1 / 33

Chapter 6 Telecommunications and Networks

Chapter 6 Telecommunications and Networks. Competitive vendors, carriers, alliances, and network services, accelerated by deregulation & Internet growth. Industry Trends. Extensive Internet, digital fiber-optic, and wireless

aron
Download Presentation

Chapter 6 Telecommunications and Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 6Telecommunications and Networks

  2. Competitive vendors, carriers, alliances, and network services, accelerated by deregulation & Internet growth Industry Trends Extensive Internet, digital fiber-optic, and wireless technologies to create high speed local & global internetworks for voice, data , image audio and video communications Technology Trends More electronic commerce, enterprise collaboration, online business operations and strategic advantage in markets, extranets etc. Application Trends Trends in Telecommunications

  3. Major technology trend open systems information systems that use common standards for hardware, software, applications, and networking. Open system like Internet and corporate intranets and extranets, create a computing environment that is open to easy access by end users and their networked computer systems. Open system provides connectivity and also provides a high degree of network interoperability.

  4. Middleware (plumping) : is the other trend, is a general term for any programming that serves to “glue together” or mediate between two separate, and usually already existing programs. A common application of middleware is to allow programs written for access to a particular database to access other databases without the need for custom coding. Telecommunications is also being revolutionized by the rapid change from analog to digital network technologies. And then major trend in telecommunications technology is a change to wireless technologies

  5. Overcome Geographic Barriers: Capture information about business transactions from remote locations. Overcome Time Barriers: Provide information to remote locations immediately after it is requested. Overcome Cost Barriers: Reduce the cost of more traditional means of communications. Overcome Structural Barriers: Support linkages for competitive advantage. Telecommunications Strategic Capabilities

  6. The Internet Revolution • The explosive growth of the Internet is a revolutionary phenomenon in computing and telecommunications. • The Internet has become the largest and most important network of networks today (information highway) • The Internet is constantly expanding as more and more businesses and other organizations and their users, computers and networks join its global Web.

  7. Download and Computer Surf and E-mail Popular Uses of the Internet E-Commerce Making phone calls Internet Chat and Discussion Forums Search Engines Internet Applications

  8. Surf: Point and click your way to thousands of hyperlinked Web sites and resources for multimedia information, entertainment or electronic commerce. e_mail: Use e-mail and instant messaging to exchange electronic messages with colleagues, friends and other Internet users. Duscuss: Participate in discussion formats of special interest newsgroups, or hold real time text conversations in Web site chat rooms. Buy and Sell: Buy and Sell practically anything via e-commerce retailers, wholesalers, service providers and online auctions.

  9. Download • Transfer data files, software, reports, articles, pictures, music, videos and other types of files to your computer systems. • Searches • Conduct online searches for information on Web sites in a variety of ways by using search sites and search engines. • Other uses: • Make long-distance phone calls, hold desktop videoconferences, listen to radio programs, watch television, play video games etc.

  10. Increase Customer Loyalty & Retention Deriving Business Value from e-Commerce Applications Reduce the Cost of Doing Business Develop New Web-based Products Generate New Revenue Sources Develop New Markets & Channels Attract New Customers Business Value from e-Commerce Applications

  11. How a company can use the Internet for Business Suppliers The Internet Head Quarters Customers Business Partners Remote offices

  12. Headquarters Internet Web sites enable interactive marketing and electronic commerce and collaboration with customers, prospects and business partners. Suppliers Extranets for electronic commerce enable suppliers to assess inventory, replenishment stock, and send documents over secure Internet links. Business Partners Business partners can use the Internet for e-mail, file transfer, discussion forums, and extranet access to intranet resources. Customers Customers can shop at e-commerce Web sites for products and services with interactive service and support Remote Offices Intranet links with remote employee sites connect virtual teams for interactive communications, collaboration and computing.

  13. The Business value of Intranet Internet Communication and Collaboration Existing E-mail, Voice- Mail system Intranet Enterprise Information portal F I R E W A L L Existing Databases And Enterprise Applications Business operations And Management Extranet HTML, MS Office XML, Java Web Publishing Intranet Portal Management Existing Hardware And Networks

  14. Telecommunications NetworkAlternatives

  15. Telecommunications Processors 4 1 Telecommunications Software 3 2 5 2 PCs, NCs, and Other Terminals Telecommunications Channels and Media Computers Basic Components in a Telecommunications Network

  16. The basic components of a telecommunications network are: Terminals. These are networked microcomputer workstations or video input/output stations that provide the sending and receiving endpoints for the network. Telecommunications Processors. These are specialized hardware components that support data transmission and reception between terminals and computers. Telecommunications Channels and Media. A channel connects two or more parties in a network. Media are the particular way a channel is connected. Telecommunications channels use combinations of media such as copper wires, coaxial cables, fiber optic cables, and microwave carriers to transmit information.

  17. Computers. All sizes and types of computers can and are connected to telecommunications networks. Typical arrangements include using a mainframe as a host for the network, a minicomputer as a front-end processor, with a dedicated microcomputer as a network server to a smaller local group of networked microcomputer workstations. Telecommunications Control Software. Software controls the interaction of the computers on the telecommunications information system. Mainframes use telecommunications monitors in their role as host computers. Network operating systems are specially designed for microcomputer servers while individual microcomputers on the network access its functions by communications packages.

  18. Types of Telecommunication networks • WAN • LAN • VPN (Virtual Private Networks) • Client/Server Networks • Peer to Peer Network

  19. Wide Area Networks

  20. Ontario California Norway Wide Area Network Manitoba Belgium British Columbia Pennsyl- vania Japan Dominican Republic Chile WAN

  21. Shared Database and Software Packages PC PC PC Network Server Shared Printer PC PC Internetwork Processor to Other Networks Local Area Networks

  22. The Internet Router Extranet Fire wall Intranet Server Fire wall Router Intranet Server Host System VPN

  23. Most organizations use Virtual Private Networks (VPNs) to establish secure intranets and extranets. • A virtual private network is a secure network that uses the Internet as its main backbone network but relies on network firewalls, encryption, and other security features of its Internet and intranet connections and those of participation organizations. • Eg: VPNs would enable a company to use the Internet to establish secure intranets between its distant branch offices and manufacturing plants and secure extranets between itself and its business customers and suppliers.

  24. Host Systems/ Superservers Servers Client Systems Client Server Networking

  25. P2P Networks- Central server architecture

  26. In the central server architecture • P2P file sharing software connects PC to a central server that contains a directory of all of the other users (peers) in the network • When request a file, the software searches the directory for any other users who have that file and are online at that moment. • It then sends a list of user names that are active links to all such users. • Clicking on one of these user names prompts the software to connect PC to that user’s PC and automatically transfers the file.

  27. Pure P2P networks

  28. The pure peer to peer network architecture has no central directory or server • The file sharing software in the P2P network connects PC with one of the online users in the network. • An active link to your user name is transmitted from peer to peer to all the online users in the network. • When request a file, the software searches every online user and send a list of active file names related to the request. • Licking on one of these automatically transfers the file.

  29. Twisted Pair Coaxial Cable Fiber Optics Terrestrial Microwave Communication Satellites Cellular Technologies Wireless LAN Telecommunications Communication Media

  30. Modems Multiplexers Internetwork Processors Switches Routers Hubs Gateways Fire walls Network Operating System Telecommunications Monitor Middleware Network Management Software Telecommunications Processors and Software

  31. Network Topologies

  32. Application Layer Application or Process Layer Presentation Layer Session Layer OSI Model Host-to-Host Transport Layer Transport Layer Network Layer Internet Protocol (IP) Data Link Layer Network Interface Physical Layer Physical Layer The Internet’s TCP/IP

  33. The International Standards Organization (ISO) has developed a seven-layer Open Systems Interconnection (OSI) model to serve as a standard model for network architecture. Application Layer. This layer provides communications services for end user applications. Presentation Layer. This layer provides appropriate data transmission formats and codes. Session Layer. This layer supports the accomplishment of telecommunications sessions. Transport Layer. This layer supports the organization and transfer of data between nodes in the network. Network Layer. This layer provides appropriate routing by establishing connections among network links. Data Link Layer. This layer supports error free organization and transmission of data in the network. Physical Layer. This layer provides physical access to the telecommunications media in the network.

More Related