130 likes | 269 Views
Networking. Network management : ( user accounts, access logs) Networking Protocols :( TCP/IP). Objectives. Understand what a network is Explain what networking is Understand network management Know what a user account is Understand access logs
E N D
Networking Network management : (user accounts, access logs) Networking Protocols :(TCP/IP)
Objectives • Understand what a network is • Explain what networking is • Understand network management • Know what a user account is • Understand access logs • Know the networking protocols (TCP/IP)
What is a Network? • A computer network is a collection of computers and other hardware interconnected by communication channels to allow the sharing of resources and information. • Where at least one process on one device is able to send/receive information to/from at least one other process on another device they are said to be in a network.
What is Networking? • In the world of computers, networking is the practice of linking two or more computing devices together for the purpose of sharing resources. Networks are built with a mix of computer hardware and computer software.
What is Network Management? • managing computer networks. There exists a wide variety of software and hardware products that help network system administrators manage a network. Network management covers a wide area, including: • - Security: Ensuring that the network is protected from unauthorized users. • - Performance: Eliminating bottlenecks in the network. • - Reliability: Making sure the network is available to users and responding to hardware and software malfunctions
User Accounts A user account defines the actions a user can perform on a network.A user account is nothing more than an object that will reside within a directory (adirectory is a database that you can query for information). A record of the users access logs are kept.
Access logs • An access log is a list of all the requests for individual files or actions that people have requested or commenced on the network e.g attempting to log onto account (keeps record of attempts made, time action took place etc.). The access log (sometimes referred to as the "raw data") can be analyzed and summarized by another program.
Access logs (Cont.) For example an access log can be analyzed to tell you: • The number of requests for a particular file/process action • (for the internet) The origin of the visitors in terms of their associated server's domain name (for example, visitors from .edu, .com, and .gov sites and from the online services) • Usage patterns in terms of time of day, day of week, and seasonally
What is a Protocol? • A protocol is basically an acceptable way of behaving • A Networking Protocol is the set of very detailed rules, sequences, message formats, and procedures that computer systems use and understand when exchanging data with each other
Networking Protocols The Internet protocol suite is the set of communications protocols used for theInternet and similar networks, and generally the most popular protocol suite for wide area network. It is commonly known as TCP/IP, because of its most important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP), which were the first networking protocols defined in this standard.
Networking Protocols (Cont.) • TCP (Transmission Control Protocol )- TCP provides reliable, ordered delivery of a stream of octets (a unit of digital information consisting of 8 bits) from a program on one computer to another program on another computer. TCP is the protocol used by major Internet applications such as the World Wide Web,email, remote administrationand file transfer.
Networking Protocols (Cont.) • IP (InternetProtocol) - the principal communications protocol used for relayingdatagrams (also known as network packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.