Free Essay

Networks / Data Communications

In:

Submitted By daveCr
Words 3575
Pages 15
(Ms Word Version attached for better viewing and printing)

Networks / Data Communications

NTC 360

Lecture Week Three

INTRODUCTION

Now that we have covered most of the media types available for our networks Protocols that run over the top of the media and the standards they follow, the final topic here is choosing a design of a network by choosing media types and infrastructure that will best suit the needs of the business.

INFRASTRUCTURE

When to use hubs verses routers and switches is not always a clear-cut decision. In many cases the decision is made due to cost not necessarily best choice. For most office environments a hierarchical design with 10/100/1000 Mbps Ethernet hub/repeaters are adequate. However, there are times when high-speed transfer is worth the cost of installing switches. A good example may be in the motion picture industry where large full motion video clips are developed and edited on computer screens. Due to the size of these kinds of files and the critical nature of time in the industry full duplex switching in the LAN environment may be called for along with Gigabit Ethernet or higher = ).

There is an old saying out there that was “route when you can, bridge if you must” This saying still holds true through time. However, switching has for the most part replaced most bridges today. Routing is the best means of isolating and reducing network traffic, which in the end equates to better network performance, however the speeds of the new switches can be just as effective these days. There are some cases where specific non-routable protocols must be used due to application specific requirement and bridging must be deployed. The problem with bridging is that any broadcast protocols used will be proliferated throughout the network causing access traffic where it does not need to be. Bridges have come along way over the past twenty years which have improved filtering and protocol blocking, however, is still not as effective as routing.

Now let’s talk about routing. What does this mean, routable, not routable? Why do I care? Imagine all of the data in the world going to all of the computers in the world. None of the data would get through because of all of the traffic and anyone would be able to see anyone else’s data. To prevent this we have devices called a Routers Bridges and switches.

The Router acts as a traffic cop. It looks at the address of where the data needs to go. It looks in its little guidebook (the routing table) and sends the data on its way. It does not let data pass unless the destination is on the other side of the Router. This keeps network traffic down to a minimum. A Router can be a hardware device or software. Most operating systems today have routing software built in. If your computer has two or more NICs, the computer can act as a Router.

At the network layer as we said, each host gets an IP address. This address is obtained by the network layer of the sending machine and made part of the header information of the network layer packet. The data is then sent along the wire. Each of the hosts on that wire sees the data; if the packet does not have its address, the host ignores the data. If your network has multiple segments there is usually a Router connecting the two segments together. Finally the packet of data gets to a Router. The Router reads the address and looks in its routing table to see if it knows which path to send the data on.

This is like the clerk in the mailroom. He/she reads the information on the envelope and places the package in the proper mailbox. If the clerk does not have the recipient on the list he/she will make some inquires; do you know this person? What department does (s)he work in? Once the determination is made, the clerk will enter that information into his/her address book for the future. This address book is the routing table. That’s great, anytime mail is sent to this new person the mail clerk knows what to do with it.

Oh great, there is another problem! There are two mail clerks and each have their own address books. The other mail clerk just received mail for this new person but the clerk does not have the new person in the address book. Can you think of a solution? How about making a deal with the other mail clerk. Anytime you find out about someone new you let me know and I will do the same.

Routers can be configured to do the same thing. This is called dynamic routing. There are also standards for how this is done. Routing tables in the routers are configured differently depending on the protocol. Many of the protocols are routable.

Many times there are multiple routes to the destination. In the routing table there is a parameter that gives the cost of each path. The term cost is not in dollars and cents, it is in value of the link. Part of the header information in an IP packet is a value called, time to live. This value is used to make sure a data transfer is not floating around the system forever. Each time the message gets to a Router this number is decreased by one. When the number gets to “0” the message is discarded. Let’s say a message is sent, it gets to a Router the Router sends it to another Router, and that Router forwards it again. One of the routers has an invalid entry and the message just keeps getting sent from Router to Router and never gets to the destination. If you get too many of these floating around, the network will be bogged down with traffic. That is the reason for the time to live parameter.

Bridge

A bridge’s function can be to convert data from one topology to another called translation such as Token Ring to Ethernet or to connect multiple segments of a network with non-routable protocols to communicate. Lastly a bridge can translate protocols also. For instance; let’s say your company had a segment running IPX protocol and another segment with IP. The bridge can connect the two together encapsulating TCP/IP in IPX and vice versa if need be so that the two systems can communicate.

Today most bridges also act similarly to routers, meaning that it would only convert and send data from one topology to the other if the destination address was on the other topology. Not so long ago these were two different functions and required two separate pieces of hardware. Most likely the way it is done today is that the company will have a commercial Router which is modular. The Router will have multiple NICs. There will be one or more NICs per topology.

Here is a brief bit of ancient history for you. About 10 years ago or so there used to be a device called a brouter. You guessed it. It was a Router bridge combination. It sold for about $6000. Today I have a bridge, Router, and firewall device that I purchased for $50.

Bridges work at the data link layer. The bridge will have a connection to the physical layer of one topology. It will dissect the data link layer encapsulation and recreate a new data link layer packet for the new topology and send it on its way along the new topology. The Bridge is an interpreter. Just like at the United Nations building. The representative from Spain is talking in Spanish to the representative for France who does not speak Spanish. There is a person in the middle who speaks both Spanish and French. The interpreter is the bridge. The interpreter in the middle listens in Spanish and speaks in French. When the French representative replies the interpreter listens in French and speaks in Spanish.

Hubs
Hubs connect all computer LAN connections into a single concentrator and can be thought of as multi-port repeaters. Hubs allow organizations to take advantage of central wiring and extend the perimeter of their network by stretching bulky cable. Hubs do not modify or filter the packet (work at the physical OSI layer.) Because they are configured in a star pattern, troubleshooting became much easier than older wiring configurations. A disadvantage of the hub is that all devices connected to a hub in essence share the bandwidth to the hub, so congestion can become a problem.

Switching
A switch can be used in place of a router or bridge it or can incorporate these functions it selects a path or circuit for sending data packets to its next destination. In general, a switch is a simpler and faster mechanism than a router, which requires knowledge about the network and how to determine the route. The switch has a connection to each host. When a packet gets to the switch, the switch reads the MAC Frame information to see where the data is destined. The switch then creates a connection connecting the two hosts together. This is the same concept as your telephone.
A vital difference between a hub and a switch is that all the nodes connected to a hub share the bandwidth among themselves, while a device connected to a switch port has the full bandwidth all to itself. For example, if 10 nodes are communicating using a hub on a 100 Mbps network, then each node may only get a portion of the 100 Mbps if other nodes on the hub want to communicate as well. But with a switch, each node could possibly communicate at the full 100 Mbps.
A switch is usually associated with layer 2, the Data-Link Layer. However, some newer switches also perform the routing functions of layer 3, Layer 3 switches are also sometimes called IP switches.
On larger networks, the trip from one switch point to another in the network is called a hop. The time a switch takes to figure out where to forward a data unit is called its latency. These terms are the same for bridges and routers.
The price paid for having the flexibility that switches provide in a network is this latency. On the other hand, switching allows a network to maintain full-duplex Ethernet (remember full duplex (). Before switching, Ethernet was half-duplex, which means that only one device on the network can transmit at any given time. In a fully switched network, nodes only communicate with the switch, never directly with each other. Below is a picture of a switched environment.

We are finally done with the data link layer, Honest!

Gateways

Gateways were developed to fulfill the specific need to join disparate LANs or applications. Gateways can be thought of as the translator needed to decipher between an English-speaking person and French-speaking person. They can translate between different applications, protocols or LAN technologies and they operate at all levels of the OSI model except the physical layer. Some examples include: ➢ SAP to PeopleSoft gateways, ➢ TCP/IP to Novell IPX gateways, and ➢ Token Ring to Ethernet gateways.

Putting it all together

All Information Technology (IT) people are required to make the above technology work flawlessly and in seconds . How do we do this? This is the art of IT. Designing systems, networks, databases and everything else that performs all of the functions needed to keep business running at light speed (literally). Let’s start with communication networks (or Comm networks). Comm networks can look much like a spider web but not quite as pretty . It is the means by which information or data is exchanged from one location to another. In most cases this information is transmitted via copper wire, satellite, fiber optic cable, radio frequency or cellular transmissions. I know this seems like a lot of choices, but each one has its own set of benefits and detriments and of course each has different costs.

Let’s build an example of systems and networks that clarify all of this techy mumbo jumbo. Imagine for a moment that you are starting your own business, perhaps making childrens science kits for schools. First you came up with the idea, then began to formalize a business plan to check out the feasibility of this endeavor. So you are sitting at home, in your den, on your computer, researching your new concept on the Internet. What do we have here; you got it, a single user system.

Now, that you have your venture capital to start your new business, you find a nice small, low cost, office that you can rent. You will need a computer to track all of your expenses, developing marketing material, track inventory and such. You are off to the races! Your business is taking off! 50 new orders but it is too much for one person to handle the phones, the books, assembly of the kits and track inventory. So, time to hire a staff.

Three people have been added, a person to assemble the science kits and package them and an office manager. After fighting over the one computer in the office, you decide it is time to add another computer so nobody has to sit and wait for his or her turn to use the computer. Because the three of you do access the same spreadsheets and databases it is decided that the best way to be sure the information is correct, you need to have one spot for the data and everyone could access the same data, that way everyone would be working with the same information. In order to do this; it was recommended by the local Computer vendor to create a network so that both machines have access to the same data. So a two-user network was developed.

The network was designed as a peer-to-peer network since there are only two computers so a server was not necessary. Because the two computers were basically sitting next to each other it was decided to connect them together using RJ62 or coax cabling, for an Ethernet connection. One of your computers also was configured with a modem and phone line to access the Internet so that your customers can email you, and provide faster communication to your suppliers. Life was great for about six months.

Word spread fast about the great job you were doing for your customers and you won a bid to provide the entire district of schools K thru 12 all of their science kits! This meant you had to expand, quickly, to be able to fill this new demand! They even gave you 50% of the money upfront!

Well, your three-man office was not big enough to store and assemble of the kits, so you went back to the real estate agent and found a nice small warehouse to keep your inventory and assemble the kits. This warehouse was just three blocks down the street so you could keep your current office as an administrative office and move all of the production to the warehouse. Now came a dilemma how to provide your assembly and packaging staff with the data from the computer when they are now going to be down the road. So you call your local Computer vendor rep back to help you with the problem.

Since the growth of the business your computer started running very slowly so you mentioned this to the rep as well. After talking to you for a couple of hours to understand more about your goals for the business over the next couple of years, the rep decided to redesign your system so that it can easily be expanded in the future and take care of your current expansion. You thought this was great until you saw the price tag, are you sure this is the best way, you asked? If you want to keep your business running smoothly this is the only way said the rep. So you dug out your checkbook.

The next thing you know a Windows NT file server was installed with lots of memory, CPU power, and disk space to handle all of the new inventory items, payroll, the books, marketing information and everything else you need to keep your business growing. The old coax cable was no longer as effective because you have added five more computers to the office area for all of the new staff there and wanted to access the data with more speed than you have in the past so RJ45 cabling was installed in the administration office connected to a 12 port 10/100 Mb stackable Ethernet switch. Wow was it fast, now those big expense sheets came up just as you clicked the mouse instead of going to get a cup of coffee waiting for the information to come up, at the same time your office manager was creating pay checks and filing clerk was entering time sheets. You got it, now you are the proud owner of a bonafide local area network (LAN).

You asked the rep, “what about the warehouse. How will they access the inventory program?” The rep proceeded to explain the next step. The local exchange company (LEC), Lucent, has fiber optic cabling laid under the streets through out the city and for a minimal monthly fee will allow you to use this cable and connected the PCs at the warehouse to the administration office LAN. These PCs will look like they are just in the next room. The next thing you know Lucent is installing routers in the admin and warehouse locations to connect your LAN to their metropolitan area network (MAN). Before you new it, the staff sent you an email from the warehouse saying that the needed more pine cones for the kits! All you could think of at the moment was, “isn’t technology great!” Information was flying around at the speed of light and business was growing at the same rate.

Two years later with a nicely padded checkbook it was time to expand again! Not only did you win the bid for the state of Michigan you also won the bid for Ohio! The only requirement was that the kits be made in the state they were sold, so it was time to find a warehouse in Ohio. Site found! Now, how do we organize this, you asked yourself, and back to the rep you went. “No problem!” said the rep, we will install a wide area network (WAN) so that the computers in Ohio can access the file server in Michigan so that the same inventory system, payroll, marketing etc. information can be accessed from there! “Too cool,” you said.

Lucent knocked on the door and said we are here to hook you up to our frame relay service to your site in Michigan. “Frame Relay?” you asked, “what will this do?” This will allow you to share phone lines with other customers to sent your computer data to and from Michigan at a low cost since you are sharing the phone line with other people.” “Yikes!” you said, “What if they get my data?” While wearing a sheepish grin the Lucent person said don’t worry only you can receive your data, it is specially coded for you.” Somewhat reassured you answered, “Oh, ok.”

Now, you have copied what you designed for access from Ohio into three other states and your pocket book is bursting with all of the new business you have.

Conclusion

Although the above was based on real events the names have been changed to protect the innocent . This is how technology helps business to grow and find efficiencies. With good evaluation of business needs technology can provide the means to achieve success. Computer networks are means of connecting computers and people together providing the communication needed to solve business requirements.

Discussion Questions

1. What infrastructure devices does your company use? Routers, bridges, switches? Why? What manufacturer do they use?

2. What is a virtual Circuit in a packet switched network? What types of VC are available and how are they different? Why is it beneficial to use VCs?

3. What is the difference between a centralized and a distributed control of LANS? What are the advantages and disadvantages of each? Which does your company employ? Why?

4. What is the different between Ethernet and Token ring technologies. What does your company use?

5. What are some methods to resolve network congestion?

6. Based on the Hamblen and Lawson (2008) article, what is the major innovation that this new switch offers? How does this convergence allow data centers to be virtual?

7. Based on the Beliles and Twinam (2008) article, what role does an Ethernet layer 2 switch play in virtual local-area networks (VLAN)? How can an Ethernet layer 2 switch be used to implement physical and data security policies? How does protecting a VLAN switch in a secure physical location prevent tampering?

References

Beyda, William J. (2000). Data Communications: From Basics to Broadband. Needham Heights, MA: Pearson Custom Publishing. ISBN 0-536-60540-8.

Stallings, W. (1997). Local and Metropolitan Area Networks (5th ed.). Upper Saddle River, NJ: Prentice Hall.

www.whatis.com

www.howstuffworks.com

Similar Documents

Premium Essay

Nt1310 Unit 3 Assignment 3 Data Communication And Networks

...ASSIGNMENT # 03 (DATA COMMUNICATION AND NETWORKS) ANS 1: WIRESHARK:- As we all know well that networking and communication of computers happens worldwide in the terms of packets. Data divides into the packets like IP packets and then these packets travels over a network and then reaches its end point where packets then reassembled and the data or information is delivered to the destination. But there is a requirement of packet analyzers to analyze and captures the packet which reaches to the machine. Wireshark is the best open source packet analyzers available in market now a days. Wireshark is the best GUI based open source packet analyzer. Wireshark provides some following features: • It is available for windows and UNIX operating system. • It...

Words: 579 - Pages: 3

Free Essay

Food Service and Data Sych

...White Paper Food Service and Data Synchronization Sponsored by June 2006 Acknowledgements The International Food Distributors Association (IFDA) and GS1 US™ would like to thank the EFR/GS1 US Committee for their work on this paper. Additionally, the following participants of the committee were critical to the development of this document. Data Synchronization Committee Mark Barnekow Todd Brindley Allan Eklund Jodi Miller Pam Tann Lela Tripp Janet Zlokovich Amphire ConAgra Foods United Foodservice Purchasing Co-op, LLC Land O’ Lakes, Inc. SYSCO, Inc Tyson Foods, Inc Answers Systems, Inc IFDA is a Washington, D.C. based trade organization representing foodservice distributors throughout the U.S., Canada, and internationally. IFDA’s 130+ members include broadline, systems, and specialty foodservice distributors that supply food and related products to restaurants, institutions, and other food away from home foodservice operations. IFDA members operate more than 550 facilities, and sell more than $75 billion in food and related products to the fastest growing sector in the food industry. GS1 US is a not-for-profit organization dedicated to the adoption and implementation of standards-based, global supply chain solutions. GS1 US-based solutions, including business processes, GS1 Business Message Standards using Extensible Markup Language (XML), Electronic Data Interchange (EDI), and the bar code identification standards of the GS1 System, formerly the EAN...

Words: 6802 - Pages: 28

Free Essay

It System

...R17. What is the difference between a permanent address and a care-of address? Who assigns a care-of address? Answer: A permanent address is the home address and care of address is the given address of the device such as mobile. Permanent address is where mobile devices live. Care of address is given to the mobile device by the foreign agent when a device entire to another network area. Permanent address will get all the derive data and then the home agent forward data/messages onto the other network via the care of address. After that mobile device directly responds to the correspondent. R1. What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity? Can you have integrity without confidentiality? Justify your answer. Answer: Confidentiality is the property that the original plaintext message cannot be determined by an attacker who intercepts the cipher text-encryption of the original plaintext message. Message integrity is the property that the receiver can detect whether the message sent (whether encrypted or not) was altered in transit. The two are thus different concepts, and one can have one without the other. An encrypted message that is altered in transmit may still be confidential but will not have message integrity if the error is undetected. Similarly, a message that is altered in transit (and detected) could have been sent in plaintext and thus would not be confidential Message confidentiality...

Words: 528 - Pages: 3

Free Essay

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...

Words: 254 - Pages: 2

Premium Essay

Compsec

...Source Address | Destination | Payload | Week 3 The Network Intrusion Detection Engine Network based IDS engines process a stream of time sequential TCP/IP packets to determine a sequence of patterns. Patterns are also known as signatures. Most network signatures are based on the contents of the packets (Packet Content Signature = Payload of a packet). Patterns are also detectable in the header and flow of the traffic, relieving the need for looking into packets. Operational Concept Two primary operational modes 1. Tip off - Look for something new, something not previously classified. 2. Surveillance - Look for patterns from "targets" Forensic work bench * Same tool as in surveillance * Monitor online transactions * track network growth - PCs; mobile devices * System services usage * Identify unexpected changes in the network Benefits of a Network IDS 1. Outsider Deterrence - Make life hard for the hackers 2. Detection - Deterministic; Stochastic 3. Automated Response and Notification - Notifications(email, SNMP, pager, onscreen, audible) Response: Reconfigure router/firewalls; Doing a counter attack is not smart; Lose the connection. Challenges for network based technologies 1. Packet reassembly - Broken packets might not be enough detection. Pattern broken into different packets. 2. High Speed Networks - Flooding and dropping of packets 3. Anti Sniff (Sniffer Detection) - Designed by hackers to detect IDS. Find...

Words: 360 - Pages: 2

Premium Essay

Indp Final

...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...

Words: 4397 - Pages: 18

Premium Essay

Management Sciences

...Chapter 1 Data Communications Introduction 1 Chapter Objectives: Defined data communications Introduced data communications needs Communications model Overview of networks Introduce Internet 2 Data, Data Communication Data is an entity that convey some meaning based on some mutually agreed upon rules/conventions between a sender and a receiver. Data Communication deals with the transmission of signals in a reliable and efficient manner 3 Data Communication Topics covered include: Signal Transmission Transmission Media Signal Encoding Interfacing Data link control Multiplexing 4 Computer Science and Data Communications Merger In 1970s and 1980s The computer communications revolution has produced several remarkable facts. There is no fundamental difference between data processing (computers) and data communications (transmission and switching equipment). There is no fundamental difference among data, voice, and video communications. The distinction among single processor computer, multiprocessor computer, local network, metropolitan network, and long-haul network has blurred. 5 Today’s Trends Three different forces have consistently driven the architecture and evolution of data communications and networking facilities: Traffic growth Development of new services Advances in technology 6 Communication Traffic Both local (within a building or building complex) and Long distance having transmission of Voice, video and data The increased emphasis on office automation...

Words: 2260 - Pages: 10

Premium Essay

Sdlc

...KFF Network Design NTC/362 – Fundamentals of Networking Tom Krawczyk September 12, 2015 Primer Information technology is an essential part of many businesses today, and this is evident in the ways many companies are increasingly relying on their computers to optimize their businesses. It is also not uncommon for businesses of distinct sizes to utilize multiple computers in their offices, with these computers interconnected through networks to allow information sharing between computers. Computer networking is even more required in businesses with multiple offices, and these locations could sometimes cut across different geographical boundaries. Kudler Fine Foods (KFF) epitomizes such business concerns that optimize its with computer networking. The company, located in San Diego, was founded in June 18, 1998, and it is a local specialty food store with three locations within the USA. However, the organization has evolved since its formation and seems to have outgrown its present network infrastructure. As such, to successfully compete in ever challenging business climate, KFF requires enterprise upgrade, and the goals of proposed network are modern technologies for data collection, information protection, and enterprise communication coupled with optimal data speeds and network access. This upgrade will not only enable transform KFF into a 21st century organization, but it will also enhance its productivity and giving it...

Words: 4257 - Pages: 18

Premium Essay

Case Study Just to Join

...DATA COMMUNICATIONS First Semester 2012-2013 CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla Data Communications ● Communication involves information sharing : local or remote Telecommunication – communication at a distance – ● telephony, telegraphy, television ● Data communications – the exchange of data between devices via some form of transmission medium such as wire cable – data - information presented in whatever form agreed upon by parties creating and using data ● Devices must be part of a data communications system (DCS) , a combination of hardware and software First Semester 2012-2013 CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla Effective DCS ● Delivery – Must deliver data to the correct destination Must deliver data accurately Must deliver data in a timely manner Must consider variations in the packet arrival time CMSC 137 Data Communications and Networking ICS-UPLB JAC Hermocilla ● Accuracy – ● Timeliness – ● Jitter – First Semester 2012-2013 Components of a DCS (1) ● Message – Information to be communicated Device that sends the message: computer, phone Device that receives the message: computer, phone Physical path by which a message travels from sender to receiver: twisted-pair wire, coaxial cable, fiber optics, radio waves A set of rules that govern data communications An agreement between the communicating devices ● ...

Words: 2060 - Pages: 9

Free Essay

Digital Business Networks (Author: Dooley)

...Digital Business Networks (Dooley) Chapter 1 Elements of Data Communications: Analog and Digital 1.1 Multiple Choice Questions 1) What are the five evolution phases of data communications? A) digitization, growth of data gathering, an era of delegation, the Internet as a common tool, and pervasive computing B) analog signals, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing C) digitization, growth of data communications, an era of deregulation, the Internet as a common tool, and pervasive computing D) digitization, growth of data communications, an era of deregulation, the evolution of Voice-over-IP (VoIP) as a common tool, and pervasive computing Answer: C Diff: 2 Page Ref: 3 2) In what year did computer technology begin to transform our social, economic, and governmental infrastructures? A) 1960s, when Internet became a core in our technology B) 1950s, when ARPA research was formed C) 1980s, when the Internet was introduced D) 1990s, when the Internet was enhanced Answer: A Diff: 2 Page Ref: 3 3) The technology used in the 1960s called ________ was/were very large and expensive and used proprietary architectures that did not support cross-platform communications. A) Department of Defense PCs B) the Internet C) personal computers D) mainframes Answer: D Diff: 1 Page Ref: 3 4) The term ________ generally refers to a technology or product that is copyrighted and not...

Words: 6142 - Pages: 25

Premium Essay

Kff Pr

...Kudler Fine Foods Integrated Network Design Project Network’s fundamental characteristics and network components The company I chose to do my paper on is Kudler Fine Foods they have three different locations the home office is La Jolla, a Del Mar store, and the Encinitas store on their network that are interconnected on a WAN through a T3 line. The La Jolla stores network is built around a 100baseT environment the main server is an IBM blade server system C3000 that uses UNIX, and backed up with a10TB NAS, and 5KVA APD UPS that provides power backup. This server runs the corporate SAP ERP SW, the network services, e-mail, storage control, printer/file services, and the Internet. The retail store uses NCR Real POS 82XRT POS terminals and systems. At this time they have 19 Dell Vostro computers that share 3 HP networked printers these components are used by corporate management and other admin personnel. The communication that comes in or out of the La Jolla store runs through 2 cisco routers, and firewalls they help to provide an inter-store dedicated network and a separate 25Mbps link to the Ethernet. This location also has 19 VOIP phones. Del Mar and Encinitas Store Networks both are basically the same as the La Jolla store the only differences are they both have 6 Dell Vostro computers with 1 HP laser jet multifunction networked printer...

Words: 4396 - Pages: 18

Free Essay

Idnp Week 2

...06/29/2015 Importance of Communication Protocols Communications protocols are a very important communication capability. Communications protocols allow two systems or more to communicate effectively and to pass data over a network and between different communication devices. Communication protocols allows for the process of breaking data down into tiny packets that are the encrypted and signed by the sending device. Each of these packets are sent individually to cut down on errors. If any errors occur, instead of resending the whole line of data it is only necessary to send that specific packet to complete the transfer. Communications protocols also allow you to have secure and private communications when transferring data. Each packet we previously discussed has a header imbedded in its data that signifies where it is going. It will then only open on the device it has been addressed to. Also if someone were to intercept one of your packages it is still not the whole transfer since all the data is sent separately in smaller packages and they wouldn’t receive the full data transfer. There are many different kinds of protocols that govern how computers interact with each other through the internet and govern how they communicate most effectively. Common communication protocols include everything from how the data is secure to how the packets are structured and sent. Identifying Protocols/Network Architecture The links of communication and how they will be realized...

Words: 932 - Pages: 4

Premium Essay

Analysis of Communication Network

...BISE – RESEARCH PAPER Analysis of Informal Communication Networks – A Case Study It is becoming more and more important for knowledge workers to increase their productivity. However, there is a general lack of (semi-)automated, IT-supported data collection and evaluation approaches that allow insights into the processes and structures of an enterprise’s internal networks and the activities of its knowledge workers. The article presents a prototype of an IT-supported instrument (“Social Badges”) that supports automatic collection of informal, personal interaction between (knowledge) workers within an enterprise. The authors’ aim is to introduce a novel approach which improves data quality over legacy methods. The approach uses Social Network Analysis (SNA) to make it easier for executives to analyze and manage informal communications networks. Its practical applicability is demonstrated by a case study. DOI 10.1007/s12599-008-0018-z The Authors Dr. Kai Fischbach Prof. Dr. Detlef Schoder Seminar for Business Informatics and Information Management University of Cologne Pohligstr. 1 50969 Cologne Germany {fischbach | schoder}@ wim.uni-koeln.de 1 Introduction If the formal organization is the skeleton of a company, the informal is the central nervous system driving the collective thought processes, actions, and reactions of its business units. (Krackhardt and Hanson 1993, p. 104) Both the volume and importance of knowledge workers are growing as industrialized countries...

Words: 3796 - Pages: 16

Free Essay

Internetworking

...assortment of distinct networks that functions as a single large network. Internetworking denotes to the industry, products, and procedures that meet the challenge of crafting and governing internetworks. (Corner & Stevens, 1952) The first networks were time-sharing networks that used mainframes and attached terminals. Local-area networks progressed around the PC insurrection. (Davidson & Muller, 1992) LANs allowed numerous operators in a somewhat trifling area to interchange files and messages, as well as access shared resources. Wide-area networks interconnect LANs with geographically disseminated users to create connectivity. (Davidson & Muller, 1992) Though it is quite simple to visualize internetwork, implementing a practical internetwork is no unpretentious job. Many encounters must be tackled, especially in the areas of connectivity, reliability, network management, and flexibility. Each area is plays a key role in inaugurating a proficient and operative internetwork. The test when connecting various systems is to support communication among disparate technologies. Different sites, for example, may use different types of media operating at varying speeds, or may even include different types of systems that need to communicate. Because establishments depend comprehensively on data communication, internetworks must deliver a certain level of steadfastness. This is a volatile world; so many large internetworks include redundancy to allow for communication even when problems...

Words: 1649 - Pages: 7

Free Essay

Ntc/360 Week Two Telecommunications

...instance, to dial a number 8 a telephone would have to interrupt the electrical signal 8 times. A pause signifies the completion of the first dialed numbered and the system prepares to receive the next number. Voice and Data Communication Systems Voice and data communication systems are the backbones of modern business organizations. Without these systems, business would quickly crumble due to competitors’ ability to leverage such systems to communicate changes in the market and other required business information very quickly. If my business had more than one employee and more than one location, then getting information from one point to the other without a voice or data network could potentially take long enough that my company would lose out on profits to my competitors. In short, voice and data communication systems enable businesses to survive in what has now become a world that moves at the speed of light. In this article, I will describe the voice and data communication systems I use to perform my job as an online reseller. The Telephone System I pay a monthly service fee to AT&T so that my home telephone is allowed to access the PSTN. The PSTN is a circuit switching network, which means a dedicated circuit is opened for a communication until that communication is closed by either of the involved parties. When I lift the handset, the hook switch inside my telephone closes and connects my telephone to the central switch. Dialing the number I wish to call informs the central...

Words: 928 - Pages: 4