enabling technologies (chapter 1)
DESCRIPTION
Enabling Technologies (Chapter 1). Understand the technology and importance of: Virtualization Cloud Computing WAN Acceleration Deep Packet Inspection Media - fiber & copper cabling. Protocols. A protocol is a set of rules for communicating between computers. Why are they needed? - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/1.jpg)
Enabling Technologies(Chapter 1)
Understand the technology and importance of:
Virtualization Cloud Computing WAN Acceleration
Deep Packet Inspection Media - fiber & copper cabling
![Page 2: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/2.jpg)
Protocols
• A protocol is a set of rules for communicating between computers.
• Why are they needed?
– Who goes first?– Are you ready?– I got your message– There are errors
![Page 3: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/3.jpg)
Compression; No Impact on Speed
Internet
• The use of sophisticated algorithms (mathematical formulas) to shrink the amount of data sent over networks or stored on computers.
• How does compression make networks more efficient?• Examples of applications that use compression?
![Page 4: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/4.jpg)
Multiplexing
• Multiplexing makes networks more efficient by combining multiple streams of data onto a single medium• What are examples?
• Why is this important?• How is multiplexing different than compression?
![Page 5: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/5.jpg)
Server Virtualization
Server virtualization
• single servers with functions and features of multiple servers
• Within each physical server, each application is a “virtual machine”
Virtualization software within the server
• manages traffic into and out of the host server
• allocates the server’s resources including memory, computing and hard drive capacity to applications
![Page 6: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/6.jpg)
Virtualized Servers With Operating Systems
VM OS VM OS VM OS
AppsOS
AppsOS
AppsOS
AppsOS
AppsOS
AppsOS
AppsOS
AppsOS
Physical servers
Virtual machine operating systems
Virtual machines
![Page 7: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/7.jpg)
Cloud Computing• Computing, storage, applications and parts or all of data centers at a
provider’s site• Cloud computing enablers
– High capacity networks– Virtualization
Service provider’s data center accessed via the Internet
![Page 8: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/8.jpg)
Rationale for Cloud Computing
• For enterprises savings on:– Cooling– Space– Testing new applications– IT staffing– Application development
• Enterprise reluctance• Consumer caution
![Page 9: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/9.jpg)
WAN Acceleration and Optimization
• Wide Area Network (WAN) Acceleration makes networks more efficient by:– Overcoming delays caused by “chatty” protocols– Using compression
• Enterprises, hospitals and universities use WAN acceleration:– Between their sites– To improve response times in their networks
![Page 10: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/10.jpg)
WAN Acceleration Overview
![Page 11: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/11.jpg)
Deep Packet Inspection
CarrierNetwork
DPI switchAt carrier data center
Landline Customer
Mobile customer
• Track messages• Monitor and manage congestion• Calculate bits transmitted monthly• Block access to sites• Slow down certain traffic• Give priority to other traffic
![Page 12: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/12.jpg)
• What are my choices?• What are the criteria for selection?• Implication of choices
Media
![Page 13: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/13.jpg)
Copper Cable
• Cross Section of Category 6 Cabling
![Page 14: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/14.jpg)
Fiber Applications and Characteristics
• Characteristics– Capacity– Electrical immunity– Security– Durability– Size– Weight– Flexibility– Material & labor costs
• Applications– Backbones– Submarine cabling– Riser cabling between floors– Connections between
buildings in a campus
![Page 15: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/15.jpg)
Open Systems Interconnect Model (OSI)
• Layer 1: Physical Layer– Media type (copper, fiber, etc.); Repeaters, amplifiers
• Layer 2: Data Link Layer– Frames; MAC addresses; Ethernet, Frame Relay, ATM
• Layer 3: Network Layer– Routing/Addressing; Packets; TCP/IP
• Layer 4: Transport Layer– Content switching; TCP, UDP; Voice, data, video priority; Filter content
• Layer 5: Session Layer– H.323 voice/video sessions; encryption
• Layer 6: Presentation Layer– Format for presentation to screen; HTML
• Layer 7: Application Layer– File services, print services: HTTP
![Page 16: Enabling Technologies (Chapter 1)](https://reader036.vdocuments.us/reader036/viewer/2022081507/56815eea550346895dcd9c57/html5/thumbnails/16.jpg)
Summary• Why are the following important:
– Virtualization– Cloud computing– Compression and multiplexing– WAN acceleration & optimization– Deep Packet Inspection
• How do fiber cabling and unshielded twisted pair differ from each other?– Where are they each used?