27
NETWORKING I NETWORKING I Chapter 1 Chapter 1

NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Embed Size (px)

Citation preview

Page 1: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

NETWORKING INETWORKING I

Chapter 1Chapter 1

Page 2: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Computer NetworksComputer Networks

Page 3: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Intranet / ExtranetIntranet / Extranet

IntranetsIntranets, private networks in use by just one , private networks in use by just one company, enable businesses to communicate company, enable businesses to communicate and perform transactions among global and perform transactions among global employee and branch locations. employee and branch locations.

Companies develop Companies develop extranetsextranets, or extended , or extended internetworks, to provide suppliers, vendors, and internetworks, to provide suppliers, vendors, and customers limited access to corporate data to customers limited access to corporate data to check order status, inventory, and parts lists.check order status, inventory, and parts lists.

Page 4: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

CommunicationCommunication

Before beginning to communicate with each other, Before beginning to communicate with each other, we establish rules or agreements to govern the we establish rules or agreements to govern the conversation. These rules, or conversation. These rules, or protocolsprotocols, must be , must be followed in order for the message to be followed in order for the message to be successfully delivered and understood. Among successfully delivered and understood. Among the protocols that govern successful human the protocols that govern successful human communication are:communication are:

An identified sender and receiverAn identified sender and receiver Agreed upon method of communicating (face-to-face, Agreed upon method of communicating (face-to-face,

telephone, letter, photograph)telephone, letter, photograph) Common language and grammarCommon language and grammar Speed and timing of deliverySpeed and timing of delivery Confirmation or acknowledgement requirements Confirmation or acknowledgement requirements

Page 5: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

CommunicationCommunication

Page 6: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

External FactorsExternal Factors

The external factors affecting communication are related The external factors affecting communication are related to the complexity of the network and the number of to the complexity of the network and the number of devices a message must pass through on its route to its devices a message must pass through on its route to its final destination. External factors affecting the success of final destination. External factors affecting the success of communication include:communication include:

The quality of the pathway between the sender and the The quality of the pathway between the sender and the recipientrecipientThe number of times the message has to change form The number of times the message has to change form The number of times the message has to be redirected The number of times the message has to be redirected or readdressedor readdressedThe number of other messages being transmitted The number of other messages being transmitted simultaneously on the communication networksimultaneously on the communication networkThe amount of time allotted for successful The amount of time allotted for successful communicationcommunication

Page 7: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Common Data Network SymbolsCommon Data Network Symbols

Page 8: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Internal FactorsInternal Factors

Internal factors affecting the successful Internal factors affecting the successful communication across the network include:communication across the network include:

The size of the messageThe size of the messageThe complexity of the messageThe complexity of the messageThe importance of the messageThe importance of the message

Three important terms: Three important terms: Bandwidth Bandwidth Congestion Congestion DelayDelay

Page 9: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Network ConnectionsNetwork Connections

Page 10: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Service/ProtocolService/Protocol

Page 11: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Transferring DataTransferring Data

Page 12: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Multiple NetworksMultiple Networks

Page 13: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Converged NetworksConverged Networks

Page 14: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Fault ToleranceFault Tolerance

Page 15: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

ScalabilityScalability

Page 16: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Quality of ServiceQuality of Service

Page 17: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

SecuritySecurity

Page 18: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Circuit SwitchingCircuit Switching

Page 19: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Packet SwitchingPacket Switching

Page 20: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Internet StructureInternet Structure

Page 21: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

ConvergenceConvergence

Page 22: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

QueuesQueues

Page 23: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Quality of ServiceQuality of Service

Page 24: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Quality of ServiceQuality of Service

Time-sensitive communication - increase priority Time-sensitive communication - increase priority for services like telephony or video distribution.for services like telephony or video distribution.Non time-sensitive communication - decrease Non time-sensitive communication - decrease priority for web page retrieval or e-mail.priority for web page retrieval or e-mail.High importance to organization - increase High importance to organization - increase priority for production control or business priority for production control or business transaction data.transaction data.Undesirable communication - decrease priority Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file or block unwanted activity, like peer-to-peer file sharing or live entertainment.sharing or live entertainment.

Page 25: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

ConfidentialityConfidentiality

Ensuring ConfidentialityEnsuring Confidentiality

Data privacy is maintained by allowing only the intended Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or and authorized recipients - individuals, processes, or devices - to read the data. devices - to read the data.

Having a strong system for user authentication, Having a strong system for user authentication, enforcing passwords that are difficult to guess, and enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict requiring users to change them frequently helps restrict access to communications and to data stored on network access to communications and to data stored on network attached devices. Where appropriate, attached devices. Where appropriate, encryptingencrypting content content ensures confidentiality and minimizes unauthorized ensures confidentiality and minimizes unauthorized disclosure or theft of information.disclosure or theft of information.

Page 26: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

Communication IntegrityCommunication Integrity Maintaining Communication IntegrityMaintaining Communication Integrity

Data integrity means having the assurance that the Data integrity means having the assurance that the information has not been altered in transmission, from information has not been altered in transmission, from origin to destination. Data integrity can be compromised origin to destination. Data integrity can be compromised when information has been corrupted - wilfully or when information has been corrupted - wilfully or accidentally - before the intended recipient receives it.accidentally - before the intended recipient receives it.

Source integrity is the assurance that the identity of the Source integrity is the assurance that the identity of the sender has been validated. Source integrity is sender has been validated. Source integrity is compromised when a user or device fakes its identity compromised when a user or device fakes its identity and supplies incorrect information.and supplies incorrect information.

The use of The use of digital signaturesdigital signatures, , hashing algorithmshashing algorithms and and checksum mechanismschecksum mechanisms are ways to provide source and are ways to provide source and data integrity across a network to prevent unauthorized data integrity across a network to prevent unauthorized modification of information.modification of information.

Page 27: NETWORKING I Chapter 1. Computer Networks Intranet / Extranet Intranets, private networks in use by just one company, enable businesses to communicate

AvailabilityAvailability

Ensuring AvailabilityEnsuring Availability

Ensuring confidentiality and integrity are irrelevant if Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not network resources become over burdened, or not available at all. Availability means having the assurance available at all. Availability means having the assurance of timely and reliable access to data services for of timely and reliable access to data services for authorized users. Resources can be unavailable during a authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can infrastructures, with few single points of failure, can reduce the impact of these threats.reduce the impact of these threats.