Chapter 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Panko and Panko Business Data Networks and Security, 9 th Edition.

Slides:



Advertisements
Similar presentations
LAN Devices 5.3 IT Essentials.
Advertisements

CCNA3: Switching Basics and Intermediate Routing v3.0 CISCO NETWORKING ACADEMY PROGRAM Switching Concepts Introduction to Ethernet/802.3 LANs Introduction.
Welcome to the Cloud Chapter 1 Panko and Panko
Networking at Home and Abroad
Unit 5 Terminology Study Assignment Review Computer Technology
CSCI-235 Micro-Computers in Science The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
BTT 101 / 2O1 Lesson 10 Dundas Valley Secondary Mr. Young.
Lab Practical 1 Study about different types of networks
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Review on Networking Technologies Linda Wu (CMPT )
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Marwan Al-Namari Week 1. Teaching Plan: Weeks 1 – 14. Week 1-6 (In week 4 you will have a Quiz No.1). Mid Term Holiday Mid-Term Exam. Week 7-14 (In week.
And how they are used. Hubs send data to all of the devices that are plugged into them. They have no ability to send packets to the correct ports. Cost~$35.
Chapter 9A Network Basics.
Basics of Communication & Networking
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
Chapter 4 Computer Networks – Part 1
Lecture 2 TCP/IP Protocol Suite Reference: TCP/IP Protocol Suite, 4 th Edition (chapter 2) 1.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Component Generic Terminology Single Networks Internets Addresses Vary by network technology 32-bit IPv4 Addresses and 128-bit IPv6 Addresses Packets are.
Introductionto Networking Basics By Avinash Kulkarni.
Chapter 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Panko and Panko Business Data Networks and Security, 9 th Edition.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
Networks Computer Technology. Network A computer network, or simply a network, is a collection of computers and other hardware components interconnected.
Copyright © 2002 Pearson Education, Inc. Slide 3-1 CHAPTER 3 Created by, David Zolzer, Northwestern State University—Louisiana The Internet and World Wide.
Networking Components Presented by Jaisson Mailloux LTEC 4550 Network Systems Administration.
Internet and World Wide Web: Amazing Developments Internet- A large collection of computers all over the world that are connected to one another in various.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Chapter 1 Panko and Panko Business Data Networks and Security, 10 th Edition, Global Edition Copyright © 2015 Pearson Education, Ltd. Panko and Panko Business.
Bandwidth. Learning Objectives: explain the importance of bandwidth when transmitting data; explain how different types of communication media govern.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
An Introduction to Networking Chapter 1. Part I: Basic Networks Concepts Concepts we will see throughout the book.
1 Figure 3-2: TCP/IP Standards (Study Figure) Origins  Defense Advanced Research Projects Agency (DARPA) created the ARPANET  An internet connects multiple.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
Computer network  A network consists of multiple computers connected to each other to share data and resources.
Computers Are Your Future Eleventh Edition
William Stallings Data and Computer Communications
MSBCS-BCSI-1 Students will identify computer system components MSBCS-BCSIII-8 Students will examine basics of networking Computer Basics & Terminology.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
Higher Computing Networking. Networking – Local Area Networks.
CSCI-235 Micro-Computer Applications The Network.
Networks and the Internet Topic 3. Three Important Networking Technologies Networks, Internet, WWW.
Network HARDWARE What HARDWARE do you think you need to connect to a Local Area Network??
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Networking Components Quick Guide. Hubs Device that splits a network connection into multiple computers Data is transmitted to all devices attached Computers.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Introduction to Networking. What is a Network? Discuss in groups.
Networks Unit 5 Digital Literacy Computer Technology (S3 Obj 2-1, 2-2 & 2-3)
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Management Information Systems - Introduction. The telecommunication system Telecommunication System – consists of hardware and software that transmits.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
CSCI-100 Introduction to Computing The Network. Network Fundamentals A computer network consists of two or more computers linked together to exchange.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources Usually,
Network System Security - Task 2. Russell Johnston.
Chapter 1: Exploring the Network
Section 4 – Computer Networks
Welcome to the Cloud Chapter 1 Panko and Panko
Designing a local area network
Computer Technology Notes #4
Chapter Goals Compare and contrast various technologies for home Internet connections Explain packet switching Describe the basic roles of various network.
Chapter 4: Data Communication and Networks
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Presentation transcript:

Chapter 1 Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson Panko and Panko Business Data Networks and Security, 9 th Edition © 2013 Pearson

Into the Cloud Basic Network ConceptsPacket SwitchingInternetworkingLayersInternet StandardsA Small Home Network 2 © 2013 Pearson

 Works at the First Bank of Paradise (FBP) in Hawai`i  Develops new media marketing campaigns using Facebook, YouTube, lists, and the bank’s website 3 © 2013 Pearson

 Current project is the AlohaSmart credit card smartcard ◦ Smartcards have chips as well as mag stripes 4 © 2013 Pearson

 In the morning, opens his tablet to check containing remarks about his PowerPoint marketing plan  Turns on his desktop computer and reworks the PowerPoint presentation  Automatically uploaded “to the cloud” with BlueSynch  Later available to his work notebook and to meeting participants 5 © 2013 Pearson

The cloud imagery indicates that the user does not have to understand how systems “inside the cloud” operate. 6 © 2013 Pearson

 PowerPoint is installed on his desktop computer at home.  For his work notebook computer and on his tablet, PowerPoint is stored in the cloud. ◦ He downloads it when he needs it. ◦ Pays for it by the month, as a service. ◦ It is called software as a service (SaaS). 7 © 2013 Pearson

8

 On the FBP networking staff  Manages the headquarters building wireless LANs  Walks around doing readings with her sniffer program  Learns information about access points, their signal power, and their security 9 © 2013 Pearson

10 © 2013 Pearson

SSIDFBP BSSID A1-B2-C3- D4-E5-F6 BB-D5-33-D4- 6B-DD 19-FF-AE-D4- EC-63 Signal-85 dBm-60 dBm Mode802.11g802.11n Channel EncryptionAES-CCMP AuthenticationWPA2/PEAP VendorCisco 11 © 2013 Pearson

 Currently, must walk around at least daily. ◦ Even then, cannot find intermittent problems.  FBP is installing a centralized wireless management system. ◦ Will be able to manage all access points centrally. ◦ She can constantly monitor the network for problems. ◦ The network will alert her to problems. ◦ The system can even make adjustments automatically. 12 © 2013 Pearson

 In charge of wireless security at FBP  BYOD (Bring Your Own Device) Problem ◦ Number of smartphones and tablets is exploding ◦ Owned by the employees but used partially for business purposes ◦ Great diversity in smartphone and tablet operating systems ◦ Device security is improving but limited 13 © 2013 Pearsonl

 Claire Lorek found a rogue access point in one of her walkarounds.  She and John Lee visited Albert Gomes who installed the unauthorized access point.  Albert thought that the access point was secure in stealth mode.  However, Claire’s and hackers’ software could find it. 14 © 2013 Pearson

 Rather than punish Albert Gomes, they worked to help him.  His department did need more capacity.  Claire would install another access point, one with strong security.  John and Claire had developed an ally. 15 © 2013 Pearson

Into the Cloud Basic Network Concepts Packet SwitchingInternetworkingLayersInternet StandardsA Small Home Network 16 © 2013 Pearson

Working Definition 17 © 2013 Pearson

18 © 2013 Pearson

19 © 2013 Pearson

20 © 2013 Pearson

The client and the server share processing work. 21 © 2013 Pearson

P2P Processing can be done without a network (as shown) or with a network. No servers are needed. 22 © 2013 Pearson

Transmission Speed Measurements Bits per second (bps) Usually not bytes per second (Bps) Metric Suffixes Kilobits per second kbps (lowercase k)1,000 bits per second (not 1,024) Megabits per second Mbps1,000 kbps Gigabits per second Gbps1,000 Mbps Terabits per second Tbps1,000 Gbps 23 © 2013 Pearson

File Downloads 100 kbps 1 Mbps 5 Mbps 10 Mbps 100 Mbps 1 Gbps message (250 words).15 s0 s Photograph (5 MB) 8 m1 m10 s5 s1 s0.1 s 1 Hr HTDV Video (10 Mbps) 4 d10 h2 h1 h6 m36 s Backup Synch (10 GB) 12 d28 h6 h3 h17 m2 m 24 © 2013 Pearson

Live or Streaming Media 100 kbps 1 Mbps 5 Mbps 10 Mbps 100 Mbps 1 Gbps MP3 Song (10 kbps) OK Standard Quality TV (2 Mbps) OK HDTV (10 Mbps)OK Three HDTV Channels OK 25 © 2013 Pearson

Into the CloudBasic Network Concepts Packet Switching InternetworkingLayersInternet StandardsA Small Home Network 26 © 2013 Pearson

27 © 2013 Pearson

28 © 2013 Pearson

29 © 2013 Pearson

30 © 2013 Pearson

31 © 2013 Pearson

32 © 2013 Pearson

33 © 2013 Pearson

34 © 2013 Pearson

 Each switch along the way forwards the packet out a port to another switch (or to the destination host).  Individual packet switches have no knowledge of the entire path taken by the packet.  We will see how this works in detail in later chapters. 35 © 2013 Pearson

36 © 2013 Pearson

37 © 2013 Pearson

 Forerunner of the Internet  Funded by Larry Roberts at the Advanced Research Projects Agency (ARPA) ◦ Now the Defense Advanced Research Projects Agency (DARPA)  To explore packet switching  To give researchers access to ARPA-funded software on host computers in distant cities  First four nodes began operation in © 2013 Pearson

39 © 2013 Pearson

40 © 2013 Pearson

Into the CloudBasic Network ConceptsPacket Switching Internetworking LayersInternet StandardsA Small Home Network 41 © 2013 Pearson

 Bob Kahn at DARPA needed a way for researchers on one network to use resources on another network.  Packets would have to travel across multiple networks.  Kahn and Vint Cerf came up with the idea of connecting multiple networks by devices called routers. ◦ The original name was gateways.  Generically, networks of networks are internets.  Kahn created the global Internet (Capital I). 42 © 2013 Pearson

43 © 2013 Pearson

 Capitalization of “internet” ◦ With an uppercase “I,” Internet means the global Internet we use every day. ◦ With a lowercase “i”, internet means any internet or the internet layer. 44 © 2013 Pearson

 Basically, Kahn and Cerf created a second layer of networking on top of single networks.  This required the creation of a parallel set of concepts for single networks and internets.  Single networks and internets use similar concepts but give these concepts different names.  It is important for you to get this clear in your head. 45 © 2013 Pearson