lo2 understand the key components used in networking

12
LO2 Understand the key components used in networking

Upload: joleen-garrett

Post on 27-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: LO2 Understand the key components used in networking

LO2 Understand the key components used in networking

Page 2: LO2 Understand the key components used in networking

Software for Networking

Page 3: LO2 Understand the key components used in networking

Objectives

• By the end of this session you should be able to:– Network OS

• Mac OS• Linux• Windows

– Virus Checker– Firewalls– Application Software– Security

Page 4: LO2 Understand the key components used in networking

Network Operating Systems: Mac OS or OS X

• GUI–based operating systems, developed by Apple Inc. for Macintosh computers

• Based on UNIX• Supports pre-emptive multitasking and

memory protection• Second most active client operating system • Mac OS X 10.0 released in 2001• Version 10.11: "El Capitan“ announced June 8,

2015

Page 5: LO2 Understand the key components used in networking

Linux• Linux is a free and open-source operating

system for PCs• The user interface, or “shell”, is either a

command-line interface (CLI), a graphical user interface (GUI)

• It is a modular, Unix-like OS

• Linux distributionsare common as server operating systems

Page 6: LO2 Understand the key components used in networking

Linux

• Various “flavours” SUSE, Fedora, Red Hat, Ubuntu

• Linux distributions are also popular in the netbook market

• Android built on Linux kernel

Page 7: LO2 Understand the key components used in networking

Microsoft Windows

Page 8: LO2 Understand the key components used in networking

Virus Checker

Page 9: LO2 Understand the key components used in networking

Firewalls

Page 10: LO2 Understand the key components used in networking

Security

Page 11: LO2 Understand the key components used in networking

Application Software

Page 12: LO2 Understand the key components used in networking

Anti-virus and other protective softwareProtecting the network against these attacks, which are usually carried out by determined and very clever ‘cyber criminals’, starts with the network manager. The designers and installers have taken great care (one hopes) to provide protection tools, but if they are not used properly, or at all, disaster will happen eventually.