Chapter VI Networking fundamentals DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 1

Size: px
Start display at page:

Download "Chapter VI Networking fundamentals DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 1"

Transcription

1 Chapter VI Networking fundamentals COMPUTER NETWORKING AND THE INTERNET DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 1

2 Objectives Understand networking Understand networking topologies Understand networking protocol Understand the Internet Understand Internet protocol Recognize and understand important special networks. Understand how to apply this information to business. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 2

3 What is networking? Networking as defined in Merriam Webster dictionary is the exchange of information or services among individuals, groups, or institutions; specifically : the cultivation of productive relationships for employment or business. Modern computer networking is in fact business networking as it is hard to imagine business information networks that don t evolve around computers and computer information system. Networking wouldn t be this easily possible and profitable without the abundance of advanced telecommunication technology DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 3

4 Computer network Computer network consists of at least 3 computers linked together by means of telecommunication media. Computer networks are usually tailored to match the structure of a given establishment, business or any organization. Each computer in the network is known as a node or workstation. If the network has a server all other nodes are considered as clients DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 4

5 Network physical topology Physical structure of the network Star topology: Typical client-server network Nodes or clients centralized around a server. Most used topology in networking technology. client1 client2 server client4 client3 DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 5

6 Bus topology Consists of backbone cable (bus) all along the network area. No server in a bus network. Nodes share files and other information. Easy to connect and monitor network. Bus (Network backbone) node 1 node 2 node 3 node 4 DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 6

7 Ring topology Consists of several computers connected as a ring Imagine a bus network with both ends linked. Message flow and priorities are clockwise n5 n1 n2 n4 n3 DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 7

8 Mesh network topology Each node is connected to all other nodes Expensive structure if we need to lay a huge quantity of cables or implement other media for this purpose. Pier-to-peer network: Special mesh structure that uses the Internet backbone as a communication medium with each node in the network. Very flexible structure as it may connect unlimited number of nodes that may include every computer that has Internet connection. n5 n4 n1 n3 n2 DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 8

9 Tree networking topology This network fits a department that comprises several divisions where each division has a star network and all stars are connected via a bus. Priorities and message flow control are more complicated in this network structure. Backbone (BUS) DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 9

10 Network logical topology Network protocol: Can be defined as the network logical topology and consists of a set of rules designed to control all network functions by assuming the following responsibilities: Establishing network priorities and enforcing them. Maintaining strict communication discipline in the network. Controlling network access and network security. Establishing communications with network nodes from internal nodes and external messages applying the handshaking technology. What is handshaking technology? DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 10

11 Handshaking technology Consists of the following steps achieved by the network protocol: Protocol detects a message originated by node A or coming from outside source addressed to node B Protocol intercepts the message and inspects its validity and security status and make sure it doesn t collide with other network messages. Protocol warns node B about the message by checking if it is available and willing to receive it. To complete the handshaking process, protocol connects the sender with the receiver allowing the message to flow from origin to destination. If node B is busy with other messaging business the handshaking process will be postponed as long as necessary. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 11

12 Ethernet protocol Was commercially released in 1980 and it is until today the most popular protocol among LAN users Ethernet technology is known as CSMA/CD which stands for (Carrier Sense Multiple Access/Collision Detection. This technology is based on the principle of polite conversation between a group of civilized people with the following scenario: Many people start talking at the same time. They stop talking because each one of them will leave the turn to others. When an absolute silence is achieved, some guys will restart talking and again if more than one is talking they will stop. The process will continue until only one is talking and all others listening Ethernet protocol assumes the enforcement of the courtesy role by stopping all messages if more than one station is trying to send. Ethernet sends the message to all nodes but none can receive it except the addressees. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 12

13 Token ring protocol This protocol is designed for the ring network A signal called token that may be a code is sent to the station that has the sending priority. When that station finishes it passes the token to the station that has the next priority and so forth In a ring network priorities are clockwise in the order and the message flows clockwise exactly. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 13

14 Wireless networking WLAN network connects nodes via radio-waves instead of cables. It is known as Wi-Fi network and the latest wireless technology is the Wi-Max network. Wi-Fi network stands for (Wireless-Fidelity) and is known by its IEEE code where we must distinguish from a, b, g, and n DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 14

15 Wireless networking was released in 1997 uses a 2.4 GHz and bandwidth 20 MHz can be used over a distance of 20 meter indoor and 100 meter outdoor a released on the eve of the 3 rd millennium SEPT-OCT 1999 uses a 3.7 GHz frequency and 20 MHz bandwidth that improved the range to 35 meters indoor and 120 meters outdoor b uses 2.4 GHz and same bandwidth of 20 MHz with the improvement of the outdoor working distance to 140 meters g similar to the b and data rate between 6 and 54 (Mbit/s) and was released in June n released in OCT 2009 used a 2.4/5 GHz frequency and bit stream between 7.2 Mbit/s and 72.2 Mbit/s the working range was improved to 70 meters indoor and 250 meters outdoor. Other scheduled releases for 2013 (802.11ad) and 2014 (802.11ac) that will introduce new improvements to the WLAN technology. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 15

16 WI-MAX Wireless broadband Internet access designed to replace the DSL as more convenient mobile and fixed Internet access. Wi-MAX influence on Internet access may be compared tp cellphone impact on the telephone networking and telephone industry. The IEEE and e standard enable to use 2.3 GHz, 3.3 GHz, 2.5 GHz and 3.5 GHz. Wi-MAX range may reach 50 Kilometers about 31 miles (enough to cover a big city or a county). DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 16

17 WI-MAX (continued) Designed to provide Mbit/s that was updated in 2011 to 1 Gbit/s for fixed stations. However Wi-MAX has the limitation of not being able to deliver the maximum speed at the maximum range ( speed in bit/s is inversely proportional to the distance from the base station). Wi-MAX started the 4 th generation (4G) of smart phones and mobile Internet access that evolved as follow: LTE (Long Term Evolution) is defined as a 4G standard was effectively first launched in 2009 in Scandinavia (Oslo and Stockholm). Wi-MAX 1, 1.5 and 2 were all designed as wireless MAN (Metropolitan area Network). Wi-MAX release 2 core technology (802.16m) provides data speed 4 times faster than the first release and e m release 2 is backward compatible with Wi-MAX release 1 so the migration from Wi-MAX 1 to Wi-MAX 2 needs only to update the software or upgrade the channel cards. By the start of 2012 Wi-MAX networks around the world were estimated to have more than one billion subscribers. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 17

18 Blue-tooth wireless technology Bluetooth networking technology was developed in 1994 in the labs of ERICSSON (the Scandinavian communication giant company) by 2 employees Jaap Haartsen and Sven Mattisson It was called by this name after the Scandinavian king Harald ( ) who was very productive in building bridges and making all Scandinavian tribes communicate with each other. This king was nicknamed BLUETOOTH because his front teeth were blue colored affected by his love of eating berries. Bluetooth is a full wireless networking technology using low power transmitters that are designed to link computing devices in PAN (Personal Area Network) over short distances (10 meters = 33 feet or less). Newer Bluetooth technology using more powerful transmitters can be used for up to 100 meters or 330 feet. The frequency band used is MHz divided into 79 channels one MHz apart assigned by the ISM (Industrial Scientific Medical) agency. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 18

19 Bluetooth (continued) The basic network in a Bluetooth system is the Pico-net up to 8 nodes because the address is 3 digits (2^3 = 8). Each device in Pico-net is a peer device (it can act a master or a slave so at a given time we have one master and 7 slaves. Two or more Pico-nets form a scatter-net A scatter happens when one slave of any Pico-net elects to behave as master or slave in another one. This interconnectivity enables Bluetooth devices to reach beyond the short range of Bluetooth network. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 19

20 Bluetooth protocol because of the diversity of Bluetooth devices the technology has a stack of several protocols to handle diverse services and provide for implementation flexibility. These protocols are: LMP (Link Management protocol) establishes and manages links and ability to query. BNEP (Bluetooth Network Encapsulation Protocol) used by Bluetooth PNA to manage packet switching and transmission in the network. HCI (Host Controller Interface) establishes and controls communication between operating system of computer devices and Bluetooth IC (Integrated Circuit). SDP (Service Discovery Protocol) enables any Bluetooth device to discover services offered by other devices and their characteristics and parameters. TCS and TCS-BIN (Telephony Control Protocol allows voice and data calls between devices of Bluetooth network. WAP (Wireless Application Protocol) provides necessary access to telephone and computer networks for mobile users who are connecting thru Bluetooth network. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 20

21 Samples of Bluetooth apps: PROFINET: Bridge that connects two Ethernet networks. Wii of Nintendo and PS3 of Sony game consoles use Bluetooth to accommodate their game controllers. Personal security application: Bluetooth tag (marker) attached to protected objects and has constant communication with a phone. If the communication is interrupted a warning signal is activated. RTLS (Real Time Location System) app that enables user to track and locate objects by attaching or embedding Bluetooth markers or tags and using readers to intercept and process signals sent by the tags. Bluetooth OBEX (Object Exchange) is an application that allows exchange of information and transfer of files within all devices of Bluetooth network. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 21

22 Internet Internetworking: The basic idea behind Internet invention is connecting networks with each other creating a network of networks (MAN or WAN). This process is known as internetworking and several technological steps were already set up that guided to the Internet. Networks may have different topologies and different protocols and to connect them we need to set up a conversion or translation service between them. Connecting networks: Two similar networks (same protocol) are connected by means of a bridge whose job is to connect 2 or more segments and control packet flow between them. Two dissimilar networks (have different protocols) are connected by means of gateway device which provide assistance to make sure the message flows uniformly in both networks Network switch links segments of the network to bridges or gateways. Basic switches don t process data. A switch that does process data is called multilevel switch because it will be working at a level 3 processing. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 22

23 Packet switching Internetworking technology will be impossible with circuit switching that allows fewer messages to use the network pathways simultaneously. Packet switching, on the other hand, optimizes the use of network pathways by dividing each message into parcels of data called packets whose trips take short time. Packets are sent from A to B using most available pathways between them instead of only one like in circuit switching. Consider the following scenario of 9 packets going from A to B. Packet1 takes itinerary I1 Packet2 takes Itinerary I2 and so on Packet9 takes Itinerary I9 Upon arrival to B, a guide will gather them regroup them and deliver them altogether one message as they initially were. An internetwork is basically a small Internet the biggest internetwork of all networks and internetworks is the Internet that controls our daily life (as individual, community, society, business, government and so on ) DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 23

24 Internet protocol Internet protocol TCP/IP (Transmission Control Protocol/Internet Protocol) was the right solution where each part fulfills a specific job making the process very fast to handle the huge number of exchanged packets: TCP (Transmission Control Protocol) is the part that takes care of the packet at the origin and destination making sure they are well prepared at the origin and assemble them prior to the correct delivery at the destination. TCP cuts the message into packets below 1500 bytes each because Ethernet protocol in LANs cannot take more than 1500 bytes. IP (Internet Protocol) is the part that takes care of addressing the packets and directs them thru their proper itineraries. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 24

25 Internet backbone Internet backbone can be compared to human backbone or spine because it connects every internet host user to other users like human backbone connect to every organ and cell of the human body. This backbone comprises all fast and broad band networks and connections owned by major telecommunication companies (AT&T, Spirit, French telecom, Finn telecom, etc ) all around the world including: Under ocean cables installed by submarines and known as submarine cables that link most continents. Satellites owned and operated by large telecommunications companies because the private sector took over in Ground high speed telecommunication and networking infrastructure including wired and wireless infrastructure. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 25

26 Internet status Nobody own the Internet, however big telecommunication companies own parts of the Internet backbone and make profit by charging use fees so Internet providers can be divided into 3 tiers: Tier 1: comprises huge ISP (Internet Service Provider) companies that don t need to pay anything to access all nodes of the Internet. Qwest, AT&T, Verizon, sprint, French telecom, Finn telecom etc Tier 2: comprises ISP companies that need to pay for some access from Tier 1 companies. Tier 3: Comprises ISP companies that lease Internet access from Tier 1 or Tier 2 companies provide services to subscribers and don t own connections by themselves. Tier 1, Tier 2 and Tier 3 companies are all Internet service providers (ISP)s and that s why the quality of Internet service is normally better with Tier 1 companies then Tier 2 then Tier 3. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 26

27 Internet access Five most important characteristics of Internet access are: Reliability: Connection is available when needed without unexpected interruption due to coverage and weather Speed: Download speed and upload speed in Mbps. Cost should be reasonable and justified. Customer satisfaction oriented help and assistance service Free array of popular general information News Weather Gaming Travel and entertainment. ISP (Internet Service Provider) provides a modem (modulator demodulator) that is able to accommodate all services provided. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 27

28 Internet access methods Dial-up connection: The first used method of access Host must dial a number and wait until getting access. Very slow access impossible to deal with multimedia because it can only handle up to 56 Kbps Uses telephone line so you cannot use the telephone and access the Internet simultaneously (one service at a time) Service is ON only after you dial and be lucky to get connected Still used in some rural areas where there is no fast Internet yet. The least expensive service of all. DSL (Digital Subscriber Line) Always On Internet service Provided by telephone companies and uses telephone lines. Because of switching technology provided by the ISP, you can use both the telephone and the Internet simultaneously. Fast Internet that may go up to 6 Mbps. Price is reasonable but much higher than dial-up connection service DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 28

29 Cable TV: provides the connection as part of a package that includes TV channels and possible more services like Internet telephone Always ON connection A splitter modem is provided by the CTV provider that routes TV channels to the TV and Internet service to the computer or the wireless router if you want to install a WI- FI network. You can watch TV and access Internet and its services simultaneously. Very fast connection up to 8 Mbps and may reach up to 50 Mbps in case businesses want speed beyond what is offered for the public. Slightly higher cost than DSL Very reliable (not affected by weather condition. Satellite access: direct satellite access is provided by many companies that operate and manage satellites like HughesNet, My Blue Dish and Wild blue in the USA. Provide fast Internet in rural areas where only dial-up connection or no connection at all is available. Always ON connection Speed may go up to 18 Mbps. Very reliable Internet access Most expensive Internet service. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 29

30 VPN (Virtual Private Network) Very important business network that use client server topology May have partly installed local structure. Operates using public networks (mainly the Internet) to exchange private data and make private communications To enforce and enhance communication security a protocol known as Tunneling protocol is used. Tunneling protocol usually does the following: Authenticate the client requesting communication to the VPN Create a secured tunnel (pathway). Complete and control the communication thru that tunnel. VPN is used by businesses to create connection possibilities for their Intranet and Extranet as we will see below. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 30

31 Intranet Internetwork of many private networks in a company designed to accommodate teamwork and enhance communication and file sharing in a company Uses the Internet protocol TCP/IP Hi security network in a business. Only authorized executives, managers and employees can access it (no outsiders allowed in) An Intranet consists of: Internal system Database loaded with important information and news about the company and its working environment. Websites and some other services as needed. Secured and firewalled Internet access VPN connection to support remote access for company s staff. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 31

32 Extranet Internetwork like Intranet but with strictly controlled outside access Use VPN (Virtual Private Network) to connect with another network in a different organization. Extranets are widely used by medium and large companies because of the simplicity and convenience they add to business customer relationship and easiness of communication between businesses. DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 32

33 VAN (Value Added Network) considered as a competitor to the post office for business documents and file exchange between businesses. Privately owned highly secured network using private communication media Provides specific services known as VAN services like legal service or translation or accessing special database. Handles electronic mail and file transfer between businesses like EDI (Electronic Data Interchange) transactions. Businesses lease lines to connect to the network and need to install specific software for this purpose. Internet replaced many VANs lately and successfully introduced itself as much efficient and economic tool to replace the VAN. VAN use remains popular between businesses that are seeking high security level when exchanging files DR. NAZIH ABDALLAH - MODERN BUSINESS COMPUTER 33

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol? Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 6 Telecommunications, Networks, and Wireless. Computing Chapter 6 Telecommunications, Networks, and Wireless Computing Essay Questions: 1. Define a hub, switch, and a router. 2. List the challenges associated with managing contemporary telecommunications and

More information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

LTE, WLAN, BLUETOOTHB

LTE, WLAN, BLUETOOTHB LTE, WLAN, BLUETOOTHB AND Aditya K. Jagannatham FUTURE Indian Institute of Technology Kanpur Commonwealth of Learning Vancouver 4G LTE LTE (Long Term Evolution) is the 4G wireless cellular standard developed

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

Understand Wide Area Networks (WANs)

Understand Wide Area Networks (WANs) Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

CTS2134 Introduction to Networking. Module 07: Wide Area Networks CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1 Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Connection Services. Hakim S. ADICHE, MSc

Connection Services. Hakim S. ADICHE, MSc Connection Services Hakim S. ADICHE, MSc adiche@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how

More information

Internet Public Network

Internet Public Network Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500

More information

CSCI 491-01 Topics: Internet Programming Fall 2008

CSCI 491-01 Topics: Internet Programming Fall 2008 CSCI 491-01 Topics: Internet Programming Fall 2008 Introduction Derek Leonard Hendrix College September 3, 2008 Original slides copyright 1996-2007 J.F Kurose and K.W. Ross 1 Chapter 1: Introduction Our

More information

Voice and Delivery Data Networks

Voice and Delivery Data Networks Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone

More information

Wireless Broadband Access

Wireless Broadband Access Wireless Broadband Access (Brought to you by RMRoberts.com) Mobile wireless broadband is a term used to describe wireless connections based on mobile phone technology. Broadband is an electronics term

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

Narrowband and Broadband Access Technologies

Narrowband and Broadband Access Technologies Computer Networks and Internets, 5e Chapters 12 and 16 Access and Interconnection Technologies (slidesets abridged/combined) By Douglas Comer Modified from the lecture slides of Lami Kaya (LKaya@ieee.org)

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.

The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile. Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and

More information

CHAPTER 1 1 INTRODUCTION

CHAPTER 1 1 INTRODUCTION CHAPTER 1 1 INTRODUCTION 1.1 Wireless Networks Background 1.1.1 Evolution of Wireless Networks Figure 1.1 shows a general view of the evolution of wireless networks. It is well known that the first successful

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Network Topology Comparison

Network Topology Comparison Topology Star Bus Each computer connects to a central connection device. Bus Single cable connects everything. Ring Single cable configured in a ring. Information Transfer All information passes through

More information

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard INFO 1500 Introduction to IT Fundamentals Learning Objectives 6. Telecommunications and networks, the Internet 1. Identify the principal components of telecommunications networks and key networking technologies.

More information

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CET 2600 COURSE TITLE: Network Fundamentals PREREQUISITE(S): CTS 1131 and CTS 1133 COREQUISITE(S): STUDENT

More information

CPET 581 E-Commerce & Business Technologies. Topics

CPET 581 E-Commerce & Business Technologies. Topics CPET 581 E-Commerce & Business Technologies E-Commerce Infrastructure Lecture Note 2 of 2 References: *Chapter 3. E-Commerce Infrastructure: The Internet, Web, and Mobile Platform of text book: e-commerce:

More information

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Chapter 3 Cellular Networks Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna Objectives! Understand Cellular Phone Technology! Know the evolution of evolution network! Distinguish

More information

Wireless Technologies for Automation

Wireless Technologies for Automation Wireless Technologies for Automation Prof. Dr.-Ing. Jörg F. Wollert Wireless Technologies for Automation Why using wireless communication? Pros and cons in wireless networks Embedded Wireless Hardware

More information

Project to set up Wireless Network for Midwest Home Health Agency

Project to set up Wireless Network for Midwest Home Health Agency Project to set up Wireless Network for Midwest Home Health Agency Site Survey Report and Recommendations Submitted by: Asha B. Maghirang 12/8/2011 Midwest Home Health Agency is a home care provider, servicing

More information

Component 4: Introduction to Information and Computer Science

Component 4: Introduction to Information and Computer Science Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 1 This material was developed by Oregon Health & Science University, funded by the Department of Health

More information

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 3. Internet : the vast collection of interconnected networks that all use the TCP/IP protocols E-Commerce Infrastructure II: the World Wide Web The Internet and the World Wide Web are two separate but related things Oct 15, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html 1 Outline The Internet and

More information

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka What is a network? A computer network is two or more computers connected together using a telecommunication system for the purpose

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.

More information

Key Term Quiz Answers

Key Term Quiz Answers Key Term Quiz Answers The Internet Use the Key Terms list to complete the sentences that follow. Not all terms will be used. 1. The time it takes for a packet to travel to its destination and back is called

More information

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl.

White Paper. D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. E-mail: info@dlink.com.sg; Web: http://www.dlink-intl. Introduction to Voice over Wireless LAN (VoWLAN) White Paper D-Link International Tel: (65) 6774 6233, Fax: (65) 6774 6322. Introduction Voice over Wireless LAN (VoWLAN) is a technology involving the use

More information

an interconnected collection of autonomous computers interconnected = able to exchange information

an interconnected collection of autonomous computers interconnected = able to exchange information Overview: Network Introduction what is a computer network? digital transmission components of a computer network network hardware network software What is a computer network? an interconnected collection

More information

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0 (CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without

More information

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows.

ADSL BROADBAND BASICS FOR THE DOMESTIC USER. The Main Limitations of ADSL Broadband are as follows. ADSL BROADBAND BASICS FOR THE DOMESTIC USER AS NOTHING MAN MADE IS PERFECT, ADSL IS NOT AN EXCEPTION. The Main Limitations of ADSL Broadband are as follows. 1. ADSL is not a Guaranteed Bandwidth Service.

More information

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class

1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class 1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

Network support for tele-education

Network support for tele-education Network support for tele-education Aiko Pras Centre for Telematics and Information Technology University of Twente (UT) http://wwwtios.cs.utwente.nl/~pras This paper discusses the state of the art in networking,

More information

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs

CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs CWNA: Official Certification Guide Unit 1 Introduction to Wireless LANs Wireless LANs were once considered expensive and slow solutions to certain network connectivity issues. Wireless LAN sales are now

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

Getting Broadband. FCC Consumer Facts. What Is Broadband?

Getting Broadband. FCC Consumer Facts. What Is Broadband? Getting Broadband FCC Consumer Facts What Is Broadband? Broadband or high-speed Internet access allows users to access the Internet and Internetrelated services at significantly higher speeds than those

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

INTERNET CONNECTIVITY

INTERNET CONNECTIVITY INTERNET CONNECTIVITY http://www.tutorialspoint.com/internet_technologies/internet_connectivity.htm Copyright tutorialspoint.com Here in this tutorial, we will discuss how to connect to internet i.e. internet

More information

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN Chapter 12 Topics: Communication links LAN / WAN Internet / WWW A computer network is a set of independent computer systems interconnected by telecommunication links. CMPUT101 Introduction to Computing

More information

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps

Network edge and network core. millions of connected compu?ng devices: hosts = end systems running network apps Computer Networks 1-1 What s the Internet: nuts and bolts view PC server wireless laptop cellular handheld access points wired links millions of connected compu?ng devices: hosts = end systems running

More information

Network Edge and Network Core

Network Edge and Network Core Computer Networks Network Edge and Network Core Based on Computer Networking, 4 th Edition by Kurose and Ross What s s the Internet: Nuts and Bolts View PC server wireless laptop cellular handheld access

More information

Bridging the Last Mile California s Wireless Internet Providers

Bridging the Last Mile California s Wireless Internet Providers Bridging the Last Mile California s Wireless Internet Providers Lead Author: Adam Morrison, Intern, California Broadband Initiative: www.calink.ca.gov Disclaimer: This document is a working draft and intended

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet?

What s a protocol? What s a protocol? A closer look at network structure: What s the Internet? What s the Internet? What s the Internet? What s the Internet? PC server laptop cellular handheld access points wired s connected computing devices: hosts = end systems running apps communication s fiber, copper, radio transmission rate = bandwidth

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8

Introduction Page 2. Understanding Bandwidth Units Page 3. Internet Bandwidth V/s Download Speed Page 4. Optimum Utilization of Bandwidth Page 8 INDEX Introduction Page 2 Understanding Bandwidth Units Page 3 Internet Bandwidth V/s Download Speed Page 4 Factors Affecting Download Speed Page 5-7 Optimum Utilization of Bandwidth Page 8 Conclusion

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

ELEC3030 Computer Networks

ELEC3030 Computer Networks ELEC3030 Computer Networks Professor Sheng Chen: Building 86, Room 1021 E-mail: sqc@ecs.soton.ac.uk Download lecture slides from: http://www.ecs.soton.ac.uk/ sqc/el336/ or get them from Course Office (ECS

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Chapter 2 - The TCP/IP and OSI Networking Models

Chapter 2 - The TCP/IP and OSI Networking Models Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application

More information

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks

NZQA Expiring unit standard 6857 version 4 Page 1 of 5. Demonstrate an understanding of local and wide area computer networks Page 1 of 5 Title Demonstrate an understanding of local and wide area computer networks Level 7 Credits 10 Purpose People credited with this unit standard are able to: describe network types and standards;

More information

Go Cable! And Supercharge Your Internet Connection

Go Cable! And Supercharge Your Internet Connection Go Cable! And Supercharge Your Internet Connection Page 1 Go Cable! And Supercharge Your Internet Connection This Ebook Guide Provided To You By: The ebook Directory Go Cable! And Supercharge Your Internet

More information

Copyright. Transport networks. Physical layer Transport and access networks. Pag. 1

Copyright. Transport networks. Physical layer Transport and access networks. Pag. 1 Physical layer Transport and access networks Gruppo Reti TLC nome.cognome@polito.it http://www.telematica.polito.it/ COMPUTER NETWORK DESIGN Physical layer review - 1 Copyright Quest opera è protetta dalla

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

Telecom Applications:

Telecom Applications: Wireless Broadband: As the global economy continues to expand, so does the demand for information. This information needs to be abundant, diversified, instant, scattered and mobile, all at the same time.

More information

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com

WAN Technology. Heng Sovannarith heng_sovannarith@yahoo.com WAN Technology Heng Sovannarith heng_sovannarith@yahoo.com Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided

More information

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011

HSPA, LTE and beyond. HSPA going strong. PRESS INFORMATION February 11, 2011 HSPA, LTE and beyond The online multimedia world made possible by mobile broadband has changed people s perceptions of data speeds and network service quality. Regardless of where they are, consumers no

More information

Computer Networks Vs. Distributed Systems

Computer Networks Vs. Distributed Systems Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services WAN Introduction Wide area networks (WANs) Connect BNs and LANs across longer distances, often hundreds of miles or more Typically built by using leased circuits from common carriers such as AT&T Most

More information