SlideShare a Scribd company logo
1 of 29
Download to read offline
6장

Data Communications
Q1: What Is a Computer Network?

• Network
  – Collection of computers
  – Communicate with one another over transmission
    line
• Basic types of Network Topologies
  – Local Area Network (LAN)
  – Wide Area Network (WAN)
  – Internet




                                                 6-2
LAN (Local Area Network)
• Computers connected on single company
  site
• Usually located in small area, such as a
  home, office building, or group of buildings
• Connects two to several hundred computers




                                                 6-3
WAN (Wide Area Network)

• Connects computers across metropolitan,
  state, regional, national areas
• Uses communication networks from vendors
   – Licensed by government




                                             6-4
Internet
•   Global network of networks
•   Connects LANs, WANs, and other networks
•   Public and private networks of networks
•   Uses a variety of communication methods and
    conventions
     – Seamless flow of data provided by
       standardized layered protocol
       • Protocol: a set of standard rules for data
         representation, signaling, authentication, and
         error detection required to send information

                                                          6-5
Q2: What Are the Components of a
    LAN?




                                   6-6
Q2: What Are the Components of a
    LAN? (cont’d)
 • Switch/Router
   – Special purpose computer that receives and
     transmits messages
 • Network interface card (NIC)
   – Hardware that connects each device’s circuitry to
     the cable
   – Onboard NIC or card that fits into an expansion
     slot
 • MAC (media control address)
 • UTP (unshielded twisted pair cable)
 • Optical fiber cable

                                                     6-7
Network Interface Card (NIC)




                               6-8
IEEE 802.3 Protocol
(Institute of Electrical and Electronics Engineers)

• World’s most popular protocol for LANs
• 10/100/1000 Mbps Ethernet
• Protocol specifies hardware characteristics,
  cables, and how messages are packaged
  and processed




                                                 6-9
Q3: What Are the Alternatives for a WAN?


• WANs connect computers at separate sites
   – Use routers and public communications links between
     sites
   – Cable connections made through licensed public
     telecommunications companies
• Internet service provider (ISP)
   – A company that provides customers access to
     the Internet
   – Provides legitimate Internet address
   – Serves as gateway to Internet
   – Pay for Internet access
                                                           6-10
Q3: What Are the Alternatives for a
    WAN? (cont’d)
 1.   Connect to an Internet service provider (ISP)
 2.   Network of Leased Lines
 3.   Public Switched Data Networks
 4.   Virtual Private Network (VPN)




                                                 6-11
Connecting the Personal Computer to
         an ISP: Modems
    1.Dial-up Modems
    2.DSL Modems
    3.Cable Modems
• Modem – a device to produce a signal that can be
    transmitted easily and decoded to reproduce the
    original digital data
•   Narrowband – less than 56 kbps speed
•   Broadband – more than 256 kbps speed




                                                      6-12
1. Dial-up Modems
–   Converts signals between analog and digital so computers
    can communicate over a regular telephone line
–   Connection made by dialing the ISP’s phone number
–   Maximum transmission speed of 56 kbps (53 kbps really)
–   Modulation standards – V.34, V.90, V.92 specify how digital
    signals are converted to analog
–   Point-to-Point Protocol (PPP) – governs how data
    (messages) are packaged and handled between modem and
    ISP




                                                                  6-13
Personal Computer (PC) Internet Access




                                     6-14
2. DSL Modems

Digital Subscriber Line (DSL)
  – Operates over telephone lines
  – Data signals do not interfere with voice
    telephone service
  – Faster data transmission than dial-up
     • 256 kbps to 768 kbps
  – DSL modems use their own protocols
  – Download and upload speeds differ
     • Asymmetric digital subscriber lines (ADSL)
     • Symmetrical digital subscriber lines (SDSL)
         – 1.544 mbps both directions



                                                     6-15
3. Cable Modems

• Provide high-speed data transmission
• Use cable television lines
  – High-capacity optical fiber cable run to neighborhood
    distribution substation
  – Television cables connect at distribution substation and runs
    to subscriber’s house
  – Does not interfere with television transmission
  – Up to 500 subscribers connected at each substation
      • Performance can vary based on number connected
  – Download speed up to 10Mbps, upload up to 256 kbps




                                                               6-16
Networks of Leased Lines
• WAN connects computers located at geographically
  distributed sites
• Access devices connect sites to transmission
   – Router or network switch– special-purpose computer to move
     network traffic from one node to another
• Leased line alternatives
   –   T1 line (1.544 Mbps), T3 line (44.736 Mbps), OC-768 (40 Gbps)
   –   Set up as a point-to-point line
   –   Only predefined sites can use leased lines
   –   Requires highly trained specialists to set up
   –   Monthly connection and maintenance costs expensive
   –   Provide low cost per bit transmitted for high traffic networks



                                                                        6-17
WAN Using Leased Lines




                         6-18
Public Switched Data Network (PSDN)

Public Switched Data Network
    – Network of computers and leased lines
    – Developed and maintained by vendor
    – Time leased on network


•     Utility that supplies networks for other companies
      to lease
    – Each site leases line to connect to PSDN network
      at access point
          • Point of presence (POP)
          • Saves setup and maintenance activities


                                                           6-19
WAN Using PSDN




                 6-20
PSDN Protocols

• Frame relay
   – Process traffic at 56 kbps to 40 Mbps
   – Simplest and easiest to support
   – Lower cost than ATM
• Asynchronous transfer mode (ATM)
   – Process speeds from 1 to 156 Mbps
   – Support voice and data communication
• Ethernet
   – Operates at speeds of 10 to 40 Gbps




                                             6-21
Q4: How Does Encryption Work?
• Encryption
   – Process of transforming clear text into coded text
   – Used for secure storage or communication
   – Uses algorithms
        • DES (Data Encryption Standard)
        • 3DES (Triple DES)
        • AES (Advanced Encryption Standard)
• Key
   – Used to encrypt data
   – Algorithm applies key to produce coded message
        • Symmetric encryption – same key encrypts and decrypts
        • Asymmetric encryption – different keys are used
   – Key used to decrypt message

                                                                  6-22
Q4: How Does Encryption Work?
    (cont’d)
• Public key/private key cryptography
     – Public key used to encrypt messages
     – Public key sent to other party to encode messages to be sent
       back
     – Decrypted with private key
     – Complex and slow
•   Asymmetric public key encryption — message encrypted using
    recipient's public key. Recipient decrypts with own public key.
•   HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to
    encrypt data
     – Fast, secure
     – See next slide for how it works



                                                                      6-23
Q4: How Does Encryption Work?
    (cont’d)




           Figure 6-14




                                6-24
Q5: What Is the Purpose of a
    Firewall?
•   Computer device that prevents unauthorized network access
•   May be special-purpose computer or program on a general-purpose
    computer
•   Organizations may have multiple firewalls
     – Perimeter firewalls sit outside organizational network
     – Internal firewalls are inside network
     – Packet-filtering firewalls examine each part of a message (source
       address, destination address, and other bytes) before allowing message
       to pass
     – May filter both incoming and outgoing messages
•   Access control list (ACL)
         encodes rules stating which
         IP addresses are allowed into
         or prohibited from the network



                                                                                6-25
Q6: What Is a VPN, and Why Is It
    Important?
 Virtual private network
   – Uses Internet or private network to create
     appearance of point-to-point connections
   – Uses public Internet to create appearance of
     private network
   – Client and server have point-to-point connection
     called tunnel
      • Private pathway over shared network
   – Secure, encrypted communications
      • VPN client software encrypts data and receiving VPN
        server decrypts it
      • Users and their keys must be registered with VPN server

                                                             6-26
Remote Access Using VPN:
   Actual Connections




                           6-27
How Does the Knowledge in This Chapter
         Help Dee and You?
• Dee and salespeople use thin client computers
   – Dee creates blog entries on Web pages using Movable
     Type
   – Salespeople use pages served by Movable Type


• Client computers contain VPN client software
   –   Interact with VPN server via Internet
   –   Secure, private connections
   –   Firewalls stop traffic not addressed to VPN server
   –   Salespeople know how to use VPN



                                                            6-28
How Does the Knowledge in This Chapter
     Help Dee and You? (cont’d)
• IT department cannot schedule resources to setup
  blog server in timely fashion
   – Will not allow outside person to do setup
       • Would then have access to system


• Consultant can create server on unprotected test
  server
   – Can be copied onto network server after acceptance
   – Requires some internal IT labor
   – Consultant could include Trojan horse virus or malware
       • Install only software from known sources
       • Code should not reside on production server


                                                              6-29

More Related Content

What's hot (20)

Chapter09
Chapter09Chapter09
Chapter09
 
CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Ch06
Ch06Ch06
Ch06
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
 
Resume
ResumeResume
Resume
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Chap13
Chap13Chap13
Chap13
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Chap14
Chap14Chap14
Chap14
 
Ch12
Ch12Ch12
Ch12
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Software
SoftwareSoftware
Software
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Thin client
Thin clientThin client
Thin client
 
Chap15
Chap15Chap15
Chap15
 

Viewers also liked

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)Sanghyeok Park
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)Sanghyeok Park
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)Sanghyeok Park
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)Sanghyeok Park
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)Sanghyeok Park
 

Viewers also liked (10)

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
 
Chap03 re
Chap03 reChap03 re
Chap03 re
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
 
Chap02 re
Chap02 reChap02 re
Chap02 re
 
Bpmn
BpmnBpmn
Bpmn
 
Case mis ch03
Case mis ch03Case mis ch03
Case mis ch03
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
 
Ch7 bpmn
Ch7 bpmnCh7 bpmn
Ch7 bpmn
 

Similar to Case mis ch06

internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note arvind pandey
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdfSanjayPradhan61
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.pptGetachewDires1
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol Smriti Agrawal
 

Similar to Case mis ch06 (20)

Networks
NetworksNetworks
Networks
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Ch06
Ch06Ch06
Ch06
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 
NT BY AKATSUKI.pdf E
NT BY AKATSUKI.pdf                              ENT BY AKATSUKI.pdf                              E
NT BY AKATSUKI.pdf E
 
wireless application protocol
wireless application protocol wireless application protocol
wireless application protocol
 

More from Sanghyeok Park

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처Sanghyeok Park
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰Sanghyeok Park
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기Sanghyeok Park
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구Sanghyeok Park
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로Sanghyeok Park
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120Sanghyeok Park
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023Sanghyeok Park
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331Sanghyeok Park
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326Sanghyeok Park
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317Sanghyeok Park
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design ThinkingSanghyeok Park
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1Sanghyeok Park
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내Sanghyeok Park
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_printSanghyeok Park
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁Sanghyeok Park
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...Sanghyeok Park
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대Sanghyeok Park
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구Sanghyeok Park
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 Sanghyeok Park
 

More from Sanghyeok Park (20)

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_print
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁
 
2015 creaction
2015 creaction2015 creaction
2015 creaction
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Case mis ch06

  • 2. Q1: What Is a Computer Network? • Network – Collection of computers – Communicate with one another over transmission line • Basic types of Network Topologies – Local Area Network (LAN) – Wide Area Network (WAN) – Internet 6-2
  • 3. LAN (Local Area Network) • Computers connected on single company site • Usually located in small area, such as a home, office building, or group of buildings • Connects two to several hundred computers 6-3
  • 4. WAN (Wide Area Network) • Connects computers across metropolitan, state, regional, national areas • Uses communication networks from vendors – Licensed by government 6-4
  • 5. Internet • Global network of networks • Connects LANs, WANs, and other networks • Public and private networks of networks • Uses a variety of communication methods and conventions – Seamless flow of data provided by standardized layered protocol • Protocol: a set of standard rules for data representation, signaling, authentication, and error detection required to send information 6-5
  • 6. Q2: What Are the Components of a LAN? 6-6
  • 7. Q2: What Are the Components of a LAN? (cont’d) • Switch/Router – Special purpose computer that receives and transmits messages • Network interface card (NIC) – Hardware that connects each device’s circuitry to the cable – Onboard NIC or card that fits into an expansion slot • MAC (media control address) • UTP (unshielded twisted pair cable) • Optical fiber cable 6-7
  • 9. IEEE 802.3 Protocol (Institute of Electrical and Electronics Engineers) • World’s most popular protocol for LANs • 10/100/1000 Mbps Ethernet • Protocol specifies hardware characteristics, cables, and how messages are packaged and processed 6-9
  • 10. Q3: What Are the Alternatives for a WAN? • WANs connect computers at separate sites – Use routers and public communications links between sites – Cable connections made through licensed public telecommunications companies • Internet service provider (ISP) – A company that provides customers access to the Internet – Provides legitimate Internet address – Serves as gateway to Internet – Pay for Internet access 6-10
  • 11. Q3: What Are the Alternatives for a WAN? (cont’d) 1. Connect to an Internet service provider (ISP) 2. Network of Leased Lines 3. Public Switched Data Networks 4. Virtual Private Network (VPN) 6-11
  • 12. Connecting the Personal Computer to an ISP: Modems 1.Dial-up Modems 2.DSL Modems 3.Cable Modems • Modem – a device to produce a signal that can be transmitted easily and decoded to reproduce the original digital data • Narrowband – less than 56 kbps speed • Broadband – more than 256 kbps speed 6-12
  • 13. 1. Dial-up Modems – Converts signals between analog and digital so computers can communicate over a regular telephone line – Connection made by dialing the ISP’s phone number – Maximum transmission speed of 56 kbps (53 kbps really) – Modulation standards – V.34, V.90, V.92 specify how digital signals are converted to analog – Point-to-Point Protocol (PPP) – governs how data (messages) are packaged and handled between modem and ISP 6-13
  • 14. Personal Computer (PC) Internet Access 6-14
  • 15. 2. DSL Modems Digital Subscriber Line (DSL) – Operates over telephone lines – Data signals do not interfere with voice telephone service – Faster data transmission than dial-up • 256 kbps to 768 kbps – DSL modems use their own protocols – Download and upload speeds differ • Asymmetric digital subscriber lines (ADSL) • Symmetrical digital subscriber lines (SDSL) – 1.544 mbps both directions 6-15
  • 16. 3. Cable Modems • Provide high-speed data transmission • Use cable television lines – High-capacity optical fiber cable run to neighborhood distribution substation – Television cables connect at distribution substation and runs to subscriber’s house – Does not interfere with television transmission – Up to 500 subscribers connected at each substation • Performance can vary based on number connected – Download speed up to 10Mbps, upload up to 256 kbps 6-16
  • 17. Networks of Leased Lines • WAN connects computers located at geographically distributed sites • Access devices connect sites to transmission – Router or network switch– special-purpose computer to move network traffic from one node to another • Leased line alternatives – T1 line (1.544 Mbps), T3 line (44.736 Mbps), OC-768 (40 Gbps) – Set up as a point-to-point line – Only predefined sites can use leased lines – Requires highly trained specialists to set up – Monthly connection and maintenance costs expensive – Provide low cost per bit transmitted for high traffic networks 6-17
  • 18. WAN Using Leased Lines 6-18
  • 19. Public Switched Data Network (PSDN) Public Switched Data Network – Network of computers and leased lines – Developed and maintained by vendor – Time leased on network • Utility that supplies networks for other companies to lease – Each site leases line to connect to PSDN network at access point • Point of presence (POP) • Saves setup and maintenance activities 6-19
  • 21. PSDN Protocols • Frame relay – Process traffic at 56 kbps to 40 Mbps – Simplest and easiest to support – Lower cost than ATM • Asynchronous transfer mode (ATM) – Process speeds from 1 to 156 Mbps – Support voice and data communication • Ethernet – Operates at speeds of 10 to 40 Gbps 6-21
  • 22. Q4: How Does Encryption Work? • Encryption – Process of transforming clear text into coded text – Used for secure storage or communication – Uses algorithms • DES (Data Encryption Standard) • 3DES (Triple DES) • AES (Advanced Encryption Standard) • Key – Used to encrypt data – Algorithm applies key to produce coded message • Symmetric encryption – same key encrypts and decrypts • Asymmetric encryption – different keys are used – Key used to decrypt message 6-22
  • 23. Q4: How Does Encryption Work? (cont’d) • Public key/private key cryptography – Public key used to encrypt messages – Public key sent to other party to encode messages to be sent back – Decrypted with private key – Complex and slow • Asymmetric public key encryption — message encrypted using recipient's public key. Recipient decrypts with own public key. • HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to encrypt data – Fast, secure – See next slide for how it works 6-23
  • 24. Q4: How Does Encryption Work? (cont’d) Figure 6-14 6-24
  • 25. Q5: What Is the Purpose of a Firewall? • Computer device that prevents unauthorized network access • May be special-purpose computer or program on a general-purpose computer • Organizations may have multiple firewalls – Perimeter firewalls sit outside organizational network – Internal firewalls are inside network – Packet-filtering firewalls examine each part of a message (source address, destination address, and other bytes) before allowing message to pass – May filter both incoming and outgoing messages • Access control list (ACL) encodes rules stating which IP addresses are allowed into or prohibited from the network 6-25
  • 26. Q6: What Is a VPN, and Why Is It Important? Virtual private network – Uses Internet or private network to create appearance of point-to-point connections – Uses public Internet to create appearance of private network – Client and server have point-to-point connection called tunnel • Private pathway over shared network – Secure, encrypted communications • VPN client software encrypts data and receiving VPN server decrypts it • Users and their keys must be registered with VPN server 6-26
  • 27. Remote Access Using VPN: Actual Connections 6-27
  • 28. How Does the Knowledge in This Chapter Help Dee and You? • Dee and salespeople use thin client computers – Dee creates blog entries on Web pages using Movable Type – Salespeople use pages served by Movable Type • Client computers contain VPN client software – Interact with VPN server via Internet – Secure, private connections – Firewalls stop traffic not addressed to VPN server – Salespeople know how to use VPN 6-28
  • 29. How Does the Knowledge in This Chapter Help Dee and You? (cont’d) • IT department cannot schedule resources to setup blog server in timely fashion – Will not allow outside person to do setup • Would then have access to system • Consultant can create server on unprotected test server – Can be copied onto network server after acceptance – Requires some internal IT labor – Consultant could include Trojan horse virus or malware • Install only software from known sources • Code should not reside on production server 6-29