Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition...
-
Upload
franklin-curtis -
Category
Documents
-
view
217 -
download
0
Transcript of Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition...
![Page 1: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/1.jpg)
Introduction
Chapter 1
Panko’sBusiness Data Networks and Telecommunications, 5th editionCopyright 2005 Prentice-Hall
![Page 2: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/2.jpg)
2
Learning Objectives
By the end of this session, you should be able to
List the eight elements of networks.
Explain the major types of networks in businesses: LANs, WANs, internets, intranets, and extranets.
Discuss major concerns for network managers: staffing, network architecture, standards, security, wireless networking, efficiency, and quality of service (QoS).
Explain the elements and operation of a small home PC network using a LAN
![Page 3: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/3.jpg)
3
Definition
A NETWORK is a system of hardware software and transmission components that allow applications to on different stations within the system communicate with each other
![Page 4: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/4.jpg)
4
AccessLine
Figure 1-2: Elements of a Network
ApplicationApplication
ServerStation
TrunkLine
TrunkLine
Switch
Switch
Switch
Switch
OutsideWorld
ClientStation
Mobile ClientStation
Mobile ClientStation
Message (Frame)
Router
Networks connect stations: clients (fixed and mobile) and serversNetworks connect applications on different stations.Applications are all users care about
Stations (and routers) usually communicateby sending messages called frames
The path a frame takes is called its data link
Switches move frames to or closer to the destination stationSwitches handle a packet sequentiallyRouters connect networks to the outside world. Treated just like stations
Access lines connect stations to switchesTrunk lines connect switches to switches (and routers)
![Page 5: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/5.jpg)
5
Figures 1-6 and 1-7: Workgroup and Core Switches
Small Switches(Stacked):
Workgroup SwitchesTo Link Stations
To Network Central Core Switch
19 inches (48 cm) wide19 inches (48 cm) wide
![Page 6: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/6.jpg)
6
Figure 1-3: Multiplexing in a Packet-Switched Network
ClientStation A
Mobile ClientStation B
Router D
ServerStation C
Trunk linemultiplexes themessages of
differentconversations
AC
ACAC
AC
ACAC
BD
BD
BD
BD
AccessLine
Trunk Line
This reducestrunk line
costs throughcost sharing
by users
![Page 7: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/7.jpg)
7
Figure 1-2: Elements of a Network (Recap)
Applications (the only element that users care about) Stations
Clients Servers
Switches Routers Transmission Lines
Trunk lines Access Lines
Messages (Frames)
Never talk about anInnovation “reducing cost,”
“increasing speed,” etc.without specifyingwhich element ischeaper or faster.
For example, multiplexingonly reduces the cost of
trunk lines; othercosts are not decreased
![Page 8: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/8.jpg)
8
LANs and WANs
LANs transmit data within corporate sites
WANs transmit data between corporate sites
Each LAN or WAN is a single network
WAN
![Page 9: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/9.jpg)
9
Figure 1-5: Local Area Network (LAN) in a Large Building
Multi-floorOffice Building
The bank has multipleLANs—one at each site
![Page 10: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/10.jpg)
10
Figure 1-5: Local Area Network (LAN) in a Large Building, Continued
Router Core Switch
Workgroup Switch
Workgroup Switch
Wall Jack
ToWAN
![Page 11: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/11.jpg)
11
LAN WAN LAN
Internets
Most firms have multiple LANs and WANs. They must create internets
An internet is a collection of networks connected by routers so that any application on any host on any single network can communicate with any application on any other host on any other network in the internet.
ApplicationApplication
Router Router
![Page 12: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/12.jpg)
12
Figure 1-8: Internet with Three Networks
Host B
Host A
Network XNetwork Y
Network Z
R1
R2
Route A-B
Packet
A packet goes all theway across the internet;
It’s path is its route
![Page 13: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/13.jpg)
13
Figure 1-8: Internet with Three Networks, Continued
Messages in single networks (LANs or WANs) are called frames
Message in internets are called packets Travel from the source host to the destination host
across the entire internet
Within a single network, the packet is encapsulated in (carried in) the network’s frame
Packet
Frame
Truck(frame)
Package(Packet)
![Page 14: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/14.jpg)
14
Figure 1-8: Internet with Three Networks, Continued
Host A
Mobile ClientHost
ServerHost
Switch
SwitchX2
SwitchX1
Switch
Data LinkA-R1
Router R1
Packet
Frame X
Network X
RouteA-B
Details inNetwork X
![Page 15: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/15.jpg)
15
Figure 1-8: Internet with Three Networks, Continued
Router R1
Router R2
Packet
Frame Y
ToNetwork X
ToNetwork Z
Network Y
Data LinkR1-R2
RouteA-B
Details inNetwork Y
![Page 16: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/16.jpg)
16
Figure 1-8: Internet with Three Networks, Continued
Host B
Mobile ClientHosts
SwitchZ1
Switch
SwitchZ2
Switch
Packet
Frame Z
Network Z
Router R2
Router
Data LinkR2-B
Details inNetwork Z
![Page 17: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/17.jpg)
17
Figure 1-8: Internet with Three Networks, Continued
In this internet with three networks, in a transmission, There is one packet There are three frames (one in each network)
If a packet in an internet must pass through N networks, How many packets will be sent? How many frames must carry the packet?
![Page 18: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/18.jpg)
18
Figure 1-8: Internet with Three Networks, Continued
Lower-case internet is any internet
Upper-case Internet is the global Internet
![Page 19: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/19.jpg)
19
Figure 1-11: The Internet
InternetServiceProvider
For User PC
Internet ServiceProvider
For Webserver
ISP 1 ISP 4
User PC Webserver
NAP = Network Access Point
Router
NAPNAP
NAPISP 2
ISP 3
The Internet Backbone(Multiple Carriers)
AccessLine
AccessLine
![Page 20: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/20.jpg)
20
Figures 1-9 and 1-10: Routers
Small RoutersStacked
For Branch Offices
Large Routersfor Large Sites and ISPs
19 inches (48 cm) wide19 inches (48 cm) wide
![Page 21: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/21.jpg)
21
Figure 1-12: The Internet, internets, Intranets, and Extranets
internets versus the Internet
Intranets Internal internet for use within an organization Based on the TCP/IP standards created for the
Internet
Extranets Connect multiple firms
Only some computers from each firm are on the extranet
Use TCP/IP standards
![Page 22: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/22.jpg)
22
Recap
Switches versus Routers Switches move frames through single networks
(LANs or WANs)
Routers move packets through internets
Messages Messages in single networks are called frames
Messages in internets are called packets
Packets are encapsulated within frames
![Page 23: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/23.jpg)
23
End Day 1
![Page 24: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/24.jpg)
24
Day 2
![Page 25: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/25.jpg)
25
Review
List the 8 common elements of a network Explain difference between a message and a packet Explain difference between switch and router Difference between trunk and access lines Given an internet, indicate number of frames,
packets, networks traversed for message from A to B
Different types of addresses
![Page 26: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/26.jpg)
26
Figure 1-23: Logical Functions of the Access Router
DHCPServer
Function
Router Function
NATFunction
Switch Function
Access Router
CableModem
![Page 27: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/27.jpg)
27
Figure 1-24: Ethernet Switch Operation
Switching TablePort Host 10 A1-44-D5-1F-AA-4C13 B2-CD-13-5B-E4-6515 C3-2D-55-3B-A9-4F16 D4-47-55-C4-B6-9F
UTP
UTPUTPUTP
Ethernet Switch
A1-44-D5-1F-AA-4C B2-CD-13-5B-E4-65
D4-47-55-C4-B6-9F
C3-2D-55-3B-A9-4F
Frame To C3…Frame To C3…
![Page 28: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/28.jpg)
28
Figure 1-25: Frames and Packets
InternalRouter
Packet inDOCISFrame
Access Router
CableModem
Packet inEthernet Frame
A1-BD-33-6E-C7-BBIP address = 192.168.0.3
PC in Emily’s Room
B2-CD-13-5B-E4-65IP address = 192.168.0.2
PC in Study
Packet is alwayscarried (encapsulated)
in a frame
![Page 29: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/29.jpg)
29
Figure 1-26: Dynamic Host Configuration Protocol (DHCP)
Access Router
CableModem
A1-BD-33-6E-C7-BBPC in Emily’s Room
B2-CD-13-5B-E4-65PC in Study
ISPDHCPServer
1.IP Address =60.47.112.6
A DHCP Serverprovides User PCs witha temporary IP Address
each time the userconnects to the Internet
The ISP onlyGives each home aSingle IP address
![Page 30: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/30.jpg)
30
Figure 1-26: Dynamic Host Configuration Protocol (DHCP), Continued
InternalDHCPServer
Access Router
CableModem
A1-BD-33-6E-C7-BBIP address = 192.168.0.3
PC in Emily’s Room
B2-CD-13-5B-E4-65IP address = 192.168.0.2
PC in Study
ISPDHCPServer
1.IP Address =60.47.112.6
2. IP Address =192.168.0.2
2. IP Address =192.168.0.3
The access router’sInternal DHCP server
Gives private IPAddresses to each PC
![Page 31: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/31.jpg)
31
Figure 1-27: Network Address Translation (NAT)
Access Router
CableModem
WebserverIP address=123.7.86.285
1. Packet from192.168.0.2
InternalNAT
Module
PC in Study192.168.0.2
2. Packet from60.47.112.6
The access router’s NATmodule translates between the
private IP addresses andthe single ISP-given IP address
![Page 32: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/32.jpg)
32
Figure 1-27: Network Address Translation (NAT), Continued
Access Router
CableModem
WebserverIP address=123.7.86.285
4. Packet to192.168.0.2
InternalNAT
Module
PC in Study192.168.0.2
3.Packet
to60.47.112.6
![Page 33: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/33.jpg)
33
Figure 1-28: The Domain Name System (DNS), Continued
Host Name IP Address … …… …Voyager.cba.hawaii.edu 128.171.17.13… …
DNS Table
DNSHost
OriginatingHost’s DNS
Resolver
DNS Request Message“The host name is Voyager.cba.hawaii.edu”
DNS Response Message“The IP address is 128.171.17.13”
![Page 34: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/34.jpg)
34
Figure 1-29: Converting Binary IP Addresses to Dotted Decimal Notation
BinaryIP Address 01111111101010110001000100001101
8-Bit Segments
01111111 10101011 00010001 00001101
Convert Segmentsto Decimal
127 171 17 13
Dotted Decimal Notation
127.171.17.13
![Page 35: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/35.jpg)
35
Elements of a Network
ClientStation
Mobile ClientStation
ApplicationApplication
ServerStation
Router
Mobile ClientStation
AccessLine
TrunkLine
Switch
Switch
Switch
Switch
TrunkLine
OutsideWorld
Message (Frame)
![Page 36: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/36.jpg)
36
Figure 1-22: Home Network Access Router
Switch PortsUTP Cords
Run to Stations
WAN PortUTP CordRuns to
Cable Modem
About 4 inches (10 cm) Wide
PowerJack forExternalPower
![Page 37: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/37.jpg)
37
Figure 1-19: Network Interface Cards (NICs) (Photo)
Internal NIC. Installed inside systems unit. Plugged into expansion slot on the mother board.
PC Card NIC. Installed in PC Card slot in notebook and some PDAs.
![Page 38: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/38.jpg)
38
Internal NIC
RJ-45Jack
PCI Connector Pins
![Page 39: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/39.jpg)
39
Computer Mother Board
Mother BoardPCI Slots
for Expansion Boards(NICs, etc.)
Slots for RAM
Slot forMicroprocessor
(Pentium 4)
![Page 40: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/40.jpg)
40
Mother Board and Expansion Boards
ConnectorExpansion Board
(NIC)Expansion
Slots
Mother Board
![Page 41: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/41.jpg)
41
Figure 1-20: Unshielded Twisted Pair (UTP) Cord With RJ-45 Connector (Photo)
8-Pin RJ-45 Connector
4-Pair Unshielded Twisted Pair (UTP)
Industry Standard Pen
UTP Cord
![Page 42: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/42.jpg)
42
Figure 1-21: UTP Cord RJ-45 Connector and Jack
RJ-45 JackOn a Wall
On a Switchor
On a NIC
RJ-45Connector
UTP Cord---
About as thickas a pencil
---Rugged and
Flexible
![Page 43: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/43.jpg)
43
Figure 1-13: Major Network Technical Concerns
Architecture
Standards
Security
Efficiency
Wireless Communication
QoS
![Page 44: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/44.jpg)
44
Figure 1-13: Major Network Technical Concerns
Network Architecture A broad plan for how the firm will connect all of its computers
within buildings (local area networks), between sites (wide area networks), and to the Internet
New systems must fit the rules of the architecture
Scalability – ability to accommodate growth efficiently
Undisciplined growth in the past No overall plan
Legacy networks
Use obsolete technologies that do not fit the long-term architecture
Too expensive to replace quickly; must live with many for awhile
![Page 45: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/45.jpg)
45
Figure 1-13: Major Network Technical Concerns, Continued
Standards Standards govern message interactions between pairs of
entities (Figure 1-14) For example, HTTP request and response messages for WWW
access
Standards create competition This reduces costs
It also stimulates the development of new features
Protects the business if the main vendors go out of business
![Page 46: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/46.jpg)
46
Figure 1-13: Major Network Technical Concerns, Continued
Security
A Major ProblemMany attacks
Growing trend toward criminal attackers
![Page 47: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/47.jpg)
47
Figure 1-15: Firewalls
Log File
LegitimateHost
Attacker
LegitimatePacket
BorderFirewall
HardenedServer
Allowed Legitimate Packet
HardenedClient PC
InternalCorporateNetwork
Border firewallshould pass
legitimate packets
![Page 48: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/48.jpg)
48
Figure 1-15: Firewalls, Continued
Log File
LegitimateHost
AttackerAttack PacketBorderFirewall
DeniedAttackPacket
Network ManagementConsole
HardenedServer
HardenedClient PC
InternalCorporateNetwork
Border firewallshould deny (drop)
and logattack packets
![Page 49: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/49.jpg)
49
Figure 1-13: Major Network Technical Concerns, Continued
Security Virtual Private Networks (VPNs) (Figure 1-16)
Provide communication over the Internet with added security
Cryptographic protection for confidentiality (eavesdroppers cannot read)
Cryptographic authentication (confirms sender’s identity)
![Page 50: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/50.jpg)
50
Figure 1-16: Virtual Private Networks (VPNs)
VPNGateway
InternalServer
CorporateSite A
CorporateSite B
VPNGateway
RemoteClient PC 2
Site-to-Site VPNUsing Gateway
Internet
Host-to-HostVPN
Remote AccessVPN UsingGateway
ClientPC 1
Remote Client PC 3
![Page 51: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/51.jpg)
51
Figure 1-13: Major Network Management Concerns, Continued
Wireless Communication
To improve mobility
Drive-by hackers can eavesdrop on internal communication
Drive-by hackers can break into the network bypassing firewalls Drive-By Hacker
![Page 52: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/52.jpg)
52
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service (QoS) Numerical objectives for performance Transmission speed in bits per second (bps)
A bit is a single one or zero NOT bytes per second
Increase by factors of 1000, not 1024 kilobits per second (kbps)—lower-case k Megabits per second (Mbps) Gigabits per second (Gbps) Terabits per second (Tbps)
QoS
![Page 53: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/53.jpg)
53
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service For Transmission Speed, have 1 to 3 places
BEFORE the decimal point. Example
.5 Mbps is wrong 500 kbps is correct
Example 2,300 Mbps is wrong 2.3 Gbps is correct
Example 473.2 Mbps is correct
![Page 54: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/54.jpg)
54
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service
Typical transmission speeds in most firms:
LANs: 100 Mbps to each desktop
WANs: most site-to-site links only are 56 kbps to a few megabits per second because long-distance transmission is very expensive and so must be used more sparingly
LANs:100 Mbps
WANs:56 kbpsto a fewMbps
![Page 55: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/55.jpg)
55
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service
Congestion, Throughput, Latency, and Response Time
Congestion: when there is too much traffic for the network’s capacity
Throughput: The speed users actually see (often much less than rated speed)
Individual throughput is less than total throughput on shared-speed links
![Page 56: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/56.jpg)
56
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service Congestion, Throughput,
Latency, and Response TimeLatency: delay (usually
measured in milliseconds or ms)
Within corporations, latency is typically under 60 ms 90% of the time
On the Internet, typically 30 ms to 150 ms
![Page 57: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/57.jpg)
57
Figure 1-13: Major Network Technical Concerns, Continued
Quality of Service Congestion, Throughput, Latency, and Response
TimeResponse Time
The time to get a response after a user issues a command
A quarter second or less is good
![Page 58: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/58.jpg)
58
Figure 1-13: Major Network Technical Concerns, Continued
Availability Availability is the percentage of
time a network can be used
Downtime: when the user cannot use the network
Want 24x7 availability
Telephone network gives 99.999% availability
Typical networks reach 98% today
![Page 59: Introduction Chapter 1 Panko’s Business Data Networks and Telecommunications, 5 th edition Copyright 2005 Prentice-Hall.](https://reader035.fdocuments.us/reader035/viewer/2022062321/56649db15503460f94aa0b7f/html5/thumbnails/59.jpg)
59
Figure 1-13: Major Network Technical Concerns, Continued
Error Rate
Measured as the percentage of messages damaged or lost
Substantial error rates can disrupt applications
Substantial error rates generate more network traffic because of retransmissions