SlideShare a Scribd company logo
1 of 29
Download to read offline
6장

Data Communications
Q1: What Is a Computer Network?

• Network
  – Collection of computers
  – Communicate with one another over transmission
    line
• Basic types of Network Topologies
  – Local Area Network (LAN)
  – Wide Area Network (WAN)
  – Internet




                                                 6-2
LAN (Local Area Network)
• Computers connected on single company
  site
• Usually located in small area, such as a
  home, office building, or group of buildings
• Connects two to several hundred computers




                                                 6-3
WAN (Wide Area Network)

• Connects computers across metropolitan,
  state, regional, national areas
• Uses communication networks from vendors
   – Licensed by government




                                             6-4
Internet
•   Global network of networks
•   Connects LANs, WANs, and other networks
•   Public and private networks of networks
•   Uses a variety of communication methods and
    conventions
     – Seamless flow of data provided by
       standardized layered protocol
       • Protocol: a set of standard rules for data
         representation, signaling, authentication, and
         error detection required to send information

                                                          6-5
Q2: What Are the Components of a
    LAN?




                                   6-6
Q2: What Are the Components of a
    LAN? (cont’d)
 • Switch/Router
   – Special purpose computer that receives and
     transmits messages
 • Network interface card (NIC)
   – Hardware that connects each device’s circuitry to
     the cable
   – Onboard NIC or card that fits into an expansion
     slot
 • MAC (media control address)
 • UTP (unshielded twisted pair cable)
 • Optical fiber cable

                                                     6-7
Network Interface Card (NIC)




                               6-8
IEEE 802.3 Protocol
(Institute of Electrical and Electronics Engineers)

• World’s most popular protocol for LANs
• 10/100/1000 Mbps Ethernet
• Protocol specifies hardware characteristics,
  cables, and how messages are packaged
  and processed




                                                 6-9
Q3: What Are the Alternatives for a WAN?


• WANs connect computers at separate sites
   – Use routers and public communications links between
     sites
   – Cable connections made through licensed public
     telecommunications companies
• Internet service provider (ISP)
   – A company that provides customers access to
     the Internet
   – Provides legitimate Internet address
   – Serves as gateway to Internet
   – Pay for Internet access
                                                           6-10
Q3: What Are the Alternatives for a
    WAN? (cont’d)
 1.   Connect to an Internet service provider (ISP)
 2.   Network of Leased Lines
 3.   Public Switched Data Networks
 4.   Virtual Private Network (VPN)




                                                 6-11
Connecting the Personal Computer to
         an ISP: Modems
    1.Dial-up Modems
    2.DSL Modems
    3.Cable Modems
• Modem – a device to produce a signal that can be
    transmitted easily and decoded to reproduce the
    original digital data
•   Narrowband – less than 56 kbps speed
•   Broadband – more than 256 kbps speed




                                                      6-12
1. Dial-up Modems
–   Converts signals between analog and digital so computers
    can communicate over a regular telephone line
–   Connection made by dialing the ISP’s phone number
–   Maximum transmission speed of 56 kbps (53 kbps really)
–   Modulation standards – V.34, V.90, V.92 specify how digital
    signals are converted to analog
–   Point-to-Point Protocol (PPP) – governs how data
    (messages) are packaged and handled between modem and
    ISP




                                                                  6-13
Personal Computer (PC) Internet Access




                                     6-14
2. DSL Modems

Digital Subscriber Line (DSL)
  – Operates over telephone lines
  – Data signals do not interfere with voice
    telephone service
  – Faster data transmission than dial-up
     • 256 kbps to 768 kbps
  – DSL modems use their own protocols
  – Download and upload speeds differ
     • Asymmetric digital subscriber lines (ADSL)
     • Symmetrical digital subscriber lines (SDSL)
         – 1.544 mbps both directions



                                                     6-15
3. Cable Modems

• Provide high-speed data transmission
• Use cable television lines
  – High-capacity optical fiber cable run to neighborhood
    distribution substation
  – Television cables connect at distribution substation and runs
    to subscriber’s house
  – Does not interfere with television transmission
  – Up to 500 subscribers connected at each substation
      • Performance can vary based on number connected
  – Download speed up to 10Mbps, upload up to 256 kbps




                                                               6-16
Networks of Leased Lines
• WAN connects computers located at geographically
  distributed sites
• Access devices connect sites to transmission
   – Router or network switch– special-purpose computer to move
     network traffic from one node to another
• Leased line alternatives
   –   T1 line (1.544 Mbps), T3 line (44.736 Mbps), OC-768 (40 Gbps)
   –   Set up as a point-to-point line
   –   Only predefined sites can use leased lines
   –   Requires highly trained specialists to set up
   –   Monthly connection and maintenance costs expensive
   –   Provide low cost per bit transmitted for high traffic networks



                                                                        6-17
WAN Using Leased Lines




                         6-18
Public Switched Data Network (PSDN)

Public Switched Data Network
    – Network of computers and leased lines
    – Developed and maintained by vendor
    – Time leased on network


•     Utility that supplies networks for other companies
      to lease
    – Each site leases line to connect to PSDN network
      at access point
          • Point of presence (POP)
          • Saves setup and maintenance activities


                                                           6-19
WAN Using PSDN




                 6-20
PSDN Protocols

• Frame relay
   – Process traffic at 56 kbps to 40 Mbps
   – Simplest and easiest to support
   – Lower cost than ATM
• Asynchronous transfer mode (ATM)
   – Process speeds from 1 to 156 Mbps
   – Support voice and data communication
• Ethernet
   – Operates at speeds of 10 to 40 Gbps




                                             6-21
Q4: How Does Encryption Work?
• Encryption
   – Process of transforming clear text into coded text
   – Used for secure storage or communication
   – Uses algorithms
        • DES (Data Encryption Standard)
        • 3DES (Triple DES)
        • AES (Advanced Encryption Standard)
• Key
   – Used to encrypt data
   – Algorithm applies key to produce coded message
        • Symmetric encryption – same key encrypts and decrypts
        • Asymmetric encryption – different keys are used
   – Key used to decrypt message

                                                                  6-22
Q4: How Does Encryption Work?
    (cont’d)
• Public key/private key cryptography
     – Public key used to encrypt messages
     – Public key sent to other party to encode messages to be sent
       back
     – Decrypted with private key
     – Complex and slow
•   Asymmetric public key encryption — message encrypted using
    recipient's public key. Recipient decrypts with own public key.
•   HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to
    encrypt data
     – Fast, secure
     – See next slide for how it works



                                                                      6-23
Q4: How Does Encryption Work?
    (cont’d)




           Figure 6-14




                                6-24
Q5: What Is the Purpose of a
    Firewall?
•   Computer device that prevents unauthorized network access
•   May be special-purpose computer or program on a general-purpose
    computer
•   Organizations may have multiple firewalls
     – Perimeter firewalls sit outside organizational network
     – Internal firewalls are inside network
     – Packet-filtering firewalls examine each part of a message (source
       address, destination address, and other bytes) before allowing message
       to pass
     – May filter both incoming and outgoing messages
•   Access control list (ACL)
         encodes rules stating which
         IP addresses are allowed into
         or prohibited from the network



                                                                                6-25
Q6: What Is a VPN, and Why Is It
    Important?
 Virtual private network
   – Uses Internet or private network to create
     appearance of point-to-point connections
   – Uses public Internet to create appearance of
     private network
   – Client and server have point-to-point connection
     called tunnel
      • Private pathway over shared network
   – Secure, encrypted communications
      • VPN client software encrypts data and receiving VPN
        server decrypts it
      • Users and their keys must be registered with VPN server

                                                             6-26
Remote Access Using VPN:
   Actual Connections




                           6-27
How Does the Knowledge in This Chapter
         Help Dee and You?
• Dee and salespeople use thin client computers
   – Dee creates blog entries on Web pages using Movable
     Type
   – Salespeople use pages served by Movable Type


• Client computers contain VPN client software
   –   Interact with VPN server via Internet
   –   Secure, private connections
   –   Firewalls stop traffic not addressed to VPN server
   –   Salespeople know how to use VPN



                                                            6-28
How Does the Knowledge in This Chapter
     Help Dee and You? (cont’d)
• IT department cannot schedule resources to setup
  blog server in timely fashion
   – Will not allow outside person to do setup
       • Would then have access to system


• Consultant can create server on unprotected test
  server
   – Can be copied onto network server after acceptance
   – Requires some internal IT labor
   – Consultant could include Trojan horse virus or malware
       • Install only software from known sources
       • Code should not reside on production server


                                                              6-29

More Related Content

What's hot (20)

Chapter09
Chapter09Chapter09
Chapter09
 
CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)CASE (Computer Aided Software Design)
CASE (Computer Aided Software Design)
 
Net essentials6e ch8
Net essentials6e ch8Net essentials6e ch8
Net essentials6e ch8
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Ch06
Ch06Ch06
Ch06
 
Concept of information system & networking..
Concept of information system & networking..Concept of information system & networking..
Concept of information system & networking..
 
Resume
ResumeResume
Resume
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Chap13
Chap13Chap13
Chap13
 
E-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking SystemE-Management, Archival and Retrieval of documents/Office Networking System
E-Management, Archival and Retrieval of documents/Office Networking System
 
Chap14
Chap14Chap14
Chap14
 
Ch12
Ch12Ch12
Ch12
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Software
SoftwareSoftware
Software
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Thin client
Thin clientThin client
Thin client
 
Chap15
Chap15Chap15
Chap15
 

Viewers also liked

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)Sanghyeok Park
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)Sanghyeok Park
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)Sanghyeok Park
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)Sanghyeok Park
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)Sanghyeok Park
 

Viewers also liked (10)

[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)[1st소나무]1 소통은청년의희망이다(이명관)
[1st소나무]1 소통은청년의희망이다(이명관)
 
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)[1st소나무]5 또하나의이웃다문화와통하다(이정기)
[1st소나무]5 또하나의이웃다문화와통하다(이정기)
 
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
[1st소나무]4 놀이를통한조직소통이기업을바꾼다(정은숙)
 
Chap03 re
Chap03 reChap03 re
Chap03 re
 
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
[1st소나무]2 나의변화는가정을향한다(손성문이준하영남)
 
Chap02 re
Chap02 reChap02 re
Chap02 re
 
Bpmn
BpmnBpmn
Bpmn
 
Case mis ch03
Case mis ch03Case mis ch03
Case mis ch03
 
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
[1st소나무]3 이웃의소통그리고마을의재발견(윤미숙)
 
Ch7 bpmn
Ch7 bpmnCh7 bpmn
Ch7 bpmn
 

Similar to Case mis ch06

internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxLeahRachael
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...nesarahmad37
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note arvind pandey
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111abenimelos
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111abenimelos
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsKarthikeyan Dhayalan
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications inssuser6478a8
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdfSanjayPradhan61
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.pptGetachewDires1
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 

Similar to Case mis ch06 (20)

Networks
NetworksNetworks
Networks
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptxUNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
UNIT 7-UNDERSTANDING LARGER NETWORKS.pptx
 
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...Networking presentationNetworking presentation.pptNetworking presentation.ppt...
Networking presentationNetworking presentation.pptNetworking presentation.ppt...
 
Basic networking
Basic networkingBasic networking
Basic networking
 
computer network fundamental note
computer network fundamental note computer network fundamental note
computer network fundamental note
 
Networking Fundamentals.ppt
Networking Fundamentals.pptNetworking Fundamentals.ppt
Networking Fundamentals.ppt
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111Chapter 6 - Mobile Network Layer.ppt111111
Chapter 6 - Mobile Network Layer.ppt111111
 
Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111Chapter 6 - Mobile Network Layer.ppt11111
Chapter 6 - Mobile Network Layer.ppt11111
 
Ch06
Ch06Ch06
Ch06
 
CISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranetsCISSP - Chapter 4 - Intranet and extranets
CISSP - Chapter 4 - Intranet and extranets
 
Network Security and its applications in
Network Security and its applications inNetwork Security and its applications in
Network Security and its applications in
 
Computer Network Basics.pdf
Computer Network Basics.pdfComputer Network Basics.pdf
Computer Network Basics.pdf
 
Lecture 1.pptx
Lecture 1.pptxLecture 1.pptx
Lecture 1.pptx
 
data communication and Network.ppt
data communication and Network.pptdata communication and Network.ppt
data communication and Network.ppt
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
CN-Unit 1.pptx
CN-Unit 1.pptxCN-Unit 1.pptx
CN-Unit 1.pptx
 
Wifi Technology
Wifi TechnologyWifi Technology
Wifi Technology
 

More from Sanghyeok Park

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처Sanghyeok Park
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰Sanghyeok Park
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기Sanghyeok Park
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구Sanghyeok Park
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로Sanghyeok Park
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120Sanghyeok Park
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023Sanghyeok Park
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331Sanghyeok Park
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326Sanghyeok Park
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317Sanghyeok Park
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design ThinkingSanghyeok Park
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1Sanghyeok Park
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내Sanghyeok Park
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_printSanghyeok Park
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁Sanghyeok Park
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...Sanghyeok Park
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대Sanghyeok Park
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구Sanghyeok Park
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 Sanghyeok Park
 

More from Sanghyeok Park (20)

위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
위기를 기회로, 그린 뉴딜을 이끄는 소셜벤처
 
기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰기브앤테이크 (Give and Take) 북리뷰
기브앤테이크 (Give and Take) 북리뷰
 
[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기[북새통 037] 틀안에서 생각하기
[북새통 037] 틀안에서 생각하기
 
[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구[북새통] 생각천재가 되는 세가지도구
[북새통] 생각천재가 되는 세가지도구
 
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로소셜벤처활성화방안-Lh소셜벤처사업을중심으로
소셜벤처활성화방안-Lh소셜벤처사업을중심으로
 
넛지 북새통 20171120
넛지 북새통 20171120넛지 북새통 20171120
넛지 북새통 20171120
 
협력의진화 북새통 20171023
협력의진화 북새통 20171023협력의진화 북새통 20171023
협력의진화 북새통 20171023
 
Why 기업가정신 20160331
Why 기업가정신 20160331Why 기업가정신 20160331
Why 기업가정신 20160331
 
하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326하루에 끝내는 연구방법론 20160326
하루에 끝내는 연구방법론 20160326
 
비전 기업가정신 20160317
비전 기업가정신 20160317비전 기업가정신 20160317
비전 기업가정신 20160317
 
아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking아이템 도출을 위한 Design Thinking
아이템 도출을 위한 Design Thinking
 
디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1디자인씽킹과 비즈니스모델젠 Rev1
디자인씽킹과 비즈니스모델젠 Rev1
 
2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내2016 경남과기대 창업대학원 신입생 안내
2016 경남과기대 창업대학원 신입생 안내
 
Design thinking 20150821_print
Design thinking 20150821_printDesign thinking 20150821_print
Design thinking 20150821_print
 
소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁소셜벤처사례 20150613 박상혁
소셜벤처사례 20150613 박상혁
 
2015 creaction
2015 creaction2015 creaction
2015 creaction
 
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
[인터넷전자상거래연구] 글로벌 무역전문가 양성프로그램(GTEP)이 지역 중소기업 생태계 환경에 미치는 영향: G...
 
소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대소셜한창조성 20141218 계명대
소셜한창조성 20141218 계명대
 
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
액션러닝을 이용한 중소기업 학습조직 구축에 대한 사례연구
 
2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내 2015년도 경남과학기술대학교 창업대학원 입학안내
2015년도 경남과학기술대학교 창업대학원 입학안내
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Case mis ch06

  • 2. Q1: What Is a Computer Network? • Network – Collection of computers – Communicate with one another over transmission line • Basic types of Network Topologies – Local Area Network (LAN) – Wide Area Network (WAN) – Internet 6-2
  • 3. LAN (Local Area Network) • Computers connected on single company site • Usually located in small area, such as a home, office building, or group of buildings • Connects two to several hundred computers 6-3
  • 4. WAN (Wide Area Network) • Connects computers across metropolitan, state, regional, national areas • Uses communication networks from vendors – Licensed by government 6-4
  • 5. Internet • Global network of networks • Connects LANs, WANs, and other networks • Public and private networks of networks • Uses a variety of communication methods and conventions – Seamless flow of data provided by standardized layered protocol • Protocol: a set of standard rules for data representation, signaling, authentication, and error detection required to send information 6-5
  • 6. Q2: What Are the Components of a LAN? 6-6
  • 7. Q2: What Are the Components of a LAN? (cont’d) • Switch/Router – Special purpose computer that receives and transmits messages • Network interface card (NIC) – Hardware that connects each device’s circuitry to the cable – Onboard NIC or card that fits into an expansion slot • MAC (media control address) • UTP (unshielded twisted pair cable) • Optical fiber cable 6-7
  • 9. IEEE 802.3 Protocol (Institute of Electrical and Electronics Engineers) • World’s most popular protocol for LANs • 10/100/1000 Mbps Ethernet • Protocol specifies hardware characteristics, cables, and how messages are packaged and processed 6-9
  • 10. Q3: What Are the Alternatives for a WAN? • WANs connect computers at separate sites – Use routers and public communications links between sites – Cable connections made through licensed public telecommunications companies • Internet service provider (ISP) – A company that provides customers access to the Internet – Provides legitimate Internet address – Serves as gateway to Internet – Pay for Internet access 6-10
  • 11. Q3: What Are the Alternatives for a WAN? (cont’d) 1. Connect to an Internet service provider (ISP) 2. Network of Leased Lines 3. Public Switched Data Networks 4. Virtual Private Network (VPN) 6-11
  • 12. Connecting the Personal Computer to an ISP: Modems 1.Dial-up Modems 2.DSL Modems 3.Cable Modems • Modem – a device to produce a signal that can be transmitted easily and decoded to reproduce the original digital data • Narrowband – less than 56 kbps speed • Broadband – more than 256 kbps speed 6-12
  • 13. 1. Dial-up Modems – Converts signals between analog and digital so computers can communicate over a regular telephone line – Connection made by dialing the ISP’s phone number – Maximum transmission speed of 56 kbps (53 kbps really) – Modulation standards – V.34, V.90, V.92 specify how digital signals are converted to analog – Point-to-Point Protocol (PPP) – governs how data (messages) are packaged and handled between modem and ISP 6-13
  • 14. Personal Computer (PC) Internet Access 6-14
  • 15. 2. DSL Modems Digital Subscriber Line (DSL) – Operates over telephone lines – Data signals do not interfere with voice telephone service – Faster data transmission than dial-up • 256 kbps to 768 kbps – DSL modems use their own protocols – Download and upload speeds differ • Asymmetric digital subscriber lines (ADSL) • Symmetrical digital subscriber lines (SDSL) – 1.544 mbps both directions 6-15
  • 16. 3. Cable Modems • Provide high-speed data transmission • Use cable television lines – High-capacity optical fiber cable run to neighborhood distribution substation – Television cables connect at distribution substation and runs to subscriber’s house – Does not interfere with television transmission – Up to 500 subscribers connected at each substation • Performance can vary based on number connected – Download speed up to 10Mbps, upload up to 256 kbps 6-16
  • 17. Networks of Leased Lines • WAN connects computers located at geographically distributed sites • Access devices connect sites to transmission – Router or network switch– special-purpose computer to move network traffic from one node to another • Leased line alternatives – T1 line (1.544 Mbps), T3 line (44.736 Mbps), OC-768 (40 Gbps) – Set up as a point-to-point line – Only predefined sites can use leased lines – Requires highly trained specialists to set up – Monthly connection and maintenance costs expensive – Provide low cost per bit transmitted for high traffic networks 6-17
  • 18. WAN Using Leased Lines 6-18
  • 19. Public Switched Data Network (PSDN) Public Switched Data Network – Network of computers and leased lines – Developed and maintained by vendor – Time leased on network • Utility that supplies networks for other companies to lease – Each site leases line to connect to PSDN network at access point • Point of presence (POP) • Saves setup and maintenance activities 6-19
  • 21. PSDN Protocols • Frame relay – Process traffic at 56 kbps to 40 Mbps – Simplest and easiest to support – Lower cost than ATM • Asynchronous transfer mode (ATM) – Process speeds from 1 to 156 Mbps – Support voice and data communication • Ethernet – Operates at speeds of 10 to 40 Gbps 6-21
  • 22. Q4: How Does Encryption Work? • Encryption – Process of transforming clear text into coded text – Used for secure storage or communication – Uses algorithms • DES (Data Encryption Standard) • 3DES (Triple DES) • AES (Advanced Encryption Standard) • Key – Used to encrypt data – Algorithm applies key to produce coded message • Symmetric encryption – same key encrypts and decrypts • Asymmetric encryption – different keys are used – Key used to decrypt message 6-22
  • 23. Q4: How Does Encryption Work? (cont’d) • Public key/private key cryptography – Public key used to encrypt messages – Public key sent to other party to encode messages to be sent back – Decrypted with private key – Complex and slow • Asymmetric public key encryption — message encrypted using recipient's public key. Recipient decrypts with own public key. • HTTPS uses secure socket layer (SSL, a.k.a. TLS) protocol to encrypt data – Fast, secure – See next slide for how it works 6-23
  • 24. Q4: How Does Encryption Work? (cont’d) Figure 6-14 6-24
  • 25. Q5: What Is the Purpose of a Firewall? • Computer device that prevents unauthorized network access • May be special-purpose computer or program on a general-purpose computer • Organizations may have multiple firewalls – Perimeter firewalls sit outside organizational network – Internal firewalls are inside network – Packet-filtering firewalls examine each part of a message (source address, destination address, and other bytes) before allowing message to pass – May filter both incoming and outgoing messages • Access control list (ACL) encodes rules stating which IP addresses are allowed into or prohibited from the network 6-25
  • 26. Q6: What Is a VPN, and Why Is It Important? Virtual private network – Uses Internet or private network to create appearance of point-to-point connections – Uses public Internet to create appearance of private network – Client and server have point-to-point connection called tunnel • Private pathway over shared network – Secure, encrypted communications • VPN client software encrypts data and receiving VPN server decrypts it • Users and their keys must be registered with VPN server 6-26
  • 27. Remote Access Using VPN: Actual Connections 6-27
  • 28. How Does the Knowledge in This Chapter Help Dee and You? • Dee and salespeople use thin client computers – Dee creates blog entries on Web pages using Movable Type – Salespeople use pages served by Movable Type • Client computers contain VPN client software – Interact with VPN server via Internet – Secure, private connections – Firewalls stop traffic not addressed to VPN server – Salespeople know how to use VPN 6-28
  • 29. How Does the Knowledge in This Chapter Help Dee and You? (cont’d) • IT department cannot schedule resources to setup blog server in timely fashion – Will not allow outside person to do setup • Would then have access to system • Consultant can create server on unprotected test server – Can be copied onto network server after acceptance – Requires some internal IT labor – Consultant could include Trojan horse virus or malware • Install only software from known sources • Code should not reside on production server 6-29