Professional Documents
Culture Documents
Overview
Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components of any data network. Identify the opportunities and challenges posed by converged networks. Describe the characteristics of network architectures: fault tolerance, scalability, quality of service and security. Install and use IRC clients and a Wikiserver.
information has the potential to increase productivity opportunities across the globe. As the Internet connects people and promotes unfettered communication, it presents the platform on which to run businesses, to address emergencies, to inform individuals, and to support education, science, and government. Play video to watch how the Internet, and its underlying technology, brings opportunities to people wherever they live or work
Data networks that were once the transport of information from business to business have been repurposed to improve the quality of life for people everywhere.
The existence and broad adoption of the Internet has ushered in new forms of communication that empower individuals to create information that can be accessed by a global audience such as: Instant Messaging Weblogs (blogs) Wikis Podcasting Collaboration Tools
What is Communication?
Communication in our daily lives takes many forms and occurs in many environments. Before beginning to communicate with each other, we establish rules or agreements to govern the conversation. These rules, or protocols, must be followed in order for the message to be successfully delivered and understood. Among the protocols that govern successful human communication are: An identified sender and receiver Agreed upon method of communicating (face-to-face, telephone, letter, photograph) Common language and grammar Speed and timing of delivery Confirmation or acknowledgement requirements
Quality of Communications
The external factors affecting communication are related to the complexity of the network and the number of devices a message must pass through on its route to its final destination. External factors affecting the success of communication include: The quality of the pathway between the sender and the recipient The number of times the message has to change form The number of times the message has to be redirected or readressed The number of other messages being transmitted simultaneously on the communication network The amount of time allotted for successful communication
Quality of Communications
Internal Factors
Internal factors that interfere with network communication are related to the nature of the message itself. Internal factors affecting the successful communication across the network include: The size of the message The complexity of the message The importance of the message
These data or information networks vary in size and capabilities, but all networks have four basic elements in common:
Rules or agreements to govern how the messages are sent, directed, received and interpreted. The messages or units of information that travel from one device to another A means of interconnecting these devices - a medium that can transport the messages from one device to another Devices on the network that exchange messages with each other
Protocols are the rules that the networked devices use to communicate with each other.
Converged Networks
Multiple services-multiple networks
Traditional telephone, radio, television, and computer data networks each have their own individual versions of the four basic network elements.
Converged Networks
Converged networks
Technology advances are enabling us to consolidate these disparate networks onto one platform - a platform defined as a converged network.
Converged Networks
Intelligent Information Networks: The intelligent communications platform of tomorrow will offer so much more than basic connectivity and access to applications. Not only will voice and video be transmitted over the same network, the devices that perform the telephone switching and video broadcasting will be the same devices that route the messages through the network.
Fault Tolerance
The fact that the Internet is able to expand at the rate that it is, without seriously impacting the performance experienced by individual users, is a function of the design of the protocols and underlying technologies on which it is built.
Consequences of a network security breach could include: Network outage that prevents communications and transactions occurring, with consequent loss of business. Misdirection and loss of personal or business funds. Company intellectual property (research ideas, patents or designs) that is stolen and used by a competitor. Customer contract details that become known to competitors or made public, resulting in a loss of market confidence in the business.
Security measures taken in a network should: Prevent unauthorized disclosure or theft of information Prevent unauthorized modification of information Prevent Denial of Service Ensure confidentiality through use of User authentication Data encryption Maintain communication integrity through use of Digital signatures Ensure availability through use of Firewalls Redundant network Architecture Hardware without a Single point of failure
Information Technology and networking careers are growing and evolving as fast as the underlying technologies and services.
Labs
Summary