0% found this document useful (0 votes)
11 views

Chapter 4

Uploaded by

Dani Gedefa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Chapter 4

Uploaded by

Dani Gedefa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 32

Chapter 4

Network and Cloud Computing


 a computer network consists of communications media, devices,
and software connecting two or more computer system or devices

 communications media are any material substance that carries an


electronic signal to support communications between a sending a
Network receiving device

Fundamenta  The computers and devices on the networks are sometimes called

ls network nodes

 Organization can use networks to share


 hardware, programs, and databases

 to transmit and receive information,

 It allowing them to improve organizational effectiveness and


efficiency
 The shape or structure of a network:

 Arrangement of the communication link and

 Hardware devices on the network


Network
 The transmission rate, distances, signal types and
Topology
physical connection may differ between network

 They may have same topology


 All network devices connect to one another through a hub

Star
Network
 All the network devices are connect to shared
communication medium

 Broadcast

Bus
Network
 a network configuration where devices are interconnected
Mesh in a decentralized manner.
Network
 Classified Depending on:
 physical distance between nodes and
 communications and services it provides
 Personal area network (PAN)
Network  Support interconnection of IT within a range of about 33 feet

Types  Local area network (LAN)


 Connects computer system and devices with small area
 Metropolitan network (MAN)
 Connects users and their devices in a geographical area that
spans a campus or city
 Wide area network (WAN)
 Connect large geographic regions
Client/Server systems
 Client/Server architecture:
 Multiple computer platforms are dedicated to special functions
 Server:
 Distributes programs and data to other computers(clients) on the
network as they request them
Channel Bandwidth

 The rate at which data is exchanged


 usually measured in bits per second(bps)
 The broader the bandwidth the more information can be
exchanged
 Broad band communication
 any high speed internet access that is always on
 Most organizations need to accommodate the transaction
 Selection depend on:
 Amount of information to be exchanged
 Speed
Communication  Data privacy
media  Business requirements
 Two Types
 Guided transmission media and
 Wireless Technologies
 Carry information in the form of light
Wireless technologies
 Wireless communication is the transfer of information between two or more
points that are not connected by an electrical conductor.
 All wireless communications signals are sent within a range frequencies of the
electromagnetic spectrum
 The signals used in wireless networks are broadcast in one of three frequency
ranges
 Microwave (300MHz- 300GHz) signal sent through the air
 radio
 infrared
Wireless communication (continued)
 Bluetooth – 10 to 30 feet at transmission rate of 2Mbps
 3G wireless communication
 Supports wireless voice and broadband speed data communications in mobile
environment
 (2 to 4 Mbps)
 4G wireless communication
 Provide an increased data transmission (3 to 20 times the speed of 3G
networks)
 5G wireless communication
 Higher data transmission than 3G and 4G
 Lower power consumption
 Higher connect reliability with fewer dropped calls
 Wi-Fi
Communication Hardware
Communication Software
 Network operating system
 Software that controls the computer system and devices on a network and
allows them to communicate with each other
 Network outages or slow performance can mean a loss of business
 Network management software
 Software that enables a manager on a networked desktop to monitor the
use of individual computers and shared hardware
 Protects from being copied, modified, or downloaded illegally
 Can locate communications errors and potential network problems
 Fewer hours on routine, faster response to problems ,and greater overall
network control
 Eg. Banks used to monitor the performance of ATM
Communication Software(continued)
 Most IS organizations use network management software to
ensure that
 Their network remains up and running
 Every network component and application is performing acceptably
 Identify, and resolve fault and performance issues before they affect end users
 Automatic fix(latest technology)
 Identify a problem, notify the IS manager, and automatically correct it before
anyone outside the IS department notices it

 Mobile device management software and SDN (Reading assignment)


INTERNET AND WWW
Introduction

 The Internet is a global network of computers that is


accessed by the World Wide Web.
 Internet Protocol
 Enables computers to route communications traffic from one
network to another network as needed
 All networks connected to the internet use IP, so they all can
exchange messages.
How the internet works
 IP protocol:
 Set of rules used to pass packets from one host to another
 IP address:
 A 64-bit number that identifies a computer on the internet
 Domain Name System(DNS):
 translates human-readable domain names
 Uniform resource locator(URL):
 Web address that specifies the exact location of the webpage
using letters and words that map to an IP address and a
location on the host
How the internet works(continued)
How the internet works(continued)
 Internet Corporation for Assigned Names and
Numbers (ICANN):
 Responsible for managing IP addresses and internet domain
names
 Ensure that each domain name represents only one
individual or entity- the one that legally registers it.
 Has authority to resolve domain name disputes
How the internet works(continued)
How the internet works(continued)
 Accessing internet:
 Access method determined by the size and capability of your
organization or system, your budget, and the services
available to you
 Connecting via a LAN server
 Connecting via Internet service providers
 Any organization that provides internet access to people
 Must have an account with the service provider along with software
 Wireless connection
How web works
 The World Wide Web was developed by Tim Berners-Lee
 The Internet and the Web are two different technologies
 Internet is made up of computers, networks hw, sw, and TCP/IP
protocol
 Web consists of server and client software, HTTP, standards, and
markup languages that combine to deliver information and services
over the internet
 Designed to make information easy to find and organize
 It connects billions of documents(web pages) stored on millions of
servers around the world
 Accessed through client software called a web browser
Internet and Web Applications
 The variety of internet and web applications available to individuals
and organizations around the world is vast and ever-expanding
 Over the years, the web has evolved from a directional resource to a
dimensional resource (web 2.0)
 News
 Online shopping
 Search Engine
 Education and training
 Instant message
 Conferencing
 Blog
 Online media and entertainment
Intranets and Extranets
 An intranet is a private network contained within an enterprise
that is used to securely share company information and
computing resources among employees.
 An extranet is a private network that enterprises use to provide
trusted third parties -- such as suppliers, vendors, partners,
customers and other businesses -- secure, controlled access to
business information or operations.
INTERNET OF THINGS
try to cover by yourself

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy