id
stringlengths
14
14
text
stringlengths
16
2.16k
source
stringlengths
6
8
chapter_title
stringclasses
5 values
c81e728d9d4c-0
TABLE OF CONTENTS COVER TITLE PAGE COPYRIGHT DEDICATION ABOUT THE AUTHORS PREFACE PURPOSE OF THIS BOOK WHAT’S NEW IN THIS EDITION LAB EXERCISES ONLINE SUPPLEMENTS FOR INSTRUCTORS E-BOOK ACKNOWLEDGMENTS PART ONE: INTRODUCTION CHAPTER 1: INTRODUCTION TO DATA COMMUNICATIONS 1.1 INTRODUCTION 1.2 DATA COMMUNICATIONS NETWORKS 1.3 NETWORK MODELS 1.4 NETWORK STANDARDS 1.5 FUTURE TRENDS 1.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 1A HANDS-ON ACTIVITY 1B PART TWO: FUNDAMENTAL CONCEPTS CHAPTER 2: APPLICATION LAYER 2.1 INTRODUCTION 2.2 APPLICATION ARCHITECTURES 2.3 WORLD WIDE WEB 2.4 ELECTRONIC MAIL 2.5 OTHER APPLICATIONS 2.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES
Page 2
Chapter 1
37693cfc7480-0
HANDS-ON ACTIVITY 2A HANDS-ON ACTIVITY 2B CHAPTER 3: PHYSICAL LAYER 3.1 INTRODUCTION 3.2 CIRCUITS 3.3 COMMUNICATION MEDIA 3.4 DIGITAL TRANSMISSION OF DIGITAL DATA 3.5 ANALOG TRANSMISSION OF DIGITAL DATA 3.6 DIGITAL TRANSMISSION OF ANALOG DATA 3.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 3A HANDS-ON ACTIVITY 3B HANDS-ON ACTIVITY 3C CHAPTER 4: DATA LINK LAYER 4.1 INTRODUCTION 4.2 MEDIA ACCESS CONTROL 4.3 ERROR CONTROL 4.4 DATA LINK PROTOCOLS 4.5 TRANSMISSION EFFICIENCY 4.6 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 4A CHAPTER 5: NETWORK AND TRANSPORT LAYERS 5.1 INTRODUCTION 5.2 TRANSPORT AND NETWORK LAYER PROTOCOLS 5.3 TRANSPORT LAYER FUNCTIONS 5.4 ADDRESSING 5.5 ROUTING 5.6 TCP/IP EXAMPLE 5.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS
Page 3
Chapter 3
289dff07669d-0
EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 5A HANDS-ON ACTIVITY 5B HANDS-ON ACTIVITY 5C HANDS-ON ACTIVITY 5D HANDS-ON ACTIVITY 5E HANDS-ON ACTIVITY 5F PART THREE: NETWORK TECHNOLOGIES CHAPTER 6: NETWORK DESIGN 6.1 INTRODUCTION 6.2 NEEDS ANALYSIS 6.3 TECHNOLOGY DESIGN 6.4 COST ASSESSMENT 6.5 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 6A CHAPTER 7: WIRED AND WIRELESS LOCAL AREA NETWORKS 7.1 INTRODUCTION 7.2 LAN COMPONENTS 7.3 WIRED ETHERNET 7.4 WIRELESS ETHERNET 7.5 THE BEST PRACTICE LAN DESIGN 7.6 IMPROVING LAN PERFORMANCE 7.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 7A HANDS-ON ACTIVITY 7B HANDS-ON ACTIVITY 7C CHAPTER 8: BACKBONE NETWORKS 8.1 INTRODUCTION 8.2 SWITCHED BACKBONES 8.3 ROUTED BACKBONES
Page 4
Chapter 6
81b073de9370-0
8.4 VIRTUAL LANS 8.5 THE BEST PRACTICE BACKBONE DESIGN 8.6 IMPROVING BACKBONE PERFORMANCE 8.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 8A HANDS-ON ACTIVITY 8B CHAPTER 9: WIDE AREA NETWORKS 9.1 INTRODUCTION 9.2 DEDICATED-CIRCUIT NETWORKS 9.3 PACKET-SWITCHED NETWORKS 9.4 VIRTUAL PRIVATE NETWORKS 9.5 THE BEST PRACTICE WAN DESIGN 9.6 IMPROVING WAN PERFORMANCE 9.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 9A HANDS-ON ACTIVITY 9B HANDS-ON ACTIVITY 9C HANDS-ON ACTIVITY 9D CHAPTER 10: THE INTERNET 10.1 INTRODUCTION 10.2 HOW THE INTERNET WORKS 10.3 INTERNET ACCESS TECHNOLOGIES 10.4 THE FUTURE OF THE INTERNET 10.5 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 10A HANDS-ON ACTIVITY 10B
Page 5
Chapter 9
adcaec3805aa-0
HANDS-ON ACTIVITY 10C PART FOUR: NETWORK MANAGEMENT CHAPTER 11: NETWORK SECURITY 11.1 INTRODUCTION 11.2 RISK ASSESSMENT 11.3 ENSURING BUSINESS CONTINUITY 11.4 INTRUSION PREVENTION 11.5 BEST PRACTICE RECOMMENDATIONS 11.6 IMPLICATIONS FOR YOUR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 11A HANDS-ON ACTIVITY 11B HANDS-ON ACTIVITY 11C HANDS-ON ACTIVITY 11D CHAPTER 12: NETWORK MANAGEMENT 12.1 INTRODUCTION 12.2 DESIGNING FOR NETWORK PERFORMANCE 12.3 CONFIGURATION MANAGEMENT 12.4 PERFORMANCE AND FAULT MANAGEMENT 12.5 END USER SUPPORT 12.6 COST MANAGEMENT 12.7 IMPLICATIONS FOR CYBER SECURITY SUMMARY KEY TERMS QUESTIONS EXERCISES MINICASES TECH UPDATES HANDS-ON ACTIVITY 12A HANDS-ON ACTIVITY 12B HANDS-ON ACTIVITY 12C INDEX END USER LICENSE AGREEMENT List of Illustrations Chapter 1 FIGURE 1-1 What is MIS? FIGURE 1-2 Example of a local area network (LAN)
Page 6
Chapter 11
508df4cb2f4d-0
FIGURE 1-3 Network architecture components FIGURE 1-4 Network models. OSI = Open Systems Interconnection Reference FIGURE 1-5 Message transmission using layers. IP = Internet Protocol; HTTP =... FIGURE 1-6 Some common data communications standards. HTML = Hypertext Marku... FIGURE 1-7 A security robot on the IOT FIGURE 1-8 One server farm with more than 1,000 servers FIGURE 1-9 Wireshark capture Chapter 2 FIGURE 2-1 Host-based architecture FIGURE 2-2 Client-based architecture FIGURE 2-3 Two-tier thick client client–server architecture FIGURE 2-4 Three-tier thin client client–server architecture FIGURE 2-5 The n-tier thin client client–server architecture FIGURE 2-6 The typical two-tier thin-client architecture of the Web FIGURE 2-7 Cloud architecture models compared to thin client–server architec... FIGURE 2-8 One row of a server farm at Indiana University FIGURE 2-9 Peer-to-peer architecture FIGURE 2-10 How the Web works FIGURE 2-11 An example of a request from a Web browser to a Web server using... FIGURE 2-12 An example of a response from a Web server to a Web browser usin... FIGURE 2-13 How SMTP (Simple Mail Transfer Protocol) email works. IMAP = Int... FIGURE 2-14 Inside the Web. HTTP = Hypertext Transfer Protocol; IMAP = I... FIGURE 2-15 An example of an email message using the SMTP (Simple Mail Trans... FIGURE 2-16 A Cisco telepresence system FIGURE 2-17 Desktop videoconferencing
Page 7
Chapter 11
95525872e442-1
FIGURE 2-17 Desktop videoconferencing FIGURE 2-18 Viewing the SMTP packet header FIGURE 2-19 Viewing the source of the SMTP packet FIGURE 2-20 SMTP packets in Wireshark FIGURE 2-21 POP packets in Wireshark Chapter 3 FIGURE 3-1 Point-to-point circuit FIGURE 3-2 Multipoint circuit FIGURE 3-3 Simplex, half-duplex, and full-duplex transmissions FIGURE 3-4 Multiplexed circuit FIGURE 3-5 Category 5e twisted-pair wire FIGURE 3-6 Coaxial cables. Thinnet and Thicknet Ethernet cables (right)—(1) ... FIGURE 3-7 Fiber-optic cable FIGURE 3-8 A microwave tower. The round antennas are microwave antennas and ... FIGURE 3-9 Satellites in operation
Page 7
Chapter 11
bb0f169a5947-0
FIGURE 3-10 Binary numbers used to represent different characters using ASCI... FIGURE 3-11 Parallel transmission of an 8-bit code FIGURE 3-12 Serial transmission of an 8-bit code FIGURE 3-13 Unipolar, bipolar, and Manchester signals (digital) FIGURE 3-14 Sound wave FIGURE 3-15 Amplitude modulation FIGURE 3-16 Frequency modulation FIGURE 3-17 Phase modulation FIGURE 3-18 Two-bit amplitude modulation FIGURE 3-19 Pulse amplitude modulation (PAM) FIGURE 3-20 Pulse amplitude modulation (PAM) FIGURE 3-21 VoIP phone FIGURE 3-22 Cat 5 cable FIGURE 3-23 Inside a Cat 5 cable FIGURE 3-24 Pin connection for Cat 5 at the computer end FIGURE 3-25 Tools and materials for making a patch cable Chapter 4 FIGURE 4-1 Relative response times FIGURE 4-2 Sources of errors and ways to minimize them FIGURE 4-3 Using parity for error detection FIGURE 4-4 Hamming code for forward error correction FIGURE 4-5 Protocol summary FIGURE 4-6 Asynchronous transmission. ASCII = United States of America Stand... FIGURE 4-7 SDLC (synchronous data link control) frame layout FIGURE 4-8a Ethernet 802.3ac frame layout FIGURE 4-8b Ethernet II frame layout FIGURE 4-9 PPP frame layout FIGURE 4-10 Frame size effects on throughput FIGURE 4-11 Capturing packets with Wireshark FIGURE 4-12 Analyzing packets with Wireshark Chapter 5
Page 8
Chapter 11
6c4628b734cd-1
FIGURE 4-12 Analyzing packets with Wireshark Chapter 5 FIGURE 5-1 Message transmission using layers. SMTP = Simple Mail Transfer Pr... FIGURE 5-2 Transmission Control Protocol (TCP) segment. ACK = Acknowledgment... FIGURE 5-3 Internet Protocol (IP) packet (version 4). CRC = Cyclical Redunda... FIGURE 5-4 Internet Protocol (IP) packet (version 6) FIGURE 5-5 Linking to application layer services FIGURE 5-6 Stop-and-wait ARQ (Automatic Repeat reQuest). ACK = Acknowledgmen... FIGURE 5-7 Continuous ARQ (Automatic Repeat reQuest). ACK = Acknowledgment; ... FIGURE 5-8 Types of addresses
Page 8
Chapter 11
c68f3a4055bc-0
FIGURE 5-9 IPv4 public address space FIGURE 5-10 IPv4 private address space FIGURE 5-11 Address subnets FIGURE 5-12 How the DNS system works? FIGURE 5-13 A small corporate network FIGURE 5-14 Sample routing tables FIGURE 5-15 Routing on the Internet with Border Gateway Protocol (BGP), Open... FIGURE 5-16 Anatomy of a router FIGURE 5-17 Example Transmission Control Protocol/Internet Protocol (TCP/IP)... FIGURE 5-18 TCP/IP configuration information FIGURE 5-19 Packet nesting. HTTP = Hypertext Transfer Protocol; IP = Interne... FIGURE 5-20 How messages move through the network layers. FIGURE 5-25 DNS cache FIGURE 5-27 DNS capture Chapter 6 FIGURE 6-1 Network architecture components FIGURE 6-2 Network design FIGURE 6-3 The cyclical nature of network design FIGURE 6-4 Sample needs assessment logical network design for a single build... FIGURE 6-5 Physical network design for a single building FIGURE 6-7 SmartDraw software Chapter 7 FIGURE 7-1 Local area network components FIGURE 7-2 LAN switches FIGURE 7-3 Wireless access points FIGURE 7-4 Ethernet topology using hubs FIGURE 7-5 Ethernet topology using switches FIGURE 7-6 Types of Ethernet FIGURE 7-7 A wireless Ethernet frame FIGURE 7-8 Design parameters for Wi-Fi access point range FIGURE 7-9 A Wi-Fi design (the numbers indicate the channel numbers) FIGURE 7-10 A Wi-Fi design in the three dimensions (the numbers indicate the...
Page 9
Chapter 11
ac3b73049879-1
FIGURE 7-11 The data center at Indiana University FIGURE 7-12 Network with load balancer FIGURE 7-13 The storage area network (SAN) at the Kelley School of Business ... FIGURE 7-14 SOHO LAN designs FIGURE 7-15 Powerline adapter FIGURE 7-17 TracePlus FIGURE 7-18 WLANs in a neighborhood in Bloomington, Indiana
Page 9
Chapter 11
59c299cb0aee-0
FIGURE 7-19 WLANs at Indiana University FIGURE 7-20 Plans for Floors 3–8 of Apollo Residence FIGURE 7-21 LAN equipment price list Chapter 8 FIGURE 8-1 Rack-mounted switched backbone network architecture FIGURE 8-2 An MDF with rack-mounted equipment. A layer 2 chassis switch with... FIGURE 8-3 MDF network diagram. MDF = main distribution facility FIGURE 8-4 Switched backbones at Indiana University FIGURE 8-5 Routed backbone architecture FIGURE 8-6 VLAN-based backbone network architecture FIGURE 8-7 Multiswitch VLAN-based backbone network design FIGURE 8-8 The best practice network design FIGURE 8-10 Facility map of the Western Trucking headquarters FIGURE 8-11 Computers and devices at Alan's house FIGURE 8-12 Network map for Alan's house FIGURE 8-13 System information for 192.168.1.188 FIGURE 8-14 Apollo Residence first floor FIGURE 8-15 Apollo Residence second floor FIGURE 8-16 Equipment price list Chapter 9 FIGURE 9-1 Dedicated-circuit services. CSU = channel service unit; DSU = dat... FIGURE 9-2 Ring-based design FIGURE 9-3 Star-based design FIGURE 9-4 Mesh design FIGURE 9-5 T-carrier services FIGURE 9-6 SONET and SDH services. OC = optical carrier (level); SDH = synch... FIGURE 9-7 Packet-switched services. PAD = packet assembly/disassembly devic... FIGURE 9-8 Virtual private network (VPN) services FIGURE 9-9 A virtual private network (VPN)
Page 10
Chapter 11
729c70f33509-1
FIGURE 9-9 A virtual private network (VPN) FIGURE 9-10 Using VPN software. Shaded area depicts encrypted packets FIGURE 9-11 WAN services FIGURE 9-14 100 Gbps network for a U.S. Internet service provider FIGURE 9-15 Starting Wireshark FIGURE 9-16 Viewing encrypted packets FIGURE 9-17 Packets that enter the VPN tunnel FIGURE 9-18 Tracert without a VPN FIGURE 9-19 Tracert with a VPN Chapter 10 FIGURE 10-1 The Internet is a lot like the universe—many independent systems...
Page 10
Chapter 11
c8c7bdfbbab7-0
FIGURE 10-2 Basic Internet architecture. ISP = Internet service provider; IX... FIGURE 10-3 A typical Internet backbone of a major ISP FIGURE 10-4 DSL architecture. DSL = digital subscriber line; ISP = Internet ... FIGURE 10-5 Some typical digital subscriber line data rates FIGURE 10-6 Cable modem architecture. ISP = Internet service provider; POP =... FIGURE 10-7 Internet2 network map FIGURE 10-9 Visual trace route FIGURE 10-10 Internet traffic reports FIGURE 10-11 A speed test on my computer in Indiana Chapter 11 FIGURE 11-4 Likelihood of a threat FIGURE 11-5 Threat scenario for theft of customer information FIGURE 11-6 Threat scenario for destruction of customer information by a tor... FIGURE 11-7 A distributed denial-of-service attack FIGURE 11-8 Traffic analysis reduces the impact of denial-of-service attacks... FIGURE 11-9 Security cables protecting computers FIGURE 11-12 Using a firewall to protect networks FIGURE 11-13 How packet-level firewalls work FIGURE 11-14 A typical network design using firewalls FIGURE 11-15 One menu on the control console for the Optix Pro Trojan FIGURE 11-16 Secure transmission with public key encryption FIGURE 11-17 Authenticated and secure transmission with public key encryptio... FIGURE 11-18 Two-factor authentication with the Duo app for mobile phones FIGURE 11-19 Intrusion prevention system (IPS). DMZ = demilitarized zone; DN... FIGURE 11-20 Commonly used security controls FIGURE 11-21 BitLocker FIGURE 11-22 Selecting the encryption mode FIGURE 11-23 Starting the encryption
Page 11
Chapter 11
26d79f8d1b5b-1
FIGURE 11-23 Starting the encryption FIGURE 11-24 System Preferences for a Mac FIGURE 11-25 Searching system preferences FIGURE 11-26 Security & Privacy: FileVault FIGURE 11-27 PGP key generator FIGURE 11-28 PGP encryption FIGURE 11-29 PGP decryption FIGURE 11-30 Selecting a recipient of an encrypted message FIGURE 11-31 Security hardware, software, and services Chapter 12 FIGURE 12-1 Device management software used on Indiana University’s core bac... FIGURE 12-2 Network management with Simple Network Management Protocol (SNMP...
Page 11
Chapter 11
617332afd17b-0
FIGURE 12-3 Network with load balancer FIGURE 12-4 Capacity management software FIGURE 12-5 Network with content engine FIGURE 12-6 Network with content delivery FIGURE 12-7 Network configuration diagram FIGURE 12-8 Part of the Network Operations Center at Indiana University FIGURE 12-9 Network traffic versus network management budgets FIGURE 12-11 Network management personnel costs FIGURE 12-13 Total cost of ownership (per client computer per year) for a Mi... FIGURE 12-14 SolarWinds network management software, used with permission FIGURE 12-15 SolarWinds network management software, used with permission FIGURE 12-16 SolarWinds network management software, used with permission FIGURE 12-17 Equipment list
Page 12
Chapter 11
d7c4e61be700-0
Business Data Communications and Networking Fourteenth Edition Jerry FitzGerald Jerry FitzGerald & Associates Alan Dennis Indiana University Alexandra Durcikova University of Oklahoma
Page 13
Chapter 11
5ea438bb2205-0
VP AND EDITORIAL DIRECTOR Mike McDonald PUBLISHER Lise Johnson EDITOR Jennifer Manias EDITORIAL ASSISTANT Kali Ridley SENIOR MANAGING EDITOR Judy Howarth DIRECTOR OF CONTENT OPERATIONS Martin Tribe SENIOR MANAGER OF CONTENT OPERATIONS Mary Corder PRODUCTION EDITOR Umamaheswari Gnanamani ASSISTANT MARKETING MANAGER Rachel Karach COVER PHOTO CREDIT © Photographer is my life./Getty Images Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors, and community and charitable support. For more information, please visit our website: www.wiley.com/go/citizenship. Copyright © 2021, 2017, 2015, 2012, 2009, 2007 John Wiley & Sons, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood
Page 14
Chapter 11
6bf63901053f-1
Drive, Danvers, MA 01923 (Web site: www.copyright.com). Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030-5774, (201) 748-6011, fax (201) 748-6008, or online at: www.wiley.com/go/permissions. Evaluation copies are provided to qualified academics and professionals for review purposes only, for use in their courses during the next academic year. These copies are licensed and may not be sold or transferred to a third party. Upon completion of the review period, please return the evaluation copy to Wiley. Return instructions and a free of charge return shipping label are available at: www.wiley.com/go/returnlabel. If you have chosen to adopt this textbook for use in your course, please accept this book as your complimentary desk copy. Outside of the United States, please contact your local sales representative. ISBN: 978-1-119-70284-9 (PBK) ISBN: 978-1-119-71365-4 (EVALC) Library of Congress Cataloging-in-Publication Data: Names: FitzGerald, Jerry, 1936- author. | Dennis, Alan, author. | Durcikova, Alexandra, author. Title: Business data communications and networking / Jerry FitzGerald, Alan Dennis, Alexandra Durcikova. Description: Fourteenth edition. | Hoboken, NJ : Wiley, [2021] | Includes index. Identifiers: LCCN 2020028461 (print) | LCCN 2020028462 (ebook) | ISBN 9781119702849 (paperback) | ISBN 9781119713661 (adobe pdf) |
Page 14
Chapter 11
ea28d914bcc6-2
ISBN 9781119702665 (epub) Subjects: LCSH: Data transmission systems. | Computer networks. | Office practice–Automation. Classification: LCC TK5105 .F577 2021 (print) | LCC TK5105 (ebook) | DDC 004.6–dc23 LC record available at https://lccn.loc.gov/2020028461 LC ebook record available at https://lccn.loc.gov/2020028462 The inside back cover will contain printing identification and country of origin if omitted from this page. In addition, if the ISBN on the back cover differs from the ISBN on this page, the one on the back cover is correct.
Page 14
Chapter 11
2ede479f4a85-0
To my son Alec, Alan To all curious minds who want to know how today’s modern world works. Alexandra
Page 15
Chapter 11
4bbed9fe1c0c-0
ABOUT THE AUTHORS Alan Dennis is a Fellow of the Association for Information Systems and a professor of information systems in the Kelley School of Business at Indiana University. He holds the John T. Chambers Chair in Internet Systems, which was established to honor John Chambers, president and chief executive officer of Cisco Systems, the worldwide leader of networking technologies for the Internet. Prior to joining Indiana University, Alan spent nine years as a professor at the University of Georgia, where he won the Richard B. Russell Award for Excellence in Undergraduate Teaching. He has a bachelor’s degree in Computer Science from Acadia University in Nova Scotia, Canada, and an MBA from Queen’s University in Ontario, Canada. His PhD in management of information systems is from the University of Arizona. Prior to entering the Arizona doctoral program, he spent three years on the faculty of the Queen’s School of Business. Alan has extensive experience in the development and application of groupware and Internet technologies and co-founded Courseload, an electronic textbook company whose goal is to improve learning and reduce the cost of textbooks. He has won many awards for theoretical and applied research and has published more than 150 business and research articles, including those in Management Science, MIS Quarterly, Information Systems Research, Academy of Management Journal, Organization Behavior and Human Decision Making, Journal of Applied Psychology, Communications of the ACM, and IEEE Transactions of Systems, Man, and Cybernetics. His first book was Getting Started with Microcomputers, published in 1986. Alan is also an author of two systems analysis and design books published by Wiley. He is the cochair of the Internet Technologies Track of the Hawaii International Conference on System Sciences. He has served as a consultant to BellSouth, Boeing, IBM, Hughes Missile Systems, the U.S. Department of Defense, and the Australian Army.
Page 16
Chapter 11
d3c2826a5fd3-1
Systems, the U.S. Department of Defense, and the Australian Army. Alexandra Durcikova is an Associate Professor at the Price College of Business, University of Oklahoma. Alexandra has a PhD in management information systems from the University of Pittsburgh. She has earned an MSc degree in solid state physics from Comenius University, Bratislava, worked as an experimental physics researcher in the area of superconductivity and as an instructor of executive MBA students prior to pursuing her PhD. Alexandra’s research interests include knowledge management and knowledge management systems, the role of organizational climate in the use of knowledge management systems, knowledge management system characteristics, governance mechanisms in the use of knowledge management systems, and human compliance with security policy and characteristics of successful phishing attempts within the area of network security. Her research appears in Information Systems Research, MIS Quarterly, Journal of Management Information Systems, Information Systems Journal, Journal of Organizational and End User Computing, International Journal of Human–Computer Studies, International Journal of Human–Computer Studies, and Communications of the ACM. Alexandra has been teaching business data communications to both undergraduate and graduate students for several years. In addition, she has been teaching classes on information technology strategy and most recently won the Dean’s Award for Undergraduate Teaching Excellence while teaching at the University of Arizona. Dr. Jerry FitzGerald wrote the early editions of this book in the 1980s. At the time, he was the principal in Jerry FitzGerald & Associates, a firm he started in 1977.
Page 16
Chapter 11
75ca7225c221-0
PREFACE The field of data communications has grown faster and become more important than computer processing itself. Though they go hand in hand, the ability to communicate and connect with other computers and mobile devices is what makes or breaks a business today. There are three trends that support this notion. First, the wireless LAN and Bring-Your-Own-Device (BYOD) allow us to stay connected not only with the workplace but also with family and friends. Second, computers and networks are becoming an essential part of not only computers but also devices we use for other purpose, such as home appliances. This Internet of Things allows you to set the thermostat in your home from your mobile phone, can help you cook a dinner, or eventually can allow you to drive to work without ever touching the steering wheel. Lastly, we see that a lot of life is moving online. At first this started with games, but education, politics, and activism followed swiftly. Therefore, understanding how networks work; how they should be set up to support scalability, mobility, and security; and how to manage them is of utmost importance to any business. This need will call not only for engineers who deeply understand the technical aspects of networks but also for highly social individuals who embrace technology in creative ways to allow business to achieve a competitive edge through utilizing this technology. So the call is for you who are reading this book—you are at the right place at the right time! PURPOSE OF THIS BOOK Our goal is to combine the fundamental concepts of data communications and networking with practical applications. Although technologies and applications change rapidly, the fundamental concepts evolve much more slowly; they provide the foundation from which new technologies and applications can be understood, evaluated, and compared. This book has two intended audiences. First and foremost, it is a university textbook. Each chapter
Page 17
Chapter 11
1a77dd76cf0c-1
This book has two intended audiences. First and foremost, it is a university textbook. Each chapter introduces, describes, and then summarizes fundamental concepts and applications. Management Focus boxes highlight key issues and describe how networks are actually being used today. Technical Focus boxes highlight key technical issues and provide additional detail. Mini case studies at the end of each chapter provide the opportunity to apply these technical and management concepts. Hands-on exercises help to reinforce the concepts introduced in the chapter. Moreover, the text is accompanied by a detailed Instructor’s Manual that provides additional background information, teaching tips, and sources of material for student exercises, assignments, and exams. Finally, our Web page contains supplements to our book. Second, this book is intended for the professional who works in data communications and networking. The book has many detailed descriptions of the technical aspects of communications from a business perspective. Moreover, managerial, technical, and sales personnel can use this book to gain a better understanding of fundamental concepts and trade-offs not presented in technical books or product summaries. WHAT’S NEW IN THIS EDITION This edition maintains the three main themes of the prior edition, namely, (1) how networks work (Chapters 1–5); (2) network technologies (Chapters 6–10); and (3) network security and management (Chapters 11 and 12). In the new edition, we removed older technologies and replaced them with new ones. Accordingly, new hands-on activities and questions have been added at the end of each chapter that guide students in understanding how to select technologies to build a network that would support an organization’s business needs. In addition to this overarching change, the thirteenth edition has three major changes from the twelfth edition: First, at the end of each chapter, in addition to providing key implications for cyber security that arise
Page 17
Chapter 11
71dc7c223102-2
from the topics discussed in the chapter, we also introduce Tech Updates. We draw implications that focus on improving the management of networks and information systems as well as implications for cyber security of an individual and an organization. Tech Updates offer two cybersecurity topics per chapter that
Page 17
Chapter 11
5049ab7b3718-0
help students to expand their knowledge of cybersecurity and see how it relates to the material covered in the chapter. Second, we have revised Chapter 2 to use a new framework for application architecture that includes application services. Third, we have revised the WAN chapter (Chapter 9) to include the rapidly changing WAN environment and Software Defined Networking. LAB EXERCISES www.wiley.com/go/fitzgerald/datacommunications14e This edition includes an online lab manual with many hands-on exercises that can be used in a networking lab. These exercises include configuring servers and other additional practical topics. ONLINE SUPPLEMENTS FOR INSTRUCTORS www.wiley.com/go/fitzgerald/datacommunications14e Instructor’s supplements comprise an Instructor’s Manual that includes teaching tips, war stories, and answers to end-of-chapter questions; a Test Bank that includes true-false, multiple choice, short answer, and essay test questions for each chapter; and Lecture Slides in PowerPoint for classroom presentations. All are available on the instructor’s book companion site. E-BOOK Wiley E-Text: Powered by VitalSource offers students continuing access to materials for their course. Your students can access content on a mobile device, online from any Internet-connected computer, or by a computer via download. With dynamic features built into this e-text, students can search across content, highlight, and take notes that they can share with teachers and classmates. Readers will also have access to interactive images and embedded podcasts. Visit www.wiley.com/go/fitzgerald/datacommunications14e for more information. ACKNOWLEDGMENTS Our thanks to the many people who helped in preparing this edition. Specifically, we want to thank the staff at John Wiley & Sons for their support. Alan Dennis Bloomington, Indiana www.kelley.indiana.edu/ardennis
Page 18
Chapter 11
0e76b4a4b586-1
Bloomington, Indiana www.kelley.indiana.edu/ardennis Alexandra Durcikova Norman, Oklahoma http://www.ou.edu/price/mis/people/alexandra_durcikova.html
Page 18
Chapter 11
6150ca05e1f0-0
PART ONE INTRODUCTION
Page 19
Chapter 11
923d0b06c1d8-0
CHAPTER 1 INTRODUCTION TO DATA COMMUNICATIONS This chapter introduces the basic concepts of data communications. It describes why it is important to study data communications, how data communications fit within the discipline of Management Information Systems (MIS), and introduces you to the three fundamental questions that this book answers. Next, it discusses the basic types and components of a data communications network. Also, it examines the importance of a network model based on layers. Finally, it describes the three key trends in the future of networking. OBJECTIVES Be aware of the three fundamental questions this book answers Be aware of the applications of data communications networks Be aware of how data communications fit within the discipline of MIS Be familiar with the major components of and types of networks Understand the role of network layers Be familiar with the role of network standards Be aware of cyber security issues Be aware of three key trends in communications and networking OUTLINE 1.1 Introduction 1.2 Data Communications Networks 1.2.1 Components of a Network 1.2.2 Types of Networks 1.3 Network Models 1.3.1 Open Systems Interconnection Reference Model 1.3.2 Internet Model 1.3.3 Message Transmission Using Layers 1.4 Network Standards 1.4.1 The Importance of Standards 1.4.2 The Standards-Making Process 1.4.3 Common Standards 1.5 Future Trends 1.5.1 Wireless LAN and BYOD 1.5.2 The Internet of Things 1.5.3 Massively Online 1.6 Implications for Cyber Security Summary
Page 20
Chapter 11
04c54b563141-0
1.1 INTRODUCTION What Internet connection should you use? Cable modem or DSL (formally called Digital Subscriber Line)? Cable modems are supposedly faster than DSL, providing data speeds of 50 Mbps to DSL’s 1.5–25 Mbps (million bits per second). One cable company used a tortoise to represent DSL in advertisements. So which is faster? We’ll give you a hint. Which won the race in the fable, the tortoise or the hare? By the time you finish this book, you’ll understand which is faster and why, as well as why choosing the right company as your Internet service provider (ISP) is probably more important than choosing the right technology. Over the past decade or so, it has become clear that the world has changed forever due to the third and fourth Industrial Revolutions. The first Industrial Revolution revolutionized the way people worked at the end of the 18th century by introducing machines, steam and water power. New companies and industries emerged, and old ones died off. The second Industrial Revolution in the late 19th century is known for starting mass production, electricity, and the telephone. The third Industrial Revolution, in the second half of the 20th century, is revolutionizing the way people work through electronics and information technology (IT) to automate production. The fourth Industrial Revolution is currently underway. It builds on the technological advances of the third Industrial Revolution, but the way it merges the physical, digital, and biological worlds is unprecedented. It is deeply rooted in the Internet and digitization. Digitization enables us to build a world where interactions can happen in real time across different continents (think about email, instant messaging, and exchange of data between different devices). These interactions are possible because of
Page 21
Chapter 11
de6c8e705aa4-1
messaging, and exchange of data between different devices). These interactions are possible because of technologies such as cloud, big data, big data analytics, and the Internet of Things. But the technology that enables all these technologies to communicate is the high-speed data communication network, that is, the Internet. Today, the value of a high-speed data communications network is that it brings people together in a way never before possible. In the 1800s, it took several weeks for a message to reach North America by ship from England. By the 1900s, it could be transmitted within an hour. Today, it can be transmitted in seconds. Collapsing the information lag to Internet speeds means that people can communicate and access information anywhere in the world regardless of their physical location. In fact, today’s problem is that we cannot handle the quantities of information we receive. Data communications and networking is a truly global area of study, both because the technology enables global communication and because new technologies and applications often emerge from a variety of countries and spread rapidly around the world. The World Wide Web, for example, was born in a Swiss research lab, was nurtured through its first years primarily by European universities and exploded into mainstream popular culture because of a development at an American research lab. One of the problems in studying a global phenomenon lies in explaining the different political and regulatory issues that have evolved and currently exist in different parts of the world. Rather than attempt to explain the different paths taken by different countries, we have chosen simplicity instead. Historically, the majority of readers of previous editions of this book have come from North America. Therefore, although we retain a global focus on technology and its business implications, we focus mostly on North America. This book answers three fundamental questions.
Page 21
Chapter 11
fdb6a1f8ed7d-2
America. This book answers three fundamental questions. First, how does the Internet work? When you access a website using your computer, laptop, iPad, or smartphone, what happens so that the page opens in your Web browser? This is the focus in Chapters 1–5. The short answer is that the software on your computer (or any device) creates a message composed in different software languages (HTTP, TCP/IP, and Ethernet are common) that requests the page you clicked. This message is then broken up into a series of smaller parts that we call packets. Each packet is transmitted to the nearest router, which is a special-purpose computer whose primary job is to find the best route for these packets to their final destination. The packets move from router to router over the Internet until they reach the Web server, which puts the packets back together into the same message that your computer created. The Web server reads your request and then sends the page back to you in the same way—by composing a message using HTTP, TCP/IP, and Ethernet and then sending it as a series of smaller packets back through the Internet that the software on your computer puts together into the page
Page 21
Chapter 11
f534a39fb39a-0
you requested. You might have heard a news story that the U.S. or Chinese government can read your email or see what websites you’re visiting. A more shocking truth is that the person sitting next you at a coffee shop might be doing exactly the same thing—reading all the packets that come from or go to your laptop. How is this possible, you ask? After finishing Chapter 5, you will know exactly how this is possible. Second, how do I design a network? This is the focus of Chapters 6–10. We often think about networks in four layers. The first layer is the Local Area Network, or the LAN (either wired or wireless), which enables users like you and me to access the network. The second is the backbone network that connects the different LANs within a building. The third is the core network that connects different buildings on a company’s campus. The final layer is connections we have to the other campuses within the organization and to the Internet. Each of these layers has slightly different concerns, so the way we design networks for them and the technologies we use are slightly different. Although this describes the standard for building corporate networks, you will have a much better understanding of how your wireless router at home works. Perhaps more importantly, you’ll learn why buying the newest and fastest wireless router for your house or apartment is probably not a good way to spend your money. Finally, how do I manage my network to make sure it is secure, provides good performance, and doesn’t cost too much? This is the focus of Chapters 11 and 12. Would it surprise you to learn that most companies spend between $1,500 and $3,500 per computer per year on network management and security? Yup, we spend way more on network management and security each year than we spend to buy the computer in
Page 22
Chapter 11
3cc44403b6ef-1
spend way more on network management and security each year than we spend to buy the computer in the first place. And that’s for well-run networks; poorly run networks cost a lot more. Many people think network security is a technical problem, and, to some extent, it is. However, the things people do and don’t do cause more security risks than not having the latest technology. According to Symantec, one of the leading companies that sell antivirus software, about half of all security threats are not prevented by their software. These threats are called targeted attacks, such as phishing attacks (which are emails that look real but instead take you to fake websites) or ransomware (software apps that appear to be useful but actually lock your computer and demand a payment to unlock it). Therefore, network management is as much a people management issue as it is a technology management issue. Most readers of this book will be taking classes towards their degree in management information systems (MIS) or a closely related field. How does this book relate to what MIS? Let us explain! MIS begins with an IT strategy—a plan for buying and/or building IT to help the organization accomplish its goals. For most companies, this means increasing revenues and/or decreasing costs. Companies must deploy the right IT to support their business operations. IT has four core capabilities within organizational settings: 1. Storing and Retrieving Data—Just like humans live in houses, data created by businesses and societies must live somewhere. The “house” for data is a database. There are many different kinds of databases, just like many different kinds of houses. The most frequently used database in organizations is an SQL database. 2. Analyzing and Visualizing Data—Managers need to able to make decisions regarding their business, such as: What is our bestselling product? Which regions bring in the most revenue? Which regions
Page 22
Chapter 11
5ab3bb1fc6be-2
such as: What is our bestselling product? Which regions bring in the most revenue? Which regions are losing money? These decisions are made using the data stored in databases. Data is retrieved from a database and imported to a software like Excel, Tableau, or PowerBI so that these business questions can be answered using a variety of techniques (e.g., aggregation, conditional aggregation, and charting). 3. Automating Data Operations—Many business operations are repeated over and over again, such as calculating the total amount of a items bought at a local store or an e-commerce web site, applying any discounts, and determining appropriate taxes. To automate these kinds of every day transactions on data, we have a wide variety of IT we can buy or build using a variety of programming languages. 4. Protecting Data—The first three core capabilities are designed to make it easy to store and access data. However, this means that an intruder or malicious employee could also access the data. Therefore, organizations must spend resources to protect their data and ensuring the confidentiality, integrity, and availability of the data. We will discuss security capability in Chapter 11.
Page 22
Chapter 11
50751c6b5812-0
FIGURE 1-1 What is MIS? In order for the IT strategy to implement the core capabilities, data communications and networking infrastructure must be available. You are using this infrastructure anytime you use the Internet on your laptop and even your cell phone. MIS core capabilities and the IT strategy rest on a solid infrastructure (see Figure 1-1). Therefore, understanding how data communications and networking works will enable you to understand what it takes for a modern organization to stay in business and for you to be able to work and connect with your family and friends. MANAGEMENT FOCUS 1-1 Career Opportunities It’s a great time to be in information technology (IT)! The technology-fueled new economy has dramatically increased the demand for skilled IT professionals. According to the U.S. Bureau of Labor Statistics and Career Profiles (http://www.careerprofiles.info), 2 out of 10 fastest growing occupations are computer network administrator and computer systems analyst, which is expected to grow by 22% over the next 10 years with an annual median salary of $72,500—not counting bonuses. There are two reasons for this growth. First, companies have to continuously upgrade their networks and thus need skilled employees to support their expanding IT infrastructure. Second, people are spending more time on their mobile devices, and because employers are allowing them to use these personal devices at work (i.e., BYOD, or bring your own device), the network infrastructure has to support the data that flow from these devices as well as to make sure that they don’t pose a security risk.
Page 23
Chapter 11
8b0d9893a51e-0
With a few years of experience, there is the possibility to work as an information systems manager, for which the median annual pay is as high as $117,780. An information systems manager plans, coordinates, and directs IT-related activities in such a way that they can fully support the goals of any business. Thus, this job requires a good understanding not only of the business but also of the technology so that appropriate and reliable technology can be implemented at a reasonable cost to keep everything operating smoothly and to guard against cybercriminals. Because of the expanding job market for IT and networking-related jobs, certifications become important. Most large vendors of network technologies, such as the Microsoft Corporation and Cisco Systems Inc., provide certification processes (usually a series of courses and formal exams) so that individuals can document their knowledge. Certified network professionals often earn $10,000 to $15,000 more than similarly skilled uncertified professionals—provided that they continue to learn and maintain their certification as new technologies emerge. Sources: http://jobs.aol.com, “In Demand Careers That Pay $100,00 a Year or More”; www.careerpath.com, “Today’s 20 Fastest- Growing Occupations”; www.cnn.com, “30 Jobs Needing Most Workers in Next Decade,” http://www.careerprofiles.info/top- careers.html. By the time you finish this book, you’ll understand how networks work, how to design networks, and how to manage networks. You won’t be an expert, but you’ll be ready to enter an organization and have an educated conversation about the role of data communications and networks or move on to more advanced courses and workshops. 1.2 DATA COMMUNICATIONS NETWORKS Data communications is the movement of computer information from one point to another by means of electrical or optical transmission systems. Such systems are often called data communications networks.
Page 24
Chapter 11
f389bb799a30-1
electrical or optical transmission systems. Such systems are often called data communications networks. This is in contrast to the broader term telecommunications, which includes the transmission of voice and video (images and graphics) as well as data and usually implies longer distances. In general, data communications networks collect data from personal computers and other devices and transmit those data to a central server that is a more powerful personal computer, minicomputer, or mainframe, or they perform the reverse process, or some combination of the two. Data communications networks facilitate more efficient use of computers and improve the day-to-day control of a business by providing faster information flow. They also provide message transfer services to allow computer users to talk to one another via email, chat, and video streaming. TECHNICAL FOCUS 1-1 Internet Domain Names Internet address names are strictly controlled; otherwise, someone could add a computer to the Internet that had the same address as another computer. Each address name has two parts, the computer name and its domain. The general format of an Internet address is therefore computer.domain. Some computer names have several parts separated by periods, so some addresses have the format computer.computer.computer.domain. For example, the main university Web server at Indiana University (IU) is called www.indiana.edu, whereas the Web server for the Kelley School of Business at IU is www.kelley.indiana.edu. Since the Internet began in the United States, the American address board was the first to assign domain names to indicate types of organizations. Some common U.S. domain names are as follows: EDU for an educational institution, usually a university COM for a commercial business GOV for a government department or agency MIL for a military unit ORG for a nonprofit organization
Page 24
Chapter 11
b469db1ca758-0
As networks in other countries were connected to the Internet, they were assigned their own domain names. Some international domain names are as follows: CA for Canada AU for Australia UK for the United Kingdom DE for Germany New top-level domains that focus on specific types of businesses continue to be introduced, such as the following: AERO for aerospace companies MUSEUM for museums NAME for individuals PRO for professionals, such as accountants and lawyers BIZ for businesses Many international domains structure their addresses in much the same way as the United States does. For example, Australia uses EDU to indicate academic institutions, so an address such as xyz.edu.au would indicate an Australian university. For a full list of domain names, see www.iana.org/domains/root/db. 1.2.1 Components of a Network There are three basic hardware components for a data communications network: a server (e.g., personal computer, mainframe), a client (e.g., personal computer, terminal), and a circuit (e.g., cable, modem) over which messages flow. Both the server and client also need special-purpose network software that enables them to communicate. The server stores data or software that can be accessed by the clients. In client–server computing, several servers may work together over the network with a client computer to support the business application. The client is the input–output hardware device at the user’s end of a communication circuit. It typically provides users with access to the network and the data and software on the server. The circuit is the pathway through which the messages travel. It is typically a copper wire, although fiber-optic cable and wireless transmission are becoming common. There are many devices in the circuit that perform special functions such as switches and routers.
Page 25
Chapter 11
bd68910041d3-1
that perform special functions such as switches and routers. Strictly speaking, a network does not need a server. Some networks are designed to connect a set of similar computers that share their data and software with each other. Such networks are called peer-to- peer networks because the computers function as equals, rather than relying on a central server to store the needed data and software. Figure 1-2 shows a small network that has several personal computers (clients) connected through a switch and cables (circuit) and wirelessly through a wireless access point (AP). In this network, messages move through the switch to and from the computers. The router is a special device that connects two or more networks. The router enables computers on this network to communicate with computers on the same network or on other networks (e.g., the Internet). The network in Figure 1-3 has three servers. Although one server can perform many functions, networks are often designed so that a separate computer is used to provide different services. The file server stores data and software that can be used by computers on the network. The Web server stores documents and graphics that can be accessed from any Web browser, such as Internet Explorer. The Web server can respond to requests from computers on this network or any computer on the Internet. The mail server handles and delivers email over the network. Servers are usually personal computers (often more powerful than the other personal computers on the network) but may be mainframes too.
Page 25
Chapter 11
4049247d344e-0
FIGURE 1-2 Example of a local area network (LAN) FIGURE 1-3 Network architecture components There are three computers that make networks what they are. These are the client, the server, and the router. The client initiates a communication with the server by sending a request to the server. Once the server receives the request, it processes it, and responds with a response. The router makes this
Page 26
Chapter 11
1a2b13dc5b74-0
connection possible. All three devices are computers, and their hardware is pretty much the same—they have a motherboard with CPU (central processing unit), memory, and some storage space. However, only the client had a screen, keyboard, and mouse. Why? Are the server and router less deserving? No. Their purpose is not to receive an input from the user (keyboard or mouse) or display output (screen) but rather to respond to requests, so they have no need for. Pretty clever, isn’t it! You probably know that a client can have a variety of client operating systems (e.g., Windows, Mac OS, or Linux) and application software (e.g., a web browser, outlook). Likewise, a server can have different operating systems (e.g., Windows, Linux, or z/OS) and application software (e.g., web server software, Exchange). What do you think is the operating system on a router? It turns out that about 90% of routers run Cisco IOS (Inter-operating system) that was specifically created for routers. In fact, Cisco IOS is the second most popular operating system in the world, ahead of Mac and Linux. Interesting, right? 1.2.2 Types of Networks There are many different ways to categorize networks. One of the most common ways is to look at the geographic scope of the network. Figure 1-3 illustrates three types of networks: local area networks (LANs), backbone networks (BNs), and wide area networks (WANs). The distinctions among these are becoming blurry because some network technologies now used in LANs were originally developed for WANs, and vice versa. Any rigid classification of technologies is certain to have exceptions. A local area network (LAN) is a group of computers located in the same general area. A LAN covers a
Page 27
Chapter 11
2069ae518ff2-1
clearly defined small area, such as one floor or work area, a single building, or a group of buildings. The upper-left diagram in Figure 1-3 shows a small LAN located in the records building at the former McClellan Air Force Base in Sacramento. LANs support high-speed data transmission compared with standard telephone circuits, commonly operating 100 million bits per second (100 Mbps). LANs and wireless LANs are discussed in detail in Chapter 6. Most LANs are connected to a backbone network (BN), a larger, central network connecting several LANs, other BNs, MANs, and WANs. BNs typically span from hundreds of feet to several miles and provide very high-speed data transmission, commonly 100–1,000 Mbps. The second diagram in Figure 1- 3 shows a BN that connects the LANs located in several buildings at McClellan Air Force Base. BNs are discussed in detail in Chapter 7. Wide area networks (WANs) connect BNs and MANs (see Figure 1-1). Most organizations do not build their own WANs by laying cable, building microwave towers, or sending up satellites (unless they have unusually heavy data transmission needs or highly specialized requirements, such as those of the Department of Defense). Instead, most organizations lease circuits from IXCs (e.g., AT&T, Sprint) and use those to transmit their data. WAN circuits provided by IXCs come in all types and sizes but typically span hundreds or thousands of miles and provide data transmission rates from 64 Kbps to 10 Gbps. WANs are discussed in detail in Chapter 8. Two other common terms are intranets and extranets. An intranet is a LAN that uses the same
Page 27
Chapter 11
e11d2f5775f6-2
technologies as the Internet (e.g., Web servers, Java, HTML [Hypertext Markup Language]) but is open to only those inside the organization. For example, although some pages on a Web server may be open to the public and accessible by anyone on the Internet, some pages may be on an intranet and therefore hidden from those who connect to the Web server from the Internet at large. Sometimes, an intranet is provided by a completely separate Web server hidden from the Internet. The intranet for the Information Systems Department at Indiana University, for example, provides information on faculty expense budgets, class scheduling for future semesters (e.g., room, instructor), and discussion forums. An extranet is similar to an intranet in that it, too, uses the same technologies as the Internet but instead is provided to invited users outside the organization who access it over the Internet. It can provide access to information services, inventories, and other internal organizational databases that are provided only to customers, suppliers, or those who have paid for access. Typically, users are given passwords to gain access, but more sophisticated technologies such as smart cards or special software may also be required. Many universities provide extranets for Web-based courses so that only those students enrolled in the course can access course materials and discussions.
Page 27
Chapter 11
62afdd3e5d40-0
1.3 NETWORK MODELS There are many ways to describe and analyze data communications networks. All networks provide the same basic functions to transfer a message from sender to receiver, but each network can use different network hardware and software to provide these functions. All of these hardware and software products have to work together to successfully transfer a message. One way to accomplish this is to break the entire set of communications functions into a series of layers, each of which can be defined separately. In this way, vendors can develop software and hardware to provide the functions of each layer separately. The software or hardware can work in any manner and can be easily updated and improved, as long as the interface between that layer and the ones around it remains unchanged. Each piece of hardware and software can then work together in the overall network. There are many different ways in which the network layers can be designed. The two most important network models are the Open Systems Interconnection Reference (OSI) model and the Internet model. Of the two, the Internet model is the most commonly used; few people use the OSI model, although understand it is commonly required for network certification exams. 1.3.1 Open Systems Interconnection Reference Model The Open Systems Interconnection Reference model (usually called the OSI model for short) helped change the face of network computing. Before the OSI model, most commercial networks used by businesses were built using nonstandardized technologies developed by one vendor (remember that the Internet was in use at the time but was not widespread and certainly was not commercial). During the late 1970s, the International Organization for Standardization (ISO) created the Open System Interconnection Subcommittee, whose task was to develop a framework of standards for computer-to-computer communications. In 1984, this effort produced the OSI model.
Page 28
Chapter 11
630066a855b1-1
communications. In 1984, this effort produced the OSI model. The OSI model is the most talked about and most referred to network model. If you choose a career in networking, questions about the OSI model will be on the network certification exams offered by Microsoft, Cisco, and other vendors of network hardware and software. However, you will probably never use a network based on the OSI model. Simply put, the OSI model never caught on commercially in North America, although some European networks use it, and some network components developed for use in the United States arguably use parts of it. Most networks today use the Internet model, which is discussed in the next section. However, because there are many similarities between the OSI model and the Internet model, and because most people in networking are expected to know the OSI model, we discuss it here. The OSI model has seven layers (see Figure 1-4). Layer 1: Physical Layer The physical layer is concerned primarily with transmitting data bits (zeros or ones) over a communication circuit. This layer defines the rules by which ones and zeros are transmitted, such as voltages of electricity, number of bits sent per second, and the physical format of the cables and connectors used. Layer 2: Data Link Layer The data link layer manages the physical transmission circuit in layer 1 and transforms it into a circuit that is free of transmission errors as far as layers above are concerned. Because layer 1 accepts and transmits only a raw stream of bits without understanding their meaning or structure, the data link layer must create and recognize message boundaries; that is, it must mark where a message starts and where it ends. Another major task of layer 2 is to solve the problems caused by damaged, lost, or duplicate messages so the succeeding layers are shielded from transmission errors. Thus, layer 2 performs error
Page 28
Chapter 11
7a734b999759-2
messages so the succeeding layers are shielded from transmission errors. Thus, layer 2 performs error detection and correction. It also decides when a device can transmit so that two computers do not try to transmit at the same time. We say, that data link layer has a local responsibility.
Page 28
Chapter 11
1c0fb952ef95-0
FIGURE 1-4 Network models. OSI = Open Systems Interconnection Reference Layer 3: Network Layer The network layer performs routing. It determines the next computer to which the message should be sent, so it can follow the best route through the network and finds the full address for that computer if needed. Layer 4: Transport Layer The transport layer deals with end-to-end issues, such as procedures for entering and departing from the network. It establishes, maintains, and terminates logical connections for the transfer of data between the original sender and the final destination of the message. It is responsible for breaking a large data transmission into smaller packets (if needed), ensuring that all the packets have been received, eliminating duplicate packets, and performing flow control to ensure that no computer is overwhelmed by the number of messages it receives. Although error control is performed by the data link layer, the transport layer can also perform error checking. Therefore, transport layer has a global responsibility. Layer 5: Session Layer The session layer is responsible for managing and structuring all sessions. Session initiation must arrange for all the desired and required services between session participants, such as logging on to circuit equipment, transferring files, and performing security checks. Session termination provides an orderly way to end the session, as well as a means to abort a session prematurely. It may have some redundancy built in to recover from a broken transport (layer 4) connection in case of failure. The session layer also handles session accounting so the correct party receives the bill. Layer 6: Presentation Layer The presentation layer formats the data for presentation to the user. Its job is to accommodate different interfaces on different computers so the application program need not worry about them. It is concerned with displaying, formatting, and editing user inputs and outputs. For example, layer 6 might perform data
Page 29
Chapter 11
2b0ee964b6c8-1
compression, translation between different data formats, and screen formatting. Any function (except those in layers 1 through 5) that is requested sufficiently often to warrant finding a general solution is placed in the presentation layer, although some of these functions can be performed by separate hardware and software (e.g., encryption). Layer 7: Application Layer The application layer is the end user’s access to the network. The primary purpose is to provide a set of
Page 29
Chapter 11
39b301c0b527-0
utilities for application programs. Each user program determines the set of messages and any action it might take on receipt of a message. Other network-specific applications at this layer include network monitoring and network management. 1.3.2 Internet Model The network model that dominates current hardware and software is a more simple five-layer Internet model. Unlike the OSI model that was developed by formal committees, the Internet model evolved from the work of thousands of people who developed pieces of the Internet. The OSI model is a formal standard that is documented in one standard, but the Internet model has never been formally defined; it has to be interpreted from a number of standards. The two models have very much in common (see Figure 1-4); simply put, the Internet model collapses the top three OSI layers into one layer. Because it is clear that the Internet has won the “war,” we use the five-layer Internet model for the rest of this book. Layer 1: The Physical Layer The physical layer in the Internet model, as in the OSI model, is the physical connection between the sender and receiver. Its role is to transfer a series of electrical, radio, or light signals through the circuit. The physical layer includes all the hardware devices (e.g., computers, modems, and switches) and physical media (e.g., cables and satellites). The physical layer specifies the type of connection and the electrical signals, radio waves, or light pulses that pass through it. Chapter 3 discusses the physical layer in detail. Layer 2: The Data Link Layer The data link layer is responsible for moving a message from one computer to the next computer in the network path from the sender to the receiver. The data link layer in the Internet model performs the same three functions as the data link layer in the OSI model. First, it controls the physical layer by deciding
Page 30
Chapter 11
8a1d1b2a718f-1
when to transmit messages over the media. Second, it formats the messages by indicating where they start and end. Third, it detects and may correct any errors that have occurred during transmission. Chapter 4 discusses the data link layer in detail. Layer 3: The Network Layer The network layer in the Internet model performs the same functions as the network layer in the OSI model. First, it performs routing, in that it selects the next computer to which the message should be sent. Second, it can find the address of that computer if it doesn’t already know it. Chapter 5 discusses the network layer in detail. Layer 4: The Transport Layer The transport layer in the Internet model is very similar to the transport layer in the OSI model. It performs two functions. First, it is responsible for linking the application layer software to the network and establishing end-to-end connections between the sender and receiver when such connections are needed. Second, it is responsible for breaking long messages into several smaller messages to make them easier to transmit and then recombining the smaller messages back into the original larger message at the receiving end. The transport layer can also detect lost messages and request that they be resent. Chapter 5 discusses the transport layer in detail. Layer 5: Application Layer The application layer is the application software used by the network user and includes much of what the OSI model contains in the application, presentation, and session layers. It is the user’s access to the network. By using the application software, the user defines what messages are sent over the network. Because it is the layer that most people understand best and because starting at the top sometimes helps people understand better, Chapter 2 begins with the application layer. It discusses the architecture of network applications and several types of network application software and the types of messages they generate. Groups of Layers
Page 30
Chapter 11
1f354ca1c507-0
The layers in the Internet are often so closely coupled that decisions in one layer impose certain requirements on other layers. The data link layer and the physical layer are closely tied together because the data link layer controls the physical layer in terms of when the physical layer can transmit. Because these two layers are so closely tied together, decisions about the data link layer often drive the decisions about the physical layer. For this reason, some people group the physical and data link layers together and call them the hardware layers. Likewise, the transport and network layers are so closely coupled that sometimes these layers are called the internetwork layers (see Figure 1-4). When you design a network, you often think about the network design in terms of three groups of layers: the hardware layers (physical and data link), the internetwork layers (network and transport), and the application layer. 1.3.3 Message Transmission Using Layers Each computer in the network has software that operates at each of the layers and performs the functions required by those layers (the physical layer is hardware, not software). Each layer in the network uses a formal language, or protocol, that is simply a set of rules that define what the layer will do and that provides a clearly defined set of messages that software at the layer needs to understand. For example, the protocol used for Web applications is HTTP (Hypertext Transfer Protocol, which is described in more detail in Chapter 2). In general, all messages sent in a network pass through all layers. All layers except the physical layer create a new Protocol Data Unit (PDU) as the message passes through them. The PDU contains information that is needed to transmit the message through the network. Some experts use the word packet to mean a PDU. Figure 1-5 shows how a message requesting a Web page would be sent on the Internet.
Page 31
Chapter 11
1ad761bd9b41-1
the Internet. FIGURE 1-5 Message transmission using layers. IP = Internet Protocol; HTTP = Hypertext Transfer Protocol; TCP = Transmission Control Protocol
Page 31
Chapter 11
bf550c38aed9-0
Application Layer First, the user creates a message at the application layer using a Web browser by clicking on a link (e.g., get the home page at www.somebody.com). The browser translates the user’s message (the click on the Web link) into HTTP. The rules of HTTP define a specific PDU—called an HTTP packet—that all Web browsers must use when they request a Web page. For now, you can think of the HTTP packet as an envelope into which the user’s message (get the Web page) is placed. In the same way that an envelope placed in the mail needs certain information written in certain places (e.g., return address, destination address), so too does the HTTP packet. The Web browser fills in the necessary information in the HTTP packet, drops the user’s request inside the packet, then passes the HTTP packet (containing the Web page request) to the transport layer. Transport Layer The transport layer on the Internet uses a protocol called TCP (transmission control protocol), and it, too, has its own rules and its own PDUs. TCP is responsible for breaking large files into smaller packets and for opening a connection to the server for the transfer of a large set of packets. The transport layer places the HTTP packet inside a TCP PDU (which is called a TCP segment), fills in the information needed by the TCP segment, and passes the TCP segment (which contains the HTTP packet, which, in turn, contains the message) to the network layer. Network Layer The network layer on the Internet uses a protocol called IP (Internet Protocol), which has its rules and PDUs. IP selects the next stop on the message’s route through the network. It places the TCP segment inside an IP PDU, which is called an IP packet, and passes the IP packet, which contains the TCP segment,
Page 32
Chapter 11
ff6dbeb754fa-1
which, in turn, contains the HTTP packet, which, in turn, contains the message, to the data link layer. Data Link Layer If you are connecting to the Internet using a LAN, your data link layer may use a protocol called Ethernet, which also has its own rules and PDUs. The data link layer formats the message with start and stop markers, adds error checks information, places the IP packet inside an Ethernet PDU, which is called an Ethernet frame, and instructs the physical hardware to transmit the Ethernet frame, which contains the IP packet, which contains the TCP segment, which contains the HTTP packet, which contains the message. Physical Layer The physical layer in this case is network cable connecting your computer to the rest of the network. The computer will take the Ethernet frame (complete with the IP packet, the TCP segment, the HTTP packet, and the message) and send it as a series of electrical pulses through your cable to the server. When the server gets the message, this process is performed in reverse. The physical hardware translates the electrical pulses into computer data and passes the message to the data link layer. The data link layer uses the start and stop markers in the Ethernet frame to identify the message. The data link layer checks for errors and, if it discovers one, requests that the message be resent. If a message is received without error, the data link layer will strip off the Ethernet frame and pass the IP packet (which contains the TCP segment, the HTTP packet, and the message) to the network layer. The network layer checks the IP address and, if it is destined for this computer, strips off the IP packet and passes the TCP segment, which contains the HTTP packet and the message, to the transport layer. The transport layer processes the message, strips off the TCP segment, and passes the HTTP packet to the application layer for processing.
Page 32
Chapter 11
e72693efdc9b-2
The application layer (i.e., the Web server) reads the HTTP packet and the message it contains (the request for the Web page) and processes it by generating an HTTP packet containing the Web page you requested. Then the process starts again as the page is sent back to you. The Pros and Cons of Using Layers There are three important points in this example. First, there are many different software packages and many different PDUs that operate at different layers to successfully transfer a message. Networking is in some ways similar to the Russian matryoshka, nested dolls that fit neatly inside each other. This is called
Page 32
Chapter 11
e35107a1af15-0
encapsulation, because the PDU at a higher level is placed inside the PDU at a lower level so that the lower-level PDU encapsulates the higher-level one. The major advantage of using different software and protocols is that it is easy to develop new software, because all one has to do is write software for one level at a time. The developers of Web applications, for example, do not need to write software to perform error checking or routing, because those are performed by the data link and network layers. Developers can simply assume those functions are performed and just focus on the application layer. Similarly, it is simple to change the software at any level (or add new application protocols), as long as the interface between that layer and the ones around it remains unchanged. Second, it is important to note that for communication to be successful, each layer in one computer must be able to communicate with its matching layer in the other computer. For example, the physical layer connecting the client and server must use the same type of electrical signals to enable each to understand the other (or there must be a device to translate between them). Ensuring that the software used at the different layers is the same as accomplished by using standards. A standard defines a set of rules, called protocols, that explain exactly how hardware and software that conform to the standard are required to operate. Any hardware and software that conform to a standard can communicate with any other hardware and software that conform to the same standard. Without standards, it would be virtually impossible for computers to communicate. Third, the major disadvantage of using a layered network model is that it is somewhat inefficient. Because there are several layers, each with its own software and PDUs, sending a message involves many software programs (one for each protocol) and many PDUs. The PDUs add to the total amount of data that must be
Page 33
Chapter 11
70f7b9080072-1
sent (thus increasing the time it takes to transmit), and the different software packages increase the processing power needed in computers. Because the protocols are used at different layers and are stacked on top of one another (take another look at Figure 1-5), the set of software used to understand the different protocols is often called a protocol stack. 1.4 NETWORK STANDARDS 1.4.1 The Importance of Standards Standards are necessary in almost every business and public service entity. For example, before 1904, fire hose couplings in the United States were not standard, which meant a fire department in one community could not help in another community. The transmission of electric current was not standardized until the end of the nineteenth century, so customers had to choose between Thomas Edison’s direct current (DC) and George Westinghouse’s alternating current (AC). The primary reason for standards is to ensure that hardware and software produced by different vendors can work together. Without networking standards, it would be difficult—if not impossible—to develop networks that easily share information. Standards also mean that customers are not locked into one vendor. They can buy hardware and software from any vendor whose equipment meets the standard. In this way, standards help to promote more competition and hold down prices. The use of standards makes it much easier to develop software and hardware that link different networks because software and hardware can be developed one layer at a time. 1.4.2 The Standards-Making Process There are two types of standards: de jure and de facto. A de jure standard is developed by an official industry or a government body and is often called a formal standard. For example, there are de jure standards for applications such as Web browsers (e.g., HTTP, HTML), for network layer software (e.g.,
Page 33
Chapter 11
2a235f6608c8-2
IP), for data link layer software (e.g., Ethernet IEEE 802.3), and for physical hardware (e.g., V.90 modems). De jure standards typically take several years to develop, during which time technology changes, making them less useful. De facto standards are those that emerge in the marketplace and are supported by several vendors but have no official standing. For example, Microsoft Windows is a product of one company and has not been formally recognized by any standards organization, yet it is a de facto standard. In the communications industry, de facto standards often become de jure standards once they have been widely accepted.
Page 33
Chapter 11
74fc8a44cb98-0
The de jure standardization process has three stages: specification, identification of choices, and acceptance. The specification stage consists of developing a nomenclature and identifying the problems to be addressed. In the identification of choices stage, those working on the standard identify the various solutions and choose the optimum solution from among the alternatives. Acceptance, which is the most difficult stage, consists of defining the solution and getting recognized industry leaders to agree on a single, uniform solution. As with many other organizational processes that have the potential to influence the sales of hardware and software, standards-making processes are not immune to corporate politics and the influence of national governments. International Organization for Standardization One of the most important standards-making bodies is the International Organization for Standardization (ISO), which makes technical recommendations about data communication interfaces (see www.iso.org). ISO is based in Geneva, Switzerland. The membership is composed of the national standards organizations of each ISO member country. International Telecommunications Union-Telecommunications Group The International Telecommunications Union-Telecommunications Group (ITU-T) is the technical standards-setting organization of the United Nations International Telecommunications Union, which is also based in Geneva (see www.itu.int). ITU is composed of representatives from about 200 member countries. Membership was originally focused on just the public telephone companies in each country, but a major reorganization in 1993 changed this, and ITU now seeks members among public- and private-sector organizations who operate computer or communications networks (e.g., RBOCs) or build software and equipment for them (e.g., AT&T). American National Standards Institute The American National Standards Institute (ANSI) is the coordinating organization for the U.S. national system of standards for both technology and nontechnology (see www.ansi.org). ANSI has about
Page 34
Chapter 11
ce4fdeaeb561-1
1,000 members from both public and private organizations in the United States. ANSI is a standardization organization, not a standards-making body, in that it accepts standards developed by other organizations and publishes them as American standards. Its role is to coordinate the development of voluntary national standards and to interact with the ISO to develop national standards that comply with the ISO’s international recommendations. ANSI is a voting participant in the ISO. MANAGEMENT FOCUS 1-2 How Network Protocols Become Standards There are many standards organizations around the world, but perhaps the best known is the Internet Engineering Task Force (IETF). IETF sets the standards that govern how much of the Internet operates. The IETF, like all standards organizations, tries to seek consensus among those involved before issuing a standard. Usually, a standard begins as a protocol (i.e., a language or set of rules for operating) developed by a vendor (e.g., HTML). When a protocol is proposed for standardization, the IETF forms a working group of technical experts to study it. The working group examines the protocol to identify potential problems and possible extensions and improvements, and then issues a report to the IETF. If the report is favorable, the IETF issues a Request for Comment (RFC) that describes the proposed standard and solicits comments from the entire world. Most large software companies likely to be affected by the proposed standard prepare detailed responses. Many “regular” Internet users also send their comments to the IETF. The IETF reviews the comments and possibly issues a new and improved RFC, which again is posted for more comments. Once no additional changes have been identified, it becomes a proposed standard.
Page 34
Chapter 11
b19e9d9531d8-0
Usually, several vendors adopt the proposed standard and develop products based on it. Once at least two vendors have developed hardware or software based on it and it has proven successful in operation, the proposed standard is changed to a draft standard. This is usually the final specification, although some protocols have been elevated to Internet standards, which usually signifies mature standards not likely to change. The process does not focus solely on technical issues; almost 90% of the IETF’s participants work for manufacturers and vendors, so market forces and politics often complicate matters. One former IETF chairperson who worked for a hardware manufacturer has been accused of trying to delay the standards process until his company had a product ready, although he and other IETF members deny this. Likewise, former IETF directors have complained that members try to standardize every product their firms produce, leading to a proliferation of standards, only a few of which are truly useful. Sources: “How Networking Protocols Become Standards,” PC Week, March 17, 1997; “Growing Pains,” Network World, April 14, 1997. MANAGEMENT FOCUS 1-3 Keeping Up with Technology The data communications and networking arena changes rapidly. Significant new technologies are introduced and new concepts are developed almost every year. It is therefore important for network managers to keep up with these changes. There are at least three useful ways to keep up with change. First and foremost for users of this book is the website for this book, which contains updates to the book, additional sections, teaching materials, and links to useful websites. Second, there are literally hundreds of thousands of websites with data communications and networking information. Search engines can help you find them. A good initial starting point is the
Page 35
Chapter 11
5c0efe87405c-1
networking information. Search engines can help you find them. A good initial starting point is the telecom glossary at http://www.atis.org. Three other useful sites are http://www.zdnet.com, http://www.networkcomputing.com, and http://www.zdnet.com. Third, there are many useful magazines that discuss computer technology in general and networking technology in particular, including Network Computing, Info World, Info Week, and CIO Magazine.
Page 35
Chapter 11
d70ea1d79d1c-0
FIGURE 1-6 Some common data communications standards. HTML = Hypertext Markup Language; HTTP = Hypertext Transfer Protocol; IMAP = Internet Message Access Protocol; IP = Internet Protocol; LAN = Local Area Network; MPEG = Motion Picture Experts Group; POP = Post Office Protocol; TCP = Transmission Control Protocol Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers (IEEE) is a professional society in the United States whose Standards Association (IEEE-SA) develops standards (see www.standards.ieee.org). The IEEE-SA is probably most known for its standards for LANs. Other countries have similar groups; for example, the British counterpart of IEEE is the Institution of Electrical Engineers (IEE). Internet Engineering Task Force The Internet Engineering Task Force (IETF) sets the standards that govern how much of the Internet will operate (see www.ietf.org). The IETF is unique in that it doesn’t really have official memberships. Quite literally anyone is welcome to join its mailing lists, attend its meetings, and comment on developing standards. The role of the IETF and other Internet organizations is discussed in more detail in Chapter 8; also, see the box entitled “How Network Protocols Become Standards.” 1.4.3 Common Standards There are many different standards used in networking today. Each standard usually covers one layer in a network. Some of the most commonly used standards are shown in Figure 1-6. At this point, these models are probably just a maze of strange names and acronyms to you, but by the end of the book, you will have
Page 36
Chapter 11
6be45f861a0b-0
a good understanding of each of these. Figure 1-6 provides a brief road map for some of the important communication technologies we discuss in this book. For now, there is one important message you should understand from Figure 1-6: For a network to operate, many different standards must be used simultaneously. The sender of a message must use one standard at the application layer, another one at the transport layer, another one at the network layer, another one at the data link layer, and another one at the physical layer. Each layer and each standard is different, but all must work together to send and receive messages. Either the sender and receiver of a message must use the same standards or, more likely, there are devices between the two that translate from one standard into another. Because different networks often use software and hardware designed for different standards, there is often a lot of translation between different standards. 1.5 FUTURE TRENDS The field of data communications has grown faster and become more important than computer processing itself. Both go hand in hand, but we have moved from the computer era to the communication era. Three major trends are driving the future of communications and networking. 1.5.1 Wireless LAN and BYOD The rapid development of mobile devices, such as smartphones and tablets, has encouraged employers to allow their employees to bring these devices to work and use them to access data, such as their work email. This movement, called bring your own device, or Bring Your On Device (BYOD), is a great way to get work quickly, saves money, and makes employees happy. But BYOD also brings its own problems. Employers need to add or expand their Wireless Local Area Networks (WLANs) to support all these new devices. Another important problem is security. Employees bring these devices to work so that they can access not
Page 37
Chapter 11
e7a87890302a-1
Another important problem is security. Employees bring these devices to work so that they can access not only their email but also other critical company assets, such as information about their clients, suppliers, or sales. Employers face myriad decisions about how to manage access to company applications for BYOD. Companies can adopt two main approaches: (1) native apps or (2) browser-based technologies. Native apps require an app to be developed for each application that an employee might be using for every potential device that the employee might use (e.g., iPhone, Android, Windows). The browser- based approach (often referred to as responsive design using HTML5) doesn’t create an app but rather requires employees to access the application through a Web browser. Both these approaches have their pros and cons, and only the future will show which one is the winner. What if an employee loses his or her mobile phone or tablet so that the application that accesses critical company data now can be used by anybody who finds the device? Will the company’s data be compromised? Device and data loss practices now have to be added to the general security practices of the company. Employees need to have apps to allow their employer to wipe their phones clean in case of loss so that no company data are compromised (e.g., SOTI’s MobiControl). In some cases, companies require the employee to allow monitoring of the device at all times, to ensure that security risks are minimized. However, some argue that this is not a good practice because the device belongs to the employee, and monitoring it 24/7 invades the employee’s privacy. 1.5.2 The Internet of Things Telephones and computers used to be separate. Today voice and data have converged into unified communications, with phones plugged into computers or directly into the LAN using Voice over Internet
Page 37
Chapter 11
f33910b95e52-2
communications, with phones plugged into computers or directly into the LAN using Voice over Internet Protocol (VoIP). Vonage and Skype have taken this one step further and offer telephone service over the Internet at dramatically lower prices than traditional separate landline phones, whether from traditional phones or via computer microphones and speakers. Computers and networks can also be built into everyday things, such as kitchen appliances, doors, and shoes. In the future, the Internet will move from being a Web of computers to also being an Internet of Things (IoT), as smart devices become common, that creates the Network of Things (NoT) where all
Page 37
Chapter 11
5d885c517b3e-0
this interaction between IoT devices will happen seamlessly, without human intervention. And you might already be asking Alexa or Siri for advice on where to eat, lock, and unlock your apartment, turn on/off your lights, or change the thermostat setting. For this to happen, Alexa/Siri must be able to communicate with your lock or thermostat without any intervention from you. Google is a leading innovator in the IoT world. It entered the IoT playground with the Nest thermostat. Google has also been developing a self-driving car that not only passes a standard driving test but also has fewer collisions than cars driven by humans. Other car developers are also developing autonomous vehicles.
Page 38
Chapter 11
f9384d5af2ed-0
FIGURE 1-7 A security robot on the IOT IoT technologies are not restricted to consumer use. To the contrary, they are used in many places such as manufacturing, process automation, decision analytics, and smart electrical grids. However, the underlying principle of all the applications is that IoT devices are connected to the Internet either through wired or wireless Ethernet. Figure 1-7 shows an IOT device that we encountered in a mall in Boston. It is semi-autonomous security robot, meaning it can be controlled by a human or set to roam its environment.
Page 39
Chapter 11
750b039d2ba8-0
Ten years ago, network managers would never have thought about the need to manage robots over their networks. 1.5.3 Massively Online You have probably heard of massively multiplayer online games, such as World of Warcraft, where you can play with thousands of players in real time. Well, today not only games are massively online. Education is massively online. Edx, Khan Academy, Lynda.com, or Code Academy have websites that offer thousands of education modules for children and adults in myriad fields to help them learn. Your class very likely also has an online component. You may even use this textbook online and decide whether your comments are for you only, for your instructor, or for the entire class to read. In addition, you may have heard about massive open online courses, or MOOC. MOOC enable students who otherwise wouldn’t have access to elite universities to get access to top knowledge without having to pay the tuition. These classes are offered by universities, such as Stanford, UC Berkeley, MIT, UCLA, Carnegie Mellon, and of course, Indiana University, free of charge and for no credit (although at some universities, you can pay and get credit toward your degree). Politics has also moved massively online. President Obama reached out to the crowds and ordinary voters not only through his Facebook page but also through Reddit and Google Hangouts. President Trump’s use of Twitter is unprecedented. He can directly reach millions of followers—a strategy that paid off in the 2016 elections. Finally, massively online allows activists to reach masses of people in a very short period of time to initiate change. Examples of use of YouTube videos or Facebook for activism include the Arab Spring, Kony 2012, or the use of sarin gas in Syria. So what started as a game with thousands of people being online at the same time is being reinvented for
Page 40
Chapter 11
48d7fbe44cac-1
good use in education, politics, and activism. Only the future will show what humanity can do with what massively online has to offer. What these three trends have in common is that there will be an increasing demand for professionals who understand development of data communications and networking infrastructure to support this growth. There will be more and more need to build faster and more secure networks that will allow individuals and organizations to connect to resources, probably stored on cloud infrastructure (either private or public). This need will call not only for engineers who deeply understand the technical aspects of networks but also for highly social individuals who embrace technology in creative ways to allow business to achieve a competitive edge through utilizing this technology. So the call is for you who are reading this book—you are in the right place at the right time! 1.6 IMPLICATIONS FOR CYBER SECURITY At the end of each chapter, we provide key implications for cyber security that arise from the topics discussed in the chapter. We draw implications that focus on improving the management of networks and information systems as well as implications for cyber security of an individual and an organization. There are three key implications for management from this chapter. First, networks and the Internet change almost everything. Computer networks and the Internet are designed to quickly and easily move information from distant locations and to enable individuals inside and outside the firm to access information and products from around the world. However, this ease of doing work on the Internet makes it also easy for cyber criminals to steal files from your computer or to put files on your computer (such as viruses or malware). Understanding how computer networks and the Internet work and how computers communicate via networks is the first step toward defending your own computer and the computers on a company’s network. Second, today’s networking environment requires that a wide variety of devices could connect. Employees’
Page 40
Chapter 11
5e1f3b505f6b-2
Second, today’s networking environment requires that a wide variety of devices could connect. Employees’ use of their own devices under BYOD policies increases security risks, as does the move to the IoT. Several security experts say that IoT doesn’t stand for Internet of Things; it stands for Internet of Targets. Individuals and companies have to balance BYOD and IoT risks and rewards to create a useful and secure computing infrastructure. Third, as the demand for network services and network capacity increases, so too will the need for secure storage and server space and secure transfer of data. Finding efficient ways to securely store all the
Page 40
Chapter 11
efd4bae3d1a6-0
information we generate will open new market opportunities. Today, Google has almost a million Web servers (see Figure 1-8). If we assume that each server costs an average of $1,000, the money large companies spend on storage is close to $1 billion. Capital expenditure of this scale is then increased by money spent on power and staffing. One way companies can reduce this amount of money is to store their data using cloud computing. The good news is that more and more cloud providers meet or exceed government required security measures for data storage and transfer. FIGURE 1-8 One server farm with more than 1,000 servers SUMMARY Introduction The information society, where information and intelligence are the key drivers of personal, business, and national success, has arrived. Data communications is the principal enabler of the rapid information exchange and will become more important than the use of computers themselves in the future. Successful users of data communications, such as Wal-Mart, can gain significant competitive advantage in the marketplace. Network Definitions A LAN is a group of computers located in the same general area. A BN is a large central network that connects almost everything on a single company site. A metropolitan area network (MAN) encompasses a city or county area. A wide area network (WAN) spans city, state, or national boundaries. Network Model Communication networks are often broken into a series of layers, each of which can be defined separately, to enable vendors to develop software and hardware that can work together in the overall network. In this book, we use a five-layer model. The application layer is the application software used by the network user. The transport layer takes the message generated by the application layer and, if necessary, breaks it into several smaller messages. The network layer addresses the message and determines its route through the network. The data link layer formats the
Page 41
Chapter 11
3e082cbb1a3c-1
addresses the message and determines its route through the network. The data link layer formats the message to indicate where it starts and ends, decides when to transmit it over the physical media, and detects and corrects any errors that occur in transmission. The physical layer is the physical connection between the sender and receiver, including the hardware devices (e.g., computers, terminals, and modems) and physical media (e.g., cables and satellites). Each layer, except the
Page 41
Chapter 11
dfa25c05f8bb-0
physical layer, adds a Protocol Data Unit (PDU) to the message. Standards Standards ensure that hardware and software produced by different vendors can work together. A de jure standard is developed by an official industry or a government body. De facto standards are those that emerge in the marketplace and are supported by several vendors but have no official standing. Many different standards and standards-making organizations exist. Future Trends At the same time as the use of BYOD offers efficiency at the workplace, it opens up the doors for security problems that companies need to consider. Our interactions with colleagues and family will very likely change in the next 5–10 years because of the Internet of Things (IoT), where devices will interact with each other without human intervention. Finally, massively online not only changed the way we play computer games but also showed that humanity can change its history. KEY TERMS American National Standards Institute (ANSI) application layer attacks backbone network (BN) Bring Your On Device (BYOD) browser-based cable circuit client cyber security data link layer extranet file server hardware layers Institute of Electrical and Electronics Engineers (IEEE) International Telecommunications Union-Telecommunications Group (ITU-T) Internet Engineering Task Force (IETF) Internet model Internet of Things (IoT) Internet service provider (ISP) internetwork layers intranets layers local area network (LAN) mail server Native apps network layer Network of Things (NoT) Open Systems Interconnection Reference model (OSI model)
Page 42
Chapter 11
c28fb3d815ce-0
OSI model peer-to-peer networks physical layer Protocol Data Unit (PDU) protocol stack protocol Request for Comment (RFC) router server Standards switch transport layer Web server wide area networks (WANs) wireless access point QUESTIONS 1. How can data communications networks affect businesses? 2. How do data communications networks support the four core capabilities of MIS? 3. Discuss three important applications of data communications networks in business and personal use. 4. How do LANs differ from WANs and BNs? 5. What is a circuit? 6. What is a client? 7. What is a server? 8. What is a router? 9. There are three computers that make the Internet work. Name them and describe their similarities and differences. 10. Why are network layers important? 11. Describe the seven layers in the OSI network model and what they do. 12. Describe the five layers in the Internet network model and what they do. 13. Explain how a message is transmitted from one computer to another using layers. 14. Describe the three stages of standardization. 15. How are Internet standards developed? 16. Describe two important data communications standards-making bodies. How do they differ? 17. What is the purpose of a data communications standard? 18. Discuss three trends in communications and networking. 19. Why has the Internet model replaced the OSI model? 20. In the 1980s, when we wrote the first edition of this book, there were many, many more protocols in common use at the data link, network, and transport layers than there are today. Why do you think the number of commonly used protocols at these layers has declined? Do you think this trend will
Page 43
Chapter 11
276ca8d04908-0
continue? What are the implications for those who design and operate networks? 21. The number of standardized protocols in use at the application layer has significantly increased since the 1980s. Why? Do you think this trend will continue? What are the implications for those who design and operate networks? 22. How many bits (not bytes) are there in a 10-page text document? Hint: There are approximately 350 words on a double-spaced page. We need 8 bits to encode each character. 23. What are three current cyber security issues we face on the Internet? 24. What is the Internet of Things (IoT)? What are the benefits and risks of IoT? EXERCISES A. Investigate the latest cyber security threats. What services and/or data were affected by these threats? What was done to recover from this situation? B. It turns out that not all industries are equally sensitive to cyber-attacks. There are multiple industries that belong to the “critical infrastructure.” Investigate which industries belong to the critical infrastructure, why are they part of it, and what laws govern this group of industries regarding cyber security. C. Discuss the issue of communications monopolies and open competition with an economics instructor and relate his or her comments to your data communication class. D. Find a college or university offering a specialized degree in telecommunications or data communications and describe the program. E. Investigate the IoT. What IoT devices are you most interested in? Why? F. Investigate the networks in your school or organization. Describe the important LANs and BNs in use (but do not describe the specific clients, servers, or devices on them). G. Visit the Internet Engineering Task (IETF) website (www.ietf.org). Describe one standard that is in the RFC stage.
Page 44
Chapter 11
fbb74639092f-1
the RFC stage. H. Discuss how the revolution/evolution of communications and networking is likely to affect how you will work and live in the future. I. Investigate the pros and cons of developing native apps versus taking a browser-based approach. MINICASES I. Global Consultants John Adams is the chief information officer (CIO) of Global Consultants (GC), a very large consulting firm with offices in more than 100 countries around the world. GC is about to purchase a set of several Internet-based financial software packages that will be installed in all of their offices. There are no standards at the application layer for financial software but several software companies that sell financial software (call them group A) use one de facto standard to enable their software to work with one another’s software. However, another group of financial software companies (call them group B) use a different de facto standard. Although both groups have software packages that GC could use, GC would really prefer to buy one package from group A for one type of financial analysis and one package from group B for a different type of financial analysis. The problem, of course, is that then the two packages cannot communicate and GC’s staff would end up having to type the same data into both packages. The alternative is to buy two packages from the same group—so that data could be easily shared—but that would mean having to settle for second best for one of the packages. Although there have been some reports in the press about the two groups of companies working together to develop one common standard that will enable software to work together, there is no firm agreement yet. What advice would you give Adams? II. Atlas Advertising Atlas Advertising is a regional advertising agency with offices in Boston, New York, Providence, Washington, D.C., and Philadelphia. (1) Describe the types of networks you think
Page 44
Chapter 11
2301b83dea36-0
they would have (e.g., LANs, BNs, WANs) and where they are likely to be located. (2) What types of standard protocols and technologies do you think they are using at each layer (e.g., see Figures 1-3 and 1-5)? III. Consolidated Supplies Consolidated Supplies is a medium-sized distributor of restaurant supplies that operates in Canada and several northern U.S. states. They have 12 large warehouses spread across both countries to service their many customers. Products arrive from the manufacturers and are stored in the warehouses until they are picked and put on a truck for delivery to their customers. The networking equipment in their warehouses is old and is starting to give them problems; these problems are expected to increase as the equipment gets older. The vice president of operations, Pat McDonald, would like to replace the existing LANs and add some new wireless LAN technology into all the warehouses, but he is concerned that now may not be the right time to replace the equipment. He has read several technology forecasts that suggest there will be dramatic improvements in networking speeds over the next few years, especially in wireless technologies. He has asked you for advice about upgrading the equipment. Should Consolidated Supplies replace all the networking equipment in all the warehouses now, should it wait until newer networking technologies are available, or should it upgrade some of the warehouses this year, some next year, and some the year after, so that some warehouses will benefit from the expected future improvements in networking technologies? IV. Asia Importers Caisy Wong is the owner of a small catalog company that imports a variety of clothes and houseware from several Asian countries and sells them to its customers over the Web and by telephone through a traditional catalog. She has read about the convergence of voice and data and
Page 45
Chapter 11
d5a98a96f82d-1
by telephone through a traditional catalog. She has read about the convergence of voice and data and is wondering about changing her current traditional, separate, and rather expensive telephone and data services into one service offered by a new company that will supply both telephone and data over her Internet connection. What are the potential benefits and challenges that Asia Importers should consider in making the decision about whether to move to one integrated service? TECH UPDATES In every chapter, we will offer couple ideas to investigate. Topic A: From ARPANET To NoT: What Happened to the Internet? What started as a secret military project in the 1960s, grew to the largest network of interconnected computers known as the Internet, which is changing into the largest network of interconnected devices that (at the time they were discovered) were not meant to talk to each other. Discuss the history of the Internet (ARPANET) and the future of it (NoT). Topic B: A Brief History of Cyber Attacks We all heard about modern ransomware that encrypts every file on your computer and you must pay a ransom (in bitcoin, of course!) to get these files unencrypted, or phishing attacks (emails that pretend to be real) that ask you to download a file or click on link and can cause lot of harm to you and your data. But, when did this start? What was the evolution of attacks on the Internet? How did individuals, business, and governments respond to these attacks? What is the current citation with cyber-attacks? Deliverables Your job will be to prepare a presentation/video (7–10 minutes long) that addresses the topic and provides information on the following items: 1. Title Slide 2. Short description of topic 3. Main players—these could be people, processes, software, hardware, etc.
Page 45
Chapter 11
e9ebe5e71d2f-2
3. Main players—these could be people, processes, software, hardware, etc. 4. How it works—use lot of pictures and be as technical as possible; create this part as a tutorial so that your audience can follow along
Page 45
Chapter 11
0781c1dc936c-0
5. How does it relate to material covered in class so far (and in the future) 6. Additional material/books/links where to learn more about this topic 7. Credits 8. List of References 9. Memo addressed to your professor describing all of the above information HANDS-ON ACTIVITY 1A Internet as We Know It Today We think about access to the Internet as a daily normal. We check our email, news, chat with friends and family, and do shopping on the Internet. The objective of this activity is for you to experience this convergence. 1. Investigate the history of the Internet at http://www.vox.com/a/internet-maps that shows you a history of the Internet through maps. 2. See how many people are using the Internet in your state/country at https://www.akamai.com/us/en/resources/visualizing-akamai/real-time-web-monitor.jsp? tab=traffic&theme=dark. 3. See the cyber security attacks in progress on information systems connected to the Internet by clicking on the Attacks tab at https://www.akamai.com/us/en/resources/visualizing-akamai/real- time-web-monitor.jsp?tab=attacks&theme=dark. Deliverable Deliverable Write a one-page summary of the history and current state of the Internet. What was the most surprising thing you learned during your investigation? HANDS-ON ACTIVITY 1B Seeing the PDUs in Your Messages We talked about how messages are transferred using layers and the different PDUs used at each layer. The objective of this activity is for you to see the different PDUs in the messages that you send. To do this, we’ll use Wireshark, which is one of the world’s foremost network protocol analyzers and is the de facto
Page 46
Chapter 11
76fc8cf02723-1
standard that most professional and education institutions use today. It is used for network troubleshooting, network analysis, software and communications protocol development, and general education about how networks work. Wireshark enables you to see all messages sent by your computer, as well as some or all of the messages sent by other computers on your LAN, depending on how your LAN is designed. Most modern LANs are designed to prevent you from eavesdropping on other computer’s messages, but some older ones still permit this. Normally, your computer will ignore the messages that are not addressed for your computer, but Wireshark enables you to eavesdrop and read messages sent to and from other computers. Wireshark is free. Before you start this activity, download and install it from https://www.wireshark.org. 1. Start Wireshark. 2. Click on Capture and then Interfaces. Click the Start button next to the active interface (the one that is receiving and sending packets). Your network data will be captured from this moment on. 3. Open your browser and go to a Web page that you have not visited recently (a good one is www.iana.org). 4. Once the Web page has loaded, go back to Wireshark and stop the packet capture by clicking on Capture and then Stop (the hot key for this is Ctrl + E).
Page 46
Chapter 11
7256ff20eac9-0
5. You will see results similar to those in Figure 1-9. There are three windows below the tool bar: a. The top window is the Packet List. Each line represents a single message or packet that was captured by Wireshark. Different types of packets will have different colors. For example, HTTP packets are colored green. Depending on how busy your network is, you may see a small number of packets in this window or a very large number of packets. b. The middle window is the Packet Detail. This will show the details for any packet you click on in the top window. c. The bottom window shows the actual contents of the packet in hexadecimal format, so it is usually hard to read. This window is typically used by network programmers to debug errors. 6. Let’s take a look at the packets that were used to request the Web page and send it to your computer. The application layer protocol used on the Web is HTTP, so we’ll want to find the HTTP packets. In the Filter toolbar, type http and hit enter. FIGURE 1-9 Wireshark capture 7. This will highlight all the packets that contain HTTP packets and will display the first one in Packet Detail window. Look at the Packet Detail window in Figure 1-8 to see the PDUs in the message we’ve highlighted. You’ll see that it contains an Ethernet II Frame, an IP packet, a TCP segment, and an HTTP packet. You can see inside any or all of these PDUs by clicking on the +box in front of them. In Figure 1-8, you’ll see that we’ve clicked the +box in front of the HTTP packet to show you what’s inside it. Deliverables
Page 47
Chapter 11
e1cce0645035-1
inside it. Deliverables 1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet. a. Locate your HTTP GET packet in the Packet List and click on it. b. Look in the Packet Detail window to get the PDU information. 2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you’ll have to look through them to answer this question.
Page 47
Chapter 11
cd928447495f-0
3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the “Clear” icon that is on the right of the Filter toolbar.
Page 48
Chapter 11
cd17c1d7da51-0
PART TWO FUNDAMENTAL CONCEPTS
Page 49
Chapter 11
09c04aba2d66-0
CHAPTER 2 APPLICATION LAYER The application layer (also called layer 5) is the software that enables the user to perform useful work. The software at the application layer is the reason for having the network because it is this software that provides the business value. This chapter focuses on the four fundamental types of application architectures used at the application layer (host-based, client-based, client–server, cloud-based), plus a fifth legacy architecture (peer-to-peer). It then looks at the Internet and the primary software application packages it enables: the Web, email, and Telnet. OBJECTIVES Understand host-based, client-based, client–server, and cloud-based application architectures Understand how the Web works Understand how email works Be aware of how Telnet and instant messaging work OUTLINE 2.1 Introduction 2.2 Application Architectures 2.2.1 Host-Based Architectures 2.2.2 Client-Based Architectures 2.2.3 Client–Server Architectures 2.2.4 Cloud Computing Architectures 2.2.5 Peer-to-Peer Architectures 2.2.6 Choosing Architectures 2.3 World Wide Web 2.3.1 How the Web Works 2.3.2 Inside an HTTP Request 2.3.3 Inside an HTTP Response 2.4 Electronic Mail 2.4.1 How Email Works 2.4.2 Inside an SMTP Packet 2.4.3 Attachments in Multipurpose Internet Mail Extension 2.5 Other Applications 2.5.1 Telnet 2.5.2 Videoconferencing 2.6 Implications for Cyber Security Summary
Page 50
Chapter 11
4b3b20b723c2-0
2.1 INTRODUCTION Network applications are the software packages that run in the application layer. You should be quite familiar with many types of network software, because it is these application packages that you use when you use the network. In many respects, the only reason for having a network is to enable these applications. In this chapter, we first discuss five basic architectures for network applications and how each of those architectures affects the design of networks. Because you probably have a good understanding of applications such as the Web and word processing, we will use those as examples of different application architectures. We then examine several common applications used on the Internet (e.g., Web, email) and use those to explain how application software interacts with the networks. By the end of this chapter, you should have a much better understanding of the application layer in the network model and what exactly we meant when we used the term protocol data unit in Chapter 1. 2.2 APPLICATION ARCHITECTURES In Chapter 1, we discussed how the three basic components of a network (client computer, server computer, and circuit) worked together. In this section, we will get a bit more specific about how the client computer and the server computer can work together to provide application software to the users. An application architecture is the way in which the functions of the application layer software are spread among the clients and servers in the network. The work done by any application program can be divided into five general functions. The first is data storage. Most application programs require data to be stored and retrieved, whether it is a small file such as a memo produced by a word processor or a large database such as an organization’s accounting records. The second function is data access logic, the processing required to access data, which often means database queries in SQL (structured query language). The third function is the application logic
Page 51
Chapter 11
4b6a393a2034-1
means database queries in SQL (structured query language). The third function is the application logic (sometimes called business logic), which also can be simple or complex, depending on the application. The fourth function is the presentation logic (sometimes called the user interface), the presentation of information to the user and the acceptance of the user’s commands. The fifth function is services logic, which is the provision of services to other applications (e.g., application program interfaces (API)). This is like the user interface, but enables other application software packages to make requests, rather than users. Not every application has services logic. These five functions—data storage, data access logic, application logic, presentation logic, and services logic—are the basic building blocks of any application. TECHNICAL FOCUS 2-1 Cloud Computing Deployment Models When an organization decides to use cloud-based architecture, it needs to decide on which deployment model will it use. There are three deployment models from which to choose: Private cloud As the name suggests, private clouds are created for the exclusive use of a single private organization. The cloud (hardware and software) would be hosted by the organization in a private data center. This deployment model provides the highest levels of control, privacy, and security. This model is often used by organizations needing to satisfy regulations posed by regulators, such as in the financial and health-care industries. Public cloud This deployment model is used by multiple organizations that share the same cloud resources. The level of control is lower than in private clouds, and many companies are concerned with the security of their data. However, this deployment model doesn’t require any upfront capital investment, and the selected service can be up and running in a few days. Public clouds are a good choice when a lot of people in the organization are using the same application.
Page 51
Chapter 11
29d92f559e2e-2
Because of this, the most frequently used software as a service (SaaS) is email. For example, many universities have moved to this model for their students.
Page 51
Chapter 11
8f1eaa221720-0
Community cloud This deployment model is used by organizations that have a common purpose. Rather than each organization creating its own private cloud, organizations decide to collaborate and pool their resources. Although this cloud is not private, only a limited number of companies have access to it. Community clouds are considered to be a subset of public clouds. Therefore, community clouds realize the benefits from cloud infrastructure (such as speed of deployment) with the added level of privacy and security that private clouds offer. This deployment model is often used in the government, health care, and finance industries, members of which have similar application needs and require a very high level of security. Sometimes an organization will choose to use only one of these deployment models for all its cloud-based applications. This strategy is called a pure strategy, such as a pure private cloud strategy or a pure public cloud strategy. In other cases, the organization is best supported by a mix of public, private, and community clouds for different applications. This strategy is called a hybrid cloud strategy. A hybrid cloud strategy allows the organization to take advantage of the benefits that these different cloud deployment models offer. For example, a hospital can use Gmail for its email application (public cloud) but a private cloud for patient data, which require high security. The downside of a hybrid cloud strategy is that an organization has to deal with different platforms and cloud providers. However, the truth is that this strategy offers the greatest flexibility, so most organizations eventually end up with this strategy. There are many ways in which these five functions can be allocated between the client computers and the servers in a network. There are four fundamental application architectures in use today. In host-based architectures, the server (or host computer) performs virtually all of the work. In client-based architectures, the client computers perform most of the work. In client–server architectures, the
Page 52
Chapter 11
1e59e3a77dff-1
work is shared between the servers and clients. In cloud-based architectures, the cloud provides services (software, platform, and/or infrastructure) to the client. Although the client–server architecture is the dominant application architecture, cloud-based architecture is becoming the runner-up because it offers rapid scalability and deployability of computer resources. 2.2.1 Host-Based Architectures The very first data communications networks developed in the 1960s were host-based, with the server (usually a large mainframe computer) performing all functions. The clients (usually terminals) enabled users to send and receive messages to and from the host computer. The clients merely captured keystrokes, sent them to the server for processing, and accepted instructions from the server on what to display (see Figure 2-1). This very simple architecture often works very well. Application software is developed and stored on the one server along with all data. If you’ve ever used a terminal or Citrix Receiver, you’ve used a host-based application. There is one point of control, because all messages flow through the one central server. In theory, there are economies of scale, because all computer resources are centralized (but more on cost later). There are two fundamental problems with host-based networks. First, the server must process all messages. As the demands for more and more network applications grow, many servers become overloaded and unable to quickly process all the users’ demands. Prioritizing users’ access becomes difficult. Response time becomes slower, and network managers are required to spend increasingly more money to upgrade the server. Unfortunately, upgrades to the mainframes that are usually the servers in this architecture are “lumpy.” That is, upgrades come in large increments and are expensive (e.g., $500,000); it is difficult to upgrade “a little.”
Page 52
Chapter 11
b863f3e76138-0
FIGURE 2-1 Host-based architecture 2.2.2 Client-Based Architectures In the late 1980s, there was an explosion in the use of personal computers. Today, more than 90% of most organizations’ total computer processing power now resides on personal computers, not in centralized mainframe computers. Part of this expansion was fueled by a number of low-cost, highly popular applications such as word processors, spreadsheets, and presentation graphics programs. It was also fueled in part by managers’ frustrations with application software on host mainframe computers. Most mainframe software is not as easy to use as personal computer software, is far more expensive, and can take years to develop. In the late 1980s, many large organizations had application development backlogs of 2–3 years; that is, getting any new mainframe application program written would take years. New York City, for example, had a 6-year backlog. In contrast, managers could buy personal computer packages or develop personal computer-based applications in a few months. With client-based architectures, the clients are personal computers on a LAN, and the server is usually another personal computer on the same network. The application software on the client computers is responsible for the presentation logic, the application logic, and the data access logic; the server simply stores the data (Figure 2-2). There is no services logic. This simple architecture often works very well. If you’ve ever used a word processor and stored your document file on a server (or written a program in Visual Basic or C that runs on your computer but stores data on a server), you’ve used a client-based architecture. The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. For example, suppose the user wishes to display a list of all employees with company life
Page 53
Chapter 11
00c20cc8eb52-1
insurance. All the data in the database (or all the indices) must travel from the server where the database is stored over the network circuit to the client, which then examines each record to see if it matches the data requested by the user. This can overload the network circuits because far more data are transmitted from the server to the client than the client actually needs. 2.2.3 Client–Server Architectures Most applications written today use client–server architectures. Client–server architectures attempt to balance the processing between the client and the server by having both do some of the logic. In these networks, the client is responsible for the presentation logic, whereas the server is responsible for the data access logic and data storage. The application logic may either reside on the client, reside on the server, or
Page 53
Chapter 11
b24435aeb2ed-0
be split between both. Figure 2-3 shows one example, with the presentation logic and application logic on the client, and services logic, application logic, data access logic and data storage on the server. In this case, the client software accepts user requests and performs the application logic that produces database requests that are transmitted to the server. The server software accepts the database requests, performs the data access logic, and transmits the results to the client. The client software accepts the results and presents them to the user. When you used a Web browser to get pages from a Web server, you used a client–server architecture. Likewise, if you’ve ever written a program that uses SQL to talk to a database on a server, you’ve used a client–server architecture. FIGURE 2-2 Client-based architecture FIGURE 2-3 Two-tier thick client client–server architecture For example, if the user requests a list of all employees with company life insurance, the client would accept the request, format it so that it could be understood by the server and transmit it to the server. On receiving the request, the server searches the database for all requested records and then transmits only the matching records to the client, which would then present them to the user. The same would be true for database updates; the client accepts the request and sends it to the server. The server processes the update and responds (either accepting the update or explaining why not) to the client, which displays it to the user. One of the strengths of client–server networks is that they enable software and hardware from different
Page 54
Chapter 11
c4a206255238-0
vendors to be used together. But this is also one of their disadvantages, because it can be difficult to get software from different vendors to work together. One solution to this problem is middleware, software that sits between the application software on the client and the application software on the server. Middleware does two things. First, it provides a standard way of communicating that can translate between software from different vendors. Many middleware tools began as translation utilities that enabled messages sent from a specific client tool to be translated into a form understood by a specific server tool. The second function of middleware is to manage the message transfer from clients to servers (and vice versa) so that clients need not know the specific server that contains the application’s data. The application software on the client sends all messages to the middleware, which forwards them to the correct server. The application software on the client is therefore protected from any changes in the physical network. If the network layout changes (e.g., a new server is added), only the middleware must be updated. There are literally dozens of standards for middleware, each of which is supported by different vendors and provides different functions. Two of the most important standards are Distributed Computing Environment (DCE) and Common Object Request Broker Architecture (CORBA). Both of these standards cover virtually all aspects of the client–server architecture but are quite different. Any client or server software that conforms to one of these standards can communicate with any other software that conforms to the same standard. Another important standard is Open Database Connectivity (ODBC), which provides a standard for data access logic. Two-Tier, Three-Tier, and n-Tier Architectures There are many ways in which the application logic can be partitioned between the client and the server. The example in Figure 2-3 is one of the most common. In this case, the server is responsible for the data
Page 55
Chapter 11
7c5fc8ce47c7-1
and the client, the application and presentation. This is called a two-tier architecture, because it uses only two sets of computers, one set of clients and one set of servers. A three-tier architecture uses three sets of computers, as shown in Figure 2-4. In this case, the software on the client computer is responsible for presentation logic, an application server is responsible for the services logic and application logic, and a separate database server is responsible for the data access logic and data storage. n-tier architecture uses more than three sets of computers. In this case, the client is responsible for presentation logic, a database server is responsible for the data access logic and data storage, and the services logic and application logic are spread across two or more different sets of servers. Figure 2-5 shows an example of an n-tier architecture. The client uses the Web browser (presentation logic). The Web server that responds to the user’s requests, either by providing Hypertext Markup Language (HTML) pages and graphics (application logic) or by sending the request to the application server that perform various tasks (services logic and application logic). The database server stores all the data (data access logic and data storage). Each of these four components is separate, making it easy to spread the different components on different servers and to partition the application logic on two different servers.
Page 55
Chapter 11
a5603135c084-0
FIGURE 2-4 Three-tier thin client client–server architecture FIGURE 2-5 The n-tier thin client client–server architecture The primary advantage of an n-tier client–server architecture compared with a two-tier architecture (or a three-tier compared with a two-tier) is that it separates the processing that occurs to better balance the load on the different servers; it is more scalable. In Figure 2-5, we have three separate servers, which
Page 56
Chapter 11
README.md exists but content is empty. Use the Edit dataset card button to edit it.
Downloads last month
0
Edit dataset card