1 / 38

David Kroenke

Using MIS 2e Chapter 6 Data Communications. David Kroenke. 09/30 – 4:00AM. Study Questions. Q1 – What is a computer network? Q2 – What are the components of a LAN? Q3 – What are the alternatives for a WAN? Q4 – What criteria can you use for comparing WANs? Q5 – How does encryption work?

silvio
Télécharger la présentation

David Kroenke

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Using MIS 2e Chapter 6 Data Communications David Kroenke 09/30 – 4:00AM © Pearson Prentice Hall 2009

  2. Study Questions • Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  3. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  4. Q1 – What is a computer network? • The chart below describes three major types of networks. Networks are collections of computers that communicate with each other over a variety of transmission lines using a specified set of protocols. (The Internet is discussed in Appendix 6A) Fig 6-1 Major Network Types © Pearson Prentice Hall 2009

  5. Q1 – What is a computer network? • Here are some additional characteristics of networks: • LAN communication lines reside on-premises, making it easier for a business to locate a network wherever it chooses. • WAN communication lines are owned by a third-party vendor which is regulated by the government. A business contracts with the vendor to use the WAN lines. • Each type of network uses protocols which are sets of rules that two devices use to communicate with each other. © Pearson Prentice Hall 2009

  6. Q1 – What is a computer network? • Internets and “the Internet” • An internet is a network of networks. Internets connect LANs, Wans, and other internets. The most famous internet is “the Internet.” Private networks of networks are called intranets. • We use layered protocols to structure the flow of data across networks and internets. For any two devices to communicate across networks, they must use the same protocol. • Different computers using different software on different networks can communicate with each other if they use the same protocol in structuring the data they send to each other. This works because data communications is just a stream of formatted bits. © Pearson Prentice Hall 2009

  7. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  8. Q2 – What are the components of a LAN? • This figure depicts a typical LAN. The components are usually located within a half mile of each other on a single company site. • A switch, located in the center, is a special-purpose computer that receives and transmits messages to computers in the LAN. • A network interface card (NIC) is a hardware component that connects each device’s circuitry to a cable allowing computers to send data across the LAN. • Most new computers now include an onboard NIC that’s built into the computer’s circuitry. Fig 6-2 Local Area Network (LAN) © Pearson Prentice Hall 2009

  9. Q2 – What are the components of a LAN? • A media access control (MAC) address serves as a unique identifier for each NIC on a LAN. • Unshielded twisted pair (UTP) cables, shown on the left, connect most end-user devices to a LAN. The wires are twisted to reduce cross-wire signal interference. • Optical fiber cables, shown on the right, may be used to connect switches and routers within a LAN. The glass wires transmit signals in the form of light rays. Cladding surrounds the core and contains the signals. Optical fiber carries more traffic than UTP cables. Fig 6-3 Unshielded Twisted Pair (UTP) Cable Fig 6-5 Optical Fiber Cable © Pearson Prentice Hall 2009

  10. Q2 – What are the components of a LAN? • This figure shows how a typical LAN might be arranged in a multistory building. Notice the combination of switches, UTP cable, and optical fiber cable on each floor. Fig 6-4 Typical Arrangement of Switches in a Multistory Building © Pearson Prentice Hall 2009

  11. Q2 – What are the components of a LAN? • The IEEE, Institute for Electrical & Electronics Engineers, is a committee that creates and publishes protocols and standards used by virtually every network. • The IEEE 802.3, or Ethernet, protocol is used by all LAN devices. It specifies hardware characteristics and describes how messages are packaged and processed. • Onboard NICs in new PCs support the 10/100/1000 Ethernetprotocol which describes transmission rate speed. Switches detect the speed a device can handle and communicate at that speed. • Communication speeds are expressed in bits (not bytes): 1,000 = 1Kbs, 1,000,000 = 1Mbps, 1,000,000,000 = 1Gbps. © Pearson Prentice Hall 2009

  12. Q2 – What are the components of a LAN? • The IEEE 802.11 wireless protocol uses wireless NICs (WNIC) to connect devices to networks similar to how wired NICs operate. The most popular is IEEE 802.11g for speeds up to 54Mbps. • This figure depicts a combination of NICs and WNICs on a LAN. • It also shows access points (AP) that use the 802.3 protocol to communicate with a switch and the 802.11 protocol to send and receive wireless traffic. © Pearson Prentice Hall 2009

  13. Q2 – What are the components of a LAN? • The chart on this slide and the next one is a summary of LAN and WAN networks. Fig 6-7 Summary of LAN and WAN Networks, Part 1 © Pearson Prentice Hall 2009

  14. Q2 – What are the components of a LAN? Fig 6-7 Summary of LAN and WAN Networks Part 2 © Pearson Prentice Hall 2009

  15. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  16. Q3 – What are the alternatives for a WAN? • WANs, using the Internet, connect computers located at physically separated sites by obtaining connection capabilities from a third-party, typically an Internet Service Provider (ISP). • You can connect to ISPs using either a dial-up modem, a DSL modem, or a cable modem. • The three primary functions of an ISP are: • To provide users with a legitimate Internet address • To serve as a gateway for users to connect to the Internet • To help pay for the Internet by collecting money from customers and using it to pay access fees and other charges. © Pearson Prentice Hall 2009

  17. Q3 – What are the alternatives for a WAN? • Connecting personal computers to an ISP requires that digital signals coming out of the computer are converted to analog signals. Analog signals coming into a personal computer must be converted to digital signals. The figure below compares the two kinds of signals. • Modem – modulate - demodulate Fig 6-8 Analog Versus Digital Signals © Pearson Prentice Hall 2009

  18. Q3 – What are the alternatives for a WAN? • Modems are used to convert the signals back and forth as shown in the figure below. modulate demodulate Fig 6-9 Personal Computer Internet Access © Pearson Prentice Hall 2009

  19. Q3 – What are the alternatives for a WAN? • A dial-up modem uses regular telephone lines and a Point-to-Point Protocol (PPP) to connect a personal computer to an ISP. Modulation is governed by one of three standards: V.34, V.90, and V.92. These standards specify how digital signals will be transformed into analog signals. The way in which messages are packaged and handled between your modem and the ISP is governed by PPP. • A DSL modem shares a single communication line for a telephone and a personal computer. It’s much faster than a dial-up modem and allows a user to maintain a constant network connection with an ISP. • Asymmetric DSL, ADSL, provides different upload/download speeds. • Symmetrical DSL, SDSL, provides the same upload/download speeds. © Pearson Prentice Hall 2009

  20. Q3 – What are the alternatives for a WAN? • A cable modem shares a single communication line for cable TV and a personal computer. It’s also faster than a dial-up modem and allows users to maintain a constant network connection. • Because cable modems use a neighborhood distribution center, transmission speeds vary based on the number of network users. • A dial-up modem is considered narrowband because it uses transmission speeds less than 56 kbps. • DSL and cable modems are considered broadband because their transmission speeds exceed 256 kbps. © Pearson Prentice Hall 2009

  21. Q3 – What are the alternatives for a WAN? • Companies can use networks of leased lines from telecommunications companies to connect computers at designated points located at geographically distributed sites as this figure shows. The firm must lease every line separately. • The lines use a variety of access devices to connect to each site: • Switches • Routers – special-purpose computers that move network traffic from one node to another. • Only predefined sites can use leased lines. “n” points requiren(n-1)/2 lines. • These lines provide low-cost connections for internal usersif the traffic warrants it. © Pearson Prentice Hall 2009

  22. Q3 – What are the alternatives for a WAN? • This chart compares line types, uses, and speeds. Fig 6-11 Transmission Line Types, Uses, & Speeds © Pearson Prentice Hall 2009

  23. Q3 – What are the alternatives for a WAN? • This figure depicts a public switched data network, PSDN, that is developed and maintained by a vendor who leases network time to other organizations without setup or maintenance costs. • Each user site must lease only one line on a PSDN. The line connection location is called a Point of Presence (POP). • PSDNs are less costly and don’t require as much management involvement as separately leased lines. • PSDNs use three protocols: • Frame relay with speeds from 56 kbps to 40 Mbps • Asynchronous transfer mode (ATM) with speeds from 1 to 156 Mbps. • Ethernet with speeds from 10 to 40 Gbps The cloud © Pearson Prentice Hall 2009

  24. Q3 – What are the alternatives for a WAN? • Virtual Private Networks (VPNs) create the appearance of private point-to-point connections by using encryption (tunnels) to create virtual, private pathways over the Internet. • VPNs offer the benefit of point-to-point leased lines and remote access by any registered user, not just designated users. • The figure below shows the actual connections a VPN uses. Fig 6-13 Remote Access Using VPN: Actual Connections © Pearson Prentice Hall 2009

  25. Q3 – What are the alternatives for a WAN? • A VPN appears to be a direct connection between two sites as shown in this figure. • Software encrypts data as they pass through the VPN making them more secure and then decodes them when the user receives a message. Fig 6-14 Remote Access Using VPN: Apparent Connection © Pearson Prentice Hall 2009

  26. Q3 – What are the alternatives for a WAN? • This figure shows how a WAN uses three different VPN tunnels to connect geographically separated users. Fig 6-15 WAN Using VPN © Pearson Prentice Hall 2009

  27. Q3 – What are the alternatives for a WAN? • The bottleneck on data communications into homes and small businesses is the “problem of the last mile.” • You have optical fiber lines to the distribution stations but you are connected to the distribution station (this connection is the “last mile” and is a bottleneck) with twisted-pair or coaxial cable. • You cannot avoid the “last mile” problem with cell phones because cell phones do not have broadband transmission. • You cannot avoid the “last mile” problem with wireless technology based on the IEEE 802.11 standard because it is limited to devices within a few hundred feet. • WiMax resolves the “problem of the last mile” by using the IEEE 802.16e protocol which provides fixed, nomadic, portable, and mobile wireless broadband connectivity to customer premises equipment (CPE), without the need for direct line-of-sight with a base station, for 3 to 10 kilometers at 40Mbps per channel. © Pearson Prentice Hall 2009

  28. Q3 – What are the alternatives for a WAN? • Customer premises equipment – on-board devices within end-user computers that can receive WiMax transmissions. • Nomadic use – allows a user to sign in at a stationary point site but to remain connected in transit. • Portable use – allows a user to walk to work while connected. • Simple mobility – supports connections while driving. • Full mobility – allows access on the freeway or fast train. © Pearson Prentice Hall 2009

  29. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  30. Q4 – What criteria can you use for comparing WANs? • The following figures provide criteria you can use to compare network alternatives based on three categories: cost, performance, and other criteria. Ask 1000 questions. Be the dumbest person there. Get 2nd opinions. Don’t decide alone. Fig 6-16 Criteria for Comparing Network Alternatives © Pearson Prentice Hall 2009

  31. Q4 – What criteria can you use for comparing WANs? Fig 6-16 Criteria for Comparing Network Alternatives © Pearson Prentice Hall 2009

  32. Q4 – What criteria can you use for comparing WANs? Fig 6-16 Criteria for Comparing Network Alternatives © Pearson Prentice Hall 2009

  33. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  34. Q5 – How does encryption work? • The process of transforming clear text into coded, unintelligible text for security reasons is called encryption. • It’s used to help make transmissions more secure across networks and between users and Web sites. Encryption is not perfect. It can be broken. But if you change keys frequently, you present overwhelming complications to hackers. • Encryption algorithms use a key (number) to encode data in messages before they’re sent and decode them when they reach their destination. • Symmetric encryption uses the same key to encode and decode a message. • Asymmetric encryption uses a different key to encode than is used to decode a message. • Symmetric encryption is simpler and faster than asymmetric encryption. © Pearson Prentice Hall 2009

  35. Q5 – How does encryption work? • Public key/private key is a special version of asymmetric encryption mainly used on the Internet. • The public keyencodes a message and is exchanged among users • The private key decodes a message but is never exchanged among users. • HTTPS is the most used security protocol on the www Internet. • Secure Socket Layer (SSL), also known as Transport Layer Security (TLS), combines public key/private key with symmetric encryption to establish a secure exchange of data on a Web site. • Web sites using this type of security will have https:// at the beginning of the URL. • At the end of each session, your computer and the secure site discard the keys. Warning: Under normal circumstances, neither e-mail nor instant messaging (IM) uses encryption. © Pearson Prentice Hall 2009

  36. Q1 – What is a computer network? • Q2 – What are the components of a LAN? • Q3 – What are the alternatives for a WAN? • Q4 – What criteria can you use for comparing WANs? • Q5 – How does encryption work? • Q6 – What is the purpose of a firewall? © Pearson Prentice Hall 2009

  37. Q6 – What is the purpose of a firewall? • A computing device that prevents unauthorized network access is called a firewall. • It can be a special-purpose computer or a program on a general-purpose computer or router. Organizations use multiple, layered firewalls. • This figure shows a perimeter firewall that sits outside the network and is the first device incoming network traffic encounters. • An internal firewall is located inside the network and protects the LAN. Department Filters Filters firm-wide Fig 6-17 Use of Multiple Firewalls © Pearson Prentice Hall 2009

  38. Q6 – What is the purpose of a firewall? • Packet-filtering firewalls, the simplest kind, examine the source address, destination address, and other data in each incoming message and decide whether to let the message enter the network based on an access control list (ACL). • Packet-filtering firewalls prohibit outsiders from starting a session with users behind the firewall, disallow traffic from particular sites, and filter outbound traffic. • Each incoming message is compared to an access control list and the firewall stops messages that are prohibited from entering the network. • Firewalls can filter outbound traffic as well using the same processes. • Also, other kinds of firewalls are used for different filtering needs. • Every computer should have a firewall! © Pearson Prentice Hall 2009

More Related