Transcript File

Data Communications and
Networks
Chapter 10 – Network Hardware and Software
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Agenda
•
•
•
•
•
•
•
•
•
•
Objective;
What is Network Hardware?
What is Network Software?
Network Hardware;
HUB, Switches and Routers;
Wireless Access Points;
Firewall;
Network Access Control;
Network Software;
Summary.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Objective
By the end of this lesson, the student will
understand how the hardware and software for
networks work.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Pre-assessment
What do you know about?
• Network Hardware and Software;
• Cisco IOS.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Network Hardware
Broadly speaking, there are two types of transmission technology that are in
widespread use. They are as follows:
• Broadcast links;
• Point-to-point links.
HUB
In computing, the broadcast is used in hubs
(hubs) are connected in LAN.
Switches
A switch is a device used in computer
networks to relay modules (frames)
between the various nodes.
Routers
It’s a device used for switching protocols, communication between different
computer networks providing communication between computers apart.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Wireless Access Point
It is a device that allows wireless devices to connect to a wired network using WiFi, Bluetooth or related standards.
• The WAP usually connects to a router (via a
wired network), and can relay data
between the wireless devices (such as
computers or printers) and wired devices
on the network;
• Wireless has advantages for even fixed
devices in some circumstances;
• Wireless security includes: WPA-PSK, WPA2,
IEEE 802.1x/RADIUS, WDS, WEP, TKIP, and
CCMP (AES) encryption.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Firewall
A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications. It is a device
or set of devices that is configured to permit or deny network transmissions
based upon a set of rules and other criteria.
• Packet filter: Packet filtering inspects each
packet passing through the network and accepts
or rejects it based on user-defined rules.
Application
gateway:
Applies
security
mechanisms to specific applications, such as FTP
and Telnet servers;
• Circuit-level
gateway:
Applies
security
mechanisms when a TCP or UDP connection is
established;
• Proxy server: Intercepts all messages entering
and leaving the network. The proxy server
effectively hides the true network addresses.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Network Access Control
Network Access Control (NAC) is an approach to computer network security
that attempts to unify endpoint security technology (such as antivirus, host
intrusion prevention, and vulnerability assessment), user or system
authentication and network security enforcement.
• Mitigation of zero-day attacks: The key value proposition of NAC solutions is
the ability to prevent end-stations that lack antivirus, patches, or host
intrusion prevention software from accessing the network and placing other
computers at risk of cross-contamination of computer worms;
• Policy enforcement: NAC solutions allow network operators to define
policies;
• Identity and access management: Where conventional IP networks enforce
access policies in terms of IP addresses, NAC environments attempt to do so
based on authenticated user identities, at least for user end-stations such as
laptops and desktop computers.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Network Access Control
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Network Appliance
This equipment is usually based on a software product for general use, but
optimized to integrate only the components necessary for its target application.
It is the harmonious integration between software and hardware.
Types:
• Firewall;
• Web Content Filter;
• Network Access Control.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Network Software
Linux Operational Systems
Currently, Linux is a collection of free software (and sometimes non-free) created
by individuals, groups and organizations around the world, including the Linux
kernel. Companies like Red Hat, SuSE, Mandriva and Ubuntu Linux developer as
well as community projects such as Debian or Gentoo, compiling the software
and provide a complete, ready for installation and use.
Windows Operational Systems
It’s most popular operational systems for workstations. Microsoft is currently
supporting Windows XP, Vista and Windows 7. For the server side, Microsoft
Windows counts with Windows 2003 and 2008 nowadays. Services such as DNS,
DHCP, SMTP, Directory Services are supported by Microsoft operational systems.
Cisco IOS
Cisco IOS (Internetwork Operating System) is the software used on the vast
majority of Cisco Systems routers and current Cisco network switches.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Summary
This chapter has covered concepts of hardware and software for network.
We saw how HUBs, Switches and Routers work. Those are the basic elements on
the network. Also, in conjunction with the network devices, we find the security
devices, like Firewall and Network Access Control. They have features on the
network area as well on the security area.
For the supporting the hardware, we need the operational systems on each one,
like Linux, Windows or Cisco IOS.
The hardware and software work together to make the communication between
clients and servers possible.
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi
Questions
ICT-BVF8.1- Data Communications and Network
Trainer: Dr. Abbes Sebihi