Chapt. 1 Living in A Network-Centric World, Ver 1.0
Chapt. 1 Living in A Network-Centric World, Ver 1.0
Chapt. 1 Living in A Network-Centric World, Ver 1.0
Chapter Introduction
We now stand at a critical turning point in the use of technology to extend and empower our human network. The globalization of the Internet has succeeded faster than anyone could have imagined. The manner in which social, commercial, political and personal interactions occur is rapidly changing to keep up with the evolution of this global network. In the next stage of our development, innovators will use the Internet as a starting point for their efforts - creating new products and services specifically designed to take advantage of the network capabilities. As developers push the limits of what is possible, the capabilities of the interconnected networks that form the Internet will play an increasing role in the success of these projects. This chapter introduces the platform of data networks upon which our social and business relationships increasingly depend. The material lays the groundwork for exploring the services, technologies, and issues encountered by network professionals as they design, build, and maintain the modern network. In this chapter, you will learn to:
Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components of any data network. Identify the opportunities and challenges posed by converged networks. Describe the characteristics of network architectures: fault tolerance, scalability, quality of service and security. Install and use IRC clients and a Wiki server.
Early data networks were limited to exchanging character-based information between connected computer systems. Current networks have evolved to carry voice, video streams, text, and graphics between many different types of devices. Previously separate and distinct communication forms have converged onto a common platform. This platform provides access to a wide range of alternative and new communication methods that enable people to interact directly with each other almost instantaneously. The immediate nature of communications over the Internet encourages the formation of global communities. These communities foster social interaction that is independent of location or time zone. The Global Community Technology is perhaps the most significant change agent in the world today, as it helps to create a world in which national borders, geographic distances, and physical limitations become less relevant, and present ever-diminishing obstacles. The creation of online communities for the exchange of ideas and information has the potential to increase productivity opportunities across the globe. As the Internet connects people and promotes unfettered communication, it presents the platform on which to run businesses, to address emergencies, to inform individuals, and to support education, science, and government. Click PLAY to watch how the Internet, and its underlying technology, brings opportunities to people wherever they live or work.
It is incredible how quickly the Internet became an integral part of our daily routines. The complex interconnection of electronic devices and media that comprise the network is transparent to the millions of users who make it a valued and personal part of their lives. Data networks that were once the transport of information from business to business have been repurposed to improve the quality of life for people everywhere. In the course of a day, resources available through the Internet can help you:
Decide what to wear using online current weather conditions. Find the least congested route to your destination, displaying weather and traffic video from webcams. Check your bank balance and pay bills electronically. Receive and send e-mail, or make an Internet phone call, at an Internet cafe over lunch. Obtain health information and nutritional advice from experts all over the world, and post to a forum to share related health or treatment information. Download new recipes and cooking techniques to create a spectacular dinner. Post and share your photographs, home videos, and experiences with friends or with the world.
Many uses of the Internet would have been hard to imagine just a few years ago. Take for example, one persons experience publishing a home music video: My goal is to make my own movies. One day, my friend Adi and I made a video as a surprise for her boyfriends birthday. We recorded ourselves lip-synching to a song and dancing around. Then we decided, why not post it. Well, the reaction has been huge. Its had over 9 million views so far, and the movie director Kevin Smith even did a short spoof of it. I dont know what draws people to the video. Maybe its the simplicity of it, or the song. Maybe its because its spontaneous and fun, and it makes people feel good. I dont know. But I do know that I can do what I love and share it
online with millions of people around the world. All I need is my computer, digital camcorder, and some software. And thats an amazing thing.
Lab Activity Use satellite imagery available through the Internet to explore your world.
available, organizations can move quickly to share information and pursue goals. The broad distribution of data networks means that people in remote locations can contribute on an equal basis with people at the heart of large population centers.
Online courseware and delivery offer many benefits to businesses. Among the benefits are:
Current and accurate training materials. Collaboration between vendors, equipment manufacturers and training providers ensures that the courseware is up-to-date with the latest processes and procedures. When errors in materials are found and corrected, the new courseware is immediately available to all employees. Availability of training to a wide audience. Online training is not dependent on travel schedules, instructor availability or physical class size. Employees can be given deadlines by which training is to be completed and the employees can access the courseware when it is convenient. Consistent quality of instruction. The quality of the instruction does not vary as it would if different instructors were delivering an in-person course. The online curriculum provides a consistent core of instruction to which instructors can add additional expertise. Cost reduction. In addition to reducing the cost of travel and the lost time associated with travel, there are other cost reducing factors for business related to online training. It is usually less expensive to revise and update online courseware than it is to update paper-based material. Facilities to support in-person training can also be reduced or eliminated.
Many businesses also provide customer training online. This courseware enables the customers to use the products and services provided by the business in the best manner, reducing calls to the help lines or customer service centers.
A wheat farmer in Australia uses a laptop enabled with a Global Positioning System (GPS) to plant a crop with precision and efficiency. At harvest time, the farmer can co-ordinate harvesting with the availability of grain transporters and storage facilities. Using mobile wireless technology, the grain transporter can monitor the vehicle in-route in order to maintain the best fuel efficiency and safe operation. Changes in status can be relayed to the driver of the vehicle instantly. Remote workers, called teleworkers or telecommuters, use secure remote access services from home or while traveling. The data network enables them to work as if they were on-site, with access to all the network-based tools normally available for their jobs. Virtual meetings and conferences can be convened which include people in remote locations. The network provides audio and video capability so all participants can both see and hear each other. The
10
information from the meetings can be recorded to a wiki or blog. The latest versions of the agenda and minutes can be shared as soon as they are created. There are many success stories illustrating innovative ways networks are being used to make us more successful in the workplace. Some of these scenarios are available through the Cisco web site at http://www.cisco.com
An identified sender and receiver Agreed upon method of communicating (face-to-face, telephone, letter, photograph) Common language and grammar Speed and timing of delivery
11
Communication rules may vary according to the context. If a message conveys an important fact or concept, a confirmation that the message has been received and understood is necessary. Less important messages may not require an acknowledgement from the recipient. The techniques that are used in network communications share these fundamentals with human conversations. Because many of our human communication protocols are implicit or are ingrained in our cultures, some rules can be assumed. In establishing data networks, it is necessary to be much more explicit about how communication takes place and how it is judged successful.
The quality of the pathway between the sender and the recipient The number of times the message has to change form The number of times the message has to be redirected or readdressed The number of other messages being transmitted simultaneously on the communication network The amount of time allotted for successful communication
Internal Factors Internal factors that interfere with network communication are related to the nature of the message itself. Different types of messages may vary in complexity and importance. Clear and concise messages are usually easier to understand than complex messages. Important communications require more care to ensure that they are delivered and understood by the recipient. Internal factors affecting the successful communication across the network include:
The size of the message The complexity of the message The importance of the message
Large messages may be interrupted or delayed at different points within the network. A message with a low importance or priority could be dropped if the network becomes overloaded. Both the internal and external factors that affect the receipt of a message must be anticipated and controlled for network communications to be successful. New innovations in network hardware and software are being implemented to ensure the quality and reliability of network communications.
12
Rules or agreements to govern how the messages are sent, directed, received and interpreted The messages or units of information that travel from one device to another A means of interconnecting these devices - a medium that can transport the messages from one device to another Devices on the network that exchange messages with each other
The standardization of the various elements of the network enables equipment and devices created by different companies to work together. Experts in various technologies can contribute their best ideas on how to develop an efficient network, without regard to the brand or manufacturer of the equipment.
Switch - the most common device for interconnecting local area networks Firewall - provides security to networks Router - helps direct messages as they travel across a network Wireless Router - a specific type of router often found in home networks Cloud - used to summarize a group of networking devices, the details of which may be unimportant to the discussion at hand Serial Link - one form of WAN interconnection, represented by the lightning bolt-shaped line
For a network to function, the devices must be interconnected. Network connections can be wired or wireless. In wired connections, the medium is either copper, which carries electrical signals, or
13
optical fiber, which carries light signals. In wireless connections, the medium is the Earths atmosphere, or space, and the signals are microwaves. Copper medium includes cables, such as twisted pair telephone wire, coaxial cable, or most commonly, what is known as Category 5 Unshielded Twisted Pair (UTP) cable. Optical fibers, thin strands of glass or plastic that carry light signals, are another form of networking media. Wireless media may include the home wireless connection between a wireless router and a computer with a wireless network card, the terrestrial wireless connection between two ground stations, or the communication between devices on earth and satellites. In a typical journey across the Internet, a message may travel across a variety of media. Human beings often seek to send and receive a variety of messages using computer applications; these applications require services to be provided by the network. Some of these services include the World Wide Web, e-mail, instant messaging, and IP Telephony. Devices interconnected by medium to provide services must be governed by rules, or protocols. In the chart, some common services and a protocol most directly associated with that service are listed. Protocols are the rules that the networked devices use to communicate with each other. The industry standard in networking today is a set of protocols called TCP/IP (Transmission Control Protocol/Internet Protocol). TCP/IP is used in home and business networks, as well as being the primary protocol of the Internet. It is TCP/IP protocols that specify the formatting, addressing and routing mechanisms that ensure our messages are delivered to the correct recipient. We close this section with an example to tie together how the elements of networks - devices, media, and services - are connected by rules to deliver a message. People often only picture networks in the abstract sense. We create and send a text message and it almost immediately shows up on the destination device. Although we know that between our sending device and the receiving device there is a network over which our message travels, we rarely think about all the parts and pieces that make up that infrastructure. The Messages In the first step of its journey from the computer to its destination, our instant message gets converted into a format that can be transmitted on the network. All types of messages must be converted to bits, binary coded digital signals, before being sent to their destinations. This is true no matter what the original message format was: text, video, voice, or computer data. Once our instant message is converted to bits, it is ready to be sent onto the network for delivery. The Devices To begin to understand the robustness and complexity of the interconnected networks that make up the Internet, it is necessary to start with the basics. Take the example of sending the text message using an instant messaging program on a computer. When we think of using network services, we usually think of using a computer to access them. But, a computer is only one type of device that can send and receive messages over a network. Many other types of devices can also be connected to the network to participate in network services. Among these devices are telephones, cameras, music systems, printers and game consoles. In addition to the computer, there are numerous other components that make it possible for our instant message to be directed across the miles of wires, underground cables, airwaves and satellite stations that might exist between the source and destination devices. One of the critical components in any size network is the router. A router joins two or more networks, like a home network and the Internet, and passes information from one network to another. Routers in a network work to ensure that the message gets to its destination in the most efficient and quickest manner. The Medium To send our instant message to its destination, the computer must be connected to a wired or wireless local network. Local networks can be installed in homes or businesses, where they enable
14
computers and other devices to share information with each other and to use a common connection to the Internet. Wireless networks allow the use of networked devices anywhere in an office or home, even outdoors. Outside the office or home, wireless networking is available in public hotspots, such as coffee shops, businesses, hotel rooms, and airports. Many installed networks use wires to provide connectivity. Ethernet is the most common wired networking technology found today. The wires, called cables, connect the computers and other devices that make up the networks. Wired networks are best for moving large amounts of data at high speeds, such as are required to support professional-quality multimedia. The Services Network services are computer programs that support the human network. Distributed on devices throughout the network, these services facilitate online communication tools such as e-mail, bulletin/discussion boards, chat rooms, and instant messaging. In the case of instant messaging, for example, an instant messaging service, provided by devices in the cloud, must be accessible to both the sender and recipient. The Rules Important aspects of networks that are neither devices nor media are rules, or protocols. These rules are the standards and protocols that specify how the messages are sent, how they are directed through the network, and how they are interpreted at the destination devices. For example, in the case of Jabber instant messaging, the XMPP, TCP, and IP protocols are all important sets of rules that enable our communication to occur.
15
the messages through the network. The resulting communications platform will provide high quality application functionality at a reduced cost. Planning for the Future The pace at which the development of exciting new converged network applications is occurring can be attributed to the rapid expansion of the Internet. This expansion has created a wider audience and a larger consumer base for whatever message, product or service can be delivered. The underlying mechanics and processes that drive this explosive growth have resulted in a network architecture that is both resilient and scalable. As the supporting technology platform for living, learning, working, and playing in the human network, the network architecture of the Internet must adapt to constantly changing requirements for a high quality of service and security.
16
of transmission, and are therefore able to produce an acceptable level of quality. New requirements to support this quality of service over a converged network are changing the way network architectures are designed and implemented. Security The Internet has evolved from a tightly controlled internetwork of educational and government organizations to a widely accessible means for transmission of business and personal communications. As a result, the security requirements of the network have changed. The security and privacy expectations that result from the use of internetworks to exchange confidential and business critical information exceed what the current architecture can deliver. Rapid expansion in communication areas that were not served by traditional data networks is increasing the need to embed security into the network architecture. As a result, much effort is being devoted to this area of research and development. In the meantime, many tools and procedures are being implemented to combat inherent security flaws in the network architecture.
17
into multiple message blocks. Individual blocks containing addressing information indicate both their origination point and their final destination. Using this embedded information, these message blocks, called packets, can be sent through the network along various paths, and can be reassembled into the original message upon reaching their destination. Utilizing Packets The devices within the network itself are unaware of the content of the individual packets, only visible is the address of the final destination and the next device in the path to that destination. No reserved circuit is built between sender and receiver. Each packet is sent independently from one switching location to another. At each location, a routing decision is made as to which path to use to forward the packet towards its final destination. If a previously used path is no longer available, the routing function can dynamically choose the next best available path. Because the messages are sent in pieces, rather than as a single complete message, the few packets that may be lost in the advent of a failure can be retransmitted to the destination along a different path. In many cases, the destination device is unaware that any failure or rerouting has occurred. Packet-switched Connectionless Networks The DoD researchers realized that a packet switched connectionless network had the features necessary to support a resilient, fault tolerant network architecture. The need for a single, reserved circuit from end-to-end does not exist in a packet switched network. Any piece of a message can be sent through the network using any available path. Packets containing pieces of messages from different sources can travel the network at the same time. The problem of underutilized or idle circuits is eliminated all available resources can be used at any time to deliver packets to their final destination. By providing a method to dynamically use redundant paths, without intervention by the user, the Internet has become a fault tolerant, scalable method of communications. Connection-oriented Networks Although packet-switched connectionless networks met the needs of the DoD, and continue to be the primary infrastructure for todays Internet, there are some benefits to a connection-oriented system like the circuit-switched telephone system. Because resources at the various switching locations are dedicated to providing a finite number of circuits, the quality and consistency of messages transmitted across a connection-oriented network can be guaranteed. Another benefit is that the provider of the service can charge the users of the network for the period of time that the connection is active. The ability to charge users for active connections through the network is a fundamental premise of the telecommunication service industry.
18
The adherence to standards enables the manufacturers of hardware and software to concentrate on product improvements in the areas of performance and capacity, knowing that the new products can integrate with and enhance the existing infrastructure. The current Internet architecture, while highly scalable, may not always be able to keep up with the pace of user demand. New protocols and addressing structures are under development to meet the increasing rate at which Internet applications and services are being added.
19
the greatest share of the network resources to the movie, believing that this is the priority for his customers. This administrator may decide that the impact will be minimal if e-mail users have to wait a few additional seconds for their e-mail to arrive. In another company, the quality of a video stream is not as important as critical process control information that operates the manufacturing machinery. QoS mechanisms enable the establishment of queue management strategies that enforce priorities for different classifications of application data. Without properly designed and implemented QoS mechanisms, data packets will be dropped without consideration of the application characteristics or priority. Examples of priority decisions for an organization might include:
Time-sensitive communication - increase priority for services like telephony or video distribution. Non time-sensitive communication - decrease priority for web page retrieval or e-mail. High importance to organization - increase priority for production control or business transaction data. Undesirable communication - decrease priority or block unwanted activity, like peer-to-peer file sharing or live entertainment.
The Quality of Service a network can offer is a vital issue, and in some situations, it is crucial. Imagine the consequences of a dropped distress call to an emergency response center, or of a lost control signal to an automated piece of heavy machinery. A key responsibility for the network managers in an organization is to establish a Quality of Service policy and ensure that the mechanisms are in place to meet that goal.
Network outage that prevents communications and transactions occurring, with consequent loss of business Misdirection and loss of personal or business funds Company intellectual property (research ideas, patents or designs) that is stolen and used by a competitor Customer contract details that become known to competitors or made public, resulting in a loss of market confidence in the business
A lack of public trust in the businesss privacy, confidentiality, and integrity levels may lead to loss of sales and eventual company failure. There are two types of network security concerns that must be addressed to prevent serious consequences: network infrastructure security and content security. Securing a network infrastructure includes the physical securing of devices that provide network connectivity and preventing unauthorized access to the management software that resides on them. Content security refers to protecting the information contained within the packets being transmitted over the network and the information stored on network attached devices. When transmitting
20
information over the Internet or other network, the content of the individual packets is not readily known to the devices and facilities through which the packets travel. Tools to provide security for the content of individual messages must be implemented on top of the underlying protocols which govern how packets are formatted, addressed and delivered. Because the reassembly and interpretation of the content is delegated to programs running on the individual source and destination systems, many of the security tools and protocols must be implemented on those systems as well. Security measures taken in a network should:
Prevent unauthorized disclosure or theft of information Prevent unauthorized modification of information Prevent Denial of Service
Ensuring Confidentiality Data privacy is maintained by allowing only the intended and authorized recipients - individuals, processes, or devices - to read the data. Having a strong system for user authentication, enforcing passwords that are difficult to guess, and requiring users to change them frequently helps restrict access to communications and to data stored on network attached devices. Where appropriate, encrypting content ensures confidentiality and minimizes unauthorized disclosure or theft of information. Maintaining Communication Integrity Data integrity means having the assurance that the information has not been altered in transmission, from origin to destination. Data integrity can be compromised when information has been corrupted - willfully or accidentally - before the intended recipient receives it. Source integrity is the assurance that the identity of the sender has been validated. Source integrity is compromised when a user or device fakes its identity and supplies incorrect information to a recipient. The use of digital signatures, hashing algorithms and checksum mechanisms are ways to provide source and data integrity across a network to prevent unauthorized modification of information. Ensuring Availability Ensuring confidentiality and integrity are irrelevant if network resources become over burdened, or not available at all. Availability means having the assurance of timely and reliable access to data services for authorized users. Resources can be unavailable during a Denial of Service (DoS) attack or due to the spread of a computer virus. Network firewall devices, along with desktop and server anti-virus software can ensure system reliability and the robustness to detect, repel, and cope with such attacks. Building fully redundant network infrastructures, with few single points of failure, can reduce the impact of these threats. The result of the implementation of measures to improve both the quality of service and the security of network communications is an increase in the complexity of the underlying network platform. As the Internet continues to expand to offer more and more new services, its future depends
21
on new, more robust network architectures being developed that include all four characteristics: fault tolerance, scalability, quality of service, and security.
Refer to Lab Activity for this chapter
Upon completion of this activity, you will be able to: Use the SANS site to quickly identify Internet security threats and explain how threats are organized.
Increasing number of mobile users Proliferation of network capable devices Expanding range of services
Mobile Users With the increase in the numbers of mobile workers and the increased use of hand-held devices, we are necessarily demanding more mobile connectivity to data networks. This demand has created a market for wireless services that have greater flexibility, coverage, and security. New and More Capable Devices The computer is only one of many devices on todays information networks. We have a proliferation of exciting new technologies that can take advantage of available network services. The functions performed by cell phones, Personal Digital Assistants (PDAs), organizers, and pagers are converging into single hand-held devices with continuous connectivity to providers of services and content. These devices, once thought of as toys or luxury items, are now an integral part of how people communicate. In addition to mobile devices, we also have Voice over IP (VoIP) devices, gaming systems, and a large assortment of household and business gadgets that can connect and use network services. Increased Availability of Services The widespread acceptance of technology and the fast pace of innovation in network delivered services create a spiraling dependence. To meet user demands, new services are introduced and older services are enhanced. As the users come to trust these expanded services, they want even more capabilities. The network then grows to support the increasing demand. People depend on the services provided over the network, and therefore depend on the availability and reliability of the underlying network infrastructure. The challenge of keeping pace with an ever expanding network of users and services is the responsibility of trained network and IT professionals.
22
Traditional IT positions like programmers, software engineers, data base administrators and network technicians are now joined by new titles, such as network architect, e-Commerce site designer, information security officer, and home integration specialist. Opportunities for forward thinking entrepreneurs are unlimited. Even non-IT jobs, like manufacturing management or medical equipment design, now require a significant amount of knowledge about network operation in order to be successful. Chief Technology Officers in many large organizations list the lack of qualified personnel as the primary factor delaying the implementation of innovative new services. As students of networking technology, we examine the components of data networks and the roles they play in enabling communication. This course, as well as others in the Network Academy series, is designed to empower you with the networking knowledge to build and manage these evolving networks.
In this lab, you will define Internet Relay Chat (IRC) and Instant Messaging (IM). You will also list several misuses and data security issues involving IM.
In this lab, you will define the terms wiki and blog. You will also explain the purpose of a wiki and blog and how these technologies are used for collaboration.
23
Chapter Quiz
Take the chapter quiz to test your knowledge.
24