This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Technology in ActionTechnology in Action
Chapter 12Chapter 12
Behind the Scenes: Networking and Behind the Scenes: Networking and Security in the Business WorldSecurity in the Business World
Classifications of Classifications of Client/Server NetworksClient/Server Networks
• Extranetspieces of intranets that only certain corporations or individuals can accessUseful for enabling electronic data interchange(EDI)- access to inventory databases and sharing information(partners or industry trade).Use virtual private networks(VPN) for security(VPN) uses the public Internet communications infrastructure to build a secure, private network between various locations.
• All nodes are connected in sequence on a single cable• Each computer on a bus network can communicate with every other computer on the network
directly. • One computer transmits data at a time• Limitation- data collisions occur easily if two computers transmit data at the same time• cap of by terminator ( device that absorbs a signal)
Avoiding Data CollisionsAvoiding Data Collisions on an Ethernet Network on an Ethernet Network
• Star networks are Ethernet networks, to avoid data Star networks are Ethernet networks, to avoid data collisions: collisions: CSMA/CDCSMA/CD ( Carrier Sense Multiple Access with ( Carrier Sense Multiple Access with Collision Detection). Collision Detection).
• With CSMA/CD, (has carrier sense) to determine that no With CSMA/CD, (has carrier sense) to determine that no other nodes are currently transmitting data signals. other nodes are currently transmitting data signals.
• node doesn’t hear any other signals, it assumes it is safe to node doesn’t hear any other signals, it assumes it is safe to transmit data. transmit data.
• When two signals collide, a node on the network detects the When two signals collide, a node on the network detects the collision. Sends a special signal, (jam signal) to all network collision. Sends a special signal, (jam signal) to all network nodes, alerting them that a collision has occurred. nodes, alerting them that a collision has occurred.
• The nodes then stop transmitting and wait a random amount The nodes then stop transmitting and wait a random amount of time before retransmitting their data signals. of time before retransmitting their data signals.
22
3. Transmission Media3. Transmission Media
• The routes data takes to flow between devices on a network
4.Network Operating 4.Network Operating Systems (NOS)Systems (NOS)
• Needs to be installed on each client computer and server connected to the network to provide the services necessary for them to communicate.
• Provide the protocol that controls the communication among devices on the network
• Many modern OSs include NOS client software • Major network operating systems
– Windows Server 2008– UNIX– Novell SUSE Linux Enterprise
29
5. Network Adapters5. Network Adapters• Devices that enable computers to communicate on
a network• Network interface cards (NICs)• Three functions
1.1.They generate high-powered signals to enable network They generate high-powered signals to enable network transmissions. transmissions.
2.2.They break the data down into packets and prepare them They break the data down into packets and prepare them for transmission across the network. for transmission across the network.
3.3.They act as gatekeepers for information flowing to and They act as gatekeepers for information flowing to and from the client computer. from the client computer.
retransmit it– do not transmit signals to do not transmit signals to
specific devices; they just specific devices; they just forward them along the forward them along the media.media.
Hubs– Transmit signals; have
multiple ports• Receive a signal from a
device• Reconstruct the signal• Transmit the signal to
all ports on the hub
Switches and bridges– Send data on a specific route
through the network
• A A switchswitch viewed as a “smart” hub. viewed as a “smart” hub. It makes decisions, based on the It makes decisions, based on the MAC address MAC address ((Physical address of
network adapter) of the data, as to ) of the data, as to where the data is to be sent. where the data is to be sent.
– User ID and password used to access the network– Use of biometric devices– Use of a possessed object for access (identification badges,
magnetic key cards, and smart keys.)
• Access privileges– Enable access to certain network systems – Activity can be tracked to a specific user.
• Physical protection measures– Restrict physical access to sensitive network equipment– Magnetic card readers– Biometric access devices
36
Network SecurityNetwork Security
• Firewalls– Prevent access to the network by unauthorized users– Composed of software and/or hardware– work as packet screeners. Packet screening involves
examining incoming data packets to ensure they originated from or are authorized by valid users on the internal network
– Bastion host/proxy server
A proxy server acts as a go-between for computers on the internal network and the external network (the Internet)