Classifications of Client/Server Networks
Download
Report
Transcript Classifications of Client/Server Networks
Technology in Action
Chapter 8
Behind the Scenes:
Networking and Security
1
© 2008 Prentice-Hall, Inc.
Chapter Topics
Advantages of business networks
Client/server vs. peer-to-peer networks
Classifications of client/server networks
Client/server network components
Types of transmission media
Network adapters
Moving data in a client/server network
Securing networks
2
© 2008 Prentice-Hall, Inc.
Networking Advantages
Networks
Increase productivity
Enable the sharing of
hardware resources
Enable the sharing of
software
Facilitate communication
inside and outside the
company
3
© 2008 Prentice-Hall, Inc.
Network Advantages
Sharing networked hardware can reduce costs
Sharing networked hardware can provide access to
a wide range of services and specialized peripheral
devices
Sharing networked software can reduce costs
Sharing data on a network is easy
Networks enable people to work together regardless
of time and place (telecommuting)
4
© 2008 Prentice-Hall, Inc.
Network Challenges
Networks may be vulnerable to unauthorized
access from many sources and locations
More vulnerable than standalone computers
Wireless networks can be tapped from a
“snooping” computer
Networked computers are susceptible to an
increasing number of worms, Trojan horses,
and blended threats
5
© 2008 Prentice-Hall, Inc.
Organizational Structure:
Client/Server and Peer-to-Peer
Where are the resources?
Centralized – Client/Server
resources in the Server(s)
Distributed – Peer-to-Peer (file sharing)
resources in all the machines
6
© 2008 Prentice-Hall, Inc.
Organizational Structure:
Client/Server and Peer-to-Peer
7
© 2008 Prentice-Hall, Inc.
Client/Server Networks
Server-based network
Clients and servers
Data flows efficiently
Servers respond to
requests from clients
Servers perform specific
tasks
Scalable network
Centralized
8
© 2008 Prentice-Hall, Inc.
Classifications of
Client/Server Networks
LAN
Local area network
Computers linked
together over a small
geographic region
9
© 2008 Prentice-Hall, Inc.
Classifications of
Client/Server Networks
WAN
Wide area network
Computers linked
over large
geographic locations
MAN
Metropolitan area
network
Computers linked
together within a city
or county
10
© 2008 Prentice-Hall, Inc.
Classifications of
Client/Server Networks
PAN
Personal area network
Wireless devices connected in close proximity to
each other
Intranet
Private corporate network using TCP/IP
Protected by a firewall from the Internet outside
11
© 2008 Prentice-Hall, Inc.
Constructing
Client/Server Networks
Servers
Transmission media
Network adapters
Network navigation
devices
12
© 2008 Prentice-Hall, Inc.
Servers
Number and type of servers
depend on network size and
workload
Dedicated server
Performs one specific
function
Authentication server
Keeps track of network
logins and services
available
File server
Stores and manages files
13
© 2008 Prentice-Hall, Inc.
Dedicated Servers
Communications server
Handles communications between networks
including the Internet
Often the only device on the network directly
connected to the Internet
Web server
Hosts a Web site available through
the Internet
14
© 2008 Prentice-Hall, Inc.
Dedicated Servers, cont'd
Print server
Applications server
Acts as a storage area for application software
Database server
Manages client-requested printing jobs
Creates print queue (prioritizes print jobs)
Provides clients with access to database information
E-mail server
Processes and delivers incoming and outgoing
e-mail
15
© 2008 Prentice-Hall, Inc.
Transmission Media
The routes data takes to flow between
devices on a network
Wired
Wireless
16
© 2008 Prentice-Hall, Inc.
Network Links
Wired network
Twisted-pair cable
Coaxial cable
Fiber-optic cable
Wireless network
RF signals
Microwaves
Infrared light
17
© 2008 Prentice-Hall, Inc.
18
© 2008 Prentice-Hall, Inc.
Choosing a Cable
Maximum run length
Bandwidth
Bend radius
Cable cost
Installation costs
Susceptibility to interference
Comparison of Characteristics of Major Cable Types
Cable Characteristics
Twisted Pair (Cat 6)
Coaxial (ThinNet)
Coaxial (ThickNet)
Fiber-Optic
Maximum
Run Length
328 feet (100 m)
607 feet (185 m)
1,640 feet (500m)
Up to 62 miles (100 km)
Bandwidth
1,000 Mbps
10 Mbps
10 Mbps
100 Mbps to 2 Gbps
Bend Radius
(Flexibility)
No limit
360 degrees/foot
30 degrees/foot
30 degrees/foot
Cable Cost
Very low
Low
Moderate
High
Installation Cost
Very low
Low
Slightly higher
than ThinNet
Most expensive because of
Installation training required
Susceptibility
to Interference
High
Low
Very low
None (not susceptible
to EMI and RFI)
19
© 2008 Prentice-Hall, Inc.
Twisted Pair Cable
Pairs of copper wire twisted around
each other
Twists make the wires less
susceptible to interference
Shielded twisted pair (STP)
Layer of foil shielding
Unshielded twisted pair (UTP)
Cat 5E: Bandwidth 200 Mbps
Cat 6: Bandwidth 1 Gbps
No foil layer
UTP
STP
20
© 2008 Prentice-Hall, Inc.
Coaxial Cable
Four components
Copper core
Nonconductive insulating material
Braided metal
Plastic cover
21
© 2008 Prentice-Hall, Inc.
Fiber-Optic Cable
Components include
Glass or plastic fibers
Cladding
Outer jacket
Uses light impulses
to transmit data
Immune to interference
Physically smaller
More difficult to install
22
© 2008 Prentice-Hall, Inc.
Network Adapters
Devices that enable computers to
communicate on a network
Network interface cards (NICs)
Three functions
Generate network transmission signals
Create data packets
Act as information gatekeepers
Ethernet compliant
Wireless NICs
23
© 2008 Prentice-Hall, Inc.
Wired Ethernet Networks
Protocol created by Xerox PARC in 70’s
Bandwidth from 10/100 Mbps to 1 Gbps
Connection with Unshielded Twisted Pair
Cat 5, Cat 5E, Cat 6
Network interface card added if not builtin
Switch device works to send data where it
goes, avoiding collisions
Routers work between two networks, like
your network and the Internet
© 2008 Prentice-Hall, Inc.
24
Wireless Ethernet Networks
Use radio instead of wires
Wi-Fi = 802.11 standard
Need a wireless network adapter for each
machine – transmits and receives signals
Radio signals can be blocked by walls,
reduced by distance
WAP – wireless access point – will extend
the range
25
© 2008 Prentice-Hall, Inc.
Wireless Media
802.11 Standard
Wi-Fi, short for Wireless Fidelity
802.11b – first cost-effective wireless devices.
802.11a, 802.11g – bandwidth increased to 54 Mbps
Super G – bandwidth to 108 Mbps
802.11n – will support higher throughput and greatly
increased range
26
© 2008 Prentice-Hall, Inc.
Grid computing
Loosely connected networks of machines
volunteered to work on research
Donate your unused cycles to research
CPUs are idle a lot, software has been
written to make use of those idle machine
cycles
Download software that connects you
SETI, medicine, mathematics, astrophysics
Make sure it’s a project that is legitimate
© 2008 Prentice-Hall, Inc.
27
“Cloud computing”
The Internet is “the cloud”
Your data is stored on servers remotely, not
on your local hard drive
Applications you run (even Office) are via a
web browser
Portable
Cheaper? “software as service”
Like plugging into the wall vs. owning a
generator
© 2008 Prentice-Hall, Inc.
28
Network Security Threats
Human Errors and Mistakes
Malicious Human Activity
Accidents and mistakes
Current and former employees hacking or planting
viruses
Natural Events and Disasters
Hurricanes, floods, fire
29
© 2008 Prentice-Hall, Inc.
Computer Threats
Hackers and Crackers
Viruses
Trojan Horses
Worms
Bots
Combating Malicious Code "Malware"
30
© 2008 Prentice-Hall, Inc.
Hackers and Crackers
Why do they do it?
To
show off their technical expertise
blackmail
espionage
industrial
military
Theft
Global terrorism
31
© 2008 Prentice-Hall, Inc.
Viruses
Viruses are malicious code that enters a
computer and disrupts normal operation
Viruses might deliver a payload, which could
either be annoying or devastating
Trigger events can unleash some viruses
When you check email
On a certain date/time
When your computer starts up
32
© 2008 Prentice-Hall, Inc.
Viruses
Computer viruses attach themselves to a file,
reproduce, and spread to other files and computers
File virus
Boot sector virus
Macro / script virus
Email virus
Main goal is to reproduce itself
Attempts to be unnoticed - stealth mode
Depends on the user to execute a program or open a
file to get started
33
© 2008 Prentice-Hall, Inc.
Trojan Horses
Seems to perform one function while doing
another
Keyloggers record your keystrokes
Backdoors allow unauthorized access to
computers
Wants to be noticed - looks desirable to get
itself installed
A funny video or a cool game
34
© 2008 Prentice-Hall, Inc.
Worms
Designed to spread from computer to
computer - more active than a virus or Trojan
Will send ITSELF without user knowledge if
there is a network connection available
Mass-mailing worms spread to addresses in
the address book on the infected computer
Examples include Klez, Netsky, Sasser
Messages sometimes contain a spoofed address
35
© 2008 Prentice-Hall, Inc.
Bots
A bot is software that can automate a task or
autonomously execute a task
Bots can be useful – system administrators
use them to do repetitive work more quickly
than a human could, “spiders” are bots
Bots can be the payload of a virus or Trojan
Botnets are linked bot-infested computers
Bots can be networked to make a botnet
Used for “DOS” attacks
36
© 2008 Prentice-Hall, Inc.
What can they do?
Malicious code can perform the following activities:
Network traffic jam
Denial of Service attacks
Bot nets
Browser reconfiguration
Delete and modify files
Access confidential information
Performance degradation
Disable antivirus and firewall software
37
© 2008 Prentice-Hall, Inc.
Network Security
Authentication
Access privileges
User ID and password used to access the network
Use of a possessed object for access
Enable access to certain network systems
Physical protection measures
Restrict physical access to sensitive network equipment
Magnetic card readers
Biometric access devices
38
© 2008 Prentice-Hall, Inc.
Network Security
Firewalls
Prevent access to the network by
unauthorized users
Composed of software and/or hardware
Screen and validate data packets
Software firewalls
Norton, McAfee, ZoneAlarm, BlackICE
Hardware firewalls
Usually built into routers
39
© 2008 Prentice-Hall, Inc.
Network Firewall Layout
40
© 2008 Prentice-Hall, Inc.
Combating Malicious Code
Use antivirus software and firewall software on
every computing device you own
keep them up to date
Virus signatures keep changing
McAfee software freely available on
download.uky.edu to all UK students
AVG software www.avg.com free for home use
Do not open suspicious e-mail attachments
Regularly download and install the latest
security patches available for your OS, e-mail
program, and browser.
41
© 2008 Prentice-Hall, Inc.
Combating Malicious Code
Limit sharing disks and other removable
storage media.
Only download programs from reputable Web
sites.
Limit the amount of file-sharing you do
Use anti-virus software to scan all emails and
all files received from someone else
Backup your files regularly
Look for unexpected file extensions – like exe
on a jpg file
Test your computer with Gibson Research’s
free scan
© 2008 Prentice-Hall, Inc.
42
Protecting a Wireless Network
Change your network’s name
Disable the broadcast of its name (SSID)
Change the default password on your router
Turn on WEP (wired equivalent privacy)
(weak) or WPA (wi-fi protected access)
Turn on MAC addresses – so only computers
whose addresses you enter are allowed on
Keep software up to date
43
© 2008 Prentice-Hall, Inc.