1 / 74

CHAPTER 01 Internet Network

CHAPTER 01 Internet Network. Dr. Pipat Sookavatana Department of Computer Engineering Mahanakorn University . Edited 25/11/54. Introduction to Networking. Physical Connection Logical Connection Application. Physical Connection (NIC). Network Interface Card

kellan
Download Presentation

CHAPTER 01 Internet Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CHAPTER 01Internet Network Dr. Pipat Sookavatana Department of Computer Engineering Mahanakorn University Edited 25/11/54

  2. Introduction to Networking • Physical Connection • Logical Connection • Application

  3. Physical Connection (NIC) • Network Interface Card • When selecting a NIC, consider the following factors: • Protocols – Ethernet, Wireless • Types of media – Twisted-pair, wireless, or fiber-optic • Type of system bus – PCI or ISA, USB, Integrated

  4. NIC (Cont)

  5. NIC (Cont)

  6. Physical Address • Physical Address (MAC address):Each Ethernet board worldwide has a unique Ethernet-address, it is a 48 bit number(the first 24 bits indicate the manufacturer, the last 24 bits are a unique number for eachEthernet board/controller-chip assigned by the manufacturer). • This is also called the MAC-address. (Media Access Control)

  7. When systems on a local area network ("LAN") are configured with Ethernet, NetBEUI or IPX/SPX protocol, they use these hardware-addresses to identify each other, so there is no need to define manually a network address.

  8. Logical Connection (TCP/IP) description and configuration • TCP/IP – Transmission Control Protocol/Internet Protocol is a set of protocol developed to allow computer to share resources • TCP/IP can be configure using OS tool

  9. Logical Address (IP) • TCP/IP was designed as a Wide-area-network ("WAN"), able to continue to function, even if part of the network was not operating ( damaged or destroyed). • TCP/IP uses IP-addresses, which are 32-bit numbers. To make it easier to memorize such IP-addresses, they are usually expressed as 4 8-bit numbers (example: 192.168.10.1),

  10. Configure TCP/IP on window based machine

  11. Configure TCP/IP on window based machine

  12. IP- Comfig. Using HDCP • To be able to make this automatic assignment, there needs to be now on the network a database, keeping track of possible IP-addresses and to whom these addresses have been assigned:DHCP (Dynamic Host Configuration Protocol)

  13. IP config. Usig static config

  14. Gateway and Router

  15. Gateway and Router • Gateway/Router:To connect a TCP/IP local-area-network to another TCP/IP LAN (which could be the complete Internet) or via a Wide-Area-Network (WAN), you need now a device called : Gateway or Router

  16. Gateway and Router

  17. Subnet-mask

  18. Subnet-mask • Now, also the 'Subnet-Mask', which is usually '255.255.255.0', becomes important: if you now like to connect to 207.68.137.53 (which is the Website of Microsoft), TCP/IP checks your own IP-address and the IP-address of the destination against the Subnet-mask. • Subnet-mask basically tell we how may IP address are in the same group.

  19. DNS (Domain Name Service) • DNS:Too much work for typing these IP-addresses • DNS : Domain Name Service:it allows to use names instead of IP-addresses, but you need to configure it as part of the TCP/IP-

  20. DNS

  21. Testing Connectivity • Network Configuration • Testing with Ping • Ping 127.0.0.1 • Ping host IP address • Ping default gateway • Ping Internet Host

  22. Basic Network Infrastructure Switch/HUB Now, we have a very basic network connection which files and printer can be shared But this can be use only with in one small department, 2-10 computers

  23. Router Level-3 Switch More than one department Department 3 Department 1 Now, we have infrastructure for an SME Department 2 Department 4

  24. Router Router DSLAM DSL Router WirelessMAN™ IEEE 802.16 Router What Next Yes, the Internet connection What provide the Internet connection ISP – Internet Service Provider Internet Connection Device Speed up to 3Gbps Very Expensive 1 Using Tel Line up to 10 Mbps 2 3 Distance typically 3-4 Km at up to 70 Mbps Future DSL promise to 50 Km

  25. Internet ISP Router Department 1 Department 3 Department 2 Department 4 Now, we have the Internet connection to the firm

  26. What else do we need • Various server • Two type of server • Intranet Server • File Server • Database Server • Application Server • ERP Server • Internet Server • Mail Server • Web Server • Online Business Server • VPN Server

  27. ISP Level-3 Switch E-Commerce Server Email Server Web Server File Server Application Server Database Server Implement servers Now, our network is ready for Medium and Large Firm • Internal Network • HR Department • Sale Department • Manager • Procurement Department • Etc.

  28. Protocol – Set of Agreements

  29. การใช้งานระบบเครือข่ายการใช้งานระบบเครือข่าย • Login เพื่อกำหนดตัวเองเข้าสู่ Network • มีใครบ้างอยู่ใน Network • การ Share ทรัพยากรบนคอมพิวเตอร์ • การ Log off จากเครือข่าย • การรักษาความปลอดภัยเบื้องต้นสำหรับ client

  30. Question ?

  31. Loginเพื่อกำหนดตัวเองเข้าสู่NetworkLoginเพื่อกำหนดตัวเองเข้าสู่Network

  32. มีใครบ้างอยู่ใน Network

  33. มีใครบ้างอยู่ใน Network

  34. การ Share ทรัพยากรบนคอมพิวเตอร์ • เปิด Explorer • คลิก mouse ปุ่มขวาบนโฟลเดอร์ที่ต้องการ Share • เลือกเมนู Sharing • บน tab Sharing เลือกShare As • เติมชื่อการ Share ในช่อง Share Name • เติมหมายเหตุในช่อง Comment • คลิก OK

  35. การ Share ทรัพยากรบนคอมพิวเตอร์ • Click start -> printer and Fax • Click ขวาที่ mouse แล้วเลือก sharing • Click share this printer แล้วพิมพ์ชื่อที่ต้องการ click Ok

  36. เครื่องทีต้องการใช้ printer • Click start -> printer and Fax • Click ที่ Add a printer แล้วเลือก a network printer • ทำการเลือกเครื่องที่เปิด shareprinter ไว้แล้วเลือก

  37. การ Log off จากเครือข่าย

  38. การรักษาความปลอดภัยเบื้องต้นสำหรับ client • ติดตั้ง anti virus, Spyware • On windows fire wall

  39. Questions ?

  40. Security --- Very Important • Business information is very important • It need to be protected • Virus (Check virus every week) • Spyware (Check spyware every week) • Spam, Phishing and Fraud (Understand them) • Hacker Fact  Only 5 minutes without firewall, virus and spyware protection You computer will be compromised Every even on my notebook, I typical get 3-4 Spyware weekly How about on your PC…. Have u every check it ?

  41. Secure yourself first- Spam • Annoying but not do any harm • Get a good spam filter

  42. Secure yourself first- E-Mail Fraud • What is Phishing? • listening to music by the band called Phish • a hobby, sport or recreation involving the ocean, rivers or streams…nope “Fishing for personal information” • Use “spoofed” e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.

  43. Example of Phishing From: Customer Support [mailto:support@citibank.com] Sent: Thursday, October 07, 2004 7:53 PM To: Eilts Subject: NOTE! Citibank account suspend in process Dear Customer: Recently there have been a large number of cyber attacks pointing our database servers. In order to safeguard your account, we require you to sign on immediately. This personal check is requested of you as a precautionary measure and to ensure yourselves that everything is normal with your balance and personal information. This process is mandatory, and if you did not sign on within the nearest time your account may be subject to temporary suspension. Please make sure you have your Citibank(R) debit card number and your User ID and Password at hand. Please use our secure counter server to indicate that you have signed on, please click the link bellow:http://211.158.34.249/citifi/. Note that we have no particular indications that your details have been compromised in any way. Thank you for your prompt attention to this matter and thank you for using Citibank(R) Regards, Citibank(R) Card Department (C)2004 Citibank. Citibank, N.A., Citibank, F.S.B., Citibank (West), FSB. Member FDIC.Citibank and Arc

  44. How to Detect Deception • Publish your mail server addresses (to thwart spoofing) • Educate customers (and employees) • Establish online communication protocols • Create a response plan now • Proactively monitor for phishers and fraud • Make yourself a difficult target http://www.cio.com/archive/090104/phish.html

  45. Never click on hyperlinks Use Anti-SPAM filters Use Anti-Virus Software Use personal firewalls Keep all software updated Always look for https and sites that ask for “personal information” Keep computer clean from Spyware Know Fraudulent activity on the Internet Check your credit report immediately for free! If unsure, ask! Prevent Phishingfrom Fraud Watch International

  46. Spyware, Adware • What is it ? • Any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

More Related