto standard for transmitting data over networks.

Network Operating System Also called as NOS. It is an Operating System that manages network resources. It manages multiple requests concurrently & provides security necessary in a multi-user environment. Ex. : NetWare, UNIX and Windows NT

NetWare A popular local-area network (LAN) operating system developed by Novell Corporation. NetWare is a software product that runs on a variety of different types of LANs, from Ethernets to IBM token-ring networks. It provides users and programmers with a consistent interface that is independent of the actual hardware used to transmit messages.

UNIX A multiuser, multitasking operating system that is widely used as the master control program in workstations and especially servers. Due to its portability, flexibility, and power, UNIX has become the leading operating system for workstations

Windows NT (Windows New Technology) An advanced 32-bit operating system from Microsoft for Intel x86 and Alpha CPUs. it is a self-contained operating system that runs 16-bit and 32-bit Windows applications as well as DOS applications

Facilities Of A Network Operating System Redirection Server software File service

Redirection Redirection is taking something headed in one direction and making it go in a different direction. With redirection, an operating program does not know or care where its output is going.

Server Software Software that resides in a server and provides services to multiple users on the network. A NOS is made of a redirector and a server. Not all machines need to run the server software, because not all computers need to share their resources.

File Service A file server’s primary task is to make files available to users, although it also makes other resources available, including printers and plotters. File service allows users to share the files on a server. The server PC can make its whole disk, certain directories, or certain files available. The file server’s hard disk becomes an extension of each user’s PC.

Network Security Refers to techniques for ensuring that data stored in a computer cannot be read or compromised by unauthorized persons Most security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system.

Network Security The authorization of access to files and directories in a network. Users are assigned an ID number and password that allows them access to information and programs within their authority. Network security is controlled by the network administrator.

Types Of Network Security Share level security. User level security.

Share Level Security In Share-level security access control to a file, printer or other network resource based on knowing the password of that resource. Share-level security provides less protection than user-level security, which identifies each person in the organization.

User Level Security In User-level security access control to a file, printer or other network resource based on username. It provides greater protection than share-level security, because users are identified individually or within a group. User-level permissions are stored in a central server and managed by the network administrator.

Purpose Of Security To Prevent unauthorized individuals form examining sensitive information. To Prevent unauthorized individuals form modifying important information. To Prevent malicious individuals form disrupting the normal operation of a system.

Outline Of The Process Of Securing The Network Risk Assessment Vulnerability Security Policy

Risk Assessment Risk assessment is the process of finding out what data you have and how important is it to you. In addition to the importance of the data is the amount of damage you will incur if it is lost or compromised Risk assessment also means hardware and software analysis

Vulnerability There are dozens and dozens of ways your network can be compromised, and the first step in finding them is by taking a look around. Looking around is literally the first step in assessing your vulnerability

Security Policy Security policy is a written document that outlines the rules by which all users of the network must abide by. These rules can encompass many different aspects of network use and misuse.

Security Policy (contd..) Security policy should address certain issues like: Acceptable use Access User privacy Passwords Enforcement Purchasing Support and maintenance

Default Security Policies The following is an example of a default security policy: Passwords System Level Network Level File and Directory Level Owned By An Individual User Shared Resources Administrative Privileges