Client-Server Network

Download Report

Transcript Client-Server Network

PowerPoint Presentation to Accompany
Chapter 9
Networks & Communications
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objectives
1. Discuss the importance of computer networks.
2. Compare different types of LANs and WANs.
3. List and describe the hardware used in both wired
and wireless networks.
4. List and describe the software and protocols used
in both wired and wireless networks.
5. Explain how to protect a network.
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objective 1: Overview
From Sneakernet to Hotspots
1. Define computer network and network resources
2. Discuss the importance of computer networks
3. Differentiate between peer-to-peer networks and
client-server networks
Key Terms
 Client
 Client-server network
 Computer network
 Homegroup
 Network resource
Visualizing Technology
 Peer-to-peer network
 Server
 Workgroup
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Computer Networks
 A computer network is two or more computers that
share resources
 Network resources can be software, hardware, or
files
 Computer networks save time and money and
increase productivity
 Windows 7 comes with a new network feature
called homegroup, a simple networking feature
used to network a group of Windows 7 PCs all on
the same home network
Computer Network Types
A peer-to-peer (P2P)
network is one in
which each
computer is
considered equal.
A client-server
network is one that
has at least one
server at its center.
Computer Network Types
Peer-to-Peer (P2P)
 Each device can
share resources with
Every other device
• No centralized authority
• Each computer belongs to workgroup
• Do not need to connect to the Internet
• Most found in homes and small businesses
• Simplest type of network
• Do not need network operating system
• All computers must be on to access resources
Peer-to-Peer Networks
 Each node connected to the network can
communicate directly with each other:
 Peers
 Share peripheral
devices:
 Printers
 Scanners
 When printing, a computer on a P2P network
doesn’t have to go through the computer
connected to the printer. It can
communicate directly with the printer
© 2008 Prentice-Hall, Inc.
7
Peer-to-Peer Networks
 Because they are simple to set up, P2P networks are
the most common type of Home network.
 Computers in a P2P network belong to a workgroup.
 This allows you to
share and
remotely access
files on a
Windows network.
© 2008 Prentice-Hall, Inc.
8
Peer-to-Peer Networks
 Most P2P networks are found in homes or small
businesses.
 A peer-to-peer network doesn’t require a NOS.
 While your personal OS has networking features, the
files and services that are shared between your
home computers aren’t centralized.
© 2008 Prentice-Hall, Inc.
9
Peer-to-Peer Networks
 WINDOWS 7 HAS THE Network and Sharing Center to
help you configure your sharing options.
 The biggest problem with this type of network is that
the computer that’s sharing a resource must be
turned on and accessible by the other computers in
the network.
© 2008 Prentice-Hall, Inc.
10
Peer-to-Peer Networks
 Windows 7 comes with a new networking feature
called Homegroup.
 A Homegroup is a simple way to network a group of
Windows 7 computers that are all on the same
network.
 Members of a homegroup automatically share their
picture, music, and video libraries and printers with
each other without and additional configuration on
your part.
© 2008 Prentice-Hall, Inc.
11
Peer-to-Peer Networks
 You can create a homegroup if your computer is
running Windows 7 Home Premium, Professional,
Ultimate, or Enterprise.
 Once you create a homegroup, Windows will create
a password that you can use to join all your other
Windows 7 computers to the homegroup.
© 2008 Prentice-Hall, Inc.
12
Peer-to-Peer Networks
 Setting up shared resources using a homegroup is
easier than using a regular workgroup.
 You can choose to share Pictures, Music, Videos,
Documents, and Printers.
 If you have computers running other versions of
Windows or Linux or Mac computers, then you will
need to use a workgroup to share resources
between them.
© 2008 Prentice-Hall, Inc.
13
Peer-to-Peer Networks
 Setting up the shares in a workgroup is not difficult
but takes a bit more work than setting up a
homegroup.
 Computers in a workgroup need to have the same
workgroup and account information configured.
© 2008 Prentice-Hall, Inc.
14
Computer Network Types
Client-Server Network
 Has a least one server
at its center
• Provides a way to centralize network management,
resources, and security
• Users log in to a network and are granted access based
on that login
• A server is a multiuser computer system that runs on a
network operating system
• Clients are the PCs and other devices that connect to
the server
Client/Server Networks
 Most networks with 10 or more nodes are
client/server
 Contains two different types of computers
 Client computers
 Computers on which Users
accomplish specific tasks
and make specific requests
 Server computers
 Computers that provide
information or resources to
the client computers
16
Client/Server Networks
 Server computers
 A multiuser computers system that runs a
NOS and provides central administration for
functions on the network




Printing
E-mail
File
Internet access
© 2008 Prentice-Hall, Inc.
17
Client/Server Networks
 As the name implies, both client software and
server software are needed on a client-server
network.
 The client software makes requests, and the server
software fulfills them.
 A domain is a network composed of a group of
clients and servers under the control of one
central security database on a special server
called the domain controller.
18
Client/Server Networks
 You only need to log in to the domain once to
have access to all the servers in the domain.
 The security database includes your user
information:
 Who you are;
 What your password is;
 What your access and restrictions are.
19
Client/Server Networks
 Clients log in to a server and request access to
resources.
 For many types of servers, a special client is
needed.
 When you use your Web browser to access
your e-mail, it serves as an e-mail client.
20
Client/Server Networks
 The browser can also act as:
 An FTP client when you download a file;
 A database client when you access your bank
transactions;
 An HTTP client when you access a Web page.
 Other client software you may use includes VPN
software, desktop, e-mail programs, instant
messaging/chat programs, and even video and
photo software that include an upload feature
21
Client/Server Networks
 Server software is also known as a network operating
system.
 A network operating system (NOS) is a multiuser
operating system that controls the software and
hardware that runs on a network.
22
Client/Server Networks
 It allows multiple computers (clients) to communicate
with the server and each other, to share resources
and security and provides services such as:
 File and print services;
 Communication services;
 Internet and e-mail services;
 Backup services;
 Database services to the client computers.
23
Client/Server Networks
 Servers are classified by the type of services they
provide.
 Some common services are:
 File and print services;
 E-mail;
 Database;
 Web;
 Chat;
 Audio/video;
 Applications.
24
Client/Server Networks
 The Internet is a Client/Server Network.
 When your computer is connected to the
Internet, it is functioning as a client
computer.
 When connecting to the Internet through
an ISP, your computer connects to a
server computer maintained by the ISP.
 The server “serves up” resources to your
computer so that you can interact with
the Internet
25
Computer Networks
 Computer network
 Two or more
computers
 Share resources
 Save time
 Save money
 Increase productivity
 Network resources
 Software
 Hardware
 Files
 Homegroup
 Simple networking feature
 Used to network a group of Windows computers
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Select a computer network that you use (school,
home, work). Is this a P2P or client-server network?
How do you connect to it? What resources do you
access/share on this network?
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objective 2: Overview
LANs and WANs
1. Compare different types of networks
2. Differentiate between small and large networks
Key Terms
 CAN
 Cellular network
 Ethernet
 LAN
 MAN
 PAN
Visualizing Technology





SAN
Topology
VPN
WAN
WLAN
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Networks
Small Networks
Large Networks
 LAN: Local area
 PAN: Personal area
 WLAN: Wireless LAN






WAN: Wide area network
VPN: Virtual private network
CAN: Campus area network
MAN: Metropolitan area network
SAN: Storage area network
Cellular networks
Small Networks
 LAN (local area network): A network
that has all connected devices or
nodes located in the same physical
location.



A home network is a peer-to-peer LAN.
A business LAN is more likely a client-server
network and consists of computers, printers,
and servers as well as the network
hardware that connects them.
Devices on a LAN are connected using
switches.
Small Networks
 PAN (personal area network): A LAN
that consists of devices connected by
Bluetooth, such as a PDA abd a
computer.



Also called piconet.
Bluetooth is designed to be easy to use,
allowing devices to talk to each other
securely over short distances.
Each device in a piconet can connect to
up to seven other devices at a time.

Mice, keyboards, interactive white boards,
headsets, cell phones, PDAs, cameras, media
players, video game consoles, printers.
Small Networks
 WLAN (wireless LAN): A LAN that uses
WiFi to transmit data.


WiFi has a much larger range, higher
speeds, better security, and supports more
devices than Bluetooth.
More expensive and complicated to set up.
Large Networks
 WAN (wide area network): A network that
spans multiple locations and connects
multiple LANs over dedicated lines using
routers.



A college that has multiple campuses would
need to use WAN connections between them.
WAN technologies are slower and more
expensive than LAN technologies.
At home, the WAN you connect to is the
Internet, and the port on your router that
connects to the modem is labeled WAN port,
distinguishing it from the LAN ports your other
devices are connected to.
Large Networks
 VPNs (virtual private networks): creates
a private network through the public
network, the Internet, allowing remote
users to access a LAN securely without
needing dedicated lines.


This is much less expensive and more
practical for businesses, and I some cases, a
VPN even replaces the need for dedicated
lines completely.
VPNs use encryption to ensure the data is
secure as it travels through the public
netowrk.
Large Networks
 CAN (campus area network): A hybrid of
LANs and WANs connected using routers.


In a business that is too large and has too many
computers to manage a single LAN practically, there
may be multiple LANs located in the same location.
These LANs are connected to each other using routers,
technically making them WANs.
 MAN (metropolitan area network):
Covers a single geographic area.

A wireless network in Philadelphia provides
access over much of the city.
Large Networks
 SAN (storage area network): Companies
that have massive amounts of
information to move and store have a
network between the data storage
devices and the servers on a network,
making the data accessible to all servers
in the SAN.

Normal users are not part of the SAN but are
able to access the information through the
LAN servers.
Large Networks
 Cellular networks: Use cell towers to
transmit voice and data over long
distances.

The newest 3G and 4G networks have
speeds that have made these networks a
practical way for people on the move to
connect to network resources, including the
Internet and corporate VPNs from almost
anywhere in the world.
Ethernet
 A home LAN uses the same Ethernet standards
and equipment used in larger business networks.
 Ethernet defines the way data is transmitted over
a LAN.
 Although there are other network standards, Ethernet is
by far the most widely implemented.
 Standards are important because they assure that
equipment that is made by different companies will be
able to work together.
Ethernet
 Ethernet networks transmit signals over twistedpair cable, fiber-optic cable, and WiFi at data
transmission speeds ranging from 10 Mbps to 10
Gbps.
 The maximum speed depends on the type of media
and capability of the network hardware on the LAN.
 Most home networks use100 Mbps Ethernet.
 Regardless if a small or large network, both use
the same Ethernet standards and equipment
Networks
 Computer networks range from two PCs
sharing a printer to large enterprise
networks to the Internet.
 The larger and more complex networks
require more hardware, configuration,
and expertise to manage, but they all
have the same basic purpose – to share
resources.
Make a list of networks that you use. Include home,
cellular, work, and school networks. Label each as
LAN, WAN, or one of the others described in this
article. List the devices you use to connect to each.
What resources do you access?
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objective 3: Overview
The Networking Hardware Store
1. List and describe the hardware used in wired networks
2. List and describe the hardware used in wireless
networks
Key Terms
 Ad hoc network
 Firewall
 Infrastructure wireless network
 Modem
 Network adapter
 ONT
Visualizing Technology
 Router
 Switch
 WAP
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Hardware Used in Networks
A network adapter is
a communications
device used to
establish a
connection with a
network.
The network hardware
are the physical
devices needed to
create the network.
Network Adapters
WIRED
 Each device that connects
to a network must have
some type of network
adapter.
 Most PCs come with a built-in
Ethernet adapter, also called
RJ-45.


Looks like a slightly larger phone
jack.
The cable used for this type of
connection is called twistedpair, Ethernet cable, or Cat-5 (6).
 The other end of the cable
will plug into a wall jack, a
switch, a router, or a modem
Network Adapters
WIRED
 There are several advantages to using a
wired network connection, including
speed, location, and security.
 Network speed is measured in bits per
second.
 Most home Ethernet connections use
FastEthernet connections, which equal
100Mbps.
 No wireless technology can currently reach
the 1Gbps speed, but some can equal or
exceed the 100 Mbps speed.
Network Adapters
WIRED
 Another advantage is that a wired
connection is less subject to interference
and can travel long distances without
slowing.
 A wireless connection that is 150 Mbps at
close range might drop to less than half
that speed at a distance of 300 feet.
 Buildings and other structures can slow or
even prevent a wireless connection from
working.
Network Adapters
WIRED
 Finally, a wired connection is more secure
than a wireless connection, especially if the
wireless connection is not configured with
strong security settings.
Network Adapters
WIRELESS








The WiFi networks found in homes and public places use the
IEEE802.11 standard.
The IEEE802.11 standard ensures that devices developed by
different vendors will work with each other.
Most notebooks come with built-in wireless adapters
USB wireless adapters allow easy connection to devices without
a built-in adapter.
The WiFi Alliance certifies wireless devices to ensure
interoperability
A WLAN is a wireless local area network
An ad hoc network occurs when two wireless devices connect to
each other directly
In an infrastructure wireless network, devices connect through a
wireless access point
Network Adapters
Wired
Wireless
Pros
Cons
1. Maximum speed
1,000 Mbps or 1
Gbps
2. Fast-Ethernet is
100 Mbps
3. Less interference
4. More secure
working
environment
Lack of
portability
Pros
Portability
Cons
1.
2.
3.
4.
Cannot reach the 1
Gbps speed
Prone to
interference
Buildings and
distance can slow or
prevent connection
Needs to be
configured with
strong security
settings
Network Hardware
 A business network consists of routers,
switches, wireless access points, and
firewalls (all in one in a home network).
 The first device on a network is usually the
device that connects to the Internet.



If you use a dial-up connection, this is a traditional
modem.
Cable and DSL have special digital modems.
FIOS has an optical network terminal (ONT).
 You can connect your computer directly to
a modem or ONT, but you can share the
connection with other devices more easily
of you use a router instead.
Network Hardware
 A router is a device that connects two or
more networks together ( your home
network and the Internet).
 A router uses address information to
correctly route the data packets it receives.


In a home network, the router is a convergence
device that serves several functions.
It shares the Internet connection, provides IP
addresses to the other network devices and
provides security for your network.
Network Hardware
 Routers make up the backbone of the
Internet and are responsible for sending
the data packets along the correct route
to their destination.
 Home routers also include a built-in
switch with several ports to connect
multiple devices and can also serve as a
wireless access point.
Network Hardware
 A switch is a device that connects
multiple devices on a LAN.
 Within the network, a switch uses address
information to send data packets only to
the port that the appropriate device is
connected to.
Network Hardware
 To set up a WiFi network, you’ll need a
wireless access point.
 A wireless access point (WAP) is a device
that allows wireless devices to join a
network much like a switch.
 It can be built into a router or it can be a
separate device.
 In a large wireless network, there may be
many WAPs installed.
Network Hardware
 A firewall is a device that blocks
unauthorized access to a network.
 There are both hardware firewalls and
software firewalls.

Such as the software firewall included with
Windows 7.
 A hardware firewall may be part of a
router or stand-alone device.
Network Hardware
 Firewalls can check both outgoing and
incoming data packets.
 A firewall can be configured with filters to
allow/deny various kinds of traffic.
 Firewall filters can be based on an IP
address, protocol type, domain names, and
other criteria.
 Incoming packets that try to access
restricted data will be denied access to the
network.
Networks
The image shows
a home network
that includes
both wired and
wireless devices.
Network Hardware
 The larger and more complex a network,
the more hardware is necessary to assure
the flow of data.
 These devices work together to transmit
and filter data packets around the
network and eventually to their
destination.
 Without the network hardware,
computers could not connect to each
other.
Hardware Used in Networks
 Network hardware
 Physical devices needed to create the
network
 Network adapter
 Communications device
 Establishes connection with network
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Network Adapters
Wired
 Each device on a network must have
network adapter
 Most PCs come with
built-in Ethernet adapter
 RJ-45
 Plugs into wall jack, switch, router, or
modem
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Network Adapters
Wireless
 WiFi networks use the IEEE802.11 standards
 USB wireless adapters
 Easy connection to devices
without a built-in adapter
 WiFi Alliance certifies wireless devices
 WLAN (wireless local area network)
 Ad hoc network
 Two wireless devices connect directly
 Infrastructure wireless network
 Devices connect through a wireless access point
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Network Adapters
Wired
Pros
• Maximum speed
1,000 Mbps
or 1 Gbps
• FastEthernet is
100 Mbps
• Less interference
• More secure
working
environment
Visualizing Technology
Wireless
Cons
• Lack of
portability
Pros
• Portability
Cons
• Cannot reach the 1
Gbps speed
• Prone to interference
• Buildings and distance
can slow or prevent
connection
• Needs to be configured
with strong security
settings
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Network Hardware
 Modem
 Traditional dial-up connection
 Digital modem
 Cable and DSL
 ONT (optical network terminal)
 Used by FTTH
 Router
 Connects two or more networks
 Switch
 Connects multiple devices on LAN
 WAP (wireless access point)
 Allows wireless devices to join network
 Firewall
 Blocks unauthorized access to network
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Home Network
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Open the Network Connections window as described
in this article. What adapters are installed on your
computer? What type of networks do they connect
to? Which of them are connected now? Include a
screen shot in the window.
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objective 4: Overview
The Softer Side
1. List and describe the software used in both wired and
wireless networks
2. List and describe the protocols used in both wired and
wireless networks
Key Terms
 Domain
 IP
 NOS
 Protocol
 TCP
 TCP/IP protocol stack
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Software Used in Networks
Software and protocols allow networks to
communicate with and understand
each other.
Network operating systems,
communication software, and protocols
make a network work.
P2P Software
 No special software is required to
create a simple P2P network
 Modern desktop OSs have networking
capabilities built into them
 Windows 7 includes Clients for
Microsoft Networks, which allows it to
remotely access files and printers on a
Microsoft network
Client-Server Software
ABOUT
 Both client software and server software are
needed on a client-server network
 The client server makes requests, and the
server software fulfills them
 In a network running Microsoft Server OS,
Windows clients do not need any special
client software for file and print services
Client-Server Software
DOMAIN CONTROLLER
 A domain is a network composed of a group
of clients and servers under the control of one
central security database on a special server
called a domain controller
 You only need to log in to the domain once
to have access to all the servers in the
domain
 Clients log in to a server and request access
to resources
Client-Server Software
CLIENT SOFTWARE
For many types of servers, special client
software is needed.
• When you use a Web browser to access
your e-mail, it serves as an e-mail client
• When you download a file, it acts as an FTP
client
• When you access your bank transactions,
it acts as a database client
• When you access a Web page, it acts as
an HTTP client
Client-Server Software
SERVER SOFTWARE
 Server software is also known as a network operating
system (NOS)
 An NOS is a multiuser OS that controls the software and
hardware that runs on a network
 An NOS centralizes resources and security and
provides services
 Servers are classified by the type of services they
provide
 Some common services include file and print, e-mail,
database, Web, chat, audio/video, and applications
 Whenever you log in to a Web site like Facebook, you
are connecting to a server
Network Protocols
Make a list of networks that you use. Include home,
cellular, work, and school networks. List the software
clients that you use to connect to each. What
resources do you access? Do you use different
clients to access different resources?
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Objective 5: Overview
Protecting Your Network
1. Explain how to protect a network using software,
strong passwords, firewalls, and maintenance
Key Terms
 Piggybacking
 Wardriving
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
Network Protection
Layer 1
Hardware-based firewall via router
Layer 2
Strong passwords
Layer 3
Software-based firewall, antivirus and
anti-malware
Layer 4
Keep system up-to-date and secure
Network Protection
 Layer 1 – The Fence:
 The fence is the hardware at the access
point to your network.
 The firewall examines the data packets as
they enter or leave your network and will
deny access to traffic based on rules the
network administrator defines.
 It also shields your computer from direct
access to the Internet, hiding them from
hackers looking for an easy target.
Network Protection
 Layer 2 – Door Locks:
 Door locks are represented by the network
configuration determining what’s shared
and who’s granted access to it.
 Your usernames should have strong
passwords that are hard to crack.
 Each user should be granted access only
to what they need.
Network Protection
 Layer 3 – Alarm Systems:
 The alarm system includes software-based
firewalls and antivirus and antimalware
software on the individual computers on
the network.
 If an intruder somehow breaches your
network, software will detect unauthorized
actions and prevent them.
Network Protection
 Layer 4 – Guard Dogs:
 The network administrator (you??) needs
to be diligent in keeping the systems on
the network up to date and secure.
 It’s critical that software on PCs is kept up
to date.
 Unpatched systems are easy targets for
hackers and can allow them access into
your network.
Networking Ethics
Piggybacking means
using an open wireless
network connection
to access the Internet
without permission.
Wardriving is the practice of driving around and
locating wireless access points.
List the criteria for a strong password.
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall
All rights reserved. No part of this publication may be reproduced, stored in a retrieval
system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the
publisher. Printed in the United States of America.
Copyright © 2014 Pearson Education, Inc.
Publishing as Prentice Hall
Visualizing Technology
Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall