Sei sulla pagina 1di 36

Networks

By: Djamel Mizi, Frederick Ciesla, John Tazbazian, and


Nicholas Wallace
What is a Network?
Networks allow global collaboration and sharing of information and
ideas. Networks are also extremely important in modern society and are
constantly growing.
Network Components
1)Servers
Servers- are computers that are assigned responsibility for certain
tasks for the whole network
File Servers- Store users files and data, and they also control the
access to them
Application Servers- perform a similar function for software
applications. These can be used on all computers that are on the server
Printer Servers- these control all of the printers on the server
Database Server- hosts the information and manages access to it
Authentication Server- Processes login requests and determining
whether a user should be allow access
Web Server- stores the web pages and shows them to the servers.
Client Computers- Usually desktops
2) Clients
Clients may range from any type of computer, desktop, laptop, and or
mobile PC. These clients rely upon the servers, shared devices, and
hubs in order to effectively have a client server network.
3) Shared Devices
Benefits- A multitude of computers can use one device without having
to wait

Network Hub- a device that connects multiple computers or other


network devices together

Ethernet Cable- This is the cable that can be connected to the


computer and the network hub to create a network
4) Hubs, Routers, and Switches
Hubs, Routers, and Switches- These all include Ethernet ports so
that it is easy to connect multiple computers to them.
Wi-Fi- This allows connections to the internet wirelessly without an
Ethernet cable
Hubs- Receives data and re-broadcasts it to every connected
device
Switches- More advanced than hubs, they inspect the data they
receive to determine the intended destination. These only
connect to the local area network (LAN)
Routers- Connect two or more separate networks.
Ie. School
Network Architecture
What is a network architecture?
The network architecture is essentially the way computers are logically
organized on a network. This relationship that the client computers and
servers have can be broken down into two main types of architectures
used.
Two types of architectures
There is the client-server network, which is where one or more
servers provide service to a network of computers connected. There is
usually a central server and files owned by any individual can be
accessed by any computer connected to the network itself.

The other type is the thin client server network. In this particular
type of network the clients rely heavily on the servers to provide
storage for the clients. In addition the servers act a terminal for
accepting input and displaying output. Also must run software on the
client's behalf.
Firewalls
Firewall- Hardware or software that determines which data is allowed
to enter and leave a network.
Hardware firewalls- Can be built into computers or networks
Software firewalls- Programs that can be installed that does the
same thing
IP Address- The address that identifies a computer. If the address is
not allowed access it will be blocked
Domain Names- Access to particular websites based on their name
Application Program- Individual programs can be granted on the
network.
Proxy Servers
- Proxy servers act as the middle step between computers.

- All communication between the two computers is passed via proxy


server.

- Proxy servers cache data, or collect common communicated data


for future reference.
Types of networks
Networks
- Local area networks. (LAN)- Network confined to a geographical area
such as a home or office building. These allow for easy access in
organizations and are extremely common.

-Wireless LAN (WLAN)- Network is confined to geographical space but is


easy to connect to. Protected by security precautions.

-Metropolitan/Wide area networks (MANs/WANs)- Networks used over


very large areas such as campuses or even large cities. Enable very
large effective sharing of information.
Contd
-Personal area networks (PANs)-Created when personal devices are
connected to a computer. Normally very small and used to transfer data
or synchronize devices.

-Storage area networks (SANs)- Specialized area network specifically for


storing data. Contain multiple hard disks which are connected to LANs
using high fiber optic wire. Biggest advantage is that all storage is
saved in one location and it makes backup tasks a lot easier.

- Virtual private networks (VPNs)- Uses encryption to create an


encrypted tunnel from one computer to another network in another
location.
Contd again
Finally there is

-Virtual LAN (VLAN)- Connects geographically separated computers to


one virtual network. Concept is similar to VPN except instead of
individual computers, entire networks can merge on a larger scale. Very
important for large businesses with separated offices.
Network connections
Wired connections
There are a variety of methods that are used to connect computers to
one another. The option used depends on how far apart the computers
are from each other.

In wired connections the means of transferring data is by Fiber optic


cables.

- Fiber optic cables- Transfer data by sending light down an


extremely thin glass tube. Offers extremely fast connection speed.
Over 40 Gigabits per second. However they are expensive, around
70 dollars a meter.

- Cable internet access- Most common forms of broadband internet


access. Use the existing cable television network to transfer data.
Contd
Digital subscriber connections, (DSL) also use existing telephone
networks and a cable modem to convert data for use over the network.

Dial Up- A very old way of connecting a computer to a telephone line


as means of transferring data and connecting to a network. Requires a
modem to connect analog to digital. Extremely common before
broadband internet access became popular.

Ethernet cables- Standard cables use for local area networks. Can
transfer data at high speed over relatively short distances. Computers
must have an ethernet card that supports the network speed being
used
Wireless connections
In addition to the wired connections there are also many ways in which
computers can be connected wirelessly.

WiMax- Worldwide interoperability for microwave access is a wireless


technology that is designed to transfer data up 50 kilometres away. The
bandwidth is relatively high at about 50 megabytes per second. Good
for areas where cables would be difficult to use.

Wi-Fi- Wireless fidelity is the standard for wireless connectivity in a


relatively small area. Wi-Fi devices connect to a router and from there to
the internet. Wireless hotspots are offered in many hotels, cafes, and
stores to allow internet access.
Contd
Other forms of wireless connections include but are not limited to..

Bluetooth- Wireless technology used for short distances in connecting


computers to mobile phones, games and other small devices.

3G and 4G- Standards for communication that operate using the


mobile phone network. Extremely effective when there is no access to
Wi-Fi and the user must have internet access.
Communicating on a network
MAC Addresses and Protocols
-MAC (Media Access Control) Address is a unique number built into
every network device. These addresses cannot be shared and are
stored in the ROM because they cannot be changed (unless you are
doing something illegal).

-Protocols are set rules about how to do something. The communication


standards are developed in the protocol to allow for different types of
communication.
IP (Not to be confused with IB)
-IP (Internet Protocol) governs how devices on a network are identified,
and how information is routed between them. It is used on more than
just the internet.

-IP addresses are assigned to a machine to identify that machine on a


network. It is four groups of numbers separated by dots. Ie. 192. 168.
2.5

-DHCP(Dynamic Host Control Protocol) serves assign an IP address to a


computer which keeps track on all the addresses on the network.
However they can be changed manually, but no two ip addresses can
be the same.

- A public IP address is shown on the network gateway when a private


TCP and Ports
TCP (Transmission Control Protocol) deals with ensuring that data is sent
and received correctly. TCP is the other half of IP because they carry out
what the IP sets up. If an error is made in sending the data the TCP is in
charge of resending the data.
-Ports identify the services available on networked computers.
Some examples or ports are Port 80 which is used for HTTP and port
110 which is used for POP (email).
The Internet
The Internet Backbone
The internet is a network of networks all over the globe.

Local networks such as homes or business users are connected to the


internet by Internet Service Providers (ISP). Those ISPs are connected
to national network service providers (NSP).

Internet Backbone- the series of high speed links which connect major
geographical areas. These cables often run under the ocean.
Data Routing
How to send an email from New York to Spain

1.Data must travel through many systems before it reaches its


destination.

2.This happens quickly, but it hops to many different places before


the final destination.

3.When sending an email and hit send it goes to the LAN.

4.Then it will go the the Internet Service providers

5.That ISP sends it to the National Service Provider

6.That provider is connected to the internet backbone


Internet Backbone
Domain names
IP addresses may help computers identify with each other on a
network,they are not very useful for humans. As a result Universal
resource locations were created.

URLs- Short yet memorable domain to access a specific website or


location. URLs have several parts...

The domain name, for example- itgstextbook.com

The top level domain, (TLD)- .com

The host name- www.itgstextbook.com

And the filename- index.html


Domains contd
There are a variety of TLD or top level domains that exist. They
include..

- Org- Mainly used for charities and non-for-profits.

- Mil- Military sites

- Edu- Educational sites

- Gov- Government sites

- Others may be country specific, UK, US, SV


DNS
A domain name system is responsible for translating domain names
that people type in into IP addresses that the computer can recognize.
DNS consists of entire servers dedicated to matching these domain
names with IP addresses.

DNS poisoning- An attempt to falsify DNS data in order to commit


crimes.
Internet protocols
Protocols that govern communication between web servers are known
as HTTP. More commonly known as hypertext transfer protocol.
There is a variation of HTTP which are used in order to securely
communicate with servers.

HTTPS-Hypertext transfer protocol secure is used in order to encrypt


data that is going between the computer and servers online. Essential
for sending valuable data and transcriptions.

HTTPS uses transport layer security in order to send encrypted data


from the computer to the server online and you can even visibly see a
padlock icon on the browser window when HTTPS is being securely
used.
Synchronous or Asynchronous Transfer
Asynchronous transfer is where the sender and receiver are not
together in time.

Ie Emails

Synchronous transfer- the sender and receiver are doing this at the
same time.

Ie facetiming
Internet vs Web
The internet is the physical network of computers across the globe
using TCP?IP

The world wide web is just one of the services that runs over the
internet providing access to interlinked web pages containing text and
images.
WEBSITE LINK

http://itgsnetworkpresentaion.weebly.com

Potrebbero piacerti anche