pfaff_6_ppt_07
TRANSCRIPT
-
8/11/2019 pfaff_6_ppt_07
1/27
1
Copyright 2003 Prentice Hall, Inc Slides created by Bob Koziel
-
8/11/2019 pfaff_6_ppt_07
2/27
Copyright 2003 Prentice Hall, Inc 2
Tips for using the slide show
Use MS Power Point XPto view the presentation. Earlier versionswill not show the animations correctly.
Slides with :Click the slide to view all of its sections and
animations. Some slides need to be clicked several times.
will appear once the last object on the slide has appeared.
Click to go to the next slide.
represents an Internet link that will take you to the Web site
when you click on it. Internet connection required. Clicking on the or icon will take you to the previous or the
next slide.
Slides with videos or sounds:Click on the picture to view videos or
listen to sounds.
NEXTSLIDE
I
NEXT
SLIDE
Copyright 2003 Prentice Hall, Inc
-
8/11/2019 pfaff_6_ppt_07
3/27
Copyright 2003 Prentice Hall, Inc 3
Chapter 7
Networks: Communicating and Sharing Resources
COMPUTERS IN YOUR FUTURE 2004by Bryan Pfaffenberger and Bill Daley
Chapter 7
Networks: Communicating and Sharing
ResourcesWhat You Will Learn
NEXTSLIDE
Major types of computer networks
How computer connections increase the value of anorganizations information technology investment
The importance of protocols in a computer network
Contrast between circuit switching and packet switching,
as well as their strengths and weaknesses
Differences between peer-to-peer and client/server LANs
The most popular LAN protocol and its benefits
Business applications of WANs
-
8/11/2019 pfaff_6_ppt_07
4/27
-
8/11/2019 pfaff_6_ppt_07
5/27
-
8/11/2019 pfaff_6_ppt_07
6/27
Copyright 2003 Prentice Hall, Inc 6NEXT
SLIDE
Reduced hardwarecosts
Users share
equipment
Connected people People can work
together without being
at the same location
Groupware enables
sharing of schedulesand communications
Networking Synergies in a Nutshell
Shared applications Users share software
File server enables all
users to work with the
same application
program
Building information
resources
Users create common
pools of data that can
be accessed by
employees
-
8/11/2019 pfaff_6_ppt_07
7/27
Copyright 2003 Prentice Hall, Inc 7NEXT
SLIDE
Network Fundamentals
Physical media used in networks:
CablesTelephone lines, coaxial cable,microwave, satellites, wireless, and fiber opticcables connect computers.
RoutersDevices that examine the data
transmitted and send it to its destination.
SwitchesHigh speed electronic switchesmaintain connections between computers.
ProtocolsStandards that specify how networkcomponents communicate with each other.
-
8/11/2019 pfaff_6_ppt_07
8/27
Copyright 2003 Prentice Hall, Inc 8NEXT
SLIDE
Circuit switching Network creates an end-
to-end circuit between thesending and receiving
computers
Same as voice networks
Suited to voice and real-
time videoconferencing
Switching and Routing Techniques
Packet switching
Outgoing message is
divided into fixed-size
data units called packets Packets are numbered and
addressed to receiving
computer
Routers examine the
packets and send them to
their destination
-
8/11/2019 pfaff_6_ppt_07
9/27
Copyright 2003 Prentice Hall, Inc 9
Advantages Disadvantages
Circuit switching
Voice and real-timetransmission
No delivery delays
Costly
Need to have directelectrical connection
between computers tocommunicate
Packet switching
Efficient, lessexpensive, reliable
Will function if part ofthe network is down
Delays in receivingpackets
Not ideal for real-timevoice communication
NEXT
SLIDE
Advantages and Disadvantages of Circuit
and Packet Switching
-
8/11/2019 pfaff_6_ppt_07
10/27
Copyright 2003 Prentice Hall, Inc 10NEXT
SLIDE
Protocols
Protocolsare fixed, formalized exchanges that
specify how two dissimilar network components canestablish communication.
Proprietary protocolsAre standards developed andprotected by hardware manufacturers. All hardware
is bought from same manufacturer for the network tofunction.
Open protocolsAre nonproprietary protocols. Theyare established by independent organizations. Any
hardware supporting the protocols will operate onthe network.
Protocol suiteThe total package of protocols thatspecify how a network functions.
-
8/11/2019 pfaff_6_ppt_07
11/27
Copyright 2003 Prentice Hall, Inc 11NEXT
SLIDE
Network Architecture
Network architectureis the overall design of a
network.
The network design is divided into layers, each of
which has a function separate from that of the other
layers. Protocol stackThe vertical (top to bottom)
arrangement of the layers. Each layer is governed by
its own set of protocols.
-
8/11/2019 pfaff_6_ppt_07
12/27
-
8/11/2019 pfaff_6_ppt_07
13/27
-
8/11/2019 pfaff_6_ppt_07
14/27
Copyright 2003 Prentice Hall, Inc 14NEXT
SLIDE
Peer-to-Peer Networks
All computers on the network are treated as equal. There are no file servers.
Users decide which files and peripherals to share.
They arent suited for networks with many
computers. They are easy to set up. Example: Home networks
-
8/11/2019 pfaff_6_ppt_07
15/27
Copyright 2003 Prentice Hall, Inc 15NEXT
SLIDE
Client-Server Networks
Typical corporate networks are client-server.
They use various topologiesor physical layouts.
The network requires file servers, networked computers(clients), and a network operating system (NOS).
Clients send requests to servers for programs and data,
and to access peripherals.
-
8/11/2019 pfaff_6_ppt_07
16/27
Copyright 2003 Prentice Hall, Inc 16
Network Media
NEXT
SLIDE
LANs use a variety of media to carry network signals.
Twisted pairTwo insulated wires twisted around eachother. The same type of wire as that used for telephones.
Coaxial cableConsists of an insulated center wire
surrounded by a layer of braided wire. The same type of
wire as that used for cable TV. Fiber-optic cableA type of fiber glass cable that transmits
data in the form of light impulses. It can carry more data for
longer distances than other wire.
InfraredA wireless system that includes a transmitter and
receiver for sending and receiving signals.
RadioA wireless system that uses radio signals to send
and receive data.
-
8/11/2019 pfaff_6_ppt_07
17/27
Copyright 2003 Prentice Hall, Inc 17
LAN Topologies The physical layout of a LAN is called its topology.
Topologies resolve the problem of contention,whichoccurs when multiple users try to access the LAN at thesame time.
Collisionsor corrupt data occur when differentcomputers use the network at the same time.
Bus topology
Called daisy chain
Every workstation connected
to a single bus cable
Resolves collisions through
contention management
Difficult to add workstations
Star topology
Contains a hub or central
wiring concentrator
Easy to add workstations
Resolves collisions through
contention management
Ring topology
All workstations attached in a
circular arrangement
A special unit of data called a
token travels around the ring
Workstations can only
transmit data when they
possess a token
NEXT
SLIDE
-
8/11/2019 pfaff_6_ppt_07
18/27
Copyright 2003 Prentice Hall, Inc 18NEXT
SLIDE
LAN Technologies
LAN protocols are standards that govern the layers of
the protocol stack. Lower-layer protocols deal with contentionbetween
computers.
Lower-layer protocols:
Ethernet LocalTalk
Token ring
Higher-layer protocols handle the network functions.
Higher-layer protocols: AppleTalk IPX/SPX
NetBeui
TCP/IP
-
8/11/2019 pfaff_6_ppt_07
19/27
Copyright 2003 Prentice Hall, Inc 19NEXT
SLIDE
Wide Area Networks (WANs)
WANsare similar to long-distance telephone systems.
They have a local access number called a point ofpresence(POP).
They contain long-distance trunk lines called backbones.
-
8/11/2019 pfaff_6_ppt_07
20/27
Copyright 2003 Prentice Hall, Inc 20NEXT
SLIDE
Point of Presence (POP)
A point of presenceis a WAN network connectionpoint that enables customers to access the WAN by
making a local telephone call.
Media used to create a connection from an
organization to a POP include: 56 Kbpsleased line
ISDN
ADSL
T1 line
Permanent virtual circuit (PVC)
-
8/11/2019 pfaff_6_ppt_07
21/27
-
8/11/2019 pfaff_6_ppt_07
22/27
Copyright 2003 Prentice Hall, Inc 22
Private Data Network
Used by corporations, banks and
governments
Not open to the public
Most secure type of WAN
Virtual private networkLines are leased
to a single company
NEXT
SLIDE
WAN Organization
Internet
Backbone providers charge
fees to Internet Service
Providers(ISPs).
ISPs sell subscriptions to
users.
Not secure
Not ideal for businesses
Public Data Network (PDN)
A for-profit data
communications network
Fees paid on a per-byte-
transferred basis
Good security
High bandwidth
-
8/11/2019 pfaff_6_ppt_07
23/27
Copyright 2003 Prentice Hall, Inc 23NEXT
SLIDE
WAN Protocols
X.25Oldest packet switching protocol. It is used by
automated teller machines and credit cardauthorization devices.
Switched Multimegabit Data Service (SMDS)
Designed for digital phone lines. Faster data transferrates than X.25.
Asynchronous Transfer Mode (ATM)Newer type of
protocol. It is designed for digital lines.
-
8/11/2019 pfaff_6_ppt_07
24/27
Copyright 2003 Prentice Hall, Inc 24
Electronic Data Interchange (EDI)
Standards that specify how companies set upbusiness-to-business transactions
Speeds ordering, invoicing, and payments
NEXT
SLIDE
WAN Applications
LAN-to-LAN WANs used to connect
LANs at two or more
geographic locations
Used to connect branches of
a company into one networksystem
Transaction Acquisition Information about
transaction instantly relayed
to corporate headquarters
Uses point-of-sale (POS)
terminal as cash register
-
8/11/2019 pfaff_6_ppt_07
25/27
Copyright 2003 Prentice Hall, Inc 25NEXTSLIDE
Chapter 7 Summary
1. Computer networks link two or more computers to
exchange data and share resources.
2. Three types of computer networks:
A. Local area network (LAN)
B. Metropolitan area network (MAN)
C. Wide area network (WAN)
3. Computer networks:A. Reduce hardware costs
B. Enable users to share applications
C. Provide a means to pool an organizations data
D. Foster teamwork
4. Computer networks require physical media such astelephone wire, coaxial cable, infrared, and radio
signals to connect the computers.
-
8/11/2019 pfaff_6_ppt_07
26/27
Copyright 2003 Prentice Hall, Inc 26NEXTSLIDE
Chapter 7 Summary cont.
5. Network protocols enable the network to function
smoothly.
6. Data is sent through the network by switching and
routing techniques.
7. LAN topologies include:
A. Bus topologyB. Star topology
C. Ring topology
8. Wide area networks are used to link computers
throughout the world.
-
8/11/2019 pfaff_6_ppt_07
27/27