7-2 Network Diagram
Darlena Pagan
Southern New Hampshire University
Abstract
In this Power Point, it consists of a “network diagram containing the following
components, such as, “workstation, switch, server, application service, router,
firewall, internet cloud, PCs and Computer-Printer. In addition, “label all
components, and briefly describe the purpose of each component in your
network. Each description should be placed near its associated component. You
may use any additional relevant components, making sure to justify their
purpose toward the effectiveness of your network.” However, there are 14 slides
and number 13 and 14 are the references used to created the 7-2 Network
Diagram’s Power Point. However, the Abstract is recorded for the listen. On the
other hand, the first slide which is the cover plays music. In addion, the slides
involve either notes, videos or recording. *However, after slide 14, the Internet
Cloud Network Diagram is on slide 16.
Work Station
According to Britannica Encyclopaedia (2014), The Workstation is a computer
system operated with a rich history as following:
• 1981: For The First Time Introduce to U.S. National Aeronautics and Space
Administration the Work Station was used for the Apollo space program.
• 1983: Introduce To Public and Business
• Design for an individual
• Individual to do a particular job
• Advance graphics large storage, powerful microprocessor and data-processing
Switch
According to Britannica Encyclopaedia (2014), The Switch involves
controlling packets and it is either unmanaged or managed as following:
• Control the flow of network traffic
• Different devices are connect to the ports of the switch
• Monitor the packets it received and forward the packets to the appropriate port
only
• Information sharing and resources allocation
• Unmanaged Switch: Does Not Configure working with the Switch
• Managed Switch: Configurable, offering great flexibility, monitoring, and
adjust a managed switch locally or remotely
Server
According to Laudon, K.C and Laudon, J.P. (2012), a server is:
• The transmission control Protocol/Internet Protocol (TCP/IP) networking
standard to tie their disparate networks together
• IT infrastructure links computer hardware and smaller networks into an
enterprise-wide network
• Information flows freely across the organization and other organization
• The computer brings files and services to other computers
• Server” refer to both software application and the physical computer on which
the network software run
Application Server
According to Oracle (2014), an Application Server is:
• Application Server Choices for Different Needs
• To meet the needs of traditional and cloud IT environments
• Performance, scalability, efficiency, management, and unified application
server offering
• Java EE platform for clouding applications
• Application server for building and running enterprise applications and
services
Router
According to Laudon, K.C and Landon, J.P. (2012), a router is:
• Specialized communication processor 1983: Introduce To Public and Business
• Forward packages of data from one network to another network
• Routers connect networks
• A router links computers to the Internet
Firewall
According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the
privacy of computers
• Prevention: malware and intruders from entering in the computer
• Identifies things like names, IP addresses, applications,
• Large businesses: Specially designated computer separate from the rest of the
network in order to protect their computer from the access of incoming traffic
• Screening technology
• Protect the system’s privacy
Internet Cloud
According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a
web-based application that are stored on remote servers and accessed via the
“cloud” of the Internet using a standard Web browser.
• Cloud computing also called Internet cloud
• Are billions of devices transmitting and exchanging information
• Single location management (controlling multiple IOT application)
• Running IoT devices in the cloud (protected from security threats and
malware)
• Industry IoT cloud alliances (a delivery of cloud-based solution)
PCs
According to Britannica Encyclopaedia (2014), A PC is:
• Digital computer
• Personal computer
• Consists of a central processing unit (CPU)
• Display screen, keyboard and mouse, modem and printer
Printer
According to Whatis.com, a computer printer is:
• A device
• Text and graphic output from a computer
• Transfers the information to paper
7-2 Network Diagram
Firewall: Protect Computer from Viruses
Data Leaving from Internal System
Data Incoming to the
Internal Computer
Router connects
networks
To meet the needs
of traditional and
cloud IT
environments
Switch: Monitor the
packets it received
and forward the
packets to the
appropriate port only
Personal
computer
PC)
Transfers the
information to paper
The computer brings
files and services to
other computers
Incoming data from
another computer
WAN
LAN
References
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems, Part Two Information Technology Infrastructure, Client/Server Era
(1983 to Present) (12 Edition and page 168-170), Retrieve from Pearson Education, Inc., Upper Saddle
River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page 314 and 315), Firewalls, Intrusion Detection
Systems and Antivirus Software, Retrieved from Pearson Education, Inc., Upper Saddle River, New
Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G2), Retrieved from Pearson Education, Inc.,
Upper Saddle River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G11), Retrieved from Pearson Education, Inc.,
Upper Saddle River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G11), Retrieve from Pearson Education, Inc.,
Upper Saddle River, New Jersey
References
Britannica Encyclopaedia. (2014).
Personal Computer (PC), Retrieved from
http://www.britannica.com/EBchecked/topic/452928/personal-computer-PC
Britannica Encyclopaedia. (2014).
Workstation, Retrieved from http://www.britannica.com/EBchecked/topic/648195/workstation
CISCO. (2014).
What is a Network Switch vs. a Router? Retrieved from
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_employ
ees_and_offices/what_is_a_network_switch/index.html?referring_site=smartnavRD
ITProPortal. (2014).
How the cloud is the engine behind Internet of Things, Retrieved form
http://www.itproportal.com/2014/07/24/how-the-cloud-is-the-engine-behind-the-growing-internet-
of-things/
Oracle (2014).
Application Server Choices for Different Needs, Retrieved from
http://www.oracle.com/us/products/middleware/cloud-app- foundation/weblogic/overview/index.html
Next
Internet cloud
7-2 Network Diagram
Cloud computing also called Internet cloud
Internet Cloud Connects: Hardware, Software and Serves.
Types of Servers: Linux, Mac OS, Windows 2000,
Windows NT , Unix
Motherboard
Hardware
LapTop Hardware
Mouse
Hardware
Types of Software
Microsoft
Hardware
Internet Clouds
THANK YOU FOR
WATCHING THIS
POWER POINT!
THE END

7 2 network diagram created by darlena pagan

  • 1.
    7-2 Network Diagram DarlenaPagan Southern New Hampshire University
  • 2.
    Abstract In this PowerPoint, it consists of a “network diagram containing the following components, such as, “workstation, switch, server, application service, router, firewall, internet cloud, PCs and Computer-Printer. In addition, “label all components, and briefly describe the purpose of each component in your network. Each description should be placed near its associated component. You may use any additional relevant components, making sure to justify their purpose toward the effectiveness of your network.” However, there are 14 slides and number 13 and 14 are the references used to created the 7-2 Network Diagram’s Power Point. However, the Abstract is recorded for the listen. On the other hand, the first slide which is the cover plays music. In addion, the slides involve either notes, videos or recording. *However, after slide 14, the Internet Cloud Network Diagram is on slide 16.
  • 3.
    Work Station According toBritannica Encyclopaedia (2014), The Workstation is a computer system operated with a rich history as following: • 1981: For The First Time Introduce to U.S. National Aeronautics and Space Administration the Work Station was used for the Apollo space program. • 1983: Introduce To Public and Business • Design for an individual • Individual to do a particular job • Advance graphics large storage, powerful microprocessor and data-processing
  • 4.
    Switch According to BritannicaEncyclopaedia (2014), The Switch involves controlling packets and it is either unmanaged or managed as following: • Control the flow of network traffic • Different devices are connect to the ports of the switch • Monitor the packets it received and forward the packets to the appropriate port only • Information sharing and resources allocation • Unmanaged Switch: Does Not Configure working with the Switch • Managed Switch: Configurable, offering great flexibility, monitoring, and adjust a managed switch locally or remotely
  • 5.
    Server According to Laudon,K.C and Laudon, J.P. (2012), a server is: • The transmission control Protocol/Internet Protocol (TCP/IP) networking standard to tie their disparate networks together • IT infrastructure links computer hardware and smaller networks into an enterprise-wide network • Information flows freely across the organization and other organization • The computer brings files and services to other computers • Server” refer to both software application and the physical computer on which the network software run
  • 6.
    Application Server According toOracle (2014), an Application Server is: • Application Server Choices for Different Needs • To meet the needs of traditional and cloud IT environments • Performance, scalability, efficiency, management, and unified application server offering • Java EE platform for clouding applications • Application server for building and running enterprise applications and services
  • 7.
    Router According to Laudon,K.C and Landon, J.P. (2012), a router is: • Specialized communication processor 1983: Introduce To Public and Business • Forward packages of data from one network to another network • Routers connect networks • A router links computers to the Internet
  • 8.
    Firewall According to Laudon,K.C and Landon, J.P. (2012), firewalls protects the privacy of computers • Prevention: malware and intruders from entering in the computer • Identifies things like names, IP addresses, applications, • Large businesses: Specially designated computer separate from the rest of the network in order to protect their computer from the access of incoming traffic • Screening technology • Protect the system’s privacy
  • 9.
    Internet Cloud According toLaudon, K.C and Landon, J.P. (2012), a cloud computing is a web-based application that are stored on remote servers and accessed via the “cloud” of the Internet using a standard Web browser. • Cloud computing also called Internet cloud • Are billions of devices transmitting and exchanging information • Single location management (controlling multiple IOT application) • Running IoT devices in the cloud (protected from security threats and malware) • Industry IoT cloud alliances (a delivery of cloud-based solution)
  • 10.
    PCs According to BritannicaEncyclopaedia (2014), A PC is: • Digital computer • Personal computer • Consists of a central processing unit (CPU) • Display screen, keyboard and mouse, modem and printer
  • 11.
    Printer According to Whatis.com,a computer printer is: • A device • Text and graphic output from a computer • Transfers the information to paper
  • 12.
    7-2 Network Diagram Firewall:Protect Computer from Viruses Data Leaving from Internal System Data Incoming to the Internal Computer Router connects networks To meet the needs of traditional and cloud IT environments Switch: Monitor the packets it received and forward the packets to the appropriate port only Personal computer PC) Transfers the information to paper The computer brings files and services to other computers Incoming data from another computer WAN LAN
  • 13.
    References Laudon, K.C andLandon, J.P. (2012). Management Information Systems, Part Two Information Technology Infrastructure, Client/Server Era (1983 to Present) (12 Edition and page 168-170), Retrieve from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page 314 and 315), Firewalls, Intrusion Detection Systems and Antivirus Software, Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G2), Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G11), Retrieved from Pearson Education, Inc., Upper Saddle River, New Jersey Laudon, K.C and Landon, J.P. (2012). Management Information Systems (12 Edition and page G11), Retrieve from Pearson Education, Inc., Upper Saddle River, New Jersey
  • 14.
    References Britannica Encyclopaedia. (2014). PersonalComputer (PC), Retrieved from http://www.britannica.com/EBchecked/topic/452928/personal-computer-PC Britannica Encyclopaedia. (2014). Workstation, Retrieved from http://www.britannica.com/EBchecked/topic/648195/workstation CISCO. (2014). What is a Network Switch vs. a Router? Retrieved from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_employ ees_and_offices/what_is_a_network_switch/index.html?referring_site=smartnavRD ITProPortal. (2014). How the cloud is the engine behind Internet of Things, Retrieved form http://www.itproportal.com/2014/07/24/how-the-cloud-is-the-engine-behind-the-growing-internet- of-things/ Oracle (2014). Application Server Choices for Different Needs, Retrieved from http://www.oracle.com/us/products/middleware/cloud-app- foundation/weblogic/overview/index.html
  • 15.
  • 16.
    7-2 Network Diagram Cloudcomputing also called Internet cloud Internet Cloud Connects: Hardware, Software and Serves. Types of Servers: Linux, Mac OS, Windows 2000, Windows NT , Unix Motherboard Hardware LapTop Hardware Mouse Hardware Types of Software Microsoft Hardware Internet Clouds
  • 17.
    THANK YOU FOR WATCHINGTHIS POWER POINT!
  • 18.

Editor's Notes

  • #9 It needs a protection system against “malware and intruders.” According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the privacy of computers that controls the flow of incoming and outgoing network traffic resulting in protecting the privacy of the company’s computers. According to Laudon, K.C and Landon, J.P. (2012), “falls identifies things like names, IP addresses, applications, and other characteristics of incoming traffic.” In a large business, it resides on a specially designated computer separate from the rest of the network in order to protect their computer from the access of incoming traffic. This means that all incoming traffic cannot collect information from another computer or access another computer to steal private information. The types of firewalls that are common to “screening technology”, such as, static package filtering, stateful inspection, network address translation, and application proxy filtering resulting in use as a combination to create a firewall protection (Laudon, K.C and Landon, J.P., 2012). According to Laudon, K.C. and Laudon, J.P. (2012), each screening technology performs differently to protect the system’s privacy (See page 315-317) for more information have each screening technology is protected.
  • #10 According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a web-based application that are stored on remote servers and accessed via the “cloud” of the Internet using a standard Web browser. Cloud computing also called Internet cloud according to ITProPortal (2014) understanding the engine behind the Internet, there are billions of devices transmitting and exchanging information to aid in different operations around the cloud. There are three ways in which the cloud is used, such as, Single location management, Running IoT devices in the cloud and Industry IoT cloud alliances. First, the Single location management is capable of controlling multiple IOT application. Secondly, the running IoT devices in the cloud needs authenticated and it is protected from security threats and malware resulting from that they are detected, monitored, updated and managed over the air across multiple operations (devices) (ITProProtal, 2014). Thirdly, Industry IoT cloud alliances are a delivery of cloud-based solution, such as, communications hardware specialist, data storage specialists, analytics software leaders and mobile operators according to ITProProtal (2014). According to ITProProtal (2014) “The cloud, by providing a front-end management interface for IoT devices, offers organisations the scalability and flexibility they need to update and manage those devices. It can also provide the necessary online and shareable capacity to store the data collected from them.”