1 / 28

Telecommunication and Networks

Chapter 5. Telecommunication and Networks. Telecommunication Principles and Applications. Communication The exchange of information between two parties Telecommunication Communication at a distance. Telecommunication Principles and Applications. Dimensions of Telecommunication

janna
Download Presentation

Telecommunication and Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 5 Telecommunication and Networks

  2. Telecommunication Principles and Applications • Communication • The exchange of information between two parties • Telecommunication • Communication at a distance Chapter 5

  3. Telecommunication Principles and Applications • Dimensions of Telecommunication • Distance significantly affects options for communication • Organizational context establishes the nature of the relationships between the communicating parties Chapter 5

  4. Dimensions of Telecommunication Chapter 5

  5. Telecommunication Principles and Applications • Telecommunication Process • Sender initiates message communication • Device puts sender’s message onto a telecommunication medium • Telecommunication medium transfers message to receiver’s location Chapter 5

  6. Telecommunication Principles and Applications • Telecommunication Process • Device takes message off the communication medium • Recipient receives the message Chapter 5

  7. Telecommunication Principles and Applications • Types of Business Applications • Coordination of business activities • Group decision making • Electronic commerce Chapter 5

  8. Telecommunication Infrastructure • Communication Carriers • Telephone Carriers • Local Exchange Carriers (LECs) • Long Distance Carriers • Cellular Services • Cable Providers • Value Added Networks (VANs) • Resells transmission capacity with additional services Chapter 5

  9. Telecommunication Infrastructure • International Issues • Monopoly government providers in many countries • Decreasing regulation worldwide • Cross-border data flow regulations • Differences in privacy rules Chapter 5

  10. Telecommunication Technology • Standards • Characteristics of telecommunications media, hardware, and software • Open Systems Interconnection (OSI) Model • Provides a framework for thinking about communication standards Chapter 5

  11. Telecommunication Technology • The Computer/Medium Interface • Modem • Converts digital computer output to signal needed for transmission and vice versa • Adaptor/NIC • Interface between computer and a network Chapter 5

  12. Telecommunication Technology • Transmission Media • Twisted pair wire • Coaxial cable • Fiber optic cable • Microwave signals • Infrared signals • Radio signals Chapter 5

  13. Telecommunication Technology • Switching and Routing Technologies • Devices • Hub • Switch • Router • Gateway • Protocol • Standard for how a message is packaged, secured, sent routed, received, and acknowledged by the receiver within a network Chapter 5

  14. Telecommunication Technology • LAN Protocols • Ethernet • Token ring • Wi-Fi • Bluetooth Chapter 5

  15. Telecommunication Technology Figure 5-9 Chapter 5

  16. Telecommunication Technology • WAN Services • Leased lines • Switched circuit data services • Packet switched services • Cellular services Chapter 5

  17. Internet Concepts • Who Manages The Internet? • Companies, individuals, and governments own pieces of the Internet, but the Internet as a whole has no owners or operators Chapter 5

  18. Internet Concepts • Network Addressing • IP Number • Consists of two parts—a network number and a device number • Domain Name • Translated to IP number by Domain Name Servers (DNSs) Chapter 5

  19. Network Management • Simple Network Management Protocol • Defines how network devices maintain and communicate information about their own activity and performance Chapter 5

  20. Network Management • Network Analyzer • Plugs into a network and analyzes the traffic that passes by or through it Chapter 5

  21. Network Management • Network Management Software • Device management • Recognizes the devices, including computers and printers, that are connected to the network • Security services • Provide entry into the network and establish a relationship between a user and a client station Chapter 5

  22. Network Management • Network Management Software • File services • Provide access to shared files • Print services • Provide central access to a common printer • Fax services • Allow network users to send or receive a facsimile electronically Chapter 5

  23. Network Management • Network Management Software • Directory services • Provide an enterprise-wide telephone book that identifies and connects network users to each other and to software Chapter 5

  24. EnsuringTelecommunication Security • Key: A secret code that can scramble or unscramble a message • Public Key Cryptography • Uses a pair of keys • Message scrambled by one key can only be unscrambled by the other Chapter 5

  25. EnsuringTelecommunication Security Figure 5-9 Public Key Cryptography Chapter 5

  26. EnsuringTelecommunication Security • Public key cryptography ensures • Security • Non-repudiation • Authentication • Requires certificate authority • Non-repudiation • Via digital signature • Integrity Chapter 5

  27. EnsuringTelecommunication Security • Firewall • Hardware and/or software intended to separate an organization’s intranet, and the data on it, from its extranet and the Internet • Virtual Private Network (VPN) • Simulates a private network by using a public network, such as Internet, and security protocols Chapter 5

  28. End of Chapter 5 Telecommunication and Networks

More Related