Telecommunications and Networking. Learning Objectives 1.Understand the concept of a network....
-
Upload
asher-mckenzie -
Category
Documents
-
view
213 -
download
0
Transcript of Telecommunications and Networking. Learning Objectives 1.Understand the concept of a network....
Learning ObjectivesLearning Objectives
1.1. Understand the concept of a network.Understand the concept of a network.
2.2. Apply Metcalfe’s law in understanding the value Apply Metcalfe’s law in understanding the value of a network.of a network.
3.3. Identify several major developments and trends Identify several major developments and trends in the industries, technologies, and business in the industries, technologies, and business applications of telecommunications and Internet applications of telecommunications and Internet technologies.technologies.
4.4. Examples of the business value of Internet, Examples of the business value of Internet, intranet, and extranet applications.intranet, and extranet applications.
Learning ObjectivesLearning Objectives
5.5. Identify the basic components, functions, and types Identify the basic components, functions, and types of telecommunications networks used in business.of telecommunications networks used in business.
6.6. Explain the functions of major components of Explain the functions of major components of telecommunications network hardware, software, telecommunications network hardware, software, media, and services.media, and services.
7.7. Explain the concept of client/server networking.Explain the concept of client/server networking.
8.8. Understand the two forms of peer-to-peer Understand the two forms of peer-to-peer networking.networking.
9.9. Explain the difference between digital and analog Explain the difference between digital and analog signals.signals.
Learning ObjectivesLearning Objectives
10.10.Identify the various transmission media Identify the various transmission media and topologies used in telecommunications and topologies used in telecommunications networks.networks.
11.11.Understand the fundamentals of wireless Understand the fundamentals of wireless network technologies.network technologies.
12.12.Explain the concepts behind TCP/IP.Explain the concepts behind TCP/IP.
13.13.Understand the seven layers of the OSI Understand the seven layers of the OSI network model.network model.
Network ConceptsNetwork Concepts
NetworkNetwork– An interconnected chain, group or systemAn interconnected chain, group or system
Number of possible connections on a network Number of possible connections on a network is N * (N-1)/2is N * (N-1)/2– Where N = number of nodes (points of Where N = number of nodes (points of
connections on the network)connections on the network)– Example, if there are 10 computers on a network, Example, if there are 10 computers on a network,
there are 10 * 9/2 = 45 possible connections there are 10 * 9/2 = 45 possible connections
TelecommunicationsTelecommunications
TelecommunicationsTelecommunications– Exchange of information in any form (voice, Exchange of information in any form (voice,
data, text, images, audio, video) over networksdata, text, images, audio, video) over networks
Basic conceptsBasic concepts Communication protocols (TCP/IP)Communication protocols (TCP/IP) Data transmission methodsData transmission methods
– AsynchronousAsynchronous
– SynchronousSynchronous
ConnectingConnecting– Modem Modem
– Hardwired and remoteHardwired and remote
Data transmission channels (bps)Data transmission channels (bps)– narrow bands: 5-30narrow bands: 5-30
– voice bands: 1,000-9,600voice bands: 1,000-9,600
– broad bands: 100,000broad bands: 100,000
Types of communication linesTypes of communication lines– simplexsimplex
– half-duplexhalf-duplex
– duplexduplex
NetworksNetworks ConceptConcept
– "a group of interconnected computers, workstations, or computer devices "a group of interconnected computers, workstations, or computer devices (such as printers and data storage systems).”(such as printers and data storage systems).”
Network topologyNetwork topology
– busbus– starstar
– ringring
Local-area networksLocal-area networks– bus: bus: Ethernet, Ethernet, carrier sense multiple access (CSMA)carrier sense multiple access (CSMA)– ring: token passing methodring: token passing method
Distributed data processingDistributed data processing– "interconnects sites of one organization not only for communication of data "interconnects sites of one organization not only for communication of data
and messages but also for and messages but also for
the sharing of resources."the sharing of resources."
Open SystemsOpen Systems
Information systems that use common standards for Information systems that use common standards for hardware, software, applications and networkshardware, software, applications and networks
Internet networking technologies are a common standard for Internet networking technologies are a common standard for open systemsopen systems
ConnectivityConnectivity: : – Ability of networked computers to easily access and Ability of networked computers to easily access and
communicate with each other and share informationcommunicate with each other and share information InteroperabilityInteroperability::
– The ability of an open system to enable end user applications The ability of an open system to enable end user applications to be accomplished using different varieties of computer to be accomplished using different varieties of computer systems, software packages, and databases provided by a systems, software packages, and databases provided by a variety of interconnected networksvariety of interconnected networks
MiddlewareMiddleware
Any programming that serves to “glue Any programming that serves to “glue together” two separate programstogether” two separate programs
Internet2Internet2
Next generation of the InternetNext generation of the Internet High-performance networkHigh-performance network In use at 200 universities, scientific In use at 200 universities, scientific
institutions, communications corporationsinstitutions, communications corporations
Internet Service ProviderInternet Service Provider
ISPISP– A company that specializes in providing easy A company that specializes in providing easy
access to the Internetaccess to the Internet– For a monthly fee, you get software, user name, For a monthly fee, you get software, user name,
password and accesspassword and access
ISPs are connect to one another through ISPs are connect to one another through network access pointsnetwork access points
An Intranet Also look at fig 6.8An Intranet Also look at fig 6.8
A network inside an organizationA network inside an organization– That uses Internet technologies (such as Web That uses Internet technologies (such as Web
browsers and servers, TCP/IP protocols, HTML, browsers and servers, TCP/IP protocols, HTML, etc.)etc.)
– To provide an Internet-like environment within To provide an Internet-like environment within the organizationthe organization
– For information sharing, communications, For information sharing, communications, collaboration and support of business processescollaboration and support of business processes
– Protected by security measures Protected by security measures – Can be accessed by authorized users through the InternetCan be accessed by authorized users through the Internet
Extranet (also look at fig 6.9)Extranet (also look at fig 6.9)
Network links that use Internet technologiesNetwork links that use Internet technologies– To connect the Intranet of a businessTo connect the Intranet of a business– With the Intranets of its customers, suppliers or With the Intranets of its customers, suppliers or
other business partnersother business partners
GPSGPS
1.1. The global positioning system (GPS) is a major The global positioning system (GPS) is a major technological achievement that has broad-reaching technological achievement that has broad-reaching implications for business. Using the Internet,implications for business. Using the Internet,
– Can find other innovative uses for GPS.Can find other innovative uses for GPS.– Good places to start familiarizing yourself with Good places to start familiarizing yourself with
current accomplishments arecurrent accomplishments are The GPSWorld site atThe GPSWorld site at http://www.gpsworld.com/gpsworld/ http://www.gpsworld.com/gpsworld/ The GPS Overview at The GPS Overview at
http://www.colorado.edu/geography/gcraft/notes/gps/ghttp://www.colorado.edu/geography/gcraft/notes/gps/gps_f.htmlps_f.html
Telecommunications networkTelecommunications network
Any arrangement where a sender transmits Any arrangement where a sender transmits a message to a receiver over a channel a message to a receiver over a channel consisting of some type of mediumconsisting of some type of medium
VPNVPN
Basically, a VPN is a private network that uses a Basically, a VPN is a private network that uses a public network (usually the Internet) to connect public network (usually the Internet) to connect remote sites or users together. Instead of using a remote sites or users together. Instead of using a dedicated, real-world connection such as leased dedicated, real-world connection such as leased line, a VPN uses "virtual" connections line, a VPN uses "virtual" connections routedrouted through the Internet from the company's private through the Internet from the company's private network to the remote site or employee. network to the remote site or employee.
Source: computer.Howstuffworks.comSource: computer.Howstuffworks.com
VPNVPN
Image courtesy Cisco Systems, Inc.
A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or
facilities and individual users connecting from out in the field.
Internetwork ProcessorsInternetwork Processors
SwitchSwitch – makes connections between – makes connections between telecommunications circuits in a networktelecommunications circuits in a network
RouterRouter – intelligent communications processor – intelligent communications processor that interconnects networks based on different that interconnects networks based on different protocolsprotocols
HubHub – a port switching communications – a port switching communications processorprocessor
GatewayGateway – connects networks using different – connects networks using different communications architecturescommunications architectures
ROUTERSROUTERS
Routers are specialized computers that send Routers are specialized computers that send your messages and those of every other your messages and those of every other Internet user speeding to their destinations Internet user speeding to their destinations along thousands of pathways. along thousands of pathways.
Fujitsu GeoStream R980 industrial strength routerFujitsu GeoStream R980 industrial strength router
ROUTERSROUTERS
configuration tableconfiguration table. A configuration table is a collection of . A configuration table is a collection of information, including: information, including:
Information on which connections lead to particular groups of Information on which connections lead to particular groups of addresses addresses
Priorities for connections to be used Priorities for connections to be used Rules for handling both routine and special cases of traffic Rules for handling both routine and special cases of traffic
A router, then, has two separate but related jobs: A router, then, has two separate but related jobs: The router ensures that information doesn't go where it's not The router ensures that information doesn't go where it's not
needed. This is crucial for keeping large volumes of data from needed. This is crucial for keeping large volumes of data from clogging the connections of "innocent bystanders." clogging the connections of "innocent bystanders."
The router makes sure that information does make it to the The router makes sure that information does make it to the intended destination. intended destination.
Computer.howstuffworks.comComputer.howstuffworks.com
Distributed data processingDistributed data processingTSS - Time Sharing Systems
CSS - Client Server Systems
PC
MAINFRAME
PC PC PC
Client/Server networksClient/Server networks
ClientsClients: End user personal computers : End user personal computers or networked computersor networked computers
Interconnected by LANsInterconnected by LANs ServersServers: manage networks: manage networks Processing shared between clients and Processing shared between clients and
serversservers
CSS architectureCSS architecture
PC PC PC PC
L A N
FileServer
PrintServer
Communica- tions Server
RemoteServer
Peer-to-peer networks (p 209)Peer-to-peer networks (p 209)
Networks that connect from one PC to another PCNetworks that connect from one PC to another PC
Peer-to-peer networking enables or enhances the Peer-to-peer networking enables or enhances the following scenarios:following scenarios:
Real-time communications (RTC)Real-time communications (RTC) CollaborationCollaboration Content distributionContent distribution Distributed processingDistributed processing Improved Internet technologiesImproved Internet technologies
Source: www.microsoft.comSource: www.microsoft.com
Wireless TechnologiesWireless Technologies
Terrestrial microwaveTerrestrial microwave– Earthbound microwave systems that transmit Earthbound microwave systems that transmit
high-speed radio signals in a line-of-sight pathhigh-speed radio signals in a line-of-sight path– Between relay systems spaced approximately Between relay systems spaced approximately
30-miles apart30-miles apart
Communications satellitesCommunications satellites– Satellite serves as relay stations for Satellite serves as relay stations for
communications signalscommunications signals– Uses microwave radio signalsUses microwave radio signals
Wireless TechnologiesWireless Technologies
Cellular and PCS telephone and pager systemsCellular and PCS telephone and pager systems– Divide the geographic area into small areas or cellsDivide the geographic area into small areas or cells– Each cell has transmitter or radio relay antenna to send Each cell has transmitter or radio relay antenna to send
message from one cell to anothermessage from one cell to another
Wireless LANsWireless LANs– Radio signals within an office or buildingRadio signals within an office or building– Connect PCs to networksConnect PCs to networks
BluetoothBluetooth– Short-range wireless technologyShort-range wireless technology– To connect PC to peripherals such as printer To connect PC to peripherals such as printer
BluetoothBluetooth
Bluetooth is a standard developed by a group of Bluetooth is a standard developed by a group of electronics manufacturers that allows any sort of electronics manufacturers that allows any sort of electronic equipment -- from computers and electronic equipment -- from computers and cell phonescell phones to to keyboardskeyboards and headphones -- to and headphones -- to make its own connections, without wires, cables or make its own connections, without wires, cables or any direct action from a user. any direct action from a user.
Bluetooth can connect up to Bluetooth can connect up to eight deviceseight devices
simultaneously. With all of those devices simultaneously. With all of those devices
in the same 10-meter (32-foot) radius in the same 10-meter (32-foot) radius
http://www1.us.dell.com/content/topics/globahttp://www1.us.dell.com/content/topics/global.aspx/solutions/en/truemobile?c=l.aspx/solutions/en/truemobile?c=us&csus&cs=04&l==04&l=en&sen&s==bsdbsd
GSMGSM CDMACDMA
DigitalDigital YESYES YESYES
Network Type Network Type P-GSM 900 (primary) 900MHz P-GSM 900 (primary) 900MHz bandband
CDMA 800 , 800MHz band (X1 CDMA 800 , 800MHz band (X1 is available.. but is not is available.. but is not being talked about here)being talked about here)
Maximum talk range from a tower (pls. note you will Maximum talk range from a tower (pls. note you will need a carkit for your mobile to achieve these need a carkit for your mobile to achieve these numbers in some cases)numbers in some cases)
35KM (stock cell) 70KM ER , EER 35KM (stock cell) 70KM ER , EER 105KM possible with 105KM possible with special towersspecial towers
Approx 110KMApprox 110KM
Background Noise suppressionBackground Noise suppression YES (Included in EFR)YES (Included in EFR) YESYES
Talk TimeTalk Time Higher due to DTX and the Higher due to DTX and the "pulse" nature of TDMA."pulse" nature of TDMA.
Lower due to CDMA Lower due to CDMA transmitting all the time. transmitting all the time.
Standby TimesStandby Times Higher due the "pulse" nature of Higher due the "pulse" nature of TDMATDMA
HighHigh
International RoamingInternational Roaming YES (over 138 GSM countries YES (over 138 GSM countries world wide)world wide)
VERY LOW 15?VERY LOW 15?
World wide customersWorld wide customers 200 Mil200 Mil 35 Mil35 Mil
SMSSMS YESYES YESYES
Fax + DataFax + Data YESYES YESYES
Built in "Intelligence"Built in "Intelligence" HIGHHIGH MEDIUMMEDIUM
EDI ConceptsEDI Concepts
EDI is a mechanism for electronic tradingEDI is a mechanism for electronic trading EDI replaces paper flow with online transactionsEDI replaces paper flow with online transactions EDI architectureEDI architecture
----> see next slide----> see next slide
EDI is for trading partnersEDI is for trading partners Implementation plan is a key factorImplementation plan is a key factor Obstacles:Obstacles:
– lack of transaction standardizationlack of transaction standardization– high start-up costshigh start-up costs
EDI third-party suppliersEDI third-party suppliers– AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data AT&T, Control Data, EDS, GE, Western Union, IBM, Martin Marietta Data
Systems, etc.Systems, etc.
EDI architectureEDI architectureTrading Partner 1 Trading Partner 2
systemtransactions
systemtransactions
standard
transactions
Acq
uisi
tion
Syst
em
Tra
nsac
tion
Con
vert
er
Tra
nsac
tion
Con
vert
er
Ord
er E
ntry
Sys
tem
ORDER ORDER
CONFIRMATIONCONFIRMATION
Network Topologies (p 219)Network Topologies (p 219)
TopologyTopology: structure of a network: structure of a network
StarStar: ties end user computers to a central : ties end user computers to a central computercomputer
RingRing: ties local computer processors : ties local computer processors together in a ring on a relatively equal basistogether in a ring on a relatively equal basis
BusBus: local processors share the same : local processors share the same communications channelcommunications channel
Network Architectures & Network Architectures & ProtocolsProtocols
ProtocolProtocol: standard set of rules and : standard set of rules and procedures for the control of procedures for the control of communications in a networkcommunications in a network
Network Architecture: Network Architecture: – Master plan of standard protocols, hardware, Master plan of standard protocols, hardware,
software and interfaces between end users and software and interfaces between end users and computer systemscomputer systems
– Goal of promoting an open, simple, flexible, and Goal of promoting an open, simple, flexible, and efficient telecommunications environmentefficient telecommunications environment
OSI & TCP/IP Models (p 221)OSI & TCP/IP Models (p 221)
Open Systems Interconnection (OSI)Open Systems Interconnection (OSI) Model Model– A seven-layer model that serves as a standard model A seven-layer model that serves as a standard model
for network architecturesfor network architectures– Model for how messages should be transmitted Model for how messages should be transmitted
between two points in a networkbetween two points in a network– Each layer adds functionsEach layer adds functions
Transmission Control Protocol / Internet Protocol Transmission Control Protocol / Internet Protocol (TCP/IP)(TCP/IP)– A five layer telecommunications protocol used by the A five layer telecommunications protocol used by the
InternetInternet
IPIP
Internet protocolInternet protocol Each system connected to the internet is identified by a 32-bit IP addressEach system connected to the internet is identified by a 32-bit IP address Four numbers separated by a decimalFour numbers separated by a decimalEach represented by octal (8 bits; hence 0-255)Each represented by octal (8 bits; hence 0-255) Ex: 168.212.226.204Ex: 168.212.226.204
Binary format:Binary format:10101000.11010100.11100010.11001100.10101000.11010100.11100010.11001100.
A new protocol IPv6 allows for 128 bit IP addressesA new protocol IPv6 allows for 128 bit IP addresses
to look up an IP address :http://www.kloth.net/services/nslookup.php to look up an IP address :http://www.kloth.net/services/nslookup.php
to find info: to find info:
http://www.geobytes.com/IpLocator.htmhttp://www.geobytes.com/IpLocator.htm
Basic Communications ModelBasic Communications ModelStandards are needed at all LayersStandards are needed at all Layers
User Layer
Application Layer
Computer (Transport) Layer
Transmission Layer
Internet TelephonyInternet Telephony
Using an Internet connection to pass voice Using an Internet connection to pass voice data using IP data using IP
Voice over IP (VoIP)Voice over IP (VoIP) Skips standard long-distance phone chargesSkips standard long-distance phone charges
BandwidthBandwidth
BandwidthBandwidth– Frequency range of a telecommunications Frequency range of a telecommunications
channelchannel– Determines transmission rateDetermines transmission rate– Classified in bits per second (bps)Classified in bits per second (bps)
Transmission Rates:Transmission Rates:– Narrow-bandNarrow-band – low-speed – low-speed– BroadbandBroadband – high-speed – high-speed
WiFiWiFi
WIreless FIdelity (WiFi)-- used generically when referring of WIreless FIdelity (WiFi)-- used generically when referring of any type of 802.11 any type of 802.11
"Wi-Fi Certified" (a registered trademark) by the Wi-Fi "Wi-Fi Certified" (a registered trademark) by the Wi-Fi Alliance are Alliance are interoperable interoperable with each other, with each other, even if they are from different manufacturers. A user with a even if they are from different manufacturers. A user with a "Wi-Fi Certified" product can use any "Wi-Fi Certified" product can use any brand of access point with any other brand of client brand of access point with any other brand of client hardware that also is certifiedhardware that also is certified
http://www.webopedia.com/TERM/W/Wi_Fi.htmlhttp://www.webopedia.com/TERM/W/Wi_Fi.html
Additional ReadingsAdditional Readings
Voice over data networksVoice over data networks Networking Hardware QuizNetworking Hardware Quiz abcabc of wireless LAN of wireless LAN ISDN TutoriISDN Tutorialal Ethernet tutorialEthernet tutorial Internet ProtocolInternet Protocol Thin clientsThin clients UNIX/NT integrationUNIX/NT integration Cell phonesCell phones
RWC 1: SAIC, Hewlett-Packard, GE, and Others: RWC 1: SAIC, Hewlett-Packard, GE, and Others: Wireless, Wireless EverywhereWireless, Wireless Everywhere
What are some of the business benefits What are some of the business benefits
associated with using wireless networks to associated with using wireless networks to
collect and transmit data?collect and transmit data?
Benefits would include”Benefits would include” Superfast wireless connections to the Web.Superfast wireless connections to the Web. Cost is about one-fourth of existing costs for Cost is about one-fourth of existing costs for
connection to the Web.connection to the Web. Productivity gains such as a 45% gain at UPS.Productivity gains such as a 45% gain at UPS.
What are some of the challenges being faced in this useWhat are some of the challenges being faced in this useof wireless technologies? What solutions can you of wireless technologies? What solutions can you offer?offer?
Having everyone online in a meeting can be toxic to Having everyone online in a meeting can be toxic to productivity. “No laptop” policies for important meetings.productivity. “No laptop” policies for important meetings.
Enormous pressure within companies to provide Wi-Fi in all Enormous pressure within companies to provide Wi-Fi in all areas of the company. Which employees have compelling areas of the company. Which employees have compelling needs for Wi-Fi accessneeds for Wi-Fi access
Cost exceeds the benefit to be gained by providing Wi-Fi Cost exceeds the benefit to be gained by providing Wi-Fi such as in a manufacturing plant that would require such as in a manufacturing plant that would require numerous additional access points than usual.numerous additional access points than usual.
Security of information available via the Wi-Fi system. Security of information available via the Wi-Fi system. Delay implementation until security assurances are met. Delay implementation until security assurances are met.
The use of wireless networking as The use of wireless networking as described in the case is both innovative and described in the case is both innovative and useful. What other business uses can you useful. What other business uses can you envision for this approach?envision for this approach?
RWC 2: Maryland and Colorado: Serving RWC 2: Maryland and Colorado: Serving Its Citizens Without Using WiresIts Citizens Without Using Wires
1.1. What is the business value of advanced mobile technologies to What is the business value of advanced mobile technologies to Maryland’s emergency management services?Maryland’s emergency management services?
Direct agentsDirect agents toward places where their presence is required toward places where their presence is required
Give Give notice of impending natural disastersnotice of impending natural disasters with forecasts and with forecasts and instructions on how to proceed.instructions on how to proceed.
Improve information gatheringImprove information gathering on the extent and magnitude of on the extent and magnitude of devastation.devastation.
Reduce the amount of manual data-entryReduce the amount of manual data-entry, leading to improved , leading to improved response times and reduction of errors (i.e. address is automatically response times and reduction of errors (i.e. address is automatically captured and pop-up menus limit possible answers).captured and pop-up menus limit possible answers).
In what other government services could In what other government services could GPS serve to provide business value? GPS serve to provide business value? Give some examples.Give some examples.
States’ National Guards, to monitor and direct personnel in States’ National Guards, to monitor and direct personnel in case of an emergency.case of an emergency.
Emergency Services, to direct ambulances, firefighters, Emergency Services, to direct ambulances, firefighters, etc.etc.
Department of Treasury / Federal Reserve, to track the Department of Treasury / Federal Reserve, to track the location of armored trucks both for regular traffic and in location of armored trucks both for regular traffic and in case of a hijacking.case of a hijacking.
The military in general, given that it has one of the largest The military in general, given that it has one of the largest manpower and logistics network in the country.manpower and logistics network in the country.
Are there disadvantages or risks associated with Are there disadvantages or risks associated with the deployment of GPS systems to monitor the deployment of GPS systems to monitor the location of people? Explain. the location of people? Explain.
Invasions of privacyInvasions of privacy
Limitation on the freedom of movementLimitation on the freedom of movement
Could allow not only the government but Could allow not only the government but also private individuals to monitor other also private individuals to monitor other people’s movements.people’s movements.