Post on 19-Jan-2016
description
transcript
Chapter 5Chapter 5
Telecommunication and Networks
Chapter 5 Slide 2
Telecommunication Principles and ApplicationsTelecommunication Principles and Applications
Communication• The exchange of information between two
parties
Telecommunication• Communication at a distance
Chapter 5 Slide 3
Telecommunication Principles and ApplicationsTelecommunication Principles and Applications
Dimensions of Telecommunication• Distance significantly affects options for
communication • Organizational context establishes the
nature of the relationships between the communicating parties
Chapter 5 Slide 4
Dimensions of TelecommunicationDimensions of Telecommunication
Dimension Possible Values
Distance
Face-to-face
Building or campus
Metropolitan area
Wide area
Organizational Context
Organizational members only
Organizational members and partners
Public
Human/Computer Context
Human/Human
Human/Computer (Input/Output)
Computer/Computer
Chapter 5 Slide 5
Telecommunication Principles and ApplicationsTelecommunication Principles and Applications
Telecommunication Process• Sender initiates message communication • Device puts sender’s message onto a
telecommunication medium • Telecommunication medium transfers
message to receiver’s location
Chapter 5 Slide 6
Telecommunication Principles and ApplicationsTelecommunication Principles and Applications
Telecommunication Process• Device takes message off the
communication medium • Recipient receives the message
Chapter 5 Slide 7
Telecommunication Principles and ApplicationsTelecommunication Principles and Applications
Types of Business Applications• Coordination of business activities• Group decision making• Electronic commerce
Chapter 5 Slide 8
Telecommunication InfrastructureTelecommunication Infrastructure
Communication Carriers• Telephone Carriers
Local Exchange Carriers (LECs)Long Distance Carriers
• Cellular Services• Cable Providers• Value Added Networks (VANs)
Resells transmission capacity with additional services
Chapter 5 Slide 9
Telecommunication InfrastructureTelecommunication Infrastructure
International Issues• Monopoly government providers in many
countries• Decreasing regulation worldwide• Cross-border data flow regulations• Differences in privacy rules
Chapter 5 Slide 10
Telecommunication TechnologyTelecommunication Technology
Standards• Characteristics of telecommunications
media, hardware, and software
Open Systems Interconnection (OSI) Model• Provides a framework for thinking about
communication standards
Chapter 5 Slide 11
Telecommunication TechnologyTelecommunication Technology
The Computer/Medium Interface• Modem
Converts digital computer output to signal needed for transmission and vice versa
• Adaptor/NICInterface between computer and a network
Chapter 5 Slide 12
Telecommunication TechnologyTelecommunication Technology
Transmission Media• Twisted pair wire• Coaxial cable• Fiber optic cable• Microwave signals• Infrared signals• Radio signals
Chapter 5 Slide 13
Telecommunication TechnologyTelecommunication Technology
Switching and Routing Technologies• Devices
HubSwitchRouterGateway
• ProtocolStandard for how a message is packaged,
secured, sent routed, received, and acknowledged by the receiver within a network
Chapter 5 Slide 14
Telecommunication TechnologyTelecommunication Technology
LAN Protocols• Ethernet• Token ring• Wi-Fi• Bluetooth
Chapter 5 Slide 15
Telecommunication TechnologyTelecommunication Technology
Figure 5-9
Chapter 5 Slide 16
Telecommunication TechnologyTelecommunication Technology
WAN Services• Leased lines• Switched circuit data services• Packet switched services• Cellular services
Chapter 5 Slide 17
Internet ConceptsInternet Concepts
Who Manages The Internet?• Companies, individuals, and governments
own pieces of the Internet, but the Internet as a whole has no owners or operators
Chapter 5 Slide 18
Internet ConceptsInternet Concepts
Network Addressing• IP Number
Consists of two parts—a network number and a device number
• Domain NameTranslated to IP number by Domain Name
Servers (DNSs)
Chapter 5 Slide 19
Network ManagementNetwork Management
Simple Network Management Protocol• Defines how network devices maintain and
communicate information about their own activity and performance
Chapter 5 Slide 20
Network ManagementNetwork Management
Network Analyzer• Plugs into a network and analyzes the
traffic that passes by or through it
Chapter 5 Slide 21
Network ManagementNetwork Management
Network Management SoftwareDevice management
Recognizes the devices, including computers and printers, that are connected to the network
Security servicesProvide entry into the network and establish a
relationship between a user and a client station
Chapter 5 Slide 22
Network ManagementNetwork Management
Network Management Software• File services
Provide access to shared files
• Print servicesProvide central access to a common printer
• Fax servicesAllow network users to send or receive a
facsimile electronically
Chapter 5 Slide 23
Network ManagementNetwork Management
Network Management Software• Directory services
Provide an enterprise-wide telephone book that identifies and connects network users to each other and to software
Chapter 5 Slide 24
EnsuringTelecommunication SecurityEnsuringTelecommunication Security
Key: A secret code that can scramble or unscramble a message
Public Key Cryptography• Uses a pair of keys
Message scrambled by one key can only be unscrambled by the other
Chapter 5 Slide 25
EnsuringTelecommunication SecurityEnsuringTelecommunication Security
Figure 5-9 Public Key Cryptography
Chapter 5 Slide 26
EnsuringTelecommunication SecurityEnsuringTelecommunication Security
Public key cryptography ensures• Security• Non-repudiation• Authentication
Requires certificate authority
• Non-repudiationVia digital signature
• Integrity
Chapter 5 Slide 27
EnsuringTelecommunication Security EnsuringTelecommunication Security
Firewall• Hardware and/or software intended to
separate an organization’s intranet, and the data on it, from its extranet and the Internet
Virtual Private Network (VPN)• Simulates a private network by using a
public network, such as Internet, and security protocols
End of Chapter 5End of
Chapter 5
Telecommunication and Networks