Top Banner
1
47

1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Dec 22, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

1

Page 2: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Technology in Action

Chapter 12

Behind the Scenes: Networking and Security in the Business World

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 2

Page 3: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter Topics

• Advantages of business networks• Client/server vs. peer-to-peer networks• Classifications of client/server networks• Client/server network components• Types of servers• Network topologies

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3

Page 4: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter Topics (cont.)

• Types of transmission media• Network software• Network adapters• Moving data in a client/server network• Securing networks

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 4

Page 5: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Networking Advantages

• Networks– Increase productivity– Enable the sharing of hardware resources– Facilitate knowledge sharing– Enable the sharing of software– Facilitate Internet connectivity– Enable enhanced communication

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 5

Page 6: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Networking Disadvantages

• Networks– Complex– Additional personnel required to maintain

them– Require special equipment and software

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 6

Page 7: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Client/Server Networks

• Data flows efficiently

• Servers respond to requests from clients

• Servers perform specific tasks

• Scalable• Centralized

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 7

Page 8: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Classifications of Client/Server Networks

• LAN– Local area network– Computers linked over

a small geographic area

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 8

Page 9: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Classifications of Client/Server Networks (cont.)

• WAN– Wide area network– Computers linked over

large geographic areas

• MAN– Metropolitan area

network– Computers linked

within a city or county

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 9

Page 10: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Classifications of Client/Server Networks (cont.)

• PAN– Personal area network– Wireless devices connected in close proximity

to each other• Intranet

– Private corporate network– Protected from the Internet by a firewall

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 10

Page 11: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Classifications of Client/Server Networks (cont.)

• Extranets– Only certain corporations or individuals can

access– Useful for enabling electronic data

interchange– Use virtual private networks for security

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 11

Page 12: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Constructing Client/Server Networks

• Servers• Network

topologies• Transmission

media• Network operating

system software• Network adapters• Network

navigation devices

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 12

Page 13: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Servers

• The number and types of servers depend on network size and workload

• Dedicated servers– Perform one specific function

• Authentication servers– Keep track of network logins and services

available• File servers

– Store and manage files

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 13

Page 14: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Servers (cont.)• Print servers

– Manage client-requested printing jobs– Create a print queue (prioritize print jobs)

• Application servers– Act as a storage area for application software

• Database servers– Provide clients with access to database

information• E-mail servers

– Process and deliver incoming and outgoing e-mail

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 14

Page 15: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Servers (cont.)

• Communications servers– Handle communications between networks,

including the Internet– Often the only device on the network directly

connected to the Internet• Web servers

– Host a Web site available through the Internet

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 15

Page 16: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Topologies

• The physical or logical layout of computers, transmission media, and other components

• Types of network topologies– Bus– Ring– Star– Hybrid

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 16

Page 17: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Bus Topology

• All nodes are connected in sequence on a single cable

• Networked computers communicate with each other

• One computer transmits data at a time• Becoming obsolete

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 17

Page 18: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Ring Topology

• Nodes are laid out in a ring

• A token (data packet) flows in one direction from device to device

• Recent versions have data transfer rates of up to 100 Mbps

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 18

Page 19: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Star Topology

• Most widely deployed client/server layout

• Nodes connect to a central communications device (switch)

• A node sends a signal to the switch, which retransmits it to the other nodes

• A node accepts only signals addressed to it

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 19

Page 20: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Avoiding Data Collisions on an Ethernet Network

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 20

Page 21: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Comparing Topologies

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 21

Topology Advantages DisadvantagesBus Uses a minimal amount of cabling. Breaks in the cable can disable the network.

Easy, reliable, and inexpensive to install.

Large numbers of users will greatly decrease performance because of high volumes of data traffic.

Ring Allocates access to the network fairly.Adding or removing nodes disables the network.

Performance remains acceptable even with large numbers of users.

Failure of one computer can bring down the entire network.Problems in data transmission can sometimes be difficult to find.

StarFailure of one computer does not affect other computers on the network.

Requires more cable (and possibly higher installation costs) than a bus or ring topology.

Centralized design simplifies troubleshooting and repairs.

The switch is a central point of failure. If it fails, all computers connected to that switch are affected.

Easy to add more computers or groups of computers as needed (high scalability).Performance remains acceptable even with large numbers of users.

Page 22: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Transmission Media

• The routes data takes to flow between devices on a network

• Wired – Twisted-pair– Coaxial– Fiber optic

• Wireless

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 22

Page 23: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Choosing a Cable

• Maximum run length• Bandwidth • Bend radius• Cable and installation costs• Susceptibility to interference• Signal transmission methods

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 23

Page 24: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Twisted-Pair Cable• Pairs of copper wire twisted around each other• Twists make the wires less susceptible to

outside interference• Two types

– Shielded twisted-pair (STP)– Unshielded twisted-pair (UTP)

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 24

Page 25: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Coaxial Cable

• Four components– Copper core– Nonconductive insulating material– Braided metal– Plastic cover

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 25

Page 26: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Fiber-Optic Cable

• Components include– Glass or plastic fibers– Cladding– Outer jacket

• Uses light impulses to transmit data

• Immune to interference

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 26

Page 27: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Wireless Media802.11 Standard

• In business, wireless media are usually add-ons to a wired network

• Wi-Fi 802.11 standard

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 27

Page 28: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Operating Systems (NOS)

• Provide services necessary for client computer and server to communicate

• Many modern OSs include NOS client software

• Major network operating systems– Windows Server 2008 R2– UNIX– Linux– Novell SUSE Linux Enterprise

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 28

Page 29: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Adapters• Devices that enable computers to

communicate on a network• Network interface cards (NICs)• Three functions

– Generate network transmission signals– Create data packets– Act as information gatekeepers

• Ethernet compliant• Wireless NICs

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 29

Page 30: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Navigation Devices

• Media access control (MAC) address– Six two-position characters (such as

01:40:87:44:79:A5)– Physical address of network adapter– Internal network identification

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 30

Page 31: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Navigation Devices (cont.)

• Switches and bridges– Send data on a

specific route through the network

– Bridges send data between collision domains

• Routers– Send information

between two networks

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 31

Page 32: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Security Threats

• Human errors and mistakes• Malicious human activity

– Current and former employees hacking or planting viruses

• Natural events and disasters– Hurricanes, floods, fire

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 32

Page 33: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Security

• Authentication– User ID and password used to access the network– Use of biometric devices– Use of a possessed object for access

• Access privileges– Enable access to certain network systems

• Physical protection measures– Restrict physical access to sensitive network

equipment– Magnetic card readers– Biometric access devices

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 33

Page 34: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Security (cont.)

• Firewalls– Prevent access to the network by

unauthorized users– Composed of software, hardware, or both– Screen and validate data packets– Bastion host/proxy server

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 34

Page 35: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Network Firewall Layout

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 35

Page 36: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What are the advantages of a business network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 36

Page 37: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• How does a client/server network differ from a peer-to-peer network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 37

Page 38: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What are the different classifications of client/server networks?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 38

Page 39: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What components are needed to construct a client/server network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 39

Page 40: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What do the various types of servers do?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 40

Page 41: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What are the various network topologies (layouts), and why is network topology important in planning a network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 41

Page 42: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What types of transmission media are used in client/server networks?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 42

Page 43: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What software needs to run on computers attached to a client/server network, and how does this software control network communications?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 43

Page 44: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• How do network adapters enable computers to participate in a client/server network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 44

Page 45: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What devices assist in moving data around a client/server network?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 45

Page 46: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

Chapter 12 Summary Questions

• What measures are employed to keep large networks secure?

Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 46

Page 47: 1. Technology in Action Chapter 12 Behind the Scenes: Networking and Security in the Business World Copyright © 2012 Pearson Education, Inc. Publishing.

47

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic,

mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.

Copyright © 2012 Pearson Education, Inc.  Publishing as Prentice Hall

47Chapter 12