1 / 41

Agendas

Agendas. Chapter 3 (Recap) Understanding Internetworking Infrastructure (Chapter 5) Case 2-2: The iPremier Company (A): Denial of Service Attack. Three Inter-organizational Governance Models (Recap). What are the three governance models? Describe each governance model.

sonnagh
Download Presentation

Agendas

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Agendas • Chapter 3 (Recap) • Understanding Internetworking Infrastructure (Chapter 5) • Case 2-2: The iPremier Company (A): Denial of Service Attack

  2. Three Inter-organizational Governance Models (Recap) • What are the three governance models? • Describe each governance model.

  3. Three Inter-organizational Governance Models • Market • Simple exchange of goods, services, and payments, usually during a specific time period and with limited interaction or information sharing between the parties involved • Hierarchy • Formal contracts and authority define the activities to be performed, the products or services to be provided, the price to be paid by each party, and the length of the relationship • Partnership • Require shared goals, complementary expertise and skills, high levels of trust among the parties, and networked integration of processes and work across organizational boundaries

  4. Three Network Ownerships • What are the three types of ownerships? • Describe each network ownership.

  5. Three Network Ownerships (Recap) • The majority of specialized units may be located inside a corporation or other legally defined organization. • An alliance may be formed between two ( or a small number of players). • A diverse community, also called an ecosystem, of players representing different roles (e.g., suppliers, distributors, buyers) may work together to achieve shared goals.

  6. Governance and Ownership Ownership

  7. Course Road Map

  8. Chapter 5: Understanding Internetworking Infrastructure • Technical issues vs. business issues • Bridging the gap between the business and technical domains

  9. Chapter 5: Understanding Internetworking Infrastructure Corporate Telecommunications System

  10. The IT architecture of an e-business

  11. Chapter 5: Understanding Internetworking Infrastructure Moore’s Law

  12. Moore’s Law

  13. Chapter 5: Understanding Internetworking Infrastructure TCP/IP Evolution of Corporate IT Infrastructure

  14. Chapter 5: Understanding Internetworking Infrastructure Metcalfe’s Law

  15. Chapter 5: Understanding Internetworking Infrastructure Bandwidth Explosion

  16. Components of Internetworking Infrastructure

  17. Components of Internetworking Infrastructure A Simple LAN

  18. Network Elements – LAN • Local Area Networks (LAN) • Connects computers and other digital devices within 2000 ft radius • Cabling or wireless technology links computers, network interface cards, and software • Network Operating System (NOS) • Network Topologies • Star, bus, and ring topologies

  19. Network Elements – LAN LAN Topologies

  20. Network Elements – WAN Wide Area Networks (WAN) • Span broad geographic distances • Can consist of combination of: • Switched lines • Dedicated lines • Microwave • Satellite communications • Private WANs expensive to support

  21. Network Elements – WAN An Example of WAN

  22. Network Elements – MAN • Metropolitan Area Network (MAN) • Scope between LAN and WAN • Limited distance; faster and less expensive than WAN • Value-Added Networks • Private, third-party managed, data only networks • Subscription basis

  23. Network Elements – Bridge (Switch), Router, Firewall, Caching Bridge (Switch) • Connect network segments at the physical layer • Relay and subdividing network device • Less or no intelligent in transporting data Router • A network device containing software and hardware – usually tailored to the tasks of routing and forwarding information.

  24. Network Elements – Bridge (Bridge, Router, Firewall, Cache) Firewall • A firewall is a dedicated hardware, or software running on another computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules. Cache • A cache is a block of memory for temporary storage of data likely to be used again. The CPU and hard drive frequently use a cache, as do web browsers and web servers.

  25. Elements of Processing Systems • Client Devices and Systems • Server Devices and Systems • Mainframe Devices and Systems • Middleware • Middleware is the enabling technology of enterprise application integration. It describes a piece of software that connects two or more software applications, allowing them to exchange data. • TCP/IP • Extremely important • Not well-understood

  26. Client/Server Computing • Client/server computing: Splits processing between “clients” and “servers” on network • Powerful personal computers connect to network with one or more server computers • Has extended networking to parts of business that could not be served by centralized architecture • Processing load balanced over many smaller machines

  27. Client/Server Computing

  28. Types of Client/Server Computing

  29. Client/Server Computing (n-tier) Remote method innovation/Internet Inter-Orb Protocol

  30. Packet Switching (How Internet Work) • Messages broken into “packets” before transmission • Packets include destination and error-checking information • Packets travel independently using routers; reassembled into original message at destination

  31. Transmission Control Protocol/Internet Protocol (TCP/IP) • Open suite of protocols for connectivity developed in 1970s • Provides standards for breaking messages into packets, routing them to destination addresses, and reassembling them at end • Allows for communication regardless of hardware/software

  32. Packet Switching

  33. Transmission Control Protocol/Internet Protocol (TCP/IP) TCP/IP: Four-Layer Reference Model • Network interface layer: Placing packets on and receiving them from network medium • Internet layer: Addressing, routing, packaging data packets • Transport layer: Acknowledging and sequencing packets to/from application • Application layer: Communication between applications and other layers

  34. TCP/IP: Four-Layer Reference Model

  35. Complexity and Coupling • Complexity • Systems have many interactions • Interactions can be linear (simple) or complex • Linear  cause and effect relationships are clear • Complex  cause and effect relationships are difficult to see or anticipate • Coupling • Here coupling or dependency is the degree to which each network system relies on each other. • Coupling in systems can be tight or loose. • Tight coupling  changes in A seriously affect B

  36. Where System Fall

  37. Why Systems Are Vulnerable? Telecommunications networks vulnerabilities

  38. Why Systems Are Vulnerable? Type of computer crimes and criminals • Hacker: An outside person who has penetrated a computer system, usually with no criminal intent. • Cracker: A malicious hacker. • Social engineering: Getting around security systems by tricking computer users into revealing sensitive information or gaining unauthorized access privileges. • Cybercrimes: Illegal activities executed on the Internet. • Identify theft: A criminal (the identity thief) poses as someone else. • Cyberwar: War in which a country’s information systems could be paralyzed from a massive attack by destructive software. • Virus: Software that can attach itself to (“infect”) other computer programs without the owner of the program being aware of the infection.

  39. IS Security and Control Security Treats

  40. Protecting the Digital Firm • Firewall screening technologies • Static packet filtering • Network address translation • Application proxy filtering • Intrusion detection systems • Scanning software • Monitoring software

  41. Security and Electronic Commerce • Encryption • Authentication • Message integrity • Digital signatures • Digital certificates • Public key infrastructure (PKI)

More Related