Media:Networking
Download
Report
Transcript Media:Networking
Introduction to Networking
Key Terms
packet
server
envelope of data sent between computers
provides services to the network
client
requests actions from a server (i.e. makes
requests to a server)
Local Area Network (LAN)
computers and peripherals directly linked together in
a single area
enables sharing of peripherals (e.g. printer)
commonly uses client-server model
room, office, or building
one machine acts as the central node (server)
all others are clients
LANs may connect to other LANs or to the outside
using a “gateway”
Wide Area Network (WAN)
a really, really big network
your house ISP Internet
Washington-Lee Yorktown etc.
allows a computer to connect to other
computers over a wide geographic area
Hardware
network cable
Network Interface Card (NIC)
hub
connects together multiple computers or segments
any incoming data will be broadcasted out to all ports
switch
connects together multiple computers or segments
analyzes network traffic and learns which machines are
connected to particular ports
incoming data is forwarded through proper port
router
forwards traffic to proper destination
programmable (e.g. filter traffic)
gateway
a computer that connects users of a LAN to another network
Types of Network Cables
Modes of communication
Telephone lines ~ dialup
Coaxial cable ~ cable internet
Twisted pair ~ ethernet
Fiber-optic ~ FIOS
Microwave (high frequency radio) ~ wifi
Satellite
Topologies
network layout
in what configuration are the computers
connected together
Example configurations:
star
bus
hybrid
Bus topology
single cable used to link all computer together
all computers can “see” all traffic, but only grab their respective
data
Star Topology
computers are
connected to a switch
or hub
if any client machine
fails, the network keeps
on truckin’
Hybrid Topology
a combination of two or more topologies
Example: star-bus topology
More Key Terms
data integrity
making sure that what is received is what was transmitted
how does data integrity compromised?
noise / interference on a line error in message
hacking (hax0ring)
data security
preventing unauthorized access to data
examples:
required user logins
data encryption
permissions (one user cannot access another user’s data)
Packets
an envelope of data sent between computers
typically contains:
source (origin) address
destination address
sequence numbers (for packets that combine into
one larger piece of data)
timestamp (i.e. postmark)
Packet-switched vs. Circuit-switched
Networks
http://vimeo.com/10347883
Packet Switching
Break data up into packets & transmit
Individual packets are not all necessarily
transmitted through the same links
Each packet travels over the best available
link at the time
Packets may arrive at destination out of order
must be re-ordered and reassembled
(protocol!)
Protocols
technical word for “agreed set of rules”
“Jack Bauer breaks protocol”
networking protocols define how two computers
exchange information
initiating a message (multiple packets!)
acknowledging that a message has been received
error checking
compression
Internet Protocol
source (origin) address
destination address
Activity:
Each person receives an address on a card
One person in each row will be a switch
Rules:
The switch will write down on his/her card that he/she is a
switch
The switch will write down the range of addresses on their
card
NO TALKING
Switches can move cards
As a class, we will send several messages
IP Problems
What happens when we send large data?
Let’s try to send lots of messages now
Problems?
Transmission Control Protocol
Messages now contain
sequence numbers (for packets that combine into
one larger piece of data)
timestamp (i.e. postmark)
Now let’s try to send bigger messages
Network Security
User logins
Layered access via permissions
Different levels of user access
Firewall
Must be an authenticated user to login
Password, smartcard, fingerprint, iris, etc.
Inspect and filter incoming traffic
Encryption
Encrypt data so that it is unreadable by outsiders