Chapter 3 Internet Architecture. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall2 Overview What is a Network? IP Addresses Networks Information.

Slides:



Advertisements
Similar presentations
Chapter 4 Internet Architecture. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OVERVIEW What is a Network? IP Addresses Networks Information Transfer.
Advertisements

Networks Terminology and Hardware. Network A network is a group of connected computers that can communicate with each other to share information and equipment,
Connecting to a computer Network Network interface Card (NIC) Connecting Devices Network Cables Wireless Networks Network Topology Network Operating System.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
James Tam Computer Networks You will learn what is a network, how they work and what are the different types.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Telecommunications Chapter 5 Chapter 5 Telecommunications
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
Networks “Each time you use the telephone you use the world’s largest computer network – the telephone system”
Computer Networks & Security
Review on Networking Technologies Linda Wu (CMPT )
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Telecommunication and Networks
LAN Local Area Network By Amal Wali 10DD.
Communications and Networks Chapter 6. Objectives Defines the components required for successful communications Describe uses of communications Identify.
COMPUTER NETWORKING A computer network, often simply referred to as a network, is a collection of computers and devices interconnected by communications.
 Local Area Network (LAN) Local Area Network (LAN)  Wide Area Network (WAN) (The Internet) Wide Area Network (WAN)
Information Technology in Business: Telecommunications, Networks and Internet Basics.
Communications & Networks
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
Chapter 5 Networks Communicating and Sharing Resources
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
Networks and Telecommunications
Chapter 9A Network Basics.
Data Communication & Computer Networks
Networks LANS,. FastPoll True Questions Answer A for True and B for False A wireless infrastructure network uses a centralized broadcasting device, such.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
1 Client Server Architecture over the Internet Week - 2.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Module 2: Information Technology Infrastructure
NETWORKS.
ELC 200 Day 3 & 4. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall2 Agenda Assignment #1 Due –Students must record on all submitted materials.
Chapter 3 How to build a network?. 2 Objectives What is a Network? IP Addresses Key Components of a Network (NIC) Factors in Designing a Network.
1 Technology in Action Chapter 12 Behind the Scenes: Networking and Security Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
CCNA Network Fundamentals.  Elements of communication –Source (encoding data before transmission) –Transmission Media (Channel) – Information sent –
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
IST 126 Computer Networks Spring, What is a Computer Network? A group of computers and other devices that are connected together in order to share.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
WHAT IS NETWORKING?. Networking is … How computers talk to each other.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
First, by sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network. The process.
William Stallings Data and Computer Communications
Networking Technologies Presentation Presented by David Fisher June 4, 1999 West Lafayette, IN.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
© Paradigm Publishing Inc. 6-1 Chapter 6 Telecommunications and Networks.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
CSCI-235 Micro-Computer Applications The Network.
Networks Network Components. Learning Objectives Describe different media for transmitting data and their carrying capabilities. Explain the different.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
IST 126 Computer Networks Spring, What is a Computer Network? A group of computers and other devices that are connected together in order to share.
Chapter Objectives In this chapter, you will learn:
Contents Computer Network Benefits of Computer Network
Local Area Networks Honolulu Community College
Level 2 Diploma Unit 10 Setting up an IT Network
Computer Networks and Internet
Computer Networks and Internet
Computer Technology Notes #4
Computer Networks.
Ethernet First network to provide CSMA/CD
Computing Over Distance
EEC4113 Data Communication & Multimedia System Chapter 1: Introduction by Muhazam Mustapha, July 2010.
Presentation transcript:

Chapter 3 Internet Architecture

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall2 Overview What is a Network? IP Addresses Networks Information Transfer Cable Types Key Components of a Network Factors in Designing a Network Network Management System

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall3 What is a Network? A connection between at least two computers for the purpose of sharing resources Types: –Local Area Networks (LANs) –Wide Area Networks (WANs) –Metropolitan Area Networks (MANs)

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall4 Peer-to-Peer Network Computers linked together as equals No centralized control Share resources on the same network in any way and any time Promotes institutionalized chaos < 10 computers

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall5 Peer-to-Peer Network (Cont’d) Benefits –Easy to install/configure –Inexpensive –User is able to control their own resources –Independent from a dedicated server –No need for a network administrator Drawbacks –Security problems –Performance suffers when a computer is accessed –Difficult to have backup –Decentralized logon passwords –No centralized data management

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall6 Client/Server Network Server – designed to address a client’s request Client – any computer connected to a server within a network A cluster of computers (called clients) connected to one or more servers to form a network Allow authorized user to access any programs/application resided on the server

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall7 Client/Server Network (Cont’d) Benefits –Centralized security control –Simpler network administration than peer-to- peer network –Centralized password –More scalable –Ideal for computers are apart Drawbacks –Network failure - clients are helpless –Specialized staff are needed –Higher costs

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall8 IP Address A host number that identifies itself to other hosts Consists of strings of 32 bits E.g = Host Name –Human-friendly internet addresses –E.g. ema3z.mcintire.virginia.edu

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall9 Networks Network vs. Local Networks are classified by three sizes ClassBeginning Bit Bits in remainder of network part # of bits in local part Max. # of networks Max. # of hosts in network A million B ,00065,000 C million254

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall10 Networks (Cont’d) Zone –Three-letter kind (com, gov, edu) –Two-letter kind (ca, uk, jp) –New general-purpose zones (firm, store) –Last (rightmost) part of a domain name preceded by a dot

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall11 Information Transfer Packet –Grouping of data for transmission on a network –Large messages are split into a series of packets for transmission Protocol –A rule governing how communication should be conducted between two parties, two computers, or a sources and a destination –Internet Protocol Set of rules used to pass packets

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall12 Information Transfer (Cont’d) Open Systems Interconnection (OSI) –A layered approach to networking –Each layer handles a different portion of the communication process

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall13 OSI Reference Model LayerInfo TransactedTCP/IP Protocols ApplicationApplication messagesHTTP, FTP, SNMP PresentationCompressed data SessionSession messages TransportMultiple packetsTCP NetworkPacketsIP Data LinkFramesEthernet, PPP PhysicalBitsWiring, cables

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall14 OSI Reference Model (Cont’d) Application Layer –Defines requests and response formats –Standard: HTTP Governs requests and response between browser and Web server application program Other standards: SMTP, POP HTML-compatible –File Transfer Protocol (FTP), Simple Network Management Protocol (SNMP), Domain Name Service (DNS)

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall15 OSI Reference Model (Cont’d) Presentation Layer –Converts data into a format the receiving application can understand Session Layer –Exchanges data for the duration of session –Keeps track of the status of exchange –Ensures only designated parties are allowed to participate in the session –Enforces security protocols for controlling access

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall16 OSI Reference Model (Cont’d) Transport Layer –Manages the transmission of data across a network –Transmission Control Protocol (TCP) Specifies how two host computers will work together Flow control Sequence assurance Reliability and integrity

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall17 OSI Reference Model (Cont’d) Internet Layer –Routes messages across multiple nodes for delivery –Handles network congestion to minimize performance problems –Internet Protocol (IP) Standard for routing packets

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall18 OSI Reference Model (Cont’d) Data Link Layer –Packages data into frames for delivery –Point-to-point (PPP) Framing – mark boundary between packets Error detection –Ethernet Physical Layer –Converts bits into signals for outgoing messages and signals into bits for incoming messages

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall19 Cable Types Twisted-Pair Cable Unshielded Twisted Pair (UTP) Shielded Twisted Pair (STP) Optical Fiber Coaxial Cable Wireless Technology

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall20 Twisted-Pair Cable Consists of two pairs of insulated copper wires twisted around each other Advantages –Protect against cross talk and interference –Easy to add computers to network –Well understood technology –Less expensive Disadvantages –Susceptibility to noise –Least secure –Distance limitations –Requires more expensive hubs

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall21 Unshielded Twisted Pair (UTP) Pair of wires do not have the shielding against electrical interference Advantages –Less expensive –Easy to install Disadvantages –Vulnerable to electromagnetic interference and crosstalk –Subject to attenuation

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall22 Shielded Twisted Pair (STP) An electrically grounded woven copper mesh wrapped around each twisted pair Advantage –Reduces electromagnetic interference (EMI) Disadvantage –Makes the wiring thick and is difficult to maintain

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall23 Optical Fiber Uses light rather than voltage to indicate one and zeros Advantages –High speed transmission –High security –Smallest in size –Supports voice and video data Disadvantages –Expensive –Difficult to install –Require two cables to transmit & receive data –Require special connections

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall24 Coaxial Cable Copper center shielded by a plastic insulating material Advantages –Transmits up to 10Mbps over 500m –Easy to install –Low maintenance –Good resistance to noise over long distances Disadvantages –Inflexible –Low security –Limited distance

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall25 Wireless Technology Microwave –Connect LANs in separate buildings Radio waves –No distance limitations –Susceptible to atmospheric and electronic interference –Subject to government regulations Infrared transmissions –Interference from bright light

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall26 Key Components of A Network Network Interface Card (NIC) Hubs and Switches Routers Gateways

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall27 Network Interface Card Installed in a slot with a cable plugged into the back Plugged into a wall jack connection or into the hub/switch directly Modem –Converts digital signals into analog form for transmission and incoming analog signals into digital signal across the telephone line

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall28 Hubs and Switches Hub –Operates at Physical Layer –Acts as a connecting point –Passive, active, and intelligent hubs Switch –Offers direct connection to a particular PC –Available for almost every OSI level

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall29 Routers Operate at Internet Layer Evaluate network traffic and stop local traffic from causing congestion Filter out packets that need not be received Expensive and difficult to operate

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall30 Gateways Special-purpose computer allowing communications between dissimilar systems on the network Operate at Application Layer primarily Difficult to install and configure Expensive

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall31 Factors in Designing a Network Location Capacity Distance limitations Cost Potential growth Security

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall32 Factors in Selecting Network Architecture Hardware requirements Software requirements Disaster recovery and fault-tolerance requirements Corporate culture and organizational factors

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall33 Network Management System Manager Managed Nodes Objects Management Information Base (MIB) Requests and responses

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall34 Large-Scale E-commerce Issues Financial exposure IP exposure Legal security Packet sniffing

Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall35 Ensuring Corporate and Information Security Firewalls IP Security Intrusion detection systems

Chapter 3 Internet Architecture