SlideShare a Scribd company logo
Chapter 5 Networks, telecommunications  and the Internet
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Computer networks defined A  computer network   can be defined as: ‘a communications system that links two or more computers and peripheral devices and enables transfer of data between the components’. Small-scale networks within a workgroup or single office are known as  local area networks (LAN).   Larger-scale networks which are national or international are known as  wide area networks (WAN).  The Internet is the best known example of a Wide Area Network.
Figure 5.1  Communications links between different stakeholders in an industry
Business benefits of networks Reduce cost compared with traditional communications.  Reduces time for information transfer  Enables sharing and dissemination of company information  Enables sharing of hardware resources such as printers, backup, processing power.  Promotes new ways of working  Operates geographically separate businesses as one.  Restructures relationships with partners
Disadvantages of networks 1 The initial setup cost may be high, and there may be a considerable period before the costs are paid off. 2 When implementing or updating the network there may be considerable practical difficulties. Deploying cabling can be very disruptive to staff doing their daily work. 3 In the long term, companies become reliant on networks and breaks in service can be very disruptive. For this reason investment in network maintenance is vital. 4 Security is reduced through introducing a network, since there are more access points to sensitive data. Data may also be intercepted when it is transferred from one site to another.
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Client/server model of computing The  client/server  architecture consists of client computers such as PCs sharing resources such as a database stored on more powerful server computers.  Processing can be shared between the clients and the servers. Client/server architecture is significant since most modern networked information systems are based on this structure.
Figure 5.3  Components of a client/server system
Why use client / server ? The adoption of C/S architecture is to “downsize” from large mainframes with   of user terminals which had limited functionality. Rather than all the tasks involved in program execution (other than display) occurring on the mainframe, client/server gives the opportunity for them to be shared between a central server and clients. This gives the potential for faster execution, as processing is distributed across many clients.
Problems to be managed with client/server High cost of ownership  – Although price of PCs is relatively low, support and maintenance cost could be high.  Instability   --C/S technology is often complex and involves integrating different hardware and software components from many different companies. Performance   -- For some mission-critical applications, a smaller server cannot deliver the power required.  Lack of worker focus  – The freedom of choice can lead to non-productive time-wasting, as users rearrange the colours and wallpaper on their desktop rather than performing their regular tasks.
Servers Servers are vital to an information system, since they regulate the flow of information around the network. Network servers run the  network operating system (NOS) ,  the software that is used to manage the network, and are often used to store large volumes of data. The server and NOS together perform the following functions: Maintain security Sharing of peripheral devices Sharing of applications Sharing of information
Servers (Continued) Maintain security  – access to information in files is restricted according to the user name and password issued to users of the network. Sharing of peripheral devices  connected to the network, such as printers and tape drivers. These are often attached directly to the server. Sharing of applications  such as word processors, which do not then need to be stored on the hard drive of the end-user’s computer. The cost of buying applications can be reduced through buying a “site licence”. Sharing of information  – access to this data is maintained by the NOS and it is stored within the hard drive of a server as files or as part of a database.
Examples of different servers Network Contains functions to manage the network resources and control user access File This term is sometimes used to refer to network server functions. It can also indicate that users’ files such as documents and spreadsheets are stored on the network server Print Dedicated print servers have a queue of all documents for which print requests have been made, often combined with file or network servers Fax Used to route incoming and outgoing faxes received and sent from the users’ desktop Mail Stores and forwards e-mail messages Database Used to store data and provide the software to process data queries supplied by users, often accessed by Structured Query Language (SQL) Application Used to store programs such as spreadsheet or bespoke applications run by end-users on their PCs. This removes the need to store each application on every user’s hard disk Communications Manages connections with other networks in a WAN configuration. Sometimes known as gateways and attached to other gateway devices such as routers and firewall servers.
Servers (Continued) When creating an information system, there are a number of critical functions which must be designed in to the server. These are important requirements which must be checked with server vendors, database vendors and operating systems vendors. They  are: Performance Capacity Resilience/fault tolerance Clustering
Servers (Continued) Performance   The server should be fast enough to handle all the requests from users attached to the network.  A margin should be build in to accommodate future growth in users and network traffic. This means specifying a suitable amount of memory, a fast hard disk and, less importantly, a fast processor. Capacity   The hard disk capacity should be large enough that it will not need to be upgraded in the near future.
Servers (Continued) Resilience/fault tolerance   If there is a problem affecting the hardware, such as a power surge or a problem with the hard disk, it is important that the whole network does not “crash” because of this.  Preventive measures should be taken, such as installing an uninterruptible power supply or running two disks in parallel (disk mirroring or RAID – redundant array of inexpensive disks). Clustering  It is used to spread the load across different servers, so improving reliability and performance.  It involves linking several servers together via a high-speed link such as fibre-optic cabling. This can enable parallel processing, where tasks are shared between processors, and also storage mirroring, where duplicate copies of data are stored on different servers to improve performance and reduce the risk of one server failing.
Servers (Continued) Servers can be specified as powerful PCs running an operating system such as Windows NT or Novell Netware, or they can run the UNIX operating system, from companies such as SUN, IBM or Hewlett-Packard.
Data communications equipment or telecommunications processors Modem (modulator-demodulator)  allows users to send and receive data via an ordinary telephone line. The modem receives analogue data transmitted via a telephone line and converts this into digital data so that the computer can make use of it. The modem converts outgoing digital data into an analogue signal before transmitting them. The speed of a modem is measured in bauds or bits per second (bps). Early modems operated at speeds of 1200 baud (approx. 100 characters). Typical modem is 56,600 bps (approx. 4,700 characters)
Alternatives to the modem  and conventional telephone line   Some of the alternatives to the modem and conventional telephone line include the following: Digital telephone exchanges support an  integrated services digital network (ISDN) standard  that allows data transfer rates that are up to five times faster than a 56,600 bps modem. An ISDN telephone line provides two separate “channels”, allowing simultaneous voice and data transmissions. Since ISDN lines transmit digital data, a modem is not required to make use of the service. Instead, a special terminal adaptor (often called an ISDN modem) is used to pass data between the computer and the ISDN line.
Alternatives to the modem  and conventional telephone line Asymmetric Digital Subscriber Line (ASDL) The ASDL services make use of existing telephone lines to provide very high data transfer rates. ADSL is usually referred to as “broadband” Internet access. Although the bandwidth offered by such services is usually shared by a number of users, ASDL offers many of the benefits associated with ISDN and the potential of data transfer rates of up to 6 Mbps. Recent development Introduction of systems that make use of satellite communications in order to receive data at very high speeds. Many services make use of a conventional modem to send requests for data via a satellite link at speeds of up to 4000 kbps, approximately four times faster than an ISDN link.
Data communications equipment or telecommunications processors Hubs  – are used to connect up to 20 PCs to a network using patch cables running between the back of each PC and the hub. Bridges and routers  – are used to connect different LANs and transfer data packets from one network to the next. Routers can select the best route for packets to be transmitted and are used on the Internet backbones and wide-area network to achieve this. Repeaters  Over a long transmission distance, signal distortion may occur. Repeaters are necessary to increase transmission distances by regenerating signals and re-transmitting them.
A Simple Computer network
Telecommunications channels Telecommunication channels are the different media used to carry information between different locations. These include traditional cables and wires known as  guided media , and wireless and more recent innovations such as satellite and microwave which are  unguided media .
Guided Media The main types of cabling used in LANs are based on copper cabling. Data are transmitted along this by applying at one end a voltage, which is received at the other. A positive voltage represents a binary “1” and a negative voltage represents a binary “0”. There are two main types of twisted copper cabling used in networks. Insulated straight cabling is not suitable except for very short distances. The two types are:  twisted pair ; co-axial Fibre-optic  is a relatively new transmission medium. Packets are transmitted along fibre-optic cables using light or photons emitted from a light-emitting diode at one end of the cable; detection is by a photo-sensitive cell at the other end.
Unguided or wireless media Wireless transmissions can be used for different business applications at different scales: Wireless infra-red transmission  can be used for sending data between a portable PC or personal digital assistant (PDA) and a desktop computer. Wireless transmission  can also be used locally to form a wireless LAN. Here a microwave or narrow-band radio transmitter and receiver may be used to connect different buildings. Microwave transmission  can be used to beam information through the atmosphere. The maximum distance that can separate microwave transmitters is 45km. Satellite transmission:  Messages are sent from a transceiver at one location on the earth’s surface and are bounced off the satellite to another transceiver.
Signal type Analogue   Analogue transmissions send data in a continuous wave-form. Digital   Digital transmissions send binary data as a series of ones and zeros.  Packets  are units of data are exchanged between different devices over communications media. An entire message is broken down into smaller packets.
Transmission speed The speed at which data can be transferred from A to B is governed by the channel capacity, which is measured in  bits per second (bps).  Transmission of a single bit in a second is equivalent to one baud, a binary event  Rates are usually measured in terms of thousands of bits/second (Kbit/sec), millions of bits/second (Mbit/sec) or billions of bits per second (Gbit/sec). A general term often used for describing capacity is  bandwidth . The technical definition of bandwidth is that it is a measure of capacity given by the difference between the lowest and highest frequencies available for a given medium.
Network operating system (NOS) It is the software necessary to control the access to and flow of information around a network. The most widely used NOS for a PC-based LAN are Novell Netware and IBM LAN Manager.  UNIX is used by many medium and large companies operating servers from companies such as Sun Microsystems, Hewlett-Packard and IBM. It is often thought to offer better stability than Windows NT since it is a long-established NOS.
Network operating system (Continued) NOS provides the following functions: Access control or security through providing user accounts with user names and passwords. File and data sharing of data stored on a database server or file server. Communication between users via e-mail, diary systems or workgroup software such as Lotus Notes. Sharing of devices, enabling, for example, the backup to tape of data on the server, or printer sharing.
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Evolution of networking technology The 1960s – mainframes and dumb terminals The 1970s – minicomputers such as DEC PDP-11 and VAX.  The 1980s – the IBM PC and Apple Macintosh The 1990s – the client/server architecture and global networks  2000s – Ubiquitous IP networks and application service providers (ASPs) The Future – wireless access will become the norm on a local- and wide-area level.
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
What is the Internet ? The Internet refers to the physical network that links computers across the globe. It consists of the infrastructure of network servers and communication links between them that are used to hold and transport information between the client PCs and web servers.  The Internet allows communication between millions of connected computers worldwide.  Information is transmitted form client PCs whose users request services to server computers that hold information and host business applications that deliver the services in response to requests. As such, the Internet is a  large-scale client/server system .
The Internet Internet Service Provider (ISP) A provider supplying home or business users with a connection to access the Internet.  They can also host web-based applications. Backbones High-speed communications links used to enable Internet communications across a country and internationally.
Figure 5.4  Infrastructure components of the Internet Source:  Chaffey (2004).
Business and consumer models of Internet access E-Business opportunities are identified in terms of whether an organization is using the Internet to transact with consumers  (business-to-consumer – B2C)  or other businesses  (business-to-business – B2B). Business-to-business transactions predominate over the Internet, in terms of value, if not frequency.  Figure 5.6 shows that there are many more opportunities for B2B transactions than B2C, both between an organization and its suppliers, together with intermediaries, and through distributors such as agents and wholesalers with customers. There is a higher level of access to the Internet among businesses than among consumers, and a greater propensity to use it for purchasing.
Figure 5.6  B2B and B2C interactions between an organisation, its suppliers and its customers Source:  Chaffey (2004).
Business and consumer models of Internet access Figure 5.7 gives examples of different companies operating in the business-to-consumer (B2C) and business-to-business (B2B) spheres. Figures 5.7 also presents two additional types of transaction : that where  consumers transact directly with consumers (C2C)  and that where they initiate  trading with business (C2B).
Figure 5.7  Summary of transaction alternatives between businesses and consumers Source:  Chaffey (2004).
Role of the Internet in restructuring  business relationships Figure 5.8 illustrates disintermediation in a graphical form for a simplifies retail channel. Further intermediaries such as additional distributors may occur in a business-to-business market. Figure 5.8(a) shows the former position where a company markets and sells it products by “pushing” them through a sales channel. Figure 5.8 (b) and (c) show two different type of disintermediation in which the wholesale (b) or the wholesaler and retailer (c) are bypassed, allowing the producer to sell and promote direct to the consumer. The benefits of disintermediation to the producer are clear – it is able to remove the sales and infra-structure cost of selling through the channel.
Figure 5.8  Disintermediation of a consumer distribution channel showing (a) the original situation, (b) disintermediation omitting the wholesaler and (c) disintermediation omitting both wholesaler and retailer Source:  Chaffey (2004).
Role of the Internet in restructuring  business relationships (Continued) Figure 5.10(a) starts with the traditional situation in which many sales were through brokers. With disintermediation (Figure 5.10(b)) there was the opportunity to sell direct, initially via call centers and then complemented by a transactional website. Purchasers still needed assistance in the selection of products and this led to the creation of new intermediaries , a process referred to as  re-intermediation  (Figure 5.10(c)).
Figure 5.10  The move to re-intermediation: (a) original situation,  (b) disintermediation, (c) re-intermediation Source:  Chaffey (2004).
Intranets and extranets The majority of Internet services are available to any business or consumer who has access to the Internet. However, many e-business applications that access sensitive company information require access to be limited to favoured individuals or third parties. If information is limited to those inside an organization, this is an  intranet . An intranet is a private network within a single company using Internet standards to enable employees to share information using e-mail and web publishing .
Intranets and extranets (Continued) If access to company information is extended to some others, but not everyone beyond the organization, this is an  extranet . An extranet is formed by extending the intranet beyond a company to customers, suppliers and collaborators. The relationship between these terms is illustrated in Figure 5.12. Extranets can be accessed by authorized people outside the company such as collaborators, suppliers or major customers, but information is not available to everyone with an Internet connection – only those with password access.
Figure 5.12  The relationship between intranets, extranets and the Internet
Firewalls Firewall  is a specialized software application mounted on a server at the point where the company is connected to the Internet. Its purpose is to prevent unauthorized access into the company from outsiders. Firewalls are necessary when we are creating an intranet or extranet to ensure that the outside access to the confidential information does not occur. Firewalls are usually created as software mounted on a separate server at the point where the company is connected to the Internet. Firewall software can then be configured to only accept links from trusted domains representing other offices in the company.
Firewalls (Continued) The use of firewalls within the infra-structure of a company is illustrated in Figure 5.14. It is evident that multiple firewalls are used to protect information of the company. The information made available to third parties over the Internet and extranet is partitioned by another firewall using what is referred to as the  demilitarized zone (DMZ).   Corporate data on the intranet is then mounted on other servers inside the company.
Figure 5.14  An example of the use of firewalls to increase security within an e-business infrastructure Source:  Chaffey (2004).
What is the World Wide Web ? The  World Wide Web (WWW)  provides a standard method for exchanging and publishing information on the Internet. The medium is based on standard document formats such as  HTML (hypertext markup language)  which can be thought of as similar to a word-processing format such as that used for Microsoft WORD documents. It is the combination of web browsers and HTML that has proved so successful in establishing widespread business use of the Internet.
Web browsers and servers Web browsers are software used to access the information on the WWW that is stored on web servers. Web servers are used to store, manage and supply the information on the WWW. The main web browsers are Microsoft Internet Explorer and Netscape Navigator or Communicator. Browsers display the text and graphics accessed from web sites and provide tools for managing information from web sites. Figure 5.15 indicates the process by which web browsers communicate with web servers.
Figure 5.15  Information exchange between a web browser and web server Source:  Chaffey (2004).
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Networking standards The Internet is a  packet-switched network  that uses TCP/IP as its protocol. This means that, as messages or packets are sent, there is no part of the network that is dedicated to them. The alternative type of network is the  circuit-switched network  such as phone systems where the line is dedicated to the user for the duration of the call. The transmission media of the Internet such as telephone lines, satellite links and optical cables are the equivalent of the vans, trains and planes that are used to carry post. TCP/IP is the  transmission control protocol  is a transport-layer protocol that moves data between applications. The  Internet protocol  is a network-layer protocol that moves data between host computers.
Networking standards (Continued) IP address  is the unique numerical address of a computer. The IP address is in the form of 207.68.156.58 ( www.microsoft.com ) Packet  – Each Internet message such as an e-mail or http request is broken down into smaller parts for ease of transmission. HTTP (Hypertext transfer protocol)  is a standard that defines the way information is transmitted across the Internet between web browsers and web servers. Uniform (or Universal) resource locator (URL)  is a web address used to locate a web page on a web server. Domain name  refers to the name of the web server and is usually selected to be the same as the name of the company, and the extension will indicate its type. Web page standards  – HTML (used for presentation of data) and XML (used for data exchange)
Figure 5.16  The TCP/IP protocol Source:  Chaffey (2004).
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Wide Area Network (WAN) Wide area network (WAN)  is a network covering a large area which connect to businesses in different parts of the same city, different parts of a country, or even different countries (Figure 5.22). The WAN will connect many servers at each site. If there is a large international coverage, it will be referred to as a  global network . If the WAN enables communication across the whole company, it is referred to as the “ enterprise network ” or “ enterprise-wide network ”. Companies usually pay for their own “ leased lines ” or communications links between different sites. Virtual private networks  and  value-added networks  provide cheaper alternatives where the communications links are shared.
WAN (continued) Often the network used to connect remote sites is the public telephone, referred to as POTS or “plain old telephone system”. A company can also lease private or dedicated lines from a telecommunications supplier to connect sites, or can set up links using microwave or satellite methods.
 
Value-added networks (VANs) VANs give a subscription service enabling companies to transmit data securely across a shared network . VANs are so named because they allow a company to minimize its investment in wide-area communications while still receiving all the benefits this can bring. The cost of setting up and maintaining the network is borne by the  service provider , which then rents out the network to a number of companies. This works out more cheaply than if a company had leased its own point-to-point private lines, but it is not as secure.
Virtual private network (VPN) A  VPN   is a data network that makes use of the public telecommunication infrastructure and Internet, but information remains secure by the use of security procedures. VPNs are  data networks  that make use of the public telecommunication infra-structure and Internet, but information remains secure by the use of what is known as  tunneling protocol  and security procedures such as “firewalls”. A virtual private network can again be contrasted with a system of owned or leased point-to-point lines that can only be used by one company.
TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
Local area network (LAN) LAN is a computer network that spans a limited geographic area, typically a single office or building. LAN consists of a single network segment or several connected segments that are limited in extent (local). A network segment defines a group of clients that are attached to the same hub or network interface card linked to a single server.
Figure 5.24  A small workgroup network connecting a single server to three PCs and a laser printer
Network technology There are a number of different arrangement for connecting clients to the server in a local area network. The physical layout of a LAN is known as a  network topology These are known by the description of the layout or topology: bus, star or ring. The layout of the arrangement are shown in Figure 5.25. The topology chosen and the media used to implement it will affect the network cost and performance.
 
Bus or linear Characteristics Simple  Based on co-axial Ethernet cable e.g. twisted pair 10Base-T. Advantage Easy to install and manage for small workgroup Disadvantage Breaks in the cable disrupt the whole network.
Star Characteristics Each PC is connected via a cable to a central location Each PC is not usually connected directly to the server, but via a hub. Advantage Provide protection from cable breaks Disadvantage Dependent on central host
Ring Characteristics A continuous ring of network cable e.g. token ring The word “token” refers to a packet of data which is passed from one node to the next. Advantage Suitable for large data volumes and mission-critical applications Disadvantage Higher initial cost and time for installation
Peer-to-peer network A  peer-to-peer network  is a simple type of local-area network which provides sharing of files and peripherals between PCs. The “peer-to-peer” refers to the capability of any computer on a local-area network to share resources, in particular files and peripherals, with others. It is particularly appropriate for small workgroups where central control from a server is less necessary. For example, a user can, with permission, share across the network a file stored on another user’s hard disk. With a peer-to-peer arrangement, data will be distributed and therefore difficult to backup and secure.

More Related Content

PDF
Primch5cg
PDF
Computer networking xii
PPT
Hardware1
PPT
Hardware1
PPTX
networking hypherlink Group 2 presentation
PPTX
Computing Environment
PPTX
Networkingconcepts (1)
PDF
Computer networks--introduction computer-networking
Primch5cg
Computer networking xii
Hardware1
Hardware1
networking hypherlink Group 2 presentation
Computing Environment
Networkingconcepts (1)
Computer networks--introduction computer-networking

What's hot (18)

PDF
Class work 2,computer_network_317
PDF
Introduction to computer_lec_05
PPT
Prachi gupta 8 a
PPT
Introduction to networks
PPTX
Networking Components
PPT
Networking course khurram shahzad
PDF
Networking fundamentalsss
PDF
Data Communications and Networks
PPT
Networking.
PDF
Network administration Book
PDF
Introduction to computer networks ppt download
PDF
Wireless networks & cellular wireless networks
PPT
Introduction to Networks & Networking Concepts
PPTX
Data management issues
PPTX
Computer Networks By NADEEM AHMED
PPT
Networking
PPTX
Networking basics
PDF
Introduction to Cloud computing
Class work 2,computer_network_317
Introduction to computer_lec_05
Prachi gupta 8 a
Introduction to networks
Networking Components
Networking course khurram shahzad
Networking fundamentalsss
Data Communications and Networks
Networking.
Network administration Book
Introduction to computer networks ppt download
Wireless networks & cellular wireless networks
Introduction to Networks & Networking Concepts
Data management issues
Computer Networks By NADEEM AHMED
Networking
Networking basics
Introduction to Cloud computing
Ad

Viewers also liked (8)

PDF
The technology of fiber optic in telcommunication
PPTX
20 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 2016
PDF
Optical Fibre & Introduction to TDM & DWDM
PPTX
Network Management Devices
PPT
Fiber optic
PDF
DWDM Presentation
PPTX
Communication & network devices
PDF
[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking
The technology of fiber optic in telcommunication
20 Years of KVH Fiber Optic Gyro Technology: Presented at SPIE 2016
Optical Fibre & Introduction to TDM & DWDM
Network Management Devices
Fiber optic
DWDM Presentation
Communication & network devices
[OpenStack Day in Korea 2015] Keynote 5 - The evolution of OpenStack Networking
Ad

Similar to Bis Chapter5 (20)

PPT
Chapter01 -- introduction to networking
PPT
Networking And Telecommunications
PDF
unit 4 cds computer networking notesnotes.pdf
DOCX
Basic networking tutorial
PPT
Rkp internet part i
DOCX
Computer network
PPTX
L1 - Computer Networks Review.pptx
PPTX
Network & Networking
PPTX
Client server technology main
PDF
Basic lecture
PDF
Networking tutorial
PDF
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
PDF
Computer Networking Basics Equipment Cabling Setup Sharing Tcpip Iis Neo Inst...
PPT
Networking Comptia
PPT
chapter 1: introduction to Com Networks.ppt
PPTX
UNIT 4 ANHPvhkhdjld;kf;slkf;lsksljkf;ljk.pptx
PDF
Cnetworks
PDF
Basic networking tutorial
PDF
fmxhnkmcjbg,lBasics of network
Chapter01 -- introduction to networking
Networking And Telecommunications
unit 4 cds computer networking notesnotes.pdf
Basic networking tutorial
Rkp internet part i
Computer network
L1 - Computer Networks Review.pptx
Network & Networking
Client server technology main
Basic lecture
Networking tutorial
TECHNICAL WHITE PAPER: NetBackup Appliances WAN Optimization
Computer Networking Basics Equipment Cabling Setup Sharing Tcpip Iis Neo Inst...
Networking Comptia
chapter 1: introduction to Com Networks.ppt
UNIT 4 ANHPvhkhdjld;kf;slkf;lsksljkf;ljk.pptx
Cnetworks
Basic networking tutorial
fmxhnkmcjbg,lBasics of network

More from Chun Hoi Lam (9)

PPT
Bis Chapter3
PPT
Bis Chapter6
PPT
Bis Chapter15
PPT
Bis Chapter4
PPT
Bis Chapter2
PPT
Access Ch4 Creating Reports And Forms (Jy)
PPT
Access Ch3 Maintaining A Database (Jy)
PPT
Bis Chapter1
PPT
Access Ch5 Multi Table Forms (Jy)
Bis Chapter3
Bis Chapter6
Bis Chapter15
Bis Chapter4
Bis Chapter2
Access Ch4 Creating Reports And Forms (Jy)
Access Ch3 Maintaining A Database (Jy)
Bis Chapter1
Access Ch5 Multi Table Forms (Jy)

Recently uploaded (20)

PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation theory and applications.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hybrid model detection and classification of lung cancer
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Tartificialntelligence_presentation.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Hindi spoken digit analysis for native and non-native speakers
Enhancing emotion recognition model for a student engagement use case through...
Web App vs Mobile App What Should You Build First.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Chapter 5: Probability Theory and Statistics
Assigned Numbers - 2025 - Bluetooth® Document
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation theory and applications.pdf
NewMind AI Weekly Chronicles - August'25-Week II
DP Operators-handbook-extract for the Mautical Institute
Hybrid model detection and classification of lung cancer
Heart disease approach using modified random forest and particle swarm optimi...
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Tartificialntelligence_presentation.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
OMC Textile Division Presentation 2021.pptx

Bis Chapter5

  • 1. Chapter 5 Networks, telecommunications and the Internet
  • 2. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 3. Computer networks defined A computer network can be defined as: ‘a communications system that links two or more computers and peripheral devices and enables transfer of data between the components’. Small-scale networks within a workgroup or single office are known as local area networks (LAN). Larger-scale networks which are national or international are known as wide area networks (WAN). The Internet is the best known example of a Wide Area Network.
  • 4. Figure 5.1 Communications links between different stakeholders in an industry
  • 5. Business benefits of networks Reduce cost compared with traditional communications. Reduces time for information transfer Enables sharing and dissemination of company information Enables sharing of hardware resources such as printers, backup, processing power. Promotes new ways of working Operates geographically separate businesses as one. Restructures relationships with partners
  • 6. Disadvantages of networks 1 The initial setup cost may be high, and there may be a considerable period before the costs are paid off. 2 When implementing or updating the network there may be considerable practical difficulties. Deploying cabling can be very disruptive to staff doing their daily work. 3 In the long term, companies become reliant on networks and breaks in service can be very disruptive. For this reason investment in network maintenance is vital. 4 Security is reduced through introducing a network, since there are more access points to sensitive data. Data may also be intercepted when it is transferred from one site to another.
  • 7. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 8. Client/server model of computing The client/server architecture consists of client computers such as PCs sharing resources such as a database stored on more powerful server computers. Processing can be shared between the clients and the servers. Client/server architecture is significant since most modern networked information systems are based on this structure.
  • 9. Figure 5.3 Components of a client/server system
  • 10. Why use client / server ? The adoption of C/S architecture is to “downsize” from large mainframes with of user terminals which had limited functionality. Rather than all the tasks involved in program execution (other than display) occurring on the mainframe, client/server gives the opportunity for them to be shared between a central server and clients. This gives the potential for faster execution, as processing is distributed across many clients.
  • 11. Problems to be managed with client/server High cost of ownership – Although price of PCs is relatively low, support and maintenance cost could be high. Instability --C/S technology is often complex and involves integrating different hardware and software components from many different companies. Performance -- For some mission-critical applications, a smaller server cannot deliver the power required. Lack of worker focus – The freedom of choice can lead to non-productive time-wasting, as users rearrange the colours and wallpaper on their desktop rather than performing their regular tasks.
  • 12. Servers Servers are vital to an information system, since they regulate the flow of information around the network. Network servers run the network operating system (NOS) , the software that is used to manage the network, and are often used to store large volumes of data. The server and NOS together perform the following functions: Maintain security Sharing of peripheral devices Sharing of applications Sharing of information
  • 13. Servers (Continued) Maintain security – access to information in files is restricted according to the user name and password issued to users of the network. Sharing of peripheral devices connected to the network, such as printers and tape drivers. These are often attached directly to the server. Sharing of applications such as word processors, which do not then need to be stored on the hard drive of the end-user’s computer. The cost of buying applications can be reduced through buying a “site licence”. Sharing of information – access to this data is maintained by the NOS and it is stored within the hard drive of a server as files or as part of a database.
  • 14. Examples of different servers Network Contains functions to manage the network resources and control user access File This term is sometimes used to refer to network server functions. It can also indicate that users’ files such as documents and spreadsheets are stored on the network server Print Dedicated print servers have a queue of all documents for which print requests have been made, often combined with file or network servers Fax Used to route incoming and outgoing faxes received and sent from the users’ desktop Mail Stores and forwards e-mail messages Database Used to store data and provide the software to process data queries supplied by users, often accessed by Structured Query Language (SQL) Application Used to store programs such as spreadsheet or bespoke applications run by end-users on their PCs. This removes the need to store each application on every user’s hard disk Communications Manages connections with other networks in a WAN configuration. Sometimes known as gateways and attached to other gateway devices such as routers and firewall servers.
  • 15. Servers (Continued) When creating an information system, there are a number of critical functions which must be designed in to the server. These are important requirements which must be checked with server vendors, database vendors and operating systems vendors. They are: Performance Capacity Resilience/fault tolerance Clustering
  • 16. Servers (Continued) Performance The server should be fast enough to handle all the requests from users attached to the network. A margin should be build in to accommodate future growth in users and network traffic. This means specifying a suitable amount of memory, a fast hard disk and, less importantly, a fast processor. Capacity The hard disk capacity should be large enough that it will not need to be upgraded in the near future.
  • 17. Servers (Continued) Resilience/fault tolerance If there is a problem affecting the hardware, such as a power surge or a problem with the hard disk, it is important that the whole network does not “crash” because of this. Preventive measures should be taken, such as installing an uninterruptible power supply or running two disks in parallel (disk mirroring or RAID – redundant array of inexpensive disks). Clustering It is used to spread the load across different servers, so improving reliability and performance. It involves linking several servers together via a high-speed link such as fibre-optic cabling. This can enable parallel processing, where tasks are shared between processors, and also storage mirroring, where duplicate copies of data are stored on different servers to improve performance and reduce the risk of one server failing.
  • 18. Servers (Continued) Servers can be specified as powerful PCs running an operating system such as Windows NT or Novell Netware, or they can run the UNIX operating system, from companies such as SUN, IBM or Hewlett-Packard.
  • 19. Data communications equipment or telecommunications processors Modem (modulator-demodulator) allows users to send and receive data via an ordinary telephone line. The modem receives analogue data transmitted via a telephone line and converts this into digital data so that the computer can make use of it. The modem converts outgoing digital data into an analogue signal before transmitting them. The speed of a modem is measured in bauds or bits per second (bps). Early modems operated at speeds of 1200 baud (approx. 100 characters). Typical modem is 56,600 bps (approx. 4,700 characters)
  • 20. Alternatives to the modem and conventional telephone line Some of the alternatives to the modem and conventional telephone line include the following: Digital telephone exchanges support an integrated services digital network (ISDN) standard that allows data transfer rates that are up to five times faster than a 56,600 bps modem. An ISDN telephone line provides two separate “channels”, allowing simultaneous voice and data transmissions. Since ISDN lines transmit digital data, a modem is not required to make use of the service. Instead, a special terminal adaptor (often called an ISDN modem) is used to pass data between the computer and the ISDN line.
  • 21. Alternatives to the modem and conventional telephone line Asymmetric Digital Subscriber Line (ASDL) The ASDL services make use of existing telephone lines to provide very high data transfer rates. ADSL is usually referred to as “broadband” Internet access. Although the bandwidth offered by such services is usually shared by a number of users, ASDL offers many of the benefits associated with ISDN and the potential of data transfer rates of up to 6 Mbps. Recent development Introduction of systems that make use of satellite communications in order to receive data at very high speeds. Many services make use of a conventional modem to send requests for data via a satellite link at speeds of up to 4000 kbps, approximately four times faster than an ISDN link.
  • 22. Data communications equipment or telecommunications processors Hubs – are used to connect up to 20 PCs to a network using patch cables running between the back of each PC and the hub. Bridges and routers – are used to connect different LANs and transfer data packets from one network to the next. Routers can select the best route for packets to be transmitted and are used on the Internet backbones and wide-area network to achieve this. Repeaters Over a long transmission distance, signal distortion may occur. Repeaters are necessary to increase transmission distances by regenerating signals and re-transmitting them.
  • 23. A Simple Computer network
  • 24. Telecommunications channels Telecommunication channels are the different media used to carry information between different locations. These include traditional cables and wires known as guided media , and wireless and more recent innovations such as satellite and microwave which are unguided media .
  • 25. Guided Media The main types of cabling used in LANs are based on copper cabling. Data are transmitted along this by applying at one end a voltage, which is received at the other. A positive voltage represents a binary “1” and a negative voltage represents a binary “0”. There are two main types of twisted copper cabling used in networks. Insulated straight cabling is not suitable except for very short distances. The two types are: twisted pair ; co-axial Fibre-optic is a relatively new transmission medium. Packets are transmitted along fibre-optic cables using light or photons emitted from a light-emitting diode at one end of the cable; detection is by a photo-sensitive cell at the other end.
  • 26. Unguided or wireless media Wireless transmissions can be used for different business applications at different scales: Wireless infra-red transmission can be used for sending data between a portable PC or personal digital assistant (PDA) and a desktop computer. Wireless transmission can also be used locally to form a wireless LAN. Here a microwave or narrow-band radio transmitter and receiver may be used to connect different buildings. Microwave transmission can be used to beam information through the atmosphere. The maximum distance that can separate microwave transmitters is 45km. Satellite transmission: Messages are sent from a transceiver at one location on the earth’s surface and are bounced off the satellite to another transceiver.
  • 27. Signal type Analogue Analogue transmissions send data in a continuous wave-form. Digital Digital transmissions send binary data as a series of ones and zeros. Packets are units of data are exchanged between different devices over communications media. An entire message is broken down into smaller packets.
  • 28. Transmission speed The speed at which data can be transferred from A to B is governed by the channel capacity, which is measured in bits per second (bps). Transmission of a single bit in a second is equivalent to one baud, a binary event Rates are usually measured in terms of thousands of bits/second (Kbit/sec), millions of bits/second (Mbit/sec) or billions of bits per second (Gbit/sec). A general term often used for describing capacity is bandwidth . The technical definition of bandwidth is that it is a measure of capacity given by the difference between the lowest and highest frequencies available for a given medium.
  • 29. Network operating system (NOS) It is the software necessary to control the access to and flow of information around a network. The most widely used NOS for a PC-based LAN are Novell Netware and IBM LAN Manager. UNIX is used by many medium and large companies operating servers from companies such as Sun Microsystems, Hewlett-Packard and IBM. It is often thought to offer better stability than Windows NT since it is a long-established NOS.
  • 30. Network operating system (Continued) NOS provides the following functions: Access control or security through providing user accounts with user names and passwords. File and data sharing of data stored on a database server or file server. Communication between users via e-mail, diary systems or workgroup software such as Lotus Notes. Sharing of devices, enabling, for example, the backup to tape of data on the server, or printer sharing.
  • 31. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 32. Evolution of networking technology The 1960s – mainframes and dumb terminals The 1970s – minicomputers such as DEC PDP-11 and VAX. The 1980s – the IBM PC and Apple Macintosh The 1990s – the client/server architecture and global networks 2000s – Ubiquitous IP networks and application service providers (ASPs) The Future – wireless access will become the norm on a local- and wide-area level.
  • 33. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 34. What is the Internet ? The Internet refers to the physical network that links computers across the globe. It consists of the infrastructure of network servers and communication links between them that are used to hold and transport information between the client PCs and web servers. The Internet allows communication between millions of connected computers worldwide. Information is transmitted form client PCs whose users request services to server computers that hold information and host business applications that deliver the services in response to requests. As such, the Internet is a large-scale client/server system .
  • 35. The Internet Internet Service Provider (ISP) A provider supplying home or business users with a connection to access the Internet. They can also host web-based applications. Backbones High-speed communications links used to enable Internet communications across a country and internationally.
  • 36. Figure 5.4 Infrastructure components of the Internet Source: Chaffey (2004).
  • 37. Business and consumer models of Internet access E-Business opportunities are identified in terms of whether an organization is using the Internet to transact with consumers (business-to-consumer – B2C) or other businesses (business-to-business – B2B). Business-to-business transactions predominate over the Internet, in terms of value, if not frequency. Figure 5.6 shows that there are many more opportunities for B2B transactions than B2C, both between an organization and its suppliers, together with intermediaries, and through distributors such as agents and wholesalers with customers. There is a higher level of access to the Internet among businesses than among consumers, and a greater propensity to use it for purchasing.
  • 38. Figure 5.6 B2B and B2C interactions between an organisation, its suppliers and its customers Source: Chaffey (2004).
  • 39. Business and consumer models of Internet access Figure 5.7 gives examples of different companies operating in the business-to-consumer (B2C) and business-to-business (B2B) spheres. Figures 5.7 also presents two additional types of transaction : that where consumers transact directly with consumers (C2C) and that where they initiate trading with business (C2B).
  • 40. Figure 5.7 Summary of transaction alternatives between businesses and consumers Source: Chaffey (2004).
  • 41. Role of the Internet in restructuring business relationships Figure 5.8 illustrates disintermediation in a graphical form for a simplifies retail channel. Further intermediaries such as additional distributors may occur in a business-to-business market. Figure 5.8(a) shows the former position where a company markets and sells it products by “pushing” them through a sales channel. Figure 5.8 (b) and (c) show two different type of disintermediation in which the wholesale (b) or the wholesaler and retailer (c) are bypassed, allowing the producer to sell and promote direct to the consumer. The benefits of disintermediation to the producer are clear – it is able to remove the sales and infra-structure cost of selling through the channel.
  • 42. Figure 5.8 Disintermediation of a consumer distribution channel showing (a) the original situation, (b) disintermediation omitting the wholesaler and (c) disintermediation omitting both wholesaler and retailer Source: Chaffey (2004).
  • 43. Role of the Internet in restructuring business relationships (Continued) Figure 5.10(a) starts with the traditional situation in which many sales were through brokers. With disintermediation (Figure 5.10(b)) there was the opportunity to sell direct, initially via call centers and then complemented by a transactional website. Purchasers still needed assistance in the selection of products and this led to the creation of new intermediaries , a process referred to as re-intermediation (Figure 5.10(c)).
  • 44. Figure 5.10 The move to re-intermediation: (a) original situation, (b) disintermediation, (c) re-intermediation Source: Chaffey (2004).
  • 45. Intranets and extranets The majority of Internet services are available to any business or consumer who has access to the Internet. However, many e-business applications that access sensitive company information require access to be limited to favoured individuals or third parties. If information is limited to those inside an organization, this is an intranet . An intranet is a private network within a single company using Internet standards to enable employees to share information using e-mail and web publishing .
  • 46. Intranets and extranets (Continued) If access to company information is extended to some others, but not everyone beyond the organization, this is an extranet . An extranet is formed by extending the intranet beyond a company to customers, suppliers and collaborators. The relationship between these terms is illustrated in Figure 5.12. Extranets can be accessed by authorized people outside the company such as collaborators, suppliers or major customers, but information is not available to everyone with an Internet connection – only those with password access.
  • 47. Figure 5.12 The relationship between intranets, extranets and the Internet
  • 48. Firewalls Firewall is a specialized software application mounted on a server at the point where the company is connected to the Internet. Its purpose is to prevent unauthorized access into the company from outsiders. Firewalls are necessary when we are creating an intranet or extranet to ensure that the outside access to the confidential information does not occur. Firewalls are usually created as software mounted on a separate server at the point where the company is connected to the Internet. Firewall software can then be configured to only accept links from trusted domains representing other offices in the company.
  • 49. Firewalls (Continued) The use of firewalls within the infra-structure of a company is illustrated in Figure 5.14. It is evident that multiple firewalls are used to protect information of the company. The information made available to third parties over the Internet and extranet is partitioned by another firewall using what is referred to as the demilitarized zone (DMZ). Corporate data on the intranet is then mounted on other servers inside the company.
  • 50. Figure 5.14 An example of the use of firewalls to increase security within an e-business infrastructure Source: Chaffey (2004).
  • 51. What is the World Wide Web ? The World Wide Web (WWW) provides a standard method for exchanging and publishing information on the Internet. The medium is based on standard document formats such as HTML (hypertext markup language) which can be thought of as similar to a word-processing format such as that used for Microsoft WORD documents. It is the combination of web browsers and HTML that has proved so successful in establishing widespread business use of the Internet.
  • 52. Web browsers and servers Web browsers are software used to access the information on the WWW that is stored on web servers. Web servers are used to store, manage and supply the information on the WWW. The main web browsers are Microsoft Internet Explorer and Netscape Navigator or Communicator. Browsers display the text and graphics accessed from web sites and provide tools for managing information from web sites. Figure 5.15 indicates the process by which web browsers communicate with web servers.
  • 53. Figure 5.15 Information exchange between a web browser and web server Source: Chaffey (2004).
  • 54. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 55. Networking standards The Internet is a packet-switched network that uses TCP/IP as its protocol. This means that, as messages or packets are sent, there is no part of the network that is dedicated to them. The alternative type of network is the circuit-switched network such as phone systems where the line is dedicated to the user for the duration of the call. The transmission media of the Internet such as telephone lines, satellite links and optical cables are the equivalent of the vans, trains and planes that are used to carry post. TCP/IP is the transmission control protocol is a transport-layer protocol that moves data between applications. The Internet protocol is a network-layer protocol that moves data between host computers.
  • 56. Networking standards (Continued) IP address is the unique numerical address of a computer. The IP address is in the form of 207.68.156.58 ( www.microsoft.com ) Packet – Each Internet message such as an e-mail or http request is broken down into smaller parts for ease of transmission. HTTP (Hypertext transfer protocol) is a standard that defines the way information is transmitted across the Internet between web browsers and web servers. Uniform (or Universal) resource locator (URL) is a web address used to locate a web page on a web server. Domain name refers to the name of the web server and is usually selected to be the same as the name of the company, and the extension will indicate its type. Web page standards – HTML (used for presentation of data) and XML (used for data exchange)
  • 57. Figure 5.16 The TCP/IP protocol Source: Chaffey (2004).
  • 58. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 59. Wide Area Network (WAN) Wide area network (WAN) is a network covering a large area which connect to businesses in different parts of the same city, different parts of a country, or even different countries (Figure 5.22). The WAN will connect many servers at each site. If there is a large international coverage, it will be referred to as a global network . If the WAN enables communication across the whole company, it is referred to as the “ enterprise network ” or “ enterprise-wide network ”. Companies usually pay for their own “ leased lines ” or communications links between different sites. Virtual private networks and value-added networks provide cheaper alternatives where the communications links are shared.
  • 60. WAN (continued) Often the network used to connect remote sites is the public telephone, referred to as POTS or “plain old telephone system”. A company can also lease private or dedicated lines from a telecommunications supplier to connect sites, or can set up links using microwave or satellite methods.
  • 61.  
  • 62. Value-added networks (VANs) VANs give a subscription service enabling companies to transmit data securely across a shared network . VANs are so named because they allow a company to minimize its investment in wide-area communications while still receiving all the benefits this can bring. The cost of setting up and maintaining the network is borne by the service provider , which then rents out the network to a number of companies. This works out more cheaply than if a company had leased its own point-to-point private lines, but it is not as secure.
  • 63. Virtual private network (VPN) A VPN is a data network that makes use of the public telecommunication infrastructure and Internet, but information remains secure by the use of security procedures. VPNs are data networks that make use of the public telecommunication infra-structure and Internet, but information remains secure by the use of what is known as tunneling protocol and security procedures such as “firewalls”. A virtual private network can again be contrasted with a system of owned or leased point-to-point lines that can only be used by one company.
  • 64. TOPICS Introduction to computer networks Network components The evolution of networking technology The Internet How the Internet works Other wide-area networks Smaller-scale networks
  • 65. Local area network (LAN) LAN is a computer network that spans a limited geographic area, typically a single office or building. LAN consists of a single network segment or several connected segments that are limited in extent (local). A network segment defines a group of clients that are attached to the same hub or network interface card linked to a single server.
  • 66. Figure 5.24 A small workgroup network connecting a single server to three PCs and a laser printer
  • 67. Network technology There are a number of different arrangement for connecting clients to the server in a local area network. The physical layout of a LAN is known as a network topology These are known by the description of the layout or topology: bus, star or ring. The layout of the arrangement are shown in Figure 5.25. The topology chosen and the media used to implement it will affect the network cost and performance.
  • 68.  
  • 69. Bus or linear Characteristics Simple Based on co-axial Ethernet cable e.g. twisted pair 10Base-T. Advantage Easy to install and manage for small workgroup Disadvantage Breaks in the cable disrupt the whole network.
  • 70. Star Characteristics Each PC is connected via a cable to a central location Each PC is not usually connected directly to the server, but via a hub. Advantage Provide protection from cable breaks Disadvantage Dependent on central host
  • 71. Ring Characteristics A continuous ring of network cable e.g. token ring The word “token” refers to a packet of data which is passed from one node to the next. Advantage Suitable for large data volumes and mission-critical applications Disadvantage Higher initial cost and time for installation
  • 72. Peer-to-peer network A peer-to-peer network is a simple type of local-area network which provides sharing of files and peripherals between PCs. The “peer-to-peer” refers to the capability of any computer on a local-area network to share resources, in particular files and peripherals, with others. It is particularly appropriate for small workgroups where central control from a server is less necessary. For example, a user can, with permission, share across the network a file stored on another user’s hard disk. With a peer-to-peer arrangement, data will be distributed and therefore difficult to backup and secure.