Introduction to Enterprise Architecture

Introduction to Enterprise Architecture

Data Communications & Networks Session 1 – Main Theme Introduction and Overview Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Adapted from course textbook resources Computer Networking: A Top-Down Approach, 6/E Copyright 1996-2012 J.F. Kurose and K.W. Ross, All Rights Reserved 1 Agenda 1 Instructor and Course Introduction 2 Introduction and Overview 3 Summary and Conclusion 2 Who am I? - Profile - 30 years of experience in the Information Technology Industry, including twelve years of experience working for leading IT consulting firms such as Computer Sciences Corporation PhD in Computer Science from University of Colorado at Boulder Past CEO and CTO Held senior management and technical leadership roles in many large IT Strategy and Modernization projects for fortune 500 corporations in the insurance, banking, investment banking, pharmaceutical, retail, and information management industries Contributed to several high-profile ARPA and NSF research projects Played an active role as a member of the OMG, ODMG, and X3H2 standards committees and as a Professor of Computer Science at Columbia initially and New York University since 1997 Proven record of delivering business solutions on time and on budget Original designer and developer of jcrew.com and the suite of products now known as IBM InfoSphere DataStage Creator of the Enterprise Architecture Management Framework (EAMF) and main contributor to the creation of various maturity assessment methodology Developed partnerships between several companies and New York University to incubate new methodologies (e.g., EA maturity assessment methodology developed in Fall 2008), develop proof of concept software, recruit skilled graduates, and increase the companies’ visibility 3 How to reach me? Come on…what else did you expect? Cell (212) 203-5004 Email [email protected] AIM, Y! IM, ICQ jcf2_2003 MSN IM [email protected] LinkedIn http://www.linkedin.com/in/jcfranchitti Woo hoo…find the word of the day… Twitter http://twitter.com/jcfranchitti Skype [email protected] 4 What is the class about? .Course description and syllabus: » http://www.nyu.edu/classes/jcf/g22.2262-001/ » http://cs.nyu.edu/courses/fall13/G22.2262-001/index.html » Most of the readings will come from the required text » The textbook will also be useful in solving some of the assigned problems .Textbook(s): » Computer Networking: A Top-Down Approach (6th Edition) James F. Kurose, Keith W. Ross Addison Wesley ISBN-10: 0132856204, ISBN-13: 978-0132856201, 6th Edition (02/24/12) 5 Course Topics Overview . Computer Networks and the Internet . Application Layer . Fundamental Data Structures: queues, ring buffers, finite state machines . Data Encoding and Transmission . Local Area Networks and Data Link Control . Wireless Communications . Packet Switching . OSI and Internet Protocol Architecture . Congestion Control and Flow Control Methods . Internet Protocols (IP, ARP, UDP, TCP) . Network (packet) Routing Algorithms (OSPF, Distance Vector) . IP Multicast . Sockets 6 Course Approach . Introduction to Basic Networking Concepts (Network Stack) . Origins of Naming, Addressing, and Routing (TCP, IP, DNS) . Physical Communication Layer . MAC Layer (Ethernet, Bridging) . Routing Protocols (Link State, Distance Vector) . Internet Routing (BGP, OSPF, Programmable Routers) . TCP Basics (Reliable/Unreliable) . Congestion Control . QoS, Fair Queuing, and Queuing Theory . Network Services – Multicast and Unicast . Extensions to Internet Architecture (NATs, IPv6, Proxies) . Network Hardware and Software (How to Build Networks, Routers) . Overlay Networks and Services (How to Implement Network Services) . Network Firewalls, Network Security, and Enterprise Networks 7 Computer Accounts . Students that do not already have a CIMS network account should follow these instructions: CIMS network account . Solaris Machines: courses1, courses2, courses3 8 Software Requirements Microsoft Windows XP Professional / Vista / 7 and Mac OS/X Software tools will be available from the Internet or from the course Web site under demos as a choice of freeware or commercial tools References will be provided on the course Web site 9 Class Mailing List All students should register themselves with the class list, which is used for all technical discussions concerning the course To register, go to the following web page, and follow the instructions: cs.nyu.edu/mailman/listinfo/g22_2262_001_fa13 You will be notified in return that you are a list participant. Please send all of your questions to this list (not to the instructor) so that everyone can participate 10 Grading . No Examinations! . Final grade will be determined by: . Scores on a series of homework assignments . Class participation . Assignments will consist of: . Problems similar to those in the text . Small (less than 500 lines of code) programs . Packet analysis using Ethereal packet sniffer . Since some assignments will be more difficult than others, the percentage that each represents in your final grade will vary 11 Rules for Working on Assignments All assignments must be done individually (see Cheating next) Unless stated otherwise in the assignment, all writing and coding must be original All assignments must be emailed to the appropriate grader To avoid problems with "lost emails" (e.g., “the Internet ate my homework"), you should save a copy of your EMAILs (not simply the assignment itself) 12 Cheating Policy Please do NOT: Copy any part of another student's homework answers Allow another student to copy your homework Copy any part of code found in a book, magazine, the Internet, or other resource Present the work of another as your own If you use the idea of another in your work, you MUST provide appropriate attribution (that is, cite the work and the author). The penalty for first cheating offense will be a grade of F for the course Computer Science Department Academic Integrity Policy 13 Handing in Assignments Homework problems must be submitted by email to the designated grader Please include: Your name Your SID Assignment number (1, 2, …) in subject Example, “assignment 1” NO credit will be given for ANY assignment after the due date 14 Icons / Metaphors Information Common Realization Knowledge/Competency Pattern Governance Alignment Solution Approach 1515 Agenda 1 Instructor and Course Introduction 2 Introduction and Overview 3 Summary and Conclusion 16 Introduction and Overview Session in Brief Our goal: Overview: . Get “feel” and . What is the Internet? terminology . What is a protocol? . More depth, detail . Network edge; hosts, access net, later in course physical media . Approach: . network core: packet/circuit » Use Internet as example switching, Internet structure . performance: loss, delay, throughput . security . protocol layers, service models . history 17 Roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet-switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 18 What’s the Internet: “nuts and bolts” view PC . millions of connected Mobile network server computing devices: Global ISP wireless hosts = end systems laptop » running network cellular handheld apps Home network Regional ISP communication links fiber, copper, radio, access points satellite Institutional network wired transmission rate = links bandwidth routers: forward packets router (chunks of data) 19 “Cool” internet appliances Web-enabled toaster + weather forecaster IP picture frame http://www.ceiva.com/ World’s smallest web server http://www-ccs.cs.umass.edu/~shri/iPic.html Internet phones 20 What is the Internet: “nuts and bolts” view . protocols control sending, Mobile network receiving of msgs Global ISP » e.g., TCP, IP, HTTP, Skype, Ethernet . Internet: “network of Home network networks” Regional ISP » loosely hierarchical » public Internet versus private Institutional network intranet . Internet standards » RFC: Request for comments » IETF: Internet Engineering Task Force 21 What’s the Internet: a service view . communication infrastructure enables distributed applications: » Web, VoIP, email, games, e-commerce, file sharing . communication services provided to apps: » reliable data delivery from source to destination » “best effort” (unreliable) data delivery 22 What is a protocol? human protocols: network protocols: . “what’s the time?” . machines rather than . “I have a question” humans . introductions . all communication activity in Internet … specific msgs sent governed by protocols … specific actions taken protocols define format, when msgs received, order of msgs sent and or other events received among network entities, and actions taken on msg transmission, receipt 23 What is a protocol? a human protocol and a computer network protocol: Hi TCP connection request Hi TCP connection Got the response time? Get http://www.xyz.com/ 2:00 <file> time Q: Other human protocols? 24 Roadmap 1.1 What is the Internet? 1.2 Network edge end systems, access networks, links 1.3 Network core circuit switching, packet switching, network structure 1.4 Delay, loss and throughput in packet- switched networks 1.5 Protocol layers, service models 1.6 Networks under attack: security 1.7 History 25 A closer look at network structure . network edge: applications and hosts access networks, physical media: wired, wireless

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us