Netwerken Essentials is een eerstejaarsvak van de IT Factory waarbij de basis van netwerken/infrastructure wordt uitgelegd. Alle hoofdstukken worden aangehaald samen met bv het OSI Model.
Chapter 1: Explore the network
Network has no boundary and supports the way we:
- Learn
- Communicate
- Work
- Play
Client request and display information
Servers provide information to other devices on the network
Computer can be both server and client at the same time
Peer-to-peer
Advantages:
Easy to set up
Less complexity
Lower cost since network devices and dedicated servers may not be required
Can be used for simple tasks such as transferring files and sharing printers
Disadvantages:
No centralized administration
Not as secure
Not scalable
All devices may act as both clients and servers which can slow their performance
Components of network
3 categories of network components:
Devices
o End devices
Either the source or destination of a message
Computer, laptop, …
o Intermediary network devices
Connect multiple individual networks to form an internetwork
Connect the individual end devices to the network
Ensure data flows across the network
Provide connectivity
Examples:
Network access devices (switches; wireless access points)
Internetworking devices (routers)
Security devices (firewalls)
Media
o Network media
Provide the pathway for data transmission
Interconnect devices
3 types of media: wireless, LAN, WAN
Services
NIC = network interface card
1
,Physical port = a connector or outlet on a networking device
Interface = specialized ports on an internetworking device that connect to individual networks
Topology diagrams
Physical topology diagrams = identify the physical location of intermediary devices, configured ports, and cable
installation
Logical topology diagrams = identify devices, ports, and IP addressing scheme
LAN & WAN
Local Area Networks (LAN): a network infrastructure that provides access to
users and end devices in a small geographical area
Interconnects end devices in a limited area
Administrated by a single organization
Provide high speed bandwidth to internal devices
Wide Area Network (WAN): a network infrastructure that provides access to
other networks over a wide geographical area
Interconnects LAN
Administrated by multiple service providers
Provide slower speed links between LANs
Others:
Metropolitan Area Network (MAN)
Wireless LAN (WLAN)
Storage Area Network (SAN)
Internet, intranet and extranet
Internet = worldwide collection of interconnected networks, not owned by any individual or group
Internet access technologies:
Internet service provider (ISP)
Broadband cable
Broadband digital subscriber line (DSL)
Wireless WANs
Mobile services
Business DSL
Leased lines
Metro ethernet
Kabelmodem
2
, o Een special type modem dat wordt gebruikt om data over het kabeltelevisienetwerk (bestaande uit
coax en glasvezel) te transporteren
Types of internet connections: home and small office, business
Snelheid internetconnectie:
Bandbreedte = de maximale hoeveelheid informatie die van 1 plaats naar een andere plaats over het
netwerk kan stromen in een gegeven tijdsinterval. Deze wordt uitgedrukt in bits per seconde.
Throughput (werkelijke bandbreedte afhankelijk van aantal gebruikers op het netwerk) = de hoeveelheid
informatie (= data + overhead) die over het netwerk werd doorgestuurd binnen een bepaald tijdsinterval.
Goodput = meet de werkelijke data-overdracht over een netwerk gedurende een bepaald tijdsinterval
Vertraging = de minimale tijd die een netwerk nodig heeft om de kleinst mogelijke hoeveelheid data te versturen.
Converged networks
traditional separate networks = each network with its own rules
Converging network = capable of delivering data, voice and video over the same network infrastructure
4 basic characteristics of network architecture:
Fault tolerance
o Redundant connections allow for alternative paths if a device or a link fails. The user experience is
unaffected
Scalability
o Additional users and whole networks can be connected to the internet without degrading
performance for existing users
Quality of service (QoS)
o All communication has some access to the media, but higher priority communication has a greater
percentage of the packets
Security
o Administrators can protect the network with software and hardware security and by preventing
physical access to network devices
3
, Networking technologies for the Home
Smart home
Powerline networking = uses existing electrical wiring to connect devices
Wireless broadband:
wireless internet service provider (WISP)
wireless broadband service using cellular technology (4G)
Security
Threats examples Solutions examples
Viruses, worms and Trojan horses Antivirus and antispyware
Spyware and adware Firewall filtering
Zero-day attacks (zero-hour attacks) Dedicated firewall systems
Hacker attacks Access control lists (ACL)
Denial of service attacks Intrusion prevention systems (IPS)
Data interception and theft Virtual private networks (VPNs)
Identity theft
Data center = a facility used to house computer systems and associated components including:
redundant data communications connections
high-speed virtual servers
redundant storga systems (typically uses SAN technology)
redundant or backup power supplies
environmental controls (air conditioning, fire suppression)
security devices
data center Google: bekabeling uitgevoerd in Fiber en hebben een warmtenet
Chapter 2: configure a network
operating system
Cisco IOS (Internetworking Operation System)
Network operating system = enables device hardware to function and provide an interface for users to interact.
Kernel = the portion of the operating system that interacts directly with computer hardware
Shell = the portion that interfaces with applications and the user
The user can interact with the shell using a command line interface (CLI, text-based environment) or graphical user
interface (GUI)
CLI is less resource intensive and very stable when compared to a GUI
Operating systems:
pc open source (OC) allows users to interact with the computer
user-computer interaction in PC operating systems (OS) are often done via mouse, keyboard and monitor
cisco IOS = operating system
cisco IOS allows users to interact with Cisco devices
4
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur GraduateITF. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €23,49. Vous n'êtes lié à rien après votre achat.