Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

protocall 8 Rules that allow the exchange s transmissions

of Data allowscompto com on a net

NEtwork operating system

capable on functioning on it'sown

passing username spassword


for checking when a userlogin

separating users account sothat

users can'taccess each other's

devices

provide access to a network

storage and access to shared


Resources such as printer

here are 3 methods used to identify thedevice

Internet protocol IP
Macaddress
30Device's name
IPaddress unique addressthat the devices use
tosend data to each other
IPV4 Ygroups of 3 numbers separatedby a
IPV6 8groups of 4 hexadecimels numb separatedbya

Mac
Media access
control

unlike IP address make ardress are universly unique


Identifiers give to the network interface card MIC

MAC8 are used in IAN usingethernet wifi and bluetooth


It's made of six pairs of the first 3pairs
are usuallyused to identify themanufacturer
and the remaining pairs used to identify thedevice

uses of Mac addresses


To Restrecting orgivingaccess to a network
Mac address filtercheck the devices attemping togainaccess tothe network
Mac address only grantaccess to specificMac adresses

20 Identify adevice on a network

some wifihotspot only provides access to thenetwork for acertainperiod oftime


Mac address woksout weather advice trying to access hotspot for longer

thanthepermited time
3 Tracking advice
checking wich wirless A p have accessed to a specivif Mac address
Yo fixed IP adress

a booster is used to amplify the signal in the


network so that its range can be extended

wirless point
acess can be used as abooster
for wifi signal
wireless access point allows devices with
wify connectivity to connect to a wire
network
server
a is a computer that shares
its devices with connected devices

a computer connected to a server clinet

Authentication server
checks the username and password whe a user

successfully log in the clinet receive an electronic


certificate so that then they can use shared
Resources

Print server
multible printers at a time dealing with
manages
print request fromclinet and adding tops to queue
so that the individuate printer doesn't overloade

It can also monitor and process print request

File server 8allow users to access shared and


private storage

App server dined with access to that


p pp
runs directly from the server

Http 8 hypertext transfer Protocol


a set of standard used to control haw computers

documents that are written in Html connected to


each other

web server 8 process reques of data made


via http

dienet often access to web server fromoutsid


the law to wich server is connected

in order to have access to online server


clinets computer must be connected to
the internal

Internet service provide 8


provide connection for telecommunication

Infrastructure
network of hard facilities ownedby
privatef or public org that are used to transfer
dat
That forme framework for the internet

It's accessed by mobile phone network landline


phone network
charge sub fees

web browser 8 softwor application used


to Request and display information stored
in web server safari chrom opera Mic edge

search engine provide a way for users to find


information in webbage stored in web server
user enter a key words for the info he's looking
for the season engine then compares it with
to stored in dal

connecting to Ian 8
shared internet access
shared access to peripharey
shared access to data and
g
communication
flexability
media streaming

clinet server Network


Control usere's access right
centralised adminestirator
centralised backup
shared softwores
share data and storage
Roaming profiles

fire walls prevent unauthorised users from


accessing network and resources

Encryption

to Caesar cipher shift the letter to the left


by a set number of places
of
places by wich a letter has shifted
is Mey
ey

symetric Hey incryption


uses the same key at encryption and decryption
public key incryption
L s uses 2 mammatically related key's called
a pair Heys one key for in 8 differentonefor

wirless incryption protocol wep


1 least secure methods of encryption be
all devices on the network use the same toy
for transfere
if endes draper studied enough packets they can

identify the key

Wifi protected address

it provides a different key for devices on the wifi


network and it gives a new key in every transfere

use Upn virtual private network

access employe network when working from


home
Make secured payment
avoid geological access restriction

File access rights


ensure that user is allow to read read it

transaction logoidentify wich comp and


network devices has been accessed
this allows addminstivator to identify
unusual activities

babe copy of one or more


up
files often stared on other ded
From the origina donic

You might also like