Misy 3312: Introduction to Telecommunications



Download 56.17 Kb.
Date14.05.2017
Size56.17 Kb.
#18156






MISY 3312: Introduction to Telecommunications

Team:


Kahkashan Ansary / 200700640

Zainab Al Gaw Ahmed / 200600712

Nourah J / 34477889

Farah /56778766

Instructor : Dr. Valentina Korzhova

Spring 2011/2012

Table of Contents

1-Introduction


  1. History of network

  2. Purpose (in general)

2- Problem statement

  1. Problem statement regarding business

  2. Problem statement regarding network

3-Network classification

  1. Connection methods

    1. Wireless LAN

  1. Wired technologies

    1. Twisted pair

    2. Optical fiber

  2. Wireless technologies

    1. Wireless LANs

  3. Scale

    1. Local area network (LAN)

  4. Network architecture

    1. Peer-to-peer

  5. Network topology

    1. Bus network

    2. Star network

4-Types of network based on physical scope

  1. Local area network

  2. Campus Area Network

5- Network security

    1. Firewall

    2. Security technology

c. Encryption

d. Authentication


6- Basic hardware components

a. Repeaters

b. Hubs

c. Bridges

d. Switches
7. Reference

. Introduction

1.1 About the Organization:

HRH Prince Mohammad bin Fahd bin Abdul-Aziz greatly believes that challenges of modern workplace could be met only through high quality education. To make this dream come true, HRH took the initiative in 2002 to help establish a University in the Eastern Province with unique characteristics and distinctive mission/vision statements. This initiative was the starting point for PMU project. In order to guarantee high quality education, the PMU management awarded the system design project (Academic/Administrative) to one of the top international educational consultants, Texas International Education Consortium (TIEC).

The University's is a unique and distinguished institution of higher education that participates in preparing future leaders in various fields of human knowledge and its application, Enriching and developing intelligence, Exploring innovative methodologies and technologies to achieve its objectives, Removing the barrier between the academic and business society. They aim to contribute to advancement of human intelligence and promulgation and development of knowledge, Prepare specialized candidates in various fields of human knowledge through utilizing modern technologies in the education process, encourage the graduate to play a pioneering and leading role in the community, by teaching him or her how to take responsibilities and to contribute to the solving of problems through innovative thinking, collective work, reflection and self-development, link academic programs and specializations with actual requirements of the surrounding work environment. This is undertaken by maintaining effective participation and cooperation between the University and local business firms, guide research activities to create solutions for persistent problems in the surrounding communities, through applied research and technical consultation. The importance of performing basic scientific research for enriching human intelligence will be emphasized, provide community service through training and education.

A University with such aims and vast fields of study requires a heavy and reliable networking both within the campus and campus to outside community. There are tons of data that are relayed every minute from faculty to students, administration to faculty, students to faculty and administration etc.



1.2 History of Networking:

In the 1960s, computer networking was essentially synonymous with mainframe computing and telephony services and the distinction between local and wide area networks did not yet exist. Mainframes were typically “networked” to a series of dumb terminals with serial connections running on RS-232 or some other electrical interface. If a terminal in one city needed to connect with a mainframe in another city, a 300-baud long-haul modem would use the existing analog Public Switched Telephone Network (PSTN) to form the connection. The quality and reliability of the PSTN increased significantly in 1962 with the introduction of pulse code modulation (PCM), which converted analog voice signals into digital sequences of bits. DS0 (Digital Signal Zero) became the basic 64-Kbps channel, and the entire hierarchy of the digital telephone system was soon built on this foundation. When the backbone of the Bell system became digital, transmission characteristics improved due to higher quality and less noise. This was eventually extended all the way to local loop subscribers using ISDN. The first communication satellite, Telstar, was launched in 1962. In fact, in 1960 scientists at Bell Laboratories transmitted a communication signal coast to coast across the United States by bouncing it off the moon. Unfortunately, the moon wouldn’t sit still! By 1965, the first commercial communication satellites (such as Early Bird) were deployed.

An important standard to emerge in the 1970s was the public-key cryptography scheme developed in 1976 by Whitfield Diffie and Martin Hellman. This scheme underlies the Secure Sockets Layer (SSL) protocol developed by Netscape Communications, which is now the predominant scheme for ensuring privacy and integrity of financial and other transactions over the World Wide Web (WWW). Without this scheme, popular e-business sites such as Amazon.com would have a hard time attracting customers. The first personal computer, the Altair, went on the market as a kit in 1975. The Altair was based on the Intel 8080, an 8-bit processor, and came with 256 bytes of memory, toggle switches, and LED lights. While the Altair was basically for hobbyists, the Apple II from Apple Computer, which was introduced in 1977, was much more. A typical Apple II system, which was based on the Motorola 6502 8-bit processor, had 4 KB of RAM, a keyboard, a motherboard with expansion slots, built-in BASIC in ROM, and color graphics. The Apple II quickly became the standard desktop system in schools and other educational institutions. A physics classroom I taught in had one all the way into the early 1990s. However, it wasn’t until the introduction of the IBM Personal Computer (PC) in 1981 that the full potential of personal computers began to be realized, especially in businesses. In 1975, Bill Gates and Paul Allen licensed their BASIC programming language to MITS, the manufacturer of the Altair. BASIC was the first computer language program specifically written for a personal computer.

A landmark event that was largely responsible for the phenomenal growth in the PC industry (and hence the growth of the client/server model and local area networking) was the release of the first version of Microsoft’s text-based, 16-bit MS-DOS operating system in 1981. Microsoft, which had become a privately held corporation with Bill Gates as president and chairman of the board and Paul Allen as executive vice president, licensed MS-DOS 1 to IBM for its PC. MS-DOS continued to evolve and grow in power and usability until its final version, MS-DOS 6.22, which was released in 1993. One year after the first version of MS-DOS was released in 1981, Microsoft had its own fully functional corporate network, the Microsoft Local Area Network (MILAN), which linked a DEC 206, two PDP-11/70s, a VAX 11/250, and a number of MC68000 machines running XENIX. This setup was typical of heterogeneous computer networks in the early 1980s.

The 1990s were a busy decade in every aspect of networking, so we’ll only touch on the highlights here. Ethernet continued to dominate LAN technologies and largely eclipsed competing technologies such as Token Ring and FDDI. In 1991, Kalpana Corporation began marketing a new form of bridge called a LAN switch, which dedicated the entire bandwidth of a LAN to a single port instead of sharing it among several ports. Later called Ethernet switches or Layer 2 switches, these devices quickly found a niche in providing dedicated high-throughput links for connecting servers to network backbones. The rapid growth of computer networks and the rise of bandwidth-hungry applications created a need for something faster than 10-Mbps Ethernet, especially on network backbones. And finally, at the turn of the millennium came the long-anticipated successor to Windows NT, the Windows 2000 family of operating systems, which includes Windows 2000 Professional, Windows 2000 Server, Windows 2000 Advanced Server, and the soon-to-be-released Windows 2000 Datacenter Server. Together with Windows CE and embedded Windows NT, the Windows family has grown to encompass the full range of networking technologies, from embedded devices and personal digital assistants (PDAs) to desktop and laptop computers to heavy duty servers running the most advanced, powerful, scalable, business-critical enterprise-class applications

2. Problem Statement

2.1 Problem Statement Regarding Business

Over Secure System

An over secure system is computer system protected through the use of special hardware and software, policies, and practices against data corruption, destruction, interception, loss, or unauthorized access. The bad implication of over secured system is affecting all university workers specially instructors. They are impacted by the inability to access to their university account from their personal computers. They cannot share information easily wherever they are. They find some difficulties of completing their work using different servers. To overcome this problem we are thinking of designing a secure system that enable users to work easily and access from their homes.



2.2 Problem Statement Regarding Network

Lack of internet network availability

The importance of internet network is that it has made information available in a quick and easy manner, publicly accessible and within easy reach. So, having a problem on the network will cause of bad impacts and bad connections among university staff. Lack of network availability prevent workers from receiving urgent emails immediately. It will force them to be late in responding to that urgent emails or attending important meetings. To solve this problem we need to increase availability of network even in the class rooms. This will lead the instructor to be ready to the lecture on time rather than waiting at least five minutes every class just to be linked to the internet.



3-Network Classification

  1. Connection Method

A wireless network is technology that allows two or more computers, to communicate and send data by uses electromagnetic waves, such as radio signal frequency. Sometimes it’s also referred to as Wi-Fi network use the Wireless LAN (WLAN) is a wireless local area network is to linking two or more computers without using wires and usually providing a connection through an access point to the wider internet. Also, this gives users the mobility to move around within a local coverage area and still be connected to the network. Wireless local area networks have become popular for the home user and small offices due to ease of installation and the increasing popularity of computers.

  1. Wired Technologies

Wired technology has been around for ages. It first became popular in the early 1900's with the introduction of the telephone network. The use of wired connections spawned the creation of other technologies like multiplexing and SONET.

Wired technologies are the most widely used medium for telecommunication such as twisted pair and optic fiber cable. Our Company uses two types of wires:



  1. Twisted pair cable Connecting devices to the server and is divided into types :

  1. Shielded Twisted Pair (STP) is batter thane UTP

  2. U
    nshielded Twisted Pair (UTP) the most commonly used in local networks.

Advantages and disadvantage of UTP and STP:







  1. UTP

    STP

    Cost

    Least expensive

    Most expensive

    Use

    Homes , office , large businesses, and Large companies that require maximum bandwidth typically use STP cable

    Outside to better deal white the elements and equipment that may degrade bandwidth quality.


    Installation

    makes the cable Flexibility and it is more ease to installation

    makes the cable heavier and a bit more difficult to bend or manipulate in any way

    Signals transportation

    Less seize

    Large seize

    Sending and Broadcasting

    Short distance less than 100 m and less speed broadcast

    Long distance and the have more speed broadcast
    Optical fiber cables: it can be used as a medium for telecommunication and networking because it is flexible and can be bundled as cables. It is especially advantageous for long-distance communications, because light propagates through the fiber with little attenuation compared to electrical cables. It can be breakable essay and its need allot of expensive equipment.





  1. Wireless Technologies:

A wireless network is technology that allows two or more computers, to communicate and send data by uses electromagnetic waves, such as radio signal frequency. Sometimes it’s also referred to as Wi-Fi network or our Company use the Wireless LAN (WLAN) is a wireless local area network is to linking two or more computers without using wires and usually providing a connection through an access point to the wider internet. Also, this gives users the mobility to move around within a local coverage area and still be connected to the network. Wireless local area networks have become popular for the home user and small offices due to ease of installation and the increasing popularity of computers.

  1. Scale:

Our Company use LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations. Local area networks (LANS) - is allowing the interconnection and intercommunication of a group of computers, primarily for the sharing of resources and exchange of information. LAN is one of the simplest types and more common types of networks that are linked to a group of computers through the use of cables that’s cover the company's building.

  1. Network Architecture:

A network architecture is a blueprint of the complete computer communication network, which provides a framework and technology foundation for designing, building and managing a communication network. Network architecture will help gain the technical leadership skills you need to design and implement high-quality networks that support business needs. Our Company uses the peer-to-peer networks. In structured peer-to-peer networks, peers are organized to follow a specific criteria and algorithms, which lead to an overlay with specific topologies and properties. The company uses distributed hash table indexing, such as in the Chord system. In Unstructured peer-to-peer networks they do not provide any algorithm for organization or optimization of network connections. In particular, three models of unstructured architecture are defined. In pure peer-to-peer systems the entire network consists solely of equipotent peers. Hybrid peer-to-peer systems allow such infrastructure nodes to exist often called super nodes. In centralized peer-to-peer systems, a central server is used for indexing functions and to bootstrap the entire system. Although this has similarities with a structured architecture, the connections between peers are not determined by any algorithm. The first prominent and popular peer-to-peer file sharing system, Napster, was an example of the centralized model. Gnutella and Free net. Again Network Operating Systems are classified according to whether they are peer-to-peer or client-server NOSs.  Peer-to-peer NOSs like Windows 95, Windows98 and Windows for Workgroups are best for home & small office use. They are great for sharing applications, data, printers, and other localized resources across a few PCs. A peer-to-peer network allows two or more PCs to pool their resources together. Individual resources like disk drives, CD-ROM drives, and even printers are transformed into shared, collective resources that are accessible from every PC. Because peer-to-peer PCs have their own hard disk drives that are accessible by all computers, each PC acts as both a client (information requestor) and a server (information provider).

  1. Network Topology:

Our company B uses us and star Topology between offices.

1. Bus Topology: Bus topology uses a common backbone to connect all the network devices in a network in a linear shape. A single cable functions as the shared communication medium for all the devices attached with this cable with an interface connector. The device, which communicates and sends the broadcast message to all the devices attached with the shared cable, but only the intended recipient actually accepts and processes that message. Ethernet bus topologies are easy to install and don’t require much cabling; only a main shared cable is used for network communication. 10Base-2 and 10BaseT are two popular types of the Ethernet cables used in the Bus topology. Also, Bus network works with very limited devices. Performance issues are likely to occur in the Bus topology if more than 12-15 computers are added in a Bus Network. Additionally, if the Backbone cable fails then all network becomes useless and no communication fails among all the computers. Unlike in the Star topology in which if one computer is detached from a network then there is no effect on the other computers in a network.

2. Star Topology: In the computer networking world the most commonly used type in LAN is the star topology. Star topologies can be implemented in home, offices or even in a building. All the computers in the star topologies are connected to central devices like hubs, switches or routers. The function of all these devices is different. Computers in a network are usually connected with the hub, switch or router with the Unshielded Twisted Pair (UTP) or Shielded Twisted Pair Cables. Hub is responsible of managing all activities of a network. All nodes (file server, workstations and peripheral devices) in star topology are directly connected to hub. As compared to the bus topology, a star network requires more devices & cables to complete a network. The failure of each node or cable in a star network, won’t take down the entire network. However if the central connecting devices such as hub, switch or router fails due to any reason, then ultimately all the network can come down or collapse.

4-Types of Network Based on Physical Scope:



1. Local Area Network:

Our Company uses LANs which are tend to be designed for internal use by an organization's internal systems and employees in individual physical locations. Local area networks (LANS) – is defined as allowing the interconnection and communication of a group of computers, in order to share resources and exchange information. LAN networks is one of the basic types of networks that could be used , it common to use such network that is linked to a group of computers, through the use of cables that is spread around the companies building.



2. Campus Area Network:

Our Company also uses Campus Area Network (CAN). Which is a computer network that connects a few local area networks (LANs) and this kind of network is mostly used in large universities or local business offices and buildings. A campus area network is considered larger than a local area network but smaller than a metropolitan area network (MAN) or wide area network (WAN).



5. Network security:

Firewalls:

Firewall security is needed to secure the connections; in fact, PMU has a firewall management program in place. In the world of technology firewall protection refers to a network device which blocks any sort of network traffic, PMU forms an obstruction between a trusted and an unsecure network. Firewall security has become a major issue, calling for a different strategy. PMU uses many kinds of firewall security. Packet filtering firewall is one of these kinds. This type of firewall has a file of firewall security system is which can build block traffic based on IP protocol, IP address and port number. Firewall management program controls all the web traffics to distinguish between good web traffic and bad web traffic. Stately firewall is also used and it is like a packet filtering firewall, but it is quick in keeping way of active connections. Deep packet inspection firewall is the third type. This kind of firewall security is similar to imposition prevention technology .Moreover ,application-aware firewall is similar to deep packet checkup, but the firewall knows certain protocols and can parse them.



Security Technology:

The Prince Mohammed bin Fahad University (PMU) has in recent times signed contract with Software AG, which will let the leading PMU the ability to apply Software AG's web. Methods product matching set in developing higher purposes, enhancing business methods and optimizing the planned advantages of PMU's technology investments.



Encryption:

Encryption is the method of converting information to make it illegible to anyone except those who having knowledge, it is called key. The result of the process is encrypted information. Encryption has a long been used by governments to ease covert communication. Encryption is now used in protecting student grades in PMU. There are many reports of private information such as student personal records and them grades.



Authentication:

Authentication is the process of shaping if someone or something is. Authentication is happened through the use of logon passwords. Knowing the password lets that the users feel security and privacy which is authentic. And the user should register by himself or by another one.


  1. Basic hardware components:


Networks contains extra fundamental hardware building blocks interrelating their visual display unit, such as hubs, bridges, switches, repeaters and routers.

Hubs:

A hub consists of several ports. When a packet reaches to destination at one port, it is copied to the other ports of the hub. After copying the packets, the destination address in the frame still without change to a broadcast address. This simple way is applied; it makes copies for the data and sends it to all of the Nodes linked to the hub.



Bridges:

A network bridge connects several network sections at the data link layer of the OSI model. Bridges and nubs do not copy transfer to all ports. Learns which MAC addresses are available through exact ports. Testing bridges connection of ports and addresses shows various ports. When the bridge links a port and an address, Traffic for that address will be sent to that port. Bridges sends broadcasts to all ports except the one on which the broadcast was received.



Switches:

A switch is a piece of equipment that doing switching. It is different from a hub .It only frontwards the datagram to the ports concerned in the communications rather than all ports connected. A switch doesn’t have the ability of steering traffic based on IP address (layer 3) which is essential for communicating between network segments or within a large or complex LAN. Some switches can route. A switch has many ports. In addition, most or the entire network be connected straight to a switch, or another switch that is in turn connected to a switch.



Repeaters:

A repeater is an electronic device that takes a signal and send it at a higher level or higher power, or onto the other side of a barrier, so that the signal reach longer distances without dilapidation. A repeater with numerous ports is called a hub. Repeaters work on the Physical Layer of the OSI model. Repeaters needs a short time to renew the signal which causes propagation delay . It affects network communication when there are more than a few repeaters in a row. Some network architectures bound the number of repeaters that can be used in a row.


Routers:


A router is a device that deals with networking to deliver data between networks by giving out information found in the datagram or packet .This information is a method in combination with the routing table. Routing tables is a method to determine what border to forward packets to determine the best path to forward the packets. Routers work at the network layer of the TCP/IP model or layer 3 of the OSI model. Routers supplies interconnectivity between like and unlike media.

References:

  • About PMU. (n.d.). Prince Mohammad bin Fahd University. Retrieved from http://www.pmu.edu.sa/v4/default.asp

  • The History of Networking. (2009, September 6). Bukisa. Retrieved March 19, 2012, from http://www.bukisa.com/articles/144193_the-history-of-networking

  • http://ecommerce.insightin.com/network/network_classification.html




Download 56.17 Kb.

Share with your friends:




The database is protected by copyright ©ininet.org 2024
send message

    Main page