SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Networking and Telecommunications Chapter 7
Opening Questions ,[object Object],[object Object],[object Object]
NETWORK BASICS ,[object Object],[object Object]
Why Use Networks in Organizations? ,[object Object],[object Object],[object Object]
Advantages to using a Network ,[object Object],[object Object],[object Object],[object Object],Sneakernet:  an out-dated file-sharing method in which people had to physically transport data files from one desktop to another, presumably wearing sneakers!
Why else use networks? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Most of these listed features require a NOS, a component of a Client/Server Network
NETWORK BASICS ,[object Object],[object Object],[object Object],[object Object],[object Object]
NETWORK TYPES ,[object Object],[object Object],[object Object],[object Object]
Difference between MANS and WANS ,[object Object],[object Object],[object Object],[object Object]
LANs, MANs, and WANs Illustrated Within the confines of a room or single building Connecting LANs from multiple buildings Commonly connects separate offices from the same organization, whether they are across town or across the world
ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object],Note: P2P networks do not use a centralized server
Advantages & Disadvantages to P2P Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Client/Server Networks ,[object Object],[object Object]
Client/Server Networks ,[object Object]
Advantages of a Client/Server Network ,[object Object],[object Object],[object Object],[object Object],[object Object]
TOPOLOGY ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bus/Star/Ring Topologies Bus Topology (linear bus) All devices are connected to a central cable, called the bus or backbone.  These networks are relatively inexpensive and easy to install for small networks Star Topology All devices are connected to a central device, called a hub. Star networks are relatively easy to install & manage, but bottlenecks can occur because all data must pass through the hub Ring Topology The ring topology connects computers on a single circle of cable.  Signals travel around the loop in one direction and pass through each computer acting like a repeater to boost the signal and send it on to the next computer.
Hybrid / Wireless Topologies Hybrid  Topology Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of bus and star topologies Wireless Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server---all with an acceptable transmission range
NETWORK TOPOLOGY
Protocols ,[object Object],[object Object],[object Object]
IEEE 802.3 or Ethernet Protocol  ,[object Object],[object Object],[object Object],[object Object],[object Object]
IEE 802.3 or Ethernet Protocol (Continued) ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Ethernet Packets
Security Perspective ,[object Object],[object Object]
[object Object],[object Object],[object Object]
MEDIA ,[object Object],[object Object],[object Object]
Wire Media ,[object Object],[object Object],[object Object],[object Object],[object Object]
Wire Media
Wireless Media ,[object Object],[object Object]
Networking Hardware Basics Hubs Connectivity device that retransmits incoming data signals to its multiple ports –Typically used for Star topologies and use twisted pair cabling Repeaters A device used to regenerate a signal—addresses a transmission signal problem called attenuation Bridges Allows large networks to be broken up into segments-segments are connected by a bridge----manages bandwidth Switch Also manages bandwidth on a large network—further divides a network into smaller domains Router Routing device that examines each packet of data it receives and then decides which way to sent it towards its destination
[object Object],[object Object]
E-Business Networks ,[object Object],[object Object],[object Object]
E-BUSINESS NETWORKS
Virtual Private Networks:  ,[object Object],[object Object]
How Hospitals are Taken Advantage of Network tech ,[object Object],[object Object],[object Object]
Increased Use of Technology ,[object Object],[object Object]
Examples of new tech used in Healthcare ,[object Object],[object Object],[object Object]
Concerns with RFID’s ,[object Object]
Emerging Technologies: teleprensence Telepresence

Contenu connexe

Tendances

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication samanthaanderson21
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksBikash Kumar
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Networkvasanthimuniasamy
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to networkDhani Ahmad
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
Data communications
Data communicationsData communications
Data communicationsAshwini
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks Jubayer Alam Shoikat
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingMayank Jain
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkOnline
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.mvenkat2016
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 

Tendances (20)

Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
Powerpoint for data communication
Powerpoint for data communication Powerpoint for data communication
Powerpoint for data communication
 
Computer networks
Computer networksComputer networks
Computer networks
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Lecture #5 Data Communication and Network
Lecture #5 Data Communication and NetworkLecture #5 Data Communication and Network
Lecture #5 Data Communication and Network
 
Introduction to network
Introduction to networkIntroduction to network
Introduction to network
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Data communications
Data communicationsData communications
Data communications
 
Data Communications and Computer Networks
Data Communications and Computer Networks Data Communications and Computer Networks
Data Communications and Computer Networks
 
Networking
NetworkingNetworking
Networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Internet, intranet and extranet
Internet, intranet and extranetInternet, intranet and extranet
Internet, intranet and extranet
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Router
RouterRouter
Router
 

En vedette

Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In TelecommunicationsMarlon Jamera
 
Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and networkAnkush Mehrotra
 
Technology Management Chapter 1 Notes
Technology Management Chapter 1 NotesTechnology Management Chapter 1 Notes
Technology Management Chapter 1 NotesRashna_Chaudhry
 
Modern management techniques
Modern management techniquesModern management techniques
Modern management techniquesdrravimr
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-pptsecomps
 

En vedette (8)

Trends In Telecommunications
Trends In TelecommunicationsTrends In Telecommunications
Trends In Telecommunications
 
Overview of telecommunications and network
Overview of telecommunications and networkOverview of telecommunications and network
Overview of telecommunications and network
 
Technology Management Chapter 1 Notes
Technology Management Chapter 1 NotesTechnology Management Chapter 1 Notes
Technology Management Chapter 1 Notes
 
Modern management techniques
Modern management techniquesModern management techniques
Modern management techniques
 
Communication Networks
Communication NetworksCommunication Networks
Communication Networks
 
Telecommunication
TelecommunicationTelecommunication
Telecommunication
 
Technology management
Technology managementTechnology management
Technology management
 
telecommunication-ppt
telecommunication-ppttelecommunication-ppt
telecommunication-ppt
 

Similaire à Networking And Telecommunications

Computer networks7
Computer networks7Computer networks7
Computer networks7Ali Raza
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basicsfasywan
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.pptjaba kumar
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networksSagar Gor
 
computer networks
computer networks computer networks
computer networks MiXvideos
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxmashfiqislam
 
Class Note
Class NoteClass Note
Class NoteAK IJ
 
Computer network
Computer networkComputer network
Computer networkAnupan Jain
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networkingRaja Waseem Akhtar
 

Similaire à Networking And Telecommunications (20)

Computer networks7
Computer networks7Computer networks7
Computer networks7
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Introduction to networks
Introduction to networksIntroduction to networks
Introduction to networks
 
Networking fundamentalsss
Networking fundamentalsssNetworking fundamentalsss
Networking fundamentalsss
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Fg c
Fg cFg c
Fg c
 
Rkp internet part i
Rkp internet part iRkp internet part i
Rkp internet part i
 
computer networks
computer networks computer networks
computer networks
 
Computer networks--networking
Computer networks--networkingComputer networks--networking
Computer networks--networking
 
network fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptxnetwork fundamentals _Chapter 2 - Week 2and 3.pptx
network fundamentals _Chapter 2 - Week 2and 3.pptx
 
final NEtworking.pptx
final  NEtworking.pptxfinal  NEtworking.pptx
final NEtworking.pptx
 
Class Note
Class NoteClass Note
Class Note
 
Computer network
Computer networkComputer network
Computer network
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 

Plus de UMaine

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Information systems management
Information systems managementInformation systems management
Information systems managementUMaine
 
Erp case study
Erp case studyErp case study
Erp case studyUMaine
 
Erp case study
Erp case studyErp case study
Erp case studyUMaine
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork UMaine
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork UMaine
 
Business intelligence systems
Business intelligence systemsBusiness intelligence systems
Business intelligence systemsUMaine
 
Chap 8 ecommerce-scm
Chap 8  ecommerce-scmChap 8  ecommerce-scm
Chap 8 ecommerce-scmUMaine
 
Bua 235 bpm-chap 7
Bua 235 bpm-chap 7Bua 235 bpm-chap 7
Bua 235 bpm-chap 7UMaine
 
Data communications
Data communicationsData communications
Data communicationsUMaine
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processingUMaine
 
Chap 4 hardware & software
Chap 4 hardware & softwareChap 4 hardware & software
Chap 4 hardware & softwareUMaine
 
Is for competitive advantage
Is for competitive advantageIs for competitive advantage
Is for competitive advantageUMaine
 
Chap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamworkChap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamworkUMaine
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235UMaine
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +UMaine
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E BusinessUMaine
 
Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision MakingUMaine
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-IntroUMaine
 

Plus de UMaine (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Information security management
Information security managementInformation security management
Information security management
 
Information systems management
Information systems managementInformation systems management
Information systems management
 
Erp case study
Erp case studyErp case study
Erp case study
 
Erp case study
Erp case studyErp case study
Erp case study
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
Business intelligence systems
Business intelligence systemsBusiness intelligence systems
Business intelligence systems
 
Chap 8 ecommerce-scm
Chap 8  ecommerce-scmChap 8  ecommerce-scm
Chap 8 ecommerce-scm
 
Bua 235 bpm-chap 7
Bua 235 bpm-chap 7Bua 235 bpm-chap 7
Bua 235 bpm-chap 7
 
Data communications
Data communicationsData communications
Data communications
 
Chapter 5 data processing
Chapter 5 data processingChapter 5 data processing
Chapter 5 data processing
 
Chap 4 hardware & software
Chap 4 hardware & softwareChap 4 hardware & software
Chap 4 hardware & software
 
Is for competitive advantage
Is for competitive advantageIs for competitive advantage
Is for competitive advantage
 
Chap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamworkChap 2 collaboration information systems and teamwork
Chap 2 collaboration information systems and teamwork
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235
 
E Business & E Commerce +
E Business & E Commerce +E Business & E Commerce +
E Business & E Commerce +
 
Chapter 3 E Business
Chapter 3 E BusinessChapter 3 E Business
Chapter 3 E Business
 
Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision Making
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-Intro
 

Dernier

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 

Dernier (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 

Networking And Telecommunications

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. LANs, MANs, and WANs Illustrated Within the confines of a room or single building Connecting LANs from multiple buildings Commonly connects separate offices from the same organization, whether they are across town or across the world
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17. Bus/Star/Ring Topologies Bus Topology (linear bus) All devices are connected to a central cable, called the bus or backbone. These networks are relatively inexpensive and easy to install for small networks Star Topology All devices are connected to a central device, called a hub. Star networks are relatively easy to install & manage, but bottlenecks can occur because all data must pass through the hub Ring Topology The ring topology connects computers on a single circle of cable. Signals travel around the loop in one direction and pass through each computer acting like a repeater to boost the signal and send it on to the next computer.
  • 18. Hybrid / Wireless Topologies Hybrid Topology Groups of star-configured workstations are connected to a linear bus backbone cable, combining the characteristics of bus and star topologies Wireless Devices are connected by a receiver/transmitter to a special network interface card that transmits signals between a computer and a server---all with an acceptable transmission range
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Networking Hardware Basics Hubs Connectivity device that retransmits incoming data signals to its multiple ports –Typically used for Star topologies and use twisted pair cabling Repeaters A device used to regenerate a signal—addresses a transmission signal problem called attenuation Bridges Allows large networks to be broken up into segments-segments are connected by a bridge----manages bandwidth Switch Also manages bandwidth on a large network—further divides a network into smaller domains Router Routing device that examines each packet of data it receives and then decides which way to sent it towards its destination
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.

Notes de l'éditeur

  1. How many of your laptops use wireless connectivity? What are the advantages of wireless connectivity? When you purchase a device does its wireless capabilities play a part in your purchasing decisions? MP3 players are beginning to offer wireless capabilities, will you buy a new MP3 player just to receive the wireless connectivity?
  2. What is the relationship between strategic initiatives such as supply chain management and customer relationship management and e-business networks? The technology component of these initiatives depends on the e-business network to make the initiative successful For example, without an e-business network having a SCM system that can view all areas of the supply chain would be impossible