Documente Academic
Documente Profesional
Documente Cultură
File Sharing
Print Sharing
E-Mail
Fax Sharing
Remote Access VPN
Shared Databases
Fault Tolerance
Internet Access and Security
Communication and collaboration
CLASSIFICATIONS OF NETWORKS
Computer Networks can be classified in different
ways like:
Function Based,
Area Coverage Based,
Forwarding-based,
Ownership-based and Media-based.
LAN
Network that connects communication devices, or
computers within 2000 feet to share information.
features of LAN:
Multiple user computers connected together
Machines are spread over a small geographic region
Communication channels between the machines are
usually privately owned. Channels are relatively high
capacity Mbps.
Channels are relatively error free
Features of WAN:
Multiple user computers connected together.
Machines are spread over a wide geographical region
Communications channels between the machines are
usually furnished by a third party.
Channels are of relatively low capacity
Channels are relatively error-prone
Network Models
Client-Server A form of distributed processing in
which several computers share the resources and
are able to communicate with many other
computers.
Peer-to-peer network
Advantage:
Simplicity of design and maintenance.
No server, all nodes on the network are fully employed and
independent.
No single computer holds the control of entire networks.
Limitations:
A failure of a node on a peer-to-peer network means that
the network can no longer access the applications or data
on that node but other node can function properly.
Lack of centralized control leads it is advisable to use less
number of user system like 10 to 12 users.
COMPONENTS OF A NETWORK:
There are five basic components in any
network :
1. The sender (Source Host)
2. The communications interface devices
3. The communications channel (Medium)
4. The receiver (Destination Host)
5. Communications software
Hubs
Bridges:
The main task of a bridge computer is to
receive and pass data from one LAN to
another.
In order to transmit this data successfully, the
bridge magnifies the data transmission signal.
MODEM
MODEM stands for Modulator/Demodulator. In the simplest
form, it is an encoding as well as decoding device used in data
transmission.
It is a device that converts a digital signal into an analog
telephone signal and converts an analog telephone signal into
a digital computer signal in a data communication system
Communication channels
Guided
Unguided
Access control
Network management
Data and file transmission
Error detection and control
Advantages:
It is easy to add new and remove nodes.
A node failure does not bring down the entire network
It is easier to diagnose network problems through a central
hub.
Disadvantages:
If the central hub fails, the whole network ceases to
function.
It costs more to cable a star configuration than other
topologies.
Bus topology
Advantages:
Reliable in very small networks.
Requires the least amount of cable to connect the computers
together and therefore is less expensive.
Is easy to extend.
A repeater can also be used to extend a bus configuration.
Disadvantages:
Heavy network traffic can slow a bus considerably.
Individual user may use lot of bandwidth.
Each connection between two cables weakens the electrical
signal.
Loss connection may disconnect the network
Ring topology
Advantages:
Ring networks offer high performance for a small number of
workstations or for larger networks where each station has a similar
workload.
Ring networks can span longer distances than other types of
networks.
Ring networks are easily extendable.
Disadvantages:
Relatively expensive and difficult to install.
Failure of one computer on the network can affect the whole
network.
It is difficult to trouble shoot a ring network.
Adding or removing computers can disrupt the network
Mesh Topology
Advantages:
Yields the greatest amount of redundancy in the event that
one of the nodes fails where network traffic can be redirected
to another node.
Network problems are easier to diagnose.
Disadvantages:
The cost of installation and maintenance is high (more cable
is required than any other configuration)
Large number of network connections
TRANSMISSION TECHNOLOGIES
Circuit Switching
Network is one that establishes a fixed bandwidth
circuit (or channel) between nodes and terminals
before the users may communicate, as if the
nodes were physically connected with an electrical
circuit. In circuit-switching, this path is decided
upon before the data transmission starts.
Message Switching:
The computer receives all transmitted data;
stores it ; and, when an outgoing
communication line is available, forwards it to
the receiving point.
Packet switching:
Packet switching refers to protocols in which
messages are broken up into small
transmission units called packets
TRANSMISSION PROTOCOLS
Protocols are software that perform a variety of
actions necessary for data transmission between
computers.
Protocols are a set of rules for inter-computer
communication that have been agreed upon and
implemented by many vendors, users and standards
bodies.
OSI Model
It is an abstract description for layered
communications and computer network protocol
design.
It was developed as part of the Open Systems
Interconnection (OSI) initiative.
It divides network architecture into seven layers;
Application, Presentation, Session, Transport,
Network, Data-Link, and Physical Layers.
Bandwidth
Bandwidth is the difference between the highest
and the lowest frequency that can be used to
transmit data.
It also represent the channel information carrying
capacity
It is mentioned in terms of bits per second (bps)
TCP/IP vs OSI
Client/Server Components
Client
Server
Middleware
Fat-client or Fat-server
Network:
TYPES OF SERVERS
Database servers
Application Servers :
An application server is a server program that resides
in the server and provides the business logic for the
application program.
The server can be a part of the network, more
precisely the part of the distributed network.
First Tier: Front End - Browser (Thin Client) - a GUI
interface lying at the client/workstation.
Second Tier: Middle Tier - Application Server - set of
application programs
Third Tier: Back End - Database Server.
Mail server
DNS server
Gopher server
Web server
FTP server
News server
Chat server
Caching server
Proxy server
DIFFERENT TIER
ARCHITECTURES
The Tier -A tier is a distinct part
of hardware or software.
Single Tier: A single computer that
contains a database and a front
end to access the database.
Generally, this type of system is
used in small businesses.
Advantages:
A single-tier system requires only one stand-alone
computer. It also requires only one installation of
proprietary software which makes it the most costeffective system available.
Disadvantages:
Can be used by only one user at a time. A single tier
system is impractical for an organization which
requires two pr more users to interact with the
organizational data stores at the same time.
Advantages:
Since processing was shared between the client and
server, more users could interact with system.
Disadvantages:
Performance deteriorates if number of users is
greater than 100.
Restricted flexibility and choice of DBMS, since data
language used in server is proprietary to each
vendor.
Limited functionality in moving program functionality
across servers
Client-tier
Application-server-tier
Data-server-tier
The advantages
3-tier architecture solves a number of problems that
are inherent to 2-tier architectures.
Clear separation of user-interface-control and data
presentation from application-logic:
Client-applications are clear: quicker development
through the reuse of pre-built business-logic
components and a shorter test phase, because the
server-components have already been tested.
Dynamic load balancing: If bottlenecks in terms of
performance occur, the server process can be moved
to other servers at runtime.
Multi-tier
Security
Physical security:
Security guards
Proximity card and PIN for door access
Biometrics access and PIN for door access
24 x 365 CCTV surveillance and recording
Data security:
Perimeter security: This is to manage both
internal and external threats. This consists of
firewalls, intrusion detection and content
inspections; host security; anti-virus and access
control and administrative tools.
Access management: This is for both applications
and operating systems that host these critical
applications.
System monitoring and support
Components of BCP
(i) Define requirements based on business needs,
(ii) Statements of critical resources needed,
(iii) Detailed planning on use of critical resources,
(iv) Defined responsibilities of trained personnel,
(v) Written documentations and procedures cove
all operations,
(vi) Commitment to maintain plan to keep up
with changes.
Threat analysis
Documenting potential threats is
recommended to detail a specific disasters
unique recovery steps.
Some common threats include disease,
earthquake, fire , flood, Cyber attack , bribery,
hurricane , utility outage, terrorism .
SOLUTION DESIGN
The goal of the solution design phase is to
identify the most cost effective disaster recovery
solutions.
For IT applications, this is commonly expressed
as:
1. The minimum application and application data
requirements
2. The time frame in which the minimum
application and application data must be
available
IMPLEMENTATION
It is the execution of the design elements
identified in the solution design phase.
Work package testing may take place during
the implementation of the solution, however;
work package testing does not take the place
of organizational testing.
MAINTENANCE
Maintenance of a BCP manual is broken down into
three periodic activities.
The first activity is the confirmation of information in
the manual, roll out to ALL staff for awareness and
specific training for individuals whose roles are
identified as critical in response and recovery.
The second activity is the testing and verification of
technical solutions established for recovery operations.
The third activity is the testing and verification of
documented organization recovery procedures. A
biannual or annual maintenance cycle is typical.
NETWORK SECURITY
Need for security: The basic objective for providing network
security is twofold:
To safeguard assets
To ensure and maintain the data integrity.
To establish the system resources that the users desire to employ
There are two types of systems security.
Physical security is implemented to protect the physical systems assets
of an organization like the personnel, hardware, facilities, supplies and
documentation.
Logical security is intended to control -(i) malicious and non-malicious
threats to physical security and (ii) malicious threats to logical security
itself.
SAN vs NAS
Storage area network is
a dedicated centrally
managed secure
information
infrastructure
Resource management
is centralized and
simplified
It increases the overall
efficiency
Network attached
storage is dedicated
server for file sharing
It is a single purpose
stand alone high
performance computer
Its failure will hall the
entire work