Introduction to computer networks and computer systems
This presentation is the property of its rightful owner.
Sponsored Links
1 / 56

Introduction to Computer Networks and Computer Systems PowerPoint PPT Presentation


  • 119 Views
  • Uploaded on
  • Presentation posted in: General

Introduction to Computer Networks and Computer Systems. Michelle Murillo, Greg Shore, James Brunt LTER Network Office 21 October 2004 EcoInformatics Workshop Albuquerque, NM. Agenda. WAN LAN LAN components Server Backups Security. Networks and Computers: Why do we need them?.

Download Presentation

Introduction to Computer Networks and Computer Systems

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Introduction to computer networks and computer systems

Introduction to Computer Networks and Computer Systems

Michelle Murillo, Greg Shore, James Brunt

LTER Network Office

21 October 2004

EcoInformatics Workshop

Albuquerque, NM


Agenda

Agenda

  • WAN

  • LAN

  • LAN components

  • Server

  • Backups

  • Security


Networks and computers why do we need them

Networks and Computers:Why do we need them?

  • To facilitate research by increasing communication and access to data, metadata, and applications for synthesis and integration across broad spatial and temporal scales.


What is a network

What is a network?

  • A network is a communication system for interconnecting users and devices such as computers, terminals, printers, telephones, ...

  • A network allows people or devices to share information or data.

  • In addition a network must be able to transmit this information quickly, with reliability and efficiency.


Types of networks

Types of Networks

  • Local Area Networkor LAN

    • A LAN covers a small region of space, typically a single building.

  • Metropolitan Area Network or MAN

    • A MAN is a collection of LANs within the same geographical area, for instance a city.

  • Wide Area Network or WAN

    • A WAN is a computer network that spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs).


Introduction to computer networks and computer systems

WAN


Wide area network wan

Wide-Area Network (WAN)

  • Computers connected to a wide-area network are often connected through public networks, such as the telephone system. They can also be connected through leased lines or satellites. The largest WAN in existence is the Internet.


Wan leased lines

WAN: Leased lines

  • A permanent telephone connection between two points set up by a telecommunications common carrier.

  • Unlike normal dial-up connections, a leased line is always active.

  • The fee for the connection is a fixed monthly rate.

  • The primary factors affecting the monthly fee are distance between end points and the speed of the circuit.

  • Because the connection doesn't carry anybody else's communications, the carrier can assure a given level of quality.

  • You can divide the connection into different lines for data and voice communication or use the channel for one high speed data circuit.


Wan leased line bandwidth examples

WAN: Leased line bandwidth examples:

  • The bandwidth of a network is similar to a highway:

  • a one-lane road has less bandwidth than a four-lane road


Wan wireless

WAN: Wireless

  • Satellite

    • http://www.networkcomputing.com/netdesign/wireless1.html

  • Microwave

  • Spread Spectrum

    • http://www.sss-mag.com/ss.html

  • RF (radio frequency)

    • See also:

      • www.sierrawireless.com/news/docs/2130273_WWAN_v_WLAN.pdf


Wan other methods

WAN: Other methods

  • Cable modem: A modem designed to operate over cable TV lines. Because the coaxial cable used by cable TV provides much greater bandwidth than telephone lines, a cable modem can be used to achieve extremely fast access to the World Wide Web. Cable modems can offer speeds up to 2 Mbps

  • DSL: refers collectively to all types of digital subscriber lines. DSL technologies use sophisticated modulation schemes to pack data onto existing copper telephone lines. Supports data transfer rates up to 32 Mbps for upstream traffic, and from 32 Kbps to over 1 Mbps for downstream traffic.


Wan other methods1

WAN: Other methods

  • ISDN: Abbreviation of integrated services digital network, an international communications standard for sending voice, video, and data over digital telephone lines or normal telephone wires. ISDN supports data transfer rates of 64 Kbps (64,000 bits per second).

  • Modem: A modem is a device or program that enables a computer to transmit data over, for example, telephone or cable lines. The fastest modems run at 57,600 bps, although they can achieve even higher data transfer rates by compressing the data.


Wan considerations

WAN: Considerations

  • Availability:

    • Metro – located within a metropolitan area phone system whereT1 and higher speed connections are easily available

    • City – located near a city that is equipped to provide T1 service but may or may not have available ISP to cover the internet connection

    • Rural – outside of a regular metropolitan phone system but close enough that connections can be made into a metropolitan system

    • Remote – area where only basic telephone service is typically provided

    • Backcountry – area where not even basic telephone services are available


Wan other considerations

WAN: Other Considerations

  • Upload and download speed required?

  • Costs:

    • Equipment

    • Installation

    • Monthly? Yearly?

    • Contract?

  • ISP services and resources provided?

  • Your needs


Introduction to computer networks and computer systems

LAN


Lan local area network

LAN: Local-area Network

  • Most LANs connect workstations and personal computers.

  • Each node (individual computer ) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data.

  • Users can also use the LAN to communicate with each other, by sending e-mail or engaging in chat sessions.


Lan local area network1

LAN: Local-area Network

  • LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited, and there is also a limit on the number of computers that can be attached to a single LAN.

  • There are many different types of LANs, Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple's AppleTalk network system, which is built into Macintosh computers.


Lan ethernet

LAN: Ethernet

  • A local-area network (LAN) architecture developed by Xerox Corporation in cooperation with DEC and Intel in 1976.

  • Ethernet supports data transfer rates of 10 Mbps.

  • A newer version of Ethernet, called 100Base-T (or Fast Ethernet), supports data transfer rates of 100 Mbps.

  • The newest version, Gigabit Ethernet supports data rates of 1 gigabit (1,000 megabits) per second.


Introduction to computer networks and computer systems

  • We can now connect to the WAN using our ISP and our LAN…but what really makes up our LAN?

  • What do we do to build our LAN?

  • What do we need to know to maintain our LAN?


Lan some components

LAN: Some components

  • Desktops and Workstations

  • Printers, Plotters, Scanners

  • Servers

  • NAS/Storage units

  • Tape Arrays/Tape Drives

  • RAID Arrays

  • UPSs

  • An overabundance of cables

  • An overabundance of software, utilities, and applications


Some quick definitions

Some quick definitions

  • Workstation: A type of computer used for engineering applications (CAD/CAM), desktop publishing, software development, and other types of applications that require a moderate amount of computing power and relatively high quality graphics capabilities.

  • Server: A computer or device on a network that manages network resources. For example, a file server is a computer and storage device dedicated to storing files.

  • Client: part of a client-server architecture. Typically, a client is an application that runs on a personal computer or workstation and relies on a server to perform some operations. For example, an e-mail client is an application that enables you to send and receive e-mail.


Introduction to computer networks and computer systems

  • Desktops, workstations, printers, plotters, scanners depend on…

    • Your (or system administrator) expertise

    • Cost or affordability

    • User requirements

    • User preferences

    • Historical


Introduction to computer networks and computer systems

  • Servers, arrays, disks, UPSs, NASs…

    • Require more thought and long-term planning

    • A good strategy is to:

      • Plan

      • Prototype

      • Evaluate

      • Implement

      • Evaluate

      • Plan


Introduction to computer networks and computer systems

  • The ideal scalable system is one that is a ‘framework’ wherein the components are modular and can be upgraded through time without a complete overhaul of the system.


Introduction to computer networks and computer systems

  • Modularity and scalablity:

    • Consider putting services on individual servers as much as possible

      • Mail

      • FTP

      • Web

      • File

      • Compute

      • Backup

      • Patch

    • This allows for the ability to upgrade individual servers as needed

    • Distributes/reduces the load

    • If one server crashes, all services are not lost

    • If need a new server function, easy to add new server without disrupting other services or overloading an existing server


Example scalable design

DEDICATED NETWORK

Example scalable design


Server decision issues

Server decision issues

  • Do not skimp on the hardware: a desktop is NOT a server!

    • Performance issues

    • Disk I/O performance and stability (RAID arrays)

    • Tape drive

    • CPU:

      • XEON hyper-threaded chips

      • More caching

      • Multiple CPUs

    • More RAM

    • GB NIC (Network Interface Card)

    • Maintenance agreements

  • Use vendor resources to gather information and costs


Other server considerations

Other server considerations

  • Footprint – rack, floor, desktop

  • Operating system – Unix, Linux, or Windows…

  • Mass storage (how much?)

  • Total cost of ownership (total cost over time?)

  • Power supply (enough for all equipment?)

  • Air conditioning (sufficient for cooling?)

  • UPS (size, number?)

  • Surge protectors – ethernet and power

  • Physical security


Unix vs windows

Unix vs. Windows

  • Cost

  • Level of support

    • Support level required

  • Technical knowledge

    • Knowledge of system administration

  • Preference

    • User preference

  • Usability

    • Ease of use

  • Historical

    • Habit

  • Vulnerability issues

    • Virus, worms

  • Requirements for system

    - SQL Server


Mass storage nas

Mass storage: NAS

  • A network-attached storage (NAS) device is a server that is dedicated to nothing more than file sharing.

  • NAS does not provide any of the activities that a server in a server-centric system typically provides, such as e-mail, authentication or file management.

  • NAS allows more hard disk storage space to be added to a network that already utilizes servers without shutting them down for maintenance and upgrades.

  • With a NAS device, storage is not an integral part of the server. Instead, in this storage-centric design, the server still handles all of the processing of data but a NAS device delivers the data to the user.

  • A NAS device does not need to be located within the server but can exist anywhere in a LAN and can be made up of multiple networked NAS devices.


Mass storage tape

Mass storage: tape

  • Storing data on tapes is considerably cheaper than storing data on disks.

  • Tapes have large storage capacities, ranging from a few hundred kilobytes to several gigabytes.

  • Accessing data on tapes is much slower than accessing data on disks.

    • tapes are sequential-access media

    • disks are random-access media

  • Because tapes are so slow, they are generally used only for long-term storage and backup. Data to be used regularly is almost always kept on a disk.

  • Tapes are also used for transporting large amounts of data.


Computer total cost of ownership

Computer: Total Cost of Ownership

  • Purchase price

  • Training costs

  • Application costs

  • Maintenance and support costs

  • Environmental change costs

  • Contracted technical support costs

  • Connectivity

  • System Administration


Computer system administration

Computer: System Administration

  • System monitoring

    • Network and email traffic, system logs, disk utilization

  • Software and OS maintenance

  • Backup and recovery; disaster recovery

  • Hardware maintenance

  • Preventative maintenance

  • User support

  • Administrative

  • System documentation


Computer total cost of ownership1

Computer: Total Cost of Ownership

  • A recently released Gartner study on the five year (TCO - Total Cost of Ownership) of a $2,000 PC, shows that when administration and management costs are added into the equation the actual cost is more like $21,000!!!

  • A good summary article:

    • http://www.wilsonmar.com/1tco.htm


Introduction to computer networks and computer systems

Backups


Backup best practices

Backup Best Practices

  • Backup: To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails. One of the cardinal rules in using computers is back up your files regularly.

  • Backup data and system information – multiple times

  • Keep a set of backups off-site

  • If time and money allows – duplicate your backups, then move one of the copies off-site

  • Backup daily, weekly, monthly, quarterly and yearly

  • Print out copies of configuration and other important files

  • TEST!!!! Then TEST some more!


Backup solutions

Backup solutions

  • Tape

  • Online

  • Off-site providers

  • CD

  • Zip

  • Jaz

  • External hard drive


Backup utilities and programs

Backup utilities and programs

  • Costs range from free to very expensive

  • Native (free)

    • Unix

      • ufsdump and ufsrestore (also dump and restore)

      • tar

      • cpio

    • Windows

      • Windows Backup Utility

      • ASR (Automated System Recovery)

    • Both

      • COPY!!!


Backup utilities and programs1

Backup utilities and programs

  • Native: BEWARE!!! These utilities usually do not back up any open files!

    • (except MS XP uses a shadow copy, which will back up open files)

  • Vendor applications:

    • Legato Networker

      • http://www.legato.com/products/networker/

    • Veritas Backup Exec

      • http://www.veritas.com/index.html

    • Arkeia:

      • http://www.arkeia.com/


Backup types

Backup types

  • Full backup: Full backup is the starting point for all other backups, and contains all the data in the folders and files that are selected to be backed up. Because full backup stores all files and folders, frequent full backups result in faster and simpler restore operations. Remember that when you choose other backup types, restore jobs may take longer.

  • Differential backup: A differential backup contains all files that have changed since the last FULL backup. The advantage of a differential backup is that it shortens restore time compared to a full backup or an incremental backup. However, if you perform the differential backup too many times, the size of the differential backup might grow to be larger than the baseline full backup.


Backup types1

Backup Types

  • Incremental backup: An incremental backup stores all files that have changed since the last FULL OR DIFFERENTIAL backup. The advantage of an incremental backup is that it takes the least time to complete. However, during a restore operation, each incremental backup must be processed, which could result in a lengthy restore job.

  • For windows definitions:

    • http://windows.about.com/library/weekly/aa010624a.htm


Introduction to computer networks and computer systems

Security


Security

Security

  • “Security is vigilance”

  • Security incidents have been increasing as the technical knowledge required to prevent security breaches increases while the sophistication of hacker tools increases.


The problem as viewed by system administrators

The problem: as viewed by System Administrators

  • Lack of management understanding and guidance

  • Arbitrary priorities

  • Lack of time, resources, and qualified staff

  • New and mutating attacks, new vulnerabilities

  • Insecure products, bad patches


Network security threats

Network Security Threats

  • Any internet connection is vulnerable to:

    • Unauthorized access to the network

    • Denial of Service attacks

    • Viruses

    • Capture of private data and passwords

    • Offensive and/or unwanted content


Top vulnerabilities to windows systems

Top Vulnerabilities to Windows Systems

  • Web Servers & Services

  • Workstation Service

  • Windows Remote Access Services

  • Microsoft SQL Server (MSSQL)

  • Windows Authentication

  • Web Browsers

  • File-Sharing Applications

  • LSAS Exposures

  • Mail Client

  • Instant Messaging


Top vulnerabilities to unix systems

Top Vulnerabilities to UNIX Systems

  • BIND Domain Name System

  • Web Server

  • Authentication

  • Version Control Systems

  • Mail Transport Service

  • Simple Network Management Protocol (SNMP)

  • Open Secure Sockets Layer (SSL)

  • Misconfiguration of Enterprise Services NIS/NFS

  • Databases

  • Kernel


The ten worst security mistakes information technology people make

The Ten Worst Security Mistakes Information Technology People Make

  • Connecting systems to the Internet before hardening them.

  • Connecting test systems to the Internet with default accounts/passwords

  • Failing to update systems when security holes are found.

  • Using telnet and other unencrypted protocols for managing systems, routers, firewalls, and PKI.

  • Giving users passwords over the phone or changing user passwords in response to telephone or personal requests when the requester is not authenticated.


The ten worst security mistakes information technology people make1

The Ten Worst Security Mistakes Information Technology People Make

  • Failing to maintain and test backups.

  • Running unnecessary services, especially ftpd, telnetd, finger, rpc, mail, rservices

  • Implementing firewalls with rules that don't stop malicious or dangerous traffic-incoming or outgoing.

  • Failing to implement or update virus detection software

  • Failing to educate users on what to look for and what to do when they see a potential security problem.


The five worst security mistakes end users make

The Five Worst Security Mistakes End Users Make

  • Failing to install anti-virus, keep its signatures up to date, and apply it to all files.

  • Opening unsolicited e-mail attachments without verifying their source and checking their content first, or executing games or screen savers or other programs from untrusted sources.

  • Failing to install security patches-especially for Microsoft Office, Microsoft Internet Explorer, and Netscape.

  • Not making and testing backups.

  • Using a modem while connected through a local area network.


The seven worst security mistakes senior executives make

The Seven Worst Security Mistakes Senior Executives Make

  • Assigning untrained people to maintain security and providing neither the training nor the time to make it possible to learn and do the job.

  • Failing to understand the relationship of information security to the business problem-they understand physical security but do not see the consequences of poor information security.

  • Failing to deal with the operational aspects of security: making a few fixes and then not allowing the follow through necessary to ensure the problems stay fixed

  • Relying primarily on a firewall.

  • Failing to realize how much money their information and organizational reputations are worth.

  • Authorizing reactive, short-term fixes so problems re-emerge rapidly.

  • Pretending the problem will go away if they ignore it.


Ten essential security measures

Ten Essential Security Measures

  • Develop a Security Policy. And let everyone know about it.Develop online warnings to inform users of the rules for accessing your network.

  • Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts.

  • Make regular backups of critical data. Backups must be made on a regular basis and that restoration is possible.


Ten essential security measures1

Ten Essential Security Measures

  • Use virus protection software. Install the software, check regularly for new virus signature updates, and scan all files periodically.

  • Use a firewall as a gatekeeper between your computer and the Internet. Firewalls can be hardware or software products.

  • Enable Logging for all important systems. Often Logging is turned off by default making it impossible to tell what happened.


Ten essential security measures2

Ten Essential Security Measures

  • Do not open e-mail attachments from strangers, Be suspicious of any unexpected e-mail attachment from someone you do know.

  • Regularly download security patches from your software vendors. Visit www.windowsupdate.com and other update sites regularly. Don’t forget network devices (routers, hubs, etc).

  • Document your network and conduct vulnerability scans.

  • Educate your users and yourself. Security is a continual process.


Security summary

Security: Summary

  • You can’t be totally secure, but there is a lot that you can do (relatively cheaply) to make your network more secure.

  • Most attacks play on well-known vulnerabilities.

  • Education is the key to a secure network.

  • Security is a continual process


Security more resources

Security: More Resources

  • SANS – SANS Institute

    - (www.sans.org)

  • CERT – Computer Security Coordination Center at Carnegie Mellon

    - (www.cert.org)

  • CSI – Computer Security Institute

    - (www.goCSI.com )

  • CoSN

    - (www.cosn.org)


  • Login