Chapter 01

Chapter 01 - Linux Networking and Security Chapter 1...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
Linux Networking and Security Chapter 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Networking Fundamentals Explain the purposes and development of computer networking Identify common types of networking hardware Describe how networking software operates Understand when popular networking protocols are used Define network routing and describe the purpose of popular routing protocols
Background image of page 2
The Development of Networked Computers Connecting computers and related devices in a local area network (LAN) provides: Ability to share information instantly Automation of data-processing tasks that involve multiple computer systems More efficient utilization of network resources Trends contributing to network capability Network capability added to personal computers Reduced cost of UNIX-based server computers Explosive Internet growth and accessibility
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Types
Background image of page 4
Network Types
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Network Types Peer-to-peer Computers act as both client and server on the network There is no reliance on a centralized server to provide access to data and other resources Compared to a centralized client-server model, peer-to-peer is decentralized, meaning any host can communicate with any other host Linux is thought of as a peer-to-peer operating system
Background image of page 6
Network Types
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Creating a Network
Background image of page 8
Creating a Network
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Creating a Network
Background image of page 10
Networking Technologies Ethernet Most widely used technology Three variation of Ethernet based on transmission speed, or bandwidth Token-ring Uses a token to identify which computer on the network has the right to transmit data Each workstation must be connected to a multistation access unit (MAU) Not as fast as Ethernet, and may be more expensive
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Networking Technologies Fiber Distributed Data Interface (FDDI) Reliable, but slower and costlier than Ethernet Arcnet Reliable, but slower token-passing technology Asynchronous Transfer Mode (ATM) high-speed, very reliable and very expensive used for Internet backbones Wireless LAN (WLAN) No cables used to connect nodes to the network Data is transmitted via radio signals of infrared
Background image of page 12
Networking Technologies
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Networking Technologies
Background image of page 14
Cabling a Network
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Cabling a Network Unshielded Twisted Pair (UTP) made of several pairs of wires encased in plastic Comes in six categories, with CAT 6 being the highest quality and speed UTP is relatively inexpensive, but is susceptible to interference
Background image of page 16
Image of page 17
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 49

Chapter 01 - Linux Networking and Security Chapter 1...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online