Your SlideShare is downloading. ×
0
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
7 2 network diagram created by darlena pagan
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

7 2 network diagram created by darlena pagan

514

Published on

Telecommunication Network Diagram includes Hardwares, Softwares and Servers

Telecommunication Network Diagram includes Hardwares, Softwares and Servers

Published in: Engineering
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
514
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • It needs a protection system against “malware and intruders.” According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the privacy of computers that controls the flow of incoming and outgoing network traffic resulting in protecting the privacy of the company’s computers. According to Laudon, K.C and Landon, J.P. (2012), “falls identifies things like names, IP addresses, applications, and other characteristics of incoming traffic.” In a large business, it resides on a specially designated computer separate from the rest of the network in order to protect their computer from the access of incoming traffic. This means that all incoming traffic cannot collect information from another computer or access another computer to steal private information. The types of firewalls that are common to “screening technology”, such as, static package filtering, stateful inspection, network address translation, and application proxy filtering resulting in use as a combination to create a firewall protection (Laudon, K.C and Landon, J.P., 2012). According to Laudon, K.C. and Laudon, J.P. (2012), each screening technology performs differently to protect the system’s privacy (See page 315-317) for more information have each screening technology is protected.
  • According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a web-based application that are stored on remote servers and accessed via the “cloud” of the Internet using a standard Web browser. Cloud computing also called Internet cloud according to ITProPortal (2014) understanding the engine behind the Internet, there are billions of devices transmitting and exchanging information to aid in different operations around the cloud. There are three ways in which the cloud is used, such as, Single location management, Running IoT devices in the cloud and Industry IoT cloud alliances. First, the Single location management is capable of controlling multiple IOT application. Secondly, the running IoT devices in the cloud needs authenticated and it is protected from security threats and malware resulting from that they are detected, monitored, updated and managed over the air across multiple operations (devices) (ITProProtal, 2014). Thirdly, Industry IoT cloud alliances are a delivery of cloud-based solution, such as, communications hardware specialist, data storage specialists, analytics software leaders and mobile operators according to ITProProtal (2014). According to ITProProtal (2014) “The cloud, by providing a front-end management interface for IoT devices, offers organisations the scalability and flexibility they need to update and manage those devices. It can also provide the necessary online and shareable capacity to store the data collected from them.”
  • Transcript

    1. 7-2 Network Diagram Darlena Pagan Southern New Hampshire University
    2. Abstract In this Power Point, it consists of a “network diagram containing the following components, such as, “workstation, switch, server, application service, router, firewall, internet cloud, PCs and Computer-Printer. In addition, “label all components, and briefly describe the purpose of each component in your network. Each description should be placed near its associated component. You may use any additional relevant components, making sure to justify their purpose toward the effectiveness of your network.” However, there are 14 slides and number 13 and 14 are the references used to created the 7-2 Network Diagram’s Power Point. However, the Abstract is recorded for the listen. On the other hand, the first slide which is the cover plays music. In addion, the slides involve either notes, videos or recording. *However, after slide 14, the Internet Cloud Network Diagram is on slide 16.
    3. Work Station According to Britannica Encyclopaedia (2014), The Workstation is a computer system operated with a rich history as following: • 1981: For The First Time Introduce to U.S. National Aeronautics and Space Administration the Work Station was used for the Apollo space program. • 1983: Introduce To Public and Business • Design for an individual • Individual to do a particular job • Advance graphics large storage, powerful microprocessor and data-processing
    4. Switch According to Britannica Encyclopaedia (2014), The Switch involves controlling packets and it is either unmanaged or managed as following: • Control the flow of network traffic • Different devices are connect to the ports of the switch • Monitor the packets it received and forward the packets to the appropriate port only • Information sharing and resources allocation • Unmanaged Switch: Does Not Configure working with the Switch • Managed Switch: Configurable, offering great flexibility, monitoring, and adjust a managed switch locally or remotely
    5. Server According to Laudon, K.C and Laudon, J.P. (2012), a server is: • The transmission control Protocol/Internet Protocol (TCP/IP) networking standard to tie their disparate networks together • IT infrastructure links computer hardware and smaller networks into an enterprise-wide network • Information flows freely across the organization and other organization • The computer brings files and services to other computers • Server” refer to both software application and the physical computer on which the network software run
    6. Application Server According to Oracle (2014), an Application Server is: • Application Server Choices for Different Needs • To meet the needs of traditional and cloud IT environments • Performance, scalability, efficiency, management, and unified application server offering • Java EE platform for clouding applications • Application server for building and running enterprise applications and services
    7. Router According to Laudon, K.C and Landon, J.P. (2012), a router is: • Specialized communication processor 1983: Introduce To Public and Business • Forward packages of data from one network to another network • Routers connect networks • A router links computers to the Internet
    8. Firewall According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the privacy of computers • Prevention: malware and intruders from entering in the computer • Identifies things like names, IP addresses, applications, • Large businesses: Specially designated computer separate from the rest of the network in order to protect their computer from the access of incoming traffic • Screening technology • Protect the system’s privacy
    9. Internet Cloud According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a web-based application that are stored on remote servers and accessed via the “cloud” of the Internet using a standard Web browser. • Cloud computing also called Internet cloud • Are billions of devices transmitting and exchanging information • Single location management (controlling multiple IOT application) • Running IoT devices in the cloud (protected from security threats and malware) • Industry IoT cloud alliances (a delivery of cloud-based solution)
    10. PCs According to Britannica Encyclopaedia (2014), A PC is: • Digital computer • Personal computer • Consists of a central processing unit (CPU) • Display screen, keyboard and mouse, modem and printer
    11. Printer According to Whatis.com, a computer printer is: • A device • Text and graphic output from a computer • Transfers the information to paper
    12. 7-2 Network Diagram Firewall: Protect Computer from Viruses Data Leaving from Internal System Data Incoming to the Internal Computer Router connects networks To meet the needs of traditional and cloud IT environments Switch: Monitor the packets it received and forward the packets to the appropriate port only Personal computer PC) Transfers the information to paper The computer brings files and services to other computers Incoming data from another computer WAN LAN
    13. References Laudon, K.C and Landon, J.P. (2012). Management Information Systems, Part Two Information Technology Infrastructure, Client/Server Era (1983 to Present) (12 Edition and page 168-170), Retrieve from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page 314 and 315), Firewalls, Intrusion Detection Systems and Antivirus Software, Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G2), Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G11), Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G11), Retrieve from Pearson Education, Inc., Upper Saddle River, New Jersey
    14. References Britannica Encyclopaedia. (2014). Personal Computer (PC), Retrieved from http://www.britannica.com/EBchecked/topic/452928/personal-computer-PC Britannica Encyclopaedia. (2014). Workstation, Retrieved from http://www.britannica.com/EBchecked/topic/648195/workstation CISCO. (2014). What is a Network Switch vs. a Router? Retrieved from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_employ ees_and_offices/what_is_a_network_switch/index.html?referring_site=smartnavRD ITProPortal. (2014). How the cloud is the engine behind Internet of Things, Retrieved form http://www.itproportal.com/2014/07/24/how-the-cloud-is-the-engine-behind-the-growing-internet- of-things/ Oracle (2014). Application Server Choices for Different Needs, Retrieved from http://www.oracle.com/us/products/middleware/cloud-app- foundation/weblogic/overview/index.html
    15. Next Internet cloud
    16. 7-2 Network Diagram Cloud computing also called Internet cloud Internet Cloud Connects: Hardware, Software and Serves. Types of Servers: Linux, Mac OS, Windows 2000, Windows NT , Unix Motherboard Hardware LapTop Hardware Mouse Hardware Types of Software Microsoft Hardware Internet Clouds
    17. THANK YOU FOR WATCHING THIS POWER POINT!
    18. THE END

    ×