Jual Obat Aborsi Bandung (Asli No.1) Wa 082134680322 Klinik Obat Penggugur Ka...
bcomclasscond.pptx
1. Application of networks and
communication
• The various practical application of network
and communications are
1. Workgroup computing and Groupware
2. Telecommuting and virtual offices
2. Work group computing and groupware
• Telecommunication networks and computers
enable us to collaborate; to share resources,
communicate ideas and schedule meetings.
• A group of people working together on a
particular task or assignment and sharing
information is called “work group”.
• In work group computing, also called
collaborative computing, teams of co-workers,
often at different locations, uses network or
micro computers to share information and to co-
operate on projects.
3. • Work group computing is made possible by a
software called groupware, which allows
two or more people on a network to work
on the same project at the same time.
• What is a Groupware?
• It allows several people to use software at
the same time to create documents, keep
track of projects, route messages and
managing deadlines.
4. Eg: Lotus Notes
• Lotus notes, now called IBM notes provides many
features such as
• Send and receive emails, Maintain contacts with
group and calendar with events , group
scheduling etc.
Telecommuting and virtual offices
• Telecommuting is working at home or on travel
using telecommunication networks
• Telecommuting , e-commuting, e-work, working
from home(WFH) or working at home (WAH) is
5. a work arrangement in which employees
enjoy flexibility in working location and hours
• Tools used by telecommuting are groupware,
conferencing calling, video conferencing and
voice over IP.
• It can be efficient and useful for companies as
it allows staff and workers to communicate
over a large distance, saving significant
amounts of travel time and cost.
6. • The virtual office is a non permanent and
mobile office run with computers and
communications technology
• Employees work from their homes, cars and
other new work sites
• They use portable computers and various
network and communication services to do
the business.
• Such an office exists more in virtual space
than in physical space.
7. Network security
• Network security is the security provided to
protect the network and the network accessible
resources (computers , printers etc) from
unauthorized access, risks and continuous
monitoring and measurements.
• Only legal and authorized users are given access
to network.
• It is the duty of network administrator to adopt
preventive measures to protect their networks
from potential security threats.
8. • The most common and simple way of
protecting network is by assigning it a
username and a corresponding password.
• Network security methods
1. Establishing strong passwords for
authentication
2. Put up strong firewall which is a software or
hardware or both protecting against
unauthorized access
3. Install antivirus software in all work stations
9. • Implement a proper security policy in the
network
• Install a filtering software to filter both
incoming and outgoing messages and to
ensure protection from malware.
• Block all the unwanted websites and web
application which have security risks.
• Use biometric system to prove the identity of
a person.
10. Firewall
• A firewall can be defined as a hardware
and/or software placed between an
organization’s internal network and external
network.
• A firewall is a network security system that
enforces security policy between a trusted
organization’s network and the internet.
11. • Malware, malicious software, is the primary
threat to your company network. Viruses are
often the first type of malware that comes to
mind. A virus can be transmitted to your
company network through email or over the
Internet and can quickly cause a lot of damage
to your files.
12. There are two types of firewalls
1. Inside firewall
2. Outside firewall
Inside firewall
• Network and machines of the intranet of the
company are protected by the internal
firewall.
Outside firewall
• Protect the access between the company
networks with that of all the other networks
(extranet)
13. • All traffic from the outside must pass through
it.
• Through firewalls only authorized traffic is
allowed to pass
• They are two types of firewall available in the
market. They are software based and
software and hardware based.
• Both are protect your network and device
from security threats
14. The major function of a firewall are
• A firewall carefully examine each network
packet before forwarding it to the destination
• Incoming request are verified with domain
name and IP address
• Protection from vulnerable services
• Set automatic alarm if suspicious activity is
noticed.
Components of a firewall