740 likes | 944 Views
CHAPTER 01 Internet Network. Dr. Pipat Sookavatana Department of Computer Engineering Mahanakorn University . Edited 25/11/54. Introduction to Networking. Physical Connection Logical Connection Application. Physical Connection (NIC). Network Interface Card
E N D
CHAPTER 01Internet Network Dr. Pipat Sookavatana Department of Computer Engineering Mahanakorn University Edited 25/11/54
Introduction to Networking • Physical Connection • Logical Connection • Application
Physical Connection (NIC) • Network Interface Card • When selecting a NIC, consider the following factors: • Protocols – Ethernet, Wireless • Types of media – Twisted-pair, wireless, or fiber-optic • Type of system bus – PCI or ISA, USB, Integrated
Physical Address • Physical Address (MAC address):Each Ethernet board worldwide has a unique Ethernet-address, it is a 48 bit number(the first 24 bits indicate the manufacturer, the last 24 bits are a unique number for eachEthernet board/controller-chip assigned by the manufacturer). • This is also called the MAC-address. (Media Access Control)
When systems on a local area network ("LAN") are configured with Ethernet, NetBEUI or IPX/SPX protocol, they use these hardware-addresses to identify each other, so there is no need to define manually a network address.
Logical Connection (TCP/IP) description and configuration • TCP/IP – Transmission Control Protocol/Internet Protocol is a set of protocol developed to allow computer to share resources • TCP/IP can be configure using OS tool
Logical Address (IP) • TCP/IP was designed as a Wide-area-network ("WAN"), able to continue to function, even if part of the network was not operating ( damaged or destroyed). • TCP/IP uses IP-addresses, which are 32-bit numbers. To make it easier to memorize such IP-addresses, they are usually expressed as 4 8-bit numbers (example: 192.168.10.1),
IP- Comfig. Using HDCP • To be able to make this automatic assignment, there needs to be now on the network a database, keeping track of possible IP-addresses and to whom these addresses have been assigned:DHCP (Dynamic Host Configuration Protocol)
Gateway and Router • Gateway/Router:To connect a TCP/IP local-area-network to another TCP/IP LAN (which could be the complete Internet) or via a Wide-Area-Network (WAN), you need now a device called : Gateway or Router
Subnet-mask • Now, also the 'Subnet-Mask', which is usually '255.255.255.0', becomes important: if you now like to connect to 207.68.137.53 (which is the Website of Microsoft), TCP/IP checks your own IP-address and the IP-address of the destination against the Subnet-mask. • Subnet-mask basically tell we how may IP address are in the same group.
DNS (Domain Name Service) • DNS:Too much work for typing these IP-addresses • DNS : Domain Name Service:it allows to use names instead of IP-addresses, but you need to configure it as part of the TCP/IP-
Testing Connectivity • Network Configuration • Testing with Ping • Ping 127.0.0.1 • Ping host IP address • Ping default gateway • Ping Internet Host
Basic Network Infrastructure Switch/HUB Now, we have a very basic network connection which files and printer can be shared But this can be use only with in one small department, 2-10 computers
Router Level-3 Switch More than one department Department 3 Department 1 Now, we have infrastructure for an SME Department 2 Department 4
Router Router DSLAM DSL Router WirelessMAN™ IEEE 802.16 Router What Next Yes, the Internet connection What provide the Internet connection ISP – Internet Service Provider Internet Connection Device Speed up to 3Gbps Very Expensive 1 Using Tel Line up to 10 Mbps 2 3 Distance typically 3-4 Km at up to 70 Mbps Future DSL promise to 50 Km
Internet ISP Router Department 1 Department 3 Department 2 Department 4 Now, we have the Internet connection to the firm
What else do we need • Various server • Two type of server • Intranet Server • File Server • Database Server • Application Server • ERP Server • Internet Server • Mail Server • Web Server • Online Business Server • VPN Server
ISP Level-3 Switch E-Commerce Server Email Server Web Server File Server Application Server Database Server Implement servers Now, our network is ready for Medium and Large Firm • Internal Network • HR Department • Sale Department • Manager • Procurement Department • Etc.
การใช้งานระบบเครือข่ายการใช้งานระบบเครือข่าย • Login เพื่อกำหนดตัวเองเข้าสู่ Network • มีใครบ้างอยู่ใน Network • การ Share ทรัพยากรบนคอมพิวเตอร์ • การ Log off จากเครือข่าย • การรักษาความปลอดภัยเบื้องต้นสำหรับ client
Loginเพื่อกำหนดตัวเองเข้าสู่NetworkLoginเพื่อกำหนดตัวเองเข้าสู่Network
การ Share ทรัพยากรบนคอมพิวเตอร์ • เปิด Explorer • คลิก mouse ปุ่มขวาบนโฟลเดอร์ที่ต้องการ Share • เลือกเมนู Sharing • บน tab Sharing เลือกShare As • เติมชื่อการ Share ในช่อง Share Name • เติมหมายเหตุในช่อง Comment • คลิก OK
การ Share ทรัพยากรบนคอมพิวเตอร์ • Click start -> printer and Fax • Click ขวาที่ mouse แล้วเลือก sharing • Click share this printer แล้วพิมพ์ชื่อที่ต้องการ click Ok
เครื่องทีต้องการใช้ printer • Click start -> printer and Fax • Click ที่ Add a printer แล้วเลือก a network printer • ทำการเลือกเครื่องที่เปิด shareprinter ไว้แล้วเลือก
การรักษาความปลอดภัยเบื้องต้นสำหรับ client • ติดตั้ง anti virus, Spyware • On windows fire wall
Security --- Very Important • Business information is very important • It need to be protected • Virus (Check virus every week) • Spyware (Check spyware every week) • Spam, Phishing and Fraud (Understand them) • Hacker Fact Only 5 minutes without firewall, virus and spyware protection You computer will be compromised Every even on my notebook, I typical get 3-4 Spyware weekly How about on your PC…. Have u every check it ?
Secure yourself first- Spam • Annoying but not do any harm • Get a good spam filter
Secure yourself first- E-Mail Fraud • What is Phishing? • listening to music by the band called Phish • a hobby, sport or recreation involving the ocean, rivers or streams…nope “Fishing for personal information” • Use “spoofed” e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.
Example of Phishing From: Customer Support [mailto:support@citibank.com] Sent: Thursday, October 07, 2004 7:53 PM To: Eilts Subject: NOTE! Citibank account suspend in process Dear Customer: Recently there have been a large number of cyber attacks pointing our database servers. In order to safeguard your account, we require you to sign on immediately. This personal check is requested of you as a precautionary measure and to ensure yourselves that everything is normal with your balance and personal information. This process is mandatory, and if you did not sign on within the nearest time your account may be subject to temporary suspension. Please make sure you have your Citibank(R) debit card number and your User ID and Password at hand. Please use our secure counter server to indicate that you have signed on, please click the link bellow:http://211.158.34.249/citifi/. Note that we have no particular indications that your details have been compromised in any way. Thank you for your prompt attention to this matter and thank you for using Citibank(R) Regards, Citibank(R) Card Department (C)2004 Citibank. Citibank, N.A., Citibank, F.S.B., Citibank (West), FSB. Member FDIC.Citibank and Arc
How to Detect Deception • Publish your mail server addresses (to thwart spoofing) • Educate customers (and employees) • Establish online communication protocols • Create a response plan now • Proactively monitor for phishers and fraud • Make yourself a difficult target http://www.cio.com/archive/090104/phish.html
Never click on hyperlinks Use Anti-SPAM filters Use Anti-Virus Software Use personal firewalls Keep all software updated Always look for https and sites that ask for “personal information” Keep computer clean from Spyware Know Fraudulent activity on the Internet Check your credit report immediately for free! If unsure, ask! Prevent Phishingfrom Fraud Watch International
Spyware, Adware • What is it ? • Any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.