Top Banner
NETWORK SYSTEMS 3.02 UNDERSTAND CONNECTIVITY THROUGH NETWORKS AND THE INTERNET
34

N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Mar 30, 2015

Download

Documents

Annabel Lyde
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

NETWORK SYSTEMS

3.02 UNDERSTAND CONNECTIVITY THROUGH NETWORKS AND THE INTERNET

Page 2: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

COURSE CONTENT

Page 3: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

GOALS

Page 4: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Definition• Provides a path for information to be sent from one computer to another through a network

Types of Transmission Media:•Coaxial cable•Ethernet cable•Fiber optic cable•Wireless transmission

TRANSMISSION MEDIA

Page 5: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Definition• Cable specifically designed for carrying an electronic signal

Features:

•Cable Length (200 – 500 meters)•Cost (Ethernet < Coaxial < Fiber Optic)•Ease of Installation (Moderately difficult to install)•Susceptible to EMI and RFI interference

• Consists of four layers of material to reduce interference

COAXIAL CABLE

Page 6: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Definition• Cable commonly used in high-speed wired computer networks

Features:•Cable Length (Up to 100 meters)•Cost (Ethernet is the cheapest)•Ease of Installation (Easy to install)•Susceptible to EMI and RFI interference

• Twisted pair wiring reduces interference•Types

• Straight-through• Crossover• Rollover

ETHERNET CABLE

Page 7: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Definition• Cable made of super-thin filaments of glass or other transparent materials that can carry beams of light

Features:•Cable Length (Longest transmission, use of light)•Cost (Fiber Optic is most expensive)•Ease of Installation (Difficult to install)

FIBER OPTIC CABLE

Page 8: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

More Features:• Less susceptible to interference• Data can be sent at the speed of light.• A LASER transmitter encodes frequency signals

into pulses of light: ones and zeros are sent through the cable.

• The receiving end of the transmission translates the light signals back into data which can be read by a computer.

FIBER OPTIC CABLE

Page 9: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Definition• Able to connect computers to other computers and printers the same way a wired network is, but without wires and a slower connectivity

Features:•Range (Depends on factors such as wireless card, access point, and obstacles in between)•Cost (Wireless price is dependent upon the complexity of the setup.)•Ease of Installation (Easy)•802.11 (a,b,g,n)•Interference caused by cordless telephones and microwaves

WIRELESS TRANSMISSION

Page 10: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Intranet• A private network that facilitates communication

between departments of an organization or business

• Intranets are accessible by employees inside the organization.

• Cannot be accessed from the outside without the use of an extranet

LIMITED NETWORK CONNECTIVITY

Admin

Shipping

Personnel

Page 11: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Extranet• A network that allows limited access from outside a private network associated with a company• Used for business partners and employees to conduct business from remote locations•Allows business partners to access data to speed up shipping or manage services.

LIMITED NETWORK CONNECTIVITY

AdminShippin

g Personnel

HomeExtranetExtranet

Page 12: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

• Based on data flow• Data flow is the flow of bits of data from one

device on the network to another.• Encapsulation – The creating and formatting of

the data to be sent.• De-encapsulation – The removal of the control

information of the message once it reaches the destination.

INTERNET CONNECTIVITY

Page 13: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

• Bandwidth – Theoretical amount of data that can be transmitted across a given medium

• Throughput – The actual amount of data that can be transmitted across a given medium

• Units of Measurement:• Bits per second (bps) = a small text message• Kilobits per second (Kbps) = a text document• Megabits per second (Mbps) = one or two photos• Gigabits per second (Gbps) = a movie

MEASURING INTERNET DATA FLOW

Page 14: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

• Bandwidth refers to ideal conditions for network speed.

• How fast could you go if you were the only caron the highway?

BANDWIDTH

Page 15: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

• Throughput accounts for the resistance of the medium (the road in this case).

• What if the road wasn’t straight, or there was road construction?

THROUGHPUT

Network Limitations:•Data type•Topology•Congestion•Computer processing

Page 16: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

CATEGORIES OF INTERNET SPEED

Page 17: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

The speed at which a user can retrieve data from the Internet

DOWNLOAD SPEED

Page 18: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

The speed at which a user can send data to a remote location on the Internet

UPLOAD SPEED

Page 19: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

The lag, or length of time, that occurs between each point during information transfer

LATENCY

Page 20: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

LINKING TO THE INTERNET

Page 21: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

To link to the Internet, the user needs to set up service with a company that has a permanent connection and that can provide temporary access to users

INTERNET SERVICE PROVIDER

Page 22: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

To connect to the Internet, a computer must have a unique identifier

INTERNET PROTOCOL ADDRESS

Page 23: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

SECURITY RISKS

Page 24: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

An intrusion to the network

Types:• Hacker• Phishing• Spyware• Adware• Malware

UNAUTHORIZED ACCESS

Page 25: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

A person who finds and exploits weaknesses of a computer

HACKER

Page 26: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

The act of masquerading as a trustworthy website or other entity to acquire user information

PHISHING

Page 27: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Malicious software meant to gain access, disrupt computer operation, or gather sensitive information

MALWARE

Page 28: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

A type of malware that collects user information by tracking the habits of users

SPYWARE

Page 29: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

Advertising software that automatically generates advertisements

ADWARE

Page 30: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

A computer program that replicates itself

VIRUS

Page 31: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

A form of malware that uses the network to spread from host to host

WORM

Page 32: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

A standalone, malicious program that gives access from the infected computer to another computer

TROJAN HORSE

Page 33: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

An attempt to use another’s identity to commit a crime

IDENTITY FRAUD

Page 34: N ETWORK S YSTEMS 3.02 U NDERSTAND C ONNECTIVITY THROUGH NETWORKS AND THE I NTERNET.

• User awareness and education

• Anti-virus software• Firewalls• Passwords

• Complex• Confidential• Varied and changed

regularly

PREVENTION METHODS