Monday, February 27, 2012

Securing Local Area Network


The diagram above shows what a safe home network could look like. In incorporates a number of different hardware and software solutions that work together to help keep the computer systems safe.
Step 1:-Install a Hardware Firewall/Router:The hardware firewall/router is at the core of your system security. It is on the “front lines” when it comes to protecting your systems. It’s main security purpose is to let you get out to the Internet while keeping the Internet out of your computers. While initially expensive, their price has dropped significantly in the past number of years. In fact, I have seen them as inexpensive as five dollars.

Building local area network


  Building local area network .

To build local area network there are two methods  to build LAN. LAN can be built 1-1-client to client.
2-server to client.

Now, this research will be explained client to client then server to client.

Installation of shared folders in the network


The File and Printer Sharing for Microsoft Networks component allows computers on a network to access resources on other computers using a Microsoft network. This component is installed and enabled by default. It is enabled per connection using TCP/IP and is necessary to share local folders.
The File and Printer Sharing for Microsoft Networks component is the equivalent of the Server service in Windows NT 4.0.

The fundamental of network operating system


An Operating System is a collection of programs that provides an interface between application programs and the computer system (hardware). Its primary function is to provide application programmers with an abstraction of the system resources, such as memory, input-output and processor, which enhances the convenience, efficiency and correctness of their use.

Network protocol


A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. The OSI (Open Systems Interconnection) Reference Model defines seven layers of networking protocols. The complexity of these layers is beyond the scope of this tutorial; however, they can be simplified into four layers to help identify some of the protocols with which you should be familiar (see fig 1).

Network Interface Card


A network card (also called a Network Adapter or Network Interface Card, or NIC for short) acts as the interface between a computer and a network cable. The purpose of the network card is to prepare, send, and control data on the network.

Types of Network Interface Cards


Network interface cards, referred to as NICs, are PC integrate cards that give inter-networking capabilities for a particular computing solution. There are many types of NICs that are utilized in changeable situations. The biggest variation between cards is depending upon their connective medium and speed capabilities. To a lesser extent, NICs can be distinguished by their type of connectivity to PC.