16. PERSONAL AREA NETWORK (PAN)
• Smallest and most basic network
• Meant to cover a very small area (typically a single room or building)
• A PAN is most commonly used for one individual and to connect just a
handful of devices such as a computer, smart phone, and printer.
• Probably the most well-known PAN technology is Bluetooth connection.
17. LOCAL AREA NETWORK (LAN)
• A LAN connects a group of computers or devices together across a local
area.
• Can be utilized to connect devices throughout one building or even 2-3
buildings depending on the proximity to each other.
• Whether wired or wireless connection, it’s using a LAN connection.
18. WIRELESS LOCAL AREA NETWORK
(WLAN)
• A WLAN is simply a LAN that does not rely on cables to connect to the
network.
• When you’re using WiFi, you’re using a WLAN.
19. METROPOLITAN AREA NETWORK
(MAN)
• Larger than a LAN but smaller than a WAN, a MAN incorporates elements
of both types of networks.
• It connects multiple LANs together and spans an entire geographical area
such as a city or town (or sometimes a campus).
• Ownership and management can be handled by a single person, but it’s more
likely done by a larger company or organization.
20. WIDE AREA NETWORK (WAN)
• WANs do the same thing as LANs but across a larger area while connecting
more devices.
• Even when miles apart, a WAN can connect devices together remotely.
• The most basic example of a WAN is the Internet which connects
computers and devices worldwide.
• Since it’s much larger, this type of network is typically maintained by multiple
administrators and ownership is distributed across various organizations.
21. STORAGE AREA NETWORK (SAN)
• A SAN is another type of LAN that’s designed to handle large data transfers
and storage.
• This purpose of this network is to move larger, more complex storage
resources away from the network into a separate, high-performance
atmosphere.
• Doing this not only allows for easy retrieval and storage of the data but it
also frees up space and improves overall performance of the original
network.
22. VIRTUAL PRIVATE NETWORK (VPN)
• The point of a VPN is to increase security and privacy while accessing a
network.
• The VPN acts as a middleman between you and the network by encrypting
your data and hiding your identity.
• Anytime you’re on a public network, you run the risk of being targeted by a
hacker, so using a VPN is you best bet at ensuring your cybersecurity.
23. Web server
• An open-source web server is used for accessing the world wide web through
public domain software.
• These servers connect stored information from an internet website to your
own computer. Web servers store information for the internet that is
retrieved via "HTTP" code and sent to your web browser.
• This is one of the most widely used types of servers.
24. Proxy server
• Proxy servers act as a bridge between a host server and a client server.
• A proxy sends data from a website to your computer IP address after it
passes through the proxy's server. This practice adds a layer of security since
the information is requested then transferred from the source to the proxy
server and never directly from a client to another user.
• A proxy server can filter out various harmful internet entities.
25. Virtual machine (VM)
• Virtual machines store and connect data strictly through virtual space. To
create a virtual machine, IT teams use a hypervisor, also known as a virtual
machine monitor (VMM), which is software that can run thousands of
virtual machines through only one piece of physical hardware.
• This method of server virtualization is widely used for data transfer and
storage because they are the most cost-effective type of server to run.
26. File transfer protocol (FTP) server
• FTP servers are used to relocate files from one computer to another.
• Uploaded files move from your computer to the server while downloaded
files are extracted from the server onto your device.
• File transfer protocol also refers to the method of using a server to connect
one computer to another in order to share data safely.
27. Application server
• These servers connect clients to software applications through virtual server
connections. This allows users to bypass downloading data to their own
hardware in order to access applications.
• Application servers can effectively host large amounts of application data to
many users at once, making them ideal for businesses.
28. File server
• A file server stores data files for multiple users. They allow for faster data
retrieval and saving or writing files to a computer.
• This is a basic type of server used commonly by organizations where lots of
users need access to files that are more conveniently and safely stored on a
server than a personal computer.
29. Database server
• Database servers function as large storage spaces that organizations use and
access to run multiple programs to meet their needs.
• A database server can run independently of any database architecture.
30. Mail server
• A mail server stores and delivers mail for clients through email service
platforms.
• Because mail servers are set up to continually connect to a network,
individual users can access their email without running any systems through
their own devices.
31. Print server
• A print server connects remotely to local computers to print through a
network.
• These servers give businesses the ability to use a single printer to serve an
entire department.
• Some printers even come with their own built-in server ready to join a
network once they're installed in an office area.
32. Domain name system (DNS) server
• These servers transform readable computer domain names into computer
language IP addresses.
• The DNS server takes search data from a user and finds the requested
address to deliver to the client device.
33. Collaboration server
• When work needs to be shared across multiple users, a collaboration server
makes it easy to connect.
• These servers allow you to share and store files, applications and other large
amounts of data.
34. Gaming server
• Large gaming networks use servers to connect users from around the world.
• These servers host multi-player online games.
35. Monitoring and management server
• Monitoring and management servers function in several capacities. First, they
record and track digital transactions and receive user requests.
• Others simply monitor and don't actively participate in user operations.
Monitoring servers are responsive to network administrators who survey
network health to check for threats or bugs in the system.
37. Considerations Before Database
• Determine the purpose of your database
• Find and organize the information required
• Divide the information into tables
• Turn information items into columns
• Decide what information you want to
store in each table. Each item becomes a
field and is displayed as a column in the
table. For example, an Employees table
might include fields such as Last Name
and Hire Date.
• Specify primary keys
• Set up the table relationships
• Refine your design
• Analyze your design for errors. Create the tables
and add a few records of sample data. See if
you can get the results you want from your
tables. Make adjustments to the design, as
needed.
• Apply the normalization rules
• Apply the data normalization rules to see if
your tables are structured correctly. Make
adjustments to the tables, as needed.
38. Create a Database Online Free
• Website Options:
• grubba. nat - the free online datbase for home and office.
• lifewire.com - free online databaase creators.
• kohezion.com - free online database software.
• obvibase.com - simple online database.
• sodadb.com - simple online database.
• zoho.com - crm solution that includes a free database to build online apps.
41. Securing Private Messaging
• More social apps are being launched with each dawn as conversational
commerce gains popularity. Huge amounts of metadata are collected during
these interactions. Most social media platform users protect the services and
their data with weak, unreliable passwords.
• Most messaging companies are warming up to blockchain for securing user
data as a superior option to the end-to-end encryption which they currently
use. Blockchain can be used to create a standard security protocol. For
enabling cross-messenger communication capabilities, blockchain can be
used to form a unified API framework.
42. Securing DNS and DDoS
• A Distributed Denial of Service (DDoS) attack occurs when users of a target resource, such
as a network resource, server, or website, are denied access or service to the target resource.
These attacks shut down or slow down the resource systems.
• On the other hand, an intact Domain Name System (DNS) is very centralized, making it a
perfect target for hackers who infiltrate the connection between the IP address and the
name of a website. This attack renders a website inaccessible, cashable, and even redirectable
to other scam websites.
• Blockchain can be used to diminish such kinds of attacks by decentralizing the DNS entries.
By applying decentralized solutions, blockchain would have removed the vulnerable single
points exploited by hackers.
43. Protecting Data Transmission
• Blockchain can be used in the future to prevent unauthorized access to data
while in transit. By utilizing the complete encryption feature of the
technology, data transmission can be secured to prevent malicious actors
from accessing it, be it an individual or an organization.
• Hackers with malicious intent tap into data amid transit to either alter it or
completely delete its existence. This leaves a huge gap in inefficient
communication channels, such as emails.
44. Blockchain E-commerce Improvements
• Bitcoin, Etherum, and Ripple are some of the cryptocurrencies available as
of now. However, due to their decentralized nature, cryptocurrencies are
now making their way to the mainstream ground by replacing traditional
currencies.
• Introducing blockchain technology can work positively for you. Due to its
decentralized nature, any wrongdoings can be tracked instantly. Also, all
stakeholders can see who is doing it.
45. Other Key Points
• One of the main selling points of blockchain technology is its security. One of the
three main pillars of existing technology that combined to create blockchain is
private key cryptography (hence, cryptocurrency). The protection that cryptography
provides against hackers or security breaches is a huge boon for the tech itself.
• Developing websites on WordPress may also improve from using blockchain
technology and its subsequent applications. WordPress is already an open-source
platform, meaning that developers contribute to the code, development,
documentation, etc. These continuing contributions mutually benefit the users and
professionals found within the WordPress community.
46. How to Develop a POS System
• Examples of Creating Online:
• https://code-boxx.com/pos-system-pure-html-css-javascript/
• https://www.graciousnaija.com/2020/01/point-of-sale-system-using-php-
with.html
• Provide E-Shopper [HTML code] example
48. Extract
• The first part of an ETL process involves extracting the data from the
source system(s).
• Most data-warehousing projects combine data from different source systems.
Each separate system may also use a different data organization and/or
format. Common data-source formats include relational databases, XML,
JSON
49. Transform
• An important function of transformation is data cleansing, which aims to
pass only "proper" data to the target.
50. Load
• The load phase loads the data into the end target, which can be any data
store including a simple delimited flat file or a data warehouse.
• Depending on the requirements of the organization, this process varies
widely.
52. Paid ETL Tools
• Informatica PowerCenter
• IBM InfoSphere DataStage
• Oracle Data Integrator (ODI)
• Microsoft SQL Server Integration Services (SSIS)
• Ab Initio
• SAP Data Services
• SAS Data Manager
53. Free ETL Tools
• Talend Open Studio
• Pentaho Data Integration (PDI)
• Hadoop
54. What Works with ETL?
• Python [programming language]
• SQL [database]
• Java [programming language]
56. Key Elements of Websites
• Layout and Visual Appearance [using our HTML code]
• Color Scheme [using our CSS code]
• Typography [using HTML, CSS and JS code]
• Navigation [using HTML and CSS code]
• Content [general information]
• Mobile friendly