Chapter 3 : Distributed Data Processing Business Data Communications, 4e.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Chapter 9 Designing Systems for Diverse Environments.
8.
Chapter 17: Client/Server Computing Business Data Communications, 4e.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Distributed Database Management Systems
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Overview Distributed vs. decentralized Why distributed databases
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 7: Client/Server Computing Business Data Communications, 5e.
Chapter 3 : Distributed Data Processing
Chapter 3 : Distributed Data Processing
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Chapter 3 : Distributed Data Processing Business Data Communications, 4e.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
The Design of System Architecture
Intranet, Extranet, Firewall. Intranet and Extranet.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Chapter 17: Client/Server Computing Business Data Communications, 4e.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Networks Manraj Sekhon. What is a VPN?
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Remote Access Lecture 2.
Chapter 3 : Distributed Data Processing
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
VPN: Virtual Private Network
Chapter 17: Client/Server Computing
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Chapter 3 : Distributed Data Processing Business Data Communications, 4e

2 Centralized Data Processing Centralized computers, processing, data, control, support What are the advantages? Economies of scale (equipment and personnel) Lack of duplication Ease in enforcing standards, security How is data communications implemented? Holiday Inn Holiday Inn Examples? Holiday InnHoliday Inn Figure 3.1 (p.42)

3 Distributed Data Processing Computers are dispersed throughout organization Allows greater flexibility in meeting individual needs More redundancy More autonomy How is data communications implemented? Examples? J.P. Morgan (Figure 3.2, p.44)J.P. Morgan

Why is DDP Increasing? Dramatically reduced workstation costs Improved user interfaces and desktop power Better end-user programming Ability to share data across multiple servers

5 DDP Pros & Cons There are no “ one-size-fits-all ” solutions Key issues How does it affect end-users? How does it affect management? How does it affect productivity? How does it affect bottom-line?

Benefits of DDP Responsiveness Availability Correspondence to Org. Patterns Resource Sharing Incremental Growth Increased User Involvement & Control End-user Productivity Distance & location independence Privacy and security Vendor independence Flexibility

Drawbacks of DDP More difficulty test & failure diagnosis More components and dependence on communication means more points of failure Incompatibility of components Incompatibility of data More complex management & control Difficulty controlling information resources Suboptimal procurement Duplication of effort

Reasons for DDP Need for new applications On large centralized systems, development can take years On small distributed systems, development can be component-based and very fast Need for short response time Centralized systems result in contention among users and processes Distributed systems provide dedicated resources

The DP “ Pendulum ” Centralized systems (mainframes, etc) Distributed systems (PCs) Networked systems Client-Server computing

Client/Server Architecture Combines advantages of distributed and centralized computing Cost-effective, achieves economies of scale Flexible, scalable approach

Intranets Uses Internet-based standards & TCP/IP Content is accessible only to internal users A specialized form of client/server architecture

Extranets Similar to intranet, but provides access to controlled number of outside users Vendors/suppliers Customers

Virtual Private Networks - VPN Use encryption and authentication Provide secure connection to LAN via insecure network (Internet) Cheaper than real private networks, but less reliable Encryption performed by firewall or routers

VPN (Virtual Private Network)

VPN 技術 穿隧技術 (Tunneling) IPSec (IP Security) PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) 加解密技術 (Encryption/Decryption) Private/Public/Hybrid Key Encryption 密鑰管理 (Key Management) SKIP (Simple Key Management for IP) IKE (ISAKMP/Oakley) 使用者與設備身份認證技術 (Authentication) Username/Password + Token Number X.509 Certificate by Certificate Authority (CA)

What is distributed? Distributed applications One application dispersed among systems One application replicated on systems Different applications on different systems Distributed data centralized database (not distributed data) replicated database partitioned database

Distributed applications Horizontal partitioning Different applications on different systems One application replicated on systems Example: Office automation Vertical partitioning One application dispersed among systems Example: Retail chain POS, inventory, analysis

Distributed data Centralized database Pro: No duplication of data Con: Contention for access Replicated database Pro: No contention Con: High storage and data reorg/update costs Partitioned database Pro: No duplication, limited contention Con: Ad hoc reports more difficult to assemble

Networking Implications Connectivity requirements What links between components are necessary? Availability requirements Percentage of time application or data is available to users Performance requirements Response time requirements