Chapter 6 Data Communications. Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How.

Slides:



Advertisements
Similar presentations
© Pearson Prentice Hall Using MIS 2e Chapter 6 Data Communications David Kroenke 09/30 – 4:00AM.
Advertisements

CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Basic Computer Network
IS Network and Telecommunications Risks
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Data Communication And Internet Technology
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
Review on Networking Technologies Linda Wu (CMPT )
D-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Telecommunication and Networks
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Selecting a WAN Technology Lecture 4: WAN Devices &Technology.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Data Communication David Kroenke Using MIS 3e Chapter 6.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Technology Guide 4 Telecommunication & Internet. Agenda Telecommunication terminology Communication media Network architecture concepts Enterprise networking.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. WAN Infrastructure  WAN Transmission Technologies  WAN Connectivity Methods 
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 6-1 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used.
© Pearson Prentice Hall Using MIS 2e Chapter 6 Data Communications David Kroenke.
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Network Basics. Outline Objective Types of Networks LAN Topologies LAN Networking Standards Network Devices Dial-Up Access Ethernet Wiring Summary References.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 4 v3.0 Module 2 WAN Technologies Cisco Networking Academy.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
NETWORKS.
1 California State University, Fullerton Chapter 6 Information System Networks and the Internet.
WANs and Remote Connectivity
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Networks and Protocols CE Week 5b. WAN’s, Frame Relay, DSL, Cable.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 6 Data Communications.
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Telecommunications, the Internet, and Wireless Technology.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Services in a Converged WAN Accessing the WAN – Chapter 1.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Essentials of Telecommunications.
TELECOMMUNICATIONS AND NETWORKS
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Slide No. 1 Chapter 1, Unit c Data Communications H Telecommunications H LANs, WANs and Intranets.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 7B Data Communications.
Building Corporate Data Networks – A Case Study
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Computer Engineering and Networks, College of Engineering, Majmaah University Mohammed Saleem Bhat CEN-444 Networks Structure And Protocols.
7.1 © 2010 by Prentice Hall 4 Chapter Telecommunications, the Internet, and Wireless Technology.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 7 Introducing Wide-Area Networks
Telecommunications and Networking
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
McGraw-Hill Technology Education
Chapter 1: WAN Concepts Connecting Networks
Computers © 2005 Prentice-Hall, Inc. Slide 1.
McGraw-Hill Technology Education
Basics of Telecommunications and Networks
Presentation transcript:

Chapter 6 Data Communications

Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Study Questions 6-2

Network –Collection of computers –Communicate with one another over transmission media Basic types of Network Topologies –Local Area Network (LAN) –Wide Area Network (WAN) –Internet 6-3 Q1: What Is a Computer Network? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Computers connected on single company site Usually located in small area, such as a home, office building, or group of buildings Connects two to several hundred computers Company/Enterprise owned resources 6-4 LAN (Local Area Network) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Connects computers across metropolitan, state, regional, national areas Uses communication networks from vendors –Licensed by government FCC (Federal Communications Commission) 6-5 WAN (Wide Area Network) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Global network of networks Public and private network of networks –Intranets - within an Enterprise –Extranets – connects Intranets of customers, suppliers and partners through secure connections Uses a variety of communication methods and conventions Protocol: a set of standard rules for data representation, signaling, authentication, and error detection required to send information 6-6 Internet Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Network Protocols: The OSI Architecture 6-7 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Seven Layers of the OSI Communications Architecture

1.Client 2.TC Interfaces 3.Media 4.Server 5.TC Software Q2: What Are the Components of a LAN? 6-8 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Client TC Interface Media Server TC Software Basic Network Model

Telecommunication Interface Switch –Connects devices on a network Router –Connects multiple networks and directs/distributes messages –Provided NAT (Network Address Translation) Network interface card (NIC) –Hardware that connects each device’s circuitry to the cable (Firmware for communications) Q2: What Are the Components of a LAN? (cont’d) 6-9 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Media Wired –UTP (unshielded twisted pair cable) –Optical fiber cable –Coaxial Cable Wireless –Wi-Fi (Wireless Fidelity – Wi-Fi Alliance) Q2: What Are the Components of a LAN? (cont’d) 6-10 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

World’s most popular protocol for LANs 10/100/1000 Mbps Ethernet Ethernet protocol specifies hardware characteristics, cables, and how messages are packaged and processed –MAC (media access control) subset of the Data Link level + Physical Layers –MAC Address is assigned by the NIC manufacturer. IEEE Protocol (Institute of Electrical and Electronics Engineers) 6-11 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

1.Connect to an Internet service provider (ISP) 2.Network of Leased Lines 3.Public Switched Data Networks 4.Wireless Networks (WiMax) 5.Virtual Private Network (VPN) 6-12 Q3: What Are the Alternatives for a WAN? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Internet service provider (ISP) –A company that provides customers access to the Internet –Provides legitimate Internet address (Public) –Serves as gateway to Internet 6-13 Q3: What Are the Alternatives for a WAN? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

1.Dial-up Modems 2.DSL Modems 3.Cable Modems Modem – a device to produce a signal that can be transmitted easily and decoded to reproduce the original digital data (Modulates/Demodulates) Bandwidth – measure of capacity or throughput –Narrowband – less than 256 kbps speed (56K Max) –Broadband – more than 256 kbps speed 6-14 Connecting the Personal Computer to an ISP: Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

–Converts signals between analog and digital so computers can communicate over a regular telephone line (POTS) –Maximum transmission speed of 56 kbps (53 kbps really) –Modulation standards – V.34, V.90, V.92 specify how digital signals are converted to analog (Physical Layer) 1. Dial-up Modems 6-15 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Digital Subscriber Line (DSL) –Operates over telephone lines separate from voice, 256 kbps+ –Always on connection –ISDN (Integrated Services Data Network) Hybrid or (Integrated Services Digital Network) –Download and upload speeds may differ –Asymmetric digital subscriber lines (ADSL) –Symmetrical digital subscriber lines (SDSL) –Distance Limitation of 2 miles (2km) DSL Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Use cable television lines –High-capacity optical fiber cable –Does not interfere with television transmission –Hundreds of subscribers connected at each substation Performance can vary based on number connected –Symmetric and Asymmetric options are available Cable Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Point to Point communication services (24x7x365) Router or network switch connects sites Leased line alternatives –T1 line (1.544 Mbps), T3 line ( Mbps), OC-768 (40 Gbps) –Monthly connection and maintenance costs expensive –Provide low cost per bit transmitted for high traffic networks 6-18 Networks of Leased Lines Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

WAN Using Leased Lines 6-19 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Shared communications network Time leased on network (Pay for Use) Basis for the birth of the Internet (X.25 Protocol) Each site leases line to connect to PSDN network at access point Point of presence (POP) 6-20 Public Switched Data Network (PSDN) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

WAN Using PSDN 6-21 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Frame relay –Process traffic at 56 kbps to 40 Mbps –Best application is data –Lower cost than ATM –PVC (Permanent Virtual Circuit) –CIR (Committed Information Rate} Asynchronous transfer mode (ATM) –Process speeds from 1 to 156 Mbps –A connection based protocol –Support video, voice and data communication 6-22 PSDN Protocols Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

WiMax - Worldwide Interoperability for Microwave Access A standards-based technology for wireless broadband access. Last-mile problem—getting broadband access into homes, small businesses and mobile clients WiMax Forum Certified TM systems to have capacity of 40 Mbps per channel, for fixed, nomadic, portable, and mobile applications 6-23 Wireless Networks (WiMax) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Types of Access to a WiMax Network 6-24 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Source: Table 1, “Types of Access to a WiMax Network,” from Fixed, Nomadic, Portable, and Mobile Applications for –2004 and e WiMax Networks, prepared by Senza Fili Consulting on behalf of the WiMax Forum. © 2005 WiMax Forum, (accessed June 2008).

Figure Criteria for Comparing WANs Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? Data Communications Class II 6-26 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Encryption –Process of transforming clear text into coded text –Used for secure storage or communication –Uses algorithms DES (Data Encryption Standard) 3DES (Triple DES) AES (Advanced Encryption Standard) Key –Used to encrypt data –Algorithm applies key to produce coded message Symmetric encryption – same key encrypts and decrypts Asymmetric encryption – different keys are used –Key used to decrypt message 6-27 Q4: How Does Encryption Work? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Public key/private key cryptography –Public key used to encrypt messages –Public key sent to other party to encode messages to be sent back –Decrypted with private key –Complex and slow –Asymmetric public key encryption HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to encrypt data –Fast, secure 6-28 Q4: How Does Encryption Work? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Figure 6-14 Q4: How Does Encryption Work? (cont’d) 6-29 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall SCOTS - Security

Computer device that prevents unauthorized network access May be special-purpose computer or program on a general-purpose computer Organizations may have multiple firewalls –Perimeter firewalls sit outside organizational network –Internal firewalls are inside network –Packet-filtering firewalls examine each part of a message (source address, destination address, and other bytes) before allowing message to passPacket-filtering firewalls –May filter both incoming and outgoing messages Access control list (ACL)Access control list encodes rules stating which IP addresses are allowed into or prohibited from the network 6-30 Q5: What Is the Purpose of a Firewall? Firewall Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Virtual private network –Uses Internet or private switched network to create appearance of point-to-point private network –Client and server have point-to-point connection called tunnel Private pathway over shared network –Secure, encrypted communications VPN client software encrypts data and receiving VPN server decrypts it Users and their keys must be registered with VPN server 6-31 Q6: What Is a VPN, and Why Is It Important? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Remote Access Using VPN: Actual Connections 6-32 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Dee and salespeople use thin client computers –Dee creates blog entries on Web pages using Movable Type –Salespeople use pages served by Movable Type Client computers contain VPN client software –Interact with VPN server via Internet –Secure, private connections –Firewalls stop traffic not addressed to VPN server –Salespeople know how to use VPN 6-33 How Does the Knowledge in This Chapter Help Dee and You? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

IT department cannot schedule resources to setup blog server in timely fashion –Will not allow outside person to do setup Would then have access to system Consultant can create server on unprotected test server –Can be copied onto network server after acceptance –Requires some internal IT labor –Consultant could include Trojan horse virus or malware Install only software from known sources Code should not reside on production server 6-34 How Does the Knowledge in This Chapter Help Dee and You? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? 6-35 Active Review Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 6 Data Communications