尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
This course introduces students to issues in IT
infrastructure.The course will cover computer and system
architecture, and communication networks:
Infrastructure architecture
Organizational structure
Security
Metrics
Capacity PlanningThe course also focuses on the best
practices employed in IT Infrastructure management, resource
estimating, compliance and business continuity.
Course Description
*
7-*
IT INFRASTRUCTURE OVERVIEW
IT infrastructure - includes the hardware, software, and
telecommunications equipment that, when combined, provide
the underlying foundation to support the organization’s
goalsClient/server networks, the Internet, and n-tier
infrastructures are central to an organization’s IT
infrastructureThe three primary components of any IT
infrastructure include:
Client/server networks
Internet
N-tier infrastructures
Computer Networks:Arguably, the greatest advancement in
technology and communication over the past 20 years has been
the development and advancement of the “computer network”.
From emailing a friend to on-line bill paying to downloading
data off the Internet to e-commerce, networking has made our
world much smaller and changed the way we communicate
forever.
What is Network: a system containing any combination of
computers, computer terminals, printers, audio or visual display
devices, or telephones interconnected by telecommunication
equipment or cables: used to transmit or receive information.
*
The Network Diagram
The Internet
Other LANS
Firewall
Router
Fiber Optic Network Cable
Server
PC
Wireless Network
Wired Network
Switch
*
I wanted to present this diagram to help the viewer visually
understand how a computer network was set-up. I linked each
component to the same text links throughout the project.
Some network appse-mailwebtext messagingremote loginP2P
file sharingmulti-user network gamesstreaming stored video
(YouTube, Hulu, Netflix)
voice over IP (e.g., Skype)real-time video conferencingsocial
networkingsearch……
*
Types of Networks
LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
PAN Personal Area Network
SAN Storage Area Network
GAN Global Area Network
*
I used this slide as a Introduction to the different types of
networks. I tried to let the graphics do the talking on this slide.
I elaborated more on each network type on subsequent slides.
Local Area NetworkA Local Area Network spans a relatively
small areaLANs are usually confined to one building or a group
of buildings Data travel between network devices via network
cablesThe most common type of Local Area Network is called
Ethernet
*
I kept the graphic the same as the previous graphic representing
the Local Area Network in hopes of creating a degree
familiarity. I also include some basic facts about it.
Wide Area NetworkA Wide Area Network exist over a large
geographical area Data travels through telephone or cable lines
across networks Usually requires a ModemThe world’s largest
Wide Area Network is the Internet and telephone networks
*
I kept the graphic the same as the previous graphic representing
the Wide Area Network in hopes of creating a degree
familiarity. I also include some basic facts about it.
Application architectures
possible structure of applications:
Client-Server Networks
Peer-to-Peer (P2P) Networks
Hybrid Networks
*
Client-server architecture
server: always-on hostpermanent IP addressdata centers for
scaling
clients:communicate with servermay be intermittently
connectedmay have dynamic IP addressesdo not communicate
directly with each other
client/server
*
7-*
1. Client/Server NetworkClient/server network - a network in
which one or more computers are servers and provide services
to the other computers, which are called clients
Clients: User point of entry
Servers: Store and process shared data and perform network
management activities
Thin client - a workstation with a small amount of processing
power and costs less than a full powered workstation
7-*
Client/Server Network
P2P architectureno always-on serverarbitrary end systems
directly communicatepeers request service from other peers,
provide service in return to other peers
self scalability – new peers bring new service capacity, as well
as new service demandspeers are intermittently connected and
change IP addresses
complex management
peer-peer
*
Hybrid architecture
Combination of both Client-server and P2P networks
Not very common
Difficult to handle and manage
*
Introduction
1-*
Topology - Physical and logical network
Layout
Physical – actual layout of the computer cables and other
network devices
Logical – the way in which the network appears to the devices
that use it.
Network Topologies
Introduction
Physical TopologiesPhysical topology: physical layout of nodes
on a networkTopology Types
Bus
Ring
Star
MeshMay create hybrid topologiesTopology integral to type of
network, cabling infrastructure, and transmission media used
1. Bus TopologySingle cable connects all network nodes
without intervening connectivity devicesDevices share
responsibility for getting data from one point to
anotherTerminators stop signals after reaching end of wire
Prevent signal bounceInexpensive, not very scalableDifficult to
troubleshoot, not fault-tolerant
Bus (continued)
Advantages of Bus Topology
Works well for small networksRelatively inexpensive to
implementEasy to add nodes to it
Disadvantages Of Bus Topology
Management costs can be highPotential for congestion with
network traffic
Ring topology
Each node is connected to the two nearest nodes so the entire
network forms a circle
One method for passing data on ring networks is token passing
Active topology
Each workstation transmits data
Advantages of Ring TopologyEasier to manage; easier to locate
a defective node or cable problemWell-suited for transmitting
signals over long distances on a LANHandles high-volume
network trafficEnables reliable communication
Disadvantages of Ring TopologyExpensiveRequires more cable
and network equipment at the startNot used as widely as bus
topology
Fewer equipment options
Fewer options for expansion to high-speed communication
Every node on the network is connected through a central
device
3. Star Topology
Any single cable connects only two devices
Cabling problems affect two nodes at mostRequires more
cabling than ring or bus networks
More fault-tolerantEasily moved, isolated, or interconnected
with other networks
ScalableSupports max of 1024 addressable nodes on logical
network
Advantages of Star Topology
Good option for modern networksLow startup costsEasy to
manageOffers opportunities for expansionMost popular
topology in use; wide variety of equipment available
Disadvantages of Star Topology
Hub is a single point of failureRequires more cable than the bus
4. Mesh TopologyEach computer connects to every otherHigh
level of redundancyRarely usedWiring is very
complicatedCabling cost is highTroubleshooting a failed cable
is trickyA variation hybrid mesh – create point to
pointconnection between specific network devices, often seen in
WAN implementation.
IT Infrastructure: Internet
7-*
2. The Internet There are numerous ways that the Internet
enables an organization’s success Organizations must watch for
inappropriate use of the Internet by its employeesOrganizations
must decide how employees will access the Internet
What’s the Internet: “nuts and bolts” view
millions of connected computing devices:
hosts = end systems
running network appscommunication linksfiber, copper, radio,
satellitetransmission rate: bandwidthPacket switches: forward
packets (chunks of data)routers and switches
wired
links
wireless
links
router
mobile network
global ISP
regional ISP
home
network
institutional
network
smartphone
PC
server
wireless
laptop
*
Internet: “network of networks”
Interconnected ISPs
protocols control sending, receiving of msgs
e.g., TCP, IP, HTTP, Skype, 802.11
Internet standards
RFC: Request for comments
IETF: Internet Engineering Task Force
What’s the Internet: “nuts and bolts” view
mobile network
global ISP
regional ISP
home
network
institutional
network
*
Internet structure: network of networksEnd systems connect to
Internet via access ISPs (Internet Service Providers)Residential,
company and university ISPsAccess ISPs in turn must be
interconnected. So that any two hosts can send packets to each
otherResulting network of networks is very complexEvolution
was driven by economics and national policiesLet’s take a
stepwise approach to describe current Internet structure
*
Internet structure: network of networks
Question: given millions of access ISPs, how to connect them
together?
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
*
Internet structure: network of networks
Option: connect each access ISP to every other access ISP?
connecting each access ISP to each other directly doesn’t scale:
O(N2) connections.
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
…
…
…
…
…
*
Internet structure: network of networks
Option: connect each access ISP to a global transit ISP?
Customer and provider ISPs have economic agreement.
global
ISP
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
*
Internet structure: network of networks
But if one global ISP is viable business, there will be
competitors ….
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
ISP B
ISP A
ISP C
*
Internet structure: network of networks
But if one global ISP is viable business, there will be
competitors …. which must be interconnected
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
ISP B
ISP A
ISP C
IXP
IXP
peering link
Internet exchange point
*
Internet structure: network of networks
… and regional networks may arise to connect access nets to
ISPS
regional net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
ISP B
ISP A
ISP C
IXP
IXP
*
Internet structure: network of networks
… and content provider networks (e.g., Google, Microsoft,
Akamai ) may run their own network, to bring services, content
close to end users
regional net
Content provider network
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
access
net
…
…
…
…
…
…
ISP B
ISP A
ISP B
IXP
IXP
*
Introduction
Internet structure: network of networks
at center: small # of well-connected large networks
“tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT),
national & international coverage
content provider network (e.g, Google): private network that
connects it data centers to Internet, often bypassing tier-1,
regional ISPs
1-*
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
access
ISP
Regional ISP
Regional ISP
IXP
IXP
Tier 1 ISP
Tier 1 ISP
Google
IXP
Introduction
*
7-*
3. n-Tier InfrastructuresBasic client/server computing is a 2-tier
infrastructure
2-tier infrastructure – there are only two tiers – the client and
the server
3-tier infrastructure – contains clients, application servers, and
data servers
Two-tiered client/server architectureUses two types of
machinesMultitiered client/server architecture (N-tier)Balances
load of network over several levels of serversE.g. Web servers
and application servers
*
Client/Server Computing
Figure 2-2
In client/server computing, computer processing is split
between client machines and server machines linked by a
network. Users interface with the client machines.
*
A Multitiered Client/Server Network (N-Tier)
Figure 2-3
In a multitiered client/server network, client requests for
service are handled by different levels of servers.
*
What’s a protocol?
human protocols:
“what’s the time?”
“I have a question”
introductions
… specific msgs sent
… specific actions taken when msgs received, or other events
network protocols:
machines rather than humans
all communication activity in Internet governed by protocols
protocols define format, order of msgs sent and received among
network entities, and actions taken on msg transmission, receipt
*
This course introduces students to issues in IT
infrastructure.The course will cover computer and system
architecture, and communication networks:
Infrastructure architecture
Organizational structure
Security
Metrics
Capacity PlanningThe course also focuses on the best
practices employed in IT Infrastructure management, resource
estimating, compliance and business continuity.
Course Description
*
*
Infrastructure IssuesInfrastructure presents real challenges for
IT management in terms of:
Identifying what should be included in the infrastructure
Aligning infrastructure with strategy
Selection and enforcement of standards
BudgetingGovernance: who makes the calls?No “right” answers
*
What is the real basis for selecting the investment view? There
is a lot of uncertainty in this decision making process.
Selection of specific architectures (and/or vendors) you are
making a bet on future success of the technology or firm – you
will inevitably make some mistakes. Vhs verus beta.
To some extent it does not really matter, e.g., Wintel, AIX,
Solaris, HP UX, or Linux. The selection does not really matter.
Any of these will work, any of these will fail – how well can
you execute? True life-cycle costs are too hard to
analyze/compare with anything approaching absolute accuracy.
What probably matters more is not the technology, but the
quality of individual support you are likely to get from the
company and what type of experience does your local
technology HR environment best support.
But even those will change over time.
Networking – you can go with Cisco, it is safe, but other
alternatives can work just as well – depends upon current needs
and anticipated growth.
Same issues concern selection of ERP, DBMSs, email or
groupware software, systems mgmt tools, etc. Sure you do an
analysis to try and get what best meets your functional needs
and cost constraints at any given point in time. But over time,
how well you execute will matter much more than what specific
choice you made.
Probably the most important aspect of the analysis is it begins
the education process concerning the new technology.
Occasionally there will be a key feature or suite that will give
one copy a technology advantage, but it may or may not last.
The more important questions concern how investment is
required to support current requirements and anticipated near-to
mid-term growth? (The long term growth just cannot be
anticipated – in terms ofwmagnitude or what would be the most
appropriate technology to support) And Who and how these
decisions will be made?
Point of the article (and perhaps a bit over-engineered) is that
different decisions may well be appropriate for different
organizations.
IT INFRASTRUCTURES AND THE REAL WORLDWhen
approving designs for an IT infrastructure be sure to ask the
following:
,
How big is your department going to grow?
Will the system handle additional users?
How are your customers going to grow?
How easy is it to change the system?
How flexible is the system?
How much additional information do you expect to store each
year?
How long will you maintain information in the systems?
How much history do you want to keep for each customer?
What are the hours you need the system to be available?
How often do you need the information backed up?
SUPPORTING AN IT INFRASTRUCTUREFactors to consider
when developing an IT infrastructure (These factors are
commonly referred to as the ‘ilities)
Availability
Accessibility
Reliability
Scalability
Flexibility
Performance
Capacity planning
Availability - determining when your IT system will be
available for knowledge workers to access
Accessibility - determining who has the right to access different
types of IT systems and information
Reliability - ensures your IT systems are functioning correctly
and providing accurate information
Scalability – how well your system can adapt to increased
demands
Flexibility - the system’s ability to change quickly
Performance - measures how quickly an IT system performs a
certain process
Benchmark – baseline values a system seeks to attain
Benchmarking – a process of continuously measuring system
results
Capacity planning - determines the future IT infrastructure
requirements for new equipment and additional network
capacity
CAN YOU…??
Explain the relationship between the organization’s roles and
goals and the IT infrastructure
Describe the difference between a 2-tier and 3-tier
infrastructure
List and describe the seven “-ilities”
Additional IT Infrastructure ElementsThree general categories
of additional IT infrastructure elements include:
Information views
Business logic
Data storage and manipulation
7-*
Additional IT Infrastructure Elements
INFORMATION VIEWSResponsible for the presentation of
information and receiving user events and includes:
Intranets
Extranets
Portals
Digital dashboards
Intranet - an internal organizational Internet that is guarded
against outside access by a special security feature called a
firewall (which can be software, hardware, or a combination of
the two)
Extranet – is an intranet that is restricted to an organization and
certain outsiders, such as customers and suppliers
Enterprise information portals (EIPs) - allow knowledge
workers to access company information via a Web interface
Digital dashboard – displays key information gathered from
several sources on a computer screen in a format tailored to the
needs and wants of an individual knowledge worker
INFORMATION VIEWS
BUSINESS LOGICResponsible for maintaining the business
rules (e.g. application software) and protecting corporate
information from unauthorized direct access by the clients and
includes:
Integrations
Web services
Workflow systems
Applications service providers
7-*
Integration - allows separate applications to communicate
directly with each other by automatically exporting data files
from one application and importing them into another.
Web services – encompass all the technologies that are used to
transmit and process information on and across a network
Interoperability – the concept that different computer systems
and applications can talk to each other
Microsoft .NET - .Net is Microsoft’s version of Web services.
Microsoft’s vision is to make applications available any time,
any place, on any device
Primary competitor is Sun Microsystems J2EE
Java 2 Enterprise Edition (J2EE) – Sun Microsystems
development tool for building Web Services applications
7-*
Integration
7-*
Workflow Systems: help to automate the process of presenting
and passing information around an organization
Workflow – It defines all of the steps or business rules, from
beginning to end, required for a process to run correctly
Two primary types of workflow systems include:
Messaging-based workflow systems - send work assignments
through an e-mail system
Database-based workflow systems - store the document in a
central location and automatically asks the knowledge workers
to access the document
Application service provider (ASP) – supplies software
applications over the Internet that would otherwise reside on its
customers’ in-house computers
Service Level Agreements (SLAs) - define the specific
responsibilities of the service provider and set the customer
expectations
7-*
ASP Configuration
DATA STORAGE AND MANIPULATIONResponsible for data
storage and manipulation and includes:
Network area storage
Storage area networks
Server farms
Collocation
7-*
Network area storage (NAS) – is a special purpose server aimed
at providing file storage to users who access the device over a
network
7-*
Storage area network (SAN) – is an infrastructure for building
special, dedicated networks that allow rapid and reliable access
to storage devises by multiple servers.
Large amounts of storage capacity
Serve multiple users
24 X 7 support
Server farm (Data Center) - the name of a location that stores a
group of servers in a single placeWeb farm – is either a Web
site that has multiple servers or an ISP that provides Web site
outsourcing services using multiple servers
Collocation - a company rents space and telecommunications
equipment from another company, or a collocation vendor
Collocation facilities typically contain server farms and Web
farms
What is an IP Address? An IP address is a unique global address
for a network interfaceExceptions:
IP addresses i
An IP address:
- is a 32 bit long identifier
- encodes a network number (network prefix)
and a host number
IT Infrastructure: Hardware & Software
*
Computers come in different sizes with varying capabilities for
processing informationPDAs, handheld mobile
devicesPCsServersNetwork DevicesWorkstation More powerful
mathematical and graphics-processing capabilities than a PC
Types of Computers
*
ServersType of midrange computerSupport computer network,
sharing files and resourcesProvide hardware platform for e-
commerceMainframesLarge-capacity, high-performance
computer that can process large amounts of data very
rapidlyE.g. used by airlines for thousands of reservations per
second
*
Types of ServersApplication ServersAudio/Video ServersChat
ServersFax ServersFTP ServersGroupware ServersIRC
ServersList ServersMail ServersNews ServersProxy
ServersTelnet ServersWeb ServersDatabase Servers
SupercomputerMore sophisticated computer used for tasks
requiring extremely rapid and complex calculations with
thousands of variables, millions of measurementsUsed in
engineering, scientific simulations, military/weapons research,
weather forecastingGrid computingPower of geographically
remote computers connected into single network to act as
“virtual supercomputer”
*
Storage, Input, and Output TechnologyPrimary secondary
storage technologiesMagnetic disk: Hard drives, USB flash
drivesRAID: Can package hundreds of drives for massage
storage requirementsOptical disksCD-ROM, CD-RW, DVD,
BlueRayMagnetic tapeStorage networking: SANsConnect
multiple storage devices on a separate high-speed network
dedicated to storage
*
Figure 1
A typical SAN consists of a server, storage devices, and
networking devices, and is used strictly for storage. The SAN
stores data on many different types of storage devices,
providing data to the enterprise. The SAN supports
communication between any server and the storage unit as well
as between different storage devices in the network.
Storage Area Network SAN
*
Input devices:
Gather data and convert them into electronic formKeyboard
Computer mouseTouch screenOptical character
recognitionMagnetic ink character recognitionPen-based
inputDigital scannerAudio inputSensors
*
Output devices:Display data after they have been
processedMonitorPrinterAudio outputInformation systems
collect and process information in one of two waysBatch
processing: Transactions stored for predefined amount of time,
then processed as groupOnline processing: Transactions
processed immediately
*
The Major Types of Software
*
The software that manages and controls the computer’s
activitiesPC operating systems and graphical user
interfacesGUIsWindows XP, Windows Vista, Windows 8, 8.1,
10 and Windows Server 2003, 2008 and many more
UNIXLinuxOpen-source software
Operating System Software
*
Application Software and Desktop Productivity
ToolsApplication programming languages for
businessCOBOLC, C++, Java, Php etcVisual Basic: Visual
programming languageFourth-generation languagesSoftware
tools that enable end-users to develop software
applicationsTend to be nonprocedural, may use natural
languages
*
Software packages and desktop productivity toolsWord
processing softwareSpreadsheet softwareData management
softwarePresentation graphicsSoftware suitesWeb browsers
*
JavaOperating system-independent, processor-independent,
object-oriented programming languageAJAXAllows a client and
server to exchange data behind the scenes to avoid reloading a
Web page after each changeHypertext markup language
(HTML)Page description language for specifying how elements
are placed on a Web page and for creating links to other pages
and objects
Software for the Web: Java, AJAX, and HTML
*
Web services: Software components that exchange information
with each other using universal Web communication standards
and languagesXML (extensible markup language)SOAP (simple
object access protocol)WSDL (web services description
language)UDDI (universal description, discovery, and
integration)Service oriented architecture (SOA)
Web Services
*
Network Devices
Network Interface Card (NIC)RepeaterHubBridgeSwitchRouters
Devices and the layers at which they operateLayerName of
LayerDevice3NetworkRouters, layer 3 switches2Data
LinkSwitches, bridges, NIC’s1PhysicalHubs
The OSI (Open System Interconnection) model was created by
ISO (International Standards Organization) which published
standard ISO 7498 to provide a common basis for all computer
network descriptions.
It is a set of internationally recognized, non-proprietary
standards for networking and for operating system involved in
networking functions.
In this model, the suite of protocols in a network is divided into
7 parts called OSI layers, numbered 1 to 7.
OSI Model
Organization of air travel
a series of steps
ticket (purchase)
baggage (check)
gates (load)
runway takeoff
airplane routing
ticket (complain)
baggage (claim)
gates (unload)
runway landing
airplane routing
airplane routing
*
Layering of airline functionality
layers: each layer implements a service
via its own internal-layer actions
relying on services provided by layer below
airplane routing
airplane routing
ticket (purchase)
baggage (check)
gates (load)
runway (takeoff)
airplane routing
departure
airport
arrival
airport
intermediate air-traffic
control centers
ticket (complain)
baggage (claim
gates (unload)
runway (land)
airplane routing
ticket
baggage
gate
takeoff/landing
airplane routing
*
Why layering?
dealing with complex systems:
explicit structure allows identification, relationship of complex
system’s pieces
layered reference model for discussion
modularization eases maintenance, updating of system
change of implementation of layer’s service transparent to rest
of system
e.g., change in gate procedure doesn’t affect rest of system
layering considered harmful?
*
OSI layers work on the following principles:
every layer supports a protocol independently of the other
layers;
every layer provides services to the layer immediately above it;
every layer requires the services of the layer immediately below
it;
layer 1 describes the communication medium;
layer 7 provides services to the user or an application
In a communication, the network user calls on the services of
layer 7 via a program. This layer formats and enriches the data
the program gives it according to its protocol and sends it to the
layer below it when a service is requested.
Each layer formats the data and adds to it according to the
protocols used.
Finally it is sent to the medium and received by another network
node. It goes back through all the layers of this node and ends
up in the correspondent’s program, divested of all the protocol-
related additions.
Upper Layers
Lower Layers
Middle Layer
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
The Layered Approach to Communication
OSI Reference Model: 7 Layers
*
Frame or Packet
A frame (C Fig.8) is a set of data sent via a network in a single
block. It is also known as a packet. Every frame has the same
basic layout and contains control information such as
synchronisation characters, workstation addresses, an error
control value and a variable amount of data.
1. Physical Layer
The physical layer describes the physical characteristics of
communication such as the type of medium conventionally used
(electric cables, fiber optic or radio links) and all related details
like connectors, types of encoding and modulation, signal
levels, wavelengths, synchronization and maximum distances.
2. Data Link Layer
The data link layer specifies media access control and how the
data packets are conveyed on the physical layer, in particular
the frame structure (i.e. the specific sequences of bits at the
start and end of the packets). For example, Ethernet frame
headers contain fields indicating which machine on the network
a packet is to go to.
3. Network Layer
This Layer conveys the data packets across a single network
means packets are routed across a network of networks, also
called as Internet.
In the suite of Internet protocols, IP transmits packets from a
source to a target anywhere in the world. IP routing is made
available by defining an IP addressing principle to ensure and
enforce the uniqueness of every IP address. Each station is
identified by its own IP address.
4. Transport Layer
The transport layer protocols can solve problems such as the
reliability of data exchange (“Did the data reach the target?”),
automatic adaptation to network capacity and data stream
control.
It also ensures that the data arrive in the right order. In the suite
of TCP/IP protocols, transport protocols determine which
application each data packet is to be delivered to.
Transmission Control Protocol TCP is a connection-oriented
transport protocol which delivers a reliable stream of bytes
ensuring the data arrive unaltered and in order, with
retransmission in the event of loss and elimination of duplicate
data.
TCP tries to deliver all the data correctly and in order
User Datagram Protocol UDP
is a connection-free, “unreliable” protocol which doesn’t check
that the packets have reached their target and does not
guarantee they arrive in order.
If an application requires these guarantees, it has to ensure them
itself, or else use TCP.
UDP is usually used for broadcasting applications such as
Global Data or multimedia applications (audio, video, etc.)
5. Application Layer
Provides a set of interfaces for sending and receiving
applications to gain access to and use network services, such
as: networked file transfer, message handling and database
query processing
Most network application functions are located in the
application layer. These include HTTP (World Wide Web), FTP
(file transfer), SMTP (messaging), SSH (secured remote
connection), DNS (matching IP names and addresses) and many
others.
ISO/OSI reference model
presentation: allow applications to interpret meaning of data,
e.g., encryption, compression, machine-specific conventions
session: synchronization, checkpointing, recovery of data
exchange
Internet stack “missing” these layers!
these services, if needed, must be implemented in application
needed?
application
presentation
session
transport
network
link
physical
*
Virtual Communication Between Layers
7. Application
3. Network
7. Application
3. Network
source
application
transport
network
link
physical
segment
datagram
destination
application
transport
network
link
physical
router
switch
Encapsulation
message
frame
Ht
Hn
M
Ht
Ht
Hn
Hl
M
Ht
Hn
M
Ht
M
M
network
link
physical
link
physical
Ht
Hn
Hl
M
Ht
Hn
M
Ht
Hn
M
Ht
Hn
Hl
M
M
Ht
M
Hn
*
The OSI Reference Model
*
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
Network
Layer
Data Link
Layer
Physical
Layer
Application
Layer
Presentation
Layer
Session
Layer
Transport
Layer
*
03/11/98
6
Chapter 12 - Network Interconnections
*
IT Infrastructure: Transmission Media
*
Transmission Media
Transmission media are located below the physical layer
Computers & other telecommunication devices use signals to
represent data
Signals are transmitted in form of electromagnetic energy
bit: propagates between transmitter/receiver pairs
physical link: what lies between transmitter & receiver
Transmission Media
Transmission Media and Physical Layer
*
Overview
Guided – Wire
Unguided - Wireless
Characteristics and quality determined by medium and signal
For guided, the medium is more important
For unguided, the bandwidth produced by the antenna is more
important
Key concerns are data rate and distance
Transmission Media
Guided Media (Wired)
Twisted-Pair Cable
Coaxial Cable
Fiber-Optic Cable
Unguided Media (Wireless)
Radio Waves
Microwaves
Infrared
*
Classes of Transmission Media
*
1. Guided Transmission Media
Signals propagate in solid media: copper, fiber, coax
1. Twisted Pair
2. Coaxial cable
3. Optical fiber
Common network cable typesCoaxial cable
Unshielded
twisted pair
Fiber optic
Design FactorsBandwidth
Higher bandwidth gives higher data rateTransmission
impairments
AttenuationInterferenceNumber of receivers
In guided media
More receivers (multi-point) introduce more attenuation
UTP and STP cables
*
1. Twisted Pair
Twisted Pair - ApplicationsMost common mediumTelephone
network
Between house and local exchange (subscriber loop)Within
buildings
To private branch exchange (PBX)For local area networks
(LAN)
10Mbps or 100Mbps
Twisted Pair - Pros and ConsCheapEasy to work withLow data
rateShort range
Twisted Pair - Transmission CharacteristicsAnalog
Amplifiers every 5km to 6kmDigital
Use either analog or digital signals
repeater every 2km or 3kmLimited distanceLimited bandwidth
(1MHz)Limited data rate (100MHz)Susceptible to interference
and noise
Unshielded and Shielded TPUnshielded Twisted Pair (UTP)
Ordinary telephone wire
Cheapest
Easiest to install
Suffers from external EM interferenceShielded Twisted Pair
(STP)
Metal braid or sheathing that reduces interference
More expensive
Harder to handle (thick, heavy)
UTP categoriesCategory 1Voice only (Telephone)Category
2Data to 4 Mbps (Localtalk)Category 3Data to 10Mbps
(Ethernet)Category 4Data to 20Mbps (Token ring)Category 5
Category 5eData to 100Mbps (Fast Ethernet)
Data to 1000Mbps (Gigabit Ethernet)Category 6Data to
2500Mbps (Gigabit Ethernet)
2. Coaxial Cable
Coaxial Cable ApplicationsMost versatile mediumTelevision
distribution
Ariel to TV
Cable TVLong distance telephone transmission
Can carry 10,000 voice calls simultaneously
Being replaced by fiber opticShort distance computer systems
linksLocal area networks
Coaxial Cable - Transmission CharacteristicsAnalog
Amplifiers every few km
Closer if higher frequency
Up to 500MHz
Digital
Repeater every 1km
Closer for higher data rates
3. Optical Fiber
Fiber Construction
*
fiber optic cable:
glass fiber carrying light pulses, each pulse a bithigh-speed
operation:high-speed point-to-point transmission (e.g., 10’s-
100’s Gpbs transmission rate)low error rate: repeaters spaced
far apart immune to electromagnetic noise
*
Optical Fiber - BenefitsGreater capacity
Data rates of hundreds of GbpsSmaller size & weightLower
attenuationElectromagnetic isolationGreater repeater spacing
10s of km at least
Optical Fiber - ApplicationsLong-haul trunksMetropolitan
trunksRural exchange trunksSubscriber loopsLANs
2. Unguided Media: WirelessUnguided media transport
electromagnetic waves without using a physical conductor.
This type of communication is often referred to as a Wireless
Communication.
Signals are normally broadcast through air and thus are
available to anyone who has a device capable to receiving them.
Unguided signals can travel from source to destination in
several ways.
Unguided signals can travel from source to destination in
several ways. there is ground propagation, sky propagation, and
line-of-sight propagation.
In ground propagation, radio waves travel through the lowest
portion of the atmosphere, hugging the data.
Propagation methods
In sky propagation, higher-frequency radio waves radiate
upward into the ionosphere where they are reflected back to the
earth.
In line-of-sight propagation, very high-frequency signals are
transmitted in straight lines directly from antenna to antenna.
Propagation methods
*
Wireless transmission waves
*
1. Radio waves:
Radio waves are used for multicast communications, such as
radio and television, and paging systems.
2. Microwaves:
Microwaves are used for unicast communication such as cellular
telephones, satellite networks,
and wireless LANs.
3. Infrared:
Infrared signals can be used for short-range communication in a
closed area using line-of-sight propagation.

More Related Content

Similar to This course introduces students to issues in IT infrastructu.docx

fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
Sorath Peetamber
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
Subas Paudel
 
Networking
NetworkingNetworking
Networking
raj123singh
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
wilfredo dela cerna
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
HardeepKaurCSEAssist
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
Ramesh Sibal
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
bwire sedrick
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
Tatheer Fatima
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
Ankita Shirke
 
computer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdfcomputer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdf
mukeshkanna36
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
Nimmi Weeraddana
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
Manas Saha
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
AkshayIngole17
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
abiramiabi21
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
mv9499596
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
ssuser6478a8
 
Network ppt
Network pptNetwork ppt
Network ppt
hlalu861
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
LALIT MAHATO
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
IRJET Journal
 

Similar to This course introduces students to issues in IT infrastructu.docx (20)

fundamental of information technology(1)
fundamental of information technology(1)fundamental of information technology(1)
fundamental of information technology(1)
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Networking
NetworkingNetworking
Networking
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Networking / Internet and Web Technologies
Networking / Internet and Web TechnologiesNetworking / Internet and Web Technologies
Networking / Internet and Web Technologies
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
ENTERPRISE NETWORKING
ENTERPRISE NETWORKINGENTERPRISE NETWORKING
ENTERPRISE NETWORKING
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer Networking.pptx
Computer Networking.pptxComputer Networking.pptx
Computer Networking.pptx
 
computer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdfcomputer-networks-class-xii-part-1-eng.pdf
computer-networks-class-xii-part-1-eng.pdf
 
Computer networks short note (version 8)
Computer networks short note (version 8)Computer networks short note (version 8)
Computer networks short note (version 8)
 
Network system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & TechnologyNetwork system on Ahsanullah University of Science & Technology
Network system on Ahsanullah University of Science & Technology
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Computer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.pptComputer Networking_XII_CS_CBSE_OFKVS.ppt
Computer Networking_XII_CS_CBSE_OFKVS.ppt
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networking (2)
Networking (2)Networking (2)
Networking (2)
 
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEA SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICE
 

More from christalgrieg

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docx
christalgrieg
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
christalgrieg
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
christalgrieg
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docx
christalgrieg
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docx
christalgrieg
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docx
christalgrieg
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docx
christalgrieg
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docx
christalgrieg
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
christalgrieg
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
christalgrieg
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docx
christalgrieg
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docx
christalgrieg
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docx
christalgrieg
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docx
christalgrieg
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
christalgrieg
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docx
christalgrieg
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docx
christalgrieg
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docx
christalgrieg
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docx
christalgrieg
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docx
christalgrieg
 

More from christalgrieg (20)

Please read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docxPlease read the case  Fraud at WorldCom in the book provided below  .docx
Please read the case  Fraud at WorldCom in the book provided below  .docx
 
Please read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docxPlease read the below two discussion posts and provide the response .docx
Please read the below two discussion posts and provide the response .docx
 
Please read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docxPlease read the below discussion post and provide response in 75 to .docx
Please read the below discussion post and provide response in 75 to .docx
 
Please read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docxPlease read the assignment content throughly Internet Resources .docx
Please read the assignment content throughly Internet Resources .docx
 
Please read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docxPlease read the article by Peterson (2004). Your responses to th.docx
Please read the article by Peterson (2004). Your responses to th.docx
 
Please read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docxPlease read the article which appears below. Write and submit an.docx
Please read the article which appears below. Write and submit an.docx
 
Please Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docxPlease Read instructions Role Model LeadersChoose one • 1 .docx
Please Read instructions Role Model LeadersChoose one • 1 .docx
 
Please read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docxPlease read each attachment for instructions, please answer each q.docx
Please read each attachment for instructions, please answer each q.docx
 
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docxPLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
PLEASE READ BEFORE STARTING! 500 WORD PAPER ONLY USING THE NOTES I.docx
 
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docxPlease read Patricia Benners Five Stages of Proficiency. Explai.docx
Please read Patricia Benners Five Stages of Proficiency. Explai.docx
 
Please Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docxPlease Read Instructions OBJECTIV.docx
Please Read Instructions OBJECTIV.docx
 
Please react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docxPlease react to this student post. remember references and plarigari.docx
Please react to this student post. remember references and plarigari.docx
 
Please provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docxPlease provide the following information about your culture which is.docx
Please provide the following information about your culture which is.docx
 
Please proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docxPlease proof the paper attached and complete question 6 and 7..docx
Please proof the paper attached and complete question 6 and 7..docx
 
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docxPlease prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
Please prepare PPT( 5 Slides and 1 citation slide) and also explain .docx
 
Please prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docxPlease prepare a one-pageProject Idea that includes the .docx
Please prepare a one-pageProject Idea that includes the .docx
 
Please prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docxPlease prepare at least in 275 to 300 words with APA references and .docx
Please prepare at least in 275 to 300 words with APA references and .docx
 
Please provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docxPlease provide references for your original postings in APA form.docx
Please provide references for your original postings in APA form.docx
 
Please provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docxPlease provide an update to include information about methodology, n.docx
Please provide an update to include information about methodology, n.docx
 
Please provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docxPlease provide an evaluation of the Path to Competitive Advantage an.docx
Please provide an evaluation of the Path to Competitive Advantage an.docx
 

Recently uploaded

220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
Kalna College
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
Infosec
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
Frederic Fovet
 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
shabeluno
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
PriyaKumari928991
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
Ben Aldrich
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
MattVassar1
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Catherine Dela Cruz
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
Kalna College
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
MattVassar1
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
MattVassar1
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
RuchiRathor2
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
Sarojini38
 

Recently uploaded (20)

220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology220711130097 Tulip Samanta Concept of Information and Communication Technology
220711130097 Tulip Samanta Concept of Information and Communication Technology
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
 
Decolonizing Universal Design for Learning
Decolonizing Universal Design for LearningDecolonizing Universal Design for Learning
Decolonizing Universal Design for Learning
 
Slides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptxSlides Peluncuran Amalan Pemakanan Sihat.pptx
Slides Peluncuran Amalan Pemakanan Sihat.pptx
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
Interprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdfInterprofessional Education Platform Introduction.pdf
Interprofessional Education Platform Introduction.pdf
 
Non-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech ProfessionalsNon-Verbal Communication for Tech Professionals
Non-Verbal Communication for Tech Professionals
 
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptxScience-9-Lesson-1-The Bohr Model-NLC.pptx pptx
Science-9-Lesson-1-The Bohr Model-NLC.pptx pptx
 
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx78 Microsoft-Publisher - Sirin Sultana Bora.pptx
78 Microsoft-Publisher - Sirin Sultana Bora.pptx
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Cross-Cultural Leadership and Communication
Cross-Cultural Leadership and CommunicationCross-Cultural Leadership and Communication
Cross-Cultural Leadership and Communication
 
Creativity for Innovation and Speechmaking
Creativity for Innovation and SpeechmakingCreativity for Innovation and Speechmaking
Creativity for Innovation and Speechmaking
 
8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity8+8+8 Rule Of Time Management For Better Productivity
8+8+8 Rule Of Time Management For Better Productivity
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
 
bryophytes.pptx bsc botany honours second semester
bryophytes.pptx bsc botany honours  second semesterbryophytes.pptx bsc botany honours  second semester
bryophytes.pptx bsc botany honours second semester
 

This course introduces students to issues in IT infrastructu.docx

  • 1. This course introduces students to issues in IT infrastructure.The course will cover computer and system architecture, and communication networks: Infrastructure architecture Organizational structure Security Metrics Capacity PlanningThe course also focuses on the best practices employed in IT Infrastructure management, resource estimating, compliance and business continuity. Course Description * 7-* IT INFRASTRUCTURE OVERVIEW IT infrastructure - includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goalsClient/server networks, the Internet, and n-tier infrastructures are central to an organization’s IT infrastructureThe three primary components of any IT infrastructure include: Client/server networks Internet N-tier infrastructures
  • 2. Computer Networks:Arguably, the greatest advancement in technology and communication over the past 20 years has been the development and advancement of the “computer network”. From emailing a friend to on-line bill paying to downloading data off the Internet to e-commerce, networking has made our world much smaller and changed the way we communicate forever. What is Network: a system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information. * The Network Diagram The Internet Other LANS
  • 3. Firewall Router Fiber Optic Network Cable Server PC Wireless Network Wired Network Switch * I wanted to present this diagram to help the viewer visually understand how a computer network was set-up. I linked each component to the same text links throughout the project. Some network appse-mailwebtext messagingremote loginP2P file sharingmulti-user network gamesstreaming stored video (YouTube, Hulu, Netflix) voice over IP (e.g., Skype)real-time video conferencingsocial networkingsearch…… * Types of Networks LAN Local Area Network
  • 4. WAN Wide Area Network MAN Metropolitan Area Network PAN Personal Area Network SAN Storage Area Network GAN Global Area Network * I used this slide as a Introduction to the different types of networks. I tried to let the graphics do the talking on this slide. I elaborated more on each network type on subsequent slides. Local Area NetworkA Local Area Network spans a relatively small areaLANs are usually confined to one building or a group of buildings Data travel between network devices via network cablesThe most common type of Local Area Network is called Ethernet * I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it. Wide Area NetworkA Wide Area Network exist over a large geographical area Data travels through telephone or cable lines across networks Usually requires a ModemThe world’s largest Wide Area Network is the Internet and telephone networks
  • 5. * I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it. Application architectures possible structure of applications: Client-Server Networks Peer-to-Peer (P2P) Networks Hybrid Networks * Client-server architecture server: always-on hostpermanent IP addressdata centers for scaling clients:communicate with servermay be intermittently connectedmay have dynamic IP addressesdo not communicate directly with each other client/server
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. * 7-* 1. Client/Server NetworkClient/server network - a network in which one or more computers are servers and provide services to the other computers, which are called clients Clients: User point of entry Servers: Store and process shared data and perform network management activities Thin client - a workstation with a small amount of processing power and costs less than a full powered workstation 7-* Client/Server Network P2P architectureno always-on serverarbitrary end systems directly communicatepeers request service from other peers, provide service in return to other peers self scalability – new peers bring new service capacity, as well as new service demandspeers are intermittently connected and change IP addresses complex management peer-peer
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23. * Hybrid architecture Combination of both Client-server and P2P networks Not very common Difficult to handle and manage * Introduction 1-* Topology - Physical and logical network Layout Physical – actual layout of the computer cables and other network devices Logical – the way in which the network appears to the devices that use it. Network Topologies Introduction Physical TopologiesPhysical topology: physical layout of nodes
  • 24. on a networkTopology Types Bus Ring Star MeshMay create hybrid topologiesTopology integral to type of network, cabling infrastructure, and transmission media used 1. Bus TopologySingle cable connects all network nodes without intervening connectivity devicesDevices share responsibility for getting data from one point to anotherTerminators stop signals after reaching end of wire Prevent signal bounceInexpensive, not very scalableDifficult to troubleshoot, not fault-tolerant Bus (continued) Advantages of Bus Topology Works well for small networksRelatively inexpensive to implementEasy to add nodes to it Disadvantages Of Bus Topology Management costs can be highPotential for congestion with network traffic Ring topology Each node is connected to the two nearest nodes so the entire network forms a circle One method for passing data on ring networks is token passing
  • 25. Active topology Each workstation transmits data Advantages of Ring TopologyEasier to manage; easier to locate a defective node or cable problemWell-suited for transmitting signals over long distances on a LANHandles high-volume network trafficEnables reliable communication Disadvantages of Ring TopologyExpensiveRequires more cable and network equipment at the startNot used as widely as bus topology Fewer equipment options Fewer options for expansion to high-speed communication Every node on the network is connected through a central device 3. Star Topology Any single cable connects only two devices Cabling problems affect two nodes at mostRequires more cabling than ring or bus networks More fault-tolerantEasily moved, isolated, or interconnected with other networks ScalableSupports max of 1024 addressable nodes on logical network Advantages of Star Topology Good option for modern networksLow startup costsEasy to manageOffers opportunities for expansionMost popular topology in use; wide variety of equipment available
  • 26. Disadvantages of Star Topology Hub is a single point of failureRequires more cable than the bus 4. Mesh TopologyEach computer connects to every otherHigh level of redundancyRarely usedWiring is very complicatedCabling cost is highTroubleshooting a failed cable is trickyA variation hybrid mesh – create point to pointconnection between specific network devices, often seen in WAN implementation. IT Infrastructure: Internet 7-* 2. The Internet There are numerous ways that the Internet enables an organization’s success Organizations must watch for inappropriate use of the Internet by its employeesOrganizations must decide how employees will access the Internet What’s the Internet: “nuts and bolts” view millions of connected computing devices: hosts = end systems running network appscommunication linksfiber, copper, radio, satellitetransmission rate: bandwidthPacket switches: forward
  • 27. packets (chunks of data)routers and switches wired links wireless links router
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. mobile network global ISP regional ISP home network institutional network
  • 37. wireless laptop * Internet: “network of networks” Interconnected ISPs protocols control sending, receiving of msgs e.g., TCP, IP, HTTP, Skype, 802.11 Internet standards RFC: Request for comments IETF: Internet Engineering Task Force What’s the Internet: “nuts and bolts” view
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. mobile network global ISP regional ISP home network institutional network * Internet structure: network of networksEnd systems connect to Internet via access ISPs (Internet Service Providers)Residential, company and university ISPsAccess ISPs in turn must be interconnected. So that any two hosts can send packets to each otherResulting network of networks is very complexEvolution was driven by economics and national policiesLet’s take a stepwise approach to describe current Internet structure * Internet structure: network of networks Question: given millions of access ISPs, how to connect them together? access net
  • 47. access net access net access net … … … … … … * Internet structure: network of networks Option: connect each access ISP to every other access ISP? connecting each access ISP to each other directly doesn’t scale: O(N2) connections. access net access net access net access
  • 50. * Internet structure: network of networks Option: connect each access ISP to a global transit ISP? Customer and provider ISPs have economic agreement. global ISP
  • 53.
  • 54. * Internet structure: network of networks But if one global ISP is viable business, there will be competitors …. access net access net access net access net access net access net access net access net
  • 56.
  • 57. ISP B
  • 58.
  • 59. ISP A
  • 60.
  • 61. ISP C * Internet structure: network of networks But if one global ISP is viable business, there will be competitors …. which must be interconnected access net access net access net access net
  • 64.
  • 65. ISP B
  • 66. ISP A
  • 67.
  • 69. peering link Internet exchange point * Internet structure: network of networks … and regional networks may arise to connect access nets to ISPS regional net access net access net access net access net access net
  • 72. ISP B
  • 73.
  • 74. ISP A
  • 75.
  • 77. * Internet structure: network of networks … and content provider networks (e.g., Google, Microsoft, Akamai ) may run their own network, to bring services, content close to end users regional net Content provider network access net access net access net access net access net access net access net
  • 79.
  • 80. ISP B
  • 81.
  • 82. ISP A
  • 83.
  • 85. Introduction Internet structure: network of networks at center: small # of well-connected large networks “tier-1” commercial ISPs (e.g., Level 3, Sprint, AT&T, NTT), national & international coverage content provider network (e.g, Google): private network that connects it data centers to Internet, often bypassing tier-1, regional ISPs 1-* access ISP access ISP access ISP access ISP access ISP access ISP access ISP access ISP Regional ISP Regional ISP IXP IXP Tier 1 ISP Tier 1 ISP Google
  • 86. IXP Introduction * 7-* 3. n-Tier InfrastructuresBasic client/server computing is a 2-tier
  • 87. infrastructure 2-tier infrastructure – there are only two tiers – the client and the server 3-tier infrastructure – contains clients, application servers, and data servers Two-tiered client/server architectureUses two types of machinesMultitiered client/server architecture (N-tier)Balances load of network over several levels of serversE.g. Web servers and application servers * Client/Server Computing Figure 2-2 In client/server computing, computer processing is split between client machines and server machines linked by a network. Users interface with the client machines. * A Multitiered Client/Server Network (N-Tier) Figure 2-3 In a multitiered client/server network, client requests for service are handled by different levels of servers.
  • 88. * What’s a protocol? human protocols: “what’s the time?” “I have a question” introductions … specific msgs sent … specific actions taken when msgs received, or other events network protocols: machines rather than humans all communication activity in Internet governed by protocols protocols define format, order of msgs sent and received among network entities, and actions taken on msg transmission, receipt * This course introduces students to issues in IT infrastructure.The course will cover computer and system architecture, and communication networks: Infrastructure architecture Organizational structure Security Metrics
  • 89. Capacity PlanningThe course also focuses on the best practices employed in IT Infrastructure management, resource estimating, compliance and business continuity. Course Description * * Infrastructure IssuesInfrastructure presents real challenges for IT management in terms of: Identifying what should be included in the infrastructure Aligning infrastructure with strategy Selection and enforcement of standards BudgetingGovernance: who makes the calls?No “right” answers * What is the real basis for selecting the investment view? There is a lot of uncertainty in this decision making process. Selection of specific architectures (and/or vendors) you are making a bet on future success of the technology or firm – you will inevitably make some mistakes. Vhs verus beta. To some extent it does not really matter, e.g., Wintel, AIX, Solaris, HP UX, or Linux. The selection does not really matter. Any of these will work, any of these will fail – how well can you execute? True life-cycle costs are too hard to analyze/compare with anything approaching absolute accuracy. What probably matters more is not the technology, but the quality of individual support you are likely to get from the company and what type of experience does your local technology HR environment best support. But even those will change over time.
  • 90. Networking – you can go with Cisco, it is safe, but other alternatives can work just as well – depends upon current needs and anticipated growth. Same issues concern selection of ERP, DBMSs, email or groupware software, systems mgmt tools, etc. Sure you do an analysis to try and get what best meets your functional needs and cost constraints at any given point in time. But over time, how well you execute will matter much more than what specific choice you made. Probably the most important aspect of the analysis is it begins the education process concerning the new technology. Occasionally there will be a key feature or suite that will give one copy a technology advantage, but it may or may not last. The more important questions concern how investment is required to support current requirements and anticipated near-to mid-term growth? (The long term growth just cannot be anticipated – in terms ofwmagnitude or what would be the most appropriate technology to support) And Who and how these decisions will be made? Point of the article (and perhaps a bit over-engineered) is that different decisions may well be appropriate for different organizations. IT INFRASTRUCTURES AND THE REAL WORLDWhen approving designs for an IT infrastructure be sure to ask the following: , How big is your department going to grow? Will the system handle additional users? How are your customers going to grow? How easy is it to change the system? How flexible is the system? How much additional information do you expect to store each year?
  • 91. How long will you maintain information in the systems? How much history do you want to keep for each customer? What are the hours you need the system to be available? How often do you need the information backed up? SUPPORTING AN IT INFRASTRUCTUREFactors to consider when developing an IT infrastructure (These factors are commonly referred to as the ‘ilities) Availability Accessibility Reliability Scalability Flexibility Performance Capacity planning Availability - determining when your IT system will be available for knowledge workers to access Accessibility - determining who has the right to access different types of IT systems and information Reliability - ensures your IT systems are functioning correctly and providing accurate information Scalability – how well your system can adapt to increased demands Flexibility - the system’s ability to change quickly
  • 92. Performance - measures how quickly an IT system performs a certain process Benchmark – baseline values a system seeks to attain Benchmarking – a process of continuously measuring system results Capacity planning - determines the future IT infrastructure requirements for new equipment and additional network capacity CAN YOU…?? Explain the relationship between the organization’s roles and goals and the IT infrastructure Describe the difference between a 2-tier and 3-tier infrastructure List and describe the seven “-ilities” Additional IT Infrastructure ElementsThree general categories of additional IT infrastructure elements include: Information views Business logic Data storage and manipulation 7-* Additional IT Infrastructure Elements
  • 93. INFORMATION VIEWSResponsible for the presentation of information and receiving user events and includes: Intranets Extranets Portals Digital dashboards Intranet - an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two) Extranet – is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers Enterprise information portals (EIPs) - allow knowledge workers to access company information via a Web interface Digital dashboard – displays key information gathered from several sources on a computer screen in a format tailored to the needs and wants of an individual knowledge worker INFORMATION VIEWS BUSINESS LOGICResponsible for maintaining the business rules (e.g. application software) and protecting corporate
  • 94. information from unauthorized direct access by the clients and includes: Integrations Web services Workflow systems Applications service providers 7-* Integration - allows separate applications to communicate directly with each other by automatically exporting data files from one application and importing them into another. Web services – encompass all the technologies that are used to transmit and process information on and across a network Interoperability – the concept that different computer systems and applications can talk to each other Microsoft .NET - .Net is Microsoft’s version of Web services. Microsoft’s vision is to make applications available any time, any place, on any device Primary competitor is Sun Microsystems J2EE Java 2 Enterprise Edition (J2EE) – Sun Microsystems development tool for building Web Services applications 7-* Integration
  • 95. 7-* Workflow Systems: help to automate the process of presenting and passing information around an organization Workflow – It defines all of the steps or business rules, from beginning to end, required for a process to run correctly Two primary types of workflow systems include: Messaging-based workflow systems - send work assignments through an e-mail system Database-based workflow systems - store the document in a central location and automatically asks the knowledge workers to access the document Application service provider (ASP) – supplies software applications over the Internet that would otherwise reside on its customers’ in-house computers Service Level Agreements (SLAs) - define the specific responsibilities of the service provider and set the customer expectations 7-* ASP Configuration DATA STORAGE AND MANIPULATIONResponsible for data storage and manipulation and includes: Network area storage Storage area networks Server farms Collocation
  • 96. 7-* Network area storage (NAS) – is a special purpose server aimed at providing file storage to users who access the device over a network 7-* Storage area network (SAN) – is an infrastructure for building special, dedicated networks that allow rapid and reliable access to storage devises by multiple servers. Large amounts of storage capacity Serve multiple users 24 X 7 support Server farm (Data Center) - the name of a location that stores a group of servers in a single placeWeb farm – is either a Web site that has multiple servers or an ISP that provides Web site outsourcing services using multiple servers Collocation - a company rents space and telecommunications equipment from another company, or a collocation vendor Collocation facilities typically contain server farms and Web farms What is an IP Address? An IP address is a unique global address for a network interfaceExceptions: IP addresses i An IP address:
  • 97. - is a 32 bit long identifier - encodes a network number (network prefix) and a host number IT Infrastructure: Hardware & Software * Computers come in different sizes with varying capabilities for processing informationPDAs, handheld mobile devicesPCsServersNetwork DevicesWorkstation More powerful mathematical and graphics-processing capabilities than a PC Types of Computers * ServersType of midrange computerSupport computer network, sharing files and resourcesProvide hardware platform for e- commerceMainframesLarge-capacity, high-performance computer that can process large amounts of data very rapidlyE.g. used by airlines for thousands of reservations per second *
  • 98. Types of ServersApplication ServersAudio/Video ServersChat ServersFax ServersFTP ServersGroupware ServersIRC ServersList ServersMail ServersNews ServersProxy ServersTelnet ServersWeb ServersDatabase Servers SupercomputerMore sophisticated computer used for tasks requiring extremely rapid and complex calculations with thousands of variables, millions of measurementsUsed in engineering, scientific simulations, military/weapons research, weather forecastingGrid computingPower of geographically remote computers connected into single network to act as “virtual supercomputer” * Storage, Input, and Output TechnologyPrimary secondary storage technologiesMagnetic disk: Hard drives, USB flash drivesRAID: Can package hundreds of drives for massage storage requirementsOptical disksCD-ROM, CD-RW, DVD, BlueRayMagnetic tapeStorage networking: SANsConnect multiple storage devices on a separate high-speed network dedicated to storage *
  • 99. Figure 1 A typical SAN consists of a server, storage devices, and networking devices, and is used strictly for storage. The SAN stores data on many different types of storage devices, providing data to the enterprise. The SAN supports communication between any server and the storage unit as well as between different storage devices in the network. Storage Area Network SAN * Input devices: Gather data and convert them into electronic formKeyboard Computer mouseTouch screenOptical character recognitionMagnetic ink character recognitionPen-based inputDigital scannerAudio inputSensors * Output devices:Display data after they have been processedMonitorPrinterAudio outputInformation systems collect and process information in one of two waysBatch processing: Transactions stored for predefined amount of time, then processed as groupOnline processing: Transactions processed immediately *
  • 100. The Major Types of Software * The software that manages and controls the computer’s activitiesPC operating systems and graphical user interfacesGUIsWindows XP, Windows Vista, Windows 8, 8.1, 10 and Windows Server 2003, 2008 and many more UNIXLinuxOpen-source software Operating System Software * Application Software and Desktop Productivity ToolsApplication programming languages for businessCOBOLC, C++, Java, Php etcVisual Basic: Visual programming languageFourth-generation languagesSoftware tools that enable end-users to develop software applicationsTend to be nonprocedural, may use natural languages *
  • 101. Software packages and desktop productivity toolsWord processing softwareSpreadsheet softwareData management softwarePresentation graphicsSoftware suitesWeb browsers * JavaOperating system-independent, processor-independent, object-oriented programming languageAJAXAllows a client and server to exchange data behind the scenes to avoid reloading a Web page after each changeHypertext markup language (HTML)Page description language for specifying how elements are placed on a Web page and for creating links to other pages and objects Software for the Web: Java, AJAX, and HTML * Web services: Software components that exchange information with each other using universal Web communication standards and languagesXML (extensible markup language)SOAP (simple object access protocol)WSDL (web services description language)UDDI (universal description, discovery, and integration)Service oriented architecture (SOA) Web Services *
  • 102. Network Devices Network Interface Card (NIC)RepeaterHubBridgeSwitchRouters Devices and the layers at which they operateLayerName of LayerDevice3NetworkRouters, layer 3 switches2Data LinkSwitches, bridges, NIC’s1PhysicalHubs The OSI (Open System Interconnection) model was created by ISO (International Standards Organization) which published standard ISO 7498 to provide a common basis for all computer network descriptions. It is a set of internationally recognized, non-proprietary standards for networking and for operating system involved in networking functions. In this model, the suite of protocols in a network is divided into 7 parts called OSI layers, numbered 1 to 7. OSI Model Organization of air travel
  • 103. a series of steps ticket (purchase) baggage (check) gates (load) runway takeoff airplane routing ticket (complain) baggage (claim) gates (unload) runway landing airplane routing airplane routing * Layering of airline functionality layers: each layer implements a service via its own internal-layer actions relying on services provided by layer below airplane routing airplane routing
  • 104. ticket (purchase) baggage (check) gates (load) runway (takeoff) airplane routing departure airport arrival airport intermediate air-traffic control centers ticket (complain) baggage (claim gates (unload) runway (land) airplane routing
  • 105. ticket baggage gate takeoff/landing airplane routing * Why layering? dealing with complex systems: explicit structure allows identification, relationship of complex system’s pieces layered reference model for discussion modularization eases maintenance, updating of system change of implementation of layer’s service transparent to rest of system e.g., change in gate procedure doesn’t affect rest of system layering considered harmful? *
  • 106. OSI layers work on the following principles: every layer supports a protocol independently of the other layers; every layer provides services to the layer immediately above it; every layer requires the services of the layer immediately below it; layer 1 describes the communication medium; layer 7 provides services to the user or an application In a communication, the network user calls on the services of layer 7 via a program. This layer formats and enriches the data the program gives it according to its protocol and sends it to the layer below it when a service is requested. Each layer formats the data and adds to it according to the protocols used. Finally it is sent to the medium and received by another network node. It goes back through all the layers of this node and ends up in the correspondent’s program, divested of all the protocol- related additions. Upper Layers Lower Layers Middle Layer 7. Application 6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical The Layered Approach to Communication
  • 107. OSI Reference Model: 7 Layers * Frame or Packet A frame (C Fig.8) is a set of data sent via a network in a single block. It is also known as a packet. Every frame has the same basic layout and contains control information such as synchronisation characters, workstation addresses, an error control value and a variable amount of data. 1. Physical Layer The physical layer describes the physical characteristics of communication such as the type of medium conventionally used (electric cables, fiber optic or radio links) and all related details like connectors, types of encoding and modulation, signal levels, wavelengths, synchronization and maximum distances. 2. Data Link Layer The data link layer specifies media access control and how the data packets are conveyed on the physical layer, in particular
  • 108. the frame structure (i.e. the specific sequences of bits at the start and end of the packets). For example, Ethernet frame headers contain fields indicating which machine on the network a packet is to go to. 3. Network Layer This Layer conveys the data packets across a single network means packets are routed across a network of networks, also called as Internet. In the suite of Internet protocols, IP transmits packets from a source to a target anywhere in the world. IP routing is made available by defining an IP addressing principle to ensure and enforce the uniqueness of every IP address. Each station is identified by its own IP address. 4. Transport Layer The transport layer protocols can solve problems such as the reliability of data exchange (“Did the data reach the target?”), automatic adaptation to network capacity and data stream control. It also ensures that the data arrive in the right order. In the suite of TCP/IP protocols, transport protocols determine which application each data packet is to be delivered to. Transmission Control Protocol TCP is a connection-oriented transport protocol which delivers a reliable stream of bytes ensuring the data arrive unaltered and in order, with retransmission in the event of loss and elimination of duplicate data. TCP tries to deliver all the data correctly and in order
  • 109. User Datagram Protocol UDP is a connection-free, “unreliable” protocol which doesn’t check that the packets have reached their target and does not guarantee they arrive in order. If an application requires these guarantees, it has to ensure them itself, or else use TCP. UDP is usually used for broadcasting applications such as Global Data or multimedia applications (audio, video, etc.) 5. Application Layer Provides a set of interfaces for sending and receiving applications to gain access to and use network services, such as: networked file transfer, message handling and database query processing Most network application functions are located in the application layer. These include HTTP (World Wide Web), FTP (file transfer), SMTP (messaging), SSH (secured remote connection), DNS (matching IP names and addresses) and many others. ISO/OSI reference model presentation: allow applications to interpret meaning of data, e.g., encryption, compression, machine-specific conventions session: synchronization, checkpointing, recovery of data exchange Internet stack “missing” these layers! these services, if needed, must be implemented in application needed?
  • 110. application presentation session transport network link physical * Virtual Communication Between Layers 7. Application 3. Network 7. Application 3. Network source
  • 114. M Hn * The OSI Reference Model * Network Layer Data Link Layer Physical Layer Application Layer Presentation Layer Session Layer Transport
  • 116. 6 Chapter 12 - Network Interconnections * IT Infrastructure: Transmission Media * Transmission Media Transmission media are located below the physical layer Computers & other telecommunication devices use signals to represent data Signals are transmitted in form of electromagnetic energy bit: propagates between transmitter/receiver pairs physical link: what lies between transmitter & receiver
  • 117. Transmission Media Transmission Media and Physical Layer * Overview Guided – Wire Unguided - Wireless Characteristics and quality determined by medium and signal For guided, the medium is more important For unguided, the bandwidth produced by the antenna is more important Key concerns are data rate and distance Transmission Media Guided Media (Wired) Twisted-Pair Cable Coaxial Cable Fiber-Optic Cable Unguided Media (Wireless) Radio Waves Microwaves Infrared *
  • 118. Classes of Transmission Media * 1. Guided Transmission Media Signals propagate in solid media: copper, fiber, coax 1. Twisted Pair 2. Coaxial cable 3. Optical fiber Common network cable typesCoaxial cable Unshielded twisted pair Fiber optic
  • 119. Design FactorsBandwidth Higher bandwidth gives higher data rateTransmission impairments AttenuationInterferenceNumber of receivers In guided media More receivers (multi-point) introduce more attenuation UTP and STP cables * 1. Twisted Pair Twisted Pair - ApplicationsMost common mediumTelephone network Between house and local exchange (subscriber loop)Within buildings To private branch exchange (PBX)For local area networks (LAN) 10Mbps or 100Mbps Twisted Pair - Pros and ConsCheapEasy to work withLow data rateShort range
  • 120. Twisted Pair - Transmission CharacteristicsAnalog Amplifiers every 5km to 6kmDigital Use either analog or digital signals repeater every 2km or 3kmLimited distanceLimited bandwidth (1MHz)Limited data rate (100MHz)Susceptible to interference and noise Unshielded and Shielded TPUnshielded Twisted Pair (UTP) Ordinary telephone wire Cheapest Easiest to install Suffers from external EM interferenceShielded Twisted Pair (STP) Metal braid or sheathing that reduces interference More expensive Harder to handle (thick, heavy) UTP categoriesCategory 1Voice only (Telephone)Category 2Data to 4 Mbps (Localtalk)Category 3Data to 10Mbps (Ethernet)Category 4Data to 20Mbps (Token ring)Category 5 Category 5eData to 100Mbps (Fast Ethernet) Data to 1000Mbps (Gigabit Ethernet)Category 6Data to 2500Mbps (Gigabit Ethernet)
  • 121. 2. Coaxial Cable Coaxial Cable ApplicationsMost versatile mediumTelevision distribution Ariel to TV Cable TVLong distance telephone transmission Can carry 10,000 voice calls simultaneously Being replaced by fiber opticShort distance computer systems linksLocal area networks Coaxial Cable - Transmission CharacteristicsAnalog Amplifiers every few km Closer if higher frequency Up to 500MHz Digital Repeater every 1km Closer for higher data rates 3. Optical Fiber Fiber Construction *
  • 122. fiber optic cable: glass fiber carrying light pulses, each pulse a bithigh-speed operation:high-speed point-to-point transmission (e.g., 10’s- 100’s Gpbs transmission rate)low error rate: repeaters spaced far apart immune to electromagnetic noise * Optical Fiber - BenefitsGreater capacity Data rates of hundreds of GbpsSmaller size & weightLower attenuationElectromagnetic isolationGreater repeater spacing 10s of km at least Optical Fiber - ApplicationsLong-haul trunksMetropolitan trunksRural exchange trunksSubscriber loopsLANs 2. Unguided Media: WirelessUnguided media transport electromagnetic waves without using a physical conductor. This type of communication is often referred to as a Wireless Communication. Signals are normally broadcast through air and thus are available to anyone who has a device capable to receiving them. Unguided signals can travel from source to destination in several ways.
  • 123. Unguided signals can travel from source to destination in several ways. there is ground propagation, sky propagation, and line-of-sight propagation. In ground propagation, radio waves travel through the lowest portion of the atmosphere, hugging the data. Propagation methods In sky propagation, higher-frequency radio waves radiate upward into the ionosphere where they are reflected back to the earth. In line-of-sight propagation, very high-frequency signals are transmitted in straight lines directly from antenna to antenna. Propagation methods * Wireless transmission waves * 1. Radio waves: Radio waves are used for multicast communications, such as
  • 124. radio and television, and paging systems. 2. Microwaves: Microwaves are used for unicast communication such as cellular telephones, satellite networks, and wireless LANs. 3. Infrared: Infrared signals can be used for short-range communication in a closed area using line-of-sight propagation.
  翻译: