Download Slides with

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Net bias wikipedia , lookup

Distributed firewall wikipedia , lookup

Recursive InterNetwork Architecture (RINA) wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

IEEE 1355 wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

List of wireless community networks by region wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Airborne Networking wikipedia , lookup

Peer-to-peer wikipedia , lookup

Transcript
1
Copyright © 2003 Prentice Hall, Inc
Slides created by Bob Koziel
Tips for using the slide show
 Use MS Power Point XP to view the presentation. Earlier versions
will not show the animations correctly.
 Slides with
: Click the slide to view all of its sections and
animations. Some slides need to be clicked several times.


NEXT
SLIDE
will appear once the last object on the slide has appeared.
Click to go to the next slide.
I
represents an Internet link that will take you to the Web site
when you click on it. Internet connection required.
 Clicking on the
or
icon will take you to the previous or the
next slide.
 Slides with videos or sounds: Click on the picture to view videos or
listen to sounds.
Copyright
Copyright©©2003
2003Prentice
PrenticeHall,
Hall,Inc
Inc
NEXT
SLIDE
2
COMPUTERS IN YOUR FUTURE 2004
by Bryan Pfaffenberger and Bill Daley
Chapter 7
Networks: Communicating and Sharing Resources
Chapter 7
What You Will Learn
Networks: Communicating and Sharing
Resources
 Major types of computer networks
 How computer connections increase the value of an





organizations information technology investment
The importance of protocols in a computer network
Contrast between circuit switching and packet switching,
as well as their strengths and weaknesses
Differences between peer-to-peer and client/server LANs
The most popular LAN protocol and its benefits
Business applications of WANs
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
3
Introducing Computer Networks
 A computer network consists of two or more
computers linked together to exchange data and
share resources.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
4
Types of Computer Networks
Local area network (LAN)
 Links computers within a
building or group of
buildings
 Uses direct cables, radio,
or infrared signals
Wide area network
 Links computers
separated by a few miles
or thousands of miles
 Uses long-distance
transmission media
Copyright © 2003 Prentice Hall, Inc
Metropolitan area network
(MAN)
 Links computers within a
major metropolitan area
 Uses fiber-optic cables
NEXT
SLIDE
5
Networking Synergies in a Nutshell
Reduced hardware
costs
 Users share
equipment
Connected people
 People can work
together without being
at the same location
 Groupware enables
sharing of schedules
and communications
Copyright © 2003 Prentice Hall, Inc
Shared applications
 Users share software
 File server enables all
users to work with the
same application
program
Building information
resources
 Users create common
pools of data that can
be accessed by
employees
NEXT
SLIDE
6
Network Fundamentals
 Physical media used in networks:
 Cables– Telephone lines, coaxial cable,
microwave, satellites, wireless, and fiber optic
cables connect computers.
 Routers– Devices that examine the data
transmitted and send it to its destination.
 Switches– High speed electronic switches
maintain connections between computers.
 Protocols– Standards that specify how network
components communicate with each other.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
7
Switching and Routing Techniques
Packet switching
Circuit switching
 Network creates an endto-end circuit between the
sending and receiving
computers
 Same as voice networks
 Suited to voice and realtime videoconferencing
Copyright © 2003 Prentice Hall, Inc
 Outgoing message is
divided into fixed-size
data units called packets
 Packets are numbered and
addressed to receiving
computer
 Routers examine the
packets and send them to
their destination
NEXT
SLIDE
8
Advantages and Disadvantages of Circuit
and Packet Switching
Advantages
Disadvantages
Circuit switching
Voice and real-time
transmission
No delivery delays
Costly
Need to have direct
electrical connection
between computers to
communicate
Packet switching
Efficient, less
expensive, reliable
Will function if part of
the network is down
Delays in receiving
packets
Not ideal for real-time
voice communication
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
9
Protocols

Protocols are fixed, formalized exchanges that
specify how two dissimilar network components can
establish communication.

Proprietary protocols– Are standards developed and
protected by hardware manufacturers. All hardware
is bought from same manufacturer for the network to
function.

Open protocols– Are nonproprietary protocols. They
are established by independent organizations. Any
hardware supporting the protocols will operate on
the network.

Protocol suite–The total package of protocols that
specify how a network functions.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
10
Network Architecture

Network architecture is the overall design of a
network.
 The network design is divided into layers, each of
which has a function separate from that of the other
layers.
 Protocol stack– The vertical (top to bottom)
arrangement of the layers. Each layer is governed by
its own set of protocols.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
11
Local Area Networks (LANs)
 LANs connect computers and peripherals within a
building or group of buildings.
 Users can access software, data, and peripherals.
 LANs require special hardware and software.
 Computers connected to a LAN are called
workstations or nodes.
 Different types of LANs:
 Peer-to-peer
 Client-server
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
12
LAN Hardware and Software
Hardware
 Network interface card
(NIC)– Inserted into a
computer’s expansion slot
Copyright © 2003 Prentice Hall, Inc
Software
 Operating system that
supports networking
(Unix, Linux, Windows,
Mac OS)
 Additional system
software
NEXT
SLIDE
13
Peer-to-Peer Networks
 All computers on the network are treated as equal.
 There are no file servers.
 Users decide which files and peripherals to share.
 They aren’t suited for networks with many
computers.
 They are easy to set up. Example: Home networks
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
14
Client-Server Networks
 Typical corporate networks are client-server.
 They use various topologies or physical layouts.
 The network requires file servers, networked computers
(clients), and a network operating system (NOS).
 Clients send requests to servers for programs and data,
and to access peripherals.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
15
Network Media
LANs use a variety of media to carry network signals.
 Twisted pair–Two insulated wires twisted around each
other. The same type of wire as that used for telephones.
 Coaxial cable– Consists of an insulated center wire
surrounded by a layer of braided wire. The same type of
wire as that used for cable TV.
 Fiber-optic cable– A type of fiber glass cable that transmits
data in the form of light impulses. It can carry more data for
longer distances than other wire.
 Infrared– A wireless system that includes a transmitter and
receiver for sending and receiving signals.
 Radio– A wireless system that uses radio signals to send
and receive data.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
16
LAN Topologies
 The physical layout of a LAN is called its topology.
 Topologies resolve the problem of contention, which
occurs when multiple users try to access the LAN at the
same time.
 Collisions or corrupt data occur when different
computers use the network at the same time.
Bus topology
Star
Ring
topology
 All
Called
Contains
workstations
daisy
a hub
chain
or
attached
central in a
 circular
Every workstation
wiring
concentrator
arrangement
connected
A
tospecial
Easy
a single
to add
unit
bus
workstations
ofcable
data called a
 token
Resolves
travels
collisions
aroundthrough
the ring
 Workstations
contention management
can only
 transmit
Difficult to
data
addwhen
workstations
they
possess a token
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
17
LAN Technologies
LAN protocols are standards that govern the layers of
the protocol stack.
 Lower-layer protocols deal with contention between
computers.
 Lower-layer protocols:
• Ethernet
• LocalTalk
• Token ring
 Higher-layer protocols handle the network functions.
 Higher-layer protocols:
•
•
•
•
AppleTalk
IPX/SPX
NetBeui
TCP/IP
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
18
Wide Area Networks (WANs)
 WANs are similar to long-distance telephone systems.
 They have a local access number called a point of
presence (POP).
 They contain long-distance trunk lines called backbones.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
19
Point of Presence (POP)
 A point of presence is a WAN network connection
point that enables customers to access the WAN by
making a local telephone call.
 Media used to create a connection from an
organization to a POP include:
 56 Kbps leased line
 ISDN
 ADSL
 T1 line
 Permanent virtual circuit (PVC)
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
20
Backbones

Backbones are high-capacity transmission lines that
carry WAN traffic.
 They are regional, continental, or transcontinental.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
21
WAN Organization
Internet
 Backbone providers charge
fees to Internet Service
Providers (ISPs).
 ISPs sell subscriptions to
users.
 Not secure
 Not ideal for businesses
Public Data Network (PDN)
 A for-profit data
communications network
 Fees paid on a per-bytetransferred basis
 Good security
 High bandwidth
 Used by corporations, banks and
governments
 Not open to the public
Private Data Network  Most secure type of WAN
 Virtual private network– Lines are leased
to a single company
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
22
WAN Protocols

X.25– Oldest packet switching protocol. It is used by
automated teller machines and credit card
authorization devices.

Switched Multimegabit Data Service (SMDS)–
Designed for digital phone lines. Faster data transfer
rates than X.25.

Asynchronous Transfer Mode (ATM)– Newer type of
protocol. It is designed for digital lines.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
23
WAN Applications
LAN-to-LAN
 WANs used to connect LANs
at two or more geographic
locations
 Used to connect branches of
a company into one network
system
Transaction Acquisition
 Information about
transaction instantly relayed
to corporate headquarters
 Uses point-of-sale (POS)
terminal as cash register
Electronic Data Interchange (EDI)
 Standards that specify how companies set up
business-to-business transactions
 Speeds ordering, invoicing, and payments
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
24
Chapter 7 Summary
1. Computer networks link two or more computers to
exchange data and share resources.
2. Three types of computer networks:
A. Local area network (LAN)
B. Metropolitan area network (MAN)
C. Wide area network (WAN)
3. Computer networks:
A. Reduce hardware costs
B. Enable users to share applications
C. Provide a means to pool an organization’s data
D. Foster teamwork
4. Computer networks require physical media such as
telephone wire, coaxial cable, infrared, and radio
signals to connect the computers.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
25
Chapter 7 Summary cont.
5. Network protocols enable the network to function
smoothly.
6. Data is sent through the network by switching and
routing techniques.
7. LAN topologies include:
A. Bus topology
B. Star topology
C. Ring topology
8. Wide area networks are used to link computers
throughout the world.
Copyright © 2003 Prentice Hall, Inc
NEXT
SLIDE
26
THE
END
Copyright © 2003 Prentice Hall, Inc
27