Transcript

Introduction to Networking

Why use networks?Physical network structureNetwork ServersNetwork ClientsNetwork Operating SystemsLANs and WANs

What Is A Network?

Why Use Networks?Sharing…

DataSoftwarePrintersProcessing powerAccess to the Internet

Controlling…SecurityAdministration

The Network Server

Printing

Data

Software

Access to the Internet

The Network Client

Uses Resources

Write file to drive C:

Write file to drive X:

Peer-To-Peer Networks

Using

Using

Using

Using

Sharing

Sharing Sharing

Limitations

300 ft. effective range from access point1400 ft maximum range

Structural interferenceInterference from other devices such as

cordless phones.

Client/Server Networks

Using

Sharing

Using Using

Network Operating Systems

Several productsMicrosoft Windows NT/2000/2003Novell NetwareBanyan Vines etc

All run on the server and share resourcesHard disk spacePrinters etc

Directory Services

Centralized control of all network resourcesMicrosoft Windows 2000

Active DirectoryNovell Netware

Network Directory Services (NDS)Banyan Vines

Network Interface Card

Physical interface for the PC to the cable

Can be add-on adapter PCMCIA/Cardbus ISA/EISA PCI

Often built into motherboard Has a unique physical address

(MAC Address)

Network Cables

CoaxialThin and Thick Ethernet (10Base2,

10Base5) – used to transmit videoUnshielded Twisted Pair (UTP)

10baseT, 100baseT (most commonShielded Twisted Pair (STP)Fiber-optic

Local Area Networks (LANs)

Wide Area Networks (WANs)

Cable-Less (i.e. Wireless) Connections

Narrow band radio transmission (RF)Subject to interferenceSecurity issues

Infra-red transmission (IR) Line of sight requiredOther light sources can interfereEx. Palm beaming/CPS “clickers”

Standards

IEEE 802.11.b –2.4GHz – 11MbpsIEEE 802.11.a – 5GHz – 54 MbpsIEEE 802.11g – 2.4Ghz – Hybrid

11/54Mbps (most common)New! IEEE 802.11n – up to 100

Mbps

Security Overview

WEP - Wired Equivalent Privacy 40 bit vs. 128 bit

Is Encryption Necessary?

Open access vs. Secured

Other Security MeasuresContent Filtering

Network Partitioning

Applications

Any application currently used on a traditional wired network can be used on a wireless network.

New applications may be available or can be developed to take advantage of wireless, such as Wireless PDA access to a card catalog.

Wireless Network Components

Access Points NICs – Network Interface Cards

PCMCIA USB PCI CompactFlash

Other Wireless Devices Bridges and Routers Print Servers

PCs, Laptops, PDAs, even Projectors

Security (Encryption, Content Filtering, Privacy, etc.)

Content Filtering & Proxy ServersWeb content filtering that has generally been

software on the desktop would have to be handled by a server if people are allowed to use their own laptops. Note: This is required by CIPA for all government organizations, including schools.

Proxy servers allow you to control what information people have access to. This is a good practice anyway, allowing you to control at a global level what information travels over your network. It also allows you to track usage.

Security (Encryption, Content Filtering, Privacy, etc.)

Viruses and HackerWireless does not add any additional threat

in the way of viruses. Anyone, anywhere can attack a network

that is connected to the Internet. Wireless does not increase that chance. Security measures such as firewalls, can reduce the risk.

Why Deploy Wireless?

Cost savings over wireline.Can not run wire to locations needed.To enable patrons to bring their own

laptop, therefore reducing the cost of owning many PCs.

To enable you to easily move PCs.To be on the leading edge.

Cost

802.11b Wireless Access Points start around $100.00 for basic connectivity and run up to $500.00 for more management features.

802.11b Network Interface Cards (NICs) cost between $50-$100 and come in USB, PCI (desktop), PCMCIA (laptop) and CompactFlash versions.

Bluetooth – 802.15

Bluetooth is the standard for wireless personal area networks or WPAN. It allows high speed transmission of data over very short distances.

Bluetooth is normally used for transferring data between laptops or devices, or in Internet Kiosk type applications where roaming is not needed.

Networking Technology Review

Why use networks?Physical network structureNetwork ServersNetwork ClientsNetwork Operating SystemsLANs and WANs

top related