72
Chapter 5 Networks, telecommunications and the Internet

Bis Chapter5

Embed Size (px)

Citation preview

Page 1: Bis Chapter5

Chapter 5

Networks, telecommunications and the Internet

Page 2: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology4. The Internet

5. How the Internet works

6. Other wide-area networks

7. Smaller-scale networks

Page 3: Bis Chapter5

Computer networks defined

• A computer network can be defined as: ‘a communications system that links two or more computers and peripheral devices and enables transfer of data between the components’.

• Small-scale networks within a workgroup or single office are known as local area networks (LAN). Larger-scale networks which are national or international are known as wide area networks (WAN). The Internet is the best known example of a Wide Area Network.

Page 4: Bis Chapter5

Figure 5.1 Communications links between different stakeholders in an industry

Page 5: Bis Chapter5

Business benefits of networks

1. Reduce cost compared with traditional communications.

2. Reduces time for information transfer

3. Enables sharing and dissemination of company information

4. Enables sharing of hardware resources such as printers, backup, processing power.

5. Promotes new ways of working

6. Operates geographically separate businesses as one.

7. Restructures relationships with partners

Page 6: Bis Chapter5

Disadvantages of networks

1 The initial setup cost may be high, and there may be a considerable period before the costs are paid off.

2 When implementing or updating the network there may be considerable practical difficulties. Deploying cabling can be very disruptive to staff doing their daily work.

3 In the long term, companies become reliant on networks and breaks in service can be very disruptive. For this reason investment in network maintenance is vital.

4 Security is reduced through introducing a network, since there are more access points to sensitive data. Data may also be intercepted when it is transferred from one site to another.

Page 7: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components3. The evolution of networking technology4. The Internet

5. How the Internet works

6. Other wide-area networks

7. Smaller-scale networks

Page 8: Bis Chapter5

Client/server model of computing

• The client/server architecture consists of client computers such as PCs sharing resources such as a database stored on more powerful server computers.

• Processing can be shared between the clients and the servers.

• Client/server architecture is significant since most modern networked information systems are based on this structure.

Page 9: Bis Chapter5

Figure 5.3 Components of a client/server system

Page 10: Bis Chapter5

Why use client / server ?

1. The adoption of C/S architecture is to “downsize” from large mainframes with of user terminals which had limited functionality.

2. Rather than all the tasks involved in program execution (other than display) occurring on the mainframe, client/server gives the opportunity for them to be shared between a central server and clients.

3. This gives the potential for faster execution, as processing is distributed across many clients.

Page 11: Bis Chapter5

Problems to be managed with client/server

• High cost of ownership – Although price of PCs is relatively low, support and maintenance cost could be high.

• Instability --C/S technology is often complex and involves integrating different hardware and software components from many different companies.

• Performance -- For some mission-critical applications, a smaller server cannot deliver the power required.

• Lack of worker focus – The freedom of choice can lead to non-productive time-wasting, as users rearrange the colours and wallpaper on their desktop rather than performing their regular tasks.

Page 12: Bis Chapter5

Servers

• Servers are vital to an information system, since they regulate the flow of information around the network.

• Network servers run the network operating system (NOS), the software that is used to manage the network, and are often used to store large volumes of data.

• The server and NOS together perform the following functions:– Maintain security– Sharing of peripheral devices– Sharing of applications– Sharing of information

Page 13: Bis Chapter5

Servers (Continued)

• Maintain security – access to information in files is restricted according to the user name and password issued to users of the network.

• Sharing of peripheral devices connected to the network, such as printers and tape drivers. These are often attached directly to the server.

• Sharing of applications such as word processors, which do not then need to be stored on the hard drive of the end-user’s computer. The cost of buying applications can be reduced through buying a “site licence”.

• Sharing of information – access to this data is maintained by the NOS and it is stored within the hard drive of a server as files or as part of a database.

Page 14: Bis Chapter5

Examples of different serversNetwork Contains functions to manage the network resources and control user access

File This term is sometimes used to refer to network server functions. It can also indicate that users’ files such as documents and spreadsheets are stored on the network server

Print Dedicated print servers have a queue of all documents for which print requests have been made, often combined with file or network servers

Fax Used to route incoming and outgoing faxes received and sent from the users’ desktop

Mail Stores and forwards e-mail messages

Database Used to store data and provide the software to process data queries supplied by users, often accessed by Structured Query Language (SQL)

Application Used to store programs such as spreadsheet or bespoke applications run by end-users on their PCs. This removes the need to store each application on every user’s hard disk

Communications Manages connections with other networks in a WAN configuration. Sometimes known as gateways and attached to other gateway devices such as routers and firewall servers.

Page 15: Bis Chapter5

Servers (Continued)

• When creating an information system, there are a number of critical functions which must be designed in to the server.

• These are important requirements which must be checked with server vendors, database vendors and operating systems vendors.

• They are:– Performance– Capacity– Resilience/fault tolerance– Clustering

Page 16: Bis Chapter5

Servers (Continued)

• Performance – The server should be fast enough to handle all the

requests from users attached to the network.

– A margin should be build in to accommodate future growth in users and network traffic.

– This means specifying a suitable amount of memory, a fast hard disk and, less importantly, a fast processor.

• Capacity – The hard disk capacity should be large enough that

it will not need to be upgraded in the near future.

Page 17: Bis Chapter5

Servers (Continued)

• Resilience/fault tolerance – If there is a problem affecting the hardware, such as a power

surge or a problem with the hard disk, it is important that the whole network does not “crash” because of this.

– Preventive measures should be taken, such as installing an uninterruptible power supply or running two disks in parallel (disk mirroring or RAID – redundant array of inexpensive disks).

• Clustering – It is used to spread the load across different servers, so

improving reliability and performance. – It involves linking several servers together via a high-speed

link such as fibre-optic cabling. This can enable parallel processing, where tasks are shared between processors, and also storage mirroring, where duplicate copies of data are stored on different servers to improve performance and reduce the risk of one server failing.

Page 18: Bis Chapter5

Servers (Continued)

Servers can be specified as powerful PCs running an operating system such as Windows NT or Novell Netware, or they can run the UNIX operating system, from companies such as SUN, IBM or Hewlett-Packard.

Page 19: Bis Chapter5

Data communications equipment or telecommunications processors

• Modem (modulator-demodulator) allows users to send and receive data via an ordinary telephone line.– The modem receives analogue data transmitted via a

telephone line and converts this into digital data so that the computer can make use of it.

– The modem converts outgoing digital data into an analogue signal before transmitting them.

– The speed of a modem is measured in bauds or bits per second (bps).

– Early modems operated at speeds of 1200 baud (approx. 100 characters).

– Typical modem is 56,600 bps (approx. 4,700 characters)

Page 20: Bis Chapter5

Alternatives to the modem and conventional telephone line

Some of the alternatives to the modem and conventional telephone line include the following:

• Digital telephone exchanges support an integrated services digital network (ISDN) standard that allows data transfer rates that are up to five times faster than a 56,600 bps modem.– An ISDN telephone line provides two separate “channels”,

allowing simultaneous voice and data transmissions.– Since ISDN lines transmit digital data, a modem is not

required to make use of the service.– Instead, a special terminal adaptor (often called an ISDN

modem) is used to pass data between the computer and the ISDN line.

Page 21: Bis Chapter5

Alternatives to the modem and conventional telephone line

• Asymmetric Digital Subscriber Line (ASDL)– The ASDL services make use of existing telephone lines

to provide very high data transfer rates.– ADSL is usually referred to as “broadband” Internet

access.– Although the bandwidth offered by such services is usually

shared by a number of users, ASDL offers many of the benefits associated with ISDN and the potential of data transfer rates of up to 6 Mbps.

• Recent development– Introduction of systems that make use of satellite

communications in order to receive data at very high speeds.

– Many services make use of a conventional modem to send requests for data via a satellite link at speeds of up to 4000 kbps, approximately four times faster than an ISDN link.

Page 22: Bis Chapter5

Data communications equipment or telecommunications processors

• Hubs – are used to connect up to 20 PCs to a network using patch cables running between the back of each PC and the hub.

• Bridges and routers – are used to connect different LANs and transfer data packets from one network to the next. Routers can select the best route for packets to be transmitted and are used on the Internet backbones and wide-area network to achieve this.

• Repeaters – Over a long transmission distance, signal distortion may

occur.– Repeaters are necessary to increase transmission

distances by regenerating signals and re-transmitting them.

Page 23: Bis Chapter5

A Simple Computer network

Page 24: Bis Chapter5

Telecommunications channels

• Telecommunication channels are the different media used to carry information between different locations.

• These include traditional cables and wires known as guided media, and wireless and more recent innovations such as satellite and microwave which are unguided media.

Page 25: Bis Chapter5

Guided Media

• The main types of cabling used in LANs are based on copper cabling.

• Data are transmitted along this by applying at one end a voltage, which is received at the other.

• A positive voltage represents a binary “1” and a negative voltage represents a binary “0”.

• There are two main types of twisted copper cabling used in networks.

• Insulated straight cabling is not suitable except for very short distances.

• The two types are: twisted pair ; co-axial• Fibre-optic is a relatively new transmission medium.• Packets are transmitted along fibre-optic cables using light or

photons emitted from a light-emitting diode at one end of the cable; detection is by a photo-sensitive cell at the other end.

Page 26: Bis Chapter5

Unguided or wireless media

Wireless transmissions can be used for differentbusiness applications at different scales:– Wireless infra-red transmission can be used for

sending data between a portable PC or personal digital assistant (PDA) and a desktop computer.

– Wireless transmission can also be used locally to form a wireless LAN. Here a microwave or narrow-band radio transmitter and receiver may be used to connect different buildings.

– Microwave transmission can be used to beam information through the atmosphere. The maximum distance that can separate microwave transmitters is 45km.

– Satellite transmission: Messages are sent from a transceiver at one location on the earth’s surface and are bounced off the satellite to another transceiver.

Page 27: Bis Chapter5

Signal type

• Analogue Analogue transmissions send data in a continuous wave-form.

• Digital Digital transmissions send binary data as a series of ones and zeros. – Packets are units of data are exchanged

between different devices over communications media. An entire message is broken down into smaller packets.

Page 28: Bis Chapter5

Transmission speed

• The speed at which data can be transferred from A to B is governed by the channel capacity, which is measured in bits per second (bps). Transmission of a single bit in a second is equivalent to one baud, a binary event

• Rates are usually measured in terms of thousands of bits/second (Kbit/sec), millions of bits/second (Mbit/sec) or billions of bits per second (Gbit/sec).

• A general term often used for describing capacity is bandwidth. The technical definition of bandwidth is that it is a measure of capacity given by the difference between the lowest and highest frequencies available for a given medium.

Page 29: Bis Chapter5

Network operating system (NOS)

• It is the software necessary to control the access to and flow of information around a network.

• The most widely used NOS for a PC-based LAN are Novell Netware and IBM LAN Manager.

• UNIX is used by many medium and large companies operating servers from companies such as Sun Microsystems, Hewlett-Packard and IBM. It is often thought to offer better stability than Windows NT since it is a long-established NOS.

Page 30: Bis Chapter5

Network operating system (Continued)

NOS provides the following functions:

1. Access control or security through providing user accounts with user names and passwords.

2. File and data sharing of data stored on a database server or file server.

3. Communication between users via e-mail, diary systems or workgroup software such as Lotus Notes.

4. Sharing of devices, enabling, for example, the backup to tape of data on the server, or printer sharing.

Page 31: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology

4. The Internet

5. How the Internet works

6. Other wide-area networks

7. Smaller-scale networks

Page 32: Bis Chapter5

Evolution of networking technology

• The 1960s – mainframes and dumb terminals• The 1970s – minicomputers such as DEC

PDP-11 and VAX. • The 1980s – the IBM PC and Apple Macintosh• The 1990s – the client/server architecture and

global networks • 2000s – Ubiquitous IP networks and

application service providers (ASPs)• The Future – wireless access will become the

norm on a local- and wide-area level.

Page 33: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology

4. The Internet5. How the Internet works

6. Other wide-area networks

7. Smaller-scale networks

Page 34: Bis Chapter5

What is the Internet ?

• The Internet refers to the physical network that links computers across the globe.

• It consists of the infrastructure of network servers and communication links between them that are used to hold and transport information between the client PCs and web servers.

• The Internet allows communication between millions of connected computers worldwide.

• Information is transmitted form client PCs whose users request services to server computers that hold information and host business applications that deliver the services in response to requests.

• As such, the Internet is a large-scale client/server system.

Page 35: Bis Chapter5

The Internet

• Internet Service Provider (ISP)– A provider supplying home or business users with

a connection to access the Internet.

– They can also host web-based applications.

• BackbonesHigh-speed communications links used to enable Internet communications across a country and internationally.

Page 36: Bis Chapter5

Figure 5.4 Infrastructure components of the InternetSource: Chaffey (2004).

Page 37: Bis Chapter5

Business and consumer models of Internet access

• E-Business opportunities are identified in terms of whether an organization is using the Internet to transact with consumers (business-to-consumer – B2C) or other businesses (business-to-business – B2B).

• Business-to-business transactions predominate over the Internet, in terms of value, if not frequency.

• Figure 5.6 shows that there are many more opportunities for B2B transactions than B2C, both between an organization and its suppliers, together with intermediaries, and through distributors such as agents and wholesalers with customers. There is a higher level of access to the Internet among businesses than among consumers, and a greater propensity to use it for purchasing.

Page 38: Bis Chapter5

Figure 5.6 B2B and B2C interactions between an organisation, its suppliers and its customersSource: Chaffey (2004).

Page 39: Bis Chapter5

Business and consumer models of Internet access

• Figure 5.7 gives examples of different companies operating in the business-to-consumer (B2C) and business-to-business (B2B) spheres.

• Figures 5.7 also presents two additional types of transaction : that where consumers transact directly with consumers (C2C) and that where they initiate trading with business (C2B).

Page 40: Bis Chapter5

Figure 5.7 Summary of transaction alternatives between businesses and consumersSource: Chaffey (2004).

Page 41: Bis Chapter5

Role of the Internet in restructuring business relationships

• Figure 5.8 illustrates disintermediation in a graphical form for a simplifies retail channel.

• Further intermediaries such as additional distributors may occur in a business-to-business market.

• Figure 5.8(a) shows the former position where a company markets and sells it products by “pushing” them through a sales channel.

• Figure 5.8 (b) and (c) show two different type of disintermediation in which the wholesale (b) or the wholesaler and retailer (c) are bypassed, allowing the producer to sell and promote direct to the consumer.

• The benefits of disintermediation to the producer are clear – it is able to remove the sales and infra-structure cost of selling through the channel.

Page 42: Bis Chapter5

Figure 5.8 Disintermediation of a consumer distribution channel showing (a) the original situation, (b) disintermediation omitting the wholesaler and (c) disintermediation omitting both wholesaler and retailerSource: Chaffey (2004).

Page 43: Bis Chapter5

Role of the Internet in restructuring business relationships (Continued)

• Figure 5.10(a) starts with the traditional situation in which many sales were through brokers.

• With disintermediation (Figure 5.10(b)) there was the opportunity to sell direct, initially via call centers and then complemented by a transactional website.

• Purchasers still needed assistance in the selection of products and this led to the creation of new intermediaries , a process referred to as re-intermediation (Figure 5.10(c)).

Page 44: Bis Chapter5

Figure 5.10 The move to re-intermediation: (a) original situation, (b) disintermediation, (c) re-intermediationSource: Chaffey (2004).

Page 45: Bis Chapter5

Intranets and extranets

• The majority of Internet services are available to any business or consumer who has access to the Internet.

• However, many e-business applications that access sensitive company information require access to be limited to favoured individuals or third parties.

• If information is limited to those inside an organization, this is an intranet.

• An intranet is a private network within a single company using Internet standards to enable employees to share information using e-mail and web publishing.

Page 46: Bis Chapter5

Intranets and extranets (Continued)

• If access to company information is extended to some others, but not everyone beyond the organization, this is an extranet.

• An extranet is formed by extending the intranet beyond a company to customers, suppliers and collaborators.

• The relationship between these terms is illustrated in Figure 5.12.

• Extranets can be accessed by authorized people outside the company such as collaborators, suppliers or major customers, but information is not available to everyone with an Internet connection – only those with password access.

Page 47: Bis Chapter5

Figure 5.12 The relationship between intranets, extranets and the Internet

Page 48: Bis Chapter5

Firewalls

• Firewall is a specialized software application mounted on a server at the point where the company is connected to the Internet.

• Its purpose is to prevent unauthorized access into the company from outsiders.

• Firewalls are necessary when we are creating an intranet or extranet to ensure that the outside access to the confidential information does not occur.

• Firewalls are usually created as software mounted on a separate server at the point where the company is connected to the Internet.

• Firewall software can then be configured to only accept links from trusted domains representing other offices in the company.

Page 49: Bis Chapter5

Firewalls (Continued)

• The use of firewalls within the infra-structure of a company is illustrated in Figure 5.14.

• It is evident that multiple firewalls are used to protect information of the company.

• The information made available to third parties over the Internet and extranet is partitioned by another firewall using what is referred to as the demilitarized zone (DMZ).

• Corporate data on the intranet is then mounted on other servers inside the company.

Page 50: Bis Chapter5

Figure 5.14 An example of the use of firewalls to increase security within an e-business infrastructureSource: Chaffey (2004).

Page 51: Bis Chapter5

What is the World Wide Web ?

• The World Wide Web (WWW) provides a standard method for exchanging and publishing information on the Internet.

• The medium is based on standard document formats such as HTML (hypertext markup language) which can be thought of as similar to a word-processing format such as that used for Microsoft WORD documents.

• It is the combination of web browsers and HTML that has proved so successful in establishing widespread business use of the Internet.

Page 52: Bis Chapter5

Web browsers and servers

• Web browsers are software used to access the information on the WWW that is stored on web servers.

• Web servers are used to store, manage and supply the information on the WWW.

• The main web browsers are Microsoft Internet Explorer and Netscape Navigator or Communicator.

• Browsers display the text and graphics accessed from web sites and provide tools for managing information from web sites.

• Figure 5.15 indicates the process by which web browsers communicate with web servers.

Page 53: Bis Chapter5

Figure 5.15 Information exchange between a web browser and web serverSource: Chaffey (2004).

Page 54: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology4. The Internet

5. How the Internet works6. Other wide-area networks

7. Smaller-scale networks

Page 55: Bis Chapter5

Networking standards

• The Internet is a packet-switched network that uses TCP/IP as its protocol.

• This means that, as messages or packets are sent, there is no part of the network that is dedicated to them.

• The alternative type of network is the circuit-switched network such as phone systems where the line is dedicated to the user for the duration of the call.

• The transmission media of the Internet such as telephone lines, satellite links and optical cables are the equivalent of the vans, trains and planes that are used to carry post.

• TCP/IP is the transmission control protocol is a transport-layer protocol that moves data between applications.

• The Internet protocol is a network-layer protocol that moves data between host computers.

Page 56: Bis Chapter5

Networking standards (Continued)• IP address is the unique numerical address of a computer.• The IP address is in the form of 207.68.156.58 (

www.microsoft.com)• Packet – Each Internet message such as an e-mail or http

request is broken down into smaller parts for ease of transmission.

• HTTP (Hypertext transfer protocol) is a standard that defines the way information is transmitted across the Internet between web browsers and web servers.

• Uniform (or Universal) resource locator (URL) is a web address used to locate a web page on a web server.

• Domain name refers to the name of the web server and is usually selected to be the same as the name of the company, and the extension will indicate its type.

• Web page standards – HTML (used for presentation of data) and XML (used for data exchange)

Page 57: Bis Chapter5

Figure 5.16 The TCP/IP protocolSource: Chaffey (2004).

Page 58: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology4. The Internet

5. How the Internet works

6. Other wide-area networks7. Smaller-scale networks

Page 59: Bis Chapter5

Wide Area Network (WAN)

• Wide area network (WAN) is a network covering a large area which connect to businesses in different parts of the same city, different parts of a country, or even different countries (Figure 5.22).

• The WAN will connect many servers at each site.• If there is a large international coverage, it will be referred to as

a global network.• If the WAN enables communication across the whole company,

it is referred to as the “enterprise network” or “enterprise-wide network”.

• Companies usually pay for their own “leased lines” or communications links between different sites.

• Virtual private networks and value-added networks provide cheaper alternatives where the communications links are shared.

Page 60: Bis Chapter5

WAN (continued)

• Often the network used to connect remote sites is the public telephone, referred to as POTS or “plain old telephone system”.

• A company can also lease private or dedicated lines from a telecommunications supplier to connect sites, or can set up links using microwave or satellite methods.

Page 61: Bis Chapter5
Page 62: Bis Chapter5

Value-added networks (VANs)

• VANs give a subscription service enabling companies to transmit data securely across a shared network.

• VANs are so named because they allow a company to minimize its investment in wide-area communications while still receiving all the benefits this can bring.

• The cost of setting up and maintaining the network is borne by the service provider, which then rents out the network to a number of companies.

• This works out more cheaply than if a company had leased its own point-to-point private lines, but it is not as secure.

Page 63: Bis Chapter5

Virtual private network (VPN)

• A VPN is a data network that makes use of the public telecommunication infrastructure and Internet, but information remains secure by the use of security procedures.

• VPNs are data networks that make use of the public telecommunication infra-structure and Internet, but information remains secure by the use of what is known as tunneling protocol and security procedures such as “firewalls”.

• A virtual private network can again be contrasted with a system of owned or leased point-to-point lines that can only be used by one company.

Page 64: Bis Chapter5

TOPICS

1. Introduction to computer networks

2. Network components

3. The evolution of networking technology4. The Internet

5. How the Internet works

6. Other wide-area networks

7. Smaller-scale networks

Page 65: Bis Chapter5

Local area network (LAN)

– LAN is a computer network that spans a limited geographic area, typically a single office or building.

– LAN consists of a single network segment or several connected segments that are limited in extent (local).

– A network segment defines a group of clients that are attached to the same hub or network interface card linked to a single server.

Page 66: Bis Chapter5

Figure 5.24 A small workgroup network connecting a single server to three PCs and a laser printer

Page 67: Bis Chapter5

Network technology

– There are a number of different arrangement for connecting clients to the server in a local area network.

– The physical layout of a LAN is known as a network topology

– These are known by the description of the layout or topology: bus, star or ring.

– The layout of the arrangement are shown in Figure 5.25.

– The topology chosen and the media used to implement it will affect the network cost and performance.

Page 68: Bis Chapter5
Page 69: Bis Chapter5

Bus or linear

• Characteristics– Simple – Based on co-axial Ethernet cable e.g. twisted pair

10Base-T.

• Advantage– Easy to install and manage for small workgroup

• Disadvantage– Breaks in the cable disrupt the whole network.

Page 70: Bis Chapter5

Star

• Characteristics– Each PC is connected via a cable to a central location– Each PC is not usually connected directly to the server,

but via a hub.

• Advantage– Provide protection from cable breaks

• Disadvantage– Dependent on central host

Page 71: Bis Chapter5

Ring

• Characteristics– A continuous ring of network cable e.g. token ring– The word “token” refers to a packet of data which is

passed from one node to the next.

• Advantage– Suitable for large data volumes and mission-critical

applications

• Disadvantage– Higher initial cost and time for installation

Page 72: Bis Chapter5

Peer-to-peer network

– A peer-to-peer network is a simple type of local-area network which provides sharing of files and peripherals between PCs.

– The “peer-to-peer” refers to the capability of any computer on a local-area network to share resources, in particular files and peripherals, with others.

– It is particularly appropriate for small workgroups where central control from a server is less necessary.

– For example, a user can, with permission, share across the network a file stored on another user’s hard disk.

– With a peer-to-peer arrangement, data will be distributed and therefore difficult to backup and secure.