1 / 77

SHARING OF DEVICES ON NETWORK

SHARING OF DEVICES ON NETWORK. PRESENTATION BY: MAMTA LECT. COMPUTER ENGG. GPC KHUNIMAJRA(MOHALI). OUTLINE OF THE LECTURE. Introduction: S haring Resources Device server Printer server Terminal server Resource sharing IP Addresses Two-tier architecture Three-tier architecture.

montana
Download Presentation

SHARING OF DEVICES ON NETWORK

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SHARING OF DEVICES ON NETWORK PRESENTATION BY: MAMTA LECT. COMPUTER ENGG.GPC KHUNIMAJRA(MOHALI) PUNJAB EDUSAT SOCIETY,CHD

  2. OUTLINE OF THE LECTURE • Introduction: Sharing Resources • Device server • Printer server • Terminal server • Resource sharing • IP Addresses • Two-tier architecture • Three-tier architecture PUNJAB EDUSAT SOCIETY,CHD

  3. INTRODUCTION A shared resource or network share is a device or piece of information on a computer that can be remotely accessed from another computer, typically via a local area network. Examplesare shared file access,shared printer access,shared scanner accessetc. The shared resource is called a shared disk,shared drive,shared folder,shared file,shared printer or shared scanner. The term file sharingmeans shared file access, especially in the context of operating systems and LAN. PUNJAB EDUSAT SOCIETY,CHD

  4. SHARING RESOURCES Shared file and printer access require an operating system on the client that supports access to resources on a server, an operating system on the server that supports access to its resources from a client, and an application layerfile sharing protocol and transport layer protocol to provide that shared access. Modern operating systems for personal computers include distributed file systems that support file sharing, while hand-held computing devices sometimes require additional software for shared file access. PUNJAB EDUSAT SOCIETY,CHD

  5. SHARING RESOURCES Sharing of resources over network PUNJAB EDUSAT SOCIETY,CHD

  6. SHARING RESOURCES Sharing of resources over network PUNJAB EDUSAT SOCIETY,CHD

  7. SHARING DISKS AND FILES Resource Sharing between computers is passing files from one computer to another. This method places severe limits on the volume of data, as well as the speed and distance in which it can be shared. Another technique for resource sharing is to directly connect two computers together by means of a cable link between (COM) ports of each computer. Figure shows two computers connected through their COM ports. PUNJAB EDUSAT SOCIETY,CHD

  8. SHARING DISKS AND FILES Direct connection between two computers PUNJAB EDUSAT SOCIETY,CHD

  9. SHARING DISKS AND FILES • Communication software is required for each computer in order to make use of the physical connection between the computers. You must configure one computer as a host or server and one as a client. The client computer will then have access to data on the host. Direct cable connections are most often used to share files between a desktop computer and a laptop computer. • In a network environment with many users and job requirements permissionsneed to be established. These allow specific network users to access information while blocking unwelcome access to confidential or valuable data.  PUNJAB EDUSAT SOCIETY,CHD

  10. SHARING DISKS AND FILES PUNJAB EDUSAT SOCIETY,CHD

  11. SHARING IN A PEER-TO-PEER ENVIRONMENT The simplest method of networking is peer-to-peer. In this networking environment, data sharing occurs at the drive or folder level. Any drive or folder on a drive can be shared. Each computer shares its drive or folder resources to the network and each user is responsible for setting the shares. The user can also choose to share printer resources.  PUNJAB EDUSAT SOCIETY,CHD

  12. SHARING IN A PEER-TO-PEER ENVIRONMENT PUNJAB EDUSAT SOCIETY,CHD

  13. SHARING IN A PEER-TO-PEER ENVIRONMENT PUNJAB EDUSAT SOCIETY,CHD

  14. SHARING IN A PEER-TO-PEER ENVIRONMENT SOFTWARE In order to share on a peer-to-peer network, file and print sharing must first be enabled on the computer. Each OS has its own methods for enabling sharing. SHARING PRINTERS, DRIVES AND FOLDERS After sharing has been enabled you can decide which drives, folders and printers to make available to the network. Sharing options include hard drives, CD-ROM drives, floppy-disk drives, and folders. (Devices such as scanners and modems cannot be shared.) PUNJAB EDUSAT SOCIETY,CHD

  15. FILE SHARING The term file sharing means shared file access, especially in the context of operating systems and LAN and Internet services, for example in Microsoft Windows documentation. Shared file and printer access within a local area network may either be based on a centralized (client server) paradigm or on a decentralized(peer to peer) model. PUNJAB EDUSAT SOCIETY,CHD

  16. FILE SHARING In client server communications, a client process on the local user computer takes the initiatives to start the communication, while a server process on the file server or print server remote computer waits for the requests to start a communication session. In peer to peer network, any computer can be a server as well as a client . PUNJAB EDUSAT SOCIETY,CHD

  17. THREE TYPES OF SERVERS • Device Server • Printer Server • Terminal Server PUNJAB EDUSAT SOCIETY,CHD

  18. DEVICE SERVER A device server is a closed box that provides extreme ease of installation, minimal maintenance and can be managed by client remotely via a web browser. It is a device or service that provides access to the system console. It provides a number of serial ports which are then connected to the serial ports of other equipment such as servers, routers or switches. The consoles of connected devices can be accessed by connecting to the console server over a serial link such as modem or over a network such as telnet. PUNJAB EDUSAT SOCIETY,CHD

  19. DEVICE SERVER PUNJAB EDUSAT SOCIETY,CHD

  20. DEVICE SERVER DB9 ETHERNET DEVICE SERVER PUNJAB EDUSAT SOCIETY,CHD

  21. PRINTER SERVER A print serverorprinter serveris a device that connects printers to client computers over a network. It accepts print jobs from the computers and sends the jobs to the appropriate printers, queuing the jobs locally. Its functions include the ability to inspect the queue of jobs to be processed, the ability to reorder or delete waiting print jobs or the ability to do various kinds of accounting (such as counting pages of printer). PUNJAB EDUSAT SOCIETY,CHD

  22. PRINTER SERVER • Print servers may support a variety of industry-standard or printing protocols including Internet Printing Protocol, Line Printer Daemon protocol, NetWare, NetBIOSorJetDirect. • A print server may be a networked computer with one or more shared printers. Alternatively a print server may be a dedicated device on the network with connections to the LAN and one or more printers. Dedicated server appliances tend to be fairly simple in both configuration and features.Aprinter may have a built-in print server. PUNJAB EDUSAT SOCIETY,CHD

  23. PRINTER SERVER A wireless print server  PUNJAB EDUSAT SOCIETY,CHD

  24. PRINTER SERVER An example of network printing  PUNJAB EDUSAT SOCIETY,CHD

  25. TERMINAL SERVER A terminal server/serial server/ network access serverenables organizations to connect devices with an RS-232, RS-422 or RS-485 serial interface to a  LAN. Terminal servers can be very simple devices that do not offer any security functionality, such as data encryption and user authentication. There are many terminal servers on the market that have highly advanced security functionality to ensure that only qualified personnel can access various servers and that any data that is transmitted across the LAN, or over the Internet, is encrypted. PUNJAB EDUSAT SOCIETY,CHD

  26. TERMINAL SERVER PUNJAB EDUSAT SOCIETY,CHD

  27. TERMINAL SERVER PUNJAB EDUSAT SOCIETY,CHD

  28. WHAT IS WIN PROXY? It is the tool which provides various facilities, applications and information in a network shared environment. It is world’s first proxy server and the firewall with integrated mail server for windows. It allows you to connect your entire local network to the internet through one IP address. PUNJAB EDUSAT SOCIETY,CHD

  29. WHAT IS WIN PROXY? • It combines the advantages of proxy server and the network address translation technologies into one level and establishes connections when required and logging off when service is no longer required. • It is easy to use and install software package that combines the latest internet connection sharing technology. • It runs on the single windows 95/98 NP, XP based PC and supports any LAN including wireless connections. PUNJAB EDUSAT SOCIETY,CHD

  30. WHAT IS WIN PROXY? PUNJAB EDUSAT SOCIETY,CHD

  31. WHAT IS WIN PROXY? PUNJAB EDUSAT SOCIETY,CHD

  32. FEATURES OF WIN PROXY • Internet access through Win Proxy is easy for network's users . • It supports HTTP, FTP, Telnet, GOPHER, NNTP, SMTP, POP3 etc protocols and allows centralized anti-virus control of emails. • It allows shared cache, dial on demand, logging user management etc and eliminates the complexity and expense of maintaining multiple phone lines modems and user accounts for each individual connection as required. PUNJAB EDUSAT SOCIETY,CHD

  33. WINPROXY SETUP • Many software applications don't require much in the way of preparation: you just pop in a CD-ROM and, after a couple of mouse clicks, you're on your way. If you already have a functioning TCP/IP network, Win Proxy's installation can be just that easy. • This section tells you what needs to be done-and, when appropriate, shows you how to do it-before installing Win Proxy. PUNJAB EDUSAT SOCIETY,CHD

  34. WINPROXY SETUP There are seven categories of preparation, but you've probably already met the requirements in at least a few of them. The categories are: • System Requirements • Internet Connection • Internet Service • Network Hardware • Addressing Information • TCP/IP Protocol • Your Win Proxy Serial Number • Anti-Virus and Site-Filtering Serial Numbers PUNJAB EDUSAT SOCIETY,CHD

  35. SYSTEM REQUIREMENTS To run Win Proxy, your system must be an IBM/PC or compatible computer running Windows 95/98/NT/2000/ Me/XP with at least a 90 MHz processor chip. While the application itself uses only a small amount of disk space, 32 megabytes of disk space is recommended. PUNJAB EDUSAT SOCIETY,CHD

  36. INTERNET CONNECTION You'll need one modem (or cable modem) on the Win Proxy computer. Any Internet connection that uses TCP/IP works, including ISDN and wireless. PUNJAB EDUSAT SOCIETY,CHD

  37. INTERNET SERVICE Internet Service Providers or ISPsprovide access to the Internet and to mail and news servers. ISPs can be large and nationwide like Netcom or WorldNetor they can be small and local. A user account from any Internet Service Provider is needed to access the Internet once Win Proxy is running. You'll need only one account, since, by using Win Proxy, all computers on your network can gain Internet access through the same account. PUNJAB EDUSAT SOCIETY,CHD

  38. NETWORKS HARDWARE The exact kind of network hardware you use depends on the kind of access you have to the Internet. • Dial-Up Access. If you're using a modem, you must use dial-up access. You'll also need one network hub and a cable for each computer connecting to that hub. • Cable Modem/ADSL Modem/Direct Access. Each computer needs an installed and operational network card, as well as one additional card for the Win Proxy computer (for connection to the Internet). You'll also need a hub if you have more than two computers, and a cable for each computer connecting to the hub. PUNJAB EDUSAT SOCIETY,CHD

  39. ADDRESSING INFORMATION • Computers need addresses to which various kinds of data can be sent. The reason: that particular configuration allows Win Proxy to determine all addresses for you. • If you'll be using the more advanced setups, you may need to provide certain addressing information to Win Proxy, including any of the following: ISP news servers, mail servers, pop servers, and DNS servers. PUNJAB EDUSAT SOCIETY,CHD

  40. TCP/IP PROTOCOL TCP/IP is the Internet's protocol which allows computers to communicate. All communication between the Win Proxy computer, clients, and the Internet use the TCP/IP protocol. The TCP/ IP protocol capability is supplied as part of the standard installation of Microsoft Windows 98/NT/2000/Me/XP. PUNJAB EDUSAT SOCIETY,CHD

  41. WINPROXY SERIAL NUMBER • When you download a trial version of Win Proxy, you have full use of the program and all of its features for a 30-day trial. At the end of thirty days Win Proxy becomes unresponsive except for the menu, which allows you to enter a serial number. • You can enter a serial number at any time. When you do, the copy of Win Proxy you have downloaded returns to full functionality. PUNJAB EDUSAT SOCIETY,CHD

  42. ANTI-VIRUS AND SITE-FILTERING SERIAL NUMBERS • The Anti-Virus and Site-Filtering options are also operational during the 30-day trial period. When you purchase and install a Win Proxy serial number, the Anti-Virus and Site-Filtering options are automatically enabled for a 6-month period. If you purchase and install an extension before your previous period has expired, the new extension is added onto the existing period. • After the initial 6-month period, these features will be disabled unless you purchase the extensions. PUNJAB EDUSAT SOCIETY,CHD

  43. WINPROXY COMPUTER PRE-INSTALLATION CHECKLIST PUNJAB EDUSAT SOCIETY,CHD

  44. WHAT IS AN IP ADDRESS? • An IP address is a unique global address for a network interface • Exceptions: • Dynamically assigned IP addresses ( DHCP, Lab 7) • IP addresses in private networks ( NAT, Lab 7) • An IP address: - is a 32 bit longidentifier. - encodes a network number (network prefix) and a host number. PUNJAB EDUSAT SOCIETY,CHD

  45. IP ADDRESSES An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication.AnIP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." PUNJAB EDUSAT SOCIETY,CHD

  46. IP ADDRESSES PUNJAB EDUSAT SOCIETY,CHD

  47. NETWORK PREFIX AND HOST NUMBER • The network prefix identifies a network and the host number identifies a specific host (actually, interface on the network). • How do we know how long the network prefix is? • Before 1993: The network prefix is implicitly defined. or • After 1993: The network prefix is indicated by a netmask. network prefix host number PUNJAB EDUSAT SOCIETY,CHD

  48. IP VERSIONS Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6. Each version defines an IP address differently. Because of its prevalence, the generic term IP address typically still refers to the addresses defined by IPv4. PUNJAB EDUSAT SOCIETY,CHD

  49. IPV4 ADDRESSES • In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses). • IPv4 addresses are canonically indot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations. PUNJAB EDUSAT SOCIETY,CHD

  50. DOTTED DECIMAL NOTATION • IP addresses are written in a so-called dotted decimal notation. • Each byte is identified by a decimal number in the range [0..255]: • Example: 10000000 10001111 10001001 10010000 4th Byte = 144 1st Byte = 128 2nd Byte = 143 3rd Byte = 137 128.143.137.144 PUNJAB EDUSAT SOCIETY,CHD

More Related