Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Wake-on-LAN wikipedia , lookup
Network tap wikipedia , lookup
Computer network wikipedia , lookup
Airborne Networking wikipedia , lookup
Zero-configuration networking wikipedia , lookup
Distributed firewall wikipedia , lookup
Cracking of wireless networks wikipedia , lookup
List of wireless community networks by region wikipedia , lookup
Chapter 6 Data Communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke This Could Happen to You Dee needs to decide where she will run the blog – – – It needs to be private to maintain a competitive advantage Sales people need to have easy access Passwords may be needed to restrict access Emerson has a private network – – Protected by firewall Employees access through VPN 6-2 Can be protected from unauthorized access Sales people can access with same password they already use © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Study Questions 6-3 What is a computer network? What are the components of a LAN? What are the alternatives for a WAN? How does encryption work? What is the purpose of a firewall? What is a VPN and why is it important? How does the knowledge in this chapter help Dee? © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Is a Computer Network? Network – – Three basic types – – – 6-4 Collection of computers Communicate with one another over transmission line Local area network (LAN) Wide area network (WAN) Internet © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke LAN Connects computers residing in single location – – – 6-5 2 to several hundred computers One geographic area Communication lines can be placed where the organization wants © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke WAN Connect computers in different geographical areas – Uses communication networks from vendors – 6-6 Two or more cities Licensed by government © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Internet Network of networks Connect LANs, WANs, and other internets Private networks of networks Use a variety of communication methods and conventions – Seamless flow of data provided by layered protocol 6-7 Set of rules that communicating devices follow © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Are the Components of a LAN? Local area network – – – Computers connected on single company site Usually located within half mile area Property controlled by company operating network Components – Switch – Special purpose computer that receives and transmits messages Network interface card (NIC) 6-8 Company can run cabling as necessary Hardware that connects each device’s circuitry to the cable Onboard NIC or card that fits into an expansion slot © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke NIC Devices MAC address – Unique identifier Media connections – Unshielded twisted pair (UTP) cable – Optical fiber cables 6-9 RJ-45 connector Light rays reflected inside glass core surrounded by cladding Uses ST and SC connectors © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke IEEE 802.3 Protocol Ethernet protocol standard – – – – – 6-10 Specifies hardware characteristics Describes how messages are packages Determines how messages are processed Operates at Layers 1 and 2 of TCP/IP-OSI architecture Personal computers usually support 10/100/1000 Ethernet © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke LANs with Wireless Connections Wireless NIC (WNIC) LAN operation – – – NICs operate on 802.3 protocol WNICs operate on 802.11 protocol WNICS connect to access point (AP) 6-11 AP processes both standards © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Are the Alternatives for a WAN? WANs connect computers at separate sites – – Internet service provider (ISP) – – – 6-12 No cabling between sites Cable connections made through licensed communications companies Provides legitimate Internet address Serves as gateway to Internet Pay for Internet © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Connecting to the ISP Connections made through: – – – All require digital data to be converted to analog – 6-13 Regular telephone lines Use of DSL line Cable TV lines Modem makes conversion © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke MIS In Use: Larry Jones (Student) Network Services Larry set up LAN networks Realized that he had to offer support – – Coupled installation with support package – 6-14 Customers had problems Customers needed to add more devices Extra charges for support beyond normal wear and tear © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Dial-Up Modems 6-15 Handles conversion between analog and digital Connection made by dialing ISP Maximum transmission speed of 56kbps Modulation governed by V.34, V.90. or V.92 standards PPP controls message packaging and handling © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke DSL Modems Operates over telephone lines Do not interfere with voice telephone service Faster data transmission than dial-up Connection always maintained Use their own Layer 1 and 2 protocols Download and upload speeds vary – – 6-16 Asymmetric digital subscriber lines (ADSL) Symmetrical digital subscriber lines (SDSL) © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Cable Modems Provide high-speed data transmission Use cable television lines – – – – High-capacity optical fiber cable run to neighborhood distribution center Television cables connect at distribution center and runs to subscribers Does not interfere with television transmission Up to 500 subscribers connected at each center 6-17 Performance varies based on number connected © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Cable Modems, continued Download speed up to 10Mbps, upload up to 256 kbps Operate with Layer 1 and 2 protocols Speeds – Narrowband – Broadband 6-18 Transmission speeds less then 56 kbps Transmission speeds in excess of 256 kbps © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Networks of Leased Lines WAN connects computers located at geographically distributed sites Access devices connect sites to transmission – – Alternative is leasing lines – – – – 6-19 Switch Router T1, T3 Set up as a point-to-point line Only predefined sites can use leased lines Provide low cost per bit transmitted © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Transmission Line Types, Uses, and Speeds Figure 6-11 6-20 © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Problem Solving Guide: Thinking Exponentially Is Not Possible, but… Nathan Myhrvoid claimed that: – – Was writing about growth of magnetic storage Also applies to growth of computer network phenomena Ubiquitous and cheap connectivity is growing exponentially – 6-21 Humans cannot think exponentially Think of fastest linear change and extrapolate from there What are the threats and opportunities? © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Exponential Phenomena Brings Changes Technology doesn’t drive people to do new things Social progress occurs in small, evolutionary, adaptive steps Technology may enable a capability, but people may not want it – – 6-22 People want to do what they are doing more easily They want to solve existing problems Respond by hedging your bets The more time involved, the more potential for error © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Public Switched Data Network (PSDN) Network of computers and leased lines – – Developed and maintained by vendor Time leased on network Utility that supplies network for other companies to lease – Each site leases line to connect to PSDN network at access point 6-23 Point of presence (POP) Saves setup and maintenance activities © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke PSDN Protocols Frame relay – – Asynchronous transfer mode (ATM) – Process speeds from 1 to 156 Mbps Ethernet – 6-24 Process traffic at 56 kbps to 40 Mbps Simplest and easiest to support Operates at speeds of 10 to 40 Gpbs © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Criteria for Comparing WANs Costs – Setup costs – Operational costs – Examples: lease fees, ISP charges, training Maintenance costs 6-25 Examples: costs of acquiring lines and equipment Examples: periodic maintenance, repair, upgrades © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Criteria for Comparing WANs, continued Performance – – – – – – 6-26 Speed Latency Availability Loss rate Transparency Performance guarantees Growth potential Length of contract commitment © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Security Guide: How Does Encryption Work? Encryption – – – Process of transforming clear text into coded text Used for secure storage or communication Uses algorithms Key – – Used to encrypt data Algorithm applies key to produce coded message 6-27 DES, 3DES, AES Symmetric encryption Asymmetric encryption © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Security Guide: How Does Encryption Work?, continued Public key/private key – – – – Public key used to encrypt messages Public key sent to other party to encode messages to be sent back Decoded with private key Complex and slow HTTPS – Secure communication over Internet 6-28 Encrypted using SSL/TLS protocol Encodes messages using Web site’s public key, decoded with private key © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Is the Purpose of a Firewall? Computer device that prevents unauthorized network access May be special-purpose computer or program Organizations may have multiple firewalls – – – – 6-29 Perimeter firewalls sit outside organizational network Internal firewalls are inside network Packet-filtering firewalls examine source address, destination address, and other data before allowing message to pass May filter both incoming and outgoing messages Access control list (ACL) encodes rules stating what packets are allowed or prohibited © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke What Is a VPN and Why Are VPNs Important? Virtual private network – – – Uses Internet or private network to create appearance of point-to-point connections Uses public Internet to create appearance of private network Client and server have point-to-point connection called tunnel – 6-30 Private pathway over shared network Secure, encrypted communications © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Ethics Guide: Human Networks Matter More Six degrees of separation – Often unaware of those in the chain Build personal human networks for success – – Someone, somewhere that you need to know or will need to know Meet people at professional and social situations – Social network theory 6-31 Pass out and collect cards Converse to expand network Look for new channels Weak and strong ties © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Does the Knowledge in This Chapter Help Dee? Dee and salespeople use thin client computers – – Client computers contain VPN client software – – – – 6-32 Dee creates blog entries on Web pages using Moveable Type Salespeople use pages served by Moveable Type Interacts with VPN server via Internet Secure, private connections Firewalls stop traffic not addressed to VPN server Salespeople know how to use VPN © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Does the Knowledge in This Chapter Help Dee?, continued IT department cannot schedule resources to setup blog server in timely fashion – Will not allow outside person to do setup Consultant can create server on unprotected test server – – – Can be copied onto network server after acceptance Requires some internal IT labor Consultant could include Trojan horse virus or malware 6-33 Would then have access to system Install only software from known sources Code should not reside on production server © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke How Does the Knowledge in This Chapter Help Dee?, continued Dee negotiates with IT department – – – – 6-34 Threatens to set up own system of user Ids and passwords Says she will set up blog on public server Would cause confusion that would add to IT department’s work Her proposal is the lesser of two evils © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Active Review 6-35 What is a computer network? What are the components of a LAN? What are the alternatives for a WAN? How does encryption work? What is the purpose of a firewall? What is a VPN and why is it important? How does the knowledge in this chapter help Dee? © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke