Networks and Telecommunications

advertisement
Chapter 6
Networks and Telecommunications
The Strategic
Management of
Information
Technology
Transaction Processing
System
Input
Process
Systems Development
Communication
Information
Output
Local Area Networks
Local Area Networks:
A Definition





Provides access to shared resources such as
printers, data, and applications
Increases controllability and consistency in
applications and data
Increases access to shared applications and
databases in large computers with many users
Provides a vehicle for electronic mail
Shares access to external resources through
communication lines
Local Area Networks:
Reason
Performance
 Change Management
 Systems Management
 Network Management
 Direct Communication
 Ease in Installation and Maintenance

Network Protocols

1.
–
–
–
Physical Layer
Interfaces between Network Medium and Network Drives
Defines Electrical and Mechanical Characteristics of Network
Bad Plug
Network Protocols



2.
–
–
–
3.
–
–
–
4.
–
–
–
Logical Link Layer
Frames Packets
Controls Physical Layer Data Flow
Data Collision
Network Layer
Addresses and Routes Packets
Handles Fragmentation and Reassembly of Data
Broadcast Storm
Transport Layer
Manages Network Layer Connections
Provides Reliable Packet Delivery Mechanism
Multiple ACKS
Network Protocols



5.
–
–
–
6.
–
–
–
7.
–
–
–
Session Layer
Provides Remote Procedure Call Support
Reports Lower-Layer Errors
Protocol Error
Presentation Layer
Specifies Architecture-Independent Data Transfer Format
Encodes and Decodes Data; Encrypts and Decrypts Data;
Compresses Data
Misdirected Data
Application Layer
Provides Interface to End-User Processes
Provides Standardized Services to Applications
Incompatible Software
Communication according to the Open
System Interconnection Reference Model
7
Application Layer
6
Presentation Layer
5
Session Layer
4
Transport Layer
3
Network Layer
2
Data Link Layer
1
Physical Layer
Physical Layer
7
6
5
4
3
2
1
Hardware Description:
The interface to the physical cable medium
is described; layout of connectors, signals
on each connector, voltage levels.
The physical connection to the network, how
connections are established and maintained,
and how error conditions in data medium are
handled.
Physical Layer
Data Link Layer
7
6
5
4
Software Description:
Transmit blocks of data from the data link layer
in one computer to another.
Detect errors in data blocks and either correct
the errors or ensure retransmissions of the
effected data blocks.
3
2
1
Data Link Layer
Protocols

Token Passing (IBM)
– All blocks of data carried around the network with a source and destination
address
– Traffic is guided physically from unit to unit around the ring
– IEEE 802.5; ISO IS 8802-5

Token Bus
– Traffic is guided on a common data bus, which directly connects all units in
the network
– All units are part of an organized logical sequence
– All units at any point in time know the address of the unit before and after in
logical sequence.

CSMA/CD (ethernet)
– All units connected to the common bus can come in at any point in time
after the unit has tested and found out no one else is using the network.
– When collisions happen, both units resend the data after a short break.
Protocols

Medium Access Control
– Interfaces to the actual transport media to enable applications to
communicate
– IEEE 802.5; ISO IS 8802-5

Logical Link Control
– Insures that all software implemented on the top five layers of the OSI
Model remains independent of which physical network is implemented in the
bottom of the model.

NETBIOS
– Constructs, maintains, and uses a table of relations between the Token Ring
addresses and the defined names of units and services in the network; this
enables real names to be used.

Advanced Program to Program Comm.
– Supports program to program communications between different systems
through the Token Ring.
– Specific implementation of the IBM Systems Network Architecture (SNA)
Logical Unit (LU) 6.2 architecture.
Topologies
Star Topology
 Bus
 Ring
 Physical Star, Logical Ring

Topologies

Star Topology
– Connections are made from all connected machines to one central place.
– Control unit controls traffic in the network.
– Computer in the middle has absolute control over traffic in the machine.
Topologies

Bus Topology
– One cable passed throughout entire implementation and to which each unit
is connected.
– Network cannot be centrally controlled.
BUS
Topologies

Token Ring Topology
– Signals in the network are passing from machine to machine.
– This gives controlled and stable data traffic in the network.
– No central control or configuration of the traffic.
RING
Topologies

Token Ring Topology
– IEEE 802.5; ISO IS 8802-5
– Uses the Baseband Transmission Technique
 Signal is directly on the transmission medium without modulating a
carrier signal.
 Information occupies entire bandwidth in the medium.
– Token format:










SD AC
Starting delimiter (one byte)
Access control (one bit)
Frame control
Destination address
Source address
Routing information
Information Field
Frame check sequence
Ending delimiter
Frame status
– Address Recognized Bit
– Frame Copied Bit
FC
DA SA
RI
INFO
FCS
ED
FS
Topologies

Token Ring Topology
– 4 Millionbits/s versus 15 Millionbits/second
 16 Mbits/s is for large data transfer
– Each individually attached unit can only work at its speed
 The lower speed of the individual machine limits the data transfer rate.
Topologies

Physical Star, Logical Ring Topology
– Each cable connection consists of two wires and provides two ways for the
signal to pass in the one cable.
– Logical connection in a ring insures stability of the traffic.
– Configuration and management from a central place.
Wiring

Telephone Twisted Pair
– Unshielded and susceptible to noise
– Not for higher data rates or long distances
– Inexpensive

Coaxial Cable
– Central core with shield around it
– Shield insures radio frequency noise is not generated
– High data rates at long distances

Fiber Optic Cable
– Light signals transmitted by light emitting diodes are immune to electrical
and magnetic noise
– High data rates at long distances
Cost-Effective Ways to Increase Access
Multistation Access Unit (MAU)
 Controlled Access Unit (CAU)
 Fiber Distribution Data Interface (FDDI)
 Advanced Peer-to-Peer Networking (APPN)
 Bridges, Gateways, and Routers

Cost-Effective Ways to Increase Access:
Multiple Access Units

Multistation Access Unit (MAU)
–
–
–
–
–

Passive Ring Concentrator
Includes room for 8 connected units
Forms a ring segment
Passes signal back to ring
Ring Out/Ring In (can be connected in series)
Controlled Access Unit (CAU)
–
–
–
–
–
Active Ring Concentrator
Contains logic for control functions
Passes signal back to ring
Ring Out/Ring In (can be connected in series)
Acts as Primary Input, Primary Output, and Secondary Adapter
Cost-Effective Ways to Increase Access:
FDDI and APPN

Fiber Distribution Data Interface (FDDI)
–
–
–
–

100 Million bits/second
Fiber connections enable larger geographic dispersion
Stations can attach directly to a ring or through a concentrator
Can connect to both the primary and secondary ring simultaneously
Advanced Peer-to-Peer Networking
(APPN)
– Programs capable of communicating with other programs running on other
machines on the network can be automatically set in session with each
other.
– Network nodes know all APPC resources in both themselves and in end
nodes
– Each network node maintains a topology database of APPC resources and
available routes through the network.
Cost-Effective Ways to Increase Access:
Bridges, Gateways, and Routers
 Bridges
–
–
–
–
–

Gateways
–
–
–
–

Connection between two local rings.
Unexpected physical breakdown in one ring will only affect this ring and not other rings.
Discourage users on one ring to use resources on another ring.
Operates in only the lowest levels of the OSI Model.
Connection between two token ring networks.
Units that connect a Token Ring Network to a computer system or network that uses
communications protocols other than Token Ring protocols.
Establish connections between units in the token ring network and units that are not
directly attached to the Token Ring Network.
Handles/Requires protocol conversion
Operates in all seven layers of OSI Model.
Routers
–
–
–
Allow for selected higher level protocols to communicate through the network.
LAN-to-LAN WAN Program.
Remote NETBIOS Access Facility.
Network Layer
7
6
5
Responsible for buffering and routing packets
throughout the network. (Virtual Circuits)
Essential in Wide Area Networks, not used in
bus-topology LANs.
4
3
2
1
Network Layer
Network Layer
Network
Operating
System
Novell
UNIX
Microsoft/NT
OS/2
Default
Protocol
IPX/SPX
Wide Area
Network
NDS
Internet Packet Exchange/
Sequence Packet Exchange
(lower/higher)
Naming Convention
TCP/IP
DCE
Transmission Control Protocol/
Internet Protocol
(higher/lower)
Net/BIOS
Basic In Out System
Additional Security
Transport Layer
7
6
5
4
3
2
1
Partitions long messages arriving from upper
session layers into data packets. On the receiving side, reassembles messages from
collections of packets received.
Below Transport Layer, a data packet is a
unit of information handled by the network.
Above it, messages are the information units.
Transport Layer
Session Layer
7
6
5
4
3
2
1
Session Layer
Responsible for providing a communication
session between two user processes running
on two separate network nodes. Responsible
for determining whether a session can begin,
be maintained, or terminated.
Presentation Layer
7
6
Presentation Layer
5
4
3
2
1
Converts user messages from the
form used by the application layer
to that used by all lower layers.
Below this layer, the meaning of data
fields of messages and packets does
not influence their processing.
Application Layer
7
Application Layer
6
5
4
3
2
1
Boundary between the OSI network
and the application (user) processes.
If a LAN operates as a distributed
system, the application layer is
responsible for direct communication
with elements of the distributed
operating system.
Architectural Layers and Tiers
Architectural Layers
Client
User
Interface
Function
Set
Database
Access
Network
Server
Communication
Protocol
Data
Dictionary
Translation
Layer
Data
Objects
Data
Transport
Data
Partitioning
Architectural Layers and Tiers
Tiered-Architecture
Presentation
Processing
Data
Functionality
Server
Client
Remote
Procedure
Calls
Functionality
Server
Database
Functionality
Server
Client
Database
Functionality
Server
Architectural Layers and Tiers

Two-Tier Architecture
– Advantages
Application Development Speed
 Ability to model data and populate a database
on a remote server
 Robust

– Disadvantages
Version control and redistribution problems
 System security complications
 Client tools and middleware are volatile

Architectural Layers and Tiers

Three-Tier Architecture
– Advantages
Separates Presentation, Processing, and Data
into separate, distinct software tiers
 Middle tier is programmed in portable C code
 Remote Process Call for calling technique
 Overall flexibility in resource allocation

– Disadvantages
Lack of development tools
 More code in more places

Local Area Networks

Important Mechanism to Integrate:
– Hardware
– Software
– Application Development Environment
Communication according to the Open
System Interconnection Reference Model
7
Application Layer
6
Presentation Layer
5
Session Layer
4
Transport Layer
3
Network Layer
2
Data Link Layer
1
Physical Layer
Communication according to the Open
System Interconnection Reference Model
7
Application Layer
6
Presentation Layer
5
Session Layer
4
Transport Layer
3
Network Layer
2
Data Link Layer
1
Physical Layer
Changes in the Marketplace








The quality imperative
Consumer computing
Deregulation of some major industries
Crossing industry boundaries
Traditional customers are “leaving”
Crossing national boundaries
Production is becoming global
New product and service development cycles
are shortening
Cooperative Processing


Cooperative Processing means that processes on two or
more geographically dispersed computers cooperate in
order to complete a task. In a primitive way, we have had
a form of cooperative processing with this broad definition
for several years, in the form of terminals connected to
host (usually mainframe) computers.
Client/Server Systems are a form of cooperative
processing where client and server machines share a
processing workload.
Attributes of Cooperative
Processing
Distributed processing
 Connectivity among processors
 Distributed databases
 System-wide rules

Connectivity Elements
Technical connectivity means that it is
technically possible to interconnect two
units so that they can communicate
 Procedural connectivity means that
procedures are in place to permit and
encourage connectivity

Building Cooperative
Processing Systems
Benchmark and prototype new
technologies to verify vendors’
claims.
 An open architecture works on
mission-critical applications.
 Large distributed system projects
need a vendor coordinator.
 Use of CASE was mandatory.

Components Of Cooperative
Processing Systems





Operating Systems - provide the processing capabilities. They
need to be designed for networking and powerful workstations to
be useful in distributed systems.
Mainframes - likely to continue as the primary database servers,
because their database management systems are highly
sophisticated, and reliable distributed database technology is not
yet available.
Workstations - the focal point in cooperative processing, because
they initiate the requests for services that are provided across the
networks.
Servers- generally perform specialized functions, such as image
servers, electronic mail servers, video servers, voice mail
servers, credit card servers, expert system servers, etc..
Superservers - support hundreds of workstations each,
performing mission-critical processing at the node and handling
heavy traffic.
Forms Of Cooperative
Processing





Host-driven terminal emulation is where the desktop computer
runs an application that connects to a host as a standard “dumb”
terminal.
Host-driven front ending is where the desktop computer runs a
host-based application by providing a graphical interface for the
user, making the system easier to use.
Host-driven client/server computing is where the desktop runs an
application that turns it into a server capable of receiving
messages form the host to perform some tasks.
Desktop-driven client/server computing is where the host
functions as a transaction processing server and the desktop
submit queries to it.
Peer-to-peer computing is where processing occurs
simultaneously on both the desktop and host, with control
switching between the two.
Cooperative Processing
Permits lower-cost computing
 Makes the end user the focus of
computing
 Expands the computing universe by
aiming at work groups
 Supports new organizational
structures via its connectivity
 Increases organizational flexibility

Guidelines For Building
Networks



Create an overall architecture - meaning a set of
company policies and rules which, when
followed, are expected to lead to the network
environment that is desired
Stress connectivity - the goal today is not a
single, coherent network, but rather finding a
means to interface many dissimilar networks
Use standards - Most complications in
networking are caused by incompatibilities which
can be reduced by using standards. In fact,
standards should be the foundation of an overall
architecture.
Network Connectivity
Components

Bridges
– Link two similar networks together

Routers
– provide additional translation and route
selection features

Gateways
– link dissimilar networks

Smart hubs
Network Architecture
Not a diagram or a set of diagrams
 Not one utopian solution for all network
problems
 Set of policies, principles, and
guidelines that will lead to more
widespread connectivity

OSI’s Seven Layers
The Physical Layer
 The Data Link Layer
 The Network Layer
 The Transport Layer
 The Session Layer
 The Presentation Layer
 The Application Layer

Broadband
Telecommunications

Where more than one signal travels
over a communication medium at one
time. As organizations put more kinds
of data on computers, they need greater
bandwidth to whip this data around.
How a Telecommunications System Is
Analogous To a Highway System




The Flows - The flow of information within and between the
corporate office, departments, and individuals is analogous
to the traffic flow in the highway system within and
between cities.
Building of Systems - Information systems departments
are responsible for designing, building, and maintaining the
information system in the same way that governments are
responsible for building and maintaining streets, roads,
and highways for cars and trucks.
Managed by Users - Once built, both systems are
managed not by builders but by users or drivers.
Standards - Government agencies provide standards and
laws for regulating the flow of highway traffic, that are
enforced by police. Similarly, the information systems
function develops and enforces the telecommunications
standards for message traffic.
“Facts of Life”
in the Telecommunications Industry








Organizations have a multitude of networks
The reach of networks is expanding organizationally
The telecommunications industry is being
destabilized
Global network services are emerging
New technologies are improving bandwidth utilization
The focus of network designers is now
interconnecting LANs
Electronic mail provides a new communication
infrastructure
Murray’s Eight Phases to a Totally Distributed System








Phase 1: The first phase is characterized by host-based, real-time query and update.
This phase is traditional on-line information system processing, where dumb
terminals access host-based applications to view and update data
Phase 2: The second phase provides additional query capabilities through file
transfers to PCs.
Phase 3: The third phase adds batch updating form PC data. This phase reverses
the philosophy of Phase 2 by making the PC database the master.
Phase 4: The forth phase enables real-time query and update from either host or
PC. This phase extends the capabilities of the PCs by allowing them to update the
host on-line.
Phase 5: The fifth phase introduces homogeneous cooperative processing without
two-phase commit, that is, like databases run on the same hardware and system
software platforms. This phase adds true distributed databases, across similar or
identical platforms.
Phase 6: The sixth phase moves to heterogeneous cooperative processing without
two-phase commit, that is, databases run on a mix of platforms. This phase extends
the previous one by permitting distributed databases across mixed platforms.
Phase 7: This seventh phase adds the all-important two-phase commit capability (to
homogeneous databases), going a system a true distributed database.
Phase 8: This phase extends Phase 7 to heterogeneous databases.
Personal Communications
Networks




Permit person-to-person rather than location-to-location.
Each person will have his or her own personal phone
number associated with a lightweight telephone that he or
she carries around.
Each person will not only transmit telephone conversations
but also computer-based information, voice mail, electronic
messaging, call screening, and other personal from
anywhere.
Important technology for
– emergencies
 natural disasters
– special events
 political conventions and sporting events
Wireless LANs Will Likely be
the Best Alternative

Wireless LANs have the advantage in hazardous
environments, in historic buildings where wiring
ducts are full, for disaster recovery, and in
temporary installations. Furthermore, there are
many instances where temporary
communications are needed, and wireless are
much easier to reconfigure. Wireless LANs use
either light (in the form of infrared) or radio (in
the form of narrowband or spread spectrum)
technologies to transmit signals.
T-Carriers Hierarchy and
Difference



A T1 line is equivalent to a group of 24 voice
grade lines, which means its capacity is 1.544
million bits per second (mbps).
A T2 trunk has a capacity of 96 voice circuit
equivalent (6.312 mbps), T3 has a 672 voice
circuit equivalent (44.736 mbps) and T4 has a
4,032 voice circuit equivalent (139.264 mbps).
T-carriers are used mainly to carry analog voice
signals that have been digitized, while the
nomenclature of DS represents the arrival of true
end-to-end digital circuits.
Fast Packet Switching
Technologies


Frame relay uses variable-length packets and is
slated to replace the workhorse of today’s data
networks, X.25. It is most appropriate for
sending large bursts of data.
Cell relay is faster than frame relay because it
transmits fixed-length packets, which require less
processing. It is most appropriate for transmitting
packets that must be received in sequence and
at standard intervals, such as voice and video.
Network Components
Network File Server
 Network Operating System
 Network Interface Card
 Workstation Software
 Connection
 Network Wiring Hub
 Backup Device

Network Advantages









Sharing Printers and Other Devices
Providing Mass Storage
Sharing Data
Providing Network Security
Providing Communication Services
Sharing Software
Facilitating Group Interaction
Permitting Distributed Processing
Enhancing Software Support and Training
Key Client/Server Issues
Ability to Build Graphical User Interfaces
 Component Re-Use
 Team Development
 Deployment Scalability
 Cross Platform Delivery
 Adaptability
 Design/Integration

Key Issues










Strategic Business Objectives
Software Fit
Software Customization
User Productivity
Information Access
Flexibility and Adaptability
Software Implementation
System Performance
Customer Service
Cost of Ownership
Client/Server Evaluation









Object-Oriented Technology
Integration of Third Party Components
Application Partitioning
Interpreted or Compiled Code
Multiplatform GUI and Operating Systems
Team Development
Ease in Application Maintenance
Open Connectivity to Multiple Databases
On-Line Transaction Processing Applications
SONET
SONET (synchronous optical network)
 The transport network for broadband
services
 A set of international standards for
transmission over fiber-based networks at
speeds of 51.84 mbps (above T3) to 13
gigabytes per second.
 Importance lies with the fact that SONET
will allow networks to use equipment from
different vendors due to its “mid-span meet”
– an information model and messages set for
making translations among equipment
FDDI
FDDI (fiber distributed data interface)
 An international standard for operating a
fiber optic cable network at 100 mbps
(nearly T4 speed).
 Most appropriate for backbone networks
that link LANs in a building or between
buildings
 Can support up to 500 workstations up
to two kilometers (1.2 miles) apart.
Download