Escolar Documentos
Profissional Documentos
Cultura Documentos
1-2
Backbone Networks -
1-3
Extranet
1-4
Application Layer
set of utilities used by application programs
Presentation Layer
formats data for presentation to the user
provides data interfaces, data compression and
translation between different data formats
Session Layer
initiates, maintains and terminates each logical session
between sender and receiver
Copyright 2005 John Wiley & Sons,
Inc
1-5
Next Step
Video merging with voice and data
Will take longer partly due to the high data
rates required for video
Copyright 2005 John Wiley & Sons,
Inc
1-6
2-7
HarperCollins. P. 4)
Server Computer
HTTP Request
Client Computer
HTTP Response
A request-response cycle:
includes multiple steps since web
pages often contain embedded
files, such as graphics, each
requiring a separate response.
2-8
2 - 10
Electronic Mail
Heavily used Internet application
Much, much faster than snail mail (regular mail)
Extremely inexpensive (compared to $3-$10 per paper mail
cost)
2 - 11
E-mail Standards
SMTP - Simple Mail Transfer Protocol
2 - 12
Web-based e-mail
Client computer
with
Web
HTTP
request
LAN
SMTP packet
browser
HTTP
response
SMTP
packet
Internet
SMTP packet
Client computer
with Web
browser
HTTP
request
LAN
HTTP
response
IMAP
packet
Server computer
with e-mail server
software
IMAP or
POP packet
Server computer with
Web server
software
2 - 13
2 - 14
FTP sites
Closed sites
Requires account name and password
Anonymous sites
Account name: anonymous; password: email
address
Copyright 2010 John Wiley & Sons,
Inc
2 - 15
2 - 16
Client computer
with
e-mail client
software
IM packet
LAN
LAN
IM packet
Internet
Client computer
with
IM client
software
Server
computer with
with IM
server
software
IM packet
LAN
Copyright 2010 John Wiley & Sons,
Inc
2 - 17
Voice over IP
Phone service over the Internet
Phone service via VoIP costs less
than equivalent service from
traditional sources due to using a
single network to carry voice and
data
2 - 18
Existing System
IIT, Delhi
Other six organizations
PBX
MTNL
PBX
: All the existing internal phones configured with their old PBX
Six organizations: IIT-Bombay, IIT- Madras, IIT-Kharagpur, IISc Bangalore, CDAC and ERNet
2 - 19
Copyright 2010 John Wiley & Sons, Inc
VoIP System
IIT,Delhi
Other six organizations
VoIP Server
2 Mbps link
VoIP Server
PBX
PBX
2 - 20
Cost
Startup cost: hardware, software, trainees and
permanent employees
Recurring cost: maintenance
2 - 21
User Benefits
Cost benefit
QoS provided
Requirements
Features
Open Source
Cisco CallManager
Price
Free
Documentation
Well maintained
Support
No support
Good Support
Reliability
Good
Excellent
Scalability
Average
Very Good
QoS Provided
Good
Good
Handling Calls
10,000
10,000+
Extended Mobility*
Not Yet
Yes
Compatibility
Interoperability
standard systems
standard systems
2 - 23
2 - 24
Videoconferencing
Provides real time transmission of video and audio
signals between two or more locations
Allows people to meet at the same time in different
locations
Saves money and time by not having to move people
around
Typically involves matched special purpose rooms with
cameras and displays
Desktop videoconferencing
Low cost application linking small video cameras and
microphones together over the Internet
No need for special rooms
Example: Net Meeting software on clients communicating
through a common videoconference server
Copyright 2010 John Wiley & Sons,
Inc
2 - 25
Cisco Videoconferencing
2 - 26
Videoconferencing
Standards
Proprietary early systems
Common standards in use today
H.320
Designed for room-to-room videoconferencing over
high-speed phone lines
H.323
Family of standards designed for desktop
videoconferencing and just simple audio conferencing
over Internet
MPEG-2
Designed for faster connections such as LAN or
privately owned WANs
Copyright 2010 John Wiley & Sons,
Inc
2 - 27
8 - 28
Disadvantages of VPNs:
Unpredictability of Internet traffic
Lack of standards for Internet-based VPNs, so that not all
vendor equipment and services are compatible
Copyright 2010 John Wiley & Sons,
Inc
9 - 29
VPN Architecture
Eliminates cabling
Facilitates network access from a variety of locations
Facilitates for mobile workers (as in a hospital)
Used in 90 percent of companies
7 - 31
Principal WLANs
Technologies
WI-FI
IEEE 802.11b
Standardization started after .11a, but finished
before, more commonly used than .11a
IEEE 802.11a
First attempt to standardization of WLANs; more
complicated than .11b
IEEE 802.11g
WIMAX
Bluetooth
Also an IEEE standard 802.15
7 - 32
Components of WLANs
Network Interface Cards
Many laptops come with WLAN cards
built in
Also available as USB cards
About 100-300 feet max transmission
range
7 - 33
WIMAX
Commercial name for family of IEEE
802.16 standards
Two primary types: Fixed and mobile
Logical and physical topology same as
802.11 and shared Ethernet
Uses controlled access with a version of
802.11 point coordination function
Two types:
802.16d
802.16e
Copyright 2010 John Wiley & Sons,
Inc
7 - 34
11 - 35
11 - 36
Intrusion
Hackers gaining access to data files and resources
Most unauthorized access incidents involve employees
Results: Industrial spying; fraud by changing data, etc.
11 - 37
Network Assets
Identify the assets on the network
11 - 38
Types of Assets
Hardware
Circuits
Network
Software
Client
Software
Organizational
Data
Mission critical
applications
For example, for an Internet bank, the Web site is mission critical
11 - 39
Security Threats
Identify threats
Any potentially adverse occurrence that can
Harm or interrupt the systems using the network, or
Cause a monetary loss to an organization
11 - 40
Inadequacy of Traditional
Design
12 - 41
Phases of design
Needs analysis, technology design, and cost
assessment
Cycles through, refining the outcome of each phase
Copyright 2010 John Wiley & Sons,
Inc
12 - 42
Technology design
Examine available, off-the-shelf technologies and
assess which ones meet the needs of user needs
In case of difficulty in determining traffic needs,
provide more capacity to keep ahead of growth
Cost assessment
Consider the relative cost of technology
12 - 43
12 - 44
Process of
cycling through
all three design
phases is cyclical
and repeated over
time.
Copyright 2010 John Wiley & Sons,
Inc
12 - 45
Needs Analysis
Goal is to understand why the network is being
built and what users and applications it will
support
12 - 46