Beruflich Dokumente
Kultur Dokumente
e-commerce
In a network, communications equipment is used
to connect two or more computers allowing the
sharing of various hardware, software, and data
resources.
3
Modems
5
Wire pairs
8
Microwave transmission
9
Satellite transmission
12
Telephone service
•Existing telephone lines and analog
Modems are used to provide a bandwidth of about
56Kbps.
• Higher grades of service use the Digital Subscriber
Loop (DSL) protocol.
These include:
– Integrated Services Digital Network
(ISDN),
available since 1984.
– Asymmetric Digital Subscriber Line (ADSL)
– Symmetric Digital Subscriber Line (SDSL)
Upstream: 16 to 640 Kbps
Downstream: 1.5 to 9 Mbps (million bps)
13
Cable connections
• Cable modems connect to the same coaxial
cable
that serves television.
• It is connected via twisted pair wire to a PC
and
provides a cost-effective and high
bandwidth
connection to an ISP.
• Upstream: 768 Kbps
• Downstream: 10 Mbps
• Cable bandwidths vary with the number of
users. 14
Price and speed comparisons
• When making decisions about Internet connections
you must consider:
– Bandwidth needed
– Cost of startup
– Monthly fees
– Traffic issues
•Depending on where you live, you may have other
options, such as satellite connections.
.
15
Types of networks
16
Wide-area network
18
Purposes for networks
19
Intranets
• Only selected individuals can use an intranet.
Example: CSEA Intranet
• Intranets are a popular and inexpensive way to
distribute information.
• Intranets typically use existing infrastructure.
• Benefits include timely and current
information
delivery, cheaper internal communication, low
maintenance costs, and easy to use.
20
Extranets
• Extranets provide the private infrastructure for
companies to coordinate their purchases,
exchange business documents, and communicate
with each other.
• Some start out as intranets and become available to
people outside the institution in an effort to reduce
the workload for employees.
• There are three types of extranets:
– A public network
– A secure (private) network
– A virtual private network (VPN)
21
Public network
• A public network extranet is one which can be
accessed by the public or one in which two or
more companies agree to link their intranets
using a public network.
• Security is an issue in this configuration.
• This type of extranet is uncommon because of
the risk.
22
Private network
• Uses a private, leased-line connection to connect
two companies.
• A leased line is a permanent, dedicated telephone
connection between two points. The line is
always active.
• This arrangement is significantly more secure.
• The big drawback is the cost.
• This type of arrangement does not scale well since
each new company requires another leased line.
23
Virtual private network
• A VPN uses public networks but through a system
called tunneling or encapsulation.
• Tunnels are private passageways through the public
Internet that provide secure transmission from one
partner to another.
• Separate security shells are used with the most
sensitive data under the tightest controls.
• VPNs establish short-term connections in real time
that are broken once the session ends.
• This arrangement is inexpensive and scales well.
24
Protocols
25
Tasks for protocols
26