Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

Similar documents
Telecommunications, the Internet, and Wireless Technology

Communication Networks

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Telecommunications, Networks, and Wireless Computing

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9. The Internet: Information Technology Infrastructure for the Digital Firm. Essentials of Management Information Systems

Discovering Computers Chapter 9 Communications and Networks

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 6 Telecommunications, Networks, and Wireless. Computing

Chapter 9 Communications and Networks

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 5. Data Communication And Internet Technology

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Local-Area Network -LAN

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Introduction Chapter 1. Uses of Computer Networks

C Information Systems for Managers Fall 1999

Internet Public Network

MANAGEMENT INFORMATION SYSTEMS 8/E

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Computer Networks. Computer Networks. Telecommunication Links. Connecting. Connecting via Telephone Lines ISDN

NETWORKING TECHNOLOGIES


Introduction to Computer Networks and Data Communications

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Computer Networks Vs. Distributed Systems

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Introduction to computer networks and Cloud Computing

Computer Networking: A Survey

CITS1231 Web Technologies. Client, Server, the Internet, and the Web

lesson 19 Internet Basics

Network Design. Yiannos Mylonas

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 1 Instructor Version

Chapter 9. Internet. Copyright 2011 John Wiley & Sons, Inc 10-1

5 Data Communication and Networking

Network: several computers who can communicate. bus. Main example: Ethernet (1980 today: coaxial cable, twisted pair, 10Mb 1000Gb).

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

CSCI 362 Computer and Network Security

Introduction to Computer

The Internet and Network Technologies

Computer Networking Networks

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

Networks 2. Gabriela Ochoa University of Stirling CSCU9B1 Essential Skills for the Information Age. Content

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

Networks. The two main network types are: Peer networks

Lesson 24 Network Fundamentals

Protocols. Packets. What's in an IP packet

Local Area Networks (LANs) Blueprint (May 2012 Release)

Using MIS 3e Chapter 6A Appendix

CSE 3461 / 5461: Computer Networking & Internet Technologies

Component 4: Introduction to Information and Computer Science

Technical Glossary from Frontier

Computers Are Your Future Prentice-Hall, Inc.

WAN Technology. Heng Sovannarith

MMGD0204 Web Application Technologies. Chapter 1 Introduction to Internet

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

VoIP Glossary. Client (Softphone client): The software installed in the userâ s computer to make calls over the Internet.

CPET 581 E-Commerce & Business Technologies. Topics

CHAPTER - 10 COMPUTER NETWORKING

Communication Networks. MAP-TELE 2011/12 José Ruela

Management Information Systems

TAXONOMY OF TELECOM TERMS

Communications and Networking

Narrowband and Broadband Access Technologies

SSVVP SIP School VVoIP Professional Certification

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

Technical papers Virtual private networks

architecture: what the pieces are and how they fit together names and addresses: what's your name and number?

Portable Wireless Mesh Networks: Competitive Differentiation

IT4405 Computer Networks (Compulsory)

BASICS OF DATA COMMUNICATION AND COMPUTER NETWORKING

Topics. Computer Networks. Let s Get Started! Computer Networks: Our Definition. How are Networks Used by Computers? Computer Network Components

Chapter 4: Networking and the Internet

Chapter 9 The Internet

Networking 4 Voice and Video over IP (VVoIP)

COMPUTER NETWORK TECHNOLOGY (300)

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Cable Modems. Definition. Overview. Topics. 1. How Cable Modems Work

Networking Basics. Uses of a network

an interconnected collection of autonomous computers interconnected = able to exchange information

CHAPTER 9: THE EVOLVING INTERNET

Page 1 of 7. Computer Networking

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Overview of Computer Networks

Deploying In-Building Wireless Solutions

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

The OSI and TCP/IP Models. Lesson 2

THE NATIONAL JUDICIAL COLLEGE

TCP/IP Protocol Suite. Marshal Miller Chris Chase

Key Term Quiz Answers

Wireless e-business by IBM Wireless Local Area Networks

Understand Wide Area Networks (WANs)

Transcription:

INFO 1500 Introduction to IT Fundamentals Learning Objectives 6. Telecommunications and networks, the Internet 1. Identify the principal components of telecommunications networks and key networking technologies. 2. Identify the different types of networks. 3. Describe how the Internet and Internet technology work and how they support communication and e business. 4. Describe the principal technologies and standards for wireless networking, communication, and Internet access. Alexander Nikov 5. Describe radio frequency identification and wireless sensor networks and identify why these are valuable business technologies. 6-2 Hyundai Heavy Industries Creates a Wireless Shipyard Hyundai Heavy Industries Creates A Wireless Shipyard Problem: Shipbuilding space is too large (11 sq km) and complex to track inventory in real time, limiting efficiency Solution: High speed wireless network built by KT Corp, using radio sensors, notebooks, mobiles, Web cams Illustrates: Powerful capabilities and solutions offered by contemporary networking technology Use of radio sensor technologies to track inventory 6-3 6-4

Hyundai Heavy Industries Creates A Wireless Shipyard Outline 1. Telecommunications and Networking in Today s Business World 2. Communications Networks 3. The Global Internet 4. Wireless Networks 6-5 6-6 Networking and communication Trends What is a computer network? Convergence: Telephone networks and computer networks converging into single digital network using Internet standards E.g. cable companies providing voice service Broadband: More than 60% U.S. Internet users have broadband access Broadband wireless: Voice and data communication as well as Internet access are increasingly taking place over broadband wireless platforms 6-7 Two or more connected computers Major components in simple network Client computer Server computer Network interfaces (NICs) Connection medium Network operating system Hubs, switches, routers Software defined networking (SDN) Functions of switches and routers managed by central program 6-8

Components of a Simple Computer Network Networks in large companies Hundreds of local area networks (LANs) linked to firmwide corporate network Various powerful servers Web site Corporate intranet, extranet Backend systems Mobile wireless LANs (Wi Fi networks) Videoconferencing system FIGURE 7-1 Illustrated here is a very simple computer network, consisting of computers, a network operating system residing on a dedicated server computer, cable (wiring) connecting the devices, network interface cards (NICs), switches, and a router. 6-9 Telephone network Wireless cell phones 6-10 Corporate Network Infrastructure Key networking technologies Today s corporate network infrastructure is a collection of many different networks from the public switched telephone network, to the Internet, to corporate local area networks linking workgroups, departments, or office floors. Client/server computing Distributed computing model Clients linked through network controlled by network server computer Server sets rules of communication for network and provides every client with an address so others can find it on the network Has largely replaced centralized mainframe computing The Internet: Largest implementation of client/server computing FIGURE 7-2 6-11 6-12

Key networking technologies (cont.) How does the Internet work? Packet switching Method of slicing digital messages into parcels (packets), sending packets along different communication paths as they become available, and then reassembling packets at destination Previous circuit switched networks required assembly of complete point to point circuit Packet switching more efficient use of network s communications capacity 6-13 6-14 Packed switched Networks And Packet Communications Internet structure FIGURE 7-3 Data are grouped into small packets, which are transmitted independently over various communications channels and reassembled at their final destination. 6-15 6-16

Key networking technologies (cont.) The Transmission Control Protocol/ Internet Protocol (TCP/IP) Reference Model TCP/IP and connectivity Connectivity between computers enabled by protocols Protocols: Rules that govern transmission of information between two points Transmission Control Protocol/Internet Protocol (TCP/IP) Common worldwide standard that is basis for Internet Department of Defense reference model for TCP/IP Four layers 1. Application layer 2. Transport layer 3. Internet layer 4. Network interface layer This figure illustrates the four layers of the TCP/IP reference model for communications 6-17 FIGURE 7-4 6-18 Outline Signals and Types of networks 1. Telecommunications and Networking in Today s Business World 2. Communications Networks 3. The Global Internet 4. Wireless Networks Signals: digital vs. analog Modem: Translates digital signals into analog form (and vice versa) Types of networks Local area networks (LANs) Ethernet Client/server vs. peer to peer Wide area networks (WANs) Metropolitan area networks (MANs) Campus area networks (CANs) 6-19 6-20

Types of Networks Functions Of The Modem FIGURE 7-5 A modem is a device that translates digital signals into analog form (and vice versa) so that computers can transmit data over analog networks such as telephone and cable networks. 21 6-21 6-22 NETWORK TOPOLOGIES Physical transmission media and transmission speed The three basic network topologies are the star, bus, and ring. Physical transmission media Twisted pair wire (CAT5) Coaxial cable Fiber optics cable Wireless transmission media and devices Satellites Cellular systems Transmission speed Bits per second (bps) Hertz Bandwidth FIGURE 7-6 6-23 6-24

BP s Satellite Transmission System Outline 1. Telecommunications and Networking in Today s Business World 2. Communications Networks 3. The Global Internet 4. Wireless Networks FIGURE 7-7 Communication satellites help BP transfer seismic data between oil exploration ships and research centers in the United States. 6-25 6-26 The Internet Internet addressing and architecture World s most extensive network Internet service providers (ISPs) Provide connections Types of Internet connections Dial-up: 56.6 Kbps Digital subscriber line (DSL/FIOS): 385 Kbps 40 Mbps Cable Internet connections: 1 50 Mbps Satellite T1/T3 lines: 1.54 45 Mbps IP addresses The Domain name system (DNS) Converts IP addresses to domain names Hierarchical structure Top-level domains Internet architecture and governance No formal management: IAB, ICANN, W3C The future Internet: IPv6 and Internet2 6-27 6-28

The Domain Name System Internet Network Architecture Domain Name System is a hierarchical system with a root domain, top-level domains, secondlevel domains, and host computers at the third level. FIGURE 7-6 6-29 The Internet backbone connects to regional networks, which in turn provide access to Internet service providers, large firms, and government institutions. Network access points (NAPs) and metropolitan area exchanges (MAEs) are hubs where the backbone intersects regional and local networks and where backbone owners connect with one another. FIGURE 7-9 6-30 Internet services Major Internet Services E mail Chatting and instant messaging Electronic discussion groups / newsgroups Telnet File Transfer Protocol (FTP) World Wide Web 6-31 32

FIGURE 7-10 Client/Server Computing On The Internet Client computers running Web browser and other software can access an array of services on servers over the Internet. These services may all run on a single server or on multiple specialized servers. Voice over IP, Unified communications, Virtual private network Voice over IP (VoIP) Digital voice communication using IP, packet switching Providers Cable providers Google, Skype Unified communications Communications systems that integrate voice, data, e-mail, conferencing Virtual private network (VPN) Secure, encrypted, private network run over Internet PPTP Tunneling 6-33 6-34 How Voice Over IP Works A Virtual Private Network Using The Internet FIGURE 7-9 An VoIP phone call digitizes and breaks up a voice message into data packets that may travel along different routes before being reassembled at the final destination. A processor nearest the call s destination, called a gateway, arranges the packets in the proper order and directs them to the telephone number of the receiver or the IP address of the receiving computer. This VPN is a private network of computers linked using a secure tunnel connection over the Internet. It protects data transmitted over the public Internet by encoding the data and wrapping them within the Internet Protocol (IP). By adding a wrapper around a network message to hide its content, organizations can create a private connection that travels through the public Internet. FIGURE 7-10 6-35 6-36

The Web The Web (cont.) HTML (Hypertext Markup Language): Formats documents for display on Web Hypertext Transfer Protocol (HTTP): Communications standard used for transferring Web pages Uniform resource locators (URLs): Addresses of Web pages E.g. http://www.megacorp.com/content/features/082602.html Web servers Software for locating and managing Web pages Search engines Started as simpler programs using keyword indexes Google improved indexing and created page ranking system Mobile search: 34% of all searches in 2014 (estimated) Search engine marketing Major source of Internet advertising revenue Search engine optimization (SEO) Adjusting Web site and traffic to improve rankings in search engine results 6-37 6-38 How Google Works Browser Statistics http://www.w3schools.com/browsers/browsers_stats.asp The Google search engine is continuously crawling the Web, indexing the content of each page, calculating its popularity, and storing the pages so that it can respond quickly to user requests to see a page. The entire process takes about one-half second. FIGURE 7-13 6-39 40 6-40

Top 15 Most Popular Search Engines Oct-2014 http://www.ebizmba.com/articles/search-engines The Web (cont.) Social search Google +1, Facebook Like Semantic search Anticipating what users are looking for rather than simply returning millions of links Intelligent agent shopping bots Use intelligent agent software for searching Internet for shopping information 6-41 6-42 How Google Works Web 2.0 Figure 7-12 Second-generation services Enabling collaboration, sharing information, and creating new services online Features Interactivity Real-time user control Social participation (sharing) User-generated content The Google search engine is continuously crawling the Web, indexing the content of each page, calculating its popularity, and storing the pages so that it can respond quickly to user requests to see a page. The entire process takes about one-half second. 6-43 6-44

Web 2.0 services and tools Web 3.0: The Semantic Web Web 2.0 services and tools Blogs: chronological, informal Web sites created by individuals RSS (Really Simple Syndication): syndicates Web content so aggregator software can pull content for use in another setting or viewing later Blogosphere Microblogging Wikis: collaborative Web sites where visitors can add, delete, or modify content on the site Social networking sites: enable users to build communities of friends and share information A collaborative effort led by W3C to add layer of meaning to the existing Web Goal is to reduce human effort in searching for and processing information Making Web more intelligent and intuitive Increased communication and synchronization with computing devices, communities Web of things Increased cloud computing, mobile computing 6-45 6-46 Outline Cellular systems 1. Telecommunications and Networking in Today s Business World 2. Communications Networks 3. The Global Internet 4. Wireless Networks Competing standards for cellular service CDMA: United States only GSM: Rest of world, plus AT&T and T Mobile Third generation (3G) networks 144 Kbps Suitable for e mail access, Web browsing Fourth generation (4G) networks Up to 100 Mbps Suitable for Internet video 6-47 6-48

Wireless computer networks and Internet access Bluetooth (802.15) Links up to 8 devices in 10 m area using low power, radio based communication Useful for personal networking (PANs) Wi Fi (802.11) Set of standards: 802.11 Used for wireless LAN and wireless Internet access Use access points: Device with radio receiver/transmitter for connecting wireless devices to a wired LAN 802.11ac new standard Bluetooth enables a variety of devices, including cell phones, PDAs, wireless keyboards and mice, PCs, and printers, to interact wirelessly with each other within a small 30-foot (10-meter) area. In addition to the links shown, Bluetooth can be used to network similar devices to send data from one PC to another, for example. A Bluetooth Network (PAN) FIGURE 7-15 6-49 6-50 Mobile laptop computers equipped with network interface cards link to the wired LAN by communicating with the access point. The access point uses radio waves to transmit network signals from the wired network to the client adapters, which convert them into data that the mobile device can understand. The client adapter then transmits the data from the mobile device back to the access point, which forwards the data to the wired network. An 802.11 Wireless LAN FIGURE 7-16 6-51 Wireless computer networks and Internet access Wi Fi (cont.) Hotspots: Access points in public place to provide maximum wireless coverage for a specific area Weak security features WiMax (802.16) Wireless access range of 31 miles Require WiMax antennas 6-52

Radio frequency identification (RFID) RFID tags: Tiny tags with embedded microchips contain data about an item and location Transmit radio signals over short distances to RFID readers RFID readers: Send data over network to computer for processing Active RFID: Tags have batteries Data can be rewritten Range is hundreds of feet Radio frequency identification (RFID) (cont.) Passive RFID: Range is shorter Smaller, less expensive Powered by radio frequency energy Common uses: Automated toll-collection Tracking goods in a supply chain Requires companies to have special hardware and software Reduction in cost of tags making RFID viable for many firms 6-53 6-54 How RFID Works Wireless sensor networks (WSNs) Networks of hundreds or thousands of interconnected wireless devices embedded into physical environment to provide measurements of many points over large spaces Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity Devices have built-in processing, storage, and radio frequency sensors and antennas Require low-power, long-lasting batteries and ability to endure in the field without maintenance FIGURE 7-15 RFID uses low-powered radio transmitters to read data stored in a tag at distances ranging from 1 inch to 100 feet. The reader captures the data from the tag and sends them over a network to a host computer for processing. 6-55 6-56

A Wireless Sensor Network Video case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra The small circles represent lowerlevel nodes and the larger circles represent highend nodes. Lower level nodes forward data to each other or to higher-level nodes, which transmit data more rapidly and speed up network performance. FIGURE 7-16 http://www.youtube.com/watch?v=dhndnl HkA 6-57 6-58 Video case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 1. What are the gains in productivity that can result through a unified communications system? 2. How does this system support collaboration? 3. How realistic is the collaborative design meeting? Video Case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 1. What are the gains in productivity that can result through a unified communications system? Easier to find people, arrange meetings, communicate on different platforms simultaneously. Easier to collaborate, and faster to reach decisions. 4. What different kinds of communications tools does this system integrate? 5. What does virtual reality add to the unified communication system? 6-59 6-60

Video Case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 2. How does this system support collaboration? Video Case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 3. How realistic is the collaborative design meeting? Strengthens sense of presence, stronger relationships, memorable experiences, faster problem solving and decision making. Overcomes geographical and time limitations of traditional meetings. On balance, an interesting believable dialog among designers, marketers and vendors. It would seem to depend on people being at the computers to work. For instance, if some people were on their cell phones, this system might not work so well except for voice. 6-61 6-62 Video Case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 4. What different kinds of communications tools does this system integrate? Video Case: Unified Communications Systems With Virtual Collaboration: IBM and Forterra 5. What does virtual reality add to the unified communication system? Phones, desktops, email, mobile phones, audio and Web conferencing. Virtual reality is not as real as telepresence which involves human beings appearing on screens. However, if humans cannot be present in the meeting room, they might be able to participate in conferences as avatars. Although there is a tradeoff (less realism), it may be more practical.. 6-63 6-64