1 Chapter 9. The Internet Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.

Slides:



Advertisements
Similar presentations
Chapter 5 Voice Communication Concepts and Technology.
Advertisements

Presented by: Eng. Karam Al-sofy
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
TYPES; 1. Analog Analog 2. ISDN ISDN 3. B-ISDN B-ISDN 4. DSL DSL 5. ADSL ADSL 6. SDSL SDSL 7. VDSL VDSL 8. CABLE CABLE 9. Wireless Wireless 10. T-1 lines.
Internet review. Copyright 2005 John Wiley & Sons, Inc Internet Most used network in the world Not one network, but a network of networks Made up.
Networking at Home and Abroad
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 6-1 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used.
1 Computer Networks & The Internet Lecture 3 Imran Ahmed University of Management & Technology.
CSCI 4550/8556 Computer Networks Comer, Chapter 12: Long Distance Digital Connection Technologies.
TECHNOLOGY GUIDE 5 Basics of the Internet and the World Wide Web.
Copyright 2011 John Wiley & Sons, Inc Business Data Communications and Networking 11th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Access and Interconnection Technologies. Overview Two important Internet facilities – Access technologies used to connect individual residences and businesses.
CS 381 Introduction to computer networks Lecture 2 1/29/2015.
1 Chapter 7 The Internet Networking in the Internet Age by Alan Dennis Copyright © 2002 John Wiley & Sons, Inc.
Copyright 2005 John Wiley & Sons, Inc Business Data Communications and Networking 8th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
99 CHAPTER COMMUNICATIONS AND NETWORKS. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved. 9-2 Competencies Discuss connectivity, the wireless.
Hardware –Internet is a network of interconnected Host Computers or Hosts – Each host is assigned a unique IP address, e.g IP Stands for.
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Communications and Networks Chapter 8.
Computers © 2005 Prentice-Hall, Inc.Slide 1. Computers Chapter 6 Networks and Networking © 2005 Prentice-Hall, Inc.Slide 2.
Chapter 9 Using Telephone and Cable Networks for Data Transmission Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
CS335 Networking & Network Administration Wednesday, April 14, 2010.
11 Networks The Great Information Exchange. 2 Networking Fundamentals Computer network: Two or more computers connected together Each is a Node Benefits.
MIS Chapter 101 MIS 430 – Chapter Ten How The Internet Works.
Copyright © 2002 John Wiley & Sons, Inc.
1 Networking A computer network is a collection of computing devices that are connected in various ways in order to communicate and share resources. The.
Types of Internet Connections
X.25 Packet switched Network consisting of X.25 switches. X.25 is a connection oriented protocol (Virtual Circuits). End nodes are identified by an X.25.
Copyright © 2015 John, Wiley & Sons, Inc. All rights reserved FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
Power point presentation on internet Presentation by: Tenzin wangda.
Backbone Network Architectures Identifies the way backbone interconnects LANs Defines how it manages packets moving through BB Fundamental architectures.
Wireline-Broadband. BSNL/ BROADBAND /BATHINDA2 What is Broadband ? As per recent Broadband Policy of GOI, access rate over 256 Kbps will be considered.
TYPES OF INTERNET CONNECTION ANALOG (DIAL-UPANALOG (DIAL-UP) ISDNB-ISBNDSLADSLVDSLSDSLCABBLE WIRELESS INTERNET CONNECTION INTERNET BONDEDBONDED T-1T-1T-1LINESATTELITTE.
Networking Technologies
CMPTR Chapter 5.
IT in Business Enterprise and Personal Communications Networks Lecture – 07.
Chapter 7 WANs and Remote Connectivity. WAN Essentials A WAN traverses a large geographic area A WAN link is a connection from one site to another and.
Computer Networking Part 1 CS 1 Rick Graziani Cabrillo College Fall 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
Chapter 4. After completion of this chapter, you should be able to: Explain “what is the Internet? And how we connect to the Internet using an ISP. Explain.
Telecommunications systems (Part 2) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 12, Thursday 3/29/2007) T-1 Digital.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 6-1 Raymond Panko’s Business Data Networks and Telecommunications, 7th edition May only be used.
Modems Mostly used to connect PCs to the Internet Modulates and demodulates the signal Converts analog data into digital and vice versa V.90/V.92 56K standards.
Communications and Networks Chapter 8. 2 Introduction We live in a truly connected society. Increased connectivity potentially means increased productivity,
1 Back to Slide 7. 2 Also called dial-up access, it is both economical and slow. Using a modem connected to your PC, users can connect to the Internet.
Chapter 11 - Long-Distance Digital Connection Technologies Introduction Digital telephony Digitizing voice Example Sampling parameters Synchronous communication.
1 of 32 Chapter 10. The Internet. 2 of 32 Chapter 10. Learning Objectives Understand the overall design of the Internet Be familiar with DSL, cable modem.
Chapter 7 Ben Bielskis WAN Wide Area Network Connects LANs over a large geographical area. WAN Link – A connection from one site to another.
Computer Networks Digital Access Technologies. Spring 2006Computer Networks2 How Computer Networks are Built?  LANs (Local Area Networks) are relatively.
Communication Networks Fourth Meeting. Types of Networks  What is a circuit network?  Two people are connected and allocated them their own physical.
Communications and Networks Chapter 9 McGraw-HillCopyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
Using Telephone and Cable Networks
Telecommunications, the Internet, and Wireless Technology.
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
ICT–BVF 4.1 Telecommunication Network Structure Information & Communication Technology Module:ICT–BVF–4.1 fundamentals of Telecommunication Unit:ICT–AS–4.2.
Slide 4-1 Chapter 4 Terms Data Communications and Networking Considerations Introduction to Information Systems Judith C. Simon.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
. Large internetworks can consist of the following three distinct components:  Campus networks, which consist of locally connected users in a building.
Communications and Networks Chapter 9 9-1Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved.
COMPUTER NETWORKING 2 LECTURE 3: BROADBAND TECHNOLOGY & DSL.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
1 Kyung Hee University Chapter 9 Using Telephone and Cable Networks for Data Transmission.
Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 1 – Data Communications, Data Networks, and.
Computer Engineering and Networks, College of Engineering, Majmaah University Mohammed Saleem Bhat CEN-444 Networks Structure And Protocols.
Copyright 2010 John Wiley & Sons, Inc Business Data Communications and Networking 10th Edition Jerry Fitzgerald and Alan Dennis John Wiley & Sons,
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Digital Subscriber Line (DSL)
Lec # 19 Data Communication
Data and Computer Communications Eighth Edition by William Stallings Chapter 1 – Data Communications, Data Networks, and the Internet.
Data Communications Chapter 1 – Data Communications, Data Networks, and the Internet.
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
The Internet and Its Applications
Presentation transcript:

1 Chapter 9. The Internet Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.

2 Copyright  John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.

3 Chapter 9. Learning Objectives Understand the overall design of the Internet Be familiar with DSL, cable modem and Wireless Application Protocol Be familiar with Internet 2

4 Chapter 9. Outline Introduction How the Internet Works –Basic Architecture, Connecting to an ISP, The Internet Today Internet Access Technologies –Digital Subscriber Line, Cable Modems, Fixed Wireless, Mobile Wireless, Future Technologies Internet Governance Internet 2

5 Introduction

6 The Internet is not one network but a network of networks made up of thousands of networks of national and state government agencies, non-profit organizations and for-profit companies. It exists only to the extent that these networks agree to use Internet protocols and to exchange data packets among one another. All networks on the Internet must conform to the TCP/IP standards for the transport and network layers, without which data communications over the Internet would not be possible.

7 How The Internet Works

8 Basic Architecture: NAPs and national ISPs The Internet has a hierarchical structure. At the highest level are large national Internet Service Providers that interconnect through Network Access Points (NAPs). There are about a dozen NAPs in the U.S., run by common carriers such as Sprint and Ameritech (Figure 9-1), and many more around the world. Regional ISPs interconnect with national ISPs and provide services to their customers and sell access to local ISPs who, in turn, sell access to individuals.

9 Basic Architecture: MAEs and local ISPs As the number of ISPs has grown, a new type of network access point, called a metropolitan area exchange (MAE) has arisen. There are about 50 such MAE around the U.S. today. Sometimes large regional and local ISPs also have access directly to NAPs. Indiana University, for example, which provides services to about 40,000 individuals, connects directly to the Chicago NAP.

10 Figure 9-1 Basic Internet Architecture

11 Internet Packet Exchange Charges ISP at the same level usually do not charge each other for exchanging messages. This is called peering. Higher level ISPs, however, charge lower level ones (national ISPs charge regional ISPs which in turn charge local ISPs) for carrying Internet traffic. Local ISPs, of course, charge individuals and corporate users for access.

12 Connecting to an ISP ISPs provide access to the Internet through a Point of Presence (POP). Individual users access the POP through a dial-up line using the PPP protocol. The call connects the user to the ISP’s modem pool, after which a remote access server (RAS) checks the userid and password. Once logged in, the user can send TCP/IP/[PPP] packets over the telephone line which are then sent out over the Internet through the ISP’s POP. Corporate users might access the POP using a T-1, T-3 or ATM OC-3 connections provided by a common carrier. Figure 9-2 shows an example of a POP using a collapsed backbone with a layer 2 switch.

13 ISP Point-of Presence Modem Pool Individual Dial-up Customers Corporate T1 Customer T1 CSU/DSU Corporate T3 Customer T3 CSU/DSU Corporate OC-3 Customer ATM Switch Layer-2 Switch ISP POP NAP/MAE Figure 9-2 Inside an ISP Point of Presence Remote Access Server ATM Switch

14 Figure 9-2 Inside an ISP Point of Presence

15 From the ISP to the NAP/MAE Each ISP acts as an autonomous system, with is own interior and exterior routing protocols. Messages destined for locations within the same ISP are routed through the ISP’s own network. Since most messages are destined for other networks, they are sent to the nearest MAE or NAP where they get routed to the appropriate “next hop” network. Figure 9-3 shows the connection from the local ISP to the NAP. From there packets are routed to the next higher level of ISP. Actual connections can be complex and packets sometimes travel long distances. Each local ISP might connect a different regional ISP, causing packets to flow between cities, even though their destination is to another local ISP within the same city.

16 ATM Switch Route Server Router ISP A Router ISP B Router ISP C Router ISP D ISP E ATM Switch ISP F ATM Switch Figure 9-3 Inside an Internet Network Access Point

17 Figure 9-3 Inside an Internet Network Access Point

18 The Internet in 2001 Figure 9-4 illustrates the backbone networks of three national ISPs: Compuserve and CAIS in the US and iSTAR in Canada. Compuserve mostly uses T-3 lines for its backbone, CAIS uses a mix of T-3 and ATM OC- 12 lines, while iSTAR uses T-1 lines. Compuserve and CAIS meet and peer at the Chicago NAP, while CAIS and iSTAR peer at the NAP in London, Ontario.

19 Figure 9-4 Three national ISPs in North America

20 Internet Backbones in 2001 As of mid-2001, most backbone circuits for national ISPs in the US are 622 Mbps ATM OC- 12 lines. The largest national ISPs are planning to convert to OC-192 (10 Gbps) by the end of A few are now experimenting with OC-768 (40 Gbps) and some are planning to use OC-3072 (160 Gbps). Aggregate Internet traffic reached 2.5 Terabits per second (Tbps) by mid It is expected to reach 35 Tbps by 2005.

21 Internet Access Technologies

22 Internet Access Technologies Most people today are still using 56K dial- up lines to access the Internet, but a number of new access technologies are now being offered. The main new access technologies are: –Digital Subscriber Line –Cable Modems –Fixed Wireless (including satellite access) –Mobile Wireless (WAP)

23 Digital Subscriber Line Digital Subscriber Line (DSL) is one of the most promising technologies now being implemented to significantly increase the data rates over traditional telephone lines. Historically, voice telephone circuits have had only a limited capacity for data communications because they were constrained by the 4 kHz bandwidth voice channel. Most local loop telephone lines actually have a much higher bandwidth and can therefore carry data at much higher rates.

24 Digital Subscriber Line DSL services are quite new and not all common carriers offer them. Two general categories of DSL services have emerged in the marketplace. –Symmetric DSL (SDSL) provides the same transmission rates (up to 128 Kbps) in both directions on the circuits. –Asymmetric DSL (ADSL) provides different data rates to (up to 640 Kbps) and from (up to Mbps) the carrier’s end office. It also includes an analog channel for voice transmissions.

25 Figure 9-5 DSL Architecture Local Carrier End Office Line Splitter Customer Premises Telephone DSL Modem Hub Computer Local Loop Main Distribution Frame Customer Premises Customer Premises Voice Telephone Network DSL Access Multiplexer ATM Switch ISP POP

26 Figure 9-5 DSL Architecture

27 TypeMaximum Length of Local Loop Maximum Downstream Rate Maximum Upstream Rate T118,000 feet1.5 Mbps384 Kbps E1*16,000 feet2.0 Mbps384 Kbps T212,000 feet6.1 Mbps384 Kbps E2 * 9,000 feet8.4 Mbps640 Kbps * E1 and E2 are the European standard services similar to T1 and T2 services in North America Figure 9-6 ADSL data rates

28 Very High Rate Digital Subscriber Line (VDSL) VDSL is a high-speed member of the DSL family, designed for local loops of 1000 feet or less. Its three FDM channels are: –4 KHz analog voice channel –Upstream digital 1.6 Mbps channel –Downstream digital 52 Mbps channel

29 TypeMaximum Length of Local Loop Maximum Downstream Rate Maximum Upstream Rate 1/4 OC-14,500 feet12.96 Mbps1.6 Mbps 1/2 OC-13,000 feet25.92 Mbps2.3 Mbps OC-11,000 feet51.84 Mbps2.3 Mbps Figure 9-7 Anticipated VDSL data rates

30 Cable Modems One potential competitor to DSL is the “cable modem” a digital service offered by cable television companies which offers an upstream rate of Mbps and a downstream rate of 2-30 Mbps. A few cable companies offer downstream services only, with upstream communications using regular telephone lines.

31 Figure 9-8 Cable Modem Architecture Cable Company Distribution Hub Cable Splitter Customer Premises TV Cable Modem Hub Computer Shared Coax Cable System Combiner Customer Premises Customer Premises TV Video Network Cable Modem Termination System ISP POP Cable Company Fiber Node Optical/Electrical Converter Downstream Upstream Router Cable Company Fiber Node

32 Figure 9-8 Cable Modem Architecture

33 Fixed Wireless Fixed Wireless is another “dish-based” microwave transmission technology. It requires “line of sight” access between transmitters. Both point-to-point and point-multipoint forms are available. Multipoint forms allow access by a limited number of stations. Data access speeds range from 1.5 to 11 Mbps depending on the vendor.

34 Fixed Wireless (Figure 9-9) Fig. 9-9 is an example of fixed wireless technology. Transmissions travel between transceivers at the customer premises and ISP’s wireless access office. Incoming signals at the customer site are first demultiplexed and then sent to the MDF where the signal is combined with voice transmissions. This combined signal is then distributed to individual customer premises where a line splitter separates out the voice communications. The data transmission is then sent to a DSL modem which is connected to a hub on the customer’s LAN. The transceiver at the wireless access office is connected to a router which then sends outgoing packets over the Internet.

35 Fig. 9-9 Fixed Wireless Architecture Wireless Access Office Wireless Transceiver Customer Premises Telephone DSL Modem Hub Computer Customer Premises Customer Premises Main Distribution Frame Voice Telephone Network DSL Access Multiplexer Wireless Transceiver Router Line Splitter Individual Premise Individual Premise Individual Premise ISP POP

36 Fig. 9-9 Fixed Wireless Architecture

37 Mobile Wireless Mobile wireless is the next step in cell phone technology, allowing users to access the Internet from any location. Access speeds are currently slow compared to fixed wired access such as DSL or cable modem. Mobile wireless uses the wireless application protocol (WAP) used by the wireless application environment (WAE). WAP uses WAE and WML instead of HTTP and HTML, which essentially streamlines the latter for use in the very limited low speed and small screen wireless mobile networking environment.

38 Basic WAP Architecture (Figure 9-10) WAP clients (e.g., cell phone or palm computer) run a WAP program called a WAE user agent that generates WAE requests and sends them to the WAP gateway. The WAP gateway transceiver next passes the requests to a wireless telephony application (WTA) server. The server sends WAE responses back to the WAP client. If the client has requested a Web page, the WAE request is sent to a WAP proxy which translates both outgoing requests from WAE to HTTP and incoming HTTP responses back into WAE The WAE responses are then sent back to the WTA server which, in turn, sends them back to the WAP client.

39 Web Server Web Site WAP Proxy WAP Gateway Wireless Telephony Application Server HTTP Requests HTTP Responses (plus HTML, jpeg, etc.) Figure 9-10 Mobile Wireless Architecture for WAP applications WAE Responses (plus WML, etc.) WAE Requests WAP Client Wireless Transceiver WAE User Agent WAE Requests WAE Responses (plus WML, etc.) WAE Requests WAE Responses (plus WML, etc.)

40 Figure 9-10 Mobile Wireless Architecture for WAP applications

41 Future Access Technologies Two potentially important technologies for Internet access in the near future are: Passive Optical Networking (PON) –PON, also called Fiber to the Home will unleash the potential of optical fiber communications to end users. –With WDM hundreds or thousand of channels are possible. Passive optical doesn’t require electricity, lowering cost, but limiting its maximum distance. Ethernet to the Home –Gives home users 10BaseT or 100BaseT connections. –Yipes.com is now doing this in several large US cities. –The common carrier installs TCP/IP routers connected to an Ethernet MAN.

42 Internet Governance

43 ISOC and Internet Governance The Internet Society (ISOC) is the closest thing to an “owning” organization that exists for the Internet. ISOC is an open society whose members include 175 organizational and 8,000 professional members worldwide. ISOC works in three areas: –In public policy by participating in national and international debates on issues such as censorship, copyrights, privacy and universal access. –In education, ISOC provides training and education programs aimed at improving Internet infrastructure in developing nations. –In standards, ISOC works through four inter-related standards bodies: IETF, IESG, IAB and IRTF.

44 4 ISOC-related Standards Bodies Internet Engineering Taskforce (IETF) includes network designers, vendors, and researchers who develop new Internet architecture. IETF sends out requests for comment (RFCs) which form the basis of new Internet standards. Internet Engineering Steering Group (IESG) is responsible for technical management of IETF activities and standards and is governed by rules ratified by ISOC trustees. Each IETF group is chaired by an IESG member. Internet Architecture Board (IAB) provides strategic direction by promoting which actions the IETF and IESG should take. The IAB also elects the IETF chair and all IESG members out of the IETF nominating committee’s list. Internet Research Taskforce (IRTF) works through small research groups focused on specific research topics. IETF generally works on short-term issues, IRTF works on long- term ones related to Internet protocols, applications, architecture, and technology.

45 Internet 2

46 Internet 2 (Figure 9-11) New networks are being developed to develop future Internet technologies including: –The very high performance Backbone Network Service (vBNS) run by Worldcom. 34 universities participate. –The Abilene network (also called Internet 2) is being developed by the University Corporation for Advanced Internet Development (UCAID). –CA*Net3 is the Canadian government initiative. Access is through Gigapops, similar to NAPs, but which operate at very high speeds (622 Mbps to 2.4 Gbps) using SONET, ATM and IPv6 protocols. Protocol development focuses on issues like Quality of Service and multicasting. New applications include tele-immersion and videoconferencing.

47 Figure 9-11 Gigapops and high speed backbones of Internet 2/Abilene, vBNS, and CA*Net 3 Abilene vBNS CA*Net 3

48 Figure 9-12 Inside the Pacific/Northwest Gigapop Router High-speed Router Abilene DREN WSU Boeing U Idaho High-speed Router Montana State U U Montana U Alaska Portland POP Microsoft Router Switch U Wash Router Switch CA*Net 3 Sprint UUNet Verio Router AT&T Sprint Router OC-48 OC-12 T-3 HSCC Switch SCCD

49 Figure 9-12 Inside the Pacific/Northwest Gigapop

50 End of Chapter 9