SlideShare a Scribd company logo
1 of 66
Introduction
Dr. John Sum
Institute of Electronic Commerce
National Chung Hsing University
 Communications
 The message (data and information) is
communicated via the signal. The transmission
medium “carries” the signal.
Communications
 Telecommunications
 The electronic transmission of signals for
communications, including such means as:
 Telephone
 Radio
 Television
Telecommunication medium
Anything that carries an electronic signal and
interfaces between a sending device and a receiving
device.
Telecommunications
 Data communications
 A specialized subset of telecommunications that
refers to the electronic collection, processing, and
distribution of data -- typically between computer
system hardware devices.
Data Communications
Data Communications
 Computer Network
 The communications media, devices, and
software needed to connect two or more
computer systems and/or devices.
 Used to share hardware, programs, and
databases across the organization.
 Fosters teamwork, innovative ideas, and new
business strategies.
Computer Network
 Twisted Pair Wire Cable
 Insulated pairs of wires historically used in
telephone service and to connect computer
devices.
 Coaxial Cable
 Consists of an inner conductor wire
surrounded by insulation, called the dielectric.
The dielectric is surrounded by a conductive
shield, which is surrounded by a non-
conductive jacket. Coaxial cable has better
data transmission rate than twisted pair.
Types of Telecommunication Media
 Fiber-optic Cable
 Many extremely thin
strands of glass or
plastic bound
together in a
sheathing which
transmits signals
with light beams.
Can be used for
voice, data, and
video.
Types of Telecommunication Media
Microwave
Communications
Line-of-sight
devices which
must be placed in
relatively high
locations.
Microwave Usage
Information is
converted to a
microwave signal,
sent through the
air to a receiver,
and recovered.
Types of Telecommunication Media
Satellite
Transmission
Communications
satellites are relay
stations that
receive signals
from one earth
station and
rebroadcast them
to another.
Types of Telecommunication Media
Cellular Transmission
Signals from cells are transmitted to a receiver and integrated
into the regular network.
Types of Telecommunication Media
 Infrared Transmission
 Involves sending signals through the air via light
waves.
 Requires line-of-sight and short distances (a few
hundred yards)
 Used to connect various computing devices such as
handheld computers
Types of Telecommunication Media
Telecommunication Devices
Relay signals between computer systems and
transmission media.
Telecommunications System
Terminology
Telecommunication Devices
 Analog Signal
 E.G. Electricity current
 Digital Signal
 A signal represented by bits
 Modems
 Devices that translate data from digital to analog
and analog to digital
Modem
Modulates a digital signal into an analog signal for transmission via
analog medium, then demodulates the signal into digital for receiving.
Device: Modem
Figure 6.11
Multiplexer
Allows several telecommunications signals to be transmitted
over a single communications medium at the same time.
Device: Multiplexer
ISDN
Technology that uses
existing common-
carrier lines to
simultaneously
transmit voice, video,
and image data in
digital form.
Media: Integrated Services Digital Network
(ISDN)
Distributed Processing
 Centralized Processing
 Data processing that occurs in a single location or
facility.
 Distributed Processing
 Data processing that occurs when computers are
placed at remote locations but are connected to
each other via telecommunications devices.
 The computers are connected as a computer
network.
 By Topology
 A model that describes how computers are
connected
 A logical model that describes how networks are
structured or configured
24
Network Types
Network Types
 Structured
 Ring
 Bus
 Star
 Hierarchical
 Hybrid
 Unstructured
 Mobile Adhoc Network (MANET)
Ring
Hierarchical
Star
Bus
25
Network Topologies
Network Topologies
 For local area networks, not for the Internet
 Ring
 A typology that contains computers and computer
devices placed in a ring.
 Bus
 Computers and computer devices are on a single
line. Each device can communicate directly to all
devices on the bus.
 Star
 All computers are connected via a central hub.
Network Topologies
 Hierarchical
 Uses treelike structures with messages passed
along the branches of the hierarchy
 Hybrid
 A mix of different kinds of structured topologies. It
is what exactly the Internet looks like.
 Mobile Adhoc Network
 It is unstructured network topology
 Structure is changing dynamically. EG. Network of
mobile phone.
Network Topologies
 Mobile Adhoc Network
 Network does not have
specify topology
 Each computer in the
network is moving
around without locating in
a fixed location
 Sending and receiving
messages are difficulty
problems
27
Network Types by Size
 Local Area Network (LAN)
 Connects computer systems and devices in the
same geographic area (can be Ring, Bus,
Hierarchical, Star, Hybrid)
 Wide Area Network (WAN)
 Ties together large geographic regions using
microwave and satellite transmission or telephone
lines.
 International Network
 Links systems between countries.
A Typical
LAN in a
BUS
Topology
A Wide Area Network
LAN & WAN
 Applications and databases reside on specialized
host computers.
 Servers do most or all of the processing and
transmit the results to the client.
31
Client/Server Connection
 Advantages
 Reduced cost potential
 Improved Performance
 Increased Security
 Disadvantages
 Increased cost potential
 Loss of control
 Complex multi-vendor
environment
32
Advantages & Disadvantages of
Client/Server
33
Communications Software
 Communications Software
 Provides error checking, message formatting,
communications logs, data security and privacy, and
translation capabilities for networks.
 Network Operating System (NOS)
 Systems software that controls the computer systems and
devices on a network and allows them to communicate with
each other.
 Network Management Software
 Enables a manager on a networked desktop to monitor the
use of individual computers and shared hardware, scan for
viruses, and ensure compliance with software licenses.
 Protocol
 Rules that ensure communications among
computers of different types and from different
manufacturers.
 Rules that determine the form of signal being
transmitted, encoded, error detection and
correction, etc.
34
Protocols
35
Protocols
 OSI 7-Layers Model
 Serves as a standard model for network
architectures and is endorsed by the International
Standards Committee. Communication functions
are represented in seven layers to promote the
development of modular networks. Designed to
permit communication among different computers
from different operating systems.
36
 Transmission Control Protocol/Internet Protocol
(TCP/IP)
 Standard originally developed by the U.S. government to
link defense research agencies; it is the primary
communication protocol of the Internet.
 Systems Network Architecture (SNA)
 IBM communication protocol for LAN.
 Ethernet
 Protocol standard developed for LANs using a bus
topology.
 X.400 and X.500
 An international standard for message handling and
network directories.
Protocols
Protocol (Idea)
Protocol (Idea)
Host
HostHost
Channel
Application
Host
Application
Host
Protocol (Idea)
Application programs
Process-to-process channels
Host-to-host connectivity
Hardware
Protocol (Idea)
 When and how to start a channel?
 When and how to close a channel?
 How to protect the channel against invasion?
 How to handle multiple applications?
Hardw are
Host-to-host connectivity
Request/reply
channel
Message stream
channel
Application programs
Protocol (Idea)
Host 1 Host 2
Serv ice
interf ace
Peer-to-peer
interf ace
High-lev el
object
High-lev el
object
Protocol Protocol
Protocol (Idea)
Host 1 Host 2
File
application
Digital
library
application
Video
application
File
application
Digital
library
application
Video
application
Protocol (Idea)
Host Host
Application
program
Application
program
RRP
Data Data
HHP
RRP
HHP
Application
program
Application
program
RRP Data RRP Data
HHP RRP Data
Protocol (OSI 7 Layers Model)
One or more nodes
within the network
End host
Application
Presentation
Session
Transport
Network
Data link
Phy sical
Network
Data link
Phy sical
Network
Data link
Phy sical
End host
Application
Presentation
Session
Transport
Network
Data link
Phy sical
Protocol (TCP/IP)
■ ■ ■
FTP
TCP UDP
IP
NET 1
NET 2
NET n
HTTP NV TFTP
Protocol (TCP/IP)
TCP UDP
IP
Netw ork
Application
 Linking Personal Computers to Mainframe Computers
 Download and upload information.
 Voice Mail
 Enables users to leave, receive, and store verbal
messages for and from other users.
 Electronic Mail (e-mail)
 Enables a sender to connect a computer to a network,
type messages, and send it to another person on the
network.
39
Applications
40
Applications
 Electronic Software Distribution
 Involves installing software on a file server for
users to share by signing onto the network and
requesting that the software be downloaded onto
their computers over a network.
 Electronic Document Distribution
 Transporting documents -- such as sales reports,
policy manuals, and advertising brochures -- over
communications lines and networks.
41
Telecommunications Applications
Videoconferencing
42
Telecommunications Applications EDI
 Public Network Services
 Services that give personal computer users access to vast
databases and other services, usually for an initial fee plus
usage fees.
 Specialized and Regional Information Services
 Specialized electronic bulletin boards and e-mail services
targeting particular interests.
 Distance Learning
 Use of telecommunications to extend the classroom.
43
Telecommunications Applications
The Internet
The Internet
transmits data from
one computer
(called a host) to
another.
Internet Networks
Linked networks that
work much the same
way -- they pass data
around in packets, each
of which carries the
addresses of its sender
and receiver.
The Internet
The Internet
How the Internet Works
 Protocol
 A protocol that operates at the transport layer and is used in
combination with IP by most Internet applications
 It ensures that computers in Internet can understand the
message sending among each others.
 Backbone
 One of the Internet’s high-speed, long distance communications
links.
 IP Address/Port
 IP address is the unique identification on a computer that is
connecting to the Internet.
 Ports are the input/output locations of a computer where
messages should send in or out.
 If an IP address is analogy to a country, then the Port addresses
will be analogy to the ports of that country.
Access to the Internet
 LAN Servers
 Local servers can provide access to the Internet
through normal connections (e.g. Ethernet)
 Connection via an On-Line Service
 Communications protocol (SLIP/PPP) software
that transmits packets over telephone lines,
allowing dial-up access to the Internet. (Modem
access)
 Examples are American Online (AOL) and
Microsoft Network. These services usually require
sign-up procedures. (Leased line)
Ways to Access the Internet
Internet Services
Selected Usenet Groups
Voice-Over-IP (VOIP)
Technology that enables
network managers to route
phone calls and fax
transmissions over the same
network they use for data.
VOIP Service
Internet Entertainment
 Content Streaming
 A method for transferring multimedia files over the
Internet so that the data stream of voice and
pictures plays continuously, without a break, or
very few of them. It also enables users to browse
large files in real time.
 IPTV
Internet Entertainment
 World Wide Web
 A collection of tens of thousands of independently-owned
computers that work together as one in an Internet service.
 Web Browser
 Software that creates a unique hypermedia-based menu on
your computer screen and provides a graphical interface to
the Web.
 Web Page
 A screen of information sent to a requesting user and
presented through a browser.
 Search Engines
 A search tool for the Web (like card catalogs in libraries).
Information Browsing
World Wide Web
Virtual Private Network (VPN)
A secure connection between two points across the Internet.
Tunneling
The process by which VPNs transfer information by encapsulating
traffic in IP packets and sending the packets over the Internet.
24
Virtual Private Network (VPN)
Trends Driving Data Communication
 Traffic growth
 Increasing number of Internet users
 Voice & data; local and long distance
 Development of new services
 Examples: VoIP, IPTV, Online Games
 In turn drives increased traffic
 Advances in technology
 Examples: Fiber optics vs copper cable, 2G vs 3G, wired
vs wireless
 Encourage and support increased growth and development
Key Technology Trends
 Faster and cheaper computing and
communications
 Increasingly “intelligent” networks
 Growing importance of Internet, intranet and
extranet applications
 Increasing use of and dependence on mobile
technologies, e.g. personal networks
Applications Driving Enterprise Networks
Model of Enterprise Communications
 4-layer model of enterprise communications
 Applications
 Services
 Management
 Infrastructure
 Applications generated by business needs
Types of Business Information
 Text
 ASCII, Extended ASCII, Unicode, ISO
 Numbers
 Images
 Video
 Voice
Effectiveness of data communication
systems
 Performance
 if the systems can deliver data in a timely manner based on
the types of data
 Reliability
 if the systems can provide non-stop services, measured by
the frequency of failure or recovery time of a network after
failure
 Security
 if the systems can protect the transmitted data from illegal
access and/or modification

More Related Content

What's hot

Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)Ankur Kumar
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyAli Habeeb
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIRamesh Babu
 
Local area network
Local area networkLocal area network
Local area networkSEDYK
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)Ramakrishna kapa
 
Network architecture
Network architectureNetwork architecture
Network architecturecsk selva
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data CommunicationKamal Acharya
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architectureOrbay Yeşil
 
Computer networking
Computer networkingComputer networking
Computer networkingaslamslides
 

What's hot (20)

OSI Model
OSI ModelOSI Model
OSI Model
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Wlan security
Wlan securityWlan security
Wlan security
 
Mobile Computing (Part-1)
Mobile Computing (Part-1)Mobile Computing (Part-1)
Mobile Computing (Part-1)
 
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A surveyData-Centric Routing Protocols in Wireless Sensor Network: A survey
Data-Centric Routing Protocols in Wireless Sensor Network: A survey
 
OSI model
OSI modelOSI model
OSI model
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Mobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO IIIMobile Computing UNIT-I TO III
Mobile Computing UNIT-I TO III
 
Local area network
Local area networkLocal area network
Local area network
 
Circuit Switching
Circuit SwitchingCircuit Switching
Circuit Switching
 
Wide Area Networking
Wide Area NetworkingWide Area Networking
Wide Area Networking
 
OSI models
OSI modelsOSI models
OSI models
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Wimax ppt
Wimax pptWimax ppt
Wimax ppt
 
Dcn(data communication and computer network)
Dcn(data communication and computer network)Dcn(data communication and computer network)
Dcn(data communication and computer network)
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Introduction to Data Communication
Introduction to Data CommunicationIntroduction to Data Communication
Introduction to Data Communication
 
02 protocol architecture
02 protocol architecture02 protocol architecture
02 protocol architecture
 
Mobile and wireless computing
Mobile and wireless computingMobile and wireless computing
Mobile and wireless computing
 
Computer networking
Computer networkingComputer networking
Computer networking
 

Similar to Dcn introduction

LESSON-02-Communications and Computer Networking.pptx
LESSON-02-Communications and Computer Networking.pptxLESSON-02-Communications and Computer Networking.pptx
LESSON-02-Communications and Computer Networking.pptxNabeelBashir10
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingPriya Manik
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxmmmm11111
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answersmkengkilili2011
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1arjun0222
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteomkhedekxr
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer networkAten Kecik
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnologyGulrez Khan
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPTssuser2cc0d4
 
Computer_Network
Computer_NetworkComputer_Network
Computer_NetworkRavi Jiyani
 

Similar to Dcn introduction (20)

LESSON-02-Communications and Computer Networking.pptx
LESSON-02-Communications and Computer Networking.pptxLESSON-02-Communications and Computer Networking.pptx
LESSON-02-Communications and Computer Networking.pptx
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
Beekman5 std ppt_09
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
 
Computer network & communication answer
Computer network & communication answerComputer network & communication answer
Computer network & communication answer
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Computer Networks1
Computer Networks1Computer Networks1
Computer Networks1
 
Fg c
Fg cFg c
Fg c
 
Network and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse siteNetwork and network types6.pdf got from cbse site
Network and network types6.pdf got from cbse site
 
IARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdfIARE_CN_PPT_0 (1).pdf
IARE_CN_PPT_0 (1).pdf
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Bab3-computer network
Bab3-computer networkBab3-computer network
Bab3-computer network
 
Class_notes_InternetTechnology
Class_notes_InternetTechnologyClass_notes_InternetTechnology
Class_notes_InternetTechnology
 
MS-CIT Unit 8.pptx
MS-CIT Unit 8.pptxMS-CIT Unit 8.pptx
MS-CIT Unit 8.pptx
 
Telecommunications.PPT
Telecommunications.PPTTelecommunications.PPT
Telecommunications.PPT
 
Tg04
Tg04Tg04
Tg04
 
Tg04
Tg04Tg04
Tg04
 
Computer_Network
Computer_NetworkComputer_Network
Computer_Network
 

More from Sopon Tumchota

pfSense OpenVPN Configuration
pfSense OpenVPN ConfigurationpfSense OpenVPN Configuration
pfSense OpenVPN ConfigurationSopon Tumchota
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
Utc webinar nerc-cip-2015-09-30
Utc webinar nerc-cip-2015-09-30Utc webinar nerc-cip-2015-09-30
Utc webinar nerc-cip-2015-09-30Sopon Tumchota
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guideSopon Tumchota
 
pfSense Installation Slide
pfSense Installation SlidepfSense Installation Slide
pfSense Installation SlideSopon Tumchota
 
Samsung cctv presentation
Samsung cctv presentationSamsung cctv presentation
Samsung cctv presentationSopon Tumchota
 
Wireless technology training
Wireless technology trainingWireless technology training
Wireless technology trainingSopon Tumchota
 
Network training present
Network training presentNetwork training present
Network training presentSopon Tumchota
 

More from Sopon Tumchota (9)

pfSense OpenVPN Configuration
pfSense OpenVPN ConfigurationpfSense OpenVPN Configuration
pfSense OpenVPN Configuration
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Utc webinar nerc-cip-2015-09-30
Utc webinar nerc-cip-2015-09-30Utc webinar nerc-cip-2015-09-30
Utc webinar nerc-cip-2015-09-30
 
pfSense firewall workshop guide
pfSense firewall workshop guidepfSense firewall workshop guide
pfSense firewall workshop guide
 
pfSense Installation Slide
pfSense Installation SlidepfSense Installation Slide
pfSense Installation Slide
 
Samsung cctv presentation
Samsung cctv presentationSamsung cctv presentation
Samsung cctv presentation
 
Wireless technology training
Wireless technology trainingWireless technology training
Wireless technology training
 
Network training present
Network training presentNetwork training present
Network training present
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Dcn introduction

  • 1. Introduction Dr. John Sum Institute of Electronic Commerce National Chung Hsing University
  • 2.  Communications  The message (data and information) is communicated via the signal. The transmission medium “carries” the signal. Communications
  • 3.  Telecommunications  The electronic transmission of signals for communications, including such means as:  Telephone  Radio  Television Telecommunication medium Anything that carries an electronic signal and interfaces between a sending device and a receiving device. Telecommunications
  • 4.  Data communications  A specialized subset of telecommunications that refers to the electronic collection, processing, and distribution of data -- typically between computer system hardware devices. Data Communications
  • 6.  Computer Network  The communications media, devices, and software needed to connect two or more computer systems and/or devices.  Used to share hardware, programs, and databases across the organization.  Fosters teamwork, innovative ideas, and new business strategies. Computer Network
  • 7.  Twisted Pair Wire Cable  Insulated pairs of wires historically used in telephone service and to connect computer devices.  Coaxial Cable  Consists of an inner conductor wire surrounded by insulation, called the dielectric. The dielectric is surrounded by a conductive shield, which is surrounded by a non- conductive jacket. Coaxial cable has better data transmission rate than twisted pair. Types of Telecommunication Media
  • 8.  Fiber-optic Cable  Many extremely thin strands of glass or plastic bound together in a sheathing which transmits signals with light beams. Can be used for voice, data, and video. Types of Telecommunication Media
  • 9. Microwave Communications Line-of-sight devices which must be placed in relatively high locations. Microwave Usage Information is converted to a microwave signal, sent through the air to a receiver, and recovered. Types of Telecommunication Media
  • 10. Satellite Transmission Communications satellites are relay stations that receive signals from one earth station and rebroadcast them to another. Types of Telecommunication Media
  • 11. Cellular Transmission Signals from cells are transmitted to a receiver and integrated into the regular network. Types of Telecommunication Media
  • 12.  Infrared Transmission  Involves sending signals through the air via light waves.  Requires line-of-sight and short distances (a few hundred yards)  Used to connect various computing devices such as handheld computers Types of Telecommunication Media
  • 13. Telecommunication Devices Relay signals between computer systems and transmission media. Telecommunications System
  • 14. Terminology Telecommunication Devices  Analog Signal  E.G. Electricity current  Digital Signal  A signal represented by bits  Modems  Devices that translate data from digital to analog and analog to digital
  • 15. Modem Modulates a digital signal into an analog signal for transmission via analog medium, then demodulates the signal into digital for receiving. Device: Modem
  • 16. Figure 6.11 Multiplexer Allows several telecommunications signals to be transmitted over a single communications medium at the same time. Device: Multiplexer
  • 17. ISDN Technology that uses existing common- carrier lines to simultaneously transmit voice, video, and image data in digital form. Media: Integrated Services Digital Network (ISDN)
  • 18. Distributed Processing  Centralized Processing  Data processing that occurs in a single location or facility.  Distributed Processing  Data processing that occurs when computers are placed at remote locations but are connected to each other via telecommunications devices.  The computers are connected as a computer network.
  • 19.  By Topology  A model that describes how computers are connected  A logical model that describes how networks are structured or configured 24 Network Types
  • 20. Network Types  Structured  Ring  Bus  Star  Hierarchical  Hybrid  Unstructured  Mobile Adhoc Network (MANET)
  • 22. Network Topologies  For local area networks, not for the Internet  Ring  A typology that contains computers and computer devices placed in a ring.  Bus  Computers and computer devices are on a single line. Each device can communicate directly to all devices on the bus.  Star  All computers are connected via a central hub.
  • 23. Network Topologies  Hierarchical  Uses treelike structures with messages passed along the branches of the hierarchy  Hybrid  A mix of different kinds of structured topologies. It is what exactly the Internet looks like.  Mobile Adhoc Network  It is unstructured network topology  Structure is changing dynamically. EG. Network of mobile phone.
  • 24. Network Topologies  Mobile Adhoc Network  Network does not have specify topology  Each computer in the network is moving around without locating in a fixed location  Sending and receiving messages are difficulty problems
  • 25. 27 Network Types by Size  Local Area Network (LAN)  Connects computer systems and devices in the same geographic area (can be Ring, Bus, Hierarchical, Star, Hybrid)  Wide Area Network (WAN)  Ties together large geographic regions using microwave and satellite transmission or telephone lines.  International Network  Links systems between countries.
  • 26. A Typical LAN in a BUS Topology A Wide Area Network LAN & WAN
  • 27.  Applications and databases reside on specialized host computers.  Servers do most or all of the processing and transmit the results to the client. 31 Client/Server Connection
  • 28.  Advantages  Reduced cost potential  Improved Performance  Increased Security  Disadvantages  Increased cost potential  Loss of control  Complex multi-vendor environment 32 Advantages & Disadvantages of Client/Server
  • 29. 33 Communications Software  Communications Software  Provides error checking, message formatting, communications logs, data security and privacy, and translation capabilities for networks.  Network Operating System (NOS)  Systems software that controls the computer systems and devices on a network and allows them to communicate with each other.  Network Management Software  Enables a manager on a networked desktop to monitor the use of individual computers and shared hardware, scan for viruses, and ensure compliance with software licenses.
  • 30.  Protocol  Rules that ensure communications among computers of different types and from different manufacturers.  Rules that determine the form of signal being transmitted, encoded, error detection and correction, etc. 34 Protocols
  • 31. 35 Protocols  OSI 7-Layers Model  Serves as a standard model for network architectures and is endorsed by the International Standards Committee. Communication functions are represented in seven layers to promote the development of modular networks. Designed to permit communication among different computers from different operating systems.
  • 32. 36  Transmission Control Protocol/Internet Protocol (TCP/IP)  Standard originally developed by the U.S. government to link defense research agencies; it is the primary communication protocol of the Internet.  Systems Network Architecture (SNA)  IBM communication protocol for LAN.  Ethernet  Protocol standard developed for LANs using a bus topology.  X.400 and X.500  An international standard for message handling and network directories. Protocols
  • 35. Protocol (Idea) Application programs Process-to-process channels Host-to-host connectivity Hardware
  • 36. Protocol (Idea)  When and how to start a channel?  When and how to close a channel?  How to protect the channel against invasion?  How to handle multiple applications? Hardw are Host-to-host connectivity Request/reply channel Message stream channel Application programs
  • 37. Protocol (Idea) Host 1 Host 2 Serv ice interf ace Peer-to-peer interf ace High-lev el object High-lev el object Protocol Protocol
  • 38. Protocol (Idea) Host 1 Host 2 File application Digital library application Video application File application Digital library application Video application
  • 39. Protocol (Idea) Host Host Application program Application program RRP Data Data HHP RRP HHP Application program Application program RRP Data RRP Data HHP RRP Data
  • 40. Protocol (OSI 7 Layers Model) One or more nodes within the network End host Application Presentation Session Transport Network Data link Phy sical Network Data link Phy sical Network Data link Phy sical End host Application Presentation Session Transport Network Data link Phy sical
  • 41. Protocol (TCP/IP) ■ ■ ■ FTP TCP UDP IP NET 1 NET 2 NET n HTTP NV TFTP
  • 43.  Linking Personal Computers to Mainframe Computers  Download and upload information.  Voice Mail  Enables users to leave, receive, and store verbal messages for and from other users.  Electronic Mail (e-mail)  Enables a sender to connect a computer to a network, type messages, and send it to another person on the network. 39 Applications
  • 44. 40 Applications  Electronic Software Distribution  Involves installing software on a file server for users to share by signing onto the network and requesting that the software be downloaded onto their computers over a network.  Electronic Document Distribution  Transporting documents -- such as sales reports, policy manuals, and advertising brochures -- over communications lines and networks.
  • 47.  Public Network Services  Services that give personal computer users access to vast databases and other services, usually for an initial fee plus usage fees.  Specialized and Regional Information Services  Specialized electronic bulletin boards and e-mail services targeting particular interests.  Distance Learning  Use of telecommunications to extend the classroom. 43 Telecommunications Applications
  • 48. The Internet The Internet transmits data from one computer (called a host) to another. Internet Networks Linked networks that work much the same way -- they pass data around in packets, each of which carries the addresses of its sender and receiver. The Internet
  • 50. How the Internet Works  Protocol  A protocol that operates at the transport layer and is used in combination with IP by most Internet applications  It ensures that computers in Internet can understand the message sending among each others.  Backbone  One of the Internet’s high-speed, long distance communications links.  IP Address/Port  IP address is the unique identification on a computer that is connecting to the Internet.  Ports are the input/output locations of a computer where messages should send in or out.  If an IP address is analogy to a country, then the Port addresses will be analogy to the ports of that country.
  • 51. Access to the Internet  LAN Servers  Local servers can provide access to the Internet through normal connections (e.g. Ethernet)  Connection via an On-Line Service  Communications protocol (SLIP/PPP) software that transmits packets over telephone lines, allowing dial-up access to the Internet. (Modem access)  Examples are American Online (AOL) and Microsoft Network. These services usually require sign-up procedures. (Leased line)
  • 52. Ways to Access the Internet
  • 55. Voice-Over-IP (VOIP) Technology that enables network managers to route phone calls and fax transmissions over the same network they use for data. VOIP Service
  • 56. Internet Entertainment  Content Streaming  A method for transferring multimedia files over the Internet so that the data stream of voice and pictures plays continuously, without a break, or very few of them. It also enables users to browse large files in real time.  IPTV
  • 58.  World Wide Web  A collection of tens of thousands of independently-owned computers that work together as one in an Internet service.  Web Browser  Software that creates a unique hypermedia-based menu on your computer screen and provides a graphical interface to the Web.  Web Page  A screen of information sent to a requesting user and presented through a browser.  Search Engines  A search tool for the Web (like card catalogs in libraries). Information Browsing
  • 60. Virtual Private Network (VPN) A secure connection between two points across the Internet. Tunneling The process by which VPNs transfer information by encapsulating traffic in IP packets and sending the packets over the Internet. 24 Virtual Private Network (VPN)
  • 61. Trends Driving Data Communication  Traffic growth  Increasing number of Internet users  Voice & data; local and long distance  Development of new services  Examples: VoIP, IPTV, Online Games  In turn drives increased traffic  Advances in technology  Examples: Fiber optics vs copper cable, 2G vs 3G, wired vs wireless  Encourage and support increased growth and development
  • 62. Key Technology Trends  Faster and cheaper computing and communications  Increasingly “intelligent” networks  Growing importance of Internet, intranet and extranet applications  Increasing use of and dependence on mobile technologies, e.g. personal networks
  • 64. Model of Enterprise Communications  4-layer model of enterprise communications  Applications  Services  Management  Infrastructure  Applications generated by business needs
  • 65. Types of Business Information  Text  ASCII, Extended ASCII, Unicode, ISO  Numbers  Images  Video  Voice
  • 66. Effectiveness of data communication systems  Performance  if the systems can deliver data in a timely manner based on the types of data  Reliability  if the systems can provide non-stop services, measured by the frequency of failure or recovery time of a network after failure  Security  if the systems can protect the transmitted data from illegal access and/or modification