SlideShare uma empresa Scribd logo
1 de 12
Chapter 9
Complex Networks

Networking Concepts – Eric Vanderburg ©2005
Multivendor Solutions
 Client

Based

Separate redirector for each vendor
 Clients ship with vendor’s redirector


 Server

Based

Gateway Services for Macintosh
 File & Print Services for Macintosh
 Gateway Services for UNIX
 Gateway Services for Netware (GSNW)


 Internet

utilities are essentially cross-platform
Networking Concepts – Eric
Vanderburg ©2005
Multivendor Solutions
 File

& Print Services – Taking windows
shares and making them look like shares
for another OS.
 Gateway – Making other OS shares look
like Windows shares.

Networking Concepts – Eric
Vanderburg ©2005
Macintosh
 Converts

file formats
 Emulates a Macintosh server
 LocalTalk & DOS requires AppleShare &
LocalTalk adapter

Networking Concepts – Eric
Vanderburg ©2005
Netware
 IPX/SPX

and client software needed
 Versions 5 and above use TCP/IP &
require the newer Novell client
(downloadable)

Networking Concepts – Eric
Vanderburg ©2005
UNIX
 DOS

clients need UNIX interface (Sun
uses PC-NFS)
 Samba
 NFS – NFS volumes mounted like
mapped drives (called a mount point)

Networking Concepts – Eric
Vanderburg ©2005
Concerns
 Permissions
 May

use single account for access
 Permissions may be incompatible

Networking Concepts – Eric
Vanderburg ©2005
Portables
 Palm

& Pocket PC
 Wireless connection or cable with periodic
sync
 Move from WEP to WPA (WiFi Protected
Access) / WPA2
Improved data encryption through the TKIP
(Temporal Key Integrity Protocol). TKIP scrambles
the keys using a hashing algorithm and, by adding
an integrity-checking feature, ensures that the keys
haven’t been tampered with.
 User authentication, which is generally missing in
WEP


Networking Concepts – Eric
Vanderburg ©2005
Terminal Services
 Massive

network traffic

Screens sent back and forth continuously
 Keystrokes generate traffic


 Cheap

clients – thin clients
 Expensive server (mainframe)
 Increased client security
 Remote Administration
 Windows, Citrix
 Good for mobile devices – Telxon
Networking Concepts – Eric
Vanderburg ©2005
Databases
 DBMS

(Database Management System)
 SQL *Sequel (Structured Query
Language)
 Front end – client
 Back end - server

Networking Concepts – Eric
Vanderburg ©2005
Requesting Data
1.
2.
3.
4.
5.
6.

User requests data
Client translates into SQL
SQL request sent to the server
Server processes the request
Results sent back to client software
Results presented to the user

Networking Concepts – Eric
Vanderburg ©2005
Terms
 WebDAV

(Web-based Distributed
Authoring & Versioning)
 ASP (Application Service Provider)

Networking Concepts – Eric
Vanderburg ©2005

Mais conteúdo relacionado

Mais procurados

Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
Mohit Mehra
 
InfiniBand Essentials Every HPC Expert Must Know
InfiniBand Essentials Every HPC Expert Must KnowInfiniBand Essentials Every HPC Expert Must Know
InfiniBand Essentials Every HPC Expert Must Know
Mellanox Technologies
 

Mais procurados (19)

Networking Concepts Lesson 03 - Media - Eric Vanderburg
Networking Concepts Lesson 03 - Media - Eric VanderburgNetworking Concepts Lesson 03 - Media - Eric Vanderburg
Networking Concepts Lesson 03 - Media - Eric Vanderburg
 
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgNetworking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric Vanderburg
 
CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)CCNA Wireless Lan (WLAN)
CCNA Wireless Lan (WLAN)
 
Configuring linksys wireless router
Configuring linksys wireless routerConfiguring linksys wireless router
Configuring linksys wireless router
 
Ccna( Cisco Certified Network Associate)
Ccna( Cisco Certified Network  Associate)Ccna( Cisco Certified Network  Associate)
Ccna( Cisco Certified Network Associate)
 
Access point or wireless router general questions tell you
Access point or wireless router general questions tell youAccess point or wireless router general questions tell you
Access point or wireless router general questions tell you
 
Innovations in Mobility
Innovations in MobilityInnovations in Mobility
Innovations in Mobility
 
Wirelessnetworks mohit mehra
Wirelessnetworks mohit mehraWirelessnetworks mohit mehra
Wirelessnetworks mohit mehra
 
Zigbee
ZigbeeZigbee
Zigbee
 
CCNA Broadband
CCNA BroadbandCCNA Broadband
CCNA Broadband
 
Internet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & StandardsInternet of Things: Comparison of Protocols & Standards
Internet of Things: Comparison of Protocols & Standards
 
InfiniBand Essentials Every HPC Expert Must Know
InfiniBand Essentials Every HPC Expert Must KnowInfiniBand Essentials Every HPC Expert Must Know
InfiniBand Essentials Every HPC Expert Must Know
 
Wireless networks
Wireless networksWireless networks
Wireless networks
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Wireless Networks-ASH-NEW
Wireless Networks-ASH-NEWWireless Networks-ASH-NEW
Wireless Networks-ASH-NEW
 
Wi-Fi Module
Wi-Fi ModuleWi-Fi Module
Wi-Fi Module
 
Wi Fi presentation
Wi Fi presentationWi Fi presentation
Wi Fi presentation
 
Week16 lec2
Week16 lec2Week16 lec2
Week16 lec2
 
2020 wifi Ready
2020 wifi Ready2020 wifi Ready
2020 wifi Ready
 

Destaque

Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
mlrbrown
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
mlrbrown
 

Destaque (16)

Networking Concepts Lesson 09 part 2 - Practical Implementations - GS & FP - ...
Networking Concepts Lesson 09 part 2 - Practical Implementations - GS & FP - ...Networking Concepts Lesson 09 part 2 - Practical Implementations - GS & FP - ...
Networking Concepts Lesson 09 part 2 - Practical Implementations - GS & FP - ...
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Presentasi umb
Presentasi umbPresentasi umb
Presentasi umb
 
San Diego Dos And Donts Of Network Cabling
San Diego Dos And Donts Of Network CablingSan Diego Dos And Donts Of Network Cabling
San Diego Dos And Donts Of Network Cabling
 
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric VanderburgNetworking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
Networking Essentials Lesson 02 - Standards and OSI - Eric Vanderburg
 
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric VanderburgNetworking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
Networking Concepts Lesson 10 part 2 - Security Appendix - Eric Vanderburg
 
PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006 PACE-IT: Network Cabling (part 1) - N10 006
PACE-IT: Network Cabling (part 1) - N10 006
 
Lecture4
Lecture4Lecture4
Lecture4
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric VanderburgNetworking Concepts Lesson 06 - Protocols - Eric Vanderburg
Networking Concepts Lesson 06 - Protocols - Eric Vanderburg
 
Data Networking Concepts
Data Networking ConceptsData Networking Concepts
Data Networking Concepts
 
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric VanderburgNetworking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
Networking Concepts Lesson 08 - Simple Network Operations - Eric Vanderburg
 
PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006PACE-IT: Special IP Networking Concepts - N10 006
PACE-IT: Special IP Networking Concepts - N10 006
 
Networking Chapter 7
Networking Chapter 7Networking Chapter 7
Networking Chapter 7
 
Networking Essentials Lesson 01 - Eric Vanderburg
 Networking Essentials Lesson 01 - Eric Vanderburg Networking Essentials Lesson 01 - Eric Vanderburg
Networking Essentials Lesson 01 - Eric Vanderburg
 
Networking Chapter 6
Networking Chapter 6Networking Chapter 6
Networking Chapter 6
 

Semelhante a Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg

Banv meetup-contrail
Banv meetup-contrailBanv meetup-contrail
Banv meetup-contrail
nvirters
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
AamirAziz
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
Mason Mei
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
Ayaz Shahid
 
Banv meetup 04162014
Banv meetup 04162014Banv meetup 04162014
Banv meetup 04162014
ozkan01
 

Semelhante a Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg (20)

Banv meetup-contrail
Banv meetup-contrailBanv meetup-contrail
Banv meetup-contrail
 
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
09 (IDNOG02) Services SDN & NFV Delivering more with less by Mochammad Irzan
 
12 Understanding V P Ns
12  Understanding  V P Ns12  Understanding  V P Ns
12 Understanding V P Ns
 
GAMO VMware vCloud Air
GAMO VMware vCloud AirGAMO VMware vCloud Air
GAMO VMware vCloud Air
 
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged KeynoteApp to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
App to Cloud: Patrick Kerpan's DataCenter Dynamics Converged Keynote
 
08 sdn system intelligence short public beijing sdn conference - 130828
08 sdn system intelligence   short public beijing sdn conference - 13082808 sdn system intelligence   short public beijing sdn conference - 130828
08 sdn system intelligence short public beijing sdn conference - 130828
 
Network Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoFNetwork Function Virtualization (NFV) BoF
Network Function Virtualization (NFV) BoF
 
Acronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNFAcronym Soup – NFV, SDN, OVN and VNF
Acronym Soup – NFV, SDN, OVN and VNF
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
Wind River - OpenStack in Israel
Wind River - OpenStack in IsraelWind River - OpenStack in Israel
Wind River - OpenStack in Israel
 
Acit Mumbai - understanding vpns
Acit Mumbai - understanding vpnsAcit Mumbai - understanding vpns
Acit Mumbai - understanding vpns
 
Managing and Implementing Network Function Virtualization with Intelligent OSS
Managing and Implementing Network Function Virtualization with Intelligent OSSManaging and Implementing Network Function Virtualization with Intelligent OSS
Managing and Implementing Network Function Virtualization with Intelligent OSS
 
Cloud computing virtualization
Cloud computing virtualizationCloud computing virtualization
Cloud computing virtualization
 
Banv meetup 04162014
Banv meetup 04162014Banv meetup 04162014
Banv meetup 04162014
 
ECI-NFV from Data Center to WAN - TNC Prague - June 2016
ECI-NFV from Data Center to WAN - TNC Prague - June 2016ECI-NFV from Data Center to WAN - TNC Prague - June 2016
ECI-NFV from Data Center to WAN - TNC Prague - June 2016
 
Network Innovation with Open Software
Network Innovation with Open SoftwareNetwork Innovation with Open Software
Network Innovation with Open Software
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
VPN in Virtualized DataCenter
VPN in Virtualized DataCenterVPN in Virtualized DataCenter
VPN in Virtualized DataCenter
 
VPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasuresVPN Guide to Network Defense and countermeasures
VPN Guide to Network Defense and countermeasures
 

Mais de Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

Mais de Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 

Último

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Último (20)

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 

Networking Concepts Lesson 09 part 1 - Complex Networks - Eric Vanderburg

  • 1. Chapter 9 Complex Networks Networking Concepts – Eric Vanderburg ©2005
  • 2. Multivendor Solutions  Client Based Separate redirector for each vendor  Clients ship with vendor’s redirector   Server Based Gateway Services for Macintosh  File & Print Services for Macintosh  Gateway Services for UNIX  Gateway Services for Netware (GSNW)   Internet utilities are essentially cross-platform Networking Concepts – Eric Vanderburg ©2005
  • 3. Multivendor Solutions  File & Print Services – Taking windows shares and making them look like shares for another OS.  Gateway – Making other OS shares look like Windows shares. Networking Concepts – Eric Vanderburg ©2005
  • 4. Macintosh  Converts file formats  Emulates a Macintosh server  LocalTalk & DOS requires AppleShare & LocalTalk adapter Networking Concepts – Eric Vanderburg ©2005
  • 5. Netware  IPX/SPX and client software needed  Versions 5 and above use TCP/IP & require the newer Novell client (downloadable) Networking Concepts – Eric Vanderburg ©2005
  • 6. UNIX  DOS clients need UNIX interface (Sun uses PC-NFS)  Samba  NFS – NFS volumes mounted like mapped drives (called a mount point) Networking Concepts – Eric Vanderburg ©2005
  • 7. Concerns  Permissions  May use single account for access  Permissions may be incompatible Networking Concepts – Eric Vanderburg ©2005
  • 8. Portables  Palm & Pocket PC  Wireless connection or cable with periodic sync  Move from WEP to WPA (WiFi Protected Access) / WPA2 Improved data encryption through the TKIP (Temporal Key Integrity Protocol). TKIP scrambles the keys using a hashing algorithm and, by adding an integrity-checking feature, ensures that the keys haven’t been tampered with.  User authentication, which is generally missing in WEP  Networking Concepts – Eric Vanderburg ©2005
  • 9. Terminal Services  Massive network traffic Screens sent back and forth continuously  Keystrokes generate traffic   Cheap clients – thin clients  Expensive server (mainframe)  Increased client security  Remote Administration  Windows, Citrix  Good for mobile devices – Telxon Networking Concepts – Eric Vanderburg ©2005
  • 10. Databases  DBMS (Database Management System)  SQL *Sequel (Structured Query Language)  Front end – client  Back end - server Networking Concepts – Eric Vanderburg ©2005
  • 11. Requesting Data 1. 2. 3. 4. 5. 6. User requests data Client translates into SQL SQL request sent to the server Server processes the request Results sent back to client software Results presented to the user Networking Concepts – Eric Vanderburg ©2005
  • 12. Terms  WebDAV (Web-based Distributed Authoring & Versioning)  ASP (Application Service Provider) Networking Concepts – Eric Vanderburg ©2005