Telecommunications and Networking. Learning Objectives 1.Understand the concept of a network....

50
Telecommunicatio Telecommunicatio ns and ns and Networking Networking

Transcript of Telecommunications and Networking. Learning Objectives 1.Understand the concept of a network....

Telecommunications Telecommunications and Networkingand Networking

Learning ObjectivesLearning Objectives

1.1. Understand the concept of a network.Understand the concept of a network.

2.2. Apply Metcalfe’s law in understanding the value Apply Metcalfe’s law in understanding the value of a network.of a network.

3.3. Identify several major developments and trends Identify several major developments and trends in the industries, technologies, and business in the industries, technologies, and business applications of telecommunications and Internet applications of telecommunications and Internet technologies.technologies.

4.4. Examples of the business value of Internet, Examples of the business value of Internet, intranet, and extranet applications.intranet, and extranet applications.

Learning ObjectivesLearning Objectives

5.5. Identify the basic components, functions, and types Identify the basic components, functions, and types of telecommunications networks used in business.of telecommunications networks used in business.

6.6. Explain the functions of major components of Explain the functions of major components of telecommunications network hardware, software, telecommunications network hardware, software, media, and services.media, and services.

7.7. Explain the concept of client/server networking.Explain the concept of client/server networking.

8.8. Understand the two forms of peer-to-peer Understand the two forms of peer-to-peer networking.networking.

9.9. Explain the difference between digital and analog Explain the difference between digital and analog signals.signals.

Learning ObjectivesLearning Objectives

10.10.Identify the various transmission media Identify the various transmission media and topologies used in telecommunications and topologies used in telecommunications networks.networks.

11.11.Understand the fundamentals of wireless Understand the fundamentals of wireless network technologies.network technologies.

12.12.Explain the concepts behind TCP/IP.Explain the concepts behind TCP/IP.

13.13.Understand the seven layers of the OSI Understand the seven layers of the OSI network model.network model.

Network ConceptsNetwork Concepts

NetworkNetwork– An interconnected chain, group or systemAn interconnected chain, group or system

Number of possible connections on a network Number of possible connections on a network is N * (N-1)/2is N * (N-1)/2– Where N = number of nodes (points of Where N = number of nodes (points of

connections on the network)connections on the network)– Example, if there are 10 computers on a network, Example, if there are 10 computers on a network,

there are 10 * 9/2 = 45 possible connections there are 10 * 9/2 = 45 possible connections

TelecommunicationsTelecommunications

TelecommunicationsTelecommunications– Exchange of information in any form (voice, Exchange of information in any form (voice,

data, text, images, audio, video) over networksdata, text, images, audio, video) over networks

Basic conceptsBasic concepts Communication protocols (TCP/IP)Communication protocols (TCP/IP) Data transmission methodsData transmission methods

– AsynchronousAsynchronous

– SynchronousSynchronous

ConnectingConnecting– Modem Modem

– Hardwired and remoteHardwired and remote

Data transmission channels (bps)Data transmission channels (bps)– narrow bands: 5-30narrow bands: 5-30

– voice bands: 1,000-9,600voice bands: 1,000-9,600

– broad bands: 100,000broad bands: 100,000

Types of communication linesTypes of communication lines– simplexsimplex

– half-duplexhalf-duplex

– duplexduplex

NetworksNetworks ConceptConcept

– "a group of interconnected computers, workstations, or computer devices "a group of interconnected computers, workstations, or computer devices (such as printers and data storage systems).”(such as printers and data storage systems).”

Network topologyNetwork topology

– busbus– starstar

– ringring

Local-area networksLocal-area networks– bus: bus: Ethernet, Ethernet, carrier sense multiple access (CSMA)carrier sense multiple access (CSMA)– ring: token passing methodring: token passing method

Distributed data processingDistributed data processing– "interconnects sites of one organization not only for communication of data "interconnects sites of one organization not only for communication of data

and messages but also for and messages but also for

the sharing of resources."the sharing of resources."

Open SystemsOpen Systems

Information systems that use common standards for Information systems that use common standards for hardware, software, applications and networkshardware, software, applications and networks

Internet networking technologies are a common standard for Internet networking technologies are a common standard for open systemsopen systems

ConnectivityConnectivity: : – Ability of networked computers to easily access and Ability of networked computers to easily access and

communicate with each other and share informationcommunicate with each other and share information InteroperabilityInteroperability::

– The ability of an open system to enable end user applications The ability of an open system to enable end user applications to be accomplished using different varieties of computer to be accomplished using different varieties of computer systems, software packages, and databases provided by a systems, software packages, and databases provided by a variety of interconnected networksvariety of interconnected networks

MiddlewareMiddleware

Any programming that serves to “glue Any programming that serves to “glue together” two separate programstogether” two separate programs

Internet2Internet2

Next generation of the InternetNext generation of the Internet High-performance networkHigh-performance network In use at 200 universities, scientific In use at 200 universities, scientific

institutions, communications corporationsinstitutions, communications corporations

Internet Service ProviderInternet Service Provider

ISPISP– A company that specializes in providing easy A company that specializes in providing easy

access to the Internetaccess to the Internet– For a monthly fee, you get software, user name, For a monthly fee, you get software, user name,

password and accesspassword and access

ISPs are connect to one another through ISPs are connect to one another through network access pointsnetwork access points

An Intranet Also look at fig 6.8An Intranet Also look at fig 6.8

A network inside an organizationA network inside an organization– That uses Internet technologies (such as Web That uses Internet technologies (such as Web

browsers and servers, TCP/IP protocols, HTML, browsers and servers, TCP/IP protocols, HTML, etc.)etc.)

– To provide an Internet-like environment within To provide an Internet-like environment within the organizationthe organization

– For information sharing, communications, For information sharing, communications, collaboration and support of business processescollaboration and support of business processes

– Protected by security measures Protected by security measures – Can be accessed by authorized users through the InternetCan be accessed by authorized users through the Internet

Extranet (also look at fig 6.9)Extranet (also look at fig 6.9)

Network links that use Internet technologiesNetwork links that use Internet technologies– To connect the Intranet of a businessTo connect the Intranet of a business– With the Intranets of its customers, suppliers or With the Intranets of its customers, suppliers or

other business partnersother business partners

GPSGPS

1.1. The global positioning system (GPS) is a major The global positioning system (GPS) is a major technological achievement that has broad-reaching technological achievement that has broad-reaching implications for business. Using the Internet,implications for business. Using the Internet,

– Can find other innovative uses for GPS.Can find other innovative uses for GPS.– Good places to start familiarizing yourself with Good places to start familiarizing yourself with

current accomplishments arecurrent accomplishments are The GPSWorld site atThe GPSWorld site at http://www.gpsworld.com/gpsworld/ http://www.gpsworld.com/gpsworld/ The GPS Overview at The GPS Overview at

http://www.colorado.edu/geography/gcraft/notes/gps/ghttp://www.colorado.edu/geography/gcraft/notes/gps/gps_f.htmlps_f.html

Telecommunications networkTelecommunications network

Any arrangement where a sender transmits Any arrangement where a sender transmits a message to a receiver over a channel a message to a receiver over a channel consisting of some type of mediumconsisting of some type of medium

Types of NetworksTypes of Networks

WANWAN LANLAN VPNVPN C/SC/S

VPNVPN

Basically, a VPN is a private network that uses a Basically, a VPN is a private network that uses a public network (usually the Internet) to connect public network (usually the Internet) to connect remote sites or users together. Instead of using a remote sites or users together. Instead of using a dedicated, real-world connection such as leased dedicated, real-world connection such as leased line, a VPN uses "virtual" connections line, a VPN uses "virtual" connections routedrouted through the Internet from the company's private through the Internet from the company's private network to the remote site or employee. network to the remote site or employee.

Source: computer.Howstuffworks.comSource: computer.Howstuffworks.com

VPNVPN

Image courtesy Cisco Systems, Inc.

A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or

facilities and individual users connecting from out in the field.

Internetwork ProcessorsInternetwork Processors

SwitchSwitch – makes connections between – makes connections between telecommunications circuits in a networktelecommunications circuits in a network

RouterRouter – intelligent communications processor – intelligent communications processor that interconnects networks based on different that interconnects networks based on different protocolsprotocols

HubHub – a port switching communications – a port switching communications processorprocessor

GatewayGateway – connects networks using different – connects networks using different communications architecturescommunications architectures

ROUTERSROUTERS

Routers are specialized computers that send Routers are specialized computers that send your messages and those of every other your messages and those of every other Internet user speeding to their destinations Internet user speeding to their destinations along thousands of pathways. along thousands of pathways.

Fujitsu GeoStream R980 industrial strength routerFujitsu GeoStream R980 industrial strength router

ROUTERSROUTERS

configuration tableconfiguration table. A configuration table is a collection of . A configuration table is a collection of information, including: information, including:

Information on which connections lead to particular groups of Information on which connections lead to particular groups of addresses addresses

Priorities for connections to be used Priorities for connections to be used Rules for handling both routine and special cases of traffic Rules for handling both routine and special cases of traffic

A router, then, has two separate but related jobs: A router, then, has two separate but related jobs: The router ensures that information doesn't go where it's not The router ensures that information doesn't go where it's not

needed. This is crucial for keeping large volumes of data from needed. This is crucial for keeping large volumes of data from clogging the connections of "innocent bystanders." clogging the connections of "innocent bystanders."

The router makes sure that information does make it to the The router makes sure that information does make it to the intended destination. intended destination.

Computer.howstuffworks.comComputer.howstuffworks.com

Distributed data processingDistributed data processingTSS - Time Sharing Systems

CSS - Client Server Systems

PC

MAINFRAME

PC PC PC

Client/Server networksClient/Server networks

ClientsClients: End user personal computers : End user personal computers or networked computersor networked computers

Interconnected by LANsInterconnected by LANs ServersServers: manage networks: manage networks Processing shared between clients and Processing shared between clients and

serversservers

CSS architectureCSS architecture

PC PC PC PC

L A N

FileServer

PrintServer

Communica- tions Server

RemoteServer

Peer-to-peer networks (p 209)Peer-to-peer networks (p 209)

Networks that connect from one PC to another PCNetworks that connect from one PC to another PC

Peer-to-peer networking enables or enhances the Peer-to-peer networking enables or enhances the following scenarios:following scenarios:

Real-time communications (RTC)Real-time communications (RTC) CollaborationCollaboration Content distributionContent distribution Distributed processingDistributed processing Improved Internet technologiesImproved Internet technologies

Source: www.microsoft.comSource: www.microsoft.com

Wireless TechnologiesWireless Technologies

Terrestrial microwaveTerrestrial microwave– Earthbound microwave systems that transmit Earthbound microwave systems that transmit

high-speed radio signals in a line-of-sight pathhigh-speed radio signals in a line-of-sight path– Between relay systems spaced approximately Between relay systems spaced approximately

30-miles apart30-miles apart

Communications satellitesCommunications satellites– Satellite serves as relay stations for Satellite serves as relay stations for

communications signalscommunications signals– Uses microwave radio signalsUses microwave radio signals

Wireless TechnologiesWireless Technologies

Cellular and PCS telephone and pager systemsCellular and PCS telephone and pager systems– Divide the geographic area into small areas or cellsDivide the geographic area into small areas or cells– Each cell has transmitter or radio relay antenna to send Each cell has transmitter or radio relay antenna to send

message from one cell to anothermessage from one cell to another

Wireless LANsWireless LANs– Radio signals within an office or buildingRadio signals within an office or building– Connect PCs to networksConnect PCs to networks

BluetoothBluetooth– Short-range wireless technologyShort-range wireless technology– To connect PC to peripherals such as printer To connect PC to peripherals such as printer

BluetoothBluetooth

Bluetooth is a standard developed by a group of Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronics manufacturers that allows any sort of electronic equipment -- from computers and electronic equipment -- from computers and cell phonescell phones to to keyboardskeyboards and headphones -- to and headphones -- to make its own connections, without wires, cables or make its own connections, without wires, cables or any direct action from a user. any direct action from a user.

Bluetooth can connect up to Bluetooth can connect up to eight deviceseight devices

simultaneously. With all of those devices simultaneously. With all of those devices

in the same 10-meter (32-foot) radius in the same 10-meter (32-foot) radius

Cell PhonesCell Phones

GSM (CDMA) vs TDMAGSM (CDMA) vs TDMA

Cell vs MobileCell vs Mobile

   GSMGSM CDMACDMA

DigitalDigital YESYES YESYES

Network Type Network Type P-GSM 900 (primary) 900MHz P-GSM 900 (primary) 900MHz bandband

CDMA 800 , 800MHz band (X1 CDMA 800 , 800MHz band (X1 is available.. but is not is available.. but is not being talked about here)being talked about here)

Maximum talk range from a tower (pls. note you will Maximum talk range from a tower (pls. note you will need a carkit for your mobile to achieve these need a carkit for your mobile to achieve these numbers in some cases)numbers in some cases)

35KM (stock cell) 70KM ER , EER 35KM (stock cell) 70KM ER , EER 105KM possible with 105KM possible with special towersspecial towers

Approx 110KMApprox 110KM

Background Noise suppressionBackground Noise suppression YES (Included in EFR)YES (Included in EFR) YESYES

Talk TimeTalk Time Higher due to DTX and the Higher due to DTX and the "pulse" nature of TDMA."pulse" nature of TDMA.

Lower due to CDMA Lower due to CDMA  transmitting all the time. transmitting all the time.

Standby TimesStandby Times Higher due the "pulse" nature of Higher due the "pulse" nature of TDMATDMA

HighHigh

International RoamingInternational Roaming YES (over 138 GSM countries YES (over 138 GSM countries world wide)world wide)

VERY LOW 15?VERY LOW 15?

World wide customersWorld wide customers 200 Mil200 Mil 35 Mil35 Mil

SMSSMS YESYES YESYES

Fax + DataFax + Data YESYES YESYES

Built in "Intelligence"Built in "Intelligence" HIGHHIGH MEDIUMMEDIUM

EDI ConceptsEDI Concepts

EDI is a mechanism for electronic tradingEDI is a mechanism for electronic trading EDI replaces paper flow with online transactionsEDI replaces paper flow with online transactions EDI architectureEDI architecture

----> see next slide----> see next slide

EDI is for trading partnersEDI is for trading partners Implementation plan is a key factorImplementation plan is a key factor Obstacles:Obstacles:

– lack of transaction standardizationlack of transaction standardization– high start-up costshigh start-up costs

EDI third-party suppliersEDI third-party suppliers– AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data

Systems, etc.Systems, etc.

EDI architectureEDI architectureTrading Partner 1 Trading Partner 2

systemtransactions

systemtransactions

standard

transactions

Acq

uisi

tion

Syst

em

Tra

nsac

tion

Con

vert

er

Tra

nsac

tion

Con

vert

er

Ord

er E

ntry

Sys

tem

ORDER ORDER

CONFIRMATIONCONFIRMATION

Network Topologies (p 219)Network Topologies (p 219)

TopologyTopology: structure of a network: structure of a network

StarStar: ties end user computers to a central : ties end user computers to a central computercomputer

RingRing: ties local computer processors : ties local computer processors together in a ring on a relatively equal basistogether in a ring on a relatively equal basis

BusBus: local processors share the same : local processors share the same communications channelcommunications channel

Network Architectures & Network Architectures & ProtocolsProtocols

ProtocolProtocol: standard set of rules and : standard set of rules and procedures for the control of procedures for the control of communications in a networkcommunications in a network

Network Architecture: Network Architecture: – Master plan of standard protocols, hardware, Master plan of standard protocols, hardware,

software and interfaces between end users and software and interfaces between end users and computer systemscomputer systems

– Goal of promoting an open, simple, flexible, and Goal of promoting an open, simple, flexible, and efficient telecommunications environmentefficient telecommunications environment

OSI & TCP/IP Models (p 221)OSI & TCP/IP Models (p 221)

Open Systems Interconnection (OSI)Open Systems Interconnection (OSI) Model Model– A seven-layer model that serves as a standard model A seven-layer model that serves as a standard model

for network architecturesfor network architectures– Model for how messages should be transmitted Model for how messages should be transmitted

between two points in a networkbetween two points in a network– Each layer adds functionsEach layer adds functions

Transmission Control Protocol / Internet Protocol Transmission Control Protocol / Internet Protocol (TCP/IP)(TCP/IP)– A five layer telecommunications protocol used by the A five layer telecommunications protocol used by the

InternetInternet

IPIP

Internet protocolInternet protocol Each system connected to the internet is identified by a 32-bit IP addressEach system connected to the internet is identified by a 32-bit IP address Four numbers separated by a decimalFour numbers separated by a decimalEach represented by octal (8 bits; hence 0-255)Each represented by octal (8 bits; hence 0-255) Ex: 168.212.226.204Ex: 168.212.226.204

Binary format:Binary format:10101000.11010100.11100010.11001100.10101000.11010100.11100010.11001100.

A new protocol IPv6 allows for 128 bit IP addressesA new protocol IPv6 allows for 128 bit IP addresses

to look up an IP address :http://www.kloth.net/services/nslookup.php to look up an IP address :http://www.kloth.net/services/nslookup.php 

to find info: to find info: 

http://www.geobytes.com/IpLocator.htmhttp://www.geobytes.com/IpLocator.htm

Basic Communications ModelBasic Communications ModelStandards are needed at all LayersStandards are needed at all Layers

User Layer

Application Layer

Computer (Transport) Layer

Transmission Layer

Internet TelephonyInternet Telephony

Using an Internet connection to pass voice Using an Internet connection to pass voice data using IP data using IP

Voice over IP (VoIP)Voice over IP (VoIP) Skips standard long-distance phone chargesSkips standard long-distance phone charges

VOIP (source www.fcc.gov)VOIP (source www.fcc.gov)

BandwidthBandwidth

BandwidthBandwidth– Frequency range of a telecommunications Frequency range of a telecommunications

channelchannel– Determines transmission rateDetermines transmission rate– Classified in bits per second (bps)Classified in bits per second (bps)

Transmission Rates:Transmission Rates:– Narrow-bandNarrow-band – low-speed – low-speed– BroadbandBroadband – high-speed – high-speed

WiFiWiFi

WIreless FIdelity (WiFi)-- used generically when referring of WIreless FIdelity (WiFi)-- used generically when referring of any type of 802.11 any type of 802.11

"Wi-Fi Certified" (a registered trademark) by the Wi-Fi "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are Alliance are interoperable interoperable with each other, with each other, even if they are from different manufacturers. A user with a even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any "Wi-Fi Certified" product can use any brand of access point with any other brand of client brand of access point with any other brand of client hardware that also is certifiedhardware that also is certified

http://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.webopedia.com/TERM/W/Wi_Fi.html

Additional ReadingsAdditional Readings

Voice over data networksVoice over data networks Networking Hardware QuizNetworking Hardware Quiz   abcabc of wireless LAN of wireless LAN ISDN TutoriISDN Tutorialal Ethernet tutorialEthernet tutorial Internet ProtocolInternet Protocol Thin clientsThin clients   UNIX/NT integrationUNIX/NT integration Cell phonesCell phones

RWC 1: SAIC, Hewlett-Packard, GE, and Others: RWC 1: SAIC, Hewlett-Packard, GE, and Others: Wireless, Wireless EverywhereWireless, Wireless Everywhere

What are some of the business benefits What are some of the business benefits

associated with using wireless networks to associated with using wireless networks to

collect and transmit data?collect and transmit data?

Benefits would include”Benefits would include” Superfast wireless connections to the Web.Superfast wireless connections to the Web. Cost is about one-fourth of existing costs for Cost is about one-fourth of existing costs for

connection to the Web.connection to the Web. Productivity gains such as a 45% gain at UPS.Productivity gains such as a 45% gain at UPS.

What are some of the challenges being faced in this useWhat are some of the challenges being faced in this useof wireless technologies? What solutions can you of wireless technologies? What solutions can you offer?offer?

Having everyone online in a meeting can be toxic to Having everyone online in a meeting can be toxic to productivity. “No laptop” policies for important meetings.productivity. “No laptop” policies for important meetings.

Enormous pressure within companies to provide Wi-Fi in all Enormous pressure within companies to provide Wi-Fi in all areas of the company. Which employees have compelling areas of the company. Which employees have compelling needs for Wi-Fi accessneeds for Wi-Fi access

Cost exceeds the benefit to be gained by providing Wi-Fi Cost exceeds the benefit to be gained by providing Wi-Fi such as in a manufacturing plant that would require such as in a manufacturing plant that would require numerous additional access points than usual.numerous additional access points than usual.

Security of information available via the Wi-Fi system. Security of information available via the Wi-Fi system. Delay implementation until security assurances are met. Delay implementation until security assurances are met.

The use of wireless networking as The use of wireless networking as described in the case is both innovative and described in the case is both innovative and useful. What other business uses can you useful. What other business uses can you envision for this approach?envision for this approach?

RWC 2: Maryland and Colorado: Serving RWC 2: Maryland and Colorado: Serving Its Citizens Without Using WiresIts Citizens Without Using Wires

1.1. What is the business value of advanced mobile technologies to What is the business value of advanced mobile technologies to Maryland’s emergency management services?Maryland’s emergency management services?

Direct agentsDirect agents toward places where their presence is required toward places where their presence is required

Give Give notice of impending natural disastersnotice of impending natural disasters with forecasts and with forecasts and instructions on how to proceed.instructions on how to proceed.

Improve information gatheringImprove information gathering on the extent and magnitude of on the extent and magnitude of devastation.devastation.

Reduce the amount of manual data-entryReduce the amount of manual data-entry, leading to improved , leading to improved response times and reduction of errors (i.e. address is automatically response times and reduction of errors (i.e. address is automatically captured and pop-up menus limit possible answers).captured and pop-up menus limit possible answers).

In what other government services could In what other government services could GPS serve to provide business value? GPS serve to provide business value? Give some examples.Give some examples.

States’ National Guards, to monitor and direct personnel in States’ National Guards, to monitor and direct personnel in case of an emergency.case of an emergency.

Emergency Services, to direct ambulances, firefighters, Emergency Services, to direct ambulances, firefighters, etc.etc.

Department of Treasury / Federal Reserve, to track the Department of Treasury / Federal Reserve, to track the location of armored trucks both for regular traffic and in location of armored trucks both for regular traffic and in case of a hijacking.case of a hijacking.

The military in general, given that it has one of the largest The military in general, given that it has one of the largest manpower and logistics network in the country.manpower and logistics network in the country.

Are there disadvantages or risks associated with Are there disadvantages or risks associated with the deployment of GPS systems to monitor the deployment of GPS systems to monitor the location of people? Explain. the location of people? Explain.

Invasions of privacyInvasions of privacy

Limitation on the freedom of movementLimitation on the freedom of movement

Could allow not only the government but Could allow not only the government but also private individuals to monitor other also private individuals to monitor other people’s movements.people’s movements.