William Sawyer - McGraw Hill Higher Education
Download
Report
Transcript William Sawyer - McGraw Hill Higher Education
6-1
Chapter
6
Communications,
Networks, & Safeguards
6.1 From the Analog to the Digital Age
6.2 Networks
6.3 Wired Communications Media
6.4 Wireless Communications Media
6.5 Cyberthreats, Hackers, & Safeguards
6.6 The Future of Communications
McGraw-Hill/Irwin
© 2007 The McGraw-Hill Companies, Inc. All rights reserved.
From the Analog to the Digital Age
Analog signals use variation of
a wave form to send
information
The wave forms look like the
sine wave shown at right
In FM signals the Frequency
is varied (Modulated)
In AM signals the Amplitude is
varied (Modulated)
Radios send signals this way
Light works this way
Hearing and phones work this
way
Modems work this way
Sine Wave
1
0.5
0
Amplitude
-0.5
-1
S1
Frequency
6-3
From the Analog to the Digital Age
Digital signals send data in
Digital Signal
1
Time
6-4
41
37
33
29
25
21
17
13
9
0
5
Data
1
terms of 1s and 0s
A digital signal may look like
this one at right
Notice how the signal goes up
and down abruptly because
the only values that matter are
0 and 1 and the timing of
when they occur
Computers use digital signals
Newspaper photographs are
digital since they are made up
of little dots
S1
From the Analog to the Digital Age
Since computers use digital signals but phone lines
use analog, modems must translate from digital to
analog, send the signal along the phone line, then
translate back from analog to digital at the other end
The
process is called “modulation/demodulation”
Modulation means to translate from digital to analog
Demodulation means to translate from analog to digital
Modems have to do all this just to use standard analog
voice phone lines
6-5
From the Analog to the Digital Age
Tape recorders, voices, and musical instruments are
analog while CDs are digital
To burn a CD from a jam session, the digital recording
equipment must convert from analog to digital
The
analog-to-digital converter samples the sound and
converts the height of the wave to a number
Samples of the sound wave are taken at regular intervals
– about 44,100 times each second
Because the digital samples are played back faster than
our ears can react, it sounds to us like a single
continuous sound wave 6-6
From the Analog to the Digital Age
Digital sampling is similar to showing movies
Movies
show still pictures (frames)
But they show them so fast that our eyes can’t react in
time
So to us the series of still pictures look like continuous
motion
Did you ever notice in movies when they show car tires in
motion they sometimes seem to move backwards?
This
is because the tires are moving at a rate that is
incompatible with the frame rate of the movie, so our eyes
think the tires are really moving backwards when the car is
actually moving forward! 6-7
Networks
A system of interconnected computers, telephones, or
other communications devices that can communicate
with one another and share applications and data
Before we had computer networks, people used
“sneakernet” to share data between computers
Person
1 saved their document to a floppy disk
Then they walked over to person 2’s desk (wearing
sneakers, of course) and handed over the disk to
person 2
Person 2 loaded the disk into their computer to read and
edit the document
6-8
Networks
Since the days of “sneakernet”, networks have
become standard. They enable us to:
Share
peripheral devices such as laser printers
Share programs and data
Use e-mail and other communication programs
Backup critical information because it is stored centrally
Access shared databases
6-9
Networks
WAN – Wide Area Network
Covers a wide geographic area,
MAN – Metropolitan Area
such as a country or the world
Covers a city or a suburb
Network
LAN – Local Area Network
Connects computers and devices
HAN – Home Area Network
PAN – Personal Area Network
in a limited geographic area such
as an office, building, or group of
nearby buildings
Uses wired, cable, or wireless
connections to link a household’s
digital devices
Uses short-range wireless
technology to connect an
individual’s personal electronics
like cellphone, PDA, MP3 player,
6-10 notebook PC, and printer
Networks
Client/Server
Consists
of clients, which are computers that request
data, and servers, which are computers that supply data
File servers act like a network-based shared disk drive
Database servers store data but don’t store programs
Print servers connect one or more printers and schedule
and control print jobs
Mail servers manage email
Peer-to-Peer
All
computers on the network communicate directly with
each other without relying on a server
6-11
For fewer than 25 PCs
Networks
Peer-to-Peer (continued)
Cheaper
than client/server since servers are typically more
expensive than PCs
There are often problems with knowing who has the current
version of documents and files
Too slow for use in larger offices
Legal considerations
Downloading copyrighted material without paying violates U.S.
copyright laws
Server-based online file sharing sites such as Napster have
been shut down
Peer-to-Peer file-sharing sites such as Kazaa, Grokster, and
Gnutella have been more difficult to control since there is no
central server to shut down
So publishers are suing individual downloaders instead
Watch out!
6-12
Don’t download illegally!
Networks
Intranets, Extranets, VPNs
Intranets
An
organization’s private network that uses the
infrastructure and standards of the internet and the web
Extranets
Private
internets that connect not only internal personnel
but also selected suppliers and other strategic parties
Virtual Private Networks
Private
networks that use a public network, usually the
internet, to connect remote sites
6-13
Network
Components
Connections
– twisted-pair, coaxial cable, or fiber-optic
Wireless – infrared, microwave (Bluetooth), broadcast
(Wi-Fi) or satellite
Wired
Hosts & Nodes
Host:
the central computer that controls the network
Node: a device that is attached to the network
Packets
The
format for sending electronic messages
A fixed-length block of data for transmission
6-14
Network
Components
Protocols
The set of conventions governing the exchange of data
between hardware and/or software components in a
communications network
Built into the hardware or software you are using
Govern the packet design and transmission standards
Examples are:
TCP/IP for LANs and internet
AppleTalk for older Mac networks
SIP for Voice over IP (VoIP)
CDMA for cellphones
IPX for older Novell networks
6-15
Network
Packets
TCP/IP Packets carry four types of information
Sender’s
address (source IP number)
Address of intended recipient (destination IP number)
Number of packets the original data was broken into
This happens because the amount of data the PC is sending can
be much larger than the space in a single packet
So the data has to get broken up in one or more packets
Then the packets have to be assigned a number like 1 of 6, 2 of 6,
3 of 6, 4 of 6, 5 of 6, and 6 of 6
Packet
number and sequence info for each packet
Packets may arrive out of order (1, 6, 3, 2, 5, 4 for example)
This information is used to resequence the packets and put them
back in the correct order (1, 2, 3, 4, 5, 6) so they can be read
6-16
Network
Devices
Daisy
Used in peer-to-peer networks – direct
Chain
Hub
connections from one PC to the next
Used in small LANs to connect PCs and LAN
segments to each other. Forwards to all ports
Used in larger, busy LANs – faster than hubs
because it forwards only to correct destination
Used to connect two networks of the same type
Connects two networks of different types
Connects multiple LANs together. Routers are
the internet backbone
The main route that connects all the gateways,
routers, and other computers in an organization
Switch
Bridge
Gateway
Router
Backbone
6-17
Network
Topologies
Bus – all nodes are connected to a single wire or cable
Ring – all nodes are connected in a continuous loop
Star – all nodes are connected through a central host
6-18
Network
Packet Collision Schemes
Collisions happen when two data packets are going
opposite directions on shared media
Ethernet – deals with collisions
All
devices send data at once
Collisions happen regularly
Data is simply resent until it arrives
Token ring – avoids collisions
$$$
Devices
take turns sending data
Token is sent around the ring
Pricier than Ethernet
Wait to get the token, then send data
6-19
Wired Communications Media
Communications media carry signals over a
communications path
Twisted-Pair
Wire
2
strands of insulated copper wire twisted around each other
Twisting reduces interference (crosstalk) from electrical signals
Data rates are 1 – 128 Megabits per second
Coaxial
Cable
Insulated
copper wire wrapped in a metal shield and then in an
external plastic cover
Used for cable TV and cable internet electric signals
Carries voice and data up to 200 megabits per second
6-20
Wired Communications Media
Communications media continued
Fiber-optic
cable
Dozens
or hundreds of thin strands of glass or plastic that
transmit beams of light, not electricity
Can transmit up to 2 gigabits per second
More expensive than twisted-pair or coax
Lighter and more durable than twisted-pair or coax
More difficult to tap into than twisted-pair or coax
6-21
Wired Communications Media
for the home
Ethernet
Pull
Cat5 cables through the house (yourself or contractor)
Connect to PC’s Ethernet network interface card (nic)
For several PCs, get a hub or switch to connect them all
10 or 100 megabits per second
HomePNA
Uses existing telephone wiring and jacks
Requires HomePNA nic in your PC
Speeds of 10 – 240 megabits per second
Homeplug
Uses existing home electrical lines
Speeds of 14 megabits per second
6-22
Wireless Communications Media
Electromagnetic spectrum of radiation is the basis of all
telecommunications signals
Includes the longest radio waves (9 kHz) and audio waves (sound), up
through gamma rays that come from nuclear decay (thousands of
gigahertz)
Radio-frequency spectrum is the part of the electromagnetic spectrum
that we use for radio communication
6-23
Wireless Communications Media
Bandwidth
Narrowband (or Voiceband)
Used
for regular telephone communications
Transmission rate < 100 kilobits per second
Medium Band
Used for long-distance data transmission or to
connect mainframe and midrange computers
Transmission rate 100 kb to 1 megabit per second
Broadband
For high-speed data and high-quality audio and video
Transmission rate 1 megabit per second to 100
megabits per second
US households get 4 – 5 MB while Japanese get 100
6-24
MB per second
Wireless Communications Media
Infrared Transmission
Sends
signals using infrared light
Frequencies are too low to see (1-4 Mbits per second)
Broadcast Radio
AM/FM,
CB, ham, cellphones, police radio
Sends data over long distances using a transmitter and a
receiver
Microwave Radio
Superhigh
frequency radio waves (1 gigahertz)
Requires line-of-sight transmitters and receivers
Communications Satellites
6-25
Wireless Communications Media
Communications Satellites
These are microwave relay stations in orbit around
Uplinking: transmitting a signal from ground station to a satellite
Cover
the earth -
broad service area
Cost $300 million to $700 million each + launch costs
Can be placed at different heights: GEO, MEO, LEO
GEO – geostationary earth orbit
MEO – medium-earth orbit
22,300 miles up above earth
Always above equator
5,000 – 10,000 miles up
LEO – low-earth orbit
200 – 1,000 miles up
Has less signal delay than GEO, MEO satellites
6-26
Wireless Communications Media
GPS
Global Positioning System
24 earth-orbiting satellites continuously transmitting timed
radio signals
Each satellite circles earth twice each day at 11,000 miles
up
GPS receivers pick up transmissions from up to 4 satellites
and pinpoint the receiver’s location
Accurate within 3 – 50 feet, with a norm of 10 feet accuracy
GPS receivers contain map files that are displayed based
on the GPS position to guide users
Many GPS receivers have speech chips, too
6-27
Wireless Communications Media
One-way Pagers
One-way pagers are radio receivers that receive data
sent from a special radio transmitter
Radio
transmitter sends out signals over the special
frequency
Pagers are tuned to that frequency
When a particular pager hears its own code, it receives
and displays the message
Discussion Question: Why do airplane rules require you to turn off
pagers and cellphones during flight?
Answer: Pilots use radar and radio to determine their position and
communicate with ground control. Pager and cellphone signals use
radio, too, and competing signals can interfere with each other
6-28
Wireless Communications Media
Long-Distance Wireless
Two-way pagers: Blackberry and Treo
1G: First Generation Cellular
Analog
cellphones
Designed for voice communication using a system of
hexagonal ground-area cells around transmitter-receiver
cell towers
Good for voice – less effective for data due to handing off
2G: Second Generation Cellular
Use
same network of cell towers to send voice and data
in digital form over the airwaves
Required digital receivers on original analog celltowers
6-29
Wireless Communications Media
2G Wireless
There are two competing, incompatible standards
CDMA
– Code Division Multiple Access
Transmission
rates 14.4 kilobits per second
Used by Verizon and Sprint
GSM
– Global System for Mobile Communications
Transmission
rates of 9.6 kilobits per second
Used by Cingular and T-Mobile, as well as Western Europe,
Middle East and Asia
US GSM and European GSM use different frequencies
6-30
Wireless Communications Media
2.5G Wireless
Data speeds of 300–100 kilobits per second
GPRS
– General Packet Radio Service
An
upgrade to 2.5G
Speeds of 30 – 50 kilobits per second
EDGE
is Enhanced Data for Global Evolution
A different
2.5G upgrade
Speeds of up to 236 kilobits per second
6-31
Wireless Communications Media
3G Wireless
Third generation wireless
High
speed data: 144 kilobits per second up to 2
megabits per second
Discussion
Question: If
Accept e-mail with attachments
your cellphone
Display color video and still pictures
can download
Play music
and play music,
do you still
Two important upgrades:
EV-DO
need an i-pod?
Average speeds of 400 – 700 kilobits per second, peaks of 2
megabits per second
UMTS
– Evolution Data Only
– Universal Mobile Telecommunications System
Average speed of 220 – 320 kilobits per second
6-32
Wireless Communications Media
Short-range Wireless
Local Area Networks
50 – 150 feet
Include Wi-Fi (802.11) type networks
Range
Personal Area Networks
30 – 32 feet
Use Bluetooth, Ultra wideband, and wireless USB
Range
Home Automation networks
100 – 250 feet
Use Insteon, Zigbee, and Z-Wave standards
Range
6-33
Wireless Communications Media
Short-range Wireless
Wi-Fi (802.11) networks
Wi-Fi
b, a, and g correspond to 802.11b, 802.11a, and
802.11g
802.11 is an IEEE wireless technical specification
802.11b is older, transmits 11 megabits per second
802.11a is faster than b but with weaker security than g
802.11g is 54 megabits per second and transmits 50 ft
Wi-Fi n with MIMO extends range of Wi-Fi using multiple
transmitting and receiving antennas – 200 megabits per
second for up to 150 ft
6-34 by default on Wi-Fi
Warning! Security is disabled
Wireless Communications Media
Short-range Wireless
Wi-Fi Security
Why
is it disabled by default?
So
Why
non-technical users can get Wi-Fi working more easily
should this bother me?
A person
with a $50 antenna can eavesdrop on everything
your computer sends over wireless from a block or two
away
This is called “wardriving”
To
read more about this problem, follow these links
http://www.webopedia.com/TERM/W/wardriving.html
http://www.wardriving.com/
6-35
Wireless Communications Media
Personal Area Wireless
Bluetooth
Short-range
wireless standard to link cellphones, PDAs,
computers, and peripherals at distances up to 30 ft
Named after King Harald Bluetooth, the Viking who
unified Denmark and Norway
Transmits 720 kilobits per second
When Bluetooth devices come into range of each other,
they negotiate. If they have information to exchange, they
form a temporary wireless network
Bluetooth can also be used to eavesdrop on networks
Turn it off on your cellphone unless you need it at that
6-36
time
Wireless Communications Media
Personal Area Wireless
Ultra Wideband (UWB)
Developed
for military radar systems
Operates in 480 megabit per second range up to 30 ft
Uses a low power source to send out millions of bursts of
radio waves each second
100 times as fast as Bluetooth
Wireless USB
USB
is the most used interface on PCs
The wireless version could be a hit
Range of 32 ft and maximum data rate of > 480 megabits
6-37
per second
Wireless Communications Media
Short-Range Wireless for Home
Insteon
Combines
electronic powerline and wireless technology
Can send data at 13.1 kilobits per second with 150 ft range
Replaces X10
ZigBee
Entirely wireless very power-efficient technology
Can send data at 128 kilobits per second with 250 ft range
Z-Wave
Entirely wireless power-efficient technology
Can send data at 127 kilobits per second to range of 100 ft
Allows you to remotely program your house!
6-38
Cyberthreats, Hackers, &
Safeguards
Problem: internet was begun to foster collaboration
among universities and scientists. They trusted each
other. No security was built into the internet.
Problem: the internet is open-access and is used by
some people who are not trustworthy, who take
advantage of the lack of built-in safeguards.
Problem: Most people connect to the internet and use
their computers in LANs. All it takes is one computer
on a LAN that has been compromised for all computers
on it to be vulnerable.
6-39
Cyberthreats, Hackers, &
Safeguards
Denial of Service Attacks
Consist
of making repeated requests of a computer or
network device, thereby overloading it and causing
legitimate requests to be ignored
Used to target particular companies or individuals
Worms
A program
that copies itself repeatedly into a computer’s
memory or disk drive
May copy itself so much it crashes the infected computer
Famous worms include: Code Red, SQL Slammer,
Nimda, MyDoom, Sasser
Primarily target PCs running Microsoft Windows
6-40
Cyberthreats, Hackers, &
Safeguards
Viruses
A deviant
program that hides on a floppy, hard drive, CD,
or e-mail that causes unexpected side effects such as
destroying or corrupting data
Viruses self-replicate and try to secretly distribute
themselves to other systems
Famous viruses include the “I Love You” virus
Viruses are published at the rate of about one per day
To see what the latest ones are, go to
http://www.symantec.com/avcenter/vinfodb.html
6-41
Cyberthreats, Hackers, &
Safeguards
Trojan Horses
Programs
that pretend to be a useful program such as a
free game or screensaver.
Carry viruses or malicious instructions that damage your
computer or install a backdoor or spyware
Backdoors and spyware allow others to access your
computer without your knowledge
6-42
Cyberthreats, Hackers, &
Safeguards
How they spread
Via
e-mail attachments
By infected floppies or CDs
By clicking on infiltrated websites
By downloading from infected files from websites
Through infiltrated Wi-Fi hotspots
From one infected PC on a LAN to another
What can you do about it?
Install
anti-virus software and subscribe to the automatic
anti-virus update service
6-43
Cyberthreats, Hackers, &
Safeguards
Hackers are either
Computer
enthusiasts, people who enjoy learning about
programming and computers (good)
People who gain unauthorized access to computers or
networks, often for fun or to see if they can (not good)
Crackers
Malicious hackers who break into computers for malicious
purposes
Script kiddies are technically unsophisticated teenagers who use
downloadable software for perform break-ins
Hacktivists are hacker activists who break into systems for a
political purpose
Black-hat hackers are those who break into computers to steal or
destroy information or to use it for illegal profit
Cyberterrorists attack computer systems so as to bring physical or
financial harm to groups, companies, or nations
6-44
Cyberthreats, Hackers, &
Safeguards
Safeguards
Use antivirus software, and keep it current
Install a firewall to monitor network traffic and
filter out
undesirable types of traffic and undesirable sites
Use robust passwords –
Minimum 8 characters with letters, numbers, characters
4cats is not a good password, but f0UrK@tTz is
Install antispyware software
Encrypt financial and personal
records so only you can
read them
Back up your data, so if your PC is attacked and must be
reformatted, you can restore your data
Never download from a website you don’t trust
Consider Biometric authentication
6-45
Cyberthreats, Hackers, &
Safeguards
Encryption
The
process of altering readable data into unreadable
form to prevent unauthorized access
Uses
powerful mathematical ciphers to create coded
messages that are difficult to break
Two
forms:
Private
Key encryption means the same secret key is used
by both the sender and receiver to encrypt and decrypt a
message
Public Key encryption means that two keys are used
The public key of the recipient is published and is used by the
sender to encrypt the message
The private key of the recipient is secret and is the only way to
decrypt the message
6-46
Future of Communications
This is a big area of development
There is a lot of money to be made from faster and
more secure broadband communications
Areas of development include
Global
high-speed low—orbital satellite networks for rural
internet and voice connectivity
4G wireless technology
Photonics to speed up fiber-optic lines
Software-defined radio
Grid computing
6-47