Media:Networking

Download Report

Transcript Media:Networking

Introduction to Networking
Key Terms

packet


server


envelope of data sent between computers
provides services to the network
client

requests actions from a server (i.e. makes
requests to a server)
Local Area Network (LAN)

computers and peripherals directly linked together in
a single area



enables sharing of peripherals (e.g. printer)
commonly uses client-server model



room, office, or building
one machine acts as the central node (server)
all others are clients
LANs may connect to other LANs or to the outside
using a “gateway”
Wide Area Network (WAN)

a really, really big network



your house  ISP  Internet
Washington-Lee  Yorktown  etc.
allows a computer to connect to other
computers over a wide geographic area
Hardware






network cable
Network Interface Card (NIC)
hub
 connects together multiple computers or segments
 any incoming data will be broadcasted out to all ports
switch
 connects together multiple computers or segments
 analyzes network traffic and learns which machines are
connected to particular ports
 incoming data is forwarded through proper port
router
 forwards traffic to proper destination
 programmable (e.g. filter traffic)
gateway
 a computer that connects users of a LAN to another network
Types of Network Cables

Modes of communication






Telephone lines ~ dialup
Coaxial cable ~ cable internet
Twisted pair ~ ethernet
Fiber-optic ~ FIOS
Microwave (high frequency radio) ~ wifi
Satellite
Topologies



network layout
in what configuration are the computers
connected together
Example configurations:



star
bus
hybrid
Bus topology


single cable used to link all computer together
all computers can “see” all traffic, but only grab their respective
data
Star Topology


computers are
connected to a switch
or hub
if any client machine
fails, the network keeps
on truckin’
Hybrid Topology


a combination of two or more topologies
Example: star-bus topology
More Key Terms

data integrity


making sure that what is received is what was transmitted
how does data integrity compromised?



noise / interference on a line  error in message
hacking (hax0ring)
data security


preventing unauthorized access to data
examples:



required user logins
data encryption
permissions (one user cannot access another user’s data)
Packets


an envelope of data sent between computers
typically contains:




source (origin) address
destination address
sequence numbers (for packets that combine into
one larger piece of data)
timestamp (i.e. postmark)
Packet-switched vs. Circuit-switched
Networks

http://vimeo.com/10347883
Packet Switching




Break data up into packets & transmit
Individual packets are not all necessarily
transmitted through the same links
Each packet travels over the best available
link at the time
Packets may arrive at destination out of order
 must be re-ordered and reassembled
(protocol!)
Protocols

technical word for “agreed set of rules”






“Jack Bauer breaks protocol”
networking protocols define how two computers
exchange information
initiating a message (multiple packets!)
acknowledging that a message has been received
error checking
compression
Internet Protocol



source (origin) address
destination address
Activity:


Each person receives an address on a card
One person in each row will be a switch



Rules:



The switch will write down on his/her card that he/she is a
switch
The switch will write down the range of addresses on their
card
NO TALKING
Switches can move cards
As a class, we will send several messages
IP Problems



What happens when we send large data?
Let’s try to send lots of messages now
Problems?
Transmission Control Protocol

Messages now contain



sequence numbers (for packets that combine into
one larger piece of data)
timestamp (i.e. postmark)
Now let’s try to send bigger messages
Network Security

User logins



Layered access via permissions


Different levels of user access
Firewall


Must be an authenticated user to login
Password, smartcard, fingerprint, iris, etc.
Inspect and filter incoming traffic
Encryption

Encrypt data so that it is unreadable by outsiders