Your SlideShare is downloading. ×
TELECOMMUNICATIONS and NETWORKS All Organizations Need to ...
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

TELECOMMUNICATIONS and NETWORKS All Organizations Need to ...

653
views

Published on


0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
653
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
53
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • CLASSROOM EXERCISE Understanding Networks This web site offers great content on understanding networks http://compnetworking.about.com/od/basicnetworkingconcepts/
  • 3 3 3 3
  • BitTorrent is an excellent example of peer-to-peer Discuss the Apply Your Knowledge project on BitTorrent (AYK project 7 – Contemplating Sharing)
  • Is your PC a client or a server? Chances are most student computers are clients on the universities network Can your PC be a client or a server? Both, any PC can be used as a server – you simply install the server operating system
  • Why is a router so important to a business? The router is used to receive packets from the Internet
  • 34
  • Why is interoperability so important in today's world? With so many different worldwide manufactures of computer components it is imperative that all of the devices work together
  • Are you are using a cable to connect to the Internet? If so, is it Ethernet?
  • Do you use TCP/IP? If you are on the Internet, yes, you are using TCP/IP.
  • Organizations use diverse network technologies that may not be compatible with the technologies of other organizations. Because so many different networks are connected, they must have a common protocol to communicate. The protocol of the Internet is TCP/IP. TCP control s the packets. IP controls the addressing of individual machines. Packets travel independently to their destination, sometimes following different paths and arriving out of order. The destination computer uses TCP to reassemble the packets based on their identification and sequencing information. Every computer that uses the Internet must run IP software. The IP defines how a packet must be formed and how a router must forward each packet. TCP helps guarantee delivery of the packets.
  • Do you use TCP/IP? If you are on the Internet, yes, you are using TCP/IP.
  • Do you use TCP/IP? If you are on the Internet, yes, you are using TCP/IP.
  • 18 18 18 20
  • 22 22 22 24
  • 21 21 21 23
  • 20 20 20 22
  • 20 20 20 22
  • 20 20 20 22
  • CLASSROOM EXERCISE Cell Phones and Airplanes Break your students into groups and ask them to research the Internet to find the reasons why people are required to turn off their cell phones when they are on an airplane. There are two reasons why cell phones are not allowed on an airplane: The Federal Communication Commission (FCC) bans the use of cell phones on airplanes because they could wreak havoc with cell phone systems on the ground. Signals from your cell phone, when you use it on or near the ground, reach just a few cell phone nodes near you and the node that is getting the strongest signal picks up your call. If you move, while driving your car or walking, the next node picks up the call. From the air, however, your phone's signal could reach miles, hitting many nodes at once, all with equal strength. Plus, you are moving at several hundred miles an hour. Cell phone systems were not designed to handle that. The Federal Aviation Administration, for its part, supports the FCC ban for its own reasons. They fear cell phones may interfere with navigation and other aircraft systems. Incident reports submitted by airline crews also demonstrate the potential for trouble. NASA's Aviation Safety Reporting System's "Passenger Electronic Devises Database Report Set" -- which could be subtitled "passengers behaving badly" -- contains several reports of incidents involving passengers whose "personal electronic devices" seemed to create disturbances in aircrafts' electronic systems. Review the IM for a complete listing
  • 11 11 10 12
  • 12 12 11 13
  • 13 13 12 14
  • 14 14 13 15
  • 15 15 14 16
  • 16 16 16 18
  • Transcript

    • 1. TELECOMMUNICATIONS and NETWORKS
    • 2. All Organizations Need to Share and Communicate Information...
      • Externally with other organizations
      • Internally among employees.
      - the electronic movement of information over public or private networks - a communications, data exchange, and resource-sharing system created by , or protocols, so that they can work together .
    • 3. Benefits of a NETWORK
      • 1. The ability with other people ( is the most of network communications)
      • 2. The ability to share
        • I
        • Software
        • Peripheral devices
        • P
    • 4. Ways different types of networks are differentiated
      • Size and Proximity of the network
        • LAN versus WAN
      • Architecture
        • Peer-to-Peer versus Client/Server
      • Protocols Used
        • Ethernet for LAN
        • Transmission Control Protocol/Internet Protocol (TCP/IP)
      • Topology
        • Bus, Star, Ring, Hybrid, Wireless
      • Media
        • Coaxial, Twisted-pair, Fiber-optic, Wireless media
    • 5. Network Proximity
      • L Network --Connects computers in relatively
      • W Networks -- Connects computers that may be dispersed among a number of buildings, or even in different cities.
      • Internet --International Network of Networks.
      WAN
    • 6. Types of LANs
      • P
        • Each user can share their computer’s resources with other LAN users
      • C
        • Only resources on specific computers called “servers” can be shared
    • 7. Peer-to-Peer Networks
      • Peer-to-peer (P2P) network - any network and in which computers in the network to the public files located on all other workstations
    • 8. Peer-to-Peer LAN Advantages
      • Control is distributed to the LAN users
        • Users who own data have control over who accesses it
      • Inexpensive and easy to install
        • You just need
          • A
          • A network operating system on both computers, (any version of since 95).
          • Network
      • Network resources are distributed
        • A disaster on one user’s computer doesn’t destroy all the data on the network
    • 9. Peer-to-Peer LAN Disadvantages
      • Control is distributed to the LAN users
        • No one person or group can know what resources are available.
        • No one person or group is
      • Performance is poor
        • Since the computers share resources and some computers can even access the hard drives of other computers, the result is that
        • The performance of a PC also slows down when someone on the network accesses it.
        • As a result, peer-to-peer networks are
    • 10.  
    • 11. Client/Server Networks
      • Client - a computer that is designed to from a server
      • Server - a computer that is dedicated to providing information in response to external requests
      • Client/server network - model for applications in which the takes place on a , while the is handled by the
    • 12. The Client/Server Model Storage and management of the data needed by the application Data Management Presentation The to the application Business Logic Actual business rules implemented
    • 13. Client/Server Model: A Business View
      • The different Client/server implementations differ according to:
        • Where the processing for the
        • Where the processing of occurs
        • Where the (DBMS) and are located
    • 14. Flexible Applications Server Client Business Logic Data Management Business Logic Presentation Business Logic Data Management Presentation
    • 15. Any Combination is Possible Design Server Client Production Server Business Logic Data Management Presentation Data Management Business Logic
    • 16.  
    • 17.
      • Application can be structured to match organizational requirements since it is both
        • C an change the implementation of this model as the organization changes in size since the Client/Server model provides the to whatever is
      • Data access is regardless of where the data is stored.
      • Separate programs are more easily maintained and can be reused.
      • One for all of the and easier to
      Client/Server Advantages
    • 18. Client/Server LAN Disadvantages
      • All shared resources reside on computers call “servers”
        • If a disaster occurs on the server all the data is in jeopardy
        • If the server malfunctions,
      • Expensive
        • Usually require expensive hardware and extra staff to manage
        • Only of client/server costs are tied up in
        • The remaining is in the form of - both IT professionals and knowledge workers.
    • 19. Client/Server Networks
      • Network operating system (NOS) - the operating system that runs a network, steering information between computers and managing security and users
        • Major client/server NOSs are Windows NT, Windows 2000, Novell NetWare, Linux, and Unix
      • P - occurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer
      • Router
        • Used to
        • Can also “sit” (serving as a ).
        • An intelligent connecting device that examines each packet of data it receives and then decides which way to send it onward toward its destination
    • 20. Network Data Transfer Process
      • Network operating system on the source machine to be sent into segments of predetermined length called
      • Network operating system on the source uses a communications protocol to
      • Network Operating System on the source sends packets over the network.
      • Packets are routed as necessary through the network depending on the transmission mediums, transmission signal characteristics and access control methods.
      • Network Operating system on the destination receives packets over the network.
      • Network Operating system on the destination by looking at the communication protocol information. Requests retransmission of any missing data.
    • 21. Connecting Networks Routers are responsible for that messages take from the sending computer to the destination computer. Router The connection between a LAN and a larger network is usually accomplished using a device called a Router WAN or Backbone LAN LAN
    • 22. WANs Once a network is linked to a , it becomes part of the Internet community. High Speed Backbone Backbone is usually a type of network that has
    • 23.  
    • 24. Wide Area Network R R R R R R R R R R R R R Packet Switched Network Data is packaged in for transmission. Each packet follows through the network.
    • 25. PROTOCOLS
      • Protocol - a that specifies the as well as the during transmission
      • Following a certain , allows for interoperability
        • Interoperability - the capability of two or more computer systems to share data and resources, even though they are made by different manufacturers
      • Two primary communications protocols are TCP/IP and Ethernet
        • TCP/IP is used for
        • Ethernet is used by computers in a to communicate
    • 26. Ethernet
      • Ethernet - a physical and data layer technology for LAN networking
    • 27. Ethernet
      • Defines the standards used in a LAN.
      • Used to describe the
        • W (Co-axial, twisted-pair, fiber-optic)
        • How bits are physically transmitted using those media
        • Access control rules
        • Data transmission speeds
      • Details and works on the principle of and
      • Helps insure the compatibility of different devices so that many people can attach to a common cable.
    • 28. Transmission Control Protocol/ Internet Protocol
      • Transmission Control Protocol/Internet Protocol (TCP/IP) - provides the technical as well as for large numbers of private network
      • The TCP/IP protocol suite is made up of over protocols.
        • The two are TCP and IP
        • TCP provides for
        • IP provides the mechanism
    • 29. TRANSMISSION CONTROL PROTOCOL / INTERNET PROTOCOL (TCP / IP)
      • Allows computers to regardless of their or hardware.
      • Transmission Control Protocol
        • Breaks information into data packets
        • Reassembles packets when received
        • Checks for lost packets
      • Internet Protocol
        • Each computer given a unique IP address
        • Used to
        • 209.1.144.212
    • 30. TCP/IP’s four-layer reference model
      • The layer allows users and applications to access
        • F protocol (FTP)
        • Simple protocol (SMTP)
        • T provides terminal emulation that allows a “ terminal with ” to be able to connect to a host computer (which will control everything).
        • H protocol (HTTP)
        • Simple network management Protocol (SNMP)
    • 31. TCP/IP’s four-layer reference model
      • The layer handles
      • The layer handles the packets ( , etc.)
      • The layer details how is through the networking
    • 32. How Does the Internet Work?? http://www.howstuffworks.com/web-server.htm #1 #2 Browser communicates with to get #3 Browser connects to specific server, uses GET request to ask for file you wish to see. #4 Server sends HTML text to your browser. HTML tags are read and page displayed. 209.1.144.212
    • 33. Network Topology
      • The of computers in a network.
        • Bus
        • Ring
        • Star
        • Mesh
        • Hybrid
        • Wireless
    • 34. Bus Topology
      • All computers are connected /cable.
      • One device transmits a communications signal, which is broadcast to the entire network
      • Most LAN topology. Relatively
    • 35. Ring Topology
      • All devices connected to one channel in the form of a closed loop (ring). Each device is connected directly to two other devices.
      • All messages in one direction.
      • Relatively and , but they offer high bandwidth and can span large distances.
      • Used primarily in that use token ring software.
    • 36. Star Topology
      • All devices are , called a hub. The hub . All network traffic the hub.
      • Relatively easy to install and manage.
      • B can occur because of the must through the , and if the hub goes down, the entire network is down.
    • 37. Hybrid Topology
      • Groups of star-configured workstations that are connected to a liner bus cable, combining characteristics of bus and star topologies.
        • Often
    • 38. Wireless Topology
      • Computers are connected by to a wireless access point (which is directly connected to a wired LAN)
        • Must be within a certain number of feet from the access point to communicate wirelessly ( depending on the technology being used)
    • 39. Network Transmission Media
      • Refers to the various types of media used to
        • Wire media (guided)
          • Transmission material manufactured so that signals will be and will behave .
          • Three most commonly used types include:
            • Twisted-pair wiring
            • Coaxial cable
            • Fiber optic (or optical fiber)
        • Wireless media (unguided)
    • 40. Network Communications Media
    • 41. Network Communications Media Twisted Pair Wire
      • C cable - a better-constructed version of the phone twisted-pair cable.
    • 42. Network Communications Media
      • Wireless communications (radio waves, microwaves, infrared) media radiate information into the air, either very narrowly beamed or in many directions like ripples from a pebble tossed into a pond.
      Coaxial Cable Fiber-Optic Cable
    • 43. Business Networks
      • You can build your own wired network or you can from a national provider.
      • Virtual private network (VPN) - a way to use the telecommunication infrastructure (e.g., ) to provide secure access to an organization’s network
        • T software is used to create a connection between two different servers ( ).
        • Data packets are
    • 44. Telecommunications Methods
      • Data are generally expressed in thousands or millions of bits per second (kbps/mbps)
      • Phone Lines: use a : but very . Handles only analog signals. 28.8-56 kbps
      • D ( ): regular divided into voice (analog) and information (digital channels). Always-on connection. Can make phone calls while online.
      • C : Operates over Provides a constant connection to the Internet, although its speed depends on how many users (such as your neighbors) are online.
    • 45. Researchers explore scrapping and rebuilding the Internet
      • In order to address the problems that were not envisioned when the Internet was initially created, some are suggesting rebuilding the Internet using a approach.
      • S
        • The Internet was designed to be open and flexible and all users were assumed to be trustworthy. Internet protocols were not designed to authenticate users and their data. Firewalls and spam filters are now being used to control security.
        • Solution: data not passed along until
    • 46.
      • Mobility
        • Initially, computers were fixed in location so IP addresses were assigned to devices in a fixed location. Wireless mobile computing is presenting challenges related to data flow.
        • Solution: R so that addresses are based on the device, rather than the location.
      • Ubiquity (called in our class notes)
        • When the Internet was first designed, there were relatively few computers connected to it. The addressing system has become strained due to the proliferation of personal computers and mobile devices.
        • Solution: assign and have those same devices connected to an addressed gateway, which is then connected to routers and the rest of the Internet
          • Result is fewer devices to keep track of and improved efficiency.
      • These changes may happen over the next 10-15 years. They (expected to cost as computer hardware and software and Internet infrastructure are replaced)
    • 47. The End The slides that follow this slide contain additional details related to the material found in some of your earlier slides. It is HIGHLY RECOMMENDED THAT YOU STUDY THESE ADDITIONAL SLIDES because they reinforce other concepts that you have already seen (and that you might see on an upcoming exam)
    • 48. Network Communications
      • Network Card --Allows a PC to communicate with the network.
      • Digital Signal --Discrete signal, series of ons and offs. Computer thinks in terms of zeros (off)and ones (on). Very abrupt.
      • Analog Signal --Continuous wave-like communication. Readings can fall within a range: temperature, humidity, air pressure, radio signals, phone signals, TV signals, electricity.
    • 49.
      • Don’t we have a problem??
      • Humans and their devices think in terms of analog: continuous waves.
      • Computers think in terms of digital signals: abrupt stops and starts.
      • MODEM: Modulator/Demodulator
        • converts the digital signals of your computer into an analog form that can be transmitted over a telephone line and then converts the analog signal back to digital signals at the other end of the transmission.
    • 50. Modems
    • 51. Telecommunications Methods
    • 52. Network Communications Media
      • Twisted Pair Wire
      • Coaxial Cable
      • Fiber Optical Cable (Optical Fiber)
      • Infrared
      • Microwave
      • Cellular transmissions
    • 53. Twisted Pair Wire
      • Two or more strands of copper wire twisted together, covered by insulation.
      • Used for direct connections over short distances in LANs
      • Type of Signal Carries an electrical signal
      • Other Characteristics Cheap, but slow. Not used very frequently anymore. Does not protect well against electrical interference
      • Other Uses Telephone lines inside your home
    • 54. Coaxial Cable
      • Used for direct connections over short distances in LANs but over a slightly larger distance than twisted pair.
      • Type of Signal Carries an electrical signal
      • Other Characteristics Better signal quality and more capabilities than twisted pair. More reliable.
      • Other Uses Cable TV
    • 55. Optical Fiber / Fiber Optics
      • Used for longer distance connections in WANs that will carry large amounts of data.
      • Type of Signal Glass fibers transmit information as pulses of light.
      • Other Characteristics Faster and more expensive than TP or Coax.
      • Other Uses High speed, cross country telephone lines. Also being installed in cities as an infrastructure for a wide variety of communications uses.
    • 56.
      • Fiber-optic Cable
        • Many extremely thin strands of glass or plastic bound together in a sheathing which transmits signals with light beams. Can be used for voice, data, and video.
      Fiber-Optic Cable
    • 57. Infrared
      • Used for Wireless, short range LAN connections
      • Type of Signal Infrared beam of light. Requires line of sight communication. Uses a red light that you can’t see to transmit info.
      • Other Characteristics Advantage is lack of wires connecting devices, portability.
      • Other Uses many types of remote controls, wireless keyboards and mice.
    • 58. Microwave
      • Used for long range WAN connections.
      • Other Characteristics Require line-of-sight connection. Signal can be boosted through the use of repeater devices located between transmitter and receiver.
      • Other Uses: Used by satellites, cable companies, cellular phones, broadcast radio.
    • 59. The Internet
      • First developed by the US Department of Defense in 1969. Over time, international connections were made, and the Internet really took off during the early 1990s when the technology behind web pages was developed and corporate users were given access to it, and the Internet has evolved into its present form.
      • The Internet and the World Wide Web are not the same thing. There are many different resources and services on the Internet, and the World Wide Web is just one of the resources found on the Internet.
      • Initial Internet communications were text-only, but now Internet communications can also be in the form of audio, video, and graphics
      • Two types of computers on the Internet
        • Clients
        • Servers
          • Web Servers FTP Servers (used to upload and download files
          • Mail Servers Internet Relay Chat (IRC) Servers
    • 60. Connecting to the Internet
      • Dial up (dial in) using the telephone lines and a modem.
      • Constant Connections
        • Wired (LAN): Local Area Network : network card required
        • Cable modems and DSL (Digital Subscriber Line)
        • Wireless Network (wireless LAN)
          • PCs and laptop computers could access the Internet without relying on physical wiring. Wireless Access Point/Base Station Required
          • Use wireless phones to retrieve email, access the Internet, or a corporate database.
          • Many of the buildings on campus are in wireless zones.
    • 61. World Wide Web
      • Hypertext Markup Language (HTML)
        • Hypertext is used to connect or link documents together : hyperlinks.
      • Web browsers are the software capable of understanding HTML files and HTML coding.
        • Internet Explorer: approximately 89% market share
        • Safari: found on Macs: faster than IE, can read web pages aloud
        • The Netscape Family of Browsers
          • Netscape: dominant in web’s early days, before IE
          • Mozilla: 2% market share
          • FireFox: 7 % market share: more stable and secure than IE, can be found on computers running Windows, Linux or the Macintosh operating system .