SlideShare uma empresa Scribd logo
1 de 35
Chapter 6

       Data Communications




© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
What Is a Computer Network?
       Network
        is a collection of hardware components and
          computers interconnected by
          communication channels that allow sharing
          of resources and information
         Collection of computers
         Communicate with one another over
          transmission line
       Three basic types
         Local area network (LAN)
         Wide area network (WAN)
6-2      Internet
LAN
       Connects computers residing in single
       location
         2 to several hundred computers
         One geographic area
         Communication lines can be placed
          where the organization wants



6-3
WAN
       Connect computers in different
        geographical areas
         Two or more cities
       Uses communication networks from
        vendors
         Licensed by government




6-4
Internet
      • The Internet is a global system of
          interconnected computer networks that use the
          standard Internet protocol suite (TCP/IP) to
          serve billions of users worldwide
      •   Network of networks
      •   Connect LANs, WANs, and other internets
      •   Private networks of networks
      •   Use a variety of communication methods and
          conventions
           • Seamless flow of data provided by layered
             protocol
           • Set of rules that communicating devices follow
6-5
LAN VS WAN
                        LAN                           WAN
Data                                    Experiences more data
              Experiences fewer data
transmission                            transmission errors as
              transmission errors
Error:                                  compared to LAN
                                        WANs have a lower data
Data transfer LANs have a high data
                                        transfer rate as compared to
rates:        transfer rate
                                        LANs
                                        Computers connected to a
              one LAN can be            wide-area network are often
              connected to other LANs connected through public
Connection: over any distance via       networks, such as the
              telephone lines and radio telephone system. They can
              waves                     also be connected through
                                        leased lines or satellites
LAN vs WAN
speed:           high speed(1000mbps) less speed(150mbps)
                 Because it covers a        Maintaining WAN is
                 relatively small           difficult because of its
Maintenance
                 geographical area, LAN     wider geographical
costs:
                 is easier to maintain at   coverage and higher
                 relatively low costs.      maintenance costs.
                 LANs tend to have less     WANs tend to be less fault
                 problems associated        tolerant. as it consists of a
Fault Tolerance: with them, as there are    large amount of systems
                 a smaller amount of        there is a lower amount of
                 systems to deal with.      fault tolerance.
                 Network in an
                                            Internet is the best
Example:         organization can be a
                                            example of a WAN
                 LAN
LAN vs WAN
            Have a small geographical Have a large geographical range
Geographica range and do not need     generally spreading across
l spread:   any leased                boundaries and need leased
            telecommunication lines telecommunication lines
              If there is a need to set-up In this case since networks in
              a couple of extra devices remote areas have to be
Set-up costs:
              on the network, it is not connected hence the set-up
              very expensive to do that costs are higher
                                   WANs (like the Internet) are not
           Typically owned,        owned by any one organization
           controlled, and managed but rather exist under collective
Ownership:
           by a single person or   or distributed ownership and
           organization            management over long
                                   distances
LAN vs WANs

            LAN (Local Area           WAN (Wide Area Network) is a
            Network) is a computer computer network that covers a
            network covering a small broad area (e.g., any network
Definition:
            geographic area, like a whose communications links cross
            home, office, schools, or metropolitan, regional, or national
            group of buildings.       boundaries over a long distance

        layer 2 devices like         Layers 3 devices Routers, Multi-
Compone switches, bridges. layer1    layer Switches and Technology
nts:    devices like hubs ,          specific devices like ATM or Frame-
        repeaters                    relay Switches etc
What Are the Components of a
       LAN?
         Local area network
           Computers connected on single company
            site
           Usually located within half mile area
           Property controlled by company operating
            network
            Company can run cabling as necessary
         Components
           Switch
            Special purpose computer that receives and
             transmits messages
          Network interface card (NIC)
            Hardware that connects each device’s circuitry to
6-10         the cable
Switches
NIC Devices
        MAC address
          Unique identifier
        Media connections
          Unshielded twisted pair (UTP) cable
            RJ-45 connector
          Optical fiber cables
            Light rays reflected inside glass core surrounded by
             cladding
            Uses ST and SC connectors




6-12
NIC card
IEEE 802.3 Protocol
        Ethernet protocol standard
          Specifies hardware characteristics
          Describes how messages are packages
          Determines how messages are processed
          Operates at Layers 1 and 2 of TCP/IP-OSI
           architecture(physical layer and data link layer)
          Personal computers usually support 10/100/1000
           (bandwidth) Ethernet




6-14
LANs with Wireless Connections
        Wireless NIC (WNIC)
        LAN operation
          NICs operate on 802.3 protocol
          WNICs operate on 802.11 protocol
          WNICS connect to access point (AP)
            AP processes both standards




6-15
What Are the Alternatives for a WAN?
        WANs connect computers at separate sites
          No cabling between sites
          Cable connections made through licensed
          communications companies
        Internet service provider (ISP)
          Provides legitimate Internet address
          Serves as gateway to Internet
          Pay for Internet




6-16
Connecting to the ISP
        Connections made through:
          Regular telephone lines
          Use of DSL line
          Cable TV lines
        All require digital data to be converted to analog
          Modem makes conversion




6-17
MIS In Use: Larry Jones (Student)
       Network Services
        Larry set up LAN networks
        Realized that he had to offer support
          Customers had problems
          Customers needed to add more devices
        Coupled installation with support package
          Extra charges for support beyond normal wear and
          tear




6-18
Dial-Up Modems
        Handles conversion between analog and digital
        Connection made by dialing ISP
        Maximum transmission speed of 56kbps
        Modulation governed by V.34, V.90. or V.92
         standards
        PPP controls message packaging and handling




6-19
DSL Modems
        Operates over telephone lines
        Do not interfere with voice telephone service
        Faster data transmission than dial-up
        Connection always maintained
        Use their own Layer 1 and 2 protocols
        Download and upload speeds vary
          Asymmetric digital subscriber lines (ADSL)
          Symmetrical digital subscriber lines (SDSL)




6-20
Cable Modems
        Provide high-speed data transmission
        Use cable television lines
          High-capacity optical fiber cable run to
           neighborhood distribution center
          Television cables connect at distribution center and
           runs to subscribers
          Does not interfere with television transmission
          Up to 500 subscribers connected at each center
            Performance varies based on number connected




6-21
Cable Modems, continued
        Download speed up to 10Mbps, upload up to 256
         kbps
        Operate with Layer 1 and 2 protocols
        Speeds
          Narrowband
            Transmission speeds less then 56 kbps
          Broadband
            Transmission speeds in excess of 256 kbps




6-22
Networks of Leased Lines
        WAN connects computers located at geographically
         distributed sites
        Access devices connect sites to transmission
          Switch
          Router
        Alternative is leasing lines
          T1, T3
          Set up as a point-to-point line
          Only predefined sites can use leased lines
          Provide low cost per bit transmitted




6-23
Transmission Line Types, Uses, and
       Speeds




          Figure 6-11




6-24
Public Switched Data Network
       (PSDN)
        Network of computers and leased lines
          Developed and maintained by vendor
          Time leased on network
        Utility that supplies network for other companies
        to lease
          Each site leases line to connect to PSDN network at
          access point
            Point of presence (POP)
            Saves setup and maintenance activities




6-25
PSDN Protocols
        Frame relay
          Process traffic at 56 kbps to 40 Mbps
          Simplest and easiest to support
        Asynchronous transfer mode (ATM)
          Process speeds from 1 to 156 Mbps
        Ethernet
          Operates at speeds of 10 to 40 Gpbs




6-26
Criteria for Comparing WANs
        Costs
         Setup costs
           Examples: costs of acquiring lines and equipment
         Operational costs
           Examples: lease fees, ISP charges, training
         Maintenance costs
           Examples: periodic maintenance, repair, upgrades




6-27
Criteria for Comparing WANs,
       continued
        Performance
          Speed
          Latency (measure of time delay)
          Availability
          Loss rate
          Transparency
          Performance guarantees
        Growth potential
        Length of contract commitment




6-28
Security Guide: How Does
       Encryption Work?
        Encryption
          Process of transforming clear text into coded text
          Used for secure storage or communication
          Uses algorithms


        Key
          Used to encrypt data
          Algorithm applies key to produce coded message
             Symmetric encryption
             Asymmetric encryption




6-29
Security Guide: How Does
       Encryption Work?, continued
        Public key/private key
          Public key used to encrypt messages
          Public key sent to other party to encode messages to be sent
           back
          Decoded with private key
          Complex and slow
        HTTPS
          Secure communication over Internet
             Encrypted using SSL/TLS protocol
             Encodes messages using Web site’s public key, decoded with
              private key




6-30
What Is the Purpose of a
       Firewall?
        Computer device that prevents unauthorized network
         access
        May be special-purpose computer or program
        Organizations may have multiple firewalls
          Perimeter firewalls sit outside organizational network
          Internal firewalls are inside network
          Packet-filtering firewalls examine source address, destination
           address, and other data before allowing message to pass
          May filter both incoming and outgoing messages
        Access control list (ACL) encodes rules stating what
         packets are allowed or prohibited



6-31
What Is a VPN and Why Are VPNs
       Important?
        Virtual private network
          Uses Internet or private network to create
           appearance of point-to-point connections
          Uses public Internet to create appearance of private
           network
          Client and server have point-to-point connection
           called tunnel
            Private pathway over shared network
          Secure, encrypted communications




6-32
How Does the Knowledge in This
       Chapter Help Dee?
        Dee and salespeople use thin client computers
          Dee creates blog entries on Web pages using Moveable Type
          Salespeople use pages served by Moveable Type
        Client computers contain VPN client software
          Interacts with VPN server via Internet
          Secure, private connections
          Firewalls stop traffic not addressed to VPN server
          Salespeople know how to use VPN




6-33
How Does the Knowledge in This
       Chapter Help Dee?, continued
        IT department cannot schedule resources to setup
        blog server in timely fashion
          Will not allow outside person to do setup
            Would then have access to system
        Consultant can create server on unprotected test
        server
          Can be copied onto network server after acceptance
          Requires some internal IT labor
          Consultant could include Trojan horse virus or malware
            Install only software from known sources
            Code should not reside on production server




6-34
How Does the Knowledge in This
       Chapter Help Dee?, continued
        Dee negotiates with IT department
          Threatens to set up own system of user Ids and
           passwords
          Says she will set up blog on public server
          Would cause confusion that would add to IT
           department’s work
          Her proposal is the lesser of two evils




6-35

Mais conteúdo relacionado

Mais procurados

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)Ankur Kumar
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lanMohd Arif
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12Rishabh-Rawat
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks Kathirvel Ayyaswamy
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basicsDavid Kibuki
 
Section C ch16 the networking and internet basics notes
Section C   ch16 the networking and internet basics notesSection C   ch16 the networking and internet basics notes
Section C ch16 the networking and internet basics notespeter fychung
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan TechnologiesAKLI
 
Data Communications,Data Networks
Data Communications,Data NetworksData Communications,Data Networks
Data Communications,Data NetworksSrinivasa Rao
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Ranjeet Bidwe
 

Mais procurados (20)

Mobile Computing (Part-2)
Mobile Computing (Part-2)Mobile Computing (Part-2)
Mobile Computing (Part-2)
 
802.11 wireless lan
802.11 wireless lan802.11 wireless lan
802.11 wireless lan
 
Networks
NetworksNetworks
Networks
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Wireless network Project Class 12
Wireless network Project Class 12Wireless network Project Class 12
Wireless network Project Class 12
 
20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks 20CS2007 Computer Communication Networks
20CS2007 Computer Communication Networks
 
Networks and telecommunication technologies basics
Networks and telecommunication technologies basicsNetworks and telecommunication technologies basics
Networks and telecommunication technologies basics
 
Lan wan
Lan wanLan wan
Lan wan
 
Network hardware
Network hardwareNetwork hardware
Network hardware
 
Section C ch16 the networking and internet basics notes
Section C   ch16 the networking and internet basics notesSection C   ch16 the networking and internet basics notes
Section C ch16 the networking and internet basics notes
 
Wan technology
Wan technologyWan technology
Wan technology
 
Mobile Communication
Mobile CommunicationMobile Communication
Mobile Communication
 
It2402 mobile communication unit2
It2402 mobile communication unit2It2402 mobile communication unit2
It2402 mobile communication unit2
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 
It2402 mobile communication unit3
It2402 mobile communication unit3It2402 mobile communication unit3
It2402 mobile communication unit3
 
Wan Technologies
Wan TechnologiesWan Technologies
Wan Technologies
 
Data Communications,Data Networks
Data Communications,Data NetworksData Communications,Data Networks
Data Communications,Data Networks
 
It2402 mobile communication unit5
It2402 mobile communication unit5It2402 mobile communication unit5
It2402 mobile communication unit5
 
Class Note
Class NoteClass Note
Class Note
 
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
Different Issues and Survey of Proposed Solutions in TCP over Wireless Enviro...
 

Semelhante a Chapter 6 mis

computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardwareSakthiVinoth78
 
Types of Network
Types of NetworkTypes of Network
Types of NetworkAvishek Kar
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topologyDEVI NATARAJAN
 
Computer networks
Computer networksComputer networks
Computer networksMD Khan
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
Network protocol
Network protocolNetwork protocol
Network protocolQadarAhmed1
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptArumugam90
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptSaagar Shetage
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...sherinjoyson
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod pptDhruvilSTATUS
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.pptkrishna683602
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptSmitaPatil541701
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basicCeoTranDang
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledgessuseree2ffc
 

Semelhante a Chapter 6 mis (20)

computer network - Chapter 1 hardware
computer network - Chapter 1 hardwarecomputer network - Chapter 1 hardware
computer network - Chapter 1 hardware
 
Computer network
Computer networkComputer network
Computer network
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topology
 
Computer networks
Computer networksComputer networks
Computer networks
 
Data communications
Data communicationsData communications
Data communications
 
Wide Area Network (WAN)
Wide Area Network (WAN)Wide Area Network (WAN)
Wide Area Network (WAN)
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Network protocol
Network protocolNetwork protocol
Network protocol
 
Network.ppt
Network.pptNetwork.ppt
Network.ppt
 
Basic Networking.ppt
Basic Networking.pptBasic Networking.ppt
Basic Networking.ppt
 
Unit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.pptUnit I_Computer Networks_2.ppt
Unit I_Computer Networks_2.ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...A computer network links several computers. Office networks allow people to w...
A computer network links several computers. Office networks allow people to w...
 
Network- computer networking by vinod ppt
Network- computer networking by vinod pptNetwork- computer networking by vinod ppt
Network- computer networking by vinod ppt
 
Network-20210426203825.ppt
Network-20210426203825.pptNetwork-20210426203825.ppt
Network-20210426203825.ppt
 
Networking devices.ppt
Networking devices.pptNetworking devices.ppt
Networking devices.ppt
 
Advanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.pptAdvanced Computer Network-20210426203825.ppt
Advanced Computer Network-20210426203825.ppt
 
Computer Network basic
Computer Network basicComputer Network basic
Computer Network basic
 
The Computer Network - All the basic Knowledge
The Computer Network - All the basic KnowledgeThe Computer Network - All the basic Knowledge
The Computer Network - All the basic Knowledge
 

Último

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Chapter 6 mis

  • 1. Chapter 6 Data Communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke
  • 2. What Is a Computer Network?  Network  is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information  Collection of computers  Communicate with one another over transmission line  Three basic types  Local area network (LAN)  Wide area network (WAN) 6-2  Internet
  • 3. LAN  Connects computers residing in single location  2 to several hundred computers  One geographic area  Communication lines can be placed where the organization wants 6-3
  • 4. WAN  Connect computers in different geographical areas  Two or more cities  Uses communication networks from vendors  Licensed by government 6-4
  • 5. Internet • The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide • Network of networks • Connect LANs, WANs, and other internets • Private networks of networks • Use a variety of communication methods and conventions • Seamless flow of data provided by layered protocol • Set of rules that communicating devices follow 6-5
  • 6. LAN VS WAN LAN WAN Data Experiences more data Experiences fewer data transmission transmission errors as transmission errors Error: compared to LAN WANs have a lower data Data transfer LANs have a high data transfer rate as compared to rates: transfer rate LANs Computers connected to a one LAN can be wide-area network are often connected to other LANs connected through public Connection: over any distance via networks, such as the telephone lines and radio telephone system. They can waves also be connected through leased lines or satellites
  • 7. LAN vs WAN speed: high speed(1000mbps) less speed(150mbps) Because it covers a Maintaining WAN is relatively small difficult because of its Maintenance geographical area, LAN wider geographical costs: is easier to maintain at coverage and higher relatively low costs. maintenance costs. LANs tend to have less WANs tend to be less fault problems associated tolerant. as it consists of a Fault Tolerance: with them, as there are large amount of systems a smaller amount of there is a lower amount of systems to deal with. fault tolerance. Network in an Internet is the best Example: organization can be a example of a WAN LAN
  • 8. LAN vs WAN Have a small geographical Have a large geographical range Geographica range and do not need generally spreading across l spread: any leased boundaries and need leased telecommunication lines telecommunication lines If there is a need to set-up In this case since networks in a couple of extra devices remote areas have to be Set-up costs: on the network, it is not connected hence the set-up very expensive to do that costs are higher WANs (like the Internet) are not Typically owned, owned by any one organization controlled, and managed but rather exist under collective Ownership: by a single person or or distributed ownership and organization management over long distances
  • 9. LAN vs WANs LAN (Local Area WAN (Wide Area Network) is a Network) is a computer computer network that covers a network covering a small broad area (e.g., any network Definition: geographic area, like a whose communications links cross home, office, schools, or metropolitan, regional, or national group of buildings. boundaries over a long distance layer 2 devices like Layers 3 devices Routers, Multi- Compone switches, bridges. layer1 layer Switches and Technology nts: devices like hubs , specific devices like ATM or Frame- repeaters relay Switches etc
  • 10. What Are the Components of a LAN?  Local area network  Computers connected on single company site  Usually located within half mile area  Property controlled by company operating network  Company can run cabling as necessary  Components  Switch  Special purpose computer that receives and transmits messages  Network interface card (NIC)  Hardware that connects each device’s circuitry to 6-10 the cable
  • 12. NIC Devices  MAC address  Unique identifier  Media connections  Unshielded twisted pair (UTP) cable  RJ-45 connector  Optical fiber cables  Light rays reflected inside glass core surrounded by cladding  Uses ST and SC connectors 6-12
  • 14. IEEE 802.3 Protocol  Ethernet protocol standard  Specifies hardware characteristics  Describes how messages are packages  Determines how messages are processed  Operates at Layers 1 and 2 of TCP/IP-OSI architecture(physical layer and data link layer)  Personal computers usually support 10/100/1000 (bandwidth) Ethernet 6-14
  • 15. LANs with Wireless Connections  Wireless NIC (WNIC)  LAN operation  NICs operate on 802.3 protocol  WNICs operate on 802.11 protocol  WNICS connect to access point (AP)  AP processes both standards 6-15
  • 16. What Are the Alternatives for a WAN?  WANs connect computers at separate sites  No cabling between sites  Cable connections made through licensed communications companies  Internet service provider (ISP)  Provides legitimate Internet address  Serves as gateway to Internet  Pay for Internet 6-16
  • 17. Connecting to the ISP  Connections made through:  Regular telephone lines  Use of DSL line  Cable TV lines  All require digital data to be converted to analog  Modem makes conversion 6-17
  • 18. MIS In Use: Larry Jones (Student) Network Services  Larry set up LAN networks  Realized that he had to offer support  Customers had problems  Customers needed to add more devices  Coupled installation with support package  Extra charges for support beyond normal wear and tear 6-18
  • 19. Dial-Up Modems  Handles conversion between analog and digital  Connection made by dialing ISP  Maximum transmission speed of 56kbps  Modulation governed by V.34, V.90. or V.92 standards  PPP controls message packaging and handling 6-19
  • 20. DSL Modems  Operates over telephone lines  Do not interfere with voice telephone service  Faster data transmission than dial-up  Connection always maintained  Use their own Layer 1 and 2 protocols  Download and upload speeds vary  Asymmetric digital subscriber lines (ADSL)  Symmetrical digital subscriber lines (SDSL) 6-20
  • 21. Cable Modems  Provide high-speed data transmission  Use cable television lines  High-capacity optical fiber cable run to neighborhood distribution center  Television cables connect at distribution center and runs to subscribers  Does not interfere with television transmission  Up to 500 subscribers connected at each center  Performance varies based on number connected 6-21
  • 22. Cable Modems, continued  Download speed up to 10Mbps, upload up to 256 kbps  Operate with Layer 1 and 2 protocols  Speeds  Narrowband  Transmission speeds less then 56 kbps  Broadband  Transmission speeds in excess of 256 kbps 6-22
  • 23. Networks of Leased Lines  WAN connects computers located at geographically distributed sites  Access devices connect sites to transmission  Switch  Router  Alternative is leasing lines  T1, T3  Set up as a point-to-point line  Only predefined sites can use leased lines  Provide low cost per bit transmitted 6-23
  • 24. Transmission Line Types, Uses, and Speeds Figure 6-11 6-24
  • 25. Public Switched Data Network (PSDN)  Network of computers and leased lines  Developed and maintained by vendor  Time leased on network  Utility that supplies network for other companies to lease  Each site leases line to connect to PSDN network at access point  Point of presence (POP)  Saves setup and maintenance activities 6-25
  • 26. PSDN Protocols  Frame relay  Process traffic at 56 kbps to 40 Mbps  Simplest and easiest to support  Asynchronous transfer mode (ATM)  Process speeds from 1 to 156 Mbps  Ethernet  Operates at speeds of 10 to 40 Gpbs 6-26
  • 27. Criteria for Comparing WANs  Costs  Setup costs  Examples: costs of acquiring lines and equipment  Operational costs  Examples: lease fees, ISP charges, training  Maintenance costs  Examples: periodic maintenance, repair, upgrades 6-27
  • 28. Criteria for Comparing WANs, continued  Performance  Speed  Latency (measure of time delay)  Availability  Loss rate  Transparency  Performance guarantees  Growth potential  Length of contract commitment 6-28
  • 29. Security Guide: How Does Encryption Work?  Encryption  Process of transforming clear text into coded text  Used for secure storage or communication  Uses algorithms  Key  Used to encrypt data  Algorithm applies key to produce coded message  Symmetric encryption  Asymmetric encryption 6-29
  • 30. Security Guide: How Does Encryption Work?, continued  Public key/private key  Public key used to encrypt messages  Public key sent to other party to encode messages to be sent back  Decoded with private key  Complex and slow  HTTPS  Secure communication over Internet  Encrypted using SSL/TLS protocol  Encodes messages using Web site’s public key, decoded with private key 6-30
  • 31. What Is the Purpose of a Firewall?  Computer device that prevents unauthorized network access  May be special-purpose computer or program  Organizations may have multiple firewalls  Perimeter firewalls sit outside organizational network  Internal firewalls are inside network  Packet-filtering firewalls examine source address, destination address, and other data before allowing message to pass  May filter both incoming and outgoing messages  Access control list (ACL) encodes rules stating what packets are allowed or prohibited 6-31
  • 32. What Is a VPN and Why Are VPNs Important?  Virtual private network  Uses Internet or private network to create appearance of point-to-point connections  Uses public Internet to create appearance of private network  Client and server have point-to-point connection called tunnel  Private pathway over shared network  Secure, encrypted communications 6-32
  • 33. How Does the Knowledge in This Chapter Help Dee?  Dee and salespeople use thin client computers  Dee creates blog entries on Web pages using Moveable Type  Salespeople use pages served by Moveable Type  Client computers contain VPN client software  Interacts with VPN server via Internet  Secure, private connections  Firewalls stop traffic not addressed to VPN server  Salespeople know how to use VPN 6-33
  • 34. How Does the Knowledge in This Chapter Help Dee?, continued  IT department cannot schedule resources to setup blog server in timely fashion  Will not allow outside person to do setup  Would then have access to system  Consultant can create server on unprotected test server  Can be copied onto network server after acceptance  Requires some internal IT labor  Consultant could include Trojan horse virus or malware  Install only software from known sources  Code should not reside on production server 6-34
  • 35. How Does the Knowledge in This Chapter Help Dee?, continued  Dee negotiates with IT department  Threatens to set up own system of user Ids and passwords  Says she will set up blog on public server  Would cause confusion that would add to IT department’s work  Her proposal is the lesser of two evils 6-35