Course : INTERNET TECHNOLOGY AND WEB DESIGN
Module : Internet Connectivity
TABLE OF CONTENT
UNIT NUMBER 3/11
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Syllabus
3.1 Objectives
3.2 Internet Connectivity
3.3 Connectivity Types
3.3.1 Level One Connectivity
3.3.2 Level Two Connectivity
3.3.3 Level Three Connectivity
3.4 Setting up a Connection
3.4.1 Hardware Requirement
3.4.2 Selection of a Modem
3.4.3 Software Requirement
3.4.4 Modem Configuration
3.5 Internet accounts by ISP
3.5.1 Telephone line options
3.5.2 Protocol options
3.5.3 Service options
3.6 Summary
3.7 Model Questions
Assessment 1
Assessment 2
References
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.1 Objectives
Objectives
• At the end of this course, the user will be able to
Understand what is Internet connectivity
Known about how to set up the connection
Understand about telephone line options
Known about the protocol options
Understand about the service options
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.2 Internet Connectivity
Topic: 3.2.1 Internet Connectivity
Internet Connectivity
• There are various type of connectivity to get hook on to internet.
• They all can be broadly classified into following category.
Level one connection
Level two connection
Level three connection
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.3 Connectivity Types
Topic: 3.3.1 Level One Connectivity
Level One Connectivity
• Level One Connectivity is also known as Gateway access.
• It is the access to the Internet from a network that is not on the Internet.
• The gateway allows the two networks to "talk" to each other, but the users of
the Gateway internet are limited in their ability to fully access all of the tools
available on the Internet.
• With Level One connectivity, users are limited in what they can access on the
Internet by what their service provider allows them to access.
• Good examples of networks with Level One connectivity are America Online
(AOL), CompuServe, Prodigy, and many of the other commercial on-line
services.
• AOL is in effect, it has a great number of different programs that its
subscribers can use (like the chat rooms), but all of these programs run only
on the AOL network.
• AOL subscribers, and subscribers to most of the other commercial on-line
services, are lucky in that they can access some of the tools on the Internet
through their gateway.
• Many people with Level One connectivity only have e-mail access.
FIG 3.1: Gateway Access
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.3 Connectivity Types
Topic: 3.3.2 Level Two Connectivity
Level Two Connectivity
• Level Two connection is also known as Dial-up connection.
• This provides connection to Internet through a dial-up terminal connection.
• The computer, which provides Internet access, is known as ‘Host’ and the
computer that receives the access, is ‘Client’ or ‘Terminal’.
• The client computer uses modem to access a “host” and acts as if it is a
terminal directly connected to that host. 56K modem access is now widely
available and supported by most ISPs.
• It allows user to surf the Web at 56 Kbps with graphics.
• So this type of connection is also known as ‘Remote Modem Access’
connection.
• And the host to which the client gets connected is actually connected to the
Internet by a full time connection.
• In dial-up connection to Internet, Host carries all the command that are typed
on a client machine and forward them to Internet.
• It also receives the data or information from the Internet on behalf of the
‘Client’ and passes it to them.
• The client computer acts as a ‘dumb’ terminal connected to remote host.
• This type of connection can further be divided into three categories.
Shell Connection
TCP/IP Connection
ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 3.2: Dial-up Connection
• Shell Connection
In this type of Internet Connection, the user will get only textual matter of a
Web Page.
This connection does not support Graphics display.
Shell Accounts were the only type of Internet access available for many
years before the Internet entered in to the world of graphics and became
more users friendly.
• TCP/IP Connection
Today’s graphical World Wide Web browsers provide easier access with
multimedia sound and pictures.
The major difference between Shell and TCP/IP account is that, Shell
account can only display text and does not support graphics display,
whereas TCP/IP can display both.
• ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
ISDN (Integrated Services Digital Network) offers Internet connectivity at
speeds of up to 128 Kbps through the use of digital phone lines. ISDN is a
dial-up service that has been provided by telephone companies for many
years.
To access any of these dial-up accounts you need the followings:
Computer
Modem
Telephone Connection
Shell or TCP/IP/ISDN account from the ISP
Internet client software such as Internet browser
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.3 Connectivity Types
Topic: 3.3.3 Level Three Connectivity
Level Three Connectivity
• Leased connection is also known as direct Internet access or Level Three
connection.
• It is the secure, dedicated and most expensive, level of Internet connection.
• With leased connection, your computer is delicately and directly connected to
the Internet using high speed transmission lines.
• It is on-line twenty-four hours a day, seven days a week.
• It provides secure and private dedicated connection.
• It can be laid for people requiring extra high bandwidth.
• Provides symmetrical, uncontended high speed connection.
• It is reliable and dependable but it is very expensive to install.
• It is not suitable for single or home workers.
FIG 3.3: Leased Connection
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.4 Setting up a connection
Topic: 3.4.1 Hardware Requirement
Hardware Requirement
• Computer the minimum hardware requirements are as follows.
Windows XP, Vista, or later
1.0 GHz or faster processor
1 or more gigabytes (GB) of RAM
Sound card and speakers
DVD drive
Monitor capable of 24-bit color at 1,024 x 768 resolution or better
• Internet
DSL or Cable connection through an Internet Service Provider (ISP).
Account plans offering a minimum of 1.5 MB download and 512 upload speed
is recommended.
AOL may require special set up with AOL tech support.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.4 Setting up a connection
Topic: 3.4.2 Selection of a Modem
Selection of a Modem
• While selecting a modem do the following.
• Check the service
Depending on whether user has cable or DSL service, a user needs a
different kind of modem.
If user is establishing new service, determine which type of broadband
service they have access to before purchasing a modem.
Be sure that user is aware of the different features of the two types of
broadband Internet before making a decision or signing a broadband
contract.
• Ensure interfaces
It is important that user select a robust broadband modem that is able to
connect to the device.
Ensure that the prospective broadband modem is capable of connecting to
the device through one of its available interfaces such as USB, PC card,
serial port or PCI/ISA port.
Check which interface is available for connection on the device before user
head to the store to make a purchase.
• Don't overlook leasing a modem
One easy way to make a decision about the broadband modem is to lease
one from the Internet service provider.
By leasing one, user is able to pay a low monthly fee and ensure that it is
suitable for the service.
The Internet service provider is able to assist user in selecting a modem that
works well with both the device and the equipment for the best speed and
performance.
• Don't forget about price considerations
If user is set on purchasing their own modem, set a price to pay before
heading to the store.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
An internal modem is priced the lowest, while external and USB modems are
more expensive.
PC card modems are also an inexpensive choice to gain connectivity.
Shop around within the price range to determine which is the best selection
for the budget
Broadband modems bring with them lots of options and variety.
Ensure that user is knowledgeable of all the necessary components to make
a smart decision when heading out to find a suitable modem to run the home
network.
FIG 3.4: Modem
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.4 Setting up a connection
Topic: 3.4.3 Software Requirement
Software Requirement
• Operating System
Windows XP Pro or Home Edition. (Vista probably works but hasn’t tested
that yet. Mac or Linux may be OK but it cannot provide much support.)
• Security
This is a very important concern. There will be those who will try to gain
access to the PC, perhaps by finding a way to crash the AED software and
get to the Desktop.
• Here are six security measures that can be taken.
Minimal, Non-Administrator account
Anti-Virus
AED loop-forever script
PC lock down software
NO LINKS in content (that you create and add to your display)
Hide the keyboard.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.4 Setting up a connection
Topic: 3.4.4 Modem Configuration
Modem Configuration
• This is the most important part and requires only one time customization.
• Connect the Modem to the Power Supply Adapter.
• Next connect the Ethernet Cable from the Modem Ethernet Port to the
Ethernet Port on the PC and wait for the PC/USB light to flash constantly.
This means that the Modem has successfully integrated to the LAN system.
FIG 3.5: Modem Configuration
• Now open up a Browser and in the Address Bar type http://192.168.1.1/. This
will take to the Modem Configuration page.
• Enter user name: admin and password: admin when prompted.
• If it fails to authenticate then check the ISP manual to get the user name and
password.
• Now click on the “Internet Connection” tab on the left.
• Once successfully logged in, the Modem will display the device info on the
screen.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.5 Internet Accounts by ISP
Topic: 3.5.1 Telephone line Options
Telephone line Options
Dial-up Connections
• Dial-up Internet access is a type of Internet connectivity that operates through
a standard telephone line.
• Dial-up access refers to connecting a device to a network via a modem and a
public telephone network.
• Dial-up access is just like a phone connection the only difference is that;
rather than people at the two ends computer devices are present.
• Dial-up access uses normal telephone lines thus the quality of the connection
is not always good and data rates are limited.
• Dial-up internet access is offered through a number of Internet Service
Provider (ISP).
• Most ISPs lease a set of telephone numbers, sometimes local, sometimes
national, that dial into network pipeline that feed into the Internet.
• Open joining a dial-up service, the subscriber chooses a user name and
password.
• Once the modem calls the phone number and makes a connection a
“handshake” takes place in which information is exchanged between the
computer modem and the remote server.
• The user name and password is supplied by the modem.
• This grants the user access through the dial-up gate way to the Internet.
• Dial-up service is least expensive but also the slowest type of Internet
access.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 3.6: Dial-up Connection
Connecting to Dial-Up Internet Accounts
• Click on Start and point to Control Panel.
• Click on Network and Internet Connections.
• Click on Network Connections.
• Click on Create a new connection.
• Click on Next.
• Select Connect to the Internet and Click Next.
• Select Set up my connection manually and Click Next.
• Select Connect using a dial-up modem and Click Next.
• In the open field type in “Setarnet” and Click Next.
• Type in the phone number for ISDN dialup and Click Next.
• Type in the “Username” and “Password” and Click Next.
• Click Finish and the Internet setup are complete.
Dedicated Access
• Dedicated Internet Access is a reliable and scalable worldwide Internet
access service.
• It is specifically designed to maximize today’s business-critical VPN
connectivity needs.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The ISPs managed Internet connectivity with a comprehensive suite of
services features, all at the fair market price required by global businesses.
• The key benefit of dedicated access is that it is cost effective and it provides
reliable internet access.
ISDN Connection
• ISDN is abbreviation of Integrated Services Digital Network.
• ISDN is an international communications standard for sending voice, video
and data over digital telephone lines or normal telephones wires.
• ISDN supports data transfer rates of 64 Kbps (i.e., 64000 bits per seconds).
• It is mostly designed for leased lines.
• Configuration allows for multiple types of terminations. It uses a Terminal
Adapter (TA) for termination and it is not a modem.
• There are two types of ISDN.
Basic Rate Interface (BRI)
Primary Rate Interface (PRI)
• Basic Rate Interface (BRI)
It consists of 64 Kbps B-Channels and one D-Channels for transmitting
control information.
• Primary Rate Interface (PRI)
It consists of 23 B-Channels and one D-Channel (U.S.)
• The original version of ISDN employs base band transmission.
• Another version, called B-ISDN, uses broadband transmission and is able to
support transmission rates of 1.5 Mbps. -ISDN requires fiber optic cables and
is not widely
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 3.7: ISDN Connection
ISDN Services
• ISDN telephony
• ISDN telecopy
• ISDN and analog terminals
• Call forwarding
• Call waiting
• CLIP (Calling Line Identification Presentation)
• CLIR (Calling Line Identification Restriction)
• Three-party conference
• Advice of change
• Malicious call identification
Advantages of ISDN
• Digital services with less error.
• Direct fast connection with no dialing.
• Higher bandwidth (Takes less time in downloading material).
• Supports multiple users.
• Able to use ISDN for more than one task.
Disadvantages of ISDN
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• ISDN is more expensive to install than a standard telephone.
• Not easy to set up.
• All exchanges do not provide ISDN service.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.5 Internet Accounts by ISP
Topic: 3.5.2 Protocol Options
Protocol Options
Secure Shell (SSH)
• Secure Shell or SSH is a network protocol that allows data to be exchanged
using a secure channel between two networked devices.
• It is used primarily on Linux and Unix based system to access shell accounts,
SSH was designed as a replacement for Telnet and other in secure remote
shells, which send information, notably passwords, in plain text, leaving them
open for interception.
• The encryption used by SSH provides confidentially and integrity of data over
an insecure network, such as the Internet.
• SSH is typically used to log into a remote machine and execute commands
FIG 3.8: Secure Shell (SSH)
SLIP
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The Serial Line Internet Protocol (SLIP) is a mostly obsolete encapsulation of
the Internet Protocol designed to work over serial ports and modem
connections.
• SLIP (on PCs) has been largely replaced by the Point-to-Point Protocol
(PPP), which is better engineered, has more features and does not require its
IP address configuration to be set before it is established.
• SLIP does not provide error detection, therefore SLIP on its own is not
satisfactory over an error-prone dial-up connection.
• SLIP is a protocol for connection to the Internet via a dial-up connection.
FIG 3.9: SLIP
PPP
• Point-to-Point Protocol or PPP is a data link protocol commonly used to
establish a direct connection between two networking nodes.
• PPP originally emerged as are encapsulation protocol for transporting IP
traffic over Point-to-Point links.
• It is a protocol for communication between two computers using a serial
interface, typically a personal computer connected by phone line to a server.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• PPP is a full duplex protocol that can be used on various physical media,
including twisted pair or fiber optic lines or satellite transmission.
• PPP is usually preferred over the earlier de facto standard SLIP because it
can handle synchronous as well as asynchronous communication.
• PPP can share a line with other users and it has error detection that SLIP
lacks.
FIG 3.10: Point-to-Point Protocol
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter: 3.5 Internet Accounts by ISP
Topic: 3.5.3 Service Options
Service Options
E-mail
• E-mail (electronic mail) is the exchange of computer stored messages by
telecommunication.
• E-mail is a system of worldwide communication in which a computer user can
compose a message at one terminal that can be regenerated at the
recipient’s terminal when user Logs in.
• Thus E-mail is a system of sending and receiving messages electronically
over a network, as between personal computers.
FIG 3.11: E-Mail
WWW
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The World Wide Web (commonly abbreviated as WWW) is a system of
interlinked hypertext documents accessed via the Internet.
• The World Wide Web enabled the spread of information over the Internet
through an easy-to-use and flexible format.
• It thus played an important role in popularizing the use of internet.
FIG 3.12: World Wide Web
Firewall
• A firewall is a program or device that acts as a barrier to keep destructive
elements out of a network or specific computer.
• Firewalls are configured (in hardware, software, or both) with specific criteria
to block or prevent unauthorized access to a network.
• They work as filters for your network traffic by blocking incoming packets of
information that are seen as unsafe.
• In large corporations, if a firewall is not in place, thousands of computers
could be vulnerable to malicious attacks.
• Firewalls should be placed at every connection to the internet and are also
used to control outgoing web traffic as well in large organizations.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 3.13: Firewall
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.2 Network Definition
Topic : 4.2.1 Network Definition
Network Definition
• A network is any collection of independent computers that communicate with one
another over a shared medium.
• A computer network is a collection of two or more connected computers.
• When these computers are joined in a network, people can share files and
peripherals such as modems, printers and tape backup drives.
• The computers on a network may be linked through cables, telephone
lines, radio waves, satellites etc.
FIG 4.1: Network
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.1 Local Area Network (LAN)
Local Area Network (LAN)
• LAN is a group of computers and network communication devices within a limited
geographical area such as home, school and office building.
• The devices used in this network can be connected via wired cable or wireless
links.
FIG 4.2: Local Area Network
• Depending on the needs of an organization and the type of technology used, a
LAN can be as simple as two PCs and a printer in someone's home office or it
can extend throughout a company and include audio and video peripherals.
• Currently, LAN size is limited to a few kilometers.
• LANs are designed to allow resources to be shared between personal computers
or workstations.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The resources to be shared can include hardware (e.g., a printer), software (e.g.,
an application program), or data.
• The most common LAN topologies are bus, ring, and star. Early LANs had data
rates in the 4 to 16 megabits per second (Mbps) range.
• Wireless LANs are the newest evolution in LAN technology.
• LANs are configured in any one of two basic structures. Such as
Peer-to-Peer
Client/Server
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.2 LAN Applications
LAN Applications
• LANs are mostly used in office environment.
• In an office environment it is mainly used for three purposes.
Sharing
Interoffice Communication
Internet Communication
• Sharing
Sharing Hardware
Users can be connected through Local Area Network to the single printer
or data storage.
Jobs from each user are queued in that single printer.
FIG 4.3: Hardware Sharing
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Sharing Software
Through LAN connection users can share programs such as accounting
programs, which is stored in a single machine.
FIG 4.4: Sharing of Software in LAN Network
Sharing Data
Sharing of large database between the users is also another big
advantage.
• Interoffice Communication
The employee of a company can communicate with each other using this
network.
Some of the LAN messenger is used within the office area are,
Tonic
CD Messenger
Squiggle - A free, open source LAN Messenger
Outlook Messenger
These types of communication are sometimes more effective than voice
communication by phone, where users can save money.
• Internet Communication
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Another usage of LAN in an office environment is external communication, via
the internet.
Each employee can use the LAN for the connection to the internet.
FIG 4.5: Sharing of Internet connection in office
In the FIG 4.5 Host computer is connected to the modem and hub, through
hub. Now all the systems in the office get access to the internet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.3 Wide Area Network (WAN)
Wide Area Network (WAN)
• Wide Area Network (WAN) spans over a large geographical area such as
a state or a country.
• A Wide Area Network is different from MAN because of the distance
between each of the network.
• The best example of a WAN could be the Internet that is the largest network in
the world.
FIG 4.6: Wide Area Network (WAN)
• The world's most popular and longest Wide Area Network is an Internet.
• It makes communication of computers and users in one location with the
computers and users in another location.
• It covers long distance via telephone lines, fiber optic cables or satellite links.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
• The protocol used in a WAN is TCP/IP (Transfer Control Protocol/) in
combination with the devices such as router, switches, firewall and modems.
FIG 4.7: WAN connection in the Modem
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.4 WAN Connection Types
WAN Connection Types
• The three different WAN connections that can be used to connect the LAN's
together are,
Dedicated connection.
Circuit switching.
Packet switching.
• Dedicated connection
This connection is also referred as point-to-point connection or leased
connection.
It uses synchronous serial lines up to 45Mbps.
FIG 4.8: Dedicated connection
No setup is made before transmission, it constantly transfers the data.
• Circuit switching
The term circuit switching is same like a phone call.
FIG 4.9: Circuit switching
No data can transfer before end to end connection is established.
It is used for low-bandwidth data transfer.
Examples of circuit-switched networks are
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Dial-up.
ISDN (Integrated Service Digital Network).
• Packet switching
Packet switching method allows user to share bandwidth with other
companies to save money.
FIG 4.10: Packet- switching
The packet switching transfers packets across a carrier network.
Speed can range from 56Kbps to T3 (45Mbps).
Examples of packet switching are,
Frame Relay,
X.25 Network,
Internet Protocol,
Ethernet.
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.5 Node
Node
• A node is a system or device connected to a computer network.
• Nodes can be computers, Personal Digital Assistants (PDAs), cell phones, or
various other network appliances.
• For example, if a network connects a file server, five computers, and two printers,
there are eight nodes on the network.
• Each device on the network has a network address, such as a MAC address,
which uniquely identifies each device. This helps keep track of where data is
being transferred to and from on the network.
FIG 4.11: Node
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.6 Host
Host
• A host is one or more networked computers that have been setup to handle each
user visiting or requesting information.
• A host is responsible for many different responsibilities, for example, a host may
be responsible for handling each of the computer players in an online game or for
sending users a web page on the Internet.
• Each computer connected to the host computer is known as a client.
FIG 4.12: Host
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.7 Workstation
Workstation
• Workstation, a high-performance computer system that is basically designed for
a single user and has advanced graphics capabilities, large storage capacity, and
a powerful microprocessor (Central Processing Unit).
• A workstation is a name given to a single computer that is connected to another
computer or network.
• A workstation is more capable than a Personal Computer (PC) but is less
advanced than a mid-range computer.
FIG 4.13: Workstation
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.8 Bandwidth
Bandwidth
• The amount of information that can be transmitted through a communications
channel in a given amount of time that is, the capacity of the channel.
• It is often uttered in bits per second, or alternatively bytes per second, leading to
lots of confusion.
• Bandwidth figures are used to express the capacity of a network link or interface
(e.g., a 100Mbps Ethernet interface) or the rate of information transfer (e.g. a file
downloading at 3.2KB/s).
• When referring to user's own connection, bandwidth, communication speed
or connection speed is the total maximum capacity of the network or modem
connection.
• The more bandwidth a computer has, the faster it will be able to receive and
send information.
• A modem with a connection of 56kbps is nearly twice as fast as one 28.8kbps
and users with a broadband connection can get transfers speeds of
several MB every second, which is more than triple the speed of the fastest
modem.
FIG 4.14: Bandwidth
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.9 Interoperability
Interoperability
• Interoperability is the ability of different networks or programs to work or
communicate together without the need of additional tools or interfaces required
by the user.
• For example, most networks use TCP/IP, which is available on all operating
systems, computers and supported with most networks.
• In this current Internet age, it is important that networks of different type are able
to communicate with other types of network.
• Not being able to transfer data between networks may isolate a network and
decrease efficiency.
FIG 4.15: Interoperability
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.10 Network Administrator
Network Administrator
• A network administrator is an individual or group of individuals responsible for the
maintenance and operation of a network or server.
• A network administrator may be responsible for maintaining a network and may
be assigned to one or more of the below tasks.
• Network administrator responsibilities.
Allocating and adding disk storage space.
Designing or redesigning the network.
Expanding the network.
Helping employees with computer questions.
Installing and upgrading computers and network equipment on the network.
Managing filters and rules (e.g. ACL's, firewalls, QoS, SPAM filters).
Monitoring the network.
Resetting user names and passwords.
Setting up a network, network device, or computers on the network.
Testing a network for security vulnerabilities.
• Examples of network administrator certifications
MCSA
Network+
CCNP
CNA
RHCE
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
FIG 4.16: Network Administrator
E-Content of
INTERNET TECHNOLOGY AND WEB DESIGN
Chapter : 4.3 Common Terminologies
Topic : 4.3.11 Network Security
Network Security
• A specialized field in computer networking that involves securing a computer
network infrastructure.
• Network security is typically handled by a network administrator or system
administrator who implements the security policy, network
software and hardware needed to protect a network and the resources accessed
through the network from unauthorized access and also ensure employees to
have adequate access to the network and resources to work.
• A network security system typically relies on layers of protection and consists of
multiple components including networking monitoring and security software in
addition to hardware and appliances.
• All components work together to increase the overall security of the computer
network.
FIG 4.17: Network Security