11 chapter 5 business networks & telecommunications p189 – 203: 1.vpn 2. switching 3....

Post on 26-Dec-2015

221 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

11

Chapter 5Business Networks & Telecommunications

p189 – 203:

1.VPN

2. Switching

3. Protocols

2

Revision:

What is makes up the Telecommunications Network Model?

What are the two categories of media? Name the different media? What is the difference between a digital and

analog signal? List the 4 different types of networks? What type of network is on slide 4?

2

3

Telecommunications NW Model:

A telecommunications network is any arrangement where

– A sender transmits a message

– To a receiver

– Over a channel

– Consisting of some sort of medium

3

4

What type of network?

4

5

Different Media:

Wired (or …….) and Wireless (…………) See next slides

5

6 6-6

Telecommunications Media

Twisted-Pair Wire

– Ordinary telephone wire

– Copper wire is twisted into pairs

7 6-7

Telecommunications Media

Coaxial Cable

– Sturdy copper oraluminum wire wrappedwith spacers to insulateand protect it

8 6-8

Telecommunications Media

Fiber-Optic Cable

– One or more hair-thinfilaments of glass fiber wrapped in a protective jacket

9

Analog versus Digital

Analog or digital refers to the method used to convert information into an electrical signal

– Analog: an electrical current is generated that is proportional to the quantity being observed

– Digital: the quantity being observed is expressed as a number

9

10

Digital Network Technologies

Telecommunications are being revolutionized by switch from analog to digital

– Analog: voice-oriented transmission

– Digital: discrete pulse transmission Benefits

– Higher transmission speeds

– Moves larger amounts of information

– Greater economy and much lower error rates

– Transmits multiple types of communications (data, voice, video) on the same circuits

10

11

Virtual Private Network:

A network is private, when only authorized users can access the network.

So instead leasing lines and services from an ISP, a company can use the internet by isolating a part of it for private use: creating a “tunnel” through the internet or any public network.

This is done by implementing sophisticated security measures. See next slide.

11

12

13

14

VPN (cont.)

Used to establish secure intranets and extranets

– The Internet is the main backbone network

– Relies on network firewalls, encryption, and other security features to build a “pipe” through the Internet

– Creates a private network without the high cost of a separate proprietary connection

14

15

VPN (p188)

Intranet: Extranet:

15

16

Switching Techniques

How can computers or nodes link to each other on the network:– Circuit switching: dedicated channel (path or circuit)

established for duration of transmission– Packet switching: message broken into packets

Packet: group of bits transmitted together

16

17

Switching Techniques (continued)

17

18

Switching Tech. (cont.)

Frame relay: high-speed packet-switching protocol used in WANs– Variable-sized packets routed quickly– Better ratio of data bits to non-data bits

Multi-protocol label switching: enhances services like VoIP. – Still broken into packages, but all will use the same

path on the network

18

19

Protocols

Protocol: set of rules governing communication between computers

Protocol is like human language and basic understanding

Some protocols designed for WANs, LANs, and wireless communications

Most important set of protocols called TCP/IP

19

20

TCP/IP

TCP/IP: Transmission Control Protocol/Internet Protocol – Ensures packets arrive accurately– Ensures delivery of packets from node to node,

respectively Internet backbone: highest speed channels Host: computer connect directly to backbone IP number: unique identification for device DNS: Domain Name Service maintains character-based

names of IP numbers

20

What is your PC’s IP Address?

Start > All Programs > Accessories

Command Prompt > ENTER Type: ipconfig So, what is your IP address

21

Let’s check for GOOGLE!!

Still in command prompt: Type: ping google.com If you are having connectivity problems, you

can use the ping command to check the destination IP address you want to reach and record the results. The ping command displays whether the destination responded and how long it took to receive a reply.

22

Google.com

OPEN the browser and type in the address the ip address of google and ENTER

What is the DNS service doing?

23

24

TCP/IP (continued)

Static IP number: permanent number assigned to device

Dynamic IP number: temporary IP number assigned for duration of connection

24

25

IP or URL Address:

The Uniform Resource Locator is an address that points to a specific resource on the Web

http://www.stanford.edu/jengk/useless.html– http:// protocol for Web pages– www.standford.edu is the Domain name: it

identifies the computer that stores the Web pages– Jengk/ is the directory path; identifies where the

page is store on the computer– Useless.html is the document name or web page

25

26

Ethernet

Ethernet: LAN protocol using coaxial cable, also known as IEEE 802.3

Gigabit Ethernet: faster Ethernet connections Devices on network contend with other devices

for transmission time CSMA/CD protocol ensures no collisions in

transmission

26

27

28

Know more about bands:

See: http://www.disa.mil/jsc/speccht.html

29

30

Wireless Protocols

IEEE 802.11: known as Wi-Fi (wireless fidelity)– Supports wireless communication within 100 metres

of router with speed of 11 Mbps: 802.11b– 802.11g Max speed 54 Mbps all in range 2.4-2.5 GHz

Access point: Wi-Fi router connects to AP that connects to the Internet.

Access point (hotspot): allows Internet access within range of equipment

Encryption: ability to scramble and code messages– Use keys shared between sender and receiver30

31

Wireless Protocol (cont.):

IEEE 802.15 Bluetooth: allows devices to communicate within 10 metres

Examples: Wireless keyboards and mice, microphones for mobile phones.

31

32

Wireless Protocols (continued)

Worldwide Interoperability for Microwave Access (WIMAX): increases range and speed of wireless communication IEEE 802.16– 110 km, speed of 100 Mbps– Works with metropolitan area networks

Mobile Broadband Wireless Access (MBWA): similar to cell phone communications– Compatible with IP services– Compatible with Wi-Fi and Bluetooth

32

33

Wireless Protocols (continued)

33

34

Generations in Mobile Communications

Generations of mobile communication technologies are determined by capabilities and transmission speed:

– 1G, First generation analog and circuit switching– 2G, Second generation used digital voice encoding– 2.5G, Speed 144 Kbps, packet switching and limited Internet

access– 3G, speeds up to1 Mbps, support video, Internet access– 4G, digital, packet switching, bandwidths up to 100 Mbps and

tighter security.– Future:

34

35

Internet Networking Services

Variety of options to choose from when subscribing to network services

Downstream: speed of receiving from network

Upstream: speed of transmitting to network

35

36

Cable

Internet links provided by television cable firms

Cable connected to Internet server At residence, cable split into TV set and

computer Cable shared by all subscribers

36

37

Digital Subscriber Line (DSL)

Digital subscriber line (DSL): data remains digital through entire transmission; 8Mbps

Uses telephone lines connected to DSL bridge/modem

Several types of DSL– Asymmetric (ADSL) allows different upstream and

downstream rates– SDSL for short distances

37

38

Satellite

Satellite services use microwaves Service provider installs dish antenna, used

as communications satellite Speeds up to 45 Mbps GPS free satellite service

38

39

Fixed Wireless

Fixed wireless: point-to-point transmission between two stationary devices

Wireless Internet service provider (WISP)– Provides fixed wireless service

Highly modular and scalable

39

40

Optical Carrier

Optical carrier using optical fibre.– Expensive– High connection speeds

Uses basic unit of 51.84 Mbps Used by

– ISPs– Search engines – Content-rich Web sites

40

41

Broadband over Power Lines (BPL)

Broadband over Power Lines (BPL): uses electric power lines to carry digital signals

Used by utility companies – Monitor power consumption– Detect power failure– Track power outages

41

42

The Future of Networking Technologies:

Broadband Telephoning: VoIP Radio Frequency Identification: RFID Converging Technologies:

42

Broadband Telephoning:

Voice over Internet Protocol: uses Internet connection to conduct telephone conversations using VoIP.

Regular telephone companies charge according to number of minutes a call last

ISP charge customers a flat monthly connection fee for connection to Internet

Three different topologies:

43

Technologies:

PC-to-PC PC-to-Phone Phone-to-Phone

44

PC-to-PC:

In this model, both caller and receiver must have Internet phone equipment (VoIP) to talk to each other.

The call is routed through an ISP such as Netcom.

Both caller and receiver must have their computers on to complete calls

45

PC-to-Phone

These calls are routed like a normal telephone call, except:– The PC must have Internet phone equipment

A call is dialed to the ISP, routed back through the internet backbone

And then sent back to the voive phone network

46

Phone-to-Phone

One caller would dial a code, similar to a long-distance code

The ISP gateway will rout the call through the Internet and

Then converts it the signal back to the voice phone network upon reaching its connection.

47

Advantages/Disadvantages

P202, 203 VoIP becomes portable

48

49

Radio Frequency Identification

RFID tags tiny and need little power Objects are embedded with tags that contain

a transponder:– It’s a radio ‘transmitter-receiver’ that is activated

for transmission by a signal that is transmitted to it– The tag has a digital memory with a unique EPC

49

RFID:

The interrogator– An Arial– Transceiver– Decoder

Emits a signal activating the RFID tag so that the interrogator can READ/WRITE data to it

Readers decode data stored in tag’s memory and data passed to host computer

50

RFID:

How do companies apply this technology to the supply chain?

51

52

Future Uses of RFID

52

53

Converging Technologies

WebTV technologies allows one to add a set-top box to a TV set, so that one can access also the World Wide Web: connecting to the Internet– So TV technology and Web technology converges

in WebTV

Cell phones can act as Web phones Wireless technologies combined in same

device enhance functionality53

54

Summary

Telecommunications is communication over distance

Telecommunications technology has changed the business environment

Different media have different bandwidths Networks are classified according to reach

and complexity Network can be turned into a virtual private

network (VPN)54

55

Summary (continued)

Two ways to switch a communication line: packet switching and circuit switching

Network protocols are sets of rules to which all devices on network must adhere

The Internet adheres to the TCP/IP protocol Wireless technologies make it easy and affordable to

create wireless LANs Organizations and individuals have variety of choices

when subscribing to networking services

55

56

Summary (continued)

As Internet links become faster, Internet telephoning is gaining in popularity

Wireless technologies support the increasingly popular RFID technologies

Much like hardware, telecommunications technologies are merging

Increasing numbers of employees now telecommute

56

top related