MIS DATA COMMUNICATION: DELIVERING INFORMATION ANYWHERE AND ANYTIME

Slides:



Advertisements
Similar presentations
INTRODUCTION TO COMPUTER NETWORKS Zeeshan Abbas. Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Advertisements

Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
LANs and WANs. 2 Chapter Contents Section A: Network Building Blocks Section B: Wired Networks Section C: Wireless Networks Section D: Using LANs Section.
Computers Are Your Future © 2008 Prentice-Hall, Inc.
Chapter 6 Telecommunications & Networks.
Communications and Networks
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Telecommunications Chapter 5 Chapter 5 Telecommunications
1-1 Introduction to Computer Networks and Data Communications.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks.
Copyright ©2016 Cengage Learning. All Rights Reserved
COMMUNICATIONS AND NETWORKS
COMMUNICATIONS AND NETWORKS. -2 Competencies Discuss connectivity, the wireless revolution, and communication systems Describe physical and wireless communications.
Chapter 9 Communications and Network Tyler Clutts.
Intro to MIS – MGS351 Network Basics Extended Learning Module E.
INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION Lecture # 1 (
Network Topologies.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Basic Data Communication
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 6 Information System Networks and the Internet.
Communications & Networks
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 5 Networks Communicating and Sharing Resources
Chapter 9A Network Basics.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Communications and Networks © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Chapter 7 Networking: Computer Connections. Networks n Network - a computer system that uses communications equipment to connect two or more computers.
Local Area Network By Bhupendra Ratha, Lecturer
Unit 1—Computer Basics Lesson 7 Networks.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
MIS DATA COMMUNICATION: DELIVERING INFORMATION ANYWHERE AND ANYTIME
Basic Concepts of a Computer Network
Computer Concepts 2014 Chapter 5 Local Area Networks.
Objectives Overview Discuss the purpose of the components required for successful communications and identify various sending and receiving devices Differentiate.
Chapter One Introduction to Computer Networks and Data Communications Data Communications and Computer Networks: A Business User's Approach Eighth Edition.
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
1 CHAPTER 8 TELECOMMUNICATIONSANDNETWORKS. 2 TELECOMMUNICATIONS Telecommunications: Communication of all types of information, including digital data,
Computer Networks. A computer network is defined as the interconnection of 2 or more independent computers or/and peripherals. Computer Network.
Chapter 21 Topologies Chapter 2. 2 Chapter Objectives Explain the different topologies Explain the structure of various topologies Compare different topologies.
Telecommunications, the Internet, and Wireless Technology.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
5 SECTION A 1 Network Building Blocks  Network Classifications  LAN Standards  Network Devices  Clients, Servers, and Peers  Physical Topology  Network.
Chapter 4 Telecommunications and Networking The McGraw-Hill Companies, Inc All rights reserved. Irwin/McGraw-Hill.
Chapter2 Networking Fundamentals
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Reference :Understanding Computers
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Telecommunications and Networks Chapter 6 Principles and Learning Objectives Effective communication is essential to organizational success. –Define.
TELECOMMUNICATIONS AND NETWORKS ~ Pertemuan 8 ~ Oleh: Ir. Abdul Hayat, MTI.
Chapter 6 Telecommunications and Networking Slide 1 Well, Sort-of.
Dr. John P. Abraham Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Computer Networks and Internet. 2 Objectives Computer Networks Computer Networks Internet Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
CHAPTER 8 Communication and Network Copyright © Cengage Learning. All rights reserved.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
INTRODUCTION TO COMPUTER NETWORKS BY: SAIKUMAR III MSCS, Nalanda College.
Chapter 1: Explore the Network
Intro to MIS – MGS351 Network Basics
Network Basics Extended Learning Module E
Presentation transcript:

MIS DATA COMMUNICATION: DELIVERING INFORMATION ANYWHERE AND ANYTIME CHAPTER 6 Hossein BIDGOLI

Chapter 6 Data Communication: Delivering Information Anywhere and Anytime l e a r n i n g o u t c o m e s LO1 Describe major applications of data communication systems. LO2 Explain the major components of a data communication system. LO3 Describe the major types of processing configurations. LO4 Explain the three types of networks. LO5 Describe the main network topologies.

l e a r n i n g o u t c o m e s (cont’d.) Chapter 6 Data Communication: Delivering Information Anywhere and Anytime l e a r n i n g o u t c o m e s (cont’d.) LO6 Explain important networking concepts, such as bandwidth, routing, routers, and the client/server model. LO7 Describe wireless and mobile technologies and networks. LO8 Discuss the importance of wireless security and the techniques used. LO9 Summarize the convergence phenomenon and its applications for business and personal use.

Defining Data Communication Electronic transfer of data from one location to another Enables an information system to deliver information Improves the flexibility of data collection and transmission Basis of virtual organizations Provides e-collaboration

Why Managers Need to Know About Data Communication Separating an organization’s core functions from the data communication systems that enable and support them is difficult Enhances decision makers’ efficiency and effectiveness Enables organizations to use e-mail and electronic file transfer to improve efficiency and productivity Highlights how data communication technologies are used in the workplace

Why Managers Need to Know About Data Communication (cont’d.) Important concepts: The basics of data communication and networking The Internet, intranets, and extranets Wired and wireless networks Network security issues and measures Organizational and social effects of data communication Globalization issues Applications of data communication systems

Basic Concepts in a Data Communication System Bandwidth Amount of data that can be transferred from one point to another in a certain time period Attenuation Loss of power in a signal as it travels from the sending device to the receiving device Broadband data transmission Multiple pieces of data are sent simultaneously to increase the transmission rate

Basic Concepts in a Data Communication System (cont’d.) Narrowband Voice-grade transmission channel capable of transmitting a maximum of 56,000 bps, so only a limited amount of information can be transferred Protocols Rules that govern data communication, including error detection, message length, and transmission speed

Sender and Receiver Devices Device can be one of the following: “Thin client” Smart terminal Intelligent terminal Netbook Other types of computers Smartphones, mobile phones, mp3 players, PDAs, game consoles

Modems Modem (short for “modulator-demodulator”) Types Device that connects a user to the Internet Not required for all Internet connections Types Dial-up (analog) Digital subscriber line (DSL) Cable

Communication Media Communication media Conducted media Also called channels Connect sender and receiver devices Conducted media Provide a physical path along which signals are transmitted Include twisted-pair cable, coaxial cable, and fiber optics

Exhibit 6.1 Types of Communication Media

Communication Media (cont’d.) Radiated media Use an antenna for transmitting data through air or water Some work based on “line of sight” Include broadcast radio, terrestrial microwave, and satellite Types Point-to-point Multipoint system

Processing Configurations Data communication systems can be used in several different configurations Over past 60 years, three types of processing configurations have emerged: Centralized Decentralized Distributed

Centralized Processing Centralized processing system Processing is done at one central computer Advantage Being able to exercise tight control on system operations and applications Disadvantage Lack of responsiveness to users’ needs Not commonly used

Decentralized Processing Each user, department, or division has its own computer for performing processing Advantage More responsive to users Disadvantages Lack of coordination High costs Duplication of efforts

Distributed Processing Centralized control and decentralized operations Advantages Accessing unused processing power is possible Computer power can be added or removed Distance and location aren’t limiting More compatible with organizational growth Fault tolerance Resources can be shared to reduce costs Reliability is improved More responsive to user needs

Distributed Processing (cont’d.) Disadvantages Dependence on communication technology Incompatibility between equipment More challenging network management

Open Systems Interconnection Model Seven-layer architecture for defining how data is transmitted Layers: Application Presentation Session Transport Network Data link Physical

Types of Networks Three major types of networks: Local area networks, wide area networks, and metropolitan area networks Network interface card (NIC) Hardware component that enables computers to communicate over a network Common types of local area networks: Ethernet and token ring Network operating system (NOS) must be installed

Local Area Networks Connect workstations and peripheral devices that are in close proximity Limited geographical area Data transfer speed varies from 100 Mbps to 10 Gbps Purpose to share resources Key terms: Ethernet and Ethernet cable

Wide Area Networks Span several cities, states, or even countries Owned by different parties Data transfer speed: 28.8 Kbps to 155 Mbps Use many different communication media Connect to other networks

Metropolitan Area Networks Communication for multiple organizations in a city and sometimes nearby cities Data transfer speed varies from 34 Mbps to 155 Mbps

Exhibit 6.4 Metropolitan Area Networks

Network Topologies Represent a network’s physical layout Five common topologies: Star Ring Bus Hierarchical Mesh

Star Topology Central computer and a series of nodes Advantages Cable layouts are easy to modify Centralized control makes detecting problems easier Nodes can be added to the network easily Better for handling heavy but short bursts of traffic Disadvantages Single point of potential failure Increased cost due to many cables

Ring Topology Each computer manages its own connectivity Each node is connected to two other nodes Upstream neighbor and downstream neighbor Transmission in one direction Implementations Token ring Fibre Distributed Data Interface (FDDI) Needs less cable than star Handles heavy short bursts well

Bus Topology Connects nodes along a network segment Ends of the cable aren’t connected Terminator absorbs signal at each end Most commonly used speeds: 1, 2.5, 5, 10, and 100 Mbps, with 10 Mbps, 100 Mbps, 1 Gbps, and 10 Gbps (Gigabit Ethernet)

Bus Topology (cont’d.) Advantages Disadvantages Easy to extend Very reliable Wiring layout is simple and uses the least amount of cable of any topology Best for handling steady (even) traffic Disadvantages Fault diagnosis is difficult Bus cable can be a bottleneck when network traffic is heavy

Hierarchical Topology Combines computers with different processing strengths in different organizational levels Traditional mainframe networks Controller Hardware and software device that controls data transfer from a computer to a peripheral device Multiplexer Hardware device that allows several nodes to share one communication channel

Hierarchical Topology (cont’d.) Advantages Network control Lower costs Disadvantages Expansion may be a problem Traffic congestion at root and higher-level nodes

Mesh Topology Every node is connected to every other node Advantages Highly reliable Disadvantages Costly Difficult to maintain Difficult to expand

Major Networking Concepts Important networking concepts: Protocols TCP/IP Routing Routers Client/server model

Protocols Agreed-on methods and rules that electronic devices use to exchange information Deal with hardware, software, and networking Multiple protocol support is important

Transmission Control Protocol/Internet Protocol Industry-standard suite of communication protocols Main advantage is that it enables interoperability Originally intended for Internet communication Major protocols in the TCP/IP suite: Transmission Control Protocol (TCP) Operates at the OSI model’s Transport layer Internet Protocol (IP) Operates at the OSI model’s Network layer

Routing Packet Routing Collection of binary digits, including message data and control characters for formatting and transmitting Sent from computer to computer over a network Routing Process of deciding which path data takes Decisions made using routing table Centralized routing Distributed routing

Routers Network connection device containing software Connects network systems and controls traffic flow between them Must use a common routing protocol Operates at network layer Performs the same functions as a bridge More sophisticated device Chooses the best possible path for packets Static and dynamic routers

Client/Server Model Software runs on the local computer (the client) Communicates with the remote server to request information or services Server Remote computer on the network that provides information or services in response to client requests Basic client/server communication Advantage: scalability Three levels of logic: presentation, application, data management

Two-Tier Architecture Traditional client/server model Client communicates directly with the server Presentation logic is always on the client Data management logic is on the server Application logic located on either or both Effective in small workgroups

N-Tier Architectures Balance the workload between client and server Removes application processing from both the client and server Places it on a middle-tier server Three-tier Most common n-tier architecture Advantage Improved network performance Disadvantage Network management more challenging

Exhibit 6.6 A Two-Tier Client/Server Architecture

Exhibit 6.7 An N-Tier Architecture

Wireless and Mobile Networks Wireless network Uses wireless instead of wired technology Mobile network Network operating on a radio frequency (RF), consisting of radio cells served by a base station Advantages Mobility, flexibility, ease of installation, low cost Disadvantages Limited throughput and range, in-building penetration problems, vulnerability to frequency noise, security

Wireless Technologies Groups Wireless LANs Wireless WANs

Mobile Networks Three-part architecture Technologies Base stations Mobile telephone switching offices (MTSOs) Mobile communication devices Technologies Time Division Multiple Access (TDMA) Code Division Multiple Access (CDMA)

Exhibit 6.10 Mobile Network Architecture

Wireless Security Security is especially important in a wireless network, since anyone walking or driving within the range of an AP (even outside a home or office) can use the network A user can simply walk or drive around office buildings or homes with a WLAN-equipped computer and try to pick up a signal

Techniques for Improving the Security of a Wireless Network SSID (Service Set Identifier) All client computers that try to access the AP are required to include a SSID in all of their packets A packet without a SSID is not processed by the AP

Techniques for Improving the Security of a Wireless Network (cont’d.) WEP (Wired Equivalent Privacy) A key must be manually entered into the AP and the client computer The key encrypts the message before transmission

Techniques for Improving the Security of a Wireless Network (cont’d.) EAP (Extensible Authentication Protocol) WEP keys are dynamically generated based on the user’s ID and password When the user logs out of the system, the key is discarded A new key is generated when the user logs back into the network   WPA (Wi-Fi Protected Access)—This technique combines the strongest features of WEP and EAP: Keys are fixed, as in WEP, or dynamically changed, as in EAP.

Techniques for Improving the Security of a Wireless Network (cont’d.) WPA (Wi-Fi Protected Access) Combines the strongest features of WEP and EAP However, the WPA key is longer than the WEP key; therefore, it is more difficult to break The key is changed for each frame before transmission

Techniques for Improving the Security of a Wireless Network (cont’d.) WPA2 or 802.11i It uses EAP to obtain a master key With this master key, a user’s computer and the AP negotiate for a key that will be used for a session After the session is terminated, the key is discarded

Convergence of Voice, Video, and Data Integrating voice, video, and data so that multimedia information can be used for decision making Integrating video with voice and data required network upgrades Common applications: E-commerce Entertainment Video and computer conferencing Consumer applications

Summary Data communication systems: Wireless and mobile networks Basic components Processing configurations Types of networks Network topologies Important concepts Wireless and mobile networks Wireless security Future trends in data communication: Convergence and telepresence