SlideShare une entreprise Scribd logo
1  sur  12
Tech Blast: Networks
         Michael Sauers
          Tech Rodeo
  Doane College, 26-28 July 2012
Router
A router is a device that forwards data
packets between computer networks,
creating an overlay internetwork. A
router is connected to two or more data
lines from different networks. When a
data packet comes in on one of the lines,
the router reads the address information
in the packet to determine its ultimate
destination. Then, using information in
its routing table or routing policy, it
directs the packet to the next network on
its journey. Routers perform the "traffic
directing" functions on the Internet. A
data packet is typically forwarded from
one router to another through the
networks that constitute the
internetwork until it gets to its
destination node.
Switch
A switch is a telecommunication device
which receives a message from any device
connected to it and then transmits the
message only to that device for which the
message was meant. This makes the switch
a more intelligent device than a hub (which
receives a message and then transmits it to
all the other devices on its network.) The
network switch plays an integral part in
most modern Ethernet local area networks
(LANs). Mid-to-large sized LANs contain a
number of linked managed switches. Small
office/home office (SOHO) applications
typically use a single switch, or an all-
purpose converged device such as a
residential gateway to access small
office/home broadband services such as
DSL or cable internet.
Ethernet Cables

• Cat-5
  – 10 or 100 Mbps
• Cat-5e
  – Up to 1 Gbps
• Cat-6
  – Up to 10 Gbps
Networking Protocols

• TCP/IP                    • SAMBA
  – IP address                – Used for communicating
  – Internal vs. External       between Linux &
  – Dynamic (DHCP) vs.          Windows computers on
    Static                      a LAN

• DNS
  – Domain Name Server
• HTTP/HTTPS
WiFi

• Versions
   –   b (up to 11 Mbps)
   –   g (up to 54 Mbps)
   –   n (up to 150 Mbps)
   –   ac (up to 866.7 Mbps)
• SSID
   – Service Set Identifier
• Security
   – WEP
   – WPA
WiFi Continued

• Distance matters
• Channels
• Access Points /
  Repeaters / Extenders
Power Line Networking

Power line communication
(PLC) is a system for
carrying data on a
conductor that is also
used for electric power
transmission.

200 or 500 Mbps
Firewall
A firewall can either be software-
based or hardware-based and is used
to help keep a network secure. Its
primary objective is to control the
incoming and outgoing network
traffic by analyzing the data packets
and determining whether it should
be allowed through or not, based on
a predetermined rule set. A
network's firewall builds a bridge
between an internal network that is
assumed to be secure and
trusted, and another
network, usually an external
(inter)network, such as the
Internet, that is not assumed to be
secure and trusted.
NAS
Network-attached storage (NAS) is
file-level computer data storage
connected to a computer network
providing data access to
heterogeneous clients. NAS not only
operates as a file server, but is
specialized for this task either by its
hardware, software, or configuration
of those elements. NAS is often
made as a computer appliance – a
specialized computer built from the
ground up for storing and serving
files – rather than simply a general
purpose computer being used for the
role.
Thanks!
       Michael Sauers
michael.sauers@nebraska.gov
 diane.r.wells@nebraska.gov

Contenu connexe

Tendances

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsMD SAQUIB KHAN
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingPriya Manik
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
Networking device
Networking deviceNetworking device
Networking devicePrem Sahu
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Network components
Network componentsNetwork components
Network componentsAnas Karzoun
 
Network hardware
Network hardwareNetwork hardware
Network hardwaresnoonan
 
Communication systems
Communication systemsCommunication systems
Communication systemsMR Z
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th editionEnsign Handoko
 

Tendances (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
5 Lan
5 Lan5 Lan
5 Lan
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking device
Networking deviceNetworking device
Networking device
 
Cna
CnaCna
Cna
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Networking device
Networking deviceNetworking device
Networking device
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Network components
Network componentsNetwork components
Network components
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
Communication systems
Communication systemsCommunication systems
Communication systems
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 

En vedette

Future trends 2012seminar
Future trends 2012seminarFuture trends 2012seminar
Future trends 2012seminarBryan Alexander
 
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ekunnen
 
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Michael Sauers
 
Secure Online Shopping
Secure Online ShoppingSecure Online Shopping
Secure Online ShoppingMichael Sauers
 
CES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceCES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceMichael Sauers
 

En vedette (8)

shareONE Business Support Services
shareONE Business Support ServicesshareONE Business Support Services
shareONE Business Support Services
 
11 tips for HTML5
11 tips for HTML511 tips for HTML5
11 tips for HTML5
 
Future trends 2012seminar
Future trends 2012seminarFuture trends 2012seminar
Future trends 2012seminar
 
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
 
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
 
Makerspaces resources
Makerspaces resourcesMakerspaces resources
Makerspaces resources
 
Secure Online Shopping
Secure Online ShoppingSecure Online Shopping
Secure Online Shopping
 
CES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceCES 2016: One Librarian's Experience
CES 2016: One Librarian's Experience
 

Similaire à Tech Blast: Networks

E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Networking Components
Networking ComponentsNetworking Components
Networking ComponentsAkNirojan
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addressesHANNAHB13
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamentalSatish Sehrawat
 

Similaire à Tech Blast: Networks (20)

E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Network_Devices.pdf
Network_Devices.pdfNetwork_Devices.pdf
Network_Devices.pdf
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Networking
NetworkingNetworking
Networking
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 

Plus de Michael Sauers

What's On Your Do List?
What's On Your Do List?What's On Your Do List?
What's On Your Do List?Michael Sauers
 
Highlights from CES 2018
Highlights from CES 2018Highlights from CES 2018
Highlights from CES 2018Michael Sauers
 
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Michael Sauers
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in LibrariesMichael Sauers
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyMichael Sauers
 
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsWhat We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsMichael Sauers
 
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Michael Sauers
 
Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Michael Sauers
 
Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Michael Sauers
 
Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Michael Sauers
 
Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Michael Sauers
 
40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools40+ tech tips, tricks, & tools
40+ tech tips, tricks, & toolsMichael Sauers
 
Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Michael Sauers
 
40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 MinutesMichael Sauers
 
eBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureeBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureMichael Sauers
 
Using Audio & Video in the Library
Using Audio & Video in the LibraryUsing Audio & Video in the Library
Using Audio & Video in the LibraryMichael Sauers
 
Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Michael Sauers
 
Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Michael Sauers
 
Library Tech: What's Next?
Library Tech: What's Next?Library Tech: What's Next?
Library Tech: What's Next?Michael Sauers
 
eBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureeBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureMichael Sauers
 

Plus de Michael Sauers (20)

What's On Your Do List?
What's On Your Do List?What's On Your Do List?
What's On Your Do List?
 
Highlights from CES 2018
Highlights from CES 2018Highlights from CES 2018
Highlights from CES 2018
 
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The Ugly
 
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsWhat We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
 
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
 
Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)
 
Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)
 
Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)
 
Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)
 
40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools
 
Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?
 
40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes
 
eBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureeBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & Future
 
Using Audio & Video in the Library
Using Audio & Video in the LibraryUsing Audio & Video in the Library
Using Audio & Video in the Library
 
Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Technology in Libraries, What's Next?
Technology in Libraries, What's Next?
 
Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Technology in Libraries: What's Next?
Technology in Libraries: What's Next?
 
Library Tech: What's Next?
Library Tech: What's Next?Library Tech: What's Next?
Library Tech: What's Next?
 
eBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureeBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & Future
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Tech Blast: Networks

  • 1. Tech Blast: Networks Michael Sauers Tech Rodeo Doane College, 26-28 July 2012
  • 2.
  • 3. Router A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it gets to its destination node.
  • 4. Switch A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to that device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network.) The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all- purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable internet.
  • 5. Ethernet Cables • Cat-5 – 10 or 100 Mbps • Cat-5e – Up to 1 Gbps • Cat-6 – Up to 10 Gbps
  • 6. Networking Protocols • TCP/IP • SAMBA – IP address – Used for communicating – Internal vs. External between Linux & – Dynamic (DHCP) vs. Windows computers on Static a LAN • DNS – Domain Name Server • HTTP/HTTPS
  • 7. WiFi • Versions – b (up to 11 Mbps) – g (up to 54 Mbps) – n (up to 150 Mbps) – ac (up to 866.7 Mbps) • SSID – Service Set Identifier • Security – WEP – WPA
  • 8. WiFi Continued • Distance matters • Channels • Access Points / Repeaters / Extenders
  • 9. Power Line Networking Power line communication (PLC) is a system for carrying data on a conductor that is also used for electric power transmission. 200 or 500 Mbps
  • 10. Firewall A firewall can either be software- based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
  • 11. NAS Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often made as a computer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role.
  • 12. Thanks! Michael Sauers michael.sauers@nebraska.gov diane.r.wells@nebraska.gov