Академический Документы
Профессиональный Документы
Культура Документы
&
Telecommunication
Systems
1
Data Communication and Networking:
Topics
Components for Networking and Communication
Connecting the Businesses: LAN, WAN, MAN.
3
Telecommunications
• Telecommunications
– The electronic transmission of signals for
communications, including such means as:
• Telephone
• Radio
• Television
• Telecommunication medium
• Anything that carries an electronic signal and interfaces
between a sending device and a receiving device
4
Communications and Telecommunications
6
Communication
Data Communication:
Telecommunication, or teleprocessing
• Modem
– Modulation-demodulation device which converts the digital
signal to analog and vice-versa.
8
Elements of a Telecommunications System
• Telecommunication devices
– Relay signals between computer systems and
transmission media
9
Networks
10
Computer Network
16
Metropolitan Area Networks
17
Wide Area Networks
• Relation between hosts on LANs and the
subnet.
18
Architecture of the Internet
19
Internet Connections
Internet backbone
Cable modem uses the same line that your cable TV signals
come
21 21 in on to transfer the data back and forth
Internet Connections
Broadband
Transfer speeds are faster than 768 kilobits per second
– DSL connections and cable modems are broadband
connections
– The speed for downloads (getting data from the Internet
to your home computer) may not be the same as uploads
(sending data from your home computer to the Internet)
22 22
Leased Line Connections
transmissions.
24
Network Components
Interconnecting
Media
Devices
Networking
Computers
Software
Applications
26
Networking Media
The means by which signals (data) are sent from one
computer to another (either by cable or wireless means)
Satellite
Infrared Bluetooth
Transmission
27
Networking Devices
28
Repeater
• A repeater operates at the physical layer.
• Regenerate a the signal over the same network before the
signal becomes too weak or corrupted so as to extend the
length to which the signal can be transmitted over the same
network.
• They do not amplify the signal.
• When the signal becomes weak, they copy the signal bit by
bit and regenerate it at the original strength. It is a 2 port
device.
29
Hub
• Multiport repeater.
• A hub connects multiple wires coming from different
branches, for example, the connector in star topology
which connects different stations.
• Hubs cannot filter data, so data packets are sent to all
connected devices.
• They do not have intelligence to find out best path for
data packets which leads to inefficiencies and wastage.
30
Bridge
• A bridge is a repeater, with add on functionality of
filtering content by reading the MAC addresses of
source and destination.
• The server contains the file, print, application, security, and other
services in a central computer that is continuously
36
Wireless Networks
• Wireless Fidelity (Wi-Fi): Wireless Fidelity has
emerged as a standard wireless communication that
is also known as 802.11.
39
Disadvantages of wireless networks
Security- Protect your sensitive data with backups,
isolated private networks, strong encryption and
passwords, and monitor network access traffic to and
from your wireless network.
42
43
44
45
46
47
48
First Generation (1G)
First generation services were analogue services for cell phones.
• Remember analog “brick phones” and “bag phones” way, way back in
the day? Cell phones began with 1G in the 1980s.
49
2G: SMS & MMS
• Cell phones received their first major upgrade when they went from 1G to 2G.
The transition to 2G provided the ability to store, copy, encrypt and compress data,
and allowed data transmission without loss and with error-correction. There are
two kinds of 2G services
• This leap took place in 1991 on GSM networks first, in Finland, and effectively took
cell phones from analog to digital.
• The max speed of 2G with General Packet Radio Service (GPRS) is 50 Kbps or 1
50
Mbps with Enhanced Data Rates for GSM Evolution (EDGE).
2.5G & 2.75G
• Finally Data, but Slow
• Before making the major leap from 2G to 3G wireless
networks, the lesser-known 2.5G and 2.75G was an interim
standard that bridged the gap
• 2.5G introducing a new packet switching technique that
was more efficient than what was previously being used.
• This led to 2.75G, which provides a theoretical threefold
capacity increase. 2.75G with EDGE began in the US with
51GSM networks (AT&T being the first).
3G
• Introduced in 1998
• faster data-transmission speeds,
• Use cell phone in more data-demanding ways like for video calling
and mobile internet.
• Like 2G, 3G evolved into 3.5G and 3.75G as more features were
introduced in order to bring about 4G.
• The max speed of 3G is estimated to be around 2 Mbps for non-
moving devices and 384 Kbps in moving vehicles.
• The theoretical max speed for HSPA+ is 21.6 Mbps.
52
4G
– 4G promises to deliver data up to 10 times faster than 3G
speeds.
• Released in 2008.
IP telephony,
54 streamed multimedia.
Applications
• E-mail
• E-Commerce
• News Groups
• Video Conferencing
• Chat Groups
• Instant Messengers
55• Internet Radio
Switching *
• Every time in computer network you access the
internet or another computer network outside your
immediate location, your messages are sent through
a maze of transmission media and connection
devices.
• The mechanism for moving information between
different computer network and network segment is
called switching in computer network
56
Switching Techniques *
• Circuit switching: Circuit switching is the method
used to connect telephone lines.
• It opens up a complete predetermined transmission
route from sender to receiver before a message is
transmitted.
• An entire message is then transmitted at once.
• It is faster and more efficient for data to be
transmitted with packet switching.
57
*
• Message switching also involves sending an entire message
at one time over a predetermined transmission route. But
transmission route is not dedicated to just one message
• Packet switching: Most complex of the data movement
methods discussed here. Its advantage is that it can increase
the utilization of the network, thus decreasing the cost of
using the network.
• In packet switching there is no temporary storage of
messages in secondary storage devices.
58
Packet Switching *
Figure
15.4
Messages
sent by
packet
switching
IP address
matisse.csc.villanova.edu
Computer
name
64 64
Domain Name System
65 65
Domain Name System
Organizations based in countries other than the
United States use a top-level domain that
corresponds to their two-letter country codes
Do you
email
someone
in another
country?
Figure 15.11
66 66 Some of the top-level domain names
based on country codes
Security
67
What is Security?
69
possible intrusions
Security Threats
6. Mobile code
5. Unprotected 7. Cross-site
(Java, JavaScript, 8. Email spoofing
Windows shares scripting
and ActiveX)
Source: CERT
70
Trojan Horse Programs
on other computers
73
Unprotected Windows Share
74
Mobile code (Java/JavaScript/ActiveX)
• Mobile codes in Java, JavaScript, and ActiveX can be
executed by a web browser is generally useful, but it can
also be used to run malicious code on the client computer.
77
Email Borne Viruses
• Malicious code is often distributed through email
as attachments
78
Hidden File Extensions
• An attachment may have a hidden file extension
– Such files may execute the attachment
• Example:
– Downloader (MySis.avi.exe or QuickFlick.mpg.exe)
– VBS/Timofonica (TIMOFONICA.TXT.vbs)
– VBS/CoolNote (COOL_NOTEPAD_DEMO.TXT.vbs)
– VBS/OnTheFly (AnnaKournikova.jpg.vbs)
83
resources and the network
Management Aspect
84
Technical Aspect
85
Technical Approaches
– Implement security patches and other updates pertaining
to an operating system and other venerable software such
as the Internet Explorer
– Install self-monitoring an anti-virus, anti-spam and anti-
hacker and pop-up blocker software
– Install a firewalls
– Use encryption wherever feasible
87
software act at the local client level
Examples of Self-Monitoring Software
• Antivirus
– Mcafee
• Spyware elimination
• Pop-up blocker
• Anti-Spam
88
Communication Security
• IPsec
• Firewalls
• Virtual Private Networks
• Wireless Security
89
IPsec
• The IPsec authentication header in transport
mode
90
Firewalls
91
Firewalls
92
Virtual Private Networks
93
Encryption
client level
94
Some Applications of Encryption
• VPN
• Digital Certificates
95
Security Professionals and the Organization
96
Senior Management
• Chief Information Officer (CIO)
100
What is Cybercrime?
101
Cybercrime Components
• Computers
• Cell Phones
• PDA’s
• Game Consoles
102
Computer Security - Terminology
• People
– Hackers
• White Hat – Good guys. Report hacks/vulnerabilities to
appropriate people.
• Black Hat – Only interested in personal goals, regardless
of impact.
• Gray Hat – Somewhere in between.
103
Information Security Management System
(ISMS)
1. Security policy - management direction
104
facilities
Information Security Management System
(ISMS)
6. Communications and operations management -
management of technical security controls in systems
and networks
107