SlideShare a Scribd company logo
Networking and Telecommunications Chapter 7
Opening Questions What are some advantages of networked computing relative to stand alone computing? What is the difference between client/server and peer-to-peer networks? What are a few common types of network topologies?
NETWORK BASICS Telecommunication system  -   enable the transmission of data over public or private networks Network  -   a communications, data exchange, and resource-sharing system created by linking two or  more computers and establishing standards, or protocols, so that they can work together
Why Use Networks in Organizations? All networks offer advantages relative to using a standalone computer… that is, a computer that is not connected to other computers and that uses software applications and data stored on its local disks Networks allow multiple users to  share devices  such as printers, and  share data , for example spreadsheets which are collectively known as network resources.
Advantages to using a Network Sharing devices  save money! For example, rather than buying 20 printers for 20 office workers, a company can have one printer and have those 20 office workers share it over a network. Sharing devices also  saves time! For example, its faster for coworkers to data over a network than to copy data to a removable storage device and physically transport the storage device fro one computer to another. Sneakernet:  an out-dated file-sharing method in which people had to physically transport data files from one desktop to another, presumably wearing sneakers!
Why else use networks? One of the highest priority network services is email! Reasons for networks include; File & Print services Remote user access Mail services Internet services Management Services Traffic monitoring Load balancing Security auditing Backup and restoration services Most of these listed features require a NOS, a component of a Client/Server Network
NETWORK BASICS Networks are differentiated by the following : Architecture  - peer-to-peer, client/server Topology  -  bus, star, ring, hybrid, wireless Protocols  - Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP) Media  - coaxial, twisted-pair, fiber-optic
NETWORK TYPES The three types of networks include : Local area network (LAN) Metropolitan area network (MAN) Wide area network (WAN)
Difference between MANS and WANS MANS : networks that extend beyond the boundaries of a building.  It is a network that is larger than a LAN and connects clients and servers from multiple buildings WANS: a network that connects two or more geographically distinct LANS or MANS. Different than MANs because they typically transport data over much longer distances than MANs and as such often require different transmission methods, media, and use a greater variety of technologies
LANs, MANs, and WANs Illustrated Within the confines of a room or single building Connecting LANs from multiple buildings Commonly connects separate offices from the same organization, whether they are across town or across the world
ARCHITECTURE There are two primary types of architectures Peer-to-peer (P2P) network  Client/server network Peer-to-peer:  is the simplest type of network; every computer can communicate directly with every other computer Note: P2P networks do not use a centralized server
Advantages & Disadvantages to P2P Networks Advantages Simple to configure (Most  home networks are P2P) Typically less expensive to setup and maintain than other types of networks.  Disadvantages Not very flexible : as P2P networks grow, adding or changing significant elements of the network can be difficult Not very secure : data and other resources shared by network users can be easily discovered and used by unauthorized users Resource Sharing is not practical : each user is responsible for configuring Shared Docs and preventing access to other files: Meaning resource sharing is not controlled by a central computer or authority
Client/Server Networks Client/Server networks:  use a central computer, known as a  Server  to facilitate communication and resource sharing between other computers on a network, which are known as  Clients .  In terms of resource sharing you can compare the client/server network to a public library: Librarians manages the use of books and other media by patrons, a server manages the use of shared resources by clients…
Client/Server Networks Client/Server network
Advantages of a Client/Server Network Provide User logon accounts and passwords for user of the network Access to multiple shared resources can be centrally granted to a single user or groups of users Problems on the network can be tracked, diagnosed and often fixed from one location Optimized for faster processing time to handle many requests from clients  Larger disk space means it is  more scalable  and more clients can be added as necessary
TOPOLOGY Network topology -  refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network Bus Star Ring Hybrid Wireless
Bus/Star/Ring Topologies Bus Topology (linear bus) All devices are connected to a central cable, called the bus or backbone.  These networks are relatively inexpensive and easy to install for small networks Star Topology All devices are connected to a central device, called a hub. Star networks are relatively easy to install & manage, but bottlenecks can occur because all data must pass through the hub Ring Topology The ring topology connects computers on a single circle of cable.  Signals travel around the loop in one direction and pass through each computer acting like a repeater to boost the signal and send it on to the next computer.
Hybrid / Wireless Topologies Hybrid  Topology Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of bus and star topologies Wireless Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server---all with an acceptable transmission range
NETWORK TOPOLOGY
Protocols A protocol is a standard that specifies the format of data as well as the rules to be followed during transmission Simply put, for one computer to talk to another computer, they must be speaking the same language. Protocols provide the langauge
IEEE 802.3 or Ethernet Protocol  The committee that addresses LAN standards is called the  IEEE 802 Committee. Thus, IEEE LAN protocols always start   with the number 802. Today, the world’s most popular protocol for LAN is the  IEEE 802.3 protocol. This protocol standard, also called  Ethernet , specifies hardware characteristics such as which wire carries which signals.  It also describes how messages are to be packaged and processed for transmission over the LAN.
IEE 802.3 or Ethernet Protocol (Continued) Most personal computers today are equipped with an onboard NIC that supports what is called  10/100/1000 Ethernet . These products conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1,000 Mbps. Communications speeds are expressed in  bits , whereas memory sizes are expressed in bytes.
The actual data to be sent Media Access Control (MAC): Address of the packets source The MAC address of the intended recipient A Cyclic Redundancy Check or (CRC code) Ethernet Packets
Security Perspective This system of allowing each machine to decide which packets to process does not provide any security.  Keep in mind that any device  that   can connect to the network cable can conceivably capture any data packet transmitted across the wire. Many network diagnostic programs, commonly referred to as  packet sniffers , can tell a NIC to run in  promiscuous mode .
Running in promiscuous mode, the computer will process all packets that it sees on the cable, regardless of the specified MAC addresses.  Packet sniffers can be valuable troubleshooting tools in the right hands, but Ethernet provides no protections against unscrupulous use.  If security of the data is important, consider installing some type of additional encryption software to safeguard your data
MEDIA Network transmission media  -   refers to the various types of media used to carry the signal between computers Wire media (guided) Wireless media (unguided)
Wire Media Wire media  -  transmission material manufactured so that signals will be confined to a narrow path and will behave predictably Three most commonly used types include:  Twisted-pair wiring  Coaxial cable Fiber optic (or optical fiber)
Wire Media
Wireless Media Wireless media  - natural parts of the Earth’s environment that can be used as physical paths to carry electrical signals Atmosphere and outerspace are examples of wireless media that commonly carry signals
Networking Hardware Basics Hubs Connectivity device that retransmits incoming data signals to its multiple ports –Typically used for Star topologies and use twisted pair cabling Repeaters A device used to regenerate a signal—addresses a transmission signal problem called attenuation Bridges Allows large networks to be broken up into segments-segments are connected by a bridge----manages bandwidth Switch Also manages bandwidth on a large network—further divides a network into smaller domains Router Routing device that examines each packet of data it receives and then decides which way to sent it towards its destination
Home Network or Small Business Small to Medium Sized Business
E-Business Networks Today’s industry-leading  companies have developed internet-based products and services to handle many aspects of customer and supplier interactions This means; Integrating online purchases with inventory and POS systems so that customers have a seamless experience between purchase and return or service
E-BUSINESS NETWORKS
Virtual Private Networks:  Uses public telecommunication infrastructure (usually the Internet) to provide secure access to an organizations network Provides users remote access capability to network resources
How Hospitals are Taken Advantage of Network tech Wireless Networking RFID Electronic Health Records
Increased Use of Technology The medical industry is attempting to increase efficiency and functionality by adopting technology. This technology takes the form of electronic medical records, radio frequency identification for patient tracking, and wireless networking among other technologies. These technologies increase the productivity of institutions but, also introduce new risks to patient privacy.
Examples of new tech used in Healthcare RFID: radio frequency identification combined with wireless networking technology. RFID tags used could be used in conjunction with patient’s cell phones to provide a wide variety of dietary and health related information when buying groceries The literature states that wireless network technology and RFID’s could provide medical providers with “location tracking, body sensors, and short range wireless communications for monitoring the health of patients.
Concerns with RFID’s YouTube Video:  Privacy Concerns
Emerging Technologies: teleprensence Telepresence

More Related Content

PDF
Introduction to User Experience Design
Ravi Bhadauria
 
PPTX
Smart homes
Brad Fitzpatrick
 
PPTX
Simple present tense
iraidahj
 
PPT
USER INTERFACE DESIGN PPT
vicci4041
 
PPTX
Telecommunication basics
Yoohyun Kim
 
PPTX
dsl (digital subscriber line)
waheed iqbal
 
PPTX
6 features of a curriculum
Jay Jay Bee Barcebal
 
PPTX
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
Introduction to User Experience Design
Ravi Bhadauria
 
Smart homes
Brad Fitzpatrick
 
Simple present tense
iraidahj
 
USER INTERFACE DESIGN PPT
vicci4041
 
Telecommunication basics
Yoohyun Kim
 
dsl (digital subscriber line)
waheed iqbal
 
6 features of a curriculum
Jay Jay Bee Barcebal
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 

What's hot (20)

PPTX
Telecommunications and networks
Sopon Tumchota
 
PPTX
Computer networking devices
Rajesh Sadhukha
 
PPTX
Ethernet
Mihika Shah
 
PPT
Computer network & communication answer
smkengkilili2011
 
PPTX
Broadband Presentation
Sadie Maybe
 
PPTX
Local area network
Ayushi Gagneja
 
PPTX
Presentation on DSL & ADSL
rewa_monami
 
PPT
Lecture3 Physical Layer
Waqas !!!!
 
PPT
Telecommunications and networks
Bikash Kumar
 
PPT
1 introduction-to-computer-networking
Mayank Jain
 
PPTX
IPv4 Addressing
TheGodfather HA
 
PPT
Network Fundamentals – Chapter 1
Sachii Dosti
 
PPTX
Transmission media (data communication)
Pritom Chaki
 
PPT
Bluetooth Slides
Aniruddha Gupta
 
PPT
TCP/ IP
Harshit Srivastava
 
PPTX
Ethernet - LAN
Adeel Rasheed
 
PDF
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
PPTX
Presentation on data communication
Harpreet Dhaliwal
 
PPT
Networking Fundamentals
Manjit Chavda
 
PPTX
Mobile Computing (Part-1)
Ankur Kumar
 
Telecommunications and networks
Sopon Tumchota
 
Computer networking devices
Rajesh Sadhukha
 
Ethernet
Mihika Shah
 
Computer network & communication answer
smkengkilili2011
 
Broadband Presentation
Sadie Maybe
 
Local area network
Ayushi Gagneja
 
Presentation on DSL & ADSL
rewa_monami
 
Lecture3 Physical Layer
Waqas !!!!
 
Telecommunications and networks
Bikash Kumar
 
1 introduction-to-computer-networking
Mayank Jain
 
IPv4 Addressing
TheGodfather HA
 
Network Fundamentals – Chapter 1
Sachii Dosti
 
Transmission media (data communication)
Pritom Chaki
 
Bluetooth Slides
Aniruddha Gupta
 
Ethernet - LAN
Adeel Rasheed
 
W-LAN (Wireless Local Area Network)
Parvesh Taneja
 
Presentation on data communication
Harpreet Dhaliwal
 
Networking Fundamentals
Manjit Chavda
 
Mobile Computing (Part-1)
Ankur Kumar
 
Ad

Viewers also liked (8)

PPTX
Trends In Telecommunications
Marlon Jamera
 
PPT
Overview of telecommunications and network
Ankush Mehrotra
 
PPT
Technology Management Chapter 1 Notes
Rashna_Chaudhry
 
PPTX
Modern management techniques
drravimr
 
PPT
Communication Networks
Alex Zagoumenov
 
PPTX
Telecommunication
shahryarshahzad
 
PPT
Technology management
VijayKrKhurana
 
PPTX
telecommunication-ppt
secomps
 
Trends In Telecommunications
Marlon Jamera
 
Overview of telecommunications and network
Ankush Mehrotra
 
Technology Management Chapter 1 Notes
Rashna_Chaudhry
 
Modern management techniques
drravimr
 
Communication Networks
Alex Zagoumenov
 
Telecommunication
shahryarshahzad
 
Technology management
VijayKrKhurana
 
telecommunication-ppt
secomps
 
Ad

Similar to Networking And Telecommunications (20)

PPTX
CS-109-Networks-and-Communication-Lesson-1.pptx
EuniceVillanueva9
 
PPTX
Computer networks7
Ali Raza
 
PPT
7312334 chapter-7 a-networking-basics
fasywan
 
PPTX
COMPUTER NETWORKS
abiramiabi21
 
PPTX
E business 2014 l06
kchanaka3
 
PPT
2.Introduction to Network Devices.ppt
jaba kumar
 
DOCX
Basic networking tutorial
reddydivakara
 
PPTX
Computer Networks
Mark Rotondella
 
PPT
Introduction to networks
Sagar Gor
 
PPTX
Types of computer networks
Tatheer Fatima
 
PPT
cloud presentation asdfsd sdfsdafsdfsdsdf .ppt
sivangsantonino
 
PPT
chapter 1: introduction to Com Networks.ppt
nuriman229651
 
PDF
Networking fundamentalsss
shahinaz Altabbakh
 
PPTX
Computer Network - Unit 1
Chandan Gupta Bhagat
 
PPT
Fg c
Taha Khan
 
PPT
Rkp internet part i
DR. Ram Kumar Pathak
 
PPTX
computer networks
MiXvideos
 
PDF
Computer networks--networking
Tańczący Z Kojotami
 
PPTX
network fundamentals _Chapter 2 - Week 2and 3.pptx
mashfiqislam
 
PPTX
final NEtworking.pptx
HardeepKaurCSEAssist
 
CS-109-Networks-and-Communication-Lesson-1.pptx
EuniceVillanueva9
 
Computer networks7
Ali Raza
 
7312334 chapter-7 a-networking-basics
fasywan
 
COMPUTER NETWORKS
abiramiabi21
 
E business 2014 l06
kchanaka3
 
2.Introduction to Network Devices.ppt
jaba kumar
 
Basic networking tutorial
reddydivakara
 
Computer Networks
Mark Rotondella
 
Introduction to networks
Sagar Gor
 
Types of computer networks
Tatheer Fatima
 
cloud presentation asdfsd sdfsdafsdfsdsdf .ppt
sivangsantonino
 
chapter 1: introduction to Com Networks.ppt
nuriman229651
 
Networking fundamentalsss
shahinaz Altabbakh
 
Computer Network - Unit 1
Chandan Gupta Bhagat
 
Fg c
Taha Khan
 
Rkp internet part i
DR. Ram Kumar Pathak
 
computer networks
MiXvideos
 
Computer networks--networking
Tańczący Z Kojotami
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
mashfiqislam
 
final NEtworking.pptx
HardeepKaurCSEAssist
 

More from UMaine (20)

PPT
Information ethics & intro to information security
UMaine
 
PPT
Information security management
UMaine
 
PPT
Information systems management
UMaine
 
PPT
Erp case study
UMaine
 
PPT
Erp case study
UMaine
 
PPTX
Bua 235 teamwork
UMaine
 
PPTX
Bua 235 teamwork
UMaine
 
PPTX
Business intelligence systems
UMaine
 
PPTX
Chap 8 ecommerce-scm
UMaine
 
PPTX
Bua 235 bpm-chap 7
UMaine
 
PPT
Data communications
UMaine
 
PPT
Chapter 5 data processing
UMaine
 
PPT
Chap 4 hardware & software
UMaine
 
PPT
Is for competitive advantage
UMaine
 
PPT
Chap 2 collaboration information systems and teamwork
UMaine
 
PPT
Week 1 bua 235
UMaine
 
PPT
E Business & E Commerce +
UMaine
 
PPT
Chapter 3 E Business
UMaine
 
PPT
Chapter 2 Decision Making
UMaine
 
PPT
Welcome To BUA 235-Intro
UMaine
 
Information ethics & intro to information security
UMaine
 
Information security management
UMaine
 
Information systems management
UMaine
 
Erp case study
UMaine
 
Erp case study
UMaine
 
Bua 235 teamwork
UMaine
 
Bua 235 teamwork
UMaine
 
Business intelligence systems
UMaine
 
Chap 8 ecommerce-scm
UMaine
 
Bua 235 bpm-chap 7
UMaine
 
Data communications
UMaine
 
Chapter 5 data processing
UMaine
 
Chap 4 hardware & software
UMaine
 
Is for competitive advantage
UMaine
 
Chap 2 collaboration information systems and teamwork
UMaine
 
Week 1 bua 235
UMaine
 
E Business & E Commerce +
UMaine
 
Chapter 3 E Business
UMaine
 
Chapter 2 Decision Making
UMaine
 
Welcome To BUA 235-Intro
UMaine
 

Recently uploaded (20)

PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Software Development Methodologies in 2025
KodekX
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
The Future of Artificial Intelligence (AI)
Mukul
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 

Networking And Telecommunications

  • 2. Opening Questions What are some advantages of networked computing relative to stand alone computing? What is the difference between client/server and peer-to-peer networks? What are a few common types of network topologies?
  • 3. NETWORK BASICS Telecommunication system - enable the transmission of data over public or private networks Network - a communications, data exchange, and resource-sharing system created by linking two or more computers and establishing standards, or protocols, so that they can work together
  • 4. Why Use Networks in Organizations? All networks offer advantages relative to using a standalone computer… that is, a computer that is not connected to other computers and that uses software applications and data stored on its local disks Networks allow multiple users to share devices such as printers, and share data , for example spreadsheets which are collectively known as network resources.
  • 5. Advantages to using a Network Sharing devices save money! For example, rather than buying 20 printers for 20 office workers, a company can have one printer and have those 20 office workers share it over a network. Sharing devices also saves time! For example, its faster for coworkers to data over a network than to copy data to a removable storage device and physically transport the storage device fro one computer to another. Sneakernet: an out-dated file-sharing method in which people had to physically transport data files from one desktop to another, presumably wearing sneakers!
  • 6. Why else use networks? One of the highest priority network services is email! Reasons for networks include; File & Print services Remote user access Mail services Internet services Management Services Traffic monitoring Load balancing Security auditing Backup and restoration services Most of these listed features require a NOS, a component of a Client/Server Network
  • 7. NETWORK BASICS Networks are differentiated by the following : Architecture - peer-to-peer, client/server Topology - bus, star, ring, hybrid, wireless Protocols - Ethernet, Transmission Control Protocol/Internet Protocol (TCP/IP) Media - coaxial, twisted-pair, fiber-optic
  • 8. NETWORK TYPES The three types of networks include : Local area network (LAN) Metropolitan area network (MAN) Wide area network (WAN)
  • 9. Difference between MANS and WANS MANS : networks that extend beyond the boundaries of a building. It is a network that is larger than a LAN and connects clients and servers from multiple buildings WANS: a network that connects two or more geographically distinct LANS or MANS. Different than MANs because they typically transport data over much longer distances than MANs and as such often require different transmission methods, media, and use a greater variety of technologies
  • 10. LANs, MANs, and WANs Illustrated Within the confines of a room or single building Connecting LANs from multiple buildings Commonly connects separate offices from the same organization, whether they are across town or across the world
  • 11. ARCHITECTURE There are two primary types of architectures Peer-to-peer (P2P) network Client/server network Peer-to-peer: is the simplest type of network; every computer can communicate directly with every other computer Note: P2P networks do not use a centralized server
  • 12. Advantages & Disadvantages to P2P Networks Advantages Simple to configure (Most home networks are P2P) Typically less expensive to setup and maintain than other types of networks. Disadvantages Not very flexible : as P2P networks grow, adding or changing significant elements of the network can be difficult Not very secure : data and other resources shared by network users can be easily discovered and used by unauthorized users Resource Sharing is not practical : each user is responsible for configuring Shared Docs and preventing access to other files: Meaning resource sharing is not controlled by a central computer or authority
  • 13. Client/Server Networks Client/Server networks: use a central computer, known as a Server to facilitate communication and resource sharing between other computers on a network, which are known as Clients . In terms of resource sharing you can compare the client/server network to a public library: Librarians manages the use of books and other media by patrons, a server manages the use of shared resources by clients…
  • 15. Advantages of a Client/Server Network Provide User logon accounts and passwords for user of the network Access to multiple shared resources can be centrally granted to a single user or groups of users Problems on the network can be tracked, diagnosed and often fixed from one location Optimized for faster processing time to handle many requests from clients Larger disk space means it is more scalable and more clients can be added as necessary
  • 16. TOPOLOGY Network topology - refers to the geometric arrangement of the actual physical organization of the computers and other network devices) in a network Bus Star Ring Hybrid Wireless
  • 17. Bus/Star/Ring Topologies Bus Topology (linear bus) All devices are connected to a central cable, called the bus or backbone. These networks are relatively inexpensive and easy to install for small networks Star Topology All devices are connected to a central device, called a hub. Star networks are relatively easy to install & manage, but bottlenecks can occur because all data must pass through the hub Ring Topology The ring topology connects computers on a single circle of cable. Signals travel around the loop in one direction and pass through each computer acting like a repeater to boost the signal and send it on to the next computer.
  • 18. Hybrid / Wireless Topologies Hybrid Topology Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of bus and star topologies Wireless Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server---all with an acceptable transmission range
  • 20. Protocols A protocol is a standard that specifies the format of data as well as the rules to be followed during transmission Simply put, for one computer to talk to another computer, they must be speaking the same language. Protocols provide the langauge
  • 21. IEEE 802.3 or Ethernet Protocol The committee that addresses LAN standards is called the IEEE 802 Committee. Thus, IEEE LAN protocols always start with the number 802. Today, the world’s most popular protocol for LAN is the IEEE 802.3 protocol. This protocol standard, also called Ethernet , specifies hardware characteristics such as which wire carries which signals. It also describes how messages are to be packaged and processed for transmission over the LAN.
  • 22. IEE 802.3 or Ethernet Protocol (Continued) Most personal computers today are equipped with an onboard NIC that supports what is called 10/100/1000 Ethernet . These products conform to the 802.3 specification and allow for transmission at a rate of 10, 100, or 1,000 Mbps. Communications speeds are expressed in bits , whereas memory sizes are expressed in bytes.
  • 23. The actual data to be sent Media Access Control (MAC): Address of the packets source The MAC address of the intended recipient A Cyclic Redundancy Check or (CRC code) Ethernet Packets
  • 24. Security Perspective This system of allowing each machine to decide which packets to process does not provide any security. Keep in mind that any device that can connect to the network cable can conceivably capture any data packet transmitted across the wire. Many network diagnostic programs, commonly referred to as packet sniffers , can tell a NIC to run in promiscuous mode .
  • 25. Running in promiscuous mode, the computer will process all packets that it sees on the cable, regardless of the specified MAC addresses. Packet sniffers can be valuable troubleshooting tools in the right hands, but Ethernet provides no protections against unscrupulous use. If security of the data is important, consider installing some type of additional encryption software to safeguard your data
  • 26. MEDIA Network transmission media - refers to the various types of media used to carry the signal between computers Wire media (guided) Wireless media (unguided)
  • 27. Wire Media Wire media - transmission material manufactured so that signals will be confined to a narrow path and will behave predictably Three most commonly used types include: Twisted-pair wiring Coaxial cable Fiber optic (or optical fiber)
  • 29. Wireless Media Wireless media - natural parts of the Earth’s environment that can be used as physical paths to carry electrical signals Atmosphere and outerspace are examples of wireless media that commonly carry signals
  • 30. Networking Hardware Basics Hubs Connectivity device that retransmits incoming data signals to its multiple ports –Typically used for Star topologies and use twisted pair cabling Repeaters A device used to regenerate a signal—addresses a transmission signal problem called attenuation Bridges Allows large networks to be broken up into segments-segments are connected by a bridge----manages bandwidth Switch Also manages bandwidth on a large network—further divides a network into smaller domains Router Routing device that examines each packet of data it receives and then decides which way to sent it towards its destination
  • 31. Home Network or Small Business Small to Medium Sized Business
  • 32. E-Business Networks Today’s industry-leading companies have developed internet-based products and services to handle many aspects of customer and supplier interactions This means; Integrating online purchases with inventory and POS systems so that customers have a seamless experience between purchase and return or service
  • 34. Virtual Private Networks: Uses public telecommunication infrastructure (usually the Internet) to provide secure access to an organizations network Provides users remote access capability to network resources
  • 35. How Hospitals are Taken Advantage of Network tech Wireless Networking RFID Electronic Health Records
  • 36. Increased Use of Technology The medical industry is attempting to increase efficiency and functionality by adopting technology. This technology takes the form of electronic medical records, radio frequency identification for patient tracking, and wireless networking among other technologies. These technologies increase the productivity of institutions but, also introduce new risks to patient privacy.
  • 37. Examples of new tech used in Healthcare RFID: radio frequency identification combined with wireless networking technology. RFID tags used could be used in conjunction with patient’s cell phones to provide a wide variety of dietary and health related information when buying groceries The literature states that wireless network technology and RFID’s could provide medical providers with “location tracking, body sensors, and short range wireless communications for monitoring the health of patients.
  • 38. Concerns with RFID’s YouTube Video: Privacy Concerns

Editor's Notes

  • #30: How many of your laptops use wireless connectivity? What are the advantages of wireless connectivity? When you purchase a device does its wireless capabilities play a part in your purchasing decisions? MP3 players are beginning to offer wireless capabilities, will you buy a new MP3 player just to receive the wireless connectivity?
  • #34: What is the relationship between strategic initiatives such as supply chain management and customer relationship management and e-business networks? The technology component of these initiatives depends on the e-business network to make the initiative successful For example, without an e-business network having a SCM system that can view all areas of the supply chain would be impossible