130 likes | 298 Views
Chapter 12. Business Networking. Overview. Client/Server Types Server Topology Media Considerations Adapters and Navigation Devices Operating Systems and Security. Business Networking. Advantages Enable Sharing Resources Knowledge Software Enhance Communication Disadvantages
E N D
Chapter 12 Business Networking
Overview • Client/Server • Types • Server • Topology • Media Considerations • Adapters and Navigation Devices • Operating Systems and Security
Business Networking • Advantages • Enable Sharing • Resources • Knowledge • Software • Enhance Communication • Disadvantages • Additional Personnel • Requires Special Equipment and Software
Client/Server Basics • Centralized • Efficient Data Flow • Scalability • Add Users without Affecting Network Performance
Client/Server Basics • Types • Intranet • Private Network Within an Organization • Uses Same Technologies as Internet • Extranet • Provides Authorized Outside Access to Intranet • Vendors • Customers • Virtual Private Networks (VPN) • Remote, Secure, Private Access to Corporate Network • Uses Internet
Client/Server Components • Servers • Dedicated Computer Used to Manage a Resource • Types • Authentication • File • Print • Application • Database • E-mail • Communications • Web and Cloud
Client/Server Components • Network Topology • Layout of Components • Bus • Nodes Connected in Sequence on a Single Cable • Ring • Nodes Laid Out in a Configuration Resembling a Circle • Star • Nodes Connect to Central Communications Device
Client/Server Components • Network Topology
Client/Server Components • Transmission Media Considerations • Maximum Run Length • Bandwidth • Flexibility (Bend Radius) • Cable Cost • Installation Cost • Interference • Electromagnetic • Radio Frequency
Client/Server Components • Network Adapters and Navigation Devices • Generate High-power Signals for Transmissions • Break Data into Packets • Gatekeeper for Information Flow to / from Client
Client/Server Components • Network Adapters and Navigation Devices • Media Access Control (MAC) Address • 6 Two-position Characters • First Three Sets Specify Manufacturer • Remaining Sets Make Up Unique Address • Institute of Electrical and Electronics Engineers (IEEE) • Responsible for Allocating Blocks of Numbers • Bridge • Connects Different LANs that Use the Same Protocol
Client/Server Components • Network Operating System and Security • OS Installed on Each Client and Server • Authentication Is Used to Screen Users • Privileges Restrict Access to Network Assets • Firewalls • Can Be Composed of Software and/or Hardware • Packet Screening • External Screening Router Examines Incoming Data
Client/Server Components • Network Operating System and Security • Bastion Host • Heavily Secured Server • Located on Special Perimeter Network • Proxy Server Acts as Go-between