unit 408 install, configure and test ict networks

62
Unit 408 Install, configure and test ICT Networks

Upload: shannon-lucas

Post on 01-Jan-2016

282 views

Category:

Documents


3 download

TRANSCRIPT

Unit 408 Install, configure and test ICT

Networks

Tel: 0161 953 5995 Ex 3374Tel: 0161 953 5995 Ex 3374

[email protected][email protected]

Ainsley SmithAinsley Smith

Unit 408 SyllabusUnit 408 Syllabus

1) Identify network concepts and terminology

2) Identify components that make up a network

3) Install, configure and test a network

4) Use and control a local area network

There are four outcomes to this unit. You will be able to:-

Outcome 1Identify network concepts and

terminology Define what a network is and what its main goals

are Describe network topologies Electronic communications Network Operating System Differences between peer-to-peer and server

based networks TCP/IP protocol Internet access technologies

Outcome 2Identify components that make up a

network Components that are used in a network Methods of connection to the internet Security related issues with using a

network Fault tolerance and recovery procedures

in a network.

Outcome 3Install, configure and test a network

Basic requirements for client workstations to connect to and use network resources

Benefit and characteristics of using antivirus software

The user’s requirements/needs Common problems associated with

network installation

Outcome 4Use and control a local area

network File management facilities Security measures used on a network Access rights Setting up a new user

Outcome 1Identify network concepts and

terminology

What is a Network ?What is a Network ? A network consists of two or more computers that are linked in A network consists of two or more computers that are linked in

order to share resources (what resources?)order to share resources (what resources?) Such as printers Such as printers Cd-roms, Cd-roms, Exchange files,Exchange files, Electronic communications.Electronic communications.

How are the computers on a network linked together?How are the computers on a network linked together? cables, cables, telephone lines, telephone lines,

radio waves, radio waves, satellites, satellites, infrared light beams infrared light beams

Basic TypesBasic Types

What are the basic types ?What are the basic types ? LANLAN

Local Area NetworkLocal Area Network WANWAN

Wide Are NetworkWide Are Network SOHOSOHO

Small Office / Home OfficeSmall Office / Home Office NETNET

Internet workInternet work

The Physical Network ?The Physical Network ?

A network typically includes four things A network typically includes four things ProtocolProtocol Nic – Network interface cardNic – Network interface card MediaMedia Network DeviceNetwork Device

The Physical Network ?The Physical Network ?Protocol what is it and what does it do ?Protocol what is it and what does it do ?

The set of guidelines for inter-computer The set of guidelines for inter-computer communication. Two computers with different communication. Two computers with different protocols won't be able to communicate with one protocols won't be able to communicate with one another.another.

Nic – Network interface card?Nic – Network interface card? Cards that plugs into the back (or side) of your Cards that plugs into the back (or side) of your

computers and lets them send and receive messages computers and lets them send and receive messages from other computers from other computers

What do we mean by Media?What do we mean by Media? The connectivity medium (twisted pair, fibre, wireless)The connectivity medium (twisted pair, fibre, wireless)

What does a Network device do ?What does a Network device do ? The hard ware that can control traffic flowThe hard ware that can control traffic flow

The Physical Network ?The Physical Network ?

Network TopologiesNetwork Topologies

BusBus StarStar RingRing MeshMesh

The topology of a network refers to the configuration of cables, computers, and other peripherals.

Types Of Topology:-

Network TopologiesNetwork Topologies

BusBus

Network TopologiesNetwork TopologiesBusBus Bus networks (not to be confused with the system bus of a Bus networks (not to be confused with the system bus of a

computer) use a common backbone to connect all devicescomputer) use a common backbone to connect all devices A single cable, the backbone functions as a shared A single cable, the backbone functions as a shared

communication medium that devices attach or tap into with an communication medium that devices attach or tap into with an interface connector interface connector

A device wanting to communicate with another device on the A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts devices see, but only the intended recipient actually accepts and processes the message. and processes the message.

Bus topologies are relatively easy to install and don't require Bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years agoEthernet cabling options many years ago

Network TopologiesNetwork Topologies

Advantages of a Linear Bus TopologyAdvantages of a Linear Bus Topology Easy to connect a computer or peripheral to a linear bus. Easy to connect a computer or peripheral to a linear bus.

Disadvantages of a Linear Bus TopologyDisadvantages of a Linear Bus Topology Entire network shuts down if there is a break in the main Entire network shuts down if there is a break in the main

cable. cable. Terminators are required at both ends of the backbone Terminators are required at both ends of the backbone

cable. cable. Difficult to identify the problem if the entire network shuts Difficult to identify the problem if the entire network shuts

down. down.

Network TopologiesNetwork Topologies Star (logical layout)Star (logical layout)

StarStar Many home networks use the star topology. A star Many home networks use the star topology. A star

network features a central connection point called a network features a central connection point called a "hub" that may be a hub, switch or router. Devices "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Pair (UTP) Ethernet.

Compared to the bus topology, a star network Compared to the bus topology, a star network generally requires more cable, but a failure in any generally requires more cable, but a failure in any star network cable will only take down one star network cable will only take down one computer's network access and not the entire LAN. (If computer's network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) the hub fails, however, the entire network also fails.)

Network TopologiesNetwork Topologies

Advantages of a Star TopologyAdvantages of a Star Topology Easy to install and wire. Easy to install and wire. No disruptions to the network then connecting or No disruptions to the network then connecting or

removing devices. removing devices. Easy to detect faults and to remove parts. Easy to detect faults and to remove parts.

Disadvantages of a Star TopologyDisadvantages of a Star Topology Requires more cable length than a linear topology. Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are If the hub or concentrator fails, nodes attached are

disabled. disabled. More expensive than linear bus topologies because of More expensive than linear bus topologies because of

the cost of the concentrators. the cost of the concentrators.

Network TopologiesNetwork Topologies

Ring (Logical Layout)Ring (Logical Layout)

Network TopologiesNetwork Topologies

Ring networkRing network Every device has exactly two neighbours Every device has exactly two neighbours

for communication purposes. for communication purposes. All messages travel through a ring in the All messages travel through a ring in the

same direction (either "clockwise" or same direction (either "clockwise" or "counter clockwise"). "counter clockwise").

A failure in any cable or device breaks the A failure in any cable or device breaks the loop and can take down the entire network. loop and can take down the entire network.

Network TopologiesNetwork Topologies

Advantages of RingAdvantages of Ring One advantage of A ring network is that One advantage of A ring network is that

response time can be calculated. Since response time can be calculated. Since every station releases a token after it every station releases a token after it sends one data framesends one data frame

It is therefore possible to accurately It is therefore possible to accurately calculate how long it will take to transmit calculate how long it will take to transmit any amount of data on the network any amount of data on the network

Network TopologiesNetwork Topologies

Disadvantages of RingDisadvantages of Ring Ring networks usually see poorer Ring networks usually see poorer

performance performance

A Ring interface card has to include all the A Ring interface card has to include all the special circuitry to perform Token-Ring special circuitry to perform Token-Ring management duties management duties

Network TopologiesNetwork Topologies

Mesh (Logical layout)Mesh (Logical layout)

Network TopologiesNetwork Topologies

Mesh topologyMesh topology Mesh topologies involve the concept of routes. Mesh topologies involve the concept of routes. Unlike each of the previous topologies, Unlike each of the previous topologies,

messages sent on a mesh network can take any messages sent on a mesh network can take any of several possible paths from source to of several possible paths from source to destination. destination.

The Internet, employs mesh routing. The Internet, employs mesh routing. A mesh network in which every device connects A mesh network in which every device connects

to every other is called a full mesh..to every other is called a full mesh..

Network TopologiesNetwork Topologies

Advantages of MeshAdvantages of Mesh A mesh can cover a large area. A mesh can cover a large area. A mesh can make certain the coverage area is A mesh can make certain the coverage area is

completely covered. completely covered. Mesh can connect to many different access Mesh can connect to many different access

technologies, WiFi fiber etctechnologies, WiFi fiber etc

DisadvantagesDisadvantages Security issues (networks can be breached fron Security issues (networks can be breached fron

the other side of the world)the other side of the world)

Network TopologiesNetwork Topologies

Network technologies

EthernetEthernet Token RingToken Ring WirelessWireless FDDI/CDDIFDDI/CDDI

Network technologiesIn Detail

What is Ethernet?What is Ethernet? The most widely-installed local area network ( LAN) The most widely-installed local area network ( LAN)

technology. Specified in a standard, IEEE 802.3, technology. Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox Ethernet was originally developed by Xerox

Institute of Electrical and Electronics Engineers

In general, 802.3 specifies the physical media and the working characteristics of Ethernet

Network technologiesEthernetEthernet Ethernet systems are called 10BASE-T and provide transmission Ethernet systems are called 10BASE-T and provide transmission

speeds up to 10 Mbpsspeeds up to 10 Mbps

Range ?Range ? 10 Base-T only allows distances from the hub to the node of 100 10 Base-T only allows distances from the hub to the node of 100

meters (330 feet). In some installations, this can be a major meters (330 feet). In some installations, this can be a major problem if nodes need to be located farther away.problem if nodes need to be located farther away.

Fast Ethernet or 100BASE-T provides transmission speeds up to Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second 100 megabits per second

Gigabit Ethernet provides an even higher level of backbone Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits support at 1000 megabits per second (1 gigabit or 1 billion bits per second).per second).

Network technologies

Token Ring ?Token Ring ? The Token Ring network was originally The Token Ring network was originally

developed by IBM in the 1970s.developed by IBM in the 1970s. IBM's Token Ring network specifies a star, IBM's Token Ring network specifies a star,

with all end stations attached to a device with all end stations attached to a device called a multistation access unit (MSAU)called a multistation access unit (MSAU)

The IEEE does not specify a media type, The IEEE does not specify a media type, although IBM Token Ring networks use although IBM Token Ring networks use twisted-pair wiretwisted-pair wire

Network technologies

Token RingToken Ring Token-passing networks move a small frame, Token-passing networks move a small frame,

called a token, around the network. called a token, around the network. Possession of the token grants the right to Possession of the token grants the right to

transmit. transmit. If a node receiving the token has no information to If a node receiving the token has no information to

send, it passes the token to the next end station.send, it passes the token to the next end station.

Each station can hold the token for a maximum period Each station can hold the token for a maximum period of time.of time.

Network technologies

WirelessWireless Wireless communication is the transfer of Wireless communication is the transfer of informationinformation

over a distance without the use of electrical conductors over a distance without the use of electrical conductors or "wires“or "wires“

The term wireless technology is generally used for The term wireless technology is generally used for mobile IT equipment. It encompasses cellular mobile IT equipment. It encompasses cellular telephones, personal digital assistants (PDAs), and telephones, personal digital assistants (PDAs), and wireless networkingwireless networking

Other examples of Other examples of wireless technologywireless technology include include GPS GPS Garage DoorsGarage Doors Wireless computer mice and keyboards, Wireless computer mice and keyboards, Satellite television and cordless telephones. Satellite television and cordless telephones.

Network technologies

Wireless communication may be via:Wireless communication may be via: Radio frequency communication, Radio frequency communication, Microwave communication, for example Microwave communication, for example

long-range line-of-sight via highly long-range line-of-sight via highly directional antennas. directional antennas.

Infrared (IR) short-range communication, Infrared (IR) short-range communication, for example from remote controlsfor example from remote controls

Heaton Park Telecoms Tower - Manchester

FDDI (anyone know what this is ?) Fiber distributed data interface (Fiber optic) (Fiber optic) FDDI was developed by the American National FDDI was developed by the American National

Standards Institute (ANSI) Standards Institute (ANSI) Provides a standard for data transmission in a

local area network that can extend in range up to 124 miles.

FDDI is frequently used as high-speed backbone technology

FDDI protocol is a token ring network FDDI protocol is a token ring network

Network technologies

FDDI Nic CardFDDI Nic Card

Fiber CableFiber Cable

CDDI Copper Distributed Data Interface The implementation of FDDI protocols The implementation of FDDI protocols

over twisted-pair copper wire over twisted-pair copper wire CDDI supports distances of about 100 CDDI supports distances of about 100

meters from desktop to concentrator meters from desktop to concentrator

Network technologies

CDDI Nic CardCDDI Nic Card

Electronic communications

E-mailE-mail (short for (short for electronic mailelectronic mail)) File Transfer Protocol (FTP)File Transfer Protocol (FTP) Electronic DatabaseElectronic Database InternetInternet

Electronic communications

E-mailE-mail (short for (short for electronic mailelectronic mail)) Based on SMTPBased on SMTP

Simple Mail Transfer ProtocolSimple Mail Transfer Protocol E-mail predates the inception of the Internet E-mail predates the inception of the Internet The ARPANET computer network made a large The ARPANET computer network made a large

contribution to the development of e-mail contribution to the development of e-mail AAdvanced dvanced RResearch esearch PProjects rojects AAgency gency NetNetworkwork United States Department of DefenseUnited States Department of Defense

FTPFTP File Transfer protocolFile Transfer protocol

Used to transfer data from one computer to another over Used to transfer data from one computer to another over the Internet, or through a network.the Internet, or through a network.

FTP is a commonly used protocol for exchanging files FTP is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol over any network that supports the TCP/IP protocol (such as the Internet or an intranet (such as the Internet or an intranet

Virtually every computer platform supports the FTP Virtually every computer platform supports the FTP protocol. protocol.

Electronic communications

Electronic DatabaseElectronic Database

What do we mean by a database ?What do we mean by a database ? A A databasedatabase is a structured collection of is a structured collection of

records or data that is stored in a computer records or data that is stored in a computer system system

A computer program or person using a query A computer program or person using a query language can consult it to answer queries.language can consult it to answer queries.

Electronic communications

The Internet is an “Information” data baseThe Internet is an “Information” data base The search engine (Google) is the query The search engine (Google) is the query

tool.tool.

SAP R/3 -a financial Accounting systemSAP R/3 -a financial Accounting system Across Multiple platforms and operating Across Multiple platforms and operating

systems, such as Microsoft Windows or systems, such as Microsoft Windows or UNIX UNIX

Electronic communications

InternetInternet The The InternetInternet is a worldwide, publicly accessible is a worldwide, publicly accessible

series of interconnected computer networks.series of interconnected computer networks. It is a "network of networks" that consists of It is a "network of networks" that consists of

millions of smaller domestic, academic, millions of smaller domestic, academic, business, and government networks, business, and government networks,

Carry various information and services, such as Carry various information and services, such as electronic mail, online chat, file transfer, electronic mail, online chat, file transfer,

The interlinked Web pages and other documents The interlinked Web pages and other documents of the of the World Wide Web.World Wide Web. (WWW) (WWW)

Electronic communications

Network Operating System

Network Operating System?Network Operating System? A A network operating systemnetwork operating system (NOS) is a (NOS) is a

piece of software that controls a network piece of software that controls a network and its message traffic and queuesand its message traffic and queues

Controls access by multiple users to Controls access by multiple users to network resources such as files.network resources such as files.

Provides for certain administrative Provides for certain administrative functions, including security.functions, including security.

A network operating system is most A network operating system is most frequently used with local area networks frequently used with local area networks and wide area networks and wide area networks

The upper 5 layers of the OSI Reference The upper 5 layers of the OSI Reference Model provide the foundation upon which Model provide the foundation upon which many network operating systems are many network operating systems are based based

Network Operating System

7 Layer OSI7 Layer OSI

Some of the features of Network Operating Some of the features of Network Operating System System

Support multi-processing of applications Support multi-processing of applications Security features such as authentication, Security features such as authentication,

authorization, logon restrictions and access authorization, logon restrictions and access control control

Provide file, print, web services and back-up Provide file, print, web services and back-up User management and support for logon and User management and support for logon and

logoff, remote access logoff, remote access

Network Operating System

User Level SecurityUser Level Security Access control to a file, printer or other Access control to a file, printer or other

network resource based on username. network resource based on username. Users are identified individually or within a Users are identified individually or within a

group. group. User-level permissions are stored in a User-level permissions are stored in a

central server and managed by the central server and managed by the network administrator network administrator

Network Operating System

Share-level security Share-level security Access control to a file, printer or other Access control to a file, printer or other

network resource based on knowing the network resource based on knowing the password of that resource. password of that resource.

Share-level security provides less Share-level security provides less protection than user-level security, protection than user-level security,

Network Operating System

User Level SecurityUser Level Security

User-level security protects shared network User-level security protects shared network resources by requiring that a security provider resources by requiring that a security provider authenticate a user’s request to access authenticate a user’s request to access resources.resources.

The security provider, such as a Windows The security provider, such as a Windows 2003 server, grants access to the shared 2003 server, grants access to the shared resource by verifying that the user name and resource by verifying that the user name and password are the same as those on the user password are the same as those on the user account list stored on the network security account list stored on the network security provider. provider.

Share Level SecurityShare Level Security

Share-level security protects shared Share-level security protects shared network resources on the computer with network resources on the computer with individually assigned passwords. individually assigned passwords.

For example, you can assign a password For example, you can assign a password to a directory or a locally attached printer. to a directory or a locally attached printer.

If other users want to access it, they need If other users want to access it, they need to type in the appropriate password.to type in the appropriate password.

User level SecurityUser level Security

Windows XP Computer

1.)1.)A user tries to access a shared resource A user tries to access a shared resource protected by pass-through user-level security.protected by pass-through user-level security.

2.)2.)A request is passed to the security provider to A request is passed to the security provider to verify the user’s identity.verify the user’s identity.

3.)3.)The security provider sends a verification to the The security provider sends a verification to the computer running Windows XP if the user name computer running Windows XP if the user name and password combination is validand password combination is valid

4.)4.)Windows XP grants access to the shared Windows XP grants access to the shared resource, and gives permission to use the resource, and gives permission to use the resource according to rights assigned to the user resource according to rights assigned to the user in Sharing properties for that Windows XP in Sharing properties for that Windows XP resource. resource.

User level SecurityUser level Security

Why do we need a Network?Why do we need a Network?

Sharing resourcesSharing resources File SharingFile Sharing

Common directoriesCommon directories Data storageData storage

Printer SharingPrinter Sharing Application SharingApplication Sharing

E-mailE-mail

Unit 408 Install, configure and test ICT

Networks