62
Unit 408 Install, configure and test ICT Networks

Unit 408 Install, configure and test ICT Networks

  • Upload
    amena

  • View
    68

  • Download
    1

Embed Size (px)

DESCRIPTION

Unit 408 Install, configure and test ICT Networks. Ainsley Smith. Tel: 0161 953 5995 Ex 3374 [email protected]. Unit 408 Syllabus. There are four outcomes to this unit. You will be able to:-. Identify network concepts and terminology Identify components that make up a network - PowerPoint PPT Presentation

Citation preview

Page 1: Unit 408  Install, configure and test ICT Networks

Unit 408 Install, configure and test ICT

Networks

Page 2: Unit 408  Install, configure and test ICT Networks

Tel: 0161 953 5995 Ex 3374Tel: 0161 953 5995 Ex 3374

[email protected][email protected]

Ainsley SmithAinsley Smith

Page 3: Unit 408  Install, configure and test ICT Networks

Unit 408 SyllabusUnit 408 Syllabus

1) Identify network concepts and terminology

2) Identify components that make up a network

3) Install, configure and test a network4) Use and control a local area network

There are four outcomes to this unit. You will be able to:-

Page 4: Unit 408  Install, configure and test ICT Networks

Outcome 1Identify network concepts and

terminology Define what a network is and what its main goals

are Describe network topologies Electronic communications Network Operating System Differences between peer-to-peer and server

based networks TCP/IP protocol Internet access technologies

Page 5: Unit 408  Install, configure and test ICT Networks

Outcome 2Identify components that make up a

network Components that are used in a network Methods of connection to the internet Security related issues with using a

network Fault tolerance and recovery procedures

in a network.

Page 6: Unit 408  Install, configure and test ICT Networks

Outcome 3Install, configure and test a network

Basic requirements for client workstations to connect to and use network resources

Benefit and characteristics of using antivirus software

The user’s requirements/needs Common problems associated with

network installation

Page 7: Unit 408  Install, configure and test ICT Networks

Outcome 4Use and control a local area

network File management facilities Security measures used on a network Access rights Setting up a new user

Page 8: Unit 408  Install, configure and test ICT Networks

Outcome 1Identify network concepts and

terminology

Page 9: Unit 408  Install, configure and test ICT Networks

What is a Network ?What is a Network ? A network consists of two or more computers that are linked in A network consists of two or more computers that are linked in

order to share resources (what resources?)order to share resources (what resources?) Such as printers Such as printers Cd-roms, Cd-roms, Exchange files,Exchange files, Electronic communications.Electronic communications.

How are the computers on a network linked together?How are the computers on a network linked together? cables, cables, telephone lines, telephone lines,

radio waves, radio waves, satellites, satellites, infrared light beams infrared light beams

Page 10: Unit 408  Install, configure and test ICT Networks

Basic TypesBasic TypesWhat are the basic types ?What are the basic types ? LANLAN

Local Area NetworkLocal Area Network WANWAN

Wide Are NetworkWide Are Network SOHOSOHO

Small Office / Home OfficeSmall Office / Home Office NETNET

Internet workInternet work

Page 11: Unit 408  Install, configure and test ICT Networks
Page 12: Unit 408  Install, configure and test ICT Networks

The Physical Network ?The Physical Network ? A network typically includes four things A network typically includes four things

ProtocolProtocol Nic – Network interface cardNic – Network interface card MediaMedia Network DeviceNetwork Device

Page 13: Unit 408  Install, configure and test ICT Networks

The Physical Network ?The Physical Network ?Protocol what is it and what does it do ?Protocol what is it and what does it do ?

The set of guidelines for inter-computer The set of guidelines for inter-computer communication. Two computers with different communication. Two computers with different protocols won't be able to communicate with one protocols won't be able to communicate with one another.another.

Nic – Network interface card?Nic – Network interface card? Cards that plugs into the back (or side) of your Cards that plugs into the back (or side) of your

computers and lets them send and receive messages computers and lets them send and receive messages from other computers from other computers

What do we mean by Media?What do we mean by Media? The connectivity medium (twisted pair, fibre, wireless)The connectivity medium (twisted pair, fibre, wireless)

What does a Network device do ?What does a Network device do ? The hard ware that can control traffic flowThe hard ware that can control traffic flow

Page 14: Unit 408  Install, configure and test ICT Networks

The Physical Network ?The Physical Network ?

Page 15: Unit 408  Install, configure and test ICT Networks

Network TopologiesNetwork Topologies

BusBus StarStar RingRing MeshMesh

The topology of a network refers to the configuration of cables, computers, and other peripherals.

Types Of Topology:-

Page 16: Unit 408  Install, configure and test ICT Networks

Network TopologiesNetwork Topologies

BusBus

Page 17: Unit 408  Install, configure and test ICT Networks

Network TopologiesNetwork TopologiesBusBus Bus networks (not to be confused with the system bus of a Bus networks (not to be confused with the system bus of a

computer) use a common backbone to connect all devicescomputer) use a common backbone to connect all devices A single cable, the backbone functions as a shared A single cable, the backbone functions as a shared

communication medium that devices attach or tap into with an communication medium that devices attach or tap into with an interface connector interface connector

A device wanting to communicate with another device on the A device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other network sends a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts devices see, but only the intended recipient actually accepts and processes the message. and processes the message.

Bus topologies are relatively easy to install and don't require Bus topologies are relatively easy to install and don't require much cabling compared to the alternatives. 10Base-2 much cabling compared to the alternatives. 10Base-2 ("ThinNet") and 10Base-5 ("ThickNet") both were popular ("ThinNet") and 10Base-5 ("ThickNet") both were popular Ethernet cabling options many years agoEthernet cabling options many years ago

Page 18: Unit 408  Install, configure and test ICT Networks

Network TopologiesNetwork TopologiesAdvantages of a Linear Bus TopologyAdvantages of a Linear Bus Topology Easy to connect a computer or peripheral to a linear bus. Easy to connect a computer or peripheral to a linear bus.

Disadvantages of a Linear Bus TopologyDisadvantages of a Linear Bus Topology Entire network shuts down if there is a break in the main Entire network shuts down if there is a break in the main

cable. cable. Terminators are required at both ends of the backbone Terminators are required at both ends of the backbone

cable. cable. Difficult to identify the problem if the entire network shuts Difficult to identify the problem if the entire network shuts

down. down.

Page 19: Unit 408  Install, configure and test ICT Networks

Network TopologiesNetwork Topologies Star (logical layout)Star (logical layout)

Page 20: Unit 408  Install, configure and test ICT Networks

StarStar Many home networks use the star topology. A star Many home networks use the star topology. A star

network features a central connection point called a network features a central connection point called a "hub" that may be a hub, switch or router. Devices "hub" that may be a hub, switch or router. Devices typically connect to the hub with Unshielded Twisted typically connect to the hub with Unshielded Twisted Pair (UTP) Ethernet. Pair (UTP) Ethernet.

Compared to the bus topology, a star network Compared to the bus topology, a star network generally requires more cable, but a failure in any star generally requires more cable, but a failure in any star network cable will only take down one computer's network cable will only take down one computer's network access and not the entire LAN. (If the hub network access and not the entire LAN. (If the hub fails, however, the entire network also fails.) fails, however, the entire network also fails.)

Network TopologiesNetwork Topologies

Page 21: Unit 408  Install, configure and test ICT Networks

Advantages of a Star TopologyAdvantages of a Star Topology Easy to install and wire. Easy to install and wire. No disruptions to the network then connecting or No disruptions to the network then connecting or

removing devices. removing devices. Easy to detect faults and to remove parts. Easy to detect faults and to remove parts.

Disadvantages of a Star TopologyDisadvantages of a Star Topology Requires more cable length than a linear topology. Requires more cable length than a linear topology. If the hub or concentrator fails, nodes attached are If the hub or concentrator fails, nodes attached are

disabled. disabled. More expensive than linear bus topologies because of More expensive than linear bus topologies because of

the cost of the concentrators. the cost of the concentrators.

Network TopologiesNetwork Topologies

Page 22: Unit 408  Install, configure and test ICT Networks

Ring (Logical Layout)Ring (Logical Layout)

Network TopologiesNetwork Topologies

Page 23: Unit 408  Install, configure and test ICT Networks

Ring networkRing network Every device has exactly two neighbours Every device has exactly two neighbours

for communication purposes. for communication purposes. All messages travel through a ring in the All messages travel through a ring in the

same direction (either "clockwise" or same direction (either "clockwise" or "counter clockwise"). "counter clockwise").

A failure in any cable or device breaks the A failure in any cable or device breaks the loop and can take down the entire network. loop and can take down the entire network.

Network TopologiesNetwork Topologies

Page 24: Unit 408  Install, configure and test ICT Networks

Advantages of RingAdvantages of Ring One advantage of A ring network is that One advantage of A ring network is that

response time can be calculated. Since response time can be calculated. Since every station releases a token after it every station releases a token after it sends one data framesends one data frame

It is therefore possible to accurately It is therefore possible to accurately calculate how long it will take to transmit calculate how long it will take to transmit any amount of data on the network any amount of data on the network

Network TopologiesNetwork Topologies

Page 25: Unit 408  Install, configure and test ICT Networks

Disadvantages of RingDisadvantages of Ring Ring networks usually see poorer Ring networks usually see poorer

performance performance

A Ring interface card has to include all the A Ring interface card has to include all the special circuitry to perform Token-Ring special circuitry to perform Token-Ring management duties management duties

Network TopologiesNetwork Topologies

Page 26: Unit 408  Install, configure and test ICT Networks

Mesh (Logical layout)Mesh (Logical layout)

Network TopologiesNetwork Topologies

Page 27: Unit 408  Install, configure and test ICT Networks

Mesh topologyMesh topology Mesh topologies involve the concept of routes. Mesh topologies involve the concept of routes. Unlike each of the previous topologies, Unlike each of the previous topologies,

messages sent on a mesh network can take any messages sent on a mesh network can take any of several possible paths from source to of several possible paths from source to destination. destination.

The Internet, employs mesh routing. The Internet, employs mesh routing. A mesh network in which every device connects A mesh network in which every device connects

to every other is called a full mesh..to every other is called a full mesh..

Network TopologiesNetwork Topologies

Page 28: Unit 408  Install, configure and test ICT Networks

Advantages of MeshAdvantages of Mesh A mesh can cover a large area. A mesh can cover a large area. A mesh can make certain the coverage area is A mesh can make certain the coverage area is

completely covered. completely covered. Mesh can connect to many different access Mesh can connect to many different access

technologies, WiFi fiber etctechnologies, WiFi fiber etc

DisadvantagesDisadvantages Security issues (networks can be breached fron Security issues (networks can be breached fron

the other side of the world)the other side of the world)

Network TopologiesNetwork Topologies

Page 29: Unit 408  Install, configure and test ICT Networks

Network technologies EthernetEthernet Token RingToken Ring WirelessWireless FDDI/CDDIFDDI/CDDI

Page 30: Unit 408  Install, configure and test ICT Networks

Network technologiesIn Detail

What is Ethernet?What is Ethernet? The most widely-installed local area network ( LAN) The most widely-installed local area network ( LAN)

technology. Specified in a standard, IEEE 802.3, technology. Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox Ethernet was originally developed by Xerox

Institute of Electrical and Electronics Engineers

In general, 802.3 specifies the physical media and the working characteristics of Ethernet

Page 31: Unit 408  Install, configure and test ICT Networks

Network technologiesEthernetEthernet Ethernet systems are called 10BASE-T and provide transmission Ethernet systems are called 10BASE-T and provide transmission

speeds up to 10 Mbpsspeeds up to 10 Mbps

Range ?Range ? 10 Base-T only allows distances from the hub to the node of 100 10 Base-T only allows distances from the hub to the node of 100

meters (330 feet). In some installations, this can be a major meters (330 feet). In some installations, this can be a major problem if nodes need to be located farther away.problem if nodes need to be located farther away.

Fast Ethernet or 100BASE-T provides transmission speeds up to Fast Ethernet or 100BASE-T provides transmission speeds up to 100 megabits per second 100 megabits per second

Gigabit Ethernet provides an even higher level of backbone Gigabit Ethernet provides an even higher level of backbone support at 1000 megabits per second (1 gigabit or 1 billion bits support at 1000 megabits per second (1 gigabit or 1 billion bits per second).per second).

Page 32: Unit 408  Install, configure and test ICT Networks

Network technologies

Token Ring ?Token Ring ? The Token Ring network was originally The Token Ring network was originally

developed by IBM in the 1970s.developed by IBM in the 1970s. IBM's Token Ring network specifies a star, IBM's Token Ring network specifies a star,

with all end stations attached to a device with all end stations attached to a device called a multistation access unit (MSAU)called a multistation access unit (MSAU)

The IEEE does not specify a media type, The IEEE does not specify a media type, although IBM Token Ring networks use although IBM Token Ring networks use twisted-pair wiretwisted-pair wire

Page 33: Unit 408  Install, configure and test ICT Networks

Network technologies

Token RingToken Ring Token-passing networks move a small frame, called Token-passing networks move a small frame, called

a token, around the network. a token, around the network. Possession of the token grants the right to Possession of the token grants the right to

transmit. transmit. If a node receiving the token has no information to If a node receiving the token has no information to

send, it passes the token to the next end station.send, it passes the token to the next end station.

Each station can hold the token for a maximum period Each station can hold the token for a maximum period of time.of time.

Page 34: Unit 408  Install, configure and test ICT Networks

Network technologies

WirelessWireless Wireless communication is the transfer of Wireless communication is the transfer of informationinformation

over a distance without the use of electrical conductors over a distance without the use of electrical conductors or "wires“or "wires“

The term wireless technology is generally used for The term wireless technology is generally used for mobile IT equipment. It encompasses cellular telephones, mobile IT equipment. It encompasses cellular telephones, personal digital assistants (PDAs), and wireless personal digital assistants (PDAs), and wireless networkingnetworking

Other examples of Other examples of wireless technologywireless technology include include GPS GPS Garage DoorsGarage Doors Wireless computer mice and keyboards, Wireless computer mice and keyboards, Satellite television and cordless telephones. Satellite television and cordless telephones.

Page 35: Unit 408  Install, configure and test ICT Networks

Network technologies

Wireless communication may be via:Wireless communication may be via: Radio frequency communication, Radio frequency communication, Microwave communication, for example Microwave communication, for example

long-range line-of-sight via highly long-range line-of-sight via highly directional antennas. directional antennas.

Infrared (IR) short-range communication, Infrared (IR) short-range communication, for example from remote controlsfor example from remote controls

Page 36: Unit 408  Install, configure and test ICT Networks

Heaton Park Telecoms Tower - Manchester

Page 37: Unit 408  Install, configure and test ICT Networks
Page 38: Unit 408  Install, configure and test ICT Networks

FDDI (anyone know what this is ?) Fiber distributed data interface (Fiber optic) (Fiber optic) FDDI was developed by the American National FDDI was developed by the American National

Standards Institute (ANSI) Standards Institute (ANSI) Provides a standard for data transmission in a

local area network that can extend in range up to 124 miles.

FDDI is frequently used as high-speed backbone technology

FDDI protocol is a token ring network FDDI protocol is a token ring network

Network technologies

Page 39: Unit 408  Install, configure and test ICT Networks

FDDI Nic CardFDDI Nic Card

Page 40: Unit 408  Install, configure and test ICT Networks

Fiber CableFiber Cable

Page 41: Unit 408  Install, configure and test ICT Networks

CDDI Copper Distributed Data Interface The implementation of FDDI protocols The implementation of FDDI protocols

over twisted-pair copper wire over twisted-pair copper wire CDDI supports distances of about 100 CDDI supports distances of about 100

meters from desktop to concentrator meters from desktop to concentrator

Network technologies

Page 42: Unit 408  Install, configure and test ICT Networks

CDDI Nic CardCDDI Nic Card

Page 43: Unit 408  Install, configure and test ICT Networks

Electronic communications E-mailE-mail (short for (short for electronic mailelectronic mail)) File Transfer Protocol (FTP)File Transfer Protocol (FTP) Electronic DatabaseElectronic Database InternetInternet

Page 44: Unit 408  Install, configure and test ICT Networks

Electronic communicationsE-mailE-mail (short for (short for electronic mailelectronic mail)) Based on SMTPBased on SMTP

Simple Mail Transfer ProtocolSimple Mail Transfer Protocol E-mail predates the inception of the Internet E-mail predates the inception of the Internet The ARPANET computer network made a large The ARPANET computer network made a large

contribution to the development of e-mail contribution to the development of e-mail AAdvanced dvanced RResearch esearch PProjects rojects AAgency gency NetNetworkwork United States Department of DefenseUnited States Department of Defense

Page 45: Unit 408  Install, configure and test ICT Networks

FTPFTP File Transfer protocolFile Transfer protocol

Used to transfer data from one computer to another over Used to transfer data from one computer to another over the Internet, or through a network.the Internet, or through a network.

FTP is a commonly used protocol for exchanging files FTP is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol over any network that supports the TCP/IP protocol (such as the Internet or an intranet (such as the Internet or an intranet

Virtually every computer platform supports the FTP Virtually every computer platform supports the FTP protocol. protocol.

Electronic communications

Page 46: Unit 408  Install, configure and test ICT Networks

Electronic DatabaseElectronic Database

What do we mean by a database ?What do we mean by a database ? A A databasedatabase is a structured collection of is a structured collection of

records or data that is stored in a computer records or data that is stored in a computer system system

A computer program or person using a query A computer program or person using a query language can consult it to answer queries.language can consult it to answer queries.

Electronic communications

Page 47: Unit 408  Install, configure and test ICT Networks

The Internet is an “Information” data baseThe Internet is an “Information” data base The search engine (Google) is the query The search engine (Google) is the query

tool.tool.

SAP R/3 -a financial Accounting systemSAP R/3 -a financial Accounting system Across Multiple platforms and operating Across Multiple platforms and operating

systems, such as Microsoft Windows or systems, such as Microsoft Windows or UNIX UNIX

Electronic communications

Page 48: Unit 408  Install, configure and test ICT Networks

InternetInternet The The InternetInternet is a worldwide, publicly accessible is a worldwide, publicly accessible

series of interconnected computer networks.series of interconnected computer networks. It is a "network of networks" that consists of It is a "network of networks" that consists of

millions of smaller domestic, academic, millions of smaller domestic, academic, business, and government networks, business, and government networks,

Carry various information and services, such as Carry various information and services, such as electronic mail, online chat, file transfer, electronic mail, online chat, file transfer,

The interlinked Web pages and other documents The interlinked Web pages and other documents of the of the World Wide Web.World Wide Web. (WWW) (WWW)

Electronic communications

Page 49: Unit 408  Install, configure and test ICT Networks
Page 50: Unit 408  Install, configure and test ICT Networks

Network Operating SystemNetwork Operating System?Network Operating System? A A network operating systemnetwork operating system (NOS) is a (NOS) is a

piece of software that controls a network piece of software that controls a network and its message traffic and queuesand its message traffic and queues

Controls access by multiple users to Controls access by multiple users to network resources such as files.network resources such as files.

Provides for certain administrative Provides for certain administrative functions, including security.functions, including security.

Page 51: Unit 408  Install, configure and test ICT Networks

A network operating system is most A network operating system is most frequently used with local area networks frequently used with local area networks and wide area networks and wide area networks

The upper 5 layers of the OSI Reference The upper 5 layers of the OSI Reference Model provide the foundation upon which Model provide the foundation upon which many network operating systems are many network operating systems are based based

Network Operating System

Page 52: Unit 408  Install, configure and test ICT Networks

7 Layer OSI7 Layer OSI

Page 53: Unit 408  Install, configure and test ICT Networks

Some of the features of Network Operating Some of the features of Network Operating System System

Support multi-processing of applications Support multi-processing of applications Security features such as authentication, Security features such as authentication,

authorization, logon restrictions and access authorization, logon restrictions and access control control

Provide file, print, web services and back-up Provide file, print, web services and back-up User management and support for logon and User management and support for logon and

logoff, remote access logoff, remote access

Network Operating System

Page 54: Unit 408  Install, configure and test ICT Networks

User Level SecurityUser Level Security Access control to a file, printer or other Access control to a file, printer or other

network resource based on username. network resource based on username. Users are identified individually or within a Users are identified individually or within a

group. group. User-level permissions are stored in a User-level permissions are stored in a

central server and managed by the central server and managed by the network administrator network administrator

Network Operating System

Page 55: Unit 408  Install, configure and test ICT Networks

Share-level security Share-level security Access control to a file, printer or other Access control to a file, printer or other

network resource based on knowing the network resource based on knowing the password of that resource. password of that resource.

Share-level security provides less Share-level security provides less protection than user-level security, protection than user-level security,

Network Operating System

Page 56: Unit 408  Install, configure and test ICT Networks

User Level SecurityUser Level Security User-level security protects shared network User-level security protects shared network

resources by requiring that a security provider resources by requiring that a security provider authenticate a user’s request to access authenticate a user’s request to access resources.resources.

The security provider, such as a Windows 2003 The security provider, such as a Windows 2003 server, grants access to the shared resource by server, grants access to the shared resource by verifying that the user name and password are verifying that the user name and password are the same as those on the user account list the same as those on the user account list stored on the network security provider. stored on the network security provider.

Page 57: Unit 408  Install, configure and test ICT Networks

Share Level SecurityShare Level Security Share-level security protects shared Share-level security protects shared

network resources on the computer with network resources on the computer with individually assigned passwords. individually assigned passwords.

For example, you can assign a password For example, you can assign a password to a directory or a locally attached printer. to a directory or a locally attached printer.

If other users want to access it, they need If other users want to access it, they need to type in the appropriate password.to type in the appropriate password.

Page 58: Unit 408  Install, configure and test ICT Networks

User level SecurityUser level Security

Windows XP Computer

Page 59: Unit 408  Install, configure and test ICT Networks

1.)1.)A user tries to access a shared resource protected A user tries to access a shared resource protected by pass-through user-level security.by pass-through user-level security.

2.)2.)A request is passed to the security provider to A request is passed to the security provider to verify the user’s identity.verify the user’s identity.

3.)3.)The security provider sends a verification to the The security provider sends a verification to the computer running Windows XP if the user name computer running Windows XP if the user name and password combination is validand password combination is valid

4.)4.)Windows XP grants access to the shared Windows XP grants access to the shared resource, and gives permission to use the resource resource, and gives permission to use the resource according to rights assigned to the user in Sharing according to rights assigned to the user in Sharing properties for that Windows XP resource. properties for that Windows XP resource.

User level SecurityUser level Security

Page 60: Unit 408  Install, configure and test ICT Networks

Why do we need a Network?Why do we need a Network?

Sharing resourcesSharing resources File SharingFile Sharing

Common directoriesCommon directories Data storageData storage

Printer SharingPrinter Sharing Application SharingApplication Sharing

E-mailE-mail

Page 61: Unit 408  Install, configure and test ICT Networks
Page 62: Unit 408  Install, configure and test ICT Networks

Unit 408 Install, configure and test ICT

Networks