SlideShare une entreprise Scribd logo
1  sur  12
Tech Blast: Networks
         Michael Sauers
          Tech Rodeo
  Doane College, 26-28 July 2012
Router
A router is a device that forwards data
packets between computer networks,
creating an overlay internetwork. A
router is connected to two or more data
lines from different networks. When a
data packet comes in on one of the lines,
the router reads the address information
in the packet to determine its ultimate
destination. Then, using information in
its routing table or routing policy, it
directs the packet to the next network on
its journey. Routers perform the "traffic
directing" functions on the Internet. A
data packet is typically forwarded from
one router to another through the
networks that constitute the
internetwork until it gets to its
destination node.
Switch
A switch is a telecommunication device
which receives a message from any device
connected to it and then transmits the
message only to that device for which the
message was meant. This makes the switch
a more intelligent device than a hub (which
receives a message and then transmits it to
all the other devices on its network.) The
network switch plays an integral part in
most modern Ethernet local area networks
(LANs). Mid-to-large sized LANs contain a
number of linked managed switches. Small
office/home office (SOHO) applications
typically use a single switch, or an all-
purpose converged device such as a
residential gateway to access small
office/home broadband services such as
DSL or cable internet.
Ethernet Cables

• Cat-5
  – 10 or 100 Mbps
• Cat-5e
  – Up to 1 Gbps
• Cat-6
  – Up to 10 Gbps
Networking Protocols

• TCP/IP                    • SAMBA
  – IP address                – Used for communicating
  – Internal vs. External       between Linux &
  – Dynamic (DHCP) vs.          Windows computers on
    Static                      a LAN

• DNS
  – Domain Name Server
• HTTP/HTTPS
WiFi

• Versions
   –   b (up to 11 Mbps)
   –   g (up to 54 Mbps)
   –   n (up to 150 Mbps)
   –   ac (up to 866.7 Mbps)
• SSID
   – Service Set Identifier
• Security
   – WEP
   – WPA
WiFi Continued

• Distance matters
• Channels
• Access Points /
  Repeaters / Extenders
Power Line Networking

Power line communication
(PLC) is a system for
carrying data on a
conductor that is also
used for electric power
transmission.

200 or 500 Mbps
Firewall
A firewall can either be software-
based or hardware-based and is used
to help keep a network secure. Its
primary objective is to control the
incoming and outgoing network
traffic by analyzing the data packets
and determining whether it should
be allowed through or not, based on
a predetermined rule set. A
network's firewall builds a bridge
between an internal network that is
assumed to be secure and
trusted, and another
network, usually an external
(inter)network, such as the
Internet, that is not assumed to be
secure and trusted.
NAS
Network-attached storage (NAS) is
file-level computer data storage
connected to a computer network
providing data access to
heterogeneous clients. NAS not only
operates as a file server, but is
specialized for this task either by its
hardware, software, or configuration
of those elements. NAS is often
made as a computer appliance – a
specialized computer built from the
ground up for storing and serving
files – rather than simply a general
purpose computer being used for the
role.
Thanks!
       Michael Sauers
michael.sauers@nebraska.gov
 diane.r.wells@nebraska.gov

Contenu connexe

Tendances

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsMD SAQUIB KHAN
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardwareisma ishak
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingPriya Manik
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologiesmc aa
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comTechLinu.com
 
Networking device
Networking deviceNetworking device
Networking devicePrem Sahu
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Network components
Network componentsNetwork components
Network componentsAnas Karzoun
 
Network hardware
Network hardwareNetwork hardware
Network hardwaresnoonan
 
Communication systems
Communication systemsCommunication systems
Communication systemsMR Z
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th editionEnsign Handoko
 

Tendances (20)

Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Network devices
Network devicesNetwork devices
Network devices
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
5 Lan
5 Lan5 Lan
5 Lan
 
Networking Hardware
Networking HardwareNetworking Hardware
Networking Hardware
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Networking Devices and Networking Topologies
Networking Devices and Networking TopologiesNetworking Devices and Networking Topologies
Networking Devices and Networking Topologies
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking device
Networking deviceNetworking device
Networking device
 
Cna
CnaCna
Cna
 
Understanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.comUnderstanding Networking Devices – A Brief Introduction | TechLinu.com
Understanding Networking Devices – A Brief Introduction | TechLinu.com
 
Networking device
Networking deviceNetworking device
Networking device
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Network components
Network componentsNetwork components
Network components
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
Communication systems
Communication systemsCommunication systems
Communication systems
 
Introduction to computer network 4th edition
Introduction to computer network   4th editionIntroduction to computer network   4th edition
Introduction to computer network 4th edition
 

En vedette

Future trends 2012seminar
Future trends 2012seminarFuture trends 2012seminar
Future trends 2012seminarBryan Alexander
 
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ekunnen
 
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Michael Sauers
 
Secure Online Shopping
Secure Online ShoppingSecure Online Shopping
Secure Online ShoppingMichael Sauers
 
CES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceCES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceMichael Sauers
 

En vedette (8)

shareONE Business Support Services
shareONE Business Support ServicesshareONE Business Support Services
shareONE Business Support Services
 
11 tips for HTML5
11 tips for HTML511 tips for HTML5
11 tips for HTML5
 
Future trends 2012seminar
Future trends 2012seminarFuture trends 2012seminar
Future trends 2012seminar
 
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
ELI Online Fall Focus Session - RADICALLY STUDENT-CENTERED DESIGN AND THE NEW...
 
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
Tinkers, Printers, & Makers: Makerspaces in the Library (November 2015)
 
Makerspaces resources
Makerspaces resourcesMakerspaces resources
Makerspaces resources
 
Secure Online Shopping
Secure Online ShoppingSecure Online Shopping
Secure Online Shopping
 
CES 2016: One Librarian's Experience
CES 2016: One Librarian's ExperienceCES 2016: One Librarian's Experience
CES 2016: One Librarian's Experience
 

Similaire à Tech Blast: Networks

E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networkingchamwama
 
Networking Devices
Networking DevicesNetworking Devices
Networking DevicesNetwax Lab
 
Networking Components
Networking ComponentsNetworking Components
Networking ComponentsAkNirojan
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addressesHANNAHB13
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking FundamentalsRajet Veshin
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M HSachidananda M H
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamentalSatish Sehrawat
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsIbrahim Mugis
 

Similaire à Tech Blast: Networks (20)

E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
JEG-G4.pptx
JEG-G4.pptxJEG-G4.pptx
JEG-G4.pptx
 
Computer software part 3
Computer software part 3Computer software part 3
Computer software part 3
 
Networking Devices
Networking DevicesNetworking Devices
Networking Devices
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Network_Devices.pdf
Network_Devices.pdfNetwork_Devices.pdf
Network_Devices.pdf
 
Packets, routers and ip addresses
Packets, routers and ip addressesPackets, routers and ip addresses
Packets, routers and ip addresses
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Networking
NetworkingNetworking
Networking
 
Networking concepts by Sachidananda M H
Networking concepts by Sachidananda M HNetworking concepts by Sachidananda M H
Networking concepts by Sachidananda M H
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Routers vs-switch
Routers vs-switchRouters vs-switch
Routers vs-switch
 
Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 

Plus de Michael Sauers

What's On Your Do List?
What's On Your Do List?What's On Your Do List?
What's On Your Do List?Michael Sauers
 
Highlights from CES 2018
Highlights from CES 2018Highlights from CES 2018
Highlights from CES 2018Michael Sauers
 
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Michael Sauers
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in LibrariesMichael Sauers
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyMichael Sauers
 
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsWhat We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsMichael Sauers
 
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Michael Sauers
 
Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Michael Sauers
 
Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Michael Sauers
 
Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Michael Sauers
 
Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Michael Sauers
 
40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools40+ tech tips, tricks, & tools
40+ tech tips, tricks, & toolsMichael Sauers
 
Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Michael Sauers
 
40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 MinutesMichael Sauers
 
eBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureeBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureMichael Sauers
 
Using Audio & Video in the Library
Using Audio & Video in the LibraryUsing Audio & Video in the Library
Using Audio & Video in the LibraryMichael Sauers
 
Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Michael Sauers
 
Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Michael Sauers
 
Library Tech: What's Next?
Library Tech: What's Next?Library Tech: What's Next?
Library Tech: What's Next?Michael Sauers
 
eBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureeBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureMichael Sauers
 

Plus de Michael Sauers (20)

What's On Your Do List?
What's On Your Do List?What's On Your Do List?
What's On Your Do List?
 
Highlights from CES 2018
Highlights from CES 2018Highlights from CES 2018
Highlights from CES 2018
 
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?Getting more $$ from your Book Sale -or- Is this Old Book valuable?
Getting more $$ from your Book Sale -or- Is this Old Book valuable?
 
Emerging Technologies in Libraries
Emerging Technologies in LibrariesEmerging Technologies in Libraries
Emerging Technologies in Libraries
 
Library Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The UglyLibrary Policies: The Good, The Bad, and The Ugly
Library Policies: The Good, The Bad, and The Ugly
 
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The GoodsWhat We've Learned: Tips & Tricks for Webinars That Deliver The Goods
What We've Learned: Tips & Tricks for Webinars That Deliver The Goods
 
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
Tinkers, Printers & Makers: Makerspaces in the Library (NEFLIN 2015)
 
Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)Library UX (NEFLIN 13 November 2014)
Library UX (NEFLIN 13 November 2014)
 
Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)Tinkers, Printers & Makers (NLA2014)
Tinkers, Printers & Makers (NLA2014)
 
Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)Is it Copyrighted? Can I Use it? (NLA2014)
Is it Copyrighted? Can I Use it? (NLA2014)
 
Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)Secure Yourself with LastPass (NLA2014)
Secure Yourself with LastPass (NLA2014)
 
40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools40+ tech tips, tricks, & tools
40+ tech tips, tricks, & tools
 
Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?Is it copyrighted? Can i use it?
Is it copyrighted? Can i use it?
 
40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes40 Tips, Tricks & Tools in 20 Minutes
40 Tips, Tricks & Tools in 20 Minutes
 
eBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & FutureeBooks & eReaders: Past, Present, & Future
eBooks & eReaders: Past, Present, & Future
 
Using Audio & Video in the Library
Using Audio & Video in the LibraryUsing Audio & Video in the Library
Using Audio & Video in the Library
 
Technology in Libraries, What's Next?
Technology in Libraries, What's Next?Technology in Libraries, What's Next?
Technology in Libraries, What's Next?
 
Technology in Libraries: What's Next?
Technology in Libraries: What's Next?Technology in Libraries: What's Next?
Technology in Libraries: What's Next?
 
Library Tech: What's Next?
Library Tech: What's Next?Library Tech: What's Next?
Library Tech: What's Next?
 
eBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & FutureeBooks & eReaders: Past, Present & Future
eBooks & eReaders: Past, Present & Future
 

Dernier

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Dernier (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Tech Blast: Networks

  • 1. Tech Blast: Networks Michael Sauers Tech Rodeo Doane College, 26-28 July 2012
  • 2.
  • 3. Router A router is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks. When a data packet comes in on one of the lines, the router reads the address information in the packet to determine its ultimate destination. Then, using information in its routing table or routing policy, it directs the packet to the next network on its journey. Routers perform the "traffic directing" functions on the Internet. A data packet is typically forwarded from one router to another through the networks that constitute the internetwork until it gets to its destination node.
  • 4. Switch A switch is a telecommunication device which receives a message from any device connected to it and then transmits the message only to that device for which the message was meant. This makes the switch a more intelligent device than a hub (which receives a message and then transmits it to all the other devices on its network.) The network switch plays an integral part in most modern Ethernet local area networks (LANs). Mid-to-large sized LANs contain a number of linked managed switches. Small office/home office (SOHO) applications typically use a single switch, or an all- purpose converged device such as a residential gateway to access small office/home broadband services such as DSL or cable internet.
  • 5. Ethernet Cables • Cat-5 – 10 or 100 Mbps • Cat-5e – Up to 1 Gbps • Cat-6 – Up to 10 Gbps
  • 6. Networking Protocols • TCP/IP • SAMBA – IP address – Used for communicating – Internal vs. External between Linux & – Dynamic (DHCP) vs. Windows computers on Static a LAN • DNS – Domain Name Server • HTTP/HTTPS
  • 7. WiFi • Versions – b (up to 11 Mbps) – g (up to 54 Mbps) – n (up to 150 Mbps) – ac (up to 866.7 Mbps) • SSID – Service Set Identifier • Security – WEP – WPA
  • 8. WiFi Continued • Distance matters • Channels • Access Points / Repeaters / Extenders
  • 9. Power Line Networking Power line communication (PLC) is a system for carrying data on a conductor that is also used for electric power transmission. 200 or 500 Mbps
  • 10. Firewall A firewall can either be software- based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
  • 11. NAS Network-attached storage (NAS) is file-level computer data storage connected to a computer network providing data access to heterogeneous clients. NAS not only operates as a file server, but is specialized for this task either by its hardware, software, or configuration of those elements. NAS is often made as a computer appliance – a specialized computer built from the ground up for storing and serving files – rather than simply a general purpose computer being used for the role.
  • 12. Thanks! Michael Sauers michael.sauers@nebraska.gov diane.r.wells@nebraska.gov