Sie sind auf Seite 1von 36

INFORMATION TECHNOLOGY APPLICATIONS IN MANAGEMENT

presentation on

Fundamentals of Computer Networking

Arguably, the greatest advancement in technology and communication over the past 20 years has been the development and advancement of the computer network. From emailing a friend to on-line bill paying to downloading data off the Internet to ecommerce, networking has made our world much smaller and changed the way we communicate forever.

WHAT IS A COMPUTER NETWORK?


collection of independent computers that communicate with one another over a shared network medium. a collection of hardware components and computers interconnected by communication channels.

a technique in which two or more than two computers are link together. Used for sharing of resources-file/ data, communications etc.

Network Diagram Basic Layout and map of a


traditional computer network.

Networking Layout

Network Architecture- Peer to Peer architecture


- Client server architecture

Types of Network-LAN(local area network) -WAN(wide area network) -INTERNET -INTRANET

Topologies The layouts of various network designs.


- STAR - BUS - RING -MESH -HYBRID

CN HARDWARE/SOFTWARE LATEST TECHNOLOGIES

THE NETWORK DIAGRAM


Wired Network PC Firewall The Internet

Fiber Optic Network Cable


Router

Switch
Server

Other LANS

Wireless Network

NETWORK ARCHITECTURE
the infrastructure in which various systems are connected to run the application. it specifies the physical components as well as their functionalities and configuration in the network. there are mainly two types of network architectures: PEER TO PEER CLIENT SERVER ARCHITECTURE

PEER TO PEER ARCHITECTURE

All computers are peer, any can serve as a server/client. each computer holds its files and resources, Others can access these resources when on. Useful for small organization due to lack of security.

CLIENT SERVER ARCHITECTUER

one of the computers is used to serve" other computers referred to as "clients" the files and resources are centralized, the server holds them and other computers can access them. security is created and managed. To access the network, a person, called a user must provide some credentials, including a username and a password .

TYPES OF NETWORKS
A.LAN (local area network)

A Local Area Network spans a relatively small area LAN are usually confined to one building or a group of buildings Data travel between network devices via network cables. The most common type of Local Area Network is called Ethernet

B.WAN(wide area network)

A Wide Area Network exist over a large area. networking combines multiple LANs sing services such as dedicated leased phone lines, dial-up phone lines (both synchronous and asynchronous), satellite links, and data packet carrier services. Usually requires a Modem.

The worlds largest Wide Area Network in the Internet.

VARIOUS TYPES OF WAN


Metropolitan area network (MAN)-The refers to a network of computers with in a City. Value added network (VAN)-A Value-added Network (VAN) is a hosted service offering that acts as an intermediary between business partners sharing standards based or proprietary data via shared Business Processes. The offered service is referred to as "Value-added Network Service". Virtual private network (VPN)-VPN uses a technique known as tunneling to transfer data securely on the Internet to a remote access server on your workplace network.

C.INTERNET
The simplest definition of the Internet is that it's a network of computer networks a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

The Internet is a system of linked networks that are worldwide in scope and facilitate data communication services such as remote login, file transfer, electronic mail, the World Wide Web and newsgroups.

video

A page on the Internetwhether it's full of words, images or bothdoesn't come to you in one shipment. It's translated into digital information, chopped into 1500 byte pieces called PACKETS, and sent to you like a puzzle that needs to be reassembled. Each part of the packet has a specific function:
Header Provides the complete destination address for the packet Sequence ID IDs where the information belongs in relation to the rest of the information

How information travel through internet?

Data Block The portion of the overall information carried by the packet

End of Message IDs the end of the packet

THE INTERNET
How Information Travel Through the Internet

Your Computer

ISP

Routers

Web Servers

When you connect to a Web site through an ISP and start exchanging information, there isn't a fixed connection between your computer and the Web server computer hosting the Web site. Instead, information is exchanged using the best possible path at that particular time. Special computers called routers determine these paths, avoiding slow links and favoring fast ones.

D.INTRANET

refers to a network within an organization. a private network utilizing Internet-type tools, but available only within that organization. With the advancements made in browser-based software for the Internet, many private organizations are implementing intranets. Access to an intranets web site is restricted by a firewall..

TOPOLOGIES
Network Topology refers to the shape of a network, or the network's layout. How different nodes in a network are connected to each other and how they communicate are determined by the network's topology. There are three basic topologies:

STAR

BUS

RING

MESH

HYBRID

STAR

All devices are connected to a central hub. Nodes communicate across the network by through the hub or switch. passing data

RING

All devices are connected to one another in the shape of a closed loop. Each device is connected directly to two other devices, one on either side of it.

BUS

All devices are connected to a central cable, called the bus or backbone. There are terminators at each end of the bus that stops the signal and keeps it from traveling backwards.

MESH

Each of the network node, computer and other devices, are interconnected with one another. Every node not only sends its own signals but also relays data from other nodes.

HYBRID

In this type of topology we integrate two or more different topologies.

OSI MODEL
There are 7 layers in the OSI model. Each layer is responsible for a particular aspect of data communication. The layers of the OSI model are divided into two groups: THE UPPER LAYER-The upper layers focus on user applications and how files are represented on the computers prior to transport. LOWER LAYERS. It's the lower layers that concentrate on how the communication across a network actually occurs.

CN HARDWARE/SOFTWARE
FIBER OPTIC CABLE

Standard Network Copper Cable

Reduces interference in the network Transmit data faster than copper network cable Allows for more bandwidth Smaller and more fragile than copper cable

SWITCHES AND HUBS

Network Switches

Network Hubs

Data travels faster through switches because data is not sequenced as it is in a hub
The information is more secure when it passes through a switch as opposed to a hub. Information travels more efficiently through a switch because travels directly to its destination as opposed to being broadcast to all PCs on the network hub.

ROUTERS

Standard Router Wireless Router

Routers connect two or more networks and forward data packets between them. When data arrives from one of the segments, the router decides, according to it's routing table, to which segment to forward that data. specialized computers that send your messages and those of every other Internet user speeding to their destinations along thousands of pathways. devices that let messages flow between networks, rather than within networks.

HUBS

New Ethernet technologies introduced new cable types that we unable to fulfill the original physical requirements. New devices hubs - were introduced to simulate those characteristics.
the hub's major function is to replicate data it receives from one device attached to it to all others.

GATEWAY
Gateway" is a term that was once used to refer to a routing device. Today, in the TCP/IP world, the term "router" is used to describe such a device. Gateways implement application layer conversions of information received from various protocols.

REPEATERS
A repeater is connected to two cable segments. Any electrical signal reaching the repeater from one segment, will be amplified and retransmitted to the other segment.

MODEMS

The word "Modem" stands for "Modulator Demodulator". A modem is a device that converts digital data originating from a terminal or computer, to analog signals used by voice communication networks such as the telephone system. At one end, modems convert the digital pulses to audible tones and convert audio tones back to digital pulses at the other.

SERVERS
Users are connected to certain servers which will fulfill the required request. There are 3 Principle Types of Servers Print Servers Contains the name and location of all printers that are on the Network File Servers Contain the location and names of the various drives, files, and folders on a Network Web Servers Contain the Programs, Files, and Internet Web Sites

Rack of Servers

WEB SERVERS
IP Addresses
IP stands for Internet Protocol. IP Addresses serve as the location of websites on the Internet as well as the workstations that are connected to the web. IP addresses are made up of four sets of numbers called Octets. There are two types of IP Addresses: Static and Temporary. Below is a description of both.

Static IP addresses are found only on servers and remain the same. A Domain Name Server assigns a human readable web address to each static IP address to make it more user friendly.

Static IP Addresses

Temporary IP Addresses

Temporary IP addresses are found only on PCs are constantly changing each time it is logged on. assigned by an ISP (Internet Service Provider) each time it is logged on to the Internet.

FIREWALL

A firewall is a system or group of systems that enforces an access control policy between two networks. A firewall is a software that can be loaded on to a network that can serve as a barrier that keeps destructive forces away from a network of computers. Packets of data are analyzed against a set of criteria or standards called filters. Filters block certain designated IP addresses.

Latest Technological Developments


Wireless Generations: 1G,2G,3G,4G
1G (or 1-G) refers to the first-generation of wireless telephone technology, mobile telecommunications. 2G (or 2-G) is short for secondgeneration wireless telephone technology mobile telecommunications. 3G stands for 3rd Generation. It is a term used to represent the 3rd generation of mobile telecommunications technology.

Continued..
In telecommunications, 4G is the fourth generation of cell phone mobile communications standards. It is a successor of the third generation (3G) standards. A 4G system provides mobile ultra-broadband Internet access, for example to laptops with USB wireless modems, to smart phones, and to other mobile devices. Conceivable applications include amended mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing and 3D television.

Das könnte Ihnen auch gefallen