Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001.

Slides:



Advertisements
Similar presentations
Distributed Data Processing
Advertisements

Welcome to Middleware Joseph Amrithraj
Case Study: Pat Lee’s Home PC Network Chapter 1a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only.
Chapter VI Data Communication: Delivering Information Anywhere and Anytime By: AP CHEN P. JOVER BSIT - III.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
LANs and WANs Network size, vary from –simple office system (few PCs) to –complex global system(thousands PCs) Distinguish by the distances that the network.
Web Caching Schemes1 A Survey of Web Caching Schemes for the Internet Jia Wang.
Internet Networking Spring 2006 Tutorial 12 Web Caching Protocols ICP, CARP.
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
Lesson 3 – UNDERSTANDING NETWORKING. Network relationship types Network features OSI Networking model Network hardware components OVERVIEW.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
A Guide to major network components
Computer Networks IGCSE ICT Section 4.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Network Topologies.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Elements of a Small PC Network LAN Standards –We will focus on LANs that follow the Ethernet standard (80% do) Small Ethernet PC networks use only inexpensive.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Communications & Networks
INTRODUCTION TO WEB DATABASE PROGRAMMING
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
1 Computer (Transport) Layer F Manages communication between two computers F Platform independence: one computer does not know even what platform the other.
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
Chapter 1 An Introduction to Networking
Chapter 7: Using Windows Servers to Share Information.
LECTURE 9 CT1303 LAN. LAN DEVICES Network: Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and.
Survey of PC and Network Operating Systems
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
New Technologies Wireless Communication Really Personal Computers Network Object-Oriented Processing The Changing Internet The Next Big Thing.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Chapter 13 – Network Security
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Network Management System The Concept –From a central computer, network administrator can manage entire network Collect data Give commands –Moving gradually.
XTR Consulting: A SOHO Network with Dedicated Servers Chapter 1b Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Server Systems Administration. Types of Servers Small Servers –Usually are PCs –Need a PC Server Operating System (SOS) such as Microsoft Windows Server,
Chapter Two Defining Network Objects. Chapter Objectives Describe how a workstation communicates with the network, and list the software components required.
Introduction  Client/Server technology is seen by many as the solution to the difficulty of linking together the various departments of corporation.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Chapter2 Networking Fundamentals
Directory Servers Purposes (From Chapter 6) –Help users find information –Centralize security (single login, etc.)
Rehab AlFallaj.  Network:  Nodes: Service units: PC Interface processing Modules: it doesn’t generate data, but just it process it and do specific task.
Install, configure and test ICT Networks
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
Introduction Chapter 1. Introduction  A computer network is two or more computers connected together so they can communicate with one another.  Two.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
ISC321 Database Systems I Chapter 2: Overview of Database Languages and Architectures Fall 2015 Dr. Abdullah Almutairi.
Chapter 27 Network Management Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 1: Network Operating Systems (NOS)
Network Operating Systems Examples
Introduction to Networking & Telecommunications
Chapter 12 Copyright 2001 Prentice Hall
Chapter 16: Distributed System Structures
Networks Software.
Principles of Information Technology
Presentation transcript:

Looking Forward Chapter 12 Copyright 2001 Prentice Hall Revision 2: May 2001

Budgeting and Procurement Planning how to spend money Selecting and purchasing technologies and services

3 The Budget Realities Exploding demand but stagnant or slowly- growing budgets Must buy only what you really need in every system Time Demand Budget

4 Costs Total Purchase Costs Base price misleading due to absence of needed options Must cost out total purchase cost of fully configured system Initial Installation Cost The purchased product or service Labor needed to implement  Central staff labor  User labor, including training costs  Losses due to implementation disruptions

5 Costs Ongoing Costs over Life Span Often exceed initial costs  Labor  Upgrades Especially high in immature products  When possible, avoid the “bleeding edge”

6 The Timing of Costs and Benefits Discounting Money can be invested (I.e. opportunity cost)  If the investment rate is 20%, then  $1 invested today will bring $1.20 next year  So $1 received today is worth $1.20 received next year  Or, $1.20 received next year is worth $1 today  Or, $1 received next year is worth only $0.80 today

7 The Timing of Costs and Benefits When Costs and Benefits Come Over Time Hurdle rate: minimum rate of return expected by a corporation for investments  Often around 20% If the hurdle rate is i then  Money received or spent a year from now should be discounted (divided) by (1+i)  Money received or spent n years from now should be discounted (divided) by (1+i) n

8 The Timing of Costs and Benefits Discounted Cash Flow Example (i=20%) Net Present Value (NPV) = 3,639 (sum of annual present values) This YearNext YearYear After Cash Flow In2,0003,0004,000 Cash Flow Out1,0001,5002,000 Net Cash Flow1,0001,5002,000 Discount Ratio Present Value1,0001,2501,389

9 Procurement User Needs Must drive everything else Sometimes difficult to assess But the only way to drive evaluations of alternatives

10 Procurement Request for Proposals (RFP) Call for proposals to bid on the project Specifies what should be provided RFP will form the basis for resolving subsequent contract disputes  Must be very detailed  A legal document If something is left out, negotiating for it after the contract is signed will be done at the contractor’s advantage

11 Procurement Proposals Several companies are likely to submit proposals These proposals must be evaluated so that you can select the best one You must lay out your evaluation criteria in the RFP and follow them in selection, or you can be sued by a loser

12 Procurement Evaluating Proposals with Multicriteria Decision Making First, you must have specific criteria  For instance, price, performance, and reliability  Same criteria must be applied to each proposal Second, you must give a weight (importance) to each  Often of 5-point or 10-point scale  Same weights must be applied to each proposal

13 Procurement Evaluating Proposals with Multicriteria Decision Making Third, you must evaluate each proposal on each criteria  Perhaps on scale of 1 to 10 or some other scale  Score on each criterion will be different for each proposal

14 Procurement Evaluating Proposals with Multicriteria Decision Making Fourth, do the arithmetic for each proposal Highest total score should win Proposal AScoreWeightProduct Price10550 Performance6848 Reliability Total Score

15 Procurement Evaluating Proposals with Multicriteria Decision Making Example: a different proposal Same criteria & weights, different scores, total score Proposal BScoreWeightProduct Price8540 Performance7856 Reliability Total Score

16 Procurement Negotiating before contractor selection Often, negotiate with a few highly-rated proposers before selection for better terms Proposers present their Best and Final Offers Ongoing Monitoring Must monitor ongoing work to ensure compliance Renegotiating During Performance Sometimes must renegotiate during work; Bad because buyer is at a disadvantage in negotiations

17 Types of Servers Small Servers Usually are PCs Need a PC Server Operating System (SOS) such as Microsoft Windows Server, Novell NetWare, LINUX Large Servers Usually use Workstation Servers Usually run UNIX

18 Symmetric Multiprocessing (SMP) PC or workstation can have multiple microprocessors Work is shared among the microprocessors through symmetric multiprocessing (SMP) to increase overall speed However, if you have N microprocessors, your server is not N times faster than a single- microprocessor server because of problems in assigning work evenly

19 RAID Redundant Array of Inexpensive (or Independent) Drives RAID controller controls multiple small inexpensive disk drives Reads and writes in parallel for higher speed despite low-cost drives Information usually is stored redundantly If one disk fails, lose no information Drives may even be hot-swappable  Do not have to turn off computer to replace

20 Server Farms In large sites, one server is not enough Have several, even hundreds of servers Called a server farm Many PC servers may be more cost- effective than fewer workstation servers Server Farm

21 Server Farms Load Balancing Approach Router or other device sends requests to servers based on load

22 Server Farms Server Clustering Approach Act as a single server without an external load balancer

23 Server Farms Reliability If one server’s hardware fails, operation continues without interruption However, software failures often take down all servers simultaneously

24 Server Configuration When Server Operating System is Installed, it Must be Configured Complex task with many steps, many of which require you to have conceptual knowledge Requires training Valuable skill

25 Ongoing Work Server Systems Administration is Labor- Intensive on a Continuing Basis Assisting users Adding/dropping Users Assigning and changing rights for users Data backup Upgrading and repairing servers Adding & maintaining application programs …

26 Network Management System The Concept From a central computer, network administrator can manage entire network  Collect data  Give commands Moving gradually toward this ideal Data Command

27 Network Management System Standards Most widely used is the Simple Network Management Protocol (SNMP) Other standards exist SNMP

28 Network Management System The Manager Software on network administrator's computer Short for “network management software” Implements network management support Managed Nodes Routers, client PCs, etc. that are managed Manager Managed Node

29 Network Management System Agents Network management agents Installed in managed nodes Communicate with the manager on behalf of the node ManagerAgent Managed Node

30 Network Management System RMON Probes Remote MONitoring SNMP only Special type of agent Collects data on a LAN’s traffic: packet sizes, error rates, etc. Manager LAN RMON Probe

31 Network Management System Objects Managed nodes have several objects that are managed Example: Client PC, one object might be status of TCP connection to particular server another may be status of router port A managed node may have several “instances” of some objects; For instance, a router may have several ports Agent OBJ

32 Network Management System Management Information Base (MIB) Stores collected information Schema  The overall design  Entities (objects) and attributes  Object-oriented database The actual stored information Confusingly, “MIB” is used to refer both to the schema and the actual data MIB

33 Network Management System Management Information Base (MIB) Full MIB is stored on the central administration computer Relevant portion of the MIB is also stored by each Agent ManagerAgent MIB

34 Network Management Protocol Network management protocol standardizes Communication between manager and agent Defines the schema of the MIB Most popular is the Internet Engineering’s Simple Network Management Protocol (SNMP) There are others

35 Network Management Protocol SNMP Requests and Responses Manager sends requests  Get: give me data  Set: change your setting (e.g., turn off Port 1) Agent sends back responses  The information  Confirmation or reason for rejection ManagerAgent MIB Get or Set Request Response

36 Network Management Protocol SNMP Traps Sometimes, agent can send a message without a prior manager request Message is called a trap in SNMP For instance, if the agent senses a problem ManagerAgent MIB Trap

37 Directory Servers Information is Organized Hierarchically Hierarchy of objects X.500 Standard defines types of objects and their properties Organization (O) = xxx Organizational Unit (OU) = yyy Employee (E) = zzz Common Name (CN)=Pat Lee (EM)=Lee Digital Certificate (DC)= Password

38 Directory Servers LDAP Lightweight Directory Access Protocol Most popular directory access protocol Governs user interaction with directory server Directory Server LDAP

39 Directory Server Products Novell Directory Services (NDS) From Novell Book incorrectly calls it NetWare Directory Services Mature, widely used Active Directory From Microsoft New

40 Directory Servers and Security Directory Server can store data and policies for security servers Digital certificates Passwords Policies Centralizes management and control

41 Converging Boxes Today, Many Types of Devices Forwarding: Hubs, Switches, Routers Security: Firewalls, etc. Difficult to Manage Difficult to Integrate Forwarding and Security

42 Converging Boxes Comprehensive Relay Devices are Needed Combine both forwarding and security Easier management Easier integration of forwarding, security CRD

43 Converging Boxes Multi-Layer Packet Analysis Comprehensive relay devices will analyze headers and data fields at all layers For intelligent forwarding, like Layer 4 switches For intelligent security, like firewalls This will reduce costs compared to having separate devices

44 Converging Boxes Processing Concerns Multi-layer forwarding will be processing intensive So will be multi-layer security Processors must grow in power to keep up with increasing demand plus multi-layer processing and security

45 Policy Based Networking Policy Servers will Store Policies and Related Data Will control individual forwarding, security, and comprehensive relay devices Uniformity in policy implementation CRD Policy Policy Server

46 Policy Based Networking COPS Common Open Policy Service Standardized way for policy servers to talk with devices for which they set policy CRD COPS Policy Server

47 Wireless Communication Site Wireless Networking For large site networks with many stations Bluetooth For a few devices close to one another Personal area networking May Interfere with Each Other if Both are Implemented

48 Wireless Communication Metropolitan Wireless Networking For an urban area Exists now, but slow (around 9,600 bps) Soon 100 kbps 3d Generation (3G) wireless service up to 2 Mbps Satellite Wireless Networking Megabit speeds anywhere

49 Wireless Communication Cellular Systems Service area is broken up into several small areas called cells Within each cell, there is a cellsite that transmits to and receives from cellular devices Cellsite

50 Wireless Communication Cellular Systems Channel reuse. Channels can be reused in non-adjacent cells  Very important due to limited available frequencies  Serves more subscriber with the same amount of frequency spectrum No Yes No Yes No Yes No Uses Channel 232 Can Reuse Ch. 232? Channel 232 Used in 4 cells

51 Wireless Communication The Wireless Revolution New freedom for users Anything, anytime, anywhere Likely to spawn new applications

52 Really Personal Computing Both Desktop PCs and Notebook PCs are Large This limits their portability Many Future Access Devices Will be Smaller Personal digital assistants (PDAs) Cellphones

53 Cellphone Access Cellphones will be Very Popular for Internet Access Cellphones are very widespread  In Japan, the number of cellphones passed the number of wired phones in early 2000  This is happening in other countries as well  The U.S. is somewhat behind because it did not settle on the world cellphone standard, GSM

54 Cellphone Access Starting to have small displays capable of showing a few lines of data Good for short messages (Short Message Service or SMS) Good for restricted Internet access Text only A few short lines only

55 Cellphone Access Wireless Access Protocol (WAP) Emerging standard for cellphone web access Also for other small devices, such as personal digital assistants (PDAs) Competition from i-mode technology created and popularized in Japan

56 Cellphone Access Wireless Markup Language (WML) Part of WAP Way of formatting webpages for small displays Simpler than HTML Reformatting may be expensive

57 Cellphone Access Wireless Access Protocol (WAP) Device will communicate over the Internet with WAP server via WAP protocols rather than with webservers directly Wireless Carrier WAP Protocols WAP Protocols WAP Server

58 Cellphone Access Wireless Access Protocol (WAP) WAP server may get content from full webserver using full webservice protocols (HTTP, TCP), probably translating webpages to WML Wireless Carrier WAP Server Webservice Protocols Full Webserver

59 Network Object-Oriented Processing Traditional Object-Oriented Programming Programs consist of many objects (forms, buttons, etc.) Objects send messages to one another to ask others to do certain tasks by executing methods OBJ Message Application

60 Network Object-Oriented Processing Network Object-Oriented Programming (NOOP) Objects can run on multiple machines Still communicate by sending messages NOOP takes advantage of available capacity on computers on the network If computer has idle capacity, it will be sent objects OBJ Message

61 Network Object-Oriented Processing NOOP Standards are Needed for Object- Object Communication Microsoft’s standard is DCOM CORBA is a competing consortium standard OBJ

62 The Changing Internet Today’s Internet Speed too low Delays (Latencies) are too long Reliability is too slow Need a “Business Class Internet” Faster Lower Latency High reliability Two Classes of Service? Regular versus Business Class? Haves versus Have-Nots?

63 The Next Big Thing The PC Revolution of the 1980s was not anticipated The Internet Revolution of the 1990s was not anticipated Will the future simply be an extension of the past, or will there be a Next Big Thing?