Top Banner
Operating Systems Concepts 1/e Ruth Watson Chapter 7 Chapter 7 Introduction to Networks Ruth Watson
24

Chapter 7

Jan 21, 2016

Download

Documents

vartan

Chapter 7. Introduction to Networks Ruth Watson. Objectives (1 of 2). Differentiate between a peer-to-peer network and a client server network Explain the importance of the choice of file system Differentiate between a client computer and a server - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7

Chapter 7

Introduction to Networks

Ruth Watson

Page 2: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 2

Objectives (1 of 2)

Differentiate between a peer-to-peer network and a client server network

Explain the importance of the choice of file system Differentiate between a client computer and a server List at least three different server services Explain the difference between centralized and

decentralized administration Explain the difference between workgroup and

domain membership

Page 3: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 3

Objectives (2 of 2)

Explain why the NTFS file system is more secure than the FAT file system

Define topology Describe the four main topologies Differentiate between a network topology and a

network technology Demonstrate how to configure Local Area

Connection properties Describe the role of the network interface card (NIC)

Page 4: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 4

Introduction

Most professionals work in a Networked environment

Security becomes an issue in a networked environment

When designing networks, there are specific guidelines to follow, such as: Type of Network File System Security

When implementing a network, the physical structure includes: NIC Cards Cables Transmission media Hubs Switches Routers

Page 5: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 5

Important Terms to Understand Attenuation

Bus Client/server Cluster Ethernet FAT32 File system Hub LAN (local area network) MAN (metropolitan area

network) Media Network

NIC (network interface card) NOS (network operating

system) NTFS Peer-to-peer Repeater Ring Router Slack space Star Switch Token Ring WAN (wide area network)

Page 6: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 6

Network Scope

Local Area Network (LAN) Small Network Usually confined to a building or

an office floor

Wide Area Network (WAN) Two or more LANs connected

together The Internet is an example

Metropolitan Area Network (MAN) Covers a large area, such as a

city

Page 7: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 7

Types of Networks - Peer-To-Peer

Good for small environments, usually up to 10 computers

No dedicated network administrator

Each computer must have specific permissions assigned

Sharing resources can become a problem if the computer with the resource is down

Security is a serious issue

Page 8: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 8

Types of Networks - Client/Server

A server has a special Network Operating system (NOS) to help provide resources to multiple users

Client/Server environments usually have one or more network administrators

Problems can include access, security, and integrity of data

Backups are needed in this environment

Page 9: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 9

Types of Networks - Home Networks

Home networks are becoming more popular Typically peer-to-peer Set up is fairly easy

A router keeps track of all the computers inside the home network

Computers are configured with fake IP addresses that allow them to communicate

Page 10: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 10

Centralized vs. Decentralized

Centralized Client/Server Environment

Resources are on server

Backup is easier

Profiles are easy to keep

track of

Decentralized Peer-to-Peer

Environment Resources are spread

out

There are no profiles

Page 11: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 11

Workgroup vs. Domain

Workgroup Peer-to-Peer

Environment Effective for small

environments

Security is a problem

Domain Client/Server

Environment Effective for larger

environments

Network administrator

has control

Page 12: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 12

Files Systems

A file system keeps track

of files and folders DOS uses FAT (File

Allocation System

Windows 2000 uses NTFS

(New Technology File

System)

Page 13: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 13

Choosing a File System

Files systems keep track of files and folders

There are several file systems to choose

A file system determines how files can be named and length of file names

Each operating systems has its own file system LINUX: ext2 or ext3 Windows 2000: NTFS or FAT32

Page 14: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 14

Security

How much security you need helps to determine a file system

FAT/FAT32 is good on stand alone computers

NTFS should be used on networks

Page 15: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 15

Network Topology - Bus

Computers are daisy chained together in a linear bus Commonly used in the 1980’s Least expensive Easiest to setup Uses coax cable Data packets are sent along the

coax cables All computers hear data sent out A BNC connector is used for the

NIC card If there is a break in the computer,

the other computers are disturbed

Page 16: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 16

Network Topology - Star Computers are concentrated into a

star pattern using hubs or switches Most LANs use Star topology Uses Category 5 cable (cat 6 is on

the way) Cat 5 cable uses an RJ-45 connector

for the NIC card Easy to install Not that expensive Hubs broadcast data to all devices Switches can be used instead of

hubs Switches can help segment data

traffic but are more expensive If there is a break in the cable, it does

not disturb the other computers

Page 17: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 17

Network Topology - Ring

Not used as often as the Star Uses different hardware More expensive Complex to install Best at passing data with

less collisions

Page 18: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 18

Network Technology - Ethernet

Ethernet was developed by Bob Metcafe and D.R. Boggs at the Palo Alto Center in the early 1970’s

Multiple cables and protocols can be used with Ethernet

Different networks can be connected, such as: Windows Macintosh Novell Unix

Page 19: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 19

Network Technology - Token Ring Token Ring uses a

different access method Only one device

transmits at a time Each device checks to

see if the data is for them Fewer collisions

Page 20: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 20

Protocols

Protocols are agreed upon rules that networked devices use to communicate

Different organizations came up with different protocols TCP/IP resolved issues

and enabled all computer platforms to communicate

Page 21: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 21

LAN Components

LAN components include: Repeaters

Used to amplify data signals due to attenuation

Hubs Act as a concentrator to

connect several computers

Switches Intelligent hubs that segment

traffic to avoid collisions

Routers Must have to be able to

access the Internet

Page 22: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 22

Network Interface Card (NIC)

NIC enables computers to communicate through a unique media access control (MAC) address

The MAC is burned in at the factory

Page 23: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 23

Summary

You don’t have to be a technology specialist to network your home Networks range from very small to very large A server has a special operating system on it that allows multiple

users to log in at the same time Peer-to-Peer networks require no server, but security is an issue A Client/Server network must have at least one dedicated server and

a network administrator There are four ways to connect your network: bus, star, ring, or

hybrid Protocols are rules that allow computers and other devices to

communicate The most common protocol is TCP/IP

Page 24: Chapter 7

Operating Systems Concepts 1/e Ruth Watson Chapter 7 24

Questions?