Networks+Safety Chapter
Networks+Safety Chapter
Networks+Safety Chapter
Terminal (client)
Intermediate nodes
Terminal (server)
Communication
sub-network
Telecomputing is the combination of
information processing, which is the
domain of the computer, and information
transport, which is the domain of
telecommunications. A system made up
of computer equipment linked together
by communication channels is called a
telecomputing system.
The term network refers to the
organization of connections, called
communication channels, between the
various nodes of a telecomputing
system.
There are 2 main categories of nodes:
› -Computers in the broadest sense.
› -equipment performing specific functions in
the network.
node client
Transmission
channels
server
client
client
Network topology, i.e. the location of
nodes and the arrangement of links
between them, can be highly varied.
Bus topology
Ring topology
Tree mesh
Networks operate in two possible modes:
- Infrastructure mode refers to a network based
on one or more access points. Stations link up
with access points to exchange data. Up to
100 stations can be associated with an access
point. Access points are interconnected.
The size of the network depends on the access
point's coverage area.The transmission medium
and the (theoretical) data rate of 11 Mbit/s (or
54 Mbit/s) are shared by all stations. In
practice, data rate degrades automatically
according to distance and environment.
Coverage
Access point
area
Network size
• In ad-hoc mode, there is no access
point, and the stations themselves enter
into communication.
The advantage of this topology is its ease
of implementation, since all that's
needed are stations equipped with Wi-Fi
cards.
We distinguish two classes of networks according to
the criterion of transmission technique:
Broadcast mode: One transmitter Several
receivers
The first operating mode involves sharing a single
transmission medium. Each message sent by one
piece of equipment on the network is received by all
the others. It is the specific destination address in the
message that enables each device to determine
whether the message is addressed to it or not. If the
message is intended for all machines, this is known as
broadcasting. Some systems also allow a packet to
be transmitted to a subset of machines: this is called
multicasting.
At any given time, only one piece of equipment has
the right to send a message on the medium. It must
therefore first "listen" to see if the channel is free; if
not, it waits according to a protocol specific to each
architecture. Generally speaking, this mode is
adopted for small networks.
Point-to-point mode: One transmitter One receiver
In this mode, the physical medium (cable) connects
only one pair of devices. When two elements not
directly connected to each other want to
communicate, they do so via the other nodes in the
network. It is possible to find several routes of different
lengths to reach the same destination. Choosing the
best path is essential. This mode is generally used in
extended networks.
Any computer connected to a
computer network is potentially
vulnerable to attack, so a secure
network is needed to transfer data both
between the company's own machines
and with external machines.
Firewall
1) A domain to protect: an 'internal' network.
■ A corporate/personal network to be protected
■ Against an 'external' network from which intruders
are likely to carry out attacks.
2) A firewall
■ Installed at a obligatory point of passage between
the network to be protected (internal) and an
insecure network (external).
■ This is a set of different hardware and software
components that control internal/external traffic
according to a security policy.
■ A firewall is often a single piece of software, but it
can also be a complex system comprising several
filters, several gateways and several subnetworks ....
In practical terms, it's a gateway that filters
incoming and outgoing packets based on
one interface for the network to be
protected, and another for the external
network (often the Internet).
However, the firewall doesn't protect the
network against an attack from the internal
network (i.e. the one that doesn't cross it),
and it doesn't prevent an attacker from
using an authorized connection to attack
the system.
Control: Manage outgoing connections
from the local network.