Communication and Network - International University of Japan
Download
Report
Transcript Communication and Network - International University of Japan
Communications and
Computer Network
Hun Myoung Park, Ph.D.,
Public Management and Policy Analysis Program
Graduate School of International Relations
International University of Japan
2
Outline
Communication Basics
Analog versus Digital
Frequency and Bandwidth
Transmission Types
Telecommunication Media
Network Typologies
Type of Network
Network Data Security
3
Communication Basics 1
Sender encodes (converts) his message.
Receiver decodes (translates) the received
message.
Message to be sent
Media or channel through which the
message travels (air, radio, TV, phone,
Internet, etc.)
Feedback (error checking)
4
Communication Basics 2
5
Analog vs. Digital Signals
Analog signals: continuous
o Frequency
o Amplitude
Digital signals: discrete
6
Modem 1
Modem (modulator/demodulator)
o Converts analog signals to digital ones
(modulation) and vice versa
o Dial-up connection
o Bps (bit per second)
o Baud (pulses per second) or modulation rate
o Emulation software: check errors (parity bit)
7
Modem 2
8
Frequency
Frequency (Hz), the number of times a signal
makes a complete cycle per second. KHz,
MHz, GHz
Wavelength: from long (low frequency) to
short (high frequency—UHF, cell phone).
9
Bandwidth
Bandwidth (bps) is ranges of frequencies.
The difference between the highest and
lowest frequency transmitted (or amount of
data transmitted) per second.
Bps, Kbps, Mbps.
Baud (pulses per second) or modulation rate
Broadband has a rate of greater than 1.5
Mbps (telephone).
10
Transmission Types
11
Transmission Types 1
Serial versus parallel transmission
Wired (faster and more secure) versus
wireless (electromagnetic radiation) network
12
Transmission Types 2
Direction of transmission:
o Simplex: transmitted in a single direction only
o Half-duplex: one direction at a time
o Full-duplex: both directions at the same time
Timing of transmission
o Synchronous: blocks of data are transferred
o Asynchronous: start and stop bits to distinguish
one byte from the others (e.g., email).
13
Telecommunication Media
14
Media 1
Twisted-pair wire: pairs of copper wire. IEEE
802 standards of RJ-45 (LAN) and RJ-11
(Telephone)
Coaxial cable (coax) in the cable TV industry.
Inner conductor. More expensive, faster, less
susceptible to interference (by shield
blocking electro-magnetic signals)
15
Media 2
Optical fiber cable uses light pulse sent by a
laser device thought the strands of glass.
Thin coating “cladding” prevents the light
from leaking out of the fiber.
Super-fast and in turn expensive.
Used for backbone (telephone) network.
16
17
Media 4
Us of wireless media is often regulated
Radio frequency (RF) transmission: 3kHz300MHz
Microwave (“line-of-sight”): communication
satellite use microwave stations (microwave
antennas) and satellite dishes. 300MHz300GHz
Infrared (IR) transmission: 300GHz-400THz
18
Media 5
Cellular radio: cell, cellular tower, mobile
telephone switching office (MTSO). G3.
Global positioning systems (GPS),
Bluetooth, infrared transmission, near field
communication (NFC) : short range
19
20
Network Channel 1
Telephone lines
o Conventional dial-up connection
o ISDN (Integrated Services Digital Network)
o DSL (Digital Subscriber Line) uses higher frequency
than voce phone call on telephone lines.
o DSL splitter separates digital and analog signals
o ADSL (Asymmetric DSL)
21
Network Channel 2
Cable access (cable TV).
Satellite and fixed wireless access need
modems and transceivers.
Wired Ethernet
o Bell Lab’s T1 (1.5Mbps), T3 (44.7Mbps)
Broadband over fiber (BoF)
22
Network Channel 3
Cellular broadband or mobile wireless
(laptops, smart phones)
o Wi-Fi (Wireless Fidelity) is wireless networking
standards (wireless Ethernet)
o IEEE 802.11
o 802.11a, …802.11g, 802.11n
o 802.11ac (2.4 GHz or 5.0 GHz)
3G, 4G, 5G, LTE (Long Term Evolution)
23
24
Network Typology
25
Network Topology 1
Star network has a central hub (router)
connected by other devices.
Ring network: devices are connected from
one node to the next. One-way direction of
transmission. IBM’s Token Ring Network
Bus network has a central bus line to which
devices (nodes) are attached.
26
Network Topology 2
Mesh network: each device is connected to
multiple devices in a network.
Hybrid network combines above typologies.
27
28
Type of Network
29
Types of Network 1
Sharing programs, data, and devices
Access to databases and better security
30
Types of Network 2
LAN (Local Area Network)
o Covers small geographical area
o Bridge for same types of networks
o Router for different networks (layer 3)
o Gateway, bridge + router + etc.
31
Types of Network 3
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
VPN (Virtual Private Network) allows remote
and secure access to the network (intranet)
through encrypted “tunneling”
32
Types of Network 4
Intranets versus extranets
o private networks used for employees.
o Authorized outsiders can access extranets.
33
Client-server Network
Servers process clients’ request and provide
services to clients. Not particular machines
but functions.
Depending on tasks, network, file, mail, Web,
DNS, printer, license servers and others are
available.
A single machine can run more than one
servers.
Uploading and downloading (polling &
addressing)
34
Peer-to-peer Network
Direct access to other devices without
central (in classical sense) servers.
P2P servers mange indexes, not contents to
bridge users.
Internet P2P computing for sharing resources
online. But it often infringes intellectual
property rights.
Suck down all available resources on the
network, resulting in network congestion
35
Network Hardware 1
Modem and cable modem
Gateway is an entrance to another network
Wireless access point and hot-spot
Private Branch Exchange (PBX)
36
Network Hardware 2
Router forwards data packets between
computer network (layer 3-network). IP
address is used.
Network switch (switching hub, bridging hub)
contains ports to which all the devices
(nodes) on the network can connect (layer
2-data link). Only one broadcast domain.
MAC is used.
http://www.diffen.com/difference/Router_vs
_Switch
37
Network Data Security
Encryption converts an original message into
a form that can be understood only by the
intended receiver
Encryption key is applied to a set of
unencrypted text to produce encrypted text
Encryption algorithm: symmetric versus
asymmetric algorithm. RSA is a symmetric
algorithm for public-key cryptosystems
Wireless Protected Access 2 (WPA2)
38
Virtual Private Network
“Extends a private network across a public
network” (Internet) to allow remote users to
send and receive data as if they are directly
connected to private network.
Establish a virtual point-to-point connection
through tunneling protocols.
Support secure, encrypted connections
between a company’s employees and
remote users
39
References
Stair and Reynolds. 2016. Principles of
information systems, 12th ed. Cengage
Learning.
Stair and Reynolds. 2012. Information systems,
10th ed. Cengage Learning.
Morley and Parker. 2015. Understanding
computers, 15th ed. Cengage Learning.
Hutchinson and Sawyer. 2000. Computers,
Communications, and Information, 7th ed.
Irwin/McGraw-Hill