Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 6 Data Communications. Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How.

Similar presentations


Presentation on theme: "Chapter 6 Data Communications. Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How."— Presentation transcript:

1 Chapter 6 Data Communications

2 Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Study Questions 6-2

3 Network –Collection of computers –Communicate with one another over transmission media Basic types of Network Topologies –Local Area Network (LAN) –Wide Area Network (WAN) –Internet 6-3 Q1: What Is a Computer Network? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

4 Computers connected on single company site Usually located in small area, such as a home, office building, or group of buildings Connects two to several hundred computers Company/Enterprise owned resources 6-4 LAN (Local Area Network) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

5 Connects computers across metropolitan, state, regional, national areas Uses communication networks from vendors –Licensed by government FCC (Federal Communications Commission) 6-5 WAN (Wide Area Network) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

6 Global network of networks Public and private network of networks –Intranets - within an Enterprise –Extranets – connects Intranets of customers, suppliers and partners through secure connections Uses a variety of communication methods and conventions Protocol: a set of standard rules for data representation, signaling, authentication, and error detection required to send information 6-6 Internet Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

7 Network Protocols: The OSI Architecture 6-7 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data Link Layer Physical Layer Seven Layers of the OSI Communications Architecture

8 1.Client 2.TC Interfaces 3.Media 4.Server 5.TC Software Q2: What Are the Components of a LAN? 6-8 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Client TC Interface Media Server TC Software Basic Network Model

9 Telecommunication Interface Switch –Connects devices on a network Router –Connects multiple networks and directs/distributes messages –Provided NAT (Network Address Translation) Network interface card (NIC) –Hardware that connects each device’s circuitry to the cable (Firmware for communications) Q2: What Are the Components of a LAN? (cont’d) 6-9 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

10 Media Wired –UTP (unshielded twisted pair cable) –Optical fiber cable –Coaxial Cable Wireless –Wi-Fi (Wireless Fidelity – Wi-Fi Alliance) Q2: What Are the Components of a LAN? (cont’d) 6-10 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

11 World’s most popular protocol for LANs 10/100/1000 Mbps Ethernet Ethernet protocol specifies hardware characteristics, cables, and how messages are packaged and processed –MAC (media access control) subset of the Data Link level + Physical Layers –MAC Address is assigned by the NIC manufacturer. IEEE 802.3 Protocol (Institute of Electrical and Electronics Engineers) 6-11 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

12 1.Connect to an Internet service provider (ISP) 2.Network of Leased Lines 3.Public Switched Data Networks 4.Wireless Networks (WiMax) 5.Virtual Private Network (VPN) 6-12 Q3: What Are the Alternatives for a WAN? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

13 Internet service provider (ISP) –A company that provides customers access to the Internet –Provides legitimate Internet address (Public) –Serves as gateway to Internet 6-13 Q3: What Are the Alternatives for a WAN? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

14 1.Dial-up Modems 2.DSL Modems 3.Cable Modems Modem – a device to produce a signal that can be transmitted easily and decoded to reproduce the original digital data (Modulates/Demodulates) Bandwidth – measure of capacity or throughput –Narrowband – less than 256 kbps speed (56K Max) –Broadband – more than 256 kbps speed 6-14 Connecting the Personal Computer to an ISP: Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

15 –Converts signals between analog and digital so computers can communicate over a regular telephone line (POTS) –Maximum transmission speed of 56 kbps (53 kbps really) –Modulation standards – V.34, V.90, V.92 specify how digital signals are converted to analog (Physical Layer) 1. Dial-up Modems 6-15 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

16 Digital Subscriber Line (DSL) –Operates over telephone lines separate from voice, 256 kbps+ –Always on connection –ISDN (Integrated Services Data Network) Hybrid or (Integrated Services Digital Network) –Download and upload speeds may differ –Asymmetric digital subscriber lines (ADSL) –Symmetrical digital subscriber lines (SDSL) –Distance Limitation of 2 miles (2km) 6-16 2. DSL Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

17 Use cable television lines –High-capacity optical fiber cable –Does not interfere with television transmission –Hundreds of subscribers connected at each substation Performance can vary based on number connected –Symmetric and Asymmetric options are available 6-17 3. Cable Modems Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

18 Point to Point communication services (24x7x365) Router or network switch connects sites Leased line alternatives –T1 line (1.544 Mbps), T3 line (44.736 Mbps), OC-768 (40 Gbps) –Monthly connection and maintenance costs expensive –Provide low cost per bit transmitted for high traffic networks 6-18 Networks of Leased Lines Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

19 WAN Using Leased Lines 6-19 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

20 Shared communications network Time leased on network (Pay for Use) Basis for the birth of the Internet (X.25 Protocol) Each site leases line to connect to PSDN network at access point Point of presence (POP) 6-20 Public Switched Data Network (PSDN) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

21 WAN Using PSDN 6-21 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

22 Frame relay –Process traffic at 56 kbps to 40 Mbps –Best application is data –Lower cost than ATM –PVC (Permanent Virtual Circuit) –CIR (Committed Information Rate} Asynchronous transfer mode (ATM) –Process speeds from 1 to 156 Mbps –A connection based protocol –Support video, voice and data communication 6-22 PSDN Protocols Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

23 WiMax - Worldwide Interoperability for Microwave Access A standards-based technology for wireless broadband access. Last-mile problem—getting broadband access into homes, small businesses and mobile clients WiMax Forum Certified TM systems to have capacity of 40 Mbps per channel, for fixed, nomadic, portable, and mobile applications 6-23 Wireless Networks (WiMax) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

24 Types of Access to a WiMax Network 6-24 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall Source: Table 1, “Types of Access to a WiMax Network,” from Fixed, Nomadic, Portable, and Mobile Applications for 802.16–2004 and 802.16e WiMax Networks, prepared by Senza Fili Consulting on behalf of the WiMax Forum. © 2005 WiMax Forum, www.wimaxforum.org/technology/downloads (accessed June 2008).

25 Figure 6-13 6-25 Criteria for Comparing WANs Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

26 Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? Data Communications Class II 6-26 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

27 Encryption –Process of transforming clear text into coded text –Used for secure storage or communication –Uses algorithms DES (Data Encryption Standard) 3DES (Triple DES) AES (Advanced Encryption Standard) Key –Used to encrypt data –Algorithm applies key to produce coded message Symmetric encryption – same key encrypts and decrypts Asymmetric encryption – different keys are used –Key used to decrypt message 6-27 Q4: How Does Encryption Work? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

28 Public key/private key cryptography –Public key used to encrypt messages –Public key sent to other party to encode messages to be sent back –Decrypted with private key –Complex and slow –Asymmetric public key encryption HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to encrypt data –Fast, secure 6-28 Q4: How Does Encryption Work? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

29 Figure 6-14 Q4: How Does Encryption Work? (cont’d) 6-29 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall SCOTS - Security

30 Computer device that prevents unauthorized network access May be special-purpose computer or program on a general-purpose computer Organizations may have multiple firewalls –Perimeter firewalls sit outside organizational network –Internal firewalls are inside network –Packet-filtering firewalls examine each part of a message (source address, destination address, and other bytes) before allowing message to passPacket-filtering firewalls –May filter both incoming and outgoing messages Access control list (ACL)Access control list encodes rules stating which IP addresses are allowed into or prohibited from the network 6-30 Q5: What Is the Purpose of a Firewall? Firewall Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

31 Virtual private network –Uses Internet or private switched network to create appearance of point-to-point private network –Client and server have point-to-point connection called tunnel Private pathway over shared network –Secure, encrypted communications VPN client software encrypts data and receiving VPN server decrypts it Users and their keys must be registered with VPN server 6-31 Q6: What Is a VPN, and Why Is It Important? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

32 Remote Access Using VPN: Actual Connections 6-32 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

33 Dee and salespeople use thin client computers –Dee creates blog entries on Web pages using Movable Type –Salespeople use pages served by Movable Type Client computers contain VPN client software –Interact with VPN server via Internet –Secure, private connections –Firewalls stop traffic not addressed to VPN server –Salespeople know how to use VPN 6-33 How Does the Knowledge in This Chapter Help Dee and You? Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

34 IT department cannot schedule resources to setup blog server in timely fashion –Will not allow outside person to do setup Would then have access to system Consultant can create server on unprotected test server –Can be copied onto network server after acceptance –Requires some internal IT labor –Consultant could include Trojan horse virus or malware Install only software from known sources Code should not reside on production server 6-34 How Does the Knowledge in This Chapter Help Dee and You? (cont’d) Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

35 Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How does encryption work? Q5: What is the purpose of a firewall? Q6: What is a VPN and why is it important? 6-35 Active Review Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall

36 Chapter 6 Data Communications


Download ppt "Chapter 6 Data Communications. Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How."

Similar presentations


Ads by Google