Copyright 2005-2009: Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks.

Slides:



Advertisements
Similar presentations
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Advertisements

Networking at Home and Abroad
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Chapter 6 Telecommunications & Networks.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Shalini Bhavanam. Key words: Basic Definitions Classification of Networks Types of networks Network Topologies Network Models.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
1-1 Introduction to Computer Networks and Data Communications.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
CHAPTER Copyright 2003 The McGraw-Hill Companies, Inc.Copyright 2003 The McGraw-Hill Companies, Inc. 1 Connectivity, the Wireless Revolution, and Communications.
COMMUNICATIONS AND NETWORKS
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
A Guide to major network components
Networking Technologies
Basic Data Communication
Communications & Networks
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Telecommunications and Networks Chapter 6 – Understanding Technology (Third Edition)
It is a device that is able to work on its own without the help of another device or the help of the internet. An example of a standalone device would.
Networks A network is a collection of computers and devices connected together via communications devices and transmission media Advantages of a network.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Chapter 4 Computer Networks – Part 1
GRAP 3175 Computer Applications for Drafting Unit VI Data Communication.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
6.1. Communication Methods Revision using Qwizdom.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Chapter 1 Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User’s Approach.
Local Area Network By Bhupendra Ratha, Lecturer
Communications and Networks Chapter 9. CE06_PP09-2 Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution, and communication systems.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
Module 2: Information Technology Infrastructure
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Unit 4 Networking Review.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Overview of computer communication and Networking Communication VS transmission Computer Network Types of networks Network Needs Standards.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computers Are Your Future Eleventh Edition
Telecommunications and Networks Chapter 8. Types of Signals Analog – a continuous waveform that passes through a communications medium Digital signal.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CSCI-235 Micro-Computer Applications The Network.
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
ICT Unit 4: Network and the effects of using them
COMMUNICATION AND NETWORKS 99 computing ESSENTIALS
NETWORK AND COMMUNICATIONS
Unit Communication Hardware
Intro to MIS – MGS351 Network Basics
Chapter 3 Computer Networking Hardware
Communications and Networks Chapter 9 McGraw-Hill/Irwin
Network Basics Extended Learning Module E
Intro To Computer Networks
Presentation transcript:

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives Understand the importance and use of Networks Understand the importance and use of Networks Understand the different types of technologies necessary to establish a network Understand the different types of technologies necessary to establish a network Be exposed to several different types of networks Be exposed to several different types of networks Understand the necessity for network security and several of the means of providing network security. Understand the necessity for network security and several of the means of providing network security.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Network Basics A network is about two or more people establishing a way to communicate. There are formal and informal networks.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Network Basics Networks are founded on the concept of client-server architecture. Architecture refers to the design of a system or technology. Networks are founded on the concept of client-server architecture. Architecture refers to the design of a system or technology. The individual work station, called a node, is provided networking services by a server. The individual work station, called a node, is provided networking services by a server.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Network Basics The server is a computer that provides files, printers, and processing power to the individual workstations. The server is a special type of computer linked into a network. It is used only to manage the network, shared data, and shared resources. The server is a computer that provides files, printers, and processing power to the individual workstations. The server is a special type of computer linked into a network. It is used only to manage the network, shared data, and shared resources.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Why Network? Law enforcement agencies may have many buildings and offices in different physical locations. A network allows them to share computer, data, and information resources. Much of the information used by law enforcement comes from agencies outside their organization (e.g., DMV, Corrections, other agencies, etc.). Law enforcement agencies may have many buildings and offices in different physical locations. A network allows them to share computer, data, and information resources. Much of the information used by law enforcement comes from agencies outside their organization (e.g., DMV, Corrections, other agencies, etc.). Law enforcement Law enforcement

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Networks also provide organizations with the capability to back up data. If one computer fails, the network can take over the processing load. Networks also provide organizations with the capability to back up data. If one computer fails, the network can take over the processing load. Why Network?

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Back to ….. Analog and Digital Signals An analog signal weakens as it travels through wire because of the resistance the signal meets in the medium that is carrying it (air, wire, coaxial cable). Digital signals are subject to the same decrease in strength as analog signals.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Digital signals are the primary means of transmitting data communications. Digital signals have several advantages over analog: Fewer errors; Fewer errors; Can be transmitted at higher speeds Can be transmitted at higher speeds Peripheral devices are less complex. Peripheral devices are less complex. Back to ….. Analog and Digital Signals

Copyright : Hi Tech Criminal Justice, Raymond E. Foster The analog wave is called a baud. Bits are essentially added to the analog wave. The analog wave is called a baud. Bits are essentially added to the analog wave. Public networks tend to run at about 2,400 baud (waves) per second. Public networks tend to run at about 2,400 baud (waves) per second. Analog stuff

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Our technology adds more bits to each baud generally in multiples of four. Our technology adds more bits to each baud generally in multiples of four. A 2,400 baud analog signal that adds 12 bits to each baud would give an effective transmission rate of 28,800 bits per second (BPS). A 2,400 baud analog signal that adds 12 bits to each baud would give an effective transmission rate of 28,800 bits per second (BPS). Analog stuff This about Modem Speed!

Copyright : Hi Tech Criminal Justice, Raymond E. Foster One of the schemes commonly used to prevent data corruption is bit parity. Take a stream of binary, add up the numbers, you get an odd or an even number. Take a stream of binary, add up the numbers, you get an odd or an even number. Add a digit at the end of the data to indicate if the sum is odd or even. Add a digit at the end of the data to indicate if the sum is odd or even. The receiving computer compares the sum of the data stream to the bit parity digit. The receiving computer compares the sum of the data stream to the bit parity digit. Error Detection

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Information travels between computers in a network in one of three ways: Simplex transmission – information travels in one direction only Simplex transmission – information travels in one direction only Half-duplex – information travels in both directions, one way at a time Half-duplex – information travels in both directions, one way at a time Full duplex – data is transmitted in both directions simultaneously Full duplex – data is transmitted in both directions simultaneously Data Transmission

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Designing a Network Look at three things: The fastest throughput and response time possible The fastest throughput and response time possible The least-cost path – the data flows through the fewest devices possible The least-cost path – the data flows through the fewest devices possible Design reliability Design reliability

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Things That Connect Networks accomplish data transfer with a concept called packet switching. Unused (available) portions of a network are chosen Unused (available) portions of a network are chosen Data passes through the most efficient available means Data passes through the most efficient available means

Copyright : Hi Tech Criminal Justice, Raymond E. Foster In networks, the connection point between your computer and the network is commonly a modem. Modems have become asymmetric digital subscriber line (ADSL). The word asymmetrical is used because these modems send data faster in one direction than the other. Things That Connect

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Most homes and offices have a dedicated copper wire running between them and the telephone company’s central office. The copper wire can carry far more data than the 3,000 Hz signal of a typical telephone conversation The copper wire can carry far more data than the 3,000 Hz signal of a typical telephone conversation The copper wire can act as a purely digital high-speed transmission channel (1 million bps). The copper wire can act as a purely digital high-speed transmission channel (1 million bps). The same line can transmit both a telephone conversation and the digital data. The same line can transmit both a telephone conversation and the digital data. Asymmetric Digital Subscriber Line - DSL

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Other ways of connecting to a network Use a hub Use a hub Most hubs include a switch. A switch determines how data will travel along its path to the intended destination – to look for the optimal route Most hubs include a switch. A switch determines how data will travel along its path to the intended destination – to look for the optimal route A router is like a switch. A router is a bridge between two networks. The router determines the best path between two different networks A router is like a switch. A router is a bridge between two networks. The router determines the best path between two different networks

Copyright : Hi Tech Criminal Justice, Raymond E. Foster A remote switch is one that is at your location but controlled by someone else at different location. A remote switch is one that is at your location but controlled by someone else at different location. A trunk is a circuit between different types of switching equipment. A trunk is a circuit between different types of switching equipment. Middleware describes a software that is used to connect different applications (the translator). Middleware describes a software that is used to connect different applications (the translator). Network Terms

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Data Compression Techniques to reduce the size of data in order to improve storage and bandwidth (transmission) capacity. Techniques to reduce the size of data in order to improve storage and bandwidth (transmission) capacity.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Bandwidth Refers to the capacity of the medium that carries the signal. Refers to the capacity of the medium that carries the signal. Analog bandwidth is measured in Hz. Analog bandwidth is measured in Hz. Digital bandwidth is measured in the number of bits per second the medium can carry. Digital bandwidth is measured in the number of bits per second the medium can carry. Determines the speed at which data can be moved through a network Determines the speed at which data can be moved through a network More bandwidth = more data, faster

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Protocols An agreement between people on how a transaction should take place. Many networks use the Transmission Control Protocol/Internet Protocol (TCP/IP). Your computer must use TCP/IP to go on the Internet.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Basic Network Types Hierarchical - vertical or tree structure Local Area Network (LAN) - horizontal network. Allows each device on the network to receive every network transmission. Star Configuration – All transmissions come from a hub.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster LAN is a network that operates in one specific location. LAN is a network that operates in one specific location. Wide Area Network (WAN) is used to connect geographically separated networks together. Wide Area Network (WAN) is used to connect geographically separated networks together. Basic Network Types

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Basic Network Types Wireless Local Area Network (WLAN) uses radio waves to connect among the mobile node, mobile computer, and the hardwired network.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Data Security Could be called Network security or Computer security. Could be called Network security or Computer security. Computer What we are most trying to protect is the information contained in the various systems. What we are most trying to protect is the information contained in the various systems.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Physical Security is... Anything we do to physically protect our systems and information: Placing servers, routers and switching equipment behind locked doors Placing servers, routers and switching equipment behind locked doors Backing up data in one or more location Backing up data in one or more location

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Firewall - operates by controlling access to the network based upon the contents of the data packets being transmitted on the network. Firewall - operates by controlling access to the network based upon the contents of the data packets being transmitted on the network. Encryption - changing text or data into a form that is unreadable without a key (secret code) Encryption - changing text or data into a form that is unreadable without a key (secret code) Virtual Security is…..

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Virtual Security is….. Intrusion Detection – security management system that gathers and analyses info from different part of the network. Scans network looking for user and system activity and any pattern of abnormal behavior.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Discuss law enforcement issues on the Criminal Justice Degree Forum law enforcement Criminal Justice Degreelaw enforcement Criminal Justice Degree