SlideShare une entreprise Scribd logo
1  sur  49
Communications
Computer communications is the process of sharing data,
programs, and information between two or more computers.
• E-mail —provides a fast, efficient alternative to traditional
mail by sending and receiving electronic documents.
• Instant messaging — supports direct, “live” electronic
communication between two or more friends.
• Internet telephone — provides a very low-cost alternative to
long-distance telephone calls using electronic voice and
video delivery.
• Electronic commerce — buying and selling goods
electronically.
Connectivity
Connectivity is a concept related to using computer networks
to link people and resources.
With this connection, you are linked to the world of larger
computers and the Internet.
The Wireless Revolution
The single most dramatic change in connectivity and
communications in the past few years has been the
widespread use of mobile telephones with wireless Internet
connectivity. Over 3 billion mobile telephones in use worldwide!
Communication Systems
These are electronic systems that transmit data from one
location to another.
Whether wired or wireless, every communication system
has four basic elements.
• Sending and receiving devices: often a computer or
specialized communication device.
• Communication channel: the actual connecting or
transmission medium; can be physical, or wireless.
• Connection devices: devices acting as an interface between
the sending and receiving devices and the communication
channel. They convert outgoing messages into packets that
can travel across the communication channel.
• Data transmission specifications: rules and procedures
that coordinate the sending and receiving devices by precisely
defining how the message will be sent across the
communication channel.
Example of sending e-mail: connection device is a Modem
(Modulator-Demodulator).
Communication Channels
Essential element of every communication system as they
carry the data from one computer to another.
2 categories of communication channels. One category
connects sending and receiving devices by providing a
physical connection, such as a wire or cable. The other
category is wireless.
Physical Connections: These use a solid medium to connect
sending and receiving devices. These connections include
telephone lines (twisted pair), coaxial cable, and fiber-optic
cable.
• Twisted-pair cable consists of pairs of
copper wire that are twisted together. Both
standard telephone lines and Ethernet cables
use twisted pair.
Ethernet cables are often used in networks
and to connect a variety of components to
the system unit.
• Coaxial cable, a HF transmission cable,
replaces the multiple wires of telephone lines
with a single solid-copper core.
Capacity: 80 times that of twisted pair.
Coax cable used also to deliver TV signals
and to connect computers in a network.
Fiber-optic cable transmits data as pulses of
light through tiny tubes of glass.
Capacity: over 26,000 times that of telephone
cable. Compared to coaxial cable, it is lighter,
faster, and more reliable at transmitting data.
Fiber-optic cable is rapidly taking over.
Wireless Connections
do not use a solid substance to connect sending and
receiving devices.
Primary technologies: radio frequency, microwave, satellite,
and infrared.
• Radio frequency (RF) uses radio signals to communicate
between wireless devices. E.g. smartphones use RF to
place telephone calls and to connect to the Internet.
Most home or business wireless networks are based on a
technology called Wi-Fi (wireless fidelity) to communicate
over short distances.
Several standards for Wi-Fi exist, and each can send and
receive data at a different speed.
Bluetooth is a short-range radio com-
munication standard that transmits data
over short distances of up to about
33 feet. It is used for wire less headsets, printer
connections, and handheld devices.
The range of Wi-Fi networks is being extended over greater
distances using a new technology known as WiMax
(Worldwide Interoperability for Microwave Access).
WiMax is commonly used by universities and others to
extend the capability of existing Wi-Fi networks.
Microwave communication: uses HF
radio waves. Like infrared, microwave
communication provides line-of-sight
communication because microwaves
travel in a straight line. Because the
waves cannot bend with the curvature
of the earth, they can be transmitted
only over relatively short distances,
e.g. between buildings in a city or on
a large college campus. For longer
distances, the waves must be relayed
by means of microwave stations with
microwave dishes or antennas.
Satellite communication: uses satellites orbiting about
22,000 miles above the earth as microwave relay stations.
(many offered by Intelsat, the International Telecommunica-
tions Satellite Consortium, which
is owned by 114 governments
to form a worldwide communica-
tion system). Satellites can be
used to send and receive
large volumes of data.
Uplink: term relating to sending data to a satellite.
Downlink: refers to receiving data from a satellite.
Drawback: bad weather can sometimes interrupt data flow.
Global positioning system (GPS): A network of 24 satel-
lites owned and managed by the Defense Department,
continuously sends location information to earth.
Infrared: uses IR light waves to communicate over short
distances. It is sometimes referred to as line-of-sight
communication: sending and receiving devices must be in
clear view of one another.
Applications: transfer of data and information from a
portable device, laptop PC, to a desktop computer.
Summary
Connection Devices
At one time nearly all computer communication
used telephone lines, which convey analog
signals. Computers, in contrast, send and
receive digital signals
Modems: short for modulator-demodulator.
Modulation: process of converting from digital to analog.
Demodulation from analog to digital.
The modem enables PCs to communicate across different
media like telephone wires, cable lines, and radio waves.
The speed, or transfer rate, is typically measured in
thousands of bits (kilobits) per second (Kbps).
Example: transferring the image above takes ca. 5 seconds
with a 500 Kbps modem.
There are four commonly used types of modems: telephone,
DSL, cable, and wireless.
• A telephone modem is used to connect a
PC directly to a telephone line. These modems
can be either internal or external.
Internal modems are on an expansion card that
plugs into a slot on the system board. An external
modem is typically connected through a serial
or USB port.
• A DSL (Digital Subscriber Line) modem uses
standard phone lines to create a high-speed
connection directly to your phone company’s offices.
These devices are usually external and connect to the
system unit using either USB or Ethernet ports.
A cable modem uses the same coaxial cable as your
TV. This modem creates high-speed connections
using the system unit’s USB or Ethernet port.
A wireless modem, also known
as a WWAN (wireless wide area
network) modem. It is usually a
small plug-in USB or ExpressCard
device that provides very portable high-
speed connectivity from almost anywhere.
Connection Service
Earlier, special high-speed lines from telephone companies.
Originally, these were copper lines, known as T1 lines,
that could be combined to form higher-capacity options known
as T3 or DS3 lines.
These lines have largely been replaced by optical carrier
(OC) lines, which are substantially much faster.
Internet service providers (ISP) provide affordable
connections. Individuals relied on dial-up services using
existing telephones and telephone modems to connect to the
Internet. Replaced later by higher-speed connection services
including DSL, cable, satellite, and cellular services.
• Digital subscriber line (DSL) service: provided by
telephone companies using existing telephone lines to provide
high-speed connections. DSL is much faster than dial-up.
ADSL (asymmetric digital subscriber line) is one of the
most widely used types of DSL.
• Cable service is provided by cable television companies
using their existing television cables. These connections are
faster than DSL.
• Satellite connection services use satellites to provide
wireless connections. Slower than DSL and cable modem, but
available almost anywhere using a satellite-receiving disk.
´
• Cellular services: use 3G and 4G cellular networks to
provide wireless connectivity to the Internet.
Not as fast as the other services, but are rapidly growing in
popularity for mobile devices such as cell phones and other
portable devices.
Data Transmission
Several factors affect how data is transmitted. These factors
include bandwidth and protocols.
Bandwidth: a measurement of the width or capacity of the
communication channel, i.e. how much information can move
across the communication channel in a given amount of time.
Slow bandwidth ok for text documents, not video and audio.
4 categories of bandwidth:
• Voiceband, or low bandwidth, is used for standard
telephone communication. Effective for transmitting text
documents, too slow for many other types of transmission.
• Medium band is used mainly to connect minicomputers
and mainframes as well as to transmit data over long
distances. Capable of very high-speed data transfer.
• Broadband: widely used for DSL, cable, and satellite
connections. Several users can share a single broadband
connection for high-speed data transfer.
• Baseband is widely used to connect individual PCs located
close to one another. Able to support high-speed transmis-
sion but can carry only a single signal at one time.
Protocols
Sending and receiving devices must follow a set of communi-
cation rules for the exchange of information: protocols.
For the Internet use is made of the TCP/IP (transmission
control protocol/Internet protocol).
Features:
(1) identify sending and receiving devices and
(2) breaking information into small parts for transmission.
• Identification: Every PC on the Internet has a unique
numeric address called an IP address (Internet protocol
address). (Similar to the postal service). For ease, a system
was developed to automatically convert text-based
addresses to numeric IP addresses: a domain name server
(DNS) to convert text-based addresses into IP addresses.
For instance 212.26.1.0 - 212.26.1.255 is an IP
address range owned by KFUPM and located in KSA.
“A name indicates what we seek. An address indicates
where it is. A route indicates how to get there.”
• Packetization: Before the message is sent down the
Internet, it is reformatted or broken down into small parts
called packets. Each packet is then sent separately over
the Internet, possibly via different routes. At reception, the
packets are reassembled into the correct order again.
The Internet
How Information Travels Through the Internet
A page on the Internet — whether it's full of words,
images or both — doesn't come to you in one shipment.
It's translated into digital information, chopped into byte
pieces called PACKETS, and sent to you like a puzzle
that needs to be reassembled. Each part of the packet
has a specific function:
Header
Provides the
complete
destination
address for the
packet
Data Block
The portion of the overall
information carried by the packet
Sequence ID
ID’s where the information
belongs in relation to the
rest of the information
End of Message
ID’s the end of the
packet
The Internet
How Information Travel Through the Internet
When you connect to a Web site through an ISP and start
exchanging information, there isn't a fixed connection
between your computer and the Web server computer
hosting the Web site. Instead, information is exchanged
using the best possible path at that particular time.
Special computers called routers determine these paths,
avoiding slow links and favoring fast ones.
Your
Computer
ISP
Routers
Web
Servers
Networks
A computer network is a communication system that
connects two or more computers so that they can exchange
information and share resources.
Networks can be set up in different arrangements.
Terms
• Node: any device that is connected to a network. It could be
a computer, printer, or data storage device.
• Client: a node that requests and uses resources available
from other nodes. Typically, a user’s microcomputer.
• Server: a node that shares resources with other nodes.
Dedicated servers: specialize in performing specific tasks.
They may be called an application server, communication
server, database server, file server, printer server, or Web
server.
• Directory server: a specialized server that manages
resources, such as user accounts, for an entire network.
• Host: any computer system that can be accessed over a
network.
• Switch: central node that coordinates the flow of data by
sending messages directly between sender and receiver
nodes. A hub, previously, sends a received message to all
connected nodes, rather than just the intended node.
• Network interface cards (NIC): expansion cards located
within the system unit that connect the computer to a
network. Sometimes referred to as a LAN adapter.
• Network operating systems (NOS): control and
coordinate the activities of all computers and other devices
on a network (electronic communication, sharing of
information and resources).
• Network administrator: a computer specialist responsible
for efficient network operations and implementation of new
networks.
Network Types
Networks may be built within a home, or citywide and even
international, using both cable and wireless connections.
Local Area Networks
Networks with nodes that are in close physical proximity —
within the same building. Typically, LANs span distances less
than a mile and are owned and operated by individual
organizations. LANs are widely used by colleges, universities,
to link PCs and share printers and other resources.
A network gateway is a device that allows one LAN to be
linked to other LANs or to larger networks.
Ethernet: a standard for connecting nodes and controlling
their communications.
LAN Ethernet is used for LANs.
Home Networks: allow different computers to share
resources, including a common Internet connection.
Connections through electrical or telephone wiring, and
special cables or even wireless.
Wireless LAN: WLAN, uses RF to connect computers and
other devices. All communications pass through the network’s
centrally located wireless access point or base station.
Personal Area Network A PAN is a type of wireless network
that works within a very small area. PANs connect cell phones
to headsets,..
Metropolitan Area Networks: MANs span distances up to
100 miles and are owned by large organizations.
Wide area networks : WANs are countrywide and worldwide
networks. They provide access to regional service (MAN)
providers and typically span distances greater than 100 miles.
They use microwave relays and satellites to reach users over
long distances.
The widest of all WANs is the Internet, spans the entire globe.
Network Architecture
It describes how a network is arranged and how resources are
coordinated and shared. It encompasses a variety of different
network specifics, including network topologies and
strategies.
Network topology describes the physical arrangement of the
network.
Network strategies define how information and resources are
shared.
Topologies
• Bus network: each device is
connected to a common cable
called a bus or backbone and
all communications travel along
this bus.
• Ring network: each device is connected to two other
devices, forming a ring. When a message is sent, it is passed
around the ring until it reaches the intended destination.
A single incorrectly configured
or malfunctioning device could
Cause errors or even bring the
whole network down.
Since all messages must pass
through all nodes between the
source and destination,  bandwidth
usage is high, making this type
of topology slow and less efficient.
 Security is a greater challenge
since intermediate devices receive messages that are not
intended for them.
• Star network: each device is connected directly to a central
network switch. Whenever a node sends a message, it is
routed to the switch, which then passes the message along
to the intended recipient.
The star network is the most widely used network topology
today.
 Simplicity of adding new
nodes.
 The connecting switch
(repeater) is a central point
of failure.
• Tree network: each device is connected to a central node,
either directly or through one or more other devices. The
central node is connected to two or more subordinate nodes
that in turn are connected to other sub ordinate nodes, and
so forth, forming a treelike structure.
Composed of a root node, intermediary nodes and ultimate
nodes.
This network, also known as a
hierarchical network, is often
used to share corporate-wide
data.
 Scalable, can connect more
units to root thru intermediary.
 Easier fault identification.
 Maintenance when getting
larger, and issues when backbone failure.
• Hybrid network: is a combination of different topologies. For
example, large organizations today typically have a complex
network of smaller networks.
• Mesh network: this topology is the newest type and does
not use a specific physical layout (such as a star or a tree).
Rather, the mesh network requires that each node have more
than one connection to the other nodes.
If a path between two nodes
is somehow disrupted, data
can be automatically rerouted
around the failure using another
path. Wireless technologies
are frequently used to build
mesh networks.
Fully connected mesh: needs no
switches, but #connections increases as n(n-1)/2.
• Summary of usual network topologies
Strategies
Every network has a strategy, or way of coordinating the
sharing of information and resources.
The most common network strategies are terminal, client/
server, peer-to-peer, and distributed.
In a terminal server network, processing power is
centralized in one large computer.
The nodes connected to this host computer are either
terminals with little or no processing capabilities or
microcomputers running special terminal emulation (imitation)
software such as Windows Remote Desktop Protocol (RDP).
Ex: Hotel booking and airline agencies.
 Centralized location and control of technical personnel,
software, and data.
 Lack of control and flexibility for the end user.
 Less powerful than microcomputers.
Client/server networks
Use of a central computer to coordinate and supply services to
other nodes on the network. In this model, example of
a distributed application structure, the workload or tasks are
partitioned between the provider of a resource or service (the
server), and the service requesters (clients). Often the
communication is run through the Internet.
Examples:
E-mail, network printing,
the WWW.
 Can handle a large amount of networks.
 Sufficient powerful software to handle and control newtwork
activities.
 Cost and maintenance.
Peer-to-peer (P2P) network
nodes have equal authority and can act as both clients and
servers. The most common way to share games, movies, and
music over the Internet is to use a P2P network.
Peers make a portion of their resources, such as processing
power, disk storage or network bandwidth, directly available to
other network participants, without the need for central
coordination by servers or stable hosts.
A peer is both supplier and consumer of resources.
 P2P’s popularity
 Easy and inexpensive (often free).
 Security and trust: route attacks and
malware (virus, trojan,...)
Distributed processing network:
processing capability (parts of a software system) is located
and shared at different nodes or locations.
Common for decentralized organizations where divisional
offices have their own computer systems.
Components located on networked computers communicate
and coordinate their actions by passing “messages”.
Sometimes referred to as concurring or parallel processing.
Examples: Massively multiplayer online games, telephone
networks, Virtual Reality communities, aircraft and industrial
control systems.
 Easier to manage and
expand than a single
powerful system.
 Synchronization issues.
Summary of network strategies
Organizational Networks
Computer networks in organizations have evolved over time.
Most large organizations have a complex and wide range of
different network configurations, operating systems, and
strategies. These organizations face the challenge of making
these networks work together effectively and securely.
Internet Technologies
Many organizations today employ Internet technologies to
support effective communication within and between
organizations using intranets and extranets.
Intranet:
a private network within an organization that resembles the
Internet.
Like the public Internet, intranets use browsers, Web sites,
and Web pages.
Typical applications: web publishing including telephone
directories, e-mail addresses, employee benefit information,
internal job openings, news feeds, job policies, business
standards, training…
Employees discuss key issues in an intranet forum
application for new ideas in management, productivity and
quality.
 Productivity.
 Time saving (information delivered on an as-needed basis).
 Communication for enhancing collaboration.
 Immediate updates.
Extranet:
a private network that connects more than one organization.
Many organizations use Internet technologies to allow
business partners limited access to their networks with the
purpose of increasing efficiency and reducing costs.
 Exchange of large volumes of data using Electronic Data
Interchange (EDI).
 Share product catalogs exclusively with trade partners.
 Cost for setting up and maintaining.
 Security when hosting valuable and proprietary information.
Network Security
Large organizations face the challenge of ensuring that only
authorized users have access to network resources. It
consists of the policies adopted to prevent and monitor
authorized access, misuse modification, or denial of
a computer network and network-accessible resources.
Securing large computer networks requires specialized
technology.
Three technologies commonly used to ensure network
security are firewalls, intrusion detection systems, and
virtual private networks.
A firewall: hardware + software that control access to a
company’s intranet and other internal networks.
Most use a special computer or software called a Proxy
Server. All communications between the company’s internal
networks and the outside world pass through this server.
By evaluating the source and the content of each
communication, the proxy server decides whether it is safe to
let a particular message or file pass into or out of the
organizations’ network.
Intrusion detection systems (IDS)
Can be a device or a software.
Work with firewalls to protect an organization’s network.
These systems use sophisticated statistical techniques
to analyze all incoming and outgoing network traffic. Using
advanced pattern matching and heuristics, an IDS system can
recognize signs of a network attack and disable access before
an intruder can do damage.
Network or Host based IDS: NIDS, HIDS.
Virtual private networks ( VPN ) create a secure private
connection between a remote user and an organization’s
internal network. Special VPN protocols create the equivalent
of a dedicated line between a user’s home or laptop computer
and a company server. The connection is heavily encrypted
and, from the perspective of the user, it appears that their
workstation is actually located on the corporate network.

Contenu connexe

Similaire à Communications and Networks.pptx

Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptxmilkymark
 
BAIT1003 Chapter 8
BAIT1003 Chapter 8BAIT1003 Chapter 8
BAIT1003 Chapter 8limsh
 
Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationJennifer Stoe
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxmmmm11111
 
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...sabbirantor
 
Sm2 Network Connections
Sm2 Network ConnectionsSm2 Network Connections
Sm2 Network ConnectionsMiriam Tello
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Medianimx106
 
Computer networks
Computer networksComputer networks
Computer networksTej Kiran
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networkspavan kumar Thatikonda
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)IMRAN KHAN
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptxOmar91305
 
Communication media
Communication mediaCommunication media
Communication mediaYanique1
 
Computer Networks Part 1.pptx
Computer Networks Part 1.pptxComputer Networks Part 1.pptx
Computer Networks Part 1.pptxzjjsjsnn
 

Similaire à Communications and Networks.pptx (20)

Presentation (1).pptx
Presentation (1).pptxPresentation (1).pptx
Presentation (1).pptx
 
E-Tourism - Networks
E-Tourism - NetworksE-Tourism - Networks
E-Tourism - Networks
 
BAIT1003 Chapter 8
BAIT1003 Chapter 8BAIT1003 Chapter 8
BAIT1003 Chapter 8
 
Stoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission PresentationStoe Noll Westin Data Transmission Presentation
Stoe Noll Westin Data Transmission Presentation
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
 
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...
Transmission Media।।Circuit Switching।।Telephone Network।।DSL।।Cable Modems।।...
 
Networks
Networks Networks
Networks
 
Sm2 Network Connections
Sm2 Network ConnectionsSm2 Network Connections
Sm2 Network Connections
 
Wired Transmission Media
Wired Transmission MediaWired Transmission Media
Wired Transmission Media
 
Computer networks
Computer networksComputer networks
Computer networks
 
Unit 1 introduction to computer networks
Unit 1  introduction to computer networksUnit 1  introduction to computer networks
Unit 1 introduction to computer networks
 
Transmission Media
Transmission MediaTransmission Media
Transmission Media
 
Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)Basics of data communication and computer networking (262 kb)
Basics of data communication and computer networking (262 kb)
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
 
CHAPTER #1.pptx
CHAPTER #1.pptxCHAPTER #1.pptx
CHAPTER #1.pptx
 
Wireless world
Wireless worldWireless world
Wireless world
 
Communication Media
Communication MediaCommunication Media
Communication Media
 
Communication media
Communication mediaCommunication media
Communication media
 
Computer Networks Part 1.pptx
Computer Networks Part 1.pptxComputer Networks Part 1.pptx
Computer Networks Part 1.pptx
 

Dernier

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Dernier (20)

Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

Communications and Networks.pptx

  • 1.
  • 2. Communications Computer communications is the process of sharing data, programs, and information between two or more computers. • E-mail —provides a fast, efficient alternative to traditional mail by sending and receiving electronic documents. • Instant messaging — supports direct, “live” electronic communication between two or more friends. • Internet telephone — provides a very low-cost alternative to long-distance telephone calls using electronic voice and video delivery. • Electronic commerce — buying and selling goods electronically.
  • 3. Connectivity Connectivity is a concept related to using computer networks to link people and resources. With this connection, you are linked to the world of larger computers and the Internet. The Wireless Revolution The single most dramatic change in connectivity and communications in the past few years has been the widespread use of mobile telephones with wireless Internet connectivity. Over 3 billion mobile telephones in use worldwide! Communication Systems These are electronic systems that transmit data from one location to another.
  • 4. Whether wired or wireless, every communication system has four basic elements. • Sending and receiving devices: often a computer or specialized communication device. • Communication channel: the actual connecting or transmission medium; can be physical, or wireless.
  • 5. • Connection devices: devices acting as an interface between the sending and receiving devices and the communication channel. They convert outgoing messages into packets that can travel across the communication channel. • Data transmission specifications: rules and procedures that coordinate the sending and receiving devices by precisely defining how the message will be sent across the communication channel. Example of sending e-mail: connection device is a Modem (Modulator-Demodulator).
  • 6. Communication Channels Essential element of every communication system as they carry the data from one computer to another. 2 categories of communication channels. One category connects sending and receiving devices by providing a physical connection, such as a wire or cable. The other category is wireless. Physical Connections: These use a solid medium to connect sending and receiving devices. These connections include telephone lines (twisted pair), coaxial cable, and fiber-optic cable.
  • 7. • Twisted-pair cable consists of pairs of copper wire that are twisted together. Both standard telephone lines and Ethernet cables use twisted pair. Ethernet cables are often used in networks and to connect a variety of components to the system unit. • Coaxial cable, a HF transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core. Capacity: 80 times that of twisted pair. Coax cable used also to deliver TV signals and to connect computers in a network.
  • 8. Fiber-optic cable transmits data as pulses of light through tiny tubes of glass. Capacity: over 26,000 times that of telephone cable. Compared to coaxial cable, it is lighter, faster, and more reliable at transmitting data. Fiber-optic cable is rapidly taking over. Wireless Connections do not use a solid substance to connect sending and receiving devices. Primary technologies: radio frequency, microwave, satellite, and infrared. • Radio frequency (RF) uses radio signals to communicate between wireless devices. E.g. smartphones use RF to place telephone calls and to connect to the Internet.
  • 9.
  • 10. Most home or business wireless networks are based on a technology called Wi-Fi (wireless fidelity) to communicate over short distances. Several standards for Wi-Fi exist, and each can send and receive data at a different speed. Bluetooth is a short-range radio com- munication standard that transmits data over short distances of up to about 33 feet. It is used for wire less headsets, printer connections, and handheld devices. The range of Wi-Fi networks is being extended over greater distances using a new technology known as WiMax (Worldwide Interoperability for Microwave Access). WiMax is commonly used by universities and others to extend the capability of existing Wi-Fi networks.
  • 11. Microwave communication: uses HF radio waves. Like infrared, microwave communication provides line-of-sight communication because microwaves travel in a straight line. Because the waves cannot bend with the curvature of the earth, they can be transmitted only over relatively short distances, e.g. between buildings in a city or on a large college campus. For longer distances, the waves must be relayed by means of microwave stations with microwave dishes or antennas.
  • 12. Satellite communication: uses satellites orbiting about 22,000 miles above the earth as microwave relay stations. (many offered by Intelsat, the International Telecommunica- tions Satellite Consortium, which is owned by 114 governments to form a worldwide communica- tion system). Satellites can be used to send and receive large volumes of data. Uplink: term relating to sending data to a satellite. Downlink: refers to receiving data from a satellite. Drawback: bad weather can sometimes interrupt data flow. Global positioning system (GPS): A network of 24 satel- lites owned and managed by the Defense Department, continuously sends location information to earth.
  • 13. Infrared: uses IR light waves to communicate over short distances. It is sometimes referred to as line-of-sight communication: sending and receiving devices must be in clear view of one another. Applications: transfer of data and information from a portable device, laptop PC, to a desktop computer. Summary
  • 14. Connection Devices At one time nearly all computer communication used telephone lines, which convey analog signals. Computers, in contrast, send and receive digital signals Modems: short for modulator-demodulator. Modulation: process of converting from digital to analog. Demodulation from analog to digital. The modem enables PCs to communicate across different media like telephone wires, cable lines, and radio waves. The speed, or transfer rate, is typically measured in thousands of bits (kilobits) per second (Kbps). Example: transferring the image above takes ca. 5 seconds with a 500 Kbps modem.
  • 15. There are four commonly used types of modems: telephone, DSL, cable, and wireless. • A telephone modem is used to connect a PC directly to a telephone line. These modems can be either internal or external. Internal modems are on an expansion card that plugs into a slot on the system board. An external modem is typically connected through a serial or USB port. • A DSL (Digital Subscriber Line) modem uses standard phone lines to create a high-speed connection directly to your phone company’s offices. These devices are usually external and connect to the system unit using either USB or Ethernet ports.
  • 16. A cable modem uses the same coaxial cable as your TV. This modem creates high-speed connections using the system unit’s USB or Ethernet port. A wireless modem, also known as a WWAN (wireless wide area network) modem. It is usually a small plug-in USB or ExpressCard device that provides very portable high- speed connectivity from almost anywhere.
  • 17. Connection Service Earlier, special high-speed lines from telephone companies. Originally, these were copper lines, known as T1 lines, that could be combined to form higher-capacity options known as T3 or DS3 lines. These lines have largely been replaced by optical carrier (OC) lines, which are substantially much faster. Internet service providers (ISP) provide affordable connections. Individuals relied on dial-up services using existing telephones and telephone modems to connect to the Internet. Replaced later by higher-speed connection services including DSL, cable, satellite, and cellular services.
  • 18. • Digital subscriber line (DSL) service: provided by telephone companies using existing telephone lines to provide high-speed connections. DSL is much faster than dial-up. ADSL (asymmetric digital subscriber line) is one of the most widely used types of DSL. • Cable service is provided by cable television companies using their existing television cables. These connections are faster than DSL. • Satellite connection services use satellites to provide wireless connections. Slower than DSL and cable modem, but available almost anywhere using a satellite-receiving disk.
  • 19. ´ • Cellular services: use 3G and 4G cellular networks to provide wireless connectivity to the Internet. Not as fast as the other services, but are rapidly growing in popularity for mobile devices such as cell phones and other portable devices.
  • 20. Data Transmission Several factors affect how data is transmitted. These factors include bandwidth and protocols. Bandwidth: a measurement of the width or capacity of the communication channel, i.e. how much information can move across the communication channel in a given amount of time. Slow bandwidth ok for text documents, not video and audio. 4 categories of bandwidth: • Voiceband, or low bandwidth, is used for standard telephone communication. Effective for transmitting text documents, too slow for many other types of transmission. • Medium band is used mainly to connect minicomputers and mainframes as well as to transmit data over long distances. Capable of very high-speed data transfer.
  • 21. • Broadband: widely used for DSL, cable, and satellite connections. Several users can share a single broadband connection for high-speed data transfer. • Baseband is widely used to connect individual PCs located close to one another. Able to support high-speed transmis- sion but can carry only a single signal at one time. Protocols Sending and receiving devices must follow a set of communi- cation rules for the exchange of information: protocols. For the Internet use is made of the TCP/IP (transmission control protocol/Internet protocol). Features: (1) identify sending and receiving devices and (2) breaking information into small parts for transmission.
  • 22. • Identification: Every PC on the Internet has a unique numeric address called an IP address (Internet protocol address). (Similar to the postal service). For ease, a system was developed to automatically convert text-based addresses to numeric IP addresses: a domain name server (DNS) to convert text-based addresses into IP addresses. For instance 212.26.1.0 - 212.26.1.255 is an IP address range owned by KFUPM and located in KSA. “A name indicates what we seek. An address indicates where it is. A route indicates how to get there.” • Packetization: Before the message is sent down the Internet, it is reformatted or broken down into small parts called packets. Each packet is then sent separately over the Internet, possibly via different routes. At reception, the packets are reassembled into the correct order again.
  • 23. The Internet How Information Travels Through the Internet A page on the Internet — whether it's full of words, images or both — doesn't come to you in one shipment. It's translated into digital information, chopped into byte pieces called PACKETS, and sent to you like a puzzle that needs to be reassembled. Each part of the packet has a specific function: Header Provides the complete destination address for the packet Data Block The portion of the overall information carried by the packet Sequence ID ID’s where the information belongs in relation to the rest of the information End of Message ID’s the end of the packet
  • 24. The Internet How Information Travel Through the Internet When you connect to a Web site through an ISP and start exchanging information, there isn't a fixed connection between your computer and the Web server computer hosting the Web site. Instead, information is exchanged using the best possible path at that particular time. Special computers called routers determine these paths, avoiding slow links and favoring fast ones. Your Computer ISP Routers Web Servers
  • 25. Networks A computer network is a communication system that connects two or more computers so that they can exchange information and share resources. Networks can be set up in different arrangements.
  • 26. Terms • Node: any device that is connected to a network. It could be a computer, printer, or data storage device. • Client: a node that requests and uses resources available from other nodes. Typically, a user’s microcomputer. • Server: a node that shares resources with other nodes. Dedicated servers: specialize in performing specific tasks. They may be called an application server, communication server, database server, file server, printer server, or Web server. • Directory server: a specialized server that manages resources, such as user accounts, for an entire network. • Host: any computer system that can be accessed over a network. • Switch: central node that coordinates the flow of data by sending messages directly between sender and receiver nodes. A hub, previously, sends a received message to all connected nodes, rather than just the intended node.
  • 27. • Network interface cards (NIC): expansion cards located within the system unit that connect the computer to a network. Sometimes referred to as a LAN adapter. • Network operating systems (NOS): control and coordinate the activities of all computers and other devices on a network (electronic communication, sharing of information and resources). • Network administrator: a computer specialist responsible for efficient network operations and implementation of new networks.
  • 28. Network Types Networks may be built within a home, or citywide and even international, using both cable and wireless connections. Local Area Networks Networks with nodes that are in close physical proximity — within the same building. Typically, LANs span distances less than a mile and are owned and operated by individual organizations. LANs are widely used by colleges, universities, to link PCs and share printers and other resources.
  • 29. A network gateway is a device that allows one LAN to be linked to other LANs or to larger networks. Ethernet: a standard for connecting nodes and controlling their communications. LAN Ethernet is used for LANs.
  • 30. Home Networks: allow different computers to share resources, including a common Internet connection. Connections through electrical or telephone wiring, and special cables or even wireless. Wireless LAN: WLAN, uses RF to connect computers and other devices. All communications pass through the network’s centrally located wireless access point or base station. Personal Area Network A PAN is a type of wireless network that works within a very small area. PANs connect cell phones to headsets,..
  • 31. Metropolitan Area Networks: MANs span distances up to 100 miles and are owned by large organizations. Wide area networks : WANs are countrywide and worldwide networks. They provide access to regional service (MAN) providers and typically span distances greater than 100 miles. They use microwave relays and satellites to reach users over long distances. The widest of all WANs is the Internet, spans the entire globe.
  • 32. Network Architecture It describes how a network is arranged and how resources are coordinated and shared. It encompasses a variety of different network specifics, including network topologies and strategies. Network topology describes the physical arrangement of the network. Network strategies define how information and resources are shared. Topologies • Bus network: each device is connected to a common cable called a bus or backbone and all communications travel along this bus.
  • 33. • Ring network: each device is connected to two other devices, forming a ring. When a message is sent, it is passed around the ring until it reaches the intended destination. A single incorrectly configured or malfunctioning device could Cause errors or even bring the whole network down. Since all messages must pass through all nodes between the source and destination,  bandwidth usage is high, making this type of topology slow and less efficient.  Security is a greater challenge since intermediate devices receive messages that are not intended for them.
  • 34. • Star network: each device is connected directly to a central network switch. Whenever a node sends a message, it is routed to the switch, which then passes the message along to the intended recipient. The star network is the most widely used network topology today.  Simplicity of adding new nodes.  The connecting switch (repeater) is a central point of failure.
  • 35. • Tree network: each device is connected to a central node, either directly or through one or more other devices. The central node is connected to two or more subordinate nodes that in turn are connected to other sub ordinate nodes, and so forth, forming a treelike structure. Composed of a root node, intermediary nodes and ultimate nodes. This network, also known as a hierarchical network, is often used to share corporate-wide data.  Scalable, can connect more units to root thru intermediary.  Easier fault identification.  Maintenance when getting larger, and issues when backbone failure.
  • 36. • Hybrid network: is a combination of different topologies. For example, large organizations today typically have a complex network of smaller networks. • Mesh network: this topology is the newest type and does not use a specific physical layout (such as a star or a tree). Rather, the mesh network requires that each node have more than one connection to the other nodes. If a path between two nodes is somehow disrupted, data can be automatically rerouted around the failure using another path. Wireless technologies are frequently used to build mesh networks. Fully connected mesh: needs no switches, but #connections increases as n(n-1)/2.
  • 37. • Summary of usual network topologies
  • 38. Strategies Every network has a strategy, or way of coordinating the sharing of information and resources. The most common network strategies are terminal, client/ server, peer-to-peer, and distributed. In a terminal server network, processing power is centralized in one large computer. The nodes connected to this host computer are either terminals with little or no processing capabilities or microcomputers running special terminal emulation (imitation) software such as Windows Remote Desktop Protocol (RDP). Ex: Hotel booking and airline agencies.  Centralized location and control of technical personnel, software, and data.  Lack of control and flexibility for the end user.  Less powerful than microcomputers.
  • 39. Client/server networks Use of a central computer to coordinate and supply services to other nodes on the network. In this model, example of a distributed application structure, the workload or tasks are partitioned between the provider of a resource or service (the server), and the service requesters (clients). Often the communication is run through the Internet. Examples: E-mail, network printing, the WWW.  Can handle a large amount of networks.  Sufficient powerful software to handle and control newtwork activities.  Cost and maintenance.
  • 40. Peer-to-peer (P2P) network nodes have equal authority and can act as both clients and servers. The most common way to share games, movies, and music over the Internet is to use a P2P network. Peers make a portion of their resources, such as processing power, disk storage or network bandwidth, directly available to other network participants, without the need for central coordination by servers or stable hosts. A peer is both supplier and consumer of resources.  P2P’s popularity  Easy and inexpensive (often free).  Security and trust: route attacks and malware (virus, trojan,...)
  • 41. Distributed processing network: processing capability (parts of a software system) is located and shared at different nodes or locations. Common for decentralized organizations where divisional offices have their own computer systems. Components located on networked computers communicate and coordinate their actions by passing “messages”. Sometimes referred to as concurring or parallel processing. Examples: Massively multiplayer online games, telephone networks, Virtual Reality communities, aircraft and industrial control systems.  Easier to manage and expand than a single powerful system.  Synchronization issues.
  • 42. Summary of network strategies
  • 43. Organizational Networks Computer networks in organizations have evolved over time. Most large organizations have a complex and wide range of different network configurations, operating systems, and strategies. These organizations face the challenge of making these networks work together effectively and securely. Internet Technologies Many organizations today employ Internet technologies to support effective communication within and between organizations using intranets and extranets.
  • 44.
  • 45. Intranet: a private network within an organization that resembles the Internet. Like the public Internet, intranets use browsers, Web sites, and Web pages. Typical applications: web publishing including telephone directories, e-mail addresses, employee benefit information, internal job openings, news feeds, job policies, business standards, training… Employees discuss key issues in an intranet forum application for new ideas in management, productivity and quality.  Productivity.  Time saving (information delivered on an as-needed basis).  Communication for enhancing collaboration.  Immediate updates.
  • 46. Extranet: a private network that connects more than one organization. Many organizations use Internet technologies to allow business partners limited access to their networks with the purpose of increasing efficiency and reducing costs.  Exchange of large volumes of data using Electronic Data Interchange (EDI).  Share product catalogs exclusively with trade partners.  Cost for setting up and maintaining.  Security when hosting valuable and proprietary information.
  • 47. Network Security Large organizations face the challenge of ensuring that only authorized users have access to network resources. It consists of the policies adopted to prevent and monitor authorized access, misuse modification, or denial of a computer network and network-accessible resources. Securing large computer networks requires specialized technology. Three technologies commonly used to ensure network security are firewalls, intrusion detection systems, and virtual private networks.
  • 48. A firewall: hardware + software that control access to a company’s intranet and other internal networks. Most use a special computer or software called a Proxy Server. All communications between the company’s internal networks and the outside world pass through this server. By evaluating the source and the content of each communication, the proxy server decides whether it is safe to let a particular message or file pass into or out of the organizations’ network.
  • 49. Intrusion detection systems (IDS) Can be a device or a software. Work with firewalls to protect an organization’s network. These systems use sophisticated statistical techniques to analyze all incoming and outgoing network traffic. Using advanced pattern matching and heuristics, an IDS system can recognize signs of a network attack and disable access before an intruder can do damage. Network or Host based IDS: NIDS, HIDS. Virtual private networks ( VPN ) create a secure private connection between a remote user and an organization’s internal network. Special VPN protocols create the equivalent of a dedicated line between a user’s home or laptop computer and a company server. The connection is heavily encrypted and, from the perspective of the user, it appears that their workstation is actually located on the corporate network.