52
COMPUTER NETWORKS COMPUTER NETWORKS

COMPUTER NETWORKS

Embed Size (px)

DESCRIPTION

COMPTER NEWROKS WITH LAN & WAN

Citation preview

Page 1: COMPUTER NETWORKS

COMPUTER NETWORKSCOMPUTER NETWORKS

Page 2: COMPUTER NETWORKS

PREVIEWPREVIEW

What is Networking.Imp Terms.Types of Networks.LAN/MAN/WANTopologies.

Page 3: COMPUTER NETWORKS

COMPUTER NETWORKCOMPUTER NETWORK

A COLLECTION OF CMPTRS INTER-

CONNECTED WITH THE HELP OF A MEDIA

(WIRE,OFC,SATL etc..) IN SUCH A WAY

THAT EXCHANGE OF DATA/INFO TAKES

PLACE.

Page 4: COMPUTER NETWORKS

ADVANTAGES OF NETWORKING• COMN

• RELATIVE PRICE OF CMPTRS VS COMN.

• SHARING OF INFO

• SHARING OF RESOURCES

• SHARING OF APPLNS/PGMES• HIGH RELIABILITY.• IMPROVED COMNS (MAILING).• WEB SERVICES.• DATA SERVICES AND MAINT

CENTRALIZED

Page 5: COMPUTER NETWORKS

IMP TERMSIMP TERMS

Bandwidth. The amount of data that can be transmitted in a fixed amount of time.

Broadband. A type of data transmission in which a single medium (wire) can carry several channels at once. Cable TV, for example, uses broadband transmission.

Page 6: COMPUTER NETWORKS

IMP TERMSIMP TERMS

Domain. A gp of networked computer that share a single Security Accounts Manager (SAM).

Fiber Optic. A type of network

cable that uses a central glass or

plastic core surrounded by a

plastic coating.

Page 7: COMPUTER NETWORKS

Protocol. A predefined set of rules that dictates how cmptrs or devices communicate and exchange data on the network.

Firewall. A combination of hardware and software that protect a network from attack by hackers that could gain access through public networks, incl the Internet.

IMP TERMSIMP TERMS

Page 8: COMPUTER NETWORKS

Gateway. The hardware and software needed to connect two separate network environment so that comn can occur.

TCP/IP (Txn Control Protocol/Internet Protocol) Address An address used by the Internet Protocol that identifies the device's loc on the network.

IMP TERMSIMP TERMS

Page 9: COMPUTER NETWORKS

Ping. A TCP/IP utility used to test whether another host is reachable. An request is sent to the host, who responds with a reply if it is reachable. The request timed out if the host is not reachable.

Server. A computer that provides resources to the clients on the network.

IMP TERMSIMP TERMS

Page 10: COMPUTER NETWORKS

TYPES OF NETWORKS

• SERVER BASED (SERVER TO CLIENT) Contain clients and the servers that support them.

• PEER TO PEER Has no server and uses the network to share resources among indep peers.

• HYBRID NETWORK. A client–server network that also has peers sharing resources. Most net works are actually hybrid networks.

Page 11: COMPUTER NETWORKS

WINDOWS NETWORK OS

Windows NT(New Technology)

Windows 2000 Server

Windows 2000 Advanced Server

Windows 2003 Server (Standard,

Enterprise Editions)

Page 12: COMPUTER NETWORKS

CLIENT-SERVERFILE SERVERCLIENTSNETWK OS IN FILE SERVER.CLIENTS HAVE THEIR OWN OS.CENTRALISED SERVICES—

SECURITY,AND etc..

Page 13: COMPUTER NETWORKS

CLIENT-SERVER

Advantages Strong central security.

Central file storage.

Eqpt sharing.

Dedicated, faster than peer to peer

Easy manageability of large No of cmptrs.

DisadvantageDisadvantage Expensive Dedicated

Hardware.

Expensive network operating system and client license.

A dedicated network administrator reqd.

Page 14: COMPUTER NETWORKS

PEER TO PEER

NO NETWK OS. EACH MACHINE HAS OS.

INDEP MACHINES PHYSICALLY CONNECTED TO EACH OTHER.

RESOURCES ARE SHARED AMONG EQUALS.

NO CENTRAL CONTROLLING AUTH.

ALL MACHINES HAVE EQUAL RIGHTS.

GIVES SHARE LEVEL SECURITY.

Page 15: COMPUTER NETWORKS

PEER TO PEER Advantages No extra investment in

server HW and SW reqd.

Easy setup.

No network Admin reqd.

Lower cost for small network.

Sharing allowed.

DisadvantagesDisadvantages Inability of peers to

handle many NW connections as servers.

No central pt for file storing.

Admin for all cmptrs.

Weak security.

Lack of management which makes large peer networks hard to work.

Page 16: COMPUTER NETWORKS

HYBRID NETWORKS Advantages

• Advantages of server based networking .

• Many of the advantages of peer based NW.

• Ability of users and network administrators to control security based on the imp of the shared resources.

DisadvantageDisadvantage

• Hybrid computing shares the disadvantages of server based NW.

• Expensive Dedicated Hardware.

• Expensive network operating system and client license.

• A dedicated network administrator reqd.

Page 17: COMPUTER NETWORKS

APPLICATIONS OF NETWORKING

• E MAIL

• E CHAT

• VIDEO CONFERENCE

• FILE TFR

• INTERNET

Page 18: COMPUTER NETWORKS

PRE-REQUISITESPRE-REQUISITES

• CONNECTIVITY (HW)

• SW

Page 19: COMPUTER NETWORKS

TYPES OF CMPTR NETWKS BASED ON

TRANSMISSION TECHNOLOGY

• BROADCAST NETWORKS

• PT-TO-PT NETWORKS

Page 20: COMPUTER NETWORKS

BROADCAST NETWORKS

• SINGLE COMN CH SHARED BY ALL CMPTRS ON

NW.

• PACKETS SEND BY ONE CMPTR RECEIVED BY

ALL OTHERS.

• ADDRESS FD IN PACKET- SPECIFIES FOR WHOM

INTENDED.

• PACKET CAN ALSO BE ADDRESSED TO ALL

CMPTRS (BROADCAST).

Page 21: COMPUTER NETWORKS

PT TO PT NETWORKS

• MANY CONNECTIONS BETWEEN INDL PAIRS OF

CMPTRS.

• PACKETS VISIT ONE OR MORE INTERMEDIATE

MACHINES.

• MULTIPLE ROUTES .

• SMALLER NETWORKS – BROADCAST

• LARGER NETWORKS – PT TO PT

Page 22: COMPUTER NETWORKS

TYPES OF COMPUTER NETWKS BASED ON

GEOGRAPHICAL SPREAD

• LAN

•MAN

•WAN

•INTERNET

Page 23: COMPUTER NETWORKS

LOCAL AREA NETWORKS• PRIVATELY OWNED.

• WITHIN SAME BLDG/ CAMPUS – UPTO A FEW KMs.

• SPEED 10/100/1000 Mbps.

• NORMALLY BROADCAST TYPE / SWITCHED - STATIC,

DYNAMIC

• TRANSMISSION TECHNOLOGY - SINGLE CABLE.

• TOPOLOGY (BUS , RING)

• SIMPLE NETWORK MGT

Page 24: COMPUTER NETWORKS

METROPOLITAN AREA NETWORKS

• BIGGER VERSION OF LAN.

• USES SIMILAR TECH AS LAN.

• MAY COVER A CITY.

• CAN BE PRIVATELY OWNED OR PUBLIC.

• NO SWITCHING ELEMENTS (SIMPLE DESIGN).

Page 25: COMPUTER NETWORKS

WIDE AREA NETWORKS

• SPANS LARGER GEOGRAPHICAL AREA.

• COLLECTION OF CMPTRS RUNNING APPLICATION

PROGRAMS (HOSTS).

• SUBNET - CARRY MSGS FROM HOST TO HOST.

• SWITCHING ELEMENTS (ROUTERS).

• PACKET SENT FROM ROUTER TO ROUTER. (STORE AND FWD

/ PT TO PT)

• PT TO PT TOPOLOGIES

Page 26: COMPUTER NETWORKS

INTER-NETWORKS

• CONNECTING DIFFERENT NETWORKS WITH

DIFFERING TOPOLOGIES / INCOMPATIBILITIES

• CONNECTED THROUGH GATEWAYS

Page 27: COMPUTER NETWORKS

WIRELESS NETWORKS

• LOW SPEEDS 1-2 Mbps

• HIGH ERROR RATES

• LIABLE TO INTERFERENCE

Page 28: COMPUTER NETWORKS

LAN TOPOLOGIES• TOPOLOGY THE GEOMETRIC ARRANGEMENT OF

DEVICES IN A NETWORK.

• TYPES OF TOPOLOGIES

• STAR TOPOLOGY

• RING TOPOLOGY

• BUS TOPOLOGY

• HYBRID TOPOLOGY

Page 29: COMPUTER NETWORKS

LAN – STAR TOPOLOGY

Page 30: COMPUTER NETWORKS

LAN – RING TOPOLOGY

Page 31: COMPUTER NETWORKS

LAN – BUS TOPOLOGY

Page 32: COMPUTER NETWORKS

LAN – HYBRID TOPOLOGY

Page 33: COMPUTER NETWORKS

DESIGNING: UNIT LEVEL LAN

Page 34: COMPUTER NETWORKS

DESIGN OF A LAN• NETWORK PLG – NO OF CLIENTS, FUTURE

GROWTH, NW COMPONENTS, NO OF SERVERS, TYPE OF CABLING.

• NETWORK DESIGN – LOC OF SERVERS, TOPOLOGY, PHYSICAL LAYOUT, SOFTWARE USAGE ETC.

BOTTOM LINE; MAKE A BLUE PRINT.

• IMPLEMENTATION AND FINE TUNING.

• PHYSICAL AUDIT – TYPE OF MACHINE, REGD NOS, HARDWARE USERS, OS INSTALLED WITH VER, CD OF OS & OTHER APPLICATIONS.

Contd…

Page 35: COMPUTER NETWORKS

• DESIGNATE SYS ADMINISTRATOR.

• KEEP RECORD OF –

•SERVER CONFIG

•NIC CONFIG

•TCP/IP ADDRESS

•USER NAMES & PASSWORDS

•EMAIL CLIENT CONFIG

•NW SERVICES (PRINTERS, FILE SHARING, PERMISSIONS ETC)

Page 36: COMPUTER NETWORKS

SUGGESTED LAYOUT OF UNIT LAN

SERVER

ADJT

QM

2IC

CODOCU CELL

PAY &ALLCES

CELL

D COY

A COY

B COY

C COY

G BR PRI Q BRA BR

Page 37: COMPUTER NETWORKS

CYBER SECURITYCYBER SECURITY

Page 38: COMPUTER NETWORKS

INFO SECURITYINFO SECURITY

Page 39: COMPUTER NETWORKS

GUIDING PRINCIPLEGUIDING PRINCIPLE

Cyber Security in Army is based on the guiding principle that the person who is generating info is also resp for its security.

Page 40: COMPUTER NETWORKS

• MOST SECURITY BREACHES OCCUR DUE TO : - POOR PASSWORD MGMT. NON ACCTG OF REMOVABLE MAGNETIC MEDIA. STORING OF CLASSIFIED INFO ON CMPTR HDD. POOR NETWORK ADMIN. UNACCTD COPYING OF DATA ON REMOVABLE MEDIA WEAK AUTHENTICATION PROCEDURES & ACCESS

CONTROL. VULNERABILITY OF OP SYS & COTS SOFTWARE. ABSENCE OF ADEQUATE TOOLS & STD FOR DATA

ENCRYPTION

CAUSES OF SECURITY CAUSES OF SECURITY BREACHESBREACHES

Page 41: COMPUTER NETWORKS
Page 42: COMPUTER NETWORKS

LIKELY BREACHESLIKELY BREACHES

PERSONAL SECURITYPHYSICAL SECURITY HARDWARE SECURITYSOFTWARE SECURITYDATABASE SECURITY

Page 43: COMPUTER NETWORKS
Page 44: COMPUTER NETWORKS
Page 45: COMPUTER NETWORKS

SECURITY WHILE USING SECURITY WHILE USING ARMY INTERNETARMY INTERNET

DIAL UP ACCESS NOT PERMITTED. ONLY UNCLAS INFO TO BE TRANSMITTED.

Page 46: COMPUTER NETWORKS

NEVER CONNECT THE NEVER CONNECT THE INTERNET PC TO YOUR INTERNET PC TO YOUR OFFICE LAN OR ARMY OFFICE LAN OR ARMY

INTRANETINTRANET

Page 47: COMPUTER NETWORKS

SECURITY MSR WHILE USING SECURITY MSR WHILE USING INTERNETINTERNET

ONLY STAND ALONE PC TO BE USED. HDD NOT TO HAVE OFFICIAL DATA. ACCESS TO INTERNET ONLY ON NEED BASIS. LATEST AV SOFTWARE, CHECK ALL

DOWNLOADS FOR VIRUSES. FIREWALL PROTECTED. IN CYBER LABS, PLACE PC BEHIND PROXY

SERVER & FIREWALL.

Contd/-

Page 48: COMPUTER NETWORKS

PERIPHERALS ON INTERNET NOT TO BE SHARED FOR OFFICIAL WK.

MAINT USAGE REGISTER IN INTERNET LAB. BIOS, USER, SCREEN SERVER PASSWORD. AVOID ENTICING SITES. PCS AT HOME BEING USED FOR INTERNET - NO

OFFICIAL DATA ON HDD. DO NOT SURF THE NET ON AN ADMIN ACCT.

Page 49: COMPUTER NETWORKS

VIRUS PROTECTIONVIRUS PROTECTION REGULAR CHECK OF HDD. USE ONLY LEGAL SOFTWARE. RUN AV SOFTWARE WHEN OPENING ANY

FILE.

Page 50: COMPUTER NETWORKS
Page 51: COMPUTER NETWORKS

REPAIR & MAINTREPAIR & MAINT AS FAR AS POSSIBLE, IN-SITU REPAIRS. STN WKSP RESP FOR REPAIRS AFTER WARRANTY.

REMOVE HDD BEFORE SENDING TO WKSP. REPAIR THROUGH CIV FIRM DURING WARRANTY.

IN SITU, PHYSICAL PRESENCE OF PERS DURING REPAIRS.

IF SYS TO BE MOVED OUT, REMOVE HDD. UNREPAIRABLE HDD, GET CERTIFIED AS BER.

PHYSICAL DESTRUCTION.

Page 52: COMPUTER NETWORKS