1 / 50

Networks, Network operating systems and Databases

Networks, Network operating systems and Databases. Networking - Basics. Network defined The difference between Standalone and networked Systems Advantages of networking Disadvantages of networking Why use network To share information To Share hardware and software

travis
Download Presentation

Networks, Network operating systems and Databases

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Networks, Network operating systems and Databases

  2. Networking - Basics • Network defined • The difference between Standalone and networked Systems • Advantages of networking • Disadvantages of networking • Why use network • To share information • To Share hardware and software • Centralizing administration

  3. Types of networks • Classification based on geographical area • LAN • WAN

  4. Local Area Networks • Limited geographic area • High speed and error free data transmission • Not expensive

  5. Wide Area Networks • Connects computers over states, countries etc., • Unlimited geographical coverage • More sophisticated • Connects LANs and MANs • Expensive technology

  6. Network configuration • Classification based on how computers behave in a network • Two classifications are • Peer-to-Peer network • Server based network

  7. Peer-to-Peer network • Nodes provide and request services • User in each node administers resources • No extra investment • Easy to setup • Very weak security • Additional load on nodes

  8. Server based network • Designated computer to administer • Resources centralized • Supports larger networks • Strong security • Expensive

  9. Topologies - Physical • Refers to physical arrangement of • Computers • Cables • Other components

  10. Types of topologies • Bus • Star • Ring • Mesh

  11. Bus topology • Linear connection • Simple installation • Passive in nature • Data travels from one end to other • Slow signal transfer • Failure of one computer does not affect • Extensions weaken the signal

  12. Star topology • Connected to a central hub • Easier administration • Difficult to install • High cable cost • Hub failure fails the network

  13. Ring Topology • Circular connection • Signals travel in one direction, through each computer • Failure of one computer affects entire network • Difficult to troubleshoot

  14. Star bus topology • Combination of several stars • Augments systems in network • Failure of hub/s fails the network

  15. Network hardware • Hub • Cables • Connectors • Switches • Routers

  16. Hub • Standard component in Star topology • Types • Active, Passive • Manageable • Easier administration • Centralized monitoring of network

  17. Cables • Wires the LAN, usually • Transmit signals through network • Different cable considerations according to need • Types • Co-axial • Twisted Pair • Fiber-optic

  18. Co-axial cable • Most trusted in earlier networks • Carries data as electromagnetic signals • Good resistance against interference

  19. Twisted pair • Pair of insulated copper wires • Types • Shielded(STP) • Unshielded(UTP) • UTP common in LAN • Max. cable length – 100 meters

  20. UTP categories • Category 1 – Used as telephone cables – carry voice(Two pairs) • Category 2 – Data transmission up to 4 mbps(Four pairs) • Category 3 – Data transmission up to 16 mbps(Four pairs) • Category 4 – Data transmission up to 20 mbps(Four pairs) • Category 5 – Data transmission up to 100 mbps(Four pairs) • Category 6 – Data transmission above 100 mbps (Four pairs)

  21. Fiber optic cables • Core – cylinder of glass • Not subject to interference • Transfer rate – more than 100 mbps • Expensive

  22. Connectors for UTP • RJ – 11 and RJ – 45 • RJ11 in telephone cables – 4 cable connections • RJ45 in LAN cables – 8 cable connections

  23. Cable connection method Used to connect a system to hub or switch in LAN

  24. Network adapter card • Prepares data from computer for network and sends • Receives data from network and translates for computer

  25. Network adapter considerations • Connected to expansion slot on motherboard • Has memory for storage of data before transmission • Current adapters come with RJ-45 connectors • Driver software to be loaded on connection • Requires configuration for network participation

  26. Using IP address • Two methods • Static addressing • Using DHCP • Two components • Network ID • Host ID • 3 classes • Class A networks • Class B networks • Class C networks

  27. Network troubleshooting • In case of problems • Check Physical connection first • Check power supply in the hub • Check sample packet transfer • Check configuration

  28. Network operating systems • Co-ordinates hardware and software • Ties together all computers and peripherals • Provides security by controlling access to resources and peripherals shared • Manages users

  29. Network operating systems available • Windows NT • Windows 2000 & Windows Server 2003 • Netware from Novell • Unix • Apple Macintosh

  30. Shares • Sharing allows access to resources over network • Folders and devices are directly shared; not files or programs • Permissions for access can be assigned to users and groups • Level of permission can be varied

  31. Local User Accounts • Enable users to log on and access resources on a specific computer Domain User Accounts • Enable users to log on to the domain to gain access to network resources • Reside in Active Directory User accounts Built-in User Accounts • Enable users to perform administrative tasks or gain temporary access to network resources • Reside in SAM (local built-in user accounts) • Reside in Active Directory (domain built-in user accounts)

  32. User Access issues • Domain Logon • Access verification • Grant/deny access

  33. Password Security • Do not allow blank passwords • Assign a Password for the Administrator Account • Determine Who Has Control over Passwords • Educate Users on How to Use Passwords • Avoid obvious associations, such as a family name • Use long passwords • Use a combination of uppercase and lowercase characters

  34. Domain User Properties • Set logon hours according to requirements • Set expiration for User accounts • Specify the Computers from Which a User Can Log On • Domain users can log on at any computer in the domain, by default • Domain users can be restricted to specific computers to increase security

  35. Installing network printer • Involves • Installing the printer • Configuring • Sharing • Administering

  36. Disk Management Basics Disk Types Dynamic disks Basic Disks C D E F Partitions Volumes

  37. Database management and SQL Server • Overview of Databases • Data is a collection of raw facts • Database is a collection of data stored inside tables • Provides centralized control of data • Relational database management • Advantages • Reduces data redundancy • Can be shared among many users • Security around access can be implemented

  38. RDBMS in the market • Microsoft SQL Server • Oracle • Sybase

  39. Evolution of SQL Server • The Beginning • SQL 6.5 • SQL 7.0 • SQL 2000 • SQL 2005

  40. SQL Server 2000 • It is a relational database management system • It can support up to 32 processors and 64 GB memory • Can handle upto 6,88,220 transactions per minute • Comes with upgrade utility • Scalable • Maintains relationship among data stored inside database • Comes with features like replication, English query

  41. Integration with Windows 2000 OS • Developed for Windows 2000 environment • Can also integrate with Win 9x/NT • Uses features of Windows 2000 like • Active Directory • Security • Event Viewer

  42. Components of SQL Server architecture • Supports client-server architecture • Server takes action based on requests from clients

  43. Editions of SQL Server 2000 • Standard • Personal • Enterprise

  44. Editions of SQL Server 2005 • Standard • Backward compatibility tool(client) • Enterprise

  45. SQL Server Enterprise Manager/Management studio • Used to perform administrative tasks • Tasks performed are • Manage security • Manage databases • Manage backups • Follow up events

  46. Backup of database - Overview • Backup is a copy • Stores copy in another media like • Local Hard disk • Tape disk • Network drive

  47. Backup of database - Need • Hardware failure • Natural calamities • Virus attacks • Theft • Accidental loss due to wrong queries

  48. Backup types • Full or complete • Differential • Transaction log

  49. Backup strategy • Good strategy helps restore data with minimum down time • Minimizes permanent loss of data • A good plan should involve minimum shut down of operations for backup • Good strategy should put the system back to what it was before failure

  50. This completes the unit Thank you

More Related