Chapter 5: Understanding Internetworking Infrastructure
|
|
|
- Willis Hood
- 10 years ago
- Views:
Transcription
1 Chapter 5: Understanding Internetworking Infrastructure
2 Key questions What are the basic components of Internetw orking Infrastructures? What Business Implications do they bring? The Future?
3 A Graphical Representation of Moore s Law Moore's Law Transistors per Chip Year Adapted by author from Microprocessor Report 9(6), May 1995 and ChipList 9.9.5, by Aad Offerman, July Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-1
4 Basic Components of Internetworking Infrastructures The Technological Elements Local Area networks Hubs, switches and Network Adapters Wide Area Networks Routers Firewalls and other security systems and devices Caching, content acceleration and other specialized devices
5 T h e E v o l u t i o n o f C o r p o r a t e I T I n f r a s t r u c t u r e S o u r c e : A p p l e g a t e, L y n d a M., R o b e r t D. A u s t i n, a n d F. W a r r e n M c F a r l a n, C o r p o r a t e I n f o r m a t i o n S t r a t e g y a n d M a n a g e m e n t. B u r r R i d g e, I L : M c G r a w - H i l l / I r w i n, C h a p t e r 5 F i g u r e 5-2
6 A Graphical Representation of Metcalfe s Law Metcalfe's Law Value of Network Number of Users Connected to the Network Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-3
7 T h e B a n d w i d t h E x p l o s i o n N e t w o r k B a n d w i d t h G r o w t h T r u e v o i c e - o v e r - I P t e l e p h o n y, h i g h r e s o l u t i o n I n t e r n e t t e l e v i s i o n, m u s i c a n d m o v i e s o n d e m a n d, v i r t u a l w o r k p l a c e s, b r o a d b a n d w i r e l e s s L i v e a u d i o a n d v i d e o s t r e a m i n g e v e n t s, d i g i t a l c o m m e r c e, I n t e r n e t r a d i o a n d t e l e v i s i o n, v i o c e c h a t a p p l i c a t i o n s S t r e a m i n g a u d i o a n d v i d e o, a d v a n c e d e - c o m m e r c e, l i v e s t o c k q u o t e s, 1, M B p s M a s s W W W a d o p t i o n, g r a p h i c i n t e n s i v e, i n s t a n t m e s s a g i n g M a s s e - m a i l a d o p t i o n, b a s i c W W W s i t e s L a r g e f i l e t r a n s f e r, e - m a i l F i l e t r a n s f e r I n c r e a s i n g N e t w o r k B a n d w i d t h S o u r c e : A d a p t e d f r o m : h t t p : / / w w w. s t a n f o r d. e d u / ~ y z a r o l i a / C h a l l e n g e s. h t m C h a p t e r 5 F i g u r e 5-4
8 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Processing Systems Client Devices and Systems Server Devices and Systems Mainframe Devices and Systems Middleware Infrastructure Management Systems Business Applications
9 A Simple LAN Workstation Laptop Workstation Printer Hub Server Printer Laptop Workstation Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-5
10 An Example of a WAN Remote Backup Frame Relay Network Backup Frame Relay Network Production Plant Frame Relay Provider Network Production Plant Corporate Backup Frame Relay Network Remote Remote Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Figure 5-6
11 UPER LOWER NORMA D SD SD SD SD SD SD SD SD Servers in a Typical E-Commerce Configuration Qdata Facility Big Iron Qdata Private Network VPN Cust A To Public Internet VPN Cust B Router- Cust A Ethernet Switch DNS Servers Router- Cust B VPN Cust... Internet Router Router- Cust... Network Management VPN ipremier Company ipremier Co Cage Router Firewall Web Accelerator Router to HO Ethernet Switches T1 Web Server Cluster SMTP/POP Server Network Management Database Server DIAGRAM SIMPLIFIED FOR ILLUSTRATION PURPOSES Source : Austin, Robert D.; Leibrock, Larry; Murray, Alan, The ipremier Company: Denial of Service Attack (A), Harvard Business School Case No Chapter 5 Figure 5-7
12 Basic Components of Internetworking Infrastructures (Cont) The Technological Elements of Facilities Building and Physical spaces Network Conduits and connections Power Environmental controls Security
13 A Modern Data Center Source: Allegiance Telecom Chapter 5 Figure 5-8
14 Basic Components of Internetworking Infrastructures (Cont) The Operational Characteristics of Internetworks Open Standards (TCP/IP) Asynchronous Operation Inherent Latency Decentralization Scalability
15 Fundamental Components of Internetworking Infrastructure Netw ork Processing Systems Facilities Core Technologies Fiber optics, cable systems, DSL, satellite, wireless, Internetworking hardware (routers, switches, firewalls), content delivery software, identity and policy management, net monitoring Transaction software (enterprise systems offered by companies such as SAP or Oracle; or more targeted solutions offered by companies such as Trilogy and i2), servers, server appliances, client devices (PCs, handhelds) Corporate data centers, collocation data centers, managed services data centers, data closets Key Management Issues How to select technologies and standards How to select partners How to manage partner relationships How to assure reliability How to maintain security What to keep internal and what to outsource How to deploy, grow, and modify Enterprise system or best-of-breed hybrid? Relationships with legacies How to manage incidents How to recover after a disaster Internal or external management? Choosing a facilities model suited to your company How to assure reliability How to maintain security Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-1
16 Measuring Network Bandwidth Term Bandwidth bit bits per second or bps Definition The maximum rate at which information can be transmitted along a communication link. Smallest unit of information handled by computers Bandwidth measurement unit Bandwidth Rates Bit equivalent Information Transfer speed 1 kilobit (Kb) 1 thousand bits 1,000 bits/ second 1 megabit (Mb) 1 million bits 1,000,000/ second 1 gigabit (Gb) 1 billion bits 1,000,000,000/ second Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-2
17 The Rise of Internetworking: Business Implications The emergence of Real Time Infrastructures Broader Exposure to Operational Threats New Models Of Service Delivery Managing Legacies
18 Communication Technology Bandwidths and User Groups Communication Technology Bandwidth a User Groups Telephone Modem 33.6 kbps 56 kbps Individuals and small businesses Integrated Services Digital Network (ISDN) 128 kbps Individuals and small businesses Cable Modem 128 kbps 512 kbps Individuals and small businesses Digital Subscriber Line (DSL) 128 kps 1.5 mbps Individuals and small businesses Ethernet LAN 10 mbps 100 mbps Most businesses and organizations Leased Lines (T1, T3) mbps, 45 mbps Government, universities, medium and large businesses Asynchronous Transfer Mode (ATM)/ Gigabit Ethernet 155 mbps 25.6 gbps Government, universities, and large corporations a We have listed the typical bandwidth performance. Some of the technologies are theoretically capable of higher bandwidths. Additional, some technologies perform at different speeds upstream and downstream. Source: Applegate, Lynda M., Robert D. Austin, and F. Warren McFarlan, Corporate Information Strategy and Management. Burr Ridge, IL: McGraw-Hill/Irwin, Chapter 5 Table 5-3
19 W a k e - U p C a l l : D e n i a l o f S e r v i c e A t t a c k s i n F e b r u a r y D a t e T a r g e t C o m p a n y R e s u l t s o f A t t a c k F e b r u a r y 7 Y a h o o O v e r w h e l m i n g s p i k e i n t r a f f i c t h a t l a s t e d 3 h o u r s. N e t w o r k a v a i l a b i l i t y d r o p p e d f r o m 9 8 % t o 0 %. A t t a c k o r i g i n a t e d f r o m 5 0 d i f f e r e n t l o c a t i o n s a n d w a s t i m e d t o o c c u r d u r i n g m i d d l e o f b u s i n e s s d a y. S t o c k w a s d o w n 3. 2 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. F e b r u a r y 8 B u y. c o m A t t a c k o c c u r r e d w i t h i n a n h o u r o f t h e c o m p a n y s I n i t i a l P u b l i c O f f e r i n g ( I P O ). S t o c k w a s d o w n a t w e e k s e n d m o r e t h a n 2 0 % f r o m I P O p r i c e. E b a y S t o c k w a s d o w n 7. 3 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. C N N. c o m S e r v i c e d i s r u p t e d F e b r u a r y 9 E * T r a d e A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. S t o c k w a s d o w n 7. 6 % f o r w e e k i n w h i c h N A S D A Q r o s e a l m o s t 3 %. Z D N e t S e r v i c e d i s r u p t e d F e b r u a r y 1 8 F e d e r a l B u r e a u o f I n v e s t i g a t i o n S e r v i c e d i s r u p t e d. ( F B I ) F e b r u a r y 2 4 N a t i o n a l D i s c o u n t B r o k e r s G r o u p A t t a c k e d d u r i n g p e a k t r a d i n g h o u r s. ( N D B ) O p e r a t o r s a c c i d e n t a l l y c r a s h e d s i t e a s t h e y a t t e m p t e d t o d e f e n d a g a i n s t t h e a t t a c k. a O v e r a l l p e r f o r m a n c e o f t h e I n t e r n e t d e g r a d e d b y a s m u c h a s 2 5 % d u r i n g t h e p e a k o f t h e a t t a c k s a s c o m p u t e r s r e - s e n t m e s s a g e s r e p e a t e d l y a n d a u t o m a t i c a l l y, t r y i n g t o r e c o v e r i n t e r r u p t e d t r a n s a c t i o n s. S o u r c e : A d a p t e d f r o m : N e t w o r k W o r l d F u s i o n, w w w. n f u s i o n. c o m, c o m p l i e d b y L e G r a n d E l e b a s h. C h a p t e r 5 T a b l e 5-4
20 The Future Client-Server model became popular LANs, WANs, VANs Less dependence on Mainframe comput ers & MIS Electronic communication/workgroup computing tools support group work See GWUForecast.gwu.edu
21 Organizational Design Challenges The Virtual Corporation From Control to Learning From Autonomy to Collaboration Organizational Structure Authority and Decision Making Operating Processes Management Processes Incentives and rewards Roles/Skills and Expertise Career Development
22 Targeted Opportunities Communicating Organizational Priorities Meaningful Budgets Effective Incentive Systems Solution for Production Adaptation for Change
23 Interorganizational Systems (IOS) Networked information systems used by two or more separate organizations to perform a joint business function Interorganizational systems (IOS) Electronic Data Interchange uses EDI standards Extranets - IOS over the Internet
24 IOS EXAMPLE Kmart has opened its IS to help suppliers better serve customers. The interface has an extensive GUI component and allows 50 to 100 vendors to look at Kmart s merchandising database. For example, the system lets Black and Decker access to any data that Kmart believes helps B&D better serve Kmart and its customers. Kmart implemented this program in exchange for more frequent and smaller deliveries, but also because it was in the best interested of the company, its customers and its suppliers. Why did Kmart implement this IOS? What is the implication for having Kmart decide on what info B&D can access?
25 IOS Risks Forces automation & lock-in to a particular system Government regulations may change Great impacts on organizational structures, systems, & people - loss of control Diminishes organizational boundaries -- requires trust in partners
26 Electronic Data Interchange (EDI) Computer-to-computer exchange of standard business transaction documents between 2 organizations purchase orders invoices bill of lading
ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
Technical Glossary from Frontier
Technical Glossary from Frontier A Analogue Lines: Single Analogue lines are generally usually used for faxes, single phone lines, modems, alarm lines or PDQ machines and are generally not connected to
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
MANAGEMENT INFORMATION SYSTEMS 8/E
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
Introduction. Network Basics. Workstations. Server. Hub
Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Broadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
Chapter 6. Architecture About Infrastructure. Introduction. Real World Examples
Introduction Chapter 6 Architecture and Managing and Using Information Systems: A Strategic Approach by Keri Pearlson & Carol Saunders What is the architecture of an organization? What is the infrastructure
How To Get High Speed Internet In Australia
ADSL vs Cable Cable subscribers are connected directly to high speed lines while ADSL subscribers are connected directly to medium speed lines Cable subscribers share the line connecting them to neighbourhood
Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.
The basic conditions and terms used to describe information exchange over networks. 385 Jordan Road Troy, NY 12180 Phone 518.286.7000 518.286.2439 www.learnlinc.com Table of Contents TABLE OF CONTENTS...2
C20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
Internet Public Network
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
1.264 Lecture 34. Telecom: Connecting wired LAN, WAN. Next class: Green chapter 17. Exercise due before class
1.264 Lecture 34 Telecom: Connecting wired LAN, WAN Next class: Green chapter 17. Exercise due before class 1 Exercise Your transportation brokerage company also handles billing for freight shipments,
Glossary of Telco Terms
Glossary of Telco Terms Access Generally refers to the connection between your business and the public phone network, or between your business and another dedicated location. A large portion of your business
Broadband Bonding Network Appliance TRUFFLE BBNA6401
Broadband Bonding Network Appliance TRUFFLE BBNA6401 White Paper In this brief White Paper we describe how the TRUFFLE BBNA6401 can provide an SMB with faster and more reliable Internet access at an affordable
i. Definition ii. Primary Activities iii. Support Activities iv. Information Systems role in value chain analysis
ACS 1803 Final Exam Topic Outline I. Enterprise Information Systems a. Enterprise systems vs. inter-organisational systems b. Value Chain Analysis ii. Primary Activities iii. Support Activities iv. Information
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
NETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
Basic Computer Networks Configurations
School of Business Eastern Illinois University Basic Computer Networks Configurations (September 2, 2015) Abdou Illia, Fall 2015 Learning Objectives 2 Outline Basic network configurations Name kinds of
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS. Chapter 5: Network Design and Troubleshooting Scenarios
CMPD 323 DATA COMMUNICATION & COMPUTER NETWORKS Chapter 5: Network Design and Troubleshooting Scenarios Objectives Discuss several considerations that must be made when networking computers together, from
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
NETWORKING TECHNOLOGIES
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
IT Components of Interest to Accountants. Importance of IT and Computer Networks to Accountants
Chapter 3: AIS Enhancements Through Information Technology and Networks 1 Importance of IT and Computer Networks to Accountants To use, evaluate, and develop a modern AIS, accountants must be familiar
WAN Technology. Heng Sovannarith [email protected]
WAN Technology Heng Sovannarith [email protected] Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Colt IP VPN Services. 2010 Colt Technology Services Group Limited. All rights reserved.
Colt IP VPN Services 2010 Colt Technology Services Group Limited. All rights reserved. Agenda An introduction to IP VPN Colt IP VPN Hybrid Networking Workforce Mobility Summary 2 Drivers behind IP VPN
Local-Area Network -LAN
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Norfolk Community Fiber Optic Network
Norfolk Community Fiber Optic Network It s not only about technology; it s also about relationships! Norfolk s Community Fiber Optic Network Norfolk s Community Fiber Optic Network Overview Connects 12
Understand Wide Area Networks (WANs)
Understand Wide Area Networks (WANs) Lesson Overview In this lesson, you will review: Dial-up Integrated services digital networks (ISDN) Leased lines Virtual private networks (VPN) Wide area networks
Telecommunications systems (Part 1)
School of Business Eastern Illinois University Telecommunications systems (Part 1) (Week 11, Thursday 11/02/2006) Abdou Illia, Fall 2006 Learning Objectives 2 Describe and compare types of connection to
ICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
Connection Services. Hakim S. ADICHE, MSc
Connection Services Hakim S. ADICHE, MSc [email protected] Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Connection Services Different connectivity
Chapter 1 Instructor Version
Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic
www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.
2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
The part of the network that connects customers to the exchange, sometimes called the local loop or the last mile.
Glossary of broadband terms 3G: Refers to the third generation of mobile phone technology following on from 2G. 3G allows for faster access to the internet and allows services including video calls and
Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.
Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote
The Evolution of Ethernet
June 2010 White Paper The Evolution of Ethernet How Ethernet solutions, such as NTT America s VLink, can help businesses reduce private networking costs while leveraging Ethernet technology. Introduction
This course has been retired. View the schedule of current <a href=http://www.ptr.co.uk/networkingcourses.htm>networking
Introduction to Data Communications & Networking Course Description: This course has been retired. View the schedule of current networking Courses
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
Lesson 24 Network Fundamentals
Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe
1.1. Abstract. 1.2. VPN Overview
1.1. Abstract Traditionally organizations have designed their VPN networks using layer 2 WANs that provide emulated leased lines. In the last years a great variety of VPN technologies has appeared, making
Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
Fundamentals of Network Security Graphic Symbols
Fundamentals of Network Security Graphic Symbols Overview Router Figure 1: IOS Router icon and photos A Router is an internetworking device which operates at OSI Layer 3. A Router interconnects network
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
SAMPLE. Please answer the following questions about connectivity between THIS CAMPUS AND THE INTERNET:
Survey Questions The first nine (9) questions are asked for each campus in the district or charter school. The last three (3) questions are each asked once for the district or charter school as a whole.
Alexander Nikov. 5. IT Infrastructure and Emerging Technologies. Learning Objectives. BART Speeds Up with a New IT Infrastructure
INFO 1400 Information Technology Fundamentals 5. IT Infrastructure and Emerging Technologies Alexander Nikov Learning Objectives 1. Define IT infrastructure and describe its components. 2. Identify and
R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Schools and Libraries Universal Service Support Mechanism Eligible Services List
Schools and Libraries Universal Service Support Mechanism Eligible Services List (WC Docket No. 13-184; CC Docket No. 02-6; GN Docket No. 09-51) The Federal Communications Commission s (FCC s) rules provide
XROADS NETWORKS WHITE PAPER
XROADS NETWORKS WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy XROADS NETWORKS - WHITE PAPER The Edge Approach When Connectivity Is Critical TM XRoads Redundancy Redundancy
IT Infrastructure and Emerging Technologies
Chapter 3 IT Infrastructure and Emerging Technologies 5.1 2009 by Prentice Hall Chapter 3 IT Infrastructure and Emerging Technologies LEARNING OBJECTIVES Define IT infrastructure and describe its components.
SuccessWare 21 Deployment Options
SuccessWare 21 Deployment Options This document is intended for a business owner or manager responsible for IT purchasing and management decisions. It is not a technical specifications document, but rather
Enterprise Business Products 2014
Enterprise Business Products 2014 Enterprise Ethernet Services EPL (Ethernet Private Line) - provides point-to-point connectivity between two business locations with scalable bandwidth speeds via an Ethernet
FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
A Talari Networks White Paper. Transforming Enterprise WANs with Adaptive Private Networking. A Talari White Paper
ATalariNetworksWhitePaper TransformingEnterpriseWANswith AdaptivePrivateNetworking ATalariWhitePaper 2 TransformingEnterpriseWANwithAdaptivePrivateNetworking Introduction IT departments face pressures
VMWARE WHITE PAPER 1
1 VMWARE WHITE PAPER Introduction This paper outlines the considerations that affect network throughput. The paper examines the applications deployed on top of a virtual infrastructure and discusses the
Managed Services The. The Road to Revenue. Pravin Mahajan [email protected]. Session Number Presentation_ID
Managed Services The The Road to Revenue Pravin Mahajan [email protected] Session Number 1 Agenda Managed Services Introduction Solution Offerings Market to Services Mapping Summary 2 High Business Interest
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
DSL Variations. NEXTEP Broadband White Paper. Broadband Networks Group. Definitions and differences of Digital Subscriber Line variations.
NEXTEP Broadband White Paper DSL Variations Definitions and differences of Digital Subscriber Line variations. A NEXTEP Broadband White Paper May 2001 Broadband Networks Group DSL Variations EXECUTIVE
1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
2/23/2014. Chapter 5. Problem: Costly and unwieldy IT infrastructure; diminishing resources Solutions:
Chapter 5 IT INFRASTRUCTURE AND EMERGING TECHNOLOGIES VIDEO CASES Case 1: ESPN.com: Getting to extreme Scale On the Web Case 2: Salesforce.com: Managing by Smartphone Case 3: Hudson's Bay Company and IBM:
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Virtual Private LAN Service (VPLS)
Virtual Private LAN Service (VPLS) Walking through Wan history, from the early days Leased lines Customers subscribe to dedicated point-to-point links Cost prohibitive for customers Started in the 1980
White Paper. Complementing or Migrating MPLS Networks
White Paper Complementing or Migrating MPLS Networks Table of Contents 1. Executive Summary... 3 2. Complementing MPLS Networks... 3 3. Migrating from MPLS Networks with Elfiq s SitePathMTPX... 5 4. Calculating
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
IT Infrastructure and Emerging Technologies
Chapter 5 IT Infrastructure and Emerging Technologies 5.1 LEARNING OBJECTIVES 5.2 Define IT infrastructure and describe its components. Identify and describe the stages and technology drivers of IT infrastructure
How To Understand Information Systems
Management Information Systems Information Systems: Concepts and Management Dr. Shankar Sundaresan (Adapted from Introduction to IS, Rainer and Turban) CHAPTER OUTLINE Types of Information Systems Why
Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1
Chapter 9 Internet Copyright 2011 John Wiley & Sons, Inc 10-1 Outline 9.2 - How the Internet Works - Basic Architecture - Connecting to an ISP - Internet Today 9.3 - Internet Access Technologies - DSL
Introduction to Meg@POP
Introduction to Meg@POP SingTel Meg@POP is a comprehensive suite of IP services for businesses which need a secured connection to multiple locations, parties or services in Singapore. It provides a simple
Truffle Broadband Bonding Network Appliance
Truffle Broadband Bonding Network Appliance Reliable high throughput data connections with low-cost & diverse transport technologies PART I Truffle in standalone installation for a single office. Executive
FatPipe Networks www.fatpipeinc.com
XTREME WHITE PAPERS Overview The growing popularity of wide area networks (WANs), as a means by which companies transact vital information with clients, partners, and colleagues, is indisputable. The business
Deploying Riverbed wide-area data services in a LeftHand iscsi SAN Remote Disaster Recovery Solution
Wide-area data services (WDS) Accelerating Remote Disaster Recovery Reduce Replication Windows and transfer times leveraging your existing WAN Deploying Riverbed wide-area data services in a LeftHand iscsi
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
The Connected 5,000: Making the Transition to Business Ethernet Services
The Connected 5,000: Making the Transition to Business Ethernet Services The Connected 5,000 characterizes enterprises with business critical data networks that are ready to take advantage of Business
Chapter 13: Internet Connectivity
Chapter 13: Internet Connectivity Complete CompTIA A+ Guide to PCs, 6e To configure an internal external modem To explain basic handshaking between a DTE device and a DCE device To use Windows tools when
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1
SAN/iQ Remote Copy Networking Requirements OPEN iscsi SANs 1 Application Note: SAN/iQ Remote Copy Networking Requirements SAN/iQ Remote Copy provides the capability to take a point in time snapshot of
Agenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
Community Forum Agenda October 2012
Community Forum Agenda October 2012 Topic Welcome CEKC/WSUE LTPT Project Scope Forums Survey Data Results LTPT Next Steps Broadband 101/Map Q&A Websites Mapping Survey Complete Survey Close/Next Steps
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center
The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center The entire cost of the program is funded by the textbook, ebook or ecourse purchase by your
Chapter 9 Communications and Networks
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education
Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS 1 Telecom Smart Cards, Examples Missiles and Satellites, Computer Networking, Digital Consumer Electronics, and Automotive 2 3 Exemplary Application Areas Also
Security Design. [email protected] http://wwwiuk.informatik.uni-rostock.de/
Security Design [email protected] http://wwwiuk.informatik.uni-rostock.de/ Content Security Design Analysing Design Requirements Resource Separation a Security Zones VLANs Tuning Load Balancing
300Mbps Wireless N VoIP VDSL/ADSL Modem Router
300Mbps Wireless N VoIP VDSL/ADSL Modem Router TD-VG5612 Highlights Fast Broadband Speeds Up to 100Mbps broadband speeds, ideal for smooth streaming media and online gaming Cost-Effective VoIP Supports
