© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

Slides:



Advertisements
Similar presentations
© Pearson Prentice Hall Using MIS 2e Chapter 6 Data Communications David Kroenke 09/30 – 4:00AM.
Advertisements

CP Networking1 WAN and Internet Access. CP Networking2 Introduction What is Wide Area Networking? What is Wide Area Networking? How Internet.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Information Technology Foundations-BIT 112 TECHNOLOGY GUIDE FOUR Basics of Telecommunications and Networks.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
COS 338 Day DAY 12 Agenda Capstone Proposal Overdue 3 accepted, 2 in mediation, 1 MIA Assignment 4 Due Lab 4 is Today & Oct 24 (After exam) OpNet.
IS Network and Telecommunications Risks
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Networks Adapting Computers to Telecommunications Media.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Data Communication And Internet Technology
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Extended Learning Module E NETWORK BASICS (on your CD)
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
1 Chapter 7 Networking: Computer Connections. Basic Components of a Network Sending device Communications link Receiving device.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
Computer Networks & Security
Management Information Systems Data Communications Chapter 6.
Chapter Extension 8 Understanding and Setting up a SOHO Network © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Networking Technologies
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Communications & Networks
Data Communication David Kroenke Using MIS 3e Chapter 6.
Chapter 6 Data Communication and the Cloud
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
1 Networks and Telecommunications. 2 Applying Telecommunications in Business TELECOMMUNICATIONS – the transmission of data between devices in different.
© Pearson Prentice Hall Using MIS 2e Chapter 6 Data Communications David Kroenke.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
ACM 511 Chapter 2. Communication Communicating the Messages The best approach is to divide the data into smaller, more manageable pieces to send over.
Communication Services Communication Services: –Problem: This chapter expands on topics introduced in earlier chapters related to long-distance communication.
Chapter 6 Data Communications. Q1: What is a computer network? Q2: What are the components of a LAN? Q3: What are the alternatives for a WAN? Q4: How.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
ASYNCHRONOUS Sends A letter at a time. The devices are not synchronised. The letter is framed by start and stop bits. The start bits are to ‘wake up’ the.
WANs and Remote Connectivity
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Living Online Module Lesson 23 — Networks and Telecommunication
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter 6 Data Communications.
HIGH SPEED WIDE AREA NETWORKS BYWANJAU. Introduction  WANs – Group of LANs linked together by communication service providers over large geographically.
Computers Are Your Future Eleventh Edition
Introduction to Information Systems Lecture 06 Telecommunications and Networks Business Value of Networks Jaeki Song.
Chapter 6 Data Communications. Network Collection of computers Communicate with one another over transmission line Major types of network topologies What.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Connecting to the Internet.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
Higher Computing Networking. Networking – Local Area Networks.
Slide No. 1 Chapter 1, Unit c Data Communications H Telecommunications H LANs, WANs and Intranets.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Chapter Objectives In this chapter, you will learn:
Computer Networks and Internet
Computer Networks and Internet
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Computer Networks.
Computers Are Your Future
Computer Networks.
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
CIS105 Networking: Computer Connections
Chapter 3 Networking Hardware
Presentation transcript:

© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Chapter 6 Data Communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke

This Could Happen to You Dee needs to decide where she will run the blog It needs to be private to maintain a competitive advantage Sales people need to have easy access Passwords may be needed to restrict access Emerson has a private network Protected by firewall Employees access through VPN Can be protected from unauthorized access Sales people can access with same password they already use

Study Questions What is a computer network? What are the components of a LAN? What are the alternatives for a WAN? How does encryption work? What is the purpose of a firewall? What is a VPN and why is it important? How does the knowledge in this chapter help Dee?

What Is a Computer Network? Collection of computers Communicate with one another over transmission line Three basic types Local area network (LAN) Wide area network (WAN) Internet

LAN Connects computers residing in single location 2 to several hundred computers One geographic area Communication lines can be placed where the organization wants

WAN Connect computers in different geographical areas Two or more cities Uses communication networks from vendors Licensed by government

Internet Network of networks Connect LANs, WANs, and other internets Private networks of networks Use a variety of communication methods and conventions Seamless flow of data provided by layered protocol Set of rules that communicating devices follow

What Are the Components of a LAN? Local area network Computers connected on single company site Usually located within half mile area Property controlled by company operating network Company can run cabling as necessary Components Switch Special purpose computer that receives and transmits messages Network interface card (NIC) Hardware that connects each device’s circuitry to the cable Onboard NIC or card that fits into an expansion slot

NIC Devices MAC address Media connections Unique identifier Unshielded twisted pair (UTP) cable RJ-45 connector Optical fiber cables Light rays reflected inside glass core surrounded by cladding Uses ST and SC connectors

IEEE 802.3 Protocol Ethernet protocol standard Specifies hardware characteristics Describes how messages are packages Determines how messages are processed Operates at Layers 1 and 2 of TCP/IP-OSI architecture Personal computers usually support 10/100/1000 Ethernet

LANs with Wireless Connections Wireless NIC (WNIC) LAN operation NICs operate on 802.3 protocol WNICs operate on 802.11 protocol WNICS connect to access point (AP) AP processes both standards

What Are the Alternatives for a WAN? WANs connect computers at separate sites No cabling between sites Cable connections made through licensed communications companies Internet service provider (ISP) Provides legitimate Internet address Serves as gateway to Internet Pay for Internet

Connecting to the ISP Connections made through: Regular telephone lines Use of DSL line Cable TV lines All require digital data to be converted to analog Modem makes conversion

MIS In Use: Larry Jones (Student) Network Services Larry set up LAN networks Realized that he had to offer support Customers had problems Customers needed to add more devices Coupled installation with support package Extra charges for support beyond normal wear and tear

Dial-Up Modems Handles conversion between analog and digital Connection made by dialing ISP Maximum transmission speed of 56kbps Modulation governed by V.34, V.90. or V.92 standards PPP controls message packaging and handling

DSL Modems Operates over telephone lines Do not interfere with voice telephone service Faster data transmission than dial-up Connection always maintained Use their own Layer 1 and 2 protocols Download and upload speeds vary Asymmetric digital subscriber lines (ADSL) Symmetrical digital subscriber lines (SDSL)

Cable Modems Provide high-speed data transmission Use cable television lines High-capacity optical fiber cable run to neighborhood distribution center Television cables connect at distribution center and runs to subscribers Does not interfere with television transmission Up to 500 subscribers connected at each center Performance varies based on number connected

Cable Modems, continued Download speed up to 10Mbps, upload up to 256 kbps Operate with Layer 1 and 2 protocols Speeds Narrowband Transmission speeds less then 56 kbps Broadband Transmission speeds in excess of 256 kbps

Networks of Leased Lines WAN connects computers located at geographically distributed sites Access devices connect sites to transmission Switch Router Alternative is leasing lines T1, T3 Set up as a point-to-point line Only predefined sites can use leased lines Provide low cost per bit transmitted

Transmission Line Types, Uses, and Speeds Figure 6-11

Problem Solving Guide: Thinking Exponentially Is Not Possible, but… Nathan Myhrvoid claimed that: Humans cannot think exponentially Think of fastest linear change and extrapolate from there Was writing about growth of magnetic storage Also applies to growth of computer network phenomena Ubiquitous and cheap connectivity is growing exponentially What are the threats and opportunities?

Exponential Phenomena Brings Changes Technology doesn’t drive people to do new things Social progress occurs in small, evolutionary, adaptive steps Technology may enable a capability, but people may not want it People want to do what they are doing more easily They want to solve existing problems Respond by hedging your bets The more time involved, the more potential for error

Public Switched Data Network (PSDN) Network of computers and leased lines Developed and maintained by vendor Time leased on network Utility that supplies network for other companies to lease Each site leases line to connect to PSDN network at access point Point of presence (POP) Saves setup and maintenance activities

PSDN Protocols Frame relay Asynchronous transfer mode (ATM) Ethernet Process traffic at 56 kbps to 40 Mbps Simplest and easiest to support Asynchronous transfer mode (ATM) Process speeds from 1 to 156 Mbps Ethernet Operates at speeds of 10 to 40 Gpbs

Criteria for Comparing WANs Costs Setup costs Examples: costs of acquiring lines and equipment Operational costs Examples: lease fees, ISP charges, training Maintenance costs Examples: periodic maintenance, repair, upgrades

Criteria for Comparing WANs, continued Performance Speed Latency Availability Loss rate Transparency Performance guarantees Growth potential Length of contract commitment

Security Guide: How Does Encryption Work? Process of transforming clear text into coded text Used for secure storage or communication Uses algorithms DES, 3DES, AES Key Used to encrypt data Algorithm applies key to produce coded message Symmetric encryption Asymmetric encryption

Security Guide: How Does Encryption Work?, continued Public key/private key Public key used to encrypt messages Public key sent to other party to encode messages to be sent back Decoded with private key Complex and slow HTTPS Secure communication over Internet Encrypted using SSL/TLS protocol Encodes messages using Web site’s public key, decoded with private key

What Is the Purpose of a Firewall? Computer device that prevents unauthorized network access May be special-purpose computer or program Organizations may have multiple firewalls Perimeter firewalls sit outside organizational network Internal firewalls are inside network Packet-filtering firewalls examine source address, destination address, and other data before allowing message to pass May filter both incoming and outgoing messages Access control list (ACL) encodes rules stating what packets are allowed or prohibited

What Is a VPN and Why Are VPNs Important? Virtual private network Uses Internet or private network to create appearance of point-to-point connections Uses public Internet to create appearance of private network Client and server have point-to-point connection called tunnel Private pathway over shared network Secure, encrypted communications

Ethics Guide: Human Networks Matter More Six degrees of separation Often unaware of those in the chain Build personal human networks for success Someone, somewhere that you need to know or will need to know Meet people at professional and social situations Pass out and collect cards Converse to expand network Look for new channels Social network theory Weak and strong ties

How Does the Knowledge in This Chapter Help Dee? Dee and salespeople use thin client computers Dee creates blog entries on Web pages using Moveable Type Salespeople use pages served by Moveable Type Client computers contain VPN client software Interacts with VPN server via Internet Secure, private connections Firewalls stop traffic not addressed to VPN server Salespeople know how to use VPN

How Does the Knowledge in This Chapter Help Dee?, continued IT department cannot schedule resources to setup blog server in timely fashion Will not allow outside person to do setup Would then have access to system Consultant can create server on unprotected test server Can be copied onto network server after acceptance Requires some internal IT labor Consultant could include Trojan horse virus or malware Install only software from known sources Code should not reside on production server

How Does the Knowledge in This Chapter Help Dee?, continued Dee negotiates with IT department Threatens to set up own system of user Ids and passwords Says she will set up blog on public server Would cause confusion that would add to IT department’s work Her proposal is the lesser of two evils

Active Review What is a computer network? What are the components of a LAN? What are the alternatives for a WAN? How does encryption work? What is the purpose of a firewall? What is a VPN and why is it important? How does the knowledge in this chapter help Dee?