This document summarizes key points from Chapter 15 of William Stallings' book "Data and Computer Communications", 7th Edition. It discusses the applications and architectures of local area networks (LANs). The main applications covered are personal computer LANs, back-end networks, storage area networks, and high-speed office networks. Common LAN topologies like bus, ring, star and their characteristics are explained. Issues around transmission media, protocols, and network devices like bridges, hubs and switches are also summarized at a high level.
This document discusses local area networks (LANs) and their applications, architectures, and technologies. It covers:
1) Common LAN applications like personal computer networks, back-end networks, storage area networks, and high-speed office networks.
2) Key aspects of LAN architecture including topology (e.g. bus, star, ring), transmission medium, IEEE 802 standards, and the functions of bridges and switches.
3) Protocol architectures with descriptions of the physical, logical link control, and media access control layers, as well as common frame formats.
This document discusses different types of networking devices used to connect local area networks (LANs). It describes hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the physical and data link layers, and routers and gateways operate at the network layer and above to connect multiple networks and perform protocol conversion. The document provides details on the functions and characteristics of each type of device.
Network topologies describe the layout of connections between devices in a network. The main types are ring, star, bus, mesh, tree, and hybrid. Ring topology uses a closed loop connection where data passes through each node sequentially. Bus topology connects all devices to a single cable. Star topology connects all devices to a central node. Mesh topology connects each device to every other device. Tree topology branches out from a root node.
This document discusses data communication networks and the ISO-OSI reference model. It begins with an overview of the basic components of a communication network including sources that generate data, transmitters that convert data to signals, transmission systems that carry the data, receivers that convert signals back to data, and destinations that receive the data. It then discusses networking concepts like point-to-point vs. networked communication and examples of wide area networks and local area networks. The document also introduces the seven-layer ISO-OSI reference model and provides examples of the functions of the physical, data link, network, and transport layers. It concludes with a diagram summarizing the key functions of each layer.
This ppt is brief description about basic concepts of data communication network.this slide shows description about network topologies,network configuration and layers in osi model.
Network devices serve several key functions:
1. Separating and connecting networks or expanding network capacity through devices like repeaters, hubs, bridges, routers, and switches.
2. Enabling remote access through modems and other technologies.
3. Key devices include repeaters which regenerate signals, bridges which understand node addresses, switches which divide networks into logical channels, and routers which interconnect networks and determine optimal routes. Remote access devices like modems modulate digital signals for transmission over telephone lines to connect distant computers.
This document provides an overview of local area networks (LANs) and discusses various LAN topics including common topologies (bus, ring, star), frame transmission methods, the roles of hubs and switches, and how bridges and routers can be used to interconnect multiple LANs. It describes the three main layers (physical, media access control, logical link control) of the IEEE 802 LAN protocol architecture and compares it to the OSI model. Key concepts covered include shared medium access, the functions of bridges and switches, and how layer 2 switches improved upon earlier hub technologies to increase network capacity and performance.
Network devices such as repeaters, hubs, bridges, switches, routers, and gateways are used to connect, expand, and manage network traffic. They operate at different layers of the OSI model from the physical layer to the network layer. Repeaters and hubs operate at the physical layer and broadcast traffic to all ports. Bridges segment networks at the data link layer by filtering traffic based on MAC addresses. Switches further improve segmentation by opening virtual circuits between connected devices. Routers connect multiple networks and use IP addresses to choose the best path at the network layer.
This document discusses local area networks (LANs) and their applications, architectures, and technologies. It covers:
1) Common LAN applications like personal computer networks, back-end networks, storage area networks, and high-speed office networks.
2) Key aspects of LAN architecture including topology (e.g. bus, star, ring), transmission medium, IEEE 802 standards, and the functions of bridges and switches.
3) Protocol architectures with descriptions of the physical, logical link control, and media access control layers, as well as common frame formats.
This document discusses different types of networking devices used to connect local area networks (LANs). It describes hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the physical and data link layers, and routers and gateways operate at the network layer and above to connect multiple networks and perform protocol conversion. The document provides details on the functions and characteristics of each type of device.
Network topologies describe the layout of connections between devices in a network. The main types are ring, star, bus, mesh, tree, and hybrid. Ring topology uses a closed loop connection where data passes through each node sequentially. Bus topology connects all devices to a single cable. Star topology connects all devices to a central node. Mesh topology connects each device to every other device. Tree topology branches out from a root node.
This document discusses data communication networks and the ISO-OSI reference model. It begins with an overview of the basic components of a communication network including sources that generate data, transmitters that convert data to signals, transmission systems that carry the data, receivers that convert signals back to data, and destinations that receive the data. It then discusses networking concepts like point-to-point vs. networked communication and examples of wide area networks and local area networks. The document also introduces the seven-layer ISO-OSI reference model and provides examples of the functions of the physical, data link, network, and transport layers. It concludes with a diagram summarizing the key functions of each layer.
This ppt is brief description about basic concepts of data communication network.this slide shows description about network topologies,network configuration and layers in osi model.
Network devices serve several key functions:
1. Separating and connecting networks or expanding network capacity through devices like repeaters, hubs, bridges, routers, and switches.
2. Enabling remote access through modems and other technologies.
3. Key devices include repeaters which regenerate signals, bridges which understand node addresses, switches which divide networks into logical channels, and routers which interconnect networks and determine optimal routes. Remote access devices like modems modulate digital signals for transmission over telephone lines to connect distant computers.
This document provides an overview of local area networks (LANs) and discusses various LAN topics including common topologies (bus, ring, star), frame transmission methods, the roles of hubs and switches, and how bridges and routers can be used to interconnect multiple LANs. It describes the three main layers (physical, media access control, logical link control) of the IEEE 802 LAN protocol architecture and compares it to the OSI model. Key concepts covered include shared medium access, the functions of bridges and switches, and how layer 2 switches improved upon earlier hub technologies to increase network capacity and performance.
Network devices such as repeaters, hubs, bridges, switches, routers, and gateways are used to connect, expand, and manage network traffic. They operate at different layers of the OSI model from the physical layer to the network layer. Repeaters and hubs operate at the physical layer and broadcast traffic to all ports. Bridges segment networks at the data link layer by filtering traffic based on MAC addresses. Switches further improve segmentation by opening virtual circuits between connected devices. Routers connect multiple networks and use IP addresses to choose the best path at the network layer.
Networking devices can be categorized into five groups based on the OSI layer in which they operate: hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the data link layer, and routers and gateways operate at the network layer or above. Bridges connect local area networks (LANs) by filtering and forwarding traffic between them based on MAC addresses, while routers connect LANs and wide area networks by routing packets based on logical network layer addresses.
- A LAN (Local Area Network) connects devices within a limited geographic area like a home, office, or building. Common LAN topologies are bus, ring, and star configurations.
- Popular LAN types include Ethernet, Token Ring, and FDDI (Fiber Distributed Data Interface). Ethernet is very widely used with data rates up to 10 Gbps.
- Advantages of a LAN include sharing resources like printers and files, messaging between users, and sharing a single internet connection. Disadvantages include needing security measures and skilled technicians for setup and maintenance.
Networking and Internetworking Devices21viveksingh
This document provides information on various networking and internetworking devices. It discusses hubs, which connect multiple networking cables together but do not amplify or filter signals. It covers bridges, which operate at the physical and data link layers to filter traffic between network segments. Routers are described as connecting LANs and WANs by routing packets based on logical addresses using routing tables. Gateways link different network types and protocols by translating between formats. Finally, switches and brouters are introduced, with switches offering intelligence beyond hubs to reduce congestion, and brouters combining routing and bridging capabilities.
Wireless LAN allows for mobility by providing a local area network without wires. It functions as an extension of a wired LAN within a building or campus. Key advantages include mobility, low implementation costs, and easier network expansion. Wireless LAN standards like 802.11 have evolved to support higher bandwidths and seamless vertical and horizontal roaming between networks. Wireless LANs operate in both infrastructure and ad-hoc modes and use techniques like CSMA/CA, fragmentation, and power saving to manage access and energy efficiency in a wireless environment.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
This document provides information on various intranet, extranet, and wide area network (WAN) technologies. It discusses unified threat management (UTM), content distribution networks (CDN), software-defined networking (SDN), metropolitan area networks (MAN), and common WAN concepts and technologies including CSU/DSU, switching, frame relay, X.25, and asynchronous transfer mode (ATM).
This document discusses circuit switching and packet switching in communication networks. It provides details on:
1. Circuit switching establishes a dedicated communication path between two stations but the capacity is wasted if no data is being sent. Packet switching divides messages into packets that are transmitted individually and resources are allocated on demand.
2. Circuit switching is used for applications like voice calls where continuous transmission is required. Packet switching provides better line efficiency since the bandwidth is shared between packets.
3. Switches can be implemented using space division or time division techniques. Common switches include crossbar switches, multistage switches, and time-space-time switches.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
Packet Switching Technique in Computer NetworkNiharikaDubey17
This document discusses different packet switching paradigms including virtual circuit switching, datagram switching, and source routing. It describes how bridges and extended local area networks (LANs) connect multiple LANs using a spanning tree algorithm to prevent loops. Finally, it covers limitations of bridges and how virtual LANs (VLANs) increase scalability and security by separating broadcast domains.
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
Circuit and Packet Switching Methods PresentationNiharikaDubey17
This document discusses two main types of switching technologies used in communications networks: circuit switching and packet switching. Circuit switching establishes a dedicated communication path for the duration of a connection, while packet switching breaks messages into packets that are transmitted individually and reassembled at the destination. Packet switching provides better line efficiency since the bandwidth is shared dynamically between users, and allows for variable data rates and prioritization of packets. Virtual circuits are a form of packet switching that pre-establishes a route for packets to follow, avoiding per-packet routing decisions.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
This document discusses layer 2 network design concepts. It recommends designing networks hierarchically with core, distribution, and access layers for modularity and scalability. Switches are preferred over hubs as they reduce collision domains. Routers further reduce broadcast domains. VLANs and link aggregation can increase network capacity and redundancy. Care must be taken to avoid switching loops which can cause broadcast storms. The guidelines emphasize building networks incrementally as needs grow.
A computer network connects two or more computers together to allow sharing of resources and communication between users. Common network types include local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) spanning multiple cities or countries. The topology, or layout of connections between devices, can take bus, star, ring or mesh forms. Protocols and layered network architectures like TCP/IP or OSI model provide standards for communication between networked devices.
The document provides information about ad-hoc networks, including their characteristics, applications, design issues, and routing protocols. Some key points:
- Ad-hoc networks are infrastructure-less and use multi-hop wireless links between mobile nodes, requiring distributed routing protocols. They are suitable for situations requiring quick deployment like emergencies or military operations.
- Challenges for routing in ad-hoc networks include the dynamic topology, limited bandwidth and energy of nodes, and lack of a centralized entity. Traditional link-state and distance-vector routing protocols are examined.
- Popular link-state protocols like OSPF work by flooding link-state information to build a shared topology database and calculate the shortest path tree
The document discusses various network architectures including Token Ring, Ethernet, FDDI, AppleTalk, ARCNET, and MAN systems. Token Ring uses a logical ring topology and token passing for data transfer. It has advantages like no data collisions but disadvantages if links are malfunctioning. Ethernet uses CSMA/CD and can use any physical topology. FDDI provides high performance over fiber optic cables in a token ring architecture. AppleTalk was an early client-server system for Macintosh. ARCNET uses token passing over coaxial cable and supports up to 255 nodes. MAN connects different LANs over large distances.
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
This document discusses various concepts related to transmitting and receiving data over networks. It covers topics such as transmission methods (parallel vs serial), transmission direction (simplex, half-duplex, full-duplex), synchronization techniques, protocols, network topologies, access methods like Ethernet and token ring, transmission media, wireless transmission, and network software. The roles of devices like routers, switches, bridges and servers are also outlined.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
This document provides a historical overview of the development of the internet and web from the 1980s to present. It describes the evolution from early internet infrastructure in the 1980s, the launch of the world wide web in the 1990s (Web 1.0), the rise of social media and user-generated content in the 2000s (Web 2.0), and proposes concepts for the next stages of developments including more personalized experiences (Web 3.0, Mobile 3.0, etc). The document traces key technological developments, companies, and trends that helped drive these changes from passive, read-only experiences to more active, user-driven and personalized interactions online and through mobile devices.
Networking devices can be categorized into five groups based on the OSI layer in which they operate: hubs, repeaters, bridges, routers, and gateways. Hubs and repeaters operate at the physical layer, bridges operate at the data link layer, and routers and gateways operate at the network layer or above. Bridges connect local area networks (LANs) by filtering and forwarding traffic between them based on MAC addresses, while routers connect LANs and wide area networks by routing packets based on logical network layer addresses.
- A LAN (Local Area Network) connects devices within a limited geographic area like a home, office, or building. Common LAN topologies are bus, ring, and star configurations.
- Popular LAN types include Ethernet, Token Ring, and FDDI (Fiber Distributed Data Interface). Ethernet is very widely used with data rates up to 10 Gbps.
- Advantages of a LAN include sharing resources like printers and files, messaging between users, and sharing a single internet connection. Disadvantages include needing security measures and skilled technicians for setup and maintenance.
Networking and Internetworking Devices21viveksingh
This document provides information on various networking and internetworking devices. It discusses hubs, which connect multiple networking cables together but do not amplify or filter signals. It covers bridges, which operate at the physical and data link layers to filter traffic between network segments. Routers are described as connecting LANs and WANs by routing packets based on logical addresses using routing tables. Gateways link different network types and protocols by translating between formats. Finally, switches and brouters are introduced, with switches offering intelligence beyond hubs to reduce congestion, and brouters combining routing and bridging capabilities.
Wireless LAN allows for mobility by providing a local area network without wires. It functions as an extension of a wired LAN within a building or campus. Key advantages include mobility, low implementation costs, and easier network expansion. Wireless LAN standards like 802.11 have evolved to support higher bandwidths and seamless vertical and horizontal roaming between networks. Wireless LANs operate in both infrastructure and ad-hoc modes and use techniques like CSMA/CA, fragmentation, and power saving to manage access and energy efficiency in a wireless environment.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
This document provides information on various intranet, extranet, and wide area network (WAN) technologies. It discusses unified threat management (UTM), content distribution networks (CDN), software-defined networking (SDN), metropolitan area networks (MAN), and common WAN concepts and technologies including CSU/DSU, switching, frame relay, X.25, and asynchronous transfer mode (ATM).
This document discusses circuit switching and packet switching in communication networks. It provides details on:
1. Circuit switching establishes a dedicated communication path between two stations but the capacity is wasted if no data is being sent. Packet switching divides messages into packets that are transmitted individually and resources are allocated on demand.
2. Circuit switching is used for applications like voice calls where continuous transmission is required. Packet switching provides better line efficiency since the bandwidth is shared between packets.
3. Switches can be implemented using space division or time division techniques. Common switches include crossbar switches, multistage switches, and time-space-time switches.
Here are short notes on X.25, ATM, and Frame Relay:
a. X.25 - X.25 is a protocol suite for packet switched WANs. It establishes switched virtual circuits between DTE devices using X.121 addressing. X.25 uses LAPB for data link layer and PLP for network layer. It provides reliable data transfer over public networks.
b. ATM - Asynchronous Transfer Mode is a cell switching and multiplexing technology designed for B-ISDN. It uses fixed size 53 byte cells and establishes permanent virtual circuits between endpoints. ATM supports real-time multimedia traffic using constant bit rate, variable bit rate and available bit rate.
c. Frame Relay -
Packet Switching Technique in Computer NetworkNiharikaDubey17
This document discusses different packet switching paradigms including virtual circuit switching, datagram switching, and source routing. It describes how bridges and extended local area networks (LANs) connect multiple LANs using a spanning tree algorithm to prevent loops. Finally, it covers limitations of bridges and how virtual LANs (VLANs) increase scalability and security by separating broadcast domains.
this is a presentation i made to give some introduction to the backward learning algorithm hope it would be use full.Many places were referred to get information here
Circuit and Packet Switching Methods PresentationNiharikaDubey17
This document discusses two main types of switching technologies used in communications networks: circuit switching and packet switching. Circuit switching establishes a dedicated communication path for the duration of a connection, while packet switching breaks messages into packets that are transmitted individually and reassembled at the destination. Packet switching provides better line efficiency since the bandwidth is shared dynamically between users, and allows for variable data rates and prioritization of packets. Virtual circuits are a form of packet switching that pre-establishes a route for packets to follow, avoiding per-packet routing decisions.
There are five categories of connecting devices based on the layer(s) in which they operate:
1. Those below the physical layer like a passive hub. 2. Those at the physical layer like a repeater or active hub. 3. Those at the physical and data link layers like a bridge or two-layer switch. 4. Those at the physical, data link, and network layers like a router or three-layer switch. 5. Those that can operate at all five layers like a gateway.
This document discusses layer 2 network design concepts. It recommends designing networks hierarchically with core, distribution, and access layers for modularity and scalability. Switches are preferred over hubs as they reduce collision domains. Routers further reduce broadcast domains. VLANs and link aggregation can increase network capacity and redundancy. Care must be taken to avoid switching loops which can cause broadcast storms. The guidelines emphasize building networks incrementally as needs grow.
A computer network connects two or more computers together to allow sharing of resources and communication between users. Common network types include local area networks (LANs) within a building, metropolitan area networks (MANs) within a city, and wide area networks (WANs) spanning multiple cities or countries. The topology, or layout of connections between devices, can take bus, star, ring or mesh forms. Protocols and layered network architectures like TCP/IP or OSI model provide standards for communication between networked devices.
The document provides information about ad-hoc networks, including their characteristics, applications, design issues, and routing protocols. Some key points:
- Ad-hoc networks are infrastructure-less and use multi-hop wireless links between mobile nodes, requiring distributed routing protocols. They are suitable for situations requiring quick deployment like emergencies or military operations.
- Challenges for routing in ad-hoc networks include the dynamic topology, limited bandwidth and energy of nodes, and lack of a centralized entity. Traditional link-state and distance-vector routing protocols are examined.
- Popular link-state protocols like OSPF work by flooding link-state information to build a shared topology database and calculate the shortest path tree
The document discusses various network architectures including Token Ring, Ethernet, FDDI, AppleTalk, ARCNET, and MAN systems. Token Ring uses a logical ring topology and token passing for data transfer. It has advantages like no data collisions but disadvantages if links are malfunctioning. Ethernet uses CSMA/CD and can use any physical topology. FDDI provides high performance over fiber optic cables in a token ring architecture. AppleTalk was an early client-server system for Macintosh. ARCNET uses token passing over coaxial cable and supports up to 255 nodes. MAN connects different LANs over large distances.
This document discusses various networking devices and topologies. It describes physical topologies like bus, star, ring, and mesh. It also discusses logical topologies like broadcast and token passing. The document explains how devices like repeaters, hubs, bridges, and switches operate at different layers and work to extend networks and reduce collisions. Routers are also introduced as layer 3 devices that can connect different networks.
This document discusses various concepts related to transmitting and receiving data over networks. It covers topics such as transmission methods (parallel vs serial), transmission direction (simplex, half-duplex, full-duplex), synchronization techniques, protocols, network topologies, access methods like Ethernet and token ring, transmission media, wireless transmission, and network software. The roles of devices like routers, switches, bridges and servers are also outlined.
Topic 1.1 basic concepts of computer networkAtika Zaimi
This document provides an overview of computer networks, including their components, characteristics, and classifications. It defines peer-to-peer and client-server networks, describing their advantages and disadvantages. Various network topologies such as bus, star, ring, and mesh are explained. The document also outlines the key standards organizations that set networking guidelines and lists common network hardware functions. Learners will gain an understanding of fundamental network concepts.
This document provides a historical overview of the development of the internet and web from the 1980s to present. It describes the evolution from early internet infrastructure in the 1980s, the launch of the world wide web in the 1990s (Web 1.0), the rise of social media and user-generated content in the 2000s (Web 2.0), and proposes concepts for the next stages of developments including more personalized experiences (Web 3.0, Mobile 3.0, etc). The document traces key technological developments, companies, and trends that helped drive these changes from passive, read-only experiences to more active, user-driven and personalized interactions online and through mobile devices.
The document defines advertising and provides characteristics and classifications of advertising. It states that advertising is a paid, non-personal communication through mass media by an identified sponsor to inform or influence buyers. Advertising can be classified by function, region targeted, company demand, desired response, and media used. The purpose of advertising is to disseminate information, establish attitudes, and persuade action to generate profit.
This document discusses advertising and public relations. It defines advertising as paid communication through mass media to promote products and organizations. The document outlines different types of advertising, including institutional, advocacy, pioneer and competitive advertising. It also describes the process for developing an advertising campaign, including determining objectives and budgets, creating media plans, developing messages and evaluating effectiveness. Additionally, the document defines public relations and examines common public relations tools like news releases, feature articles and press conferences. It discusses evaluating public relations efforts and dealing with unfavorable publicity.
The document discusses Industry 4.0, which refers to the current trend of automation and data exchange in manufacturing technologies. It describes the four industrial revolutions from the initial mechanization of production to the current digitalization of manufacturing. Key aspects of Industry 4.0 include cyber-physical systems, the internet of things, cloud computing, and artificial intelligence. The document outlines the vision, drivers, components, characteristics, and design principles of Industry 4.0 as well as emerging technologies like 3D printing, drones, and blockchain. Both the benefits and challenges of Industry 4.0 for business are addressed.
This document provides information about various MBA programs and career options after completing a B.Com degree. It discusses the eligibility requirements and selection process for MBA programs in different specializations such as finance, marketing, HR, international business, operations management, rural management, and agri business management. It also provides details about the CAT exam syllabus and important dates. Finally, it summarizes some top career prospects and colleges for each MBA specialization.
E-business has changed the definition of enterprise systems by pushing ERP beyond internal processes to network edges and enabling business-to-business and business-to-customer connections. Integrating ERP with e-business allows companies to standardize processes, share information electronically with partners, improve supply chain management, and optimize internal and external business value chains. This creates strategic opportunities to enhance customer service and gain operational efficiencies through streamlined, collaborative business processes.
This document discusses trends in ERP systems including cloud ERP, open source ERP, mobile ERP, social ERP, and data. It outlines different cloud computing models like public, private, and hybrid clouds. It also discusses software as a service (SaaS), platform as a service (PaaS), and infrastructure as a service (IaaS). The document compares SaaS and open source ERP and discusses considerations around customization, support, updates, and security. It also covers how mobile, social, and big data trends are influencing ERP and enabling new capabilities like analytics and real-time decision making. The conclusion states that ERP systems will become easier to use and be impacted by cloud
Material management involves planning, organizing, and controlling the flow of materials from initial purchase through internal use. The key aims are to obtain the right quality and quantity of supplies at the right time, place, and cost. Effective material management requires forecasting demand, purchasing the correct items, storing materials properly, and using inventory control techniques like economic order quantity and ABC analysis to minimize costs while maintaining adequate stock levels. Proper procurement, storage, and inventory control are essential elements of ensuring materials are available as needed.
The document discusses the philosophy and key elements of Just-in-Time (JIT) operations. It explains that JIT focuses on eliminating waste and getting the right quantity of goods at the right place and time. Key elements include JIT manufacturing using a pull production system, total quality management, and respect for employees. The document also provides examples of companies that have successfully implemented JIT strategies like Toyota.
The document discusses just-in-time (JIT) and lean operations. It originated in the 1960s at Toyota and was later adopted by other automakers. JIT aims to increase productivity and quality while reducing costs and waste. Benefits include reduced throughput times, inventory, and resource needs. Key elements are eliminating waste, quality at the source, balanced workflow, continuous improvement, and focusing on customer needs. The document outlines various JIT concepts and how they can be applied to non-manufacturing operations through techniques like demand-pull and standardizing processes.
This document provides information about the International Organization for Standardization (ISO). It discusses that ISO is not an acronym but comes from the Greek word "isos" meaning equal. ISO is a voluntary organization with members from each country that develops technical standards to ensure quality and reliability. The document outlines the history of quality standards development from World War II publications to the adoption of ISO 9000 standards in 1987. It also summarizes ISO's structure, membership, financing, goals and some of its achievements in developing international standards.
This document discusses Scrum vs Kanban project management approaches. It summarizes the University of California's experience trying Scrum on the President's Postdoctoral Fellowship Program project, which went over budget and schedule. Issues included inaccurate estimates, long stand-ups, and taking on too large a project for their first Scrum attempt. They then brought in an Agile coach and transitioned to a hybrid Scrumban approach. It also provides an example of using Kanban for a smaller donation form project and advice to start with a small project when first adopting an Agile methodology.
The document describes how a Kanban system works using an example of balls being delivered from a warehouse to a point of use. It shows the workflow over the course of a week with the collector exchanging Kanban cards between the warehouse and point of use each day. Some key considerations are that the work in progress is kept under control, and the actual lead time needs to be calculated more precisely to ensure there are enough Kanban cards to avoid stockouts. The number of cards may need to start higher and then be reduced over time as the system stabilizes.
This document provides an overview of the Internet of Things (IoT), including its history, definition, how it works, examples of IoT devices, benefits to organizations, importance, applications, challenges, and advantages and disadvantages. It discusses how IoT works through sensors that collect data, connectivity to send data to the cloud, data processing, and user interfaces. Some key IoT applications mentioned include smart thermostats, connected cars, activity trackers, and smart cities. The document also outlines challenges around testing, security, software complexity, and data volumes, as well as advantages such as access to information from anywhere and automating tasks.
This document discusses the Fourth Industrial Revolution and the role of big data. It begins by providing background on the previous industrial revolutions. The fourth revolution will involve artificial intelligence and machines communicating and learning from each other. It then defines different types of data (structured, unstructured, semi-structured, metadata) and characteristics of big data (volume, variety, velocity, variability). The document outlines benefits and drawbacks of big data, and how big data will play a key role in Industry 4.0 by improving manufacturing efficiency and potentially creating new jobs in data analysis. Finally, it discusses how big data will impact other industries beyond manufacturing like financial services.
The document discusses emerging global trends in the Internet of Things (IoT). It provides examples of consumer IoT products like smart helmets, fitness trackers, smart home devices, and medical devices. It also discusses enterprise and industrial IoT applications in areas like smart farming, manufacturing, and logistics. Some key challenges with IoT include security, privacy, reliability of sensors, and integrating legacy systems. Steps that need to be taken to address IoT challenges include improving consumer education, security requirements, certification programs, and government initiatives.
This document provides an overview of the Internet of Things (IoT). It begins with definitions of IoT and describes how it works by connecting physical objects through sensors, software and network connectivity. It then discusses the current status and future prospects of IoT, including applications in various industries. The document outlines some of the technological challenges of IoT, such as scalability, standardization, and data volumes. It also notes some criticisms around privacy, security and how IoT could impact human behavior. In closing, it thanks the audience and provides references for further information.
Machine learning is a subset of artificial intelligence that allows machines to learn from experience without being explicitly programmed. There are three main types of machine learning: supervised learning where machines are provided labeled input and output data to learn patterns and make predictions, unsupervised learning where machines find hidden patterns in unlabeled data, and reinforced learning where machines learn through trial and error using a reward system.
This document discusses various topics relating to electronic payment systems. It begins by outlining different types of money, including fiduciary vs. scriptural money and token vs. notational money. It then examines different types of payment systems such as cash, credit cards, intermediaries like PayPal, and smart cards. The document provides details on how these various payment methods work, including descriptions of protocols like SSL and diagrams of processes. It concludes with a discussion of key concepts like the security of electronic payments and trends in emerging payment technologies.
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
End-to-end pipeline agility - Berlin Buzzwords 2024Lars Albertsson
We describe how we achieve high change agility in data engineering by eliminating the fear of breaking downstream data pipelines through end-to-end pipeline testing, and by using schema metaprogramming to safely eliminate boilerplate involved in changes that affect whole pipelines.
A quick poll on agility in changing pipelines from end to end indicated a huge span in capabilities. For the question "How long time does it take for all downstream pipelines to be adapted to an upstream change," the median response was 6 months, but some respondents could do it in less than a day. When quantitative data engineering differences between the best and worst are measured, the span is often 100x-1000x, sometimes even more.
A long time ago, we suffered at Spotify from fear of changing pipelines due to not knowing what the impact might be downstream. We made plans for a technical solution to test pipelines end-to-end to mitigate that fear, but the effort failed for cultural reasons. We eventually solved this challenge, but in a different context. In this presentation we will describe how we test full pipelines effectively by manipulating workflow orchestration, which enables us to make changes in pipelines without fear of breaking downstream.
Making schema changes that affect many jobs also involves a lot of toil and boilerplate. Using schema-on-read mitigates some of it, but has drawbacks since it makes it more difficult to detect errors early. We will describe how we have rejected this tradeoff by applying schema metaprogramming, eliminating boilerplate but keeping the protection of static typing, thereby further improving agility to quickly modify data pipelines without fear.
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
2. LAN Applications (1)
• Personal computer LANs
—Low cost
—Limited data rate
• Back end networks
—Interconnecting large systems (mainframes and large
storage devices)
• High data rate
• High speed interface
• Distributed access
• Limited distance
• Limited number of devices
3. LAN Applications (2)
• Storage Area Networks
— Separate network handling storage needs
— Detaches storage tasks from specific servers
— Shared storage facility across high-speed network
— Hard disks, tape libraries, CD arrays
— Improved client-server storage access
— Direct storage to storage communication for backup
• High speed office networks
— Desktop image processing
— High capacity local storage
• Backbone LANs
— Interconnect low speed local LANs
— Reliability
— Capacity
— Cost
8. Bus and Tree
• Multipoint medium
• Transmission propagates throughout medium
• Heard by all stations
— Need to identify target station
• Each station has unique address
• Full duplex connection between station and tap
— Allows for transmission and reception
• Need to regulate transmission
— To avoid collisions
— To avoid hogging
• Data in small blocks - frames
• Terminator absorbs frames at end of medium
10. Ring Topology
• Repeaters joined by point to point links in closed
loop
—Receive data on one link and retransmit on another
—Links unidirectional
—Stations attach to repeaters
• Data in frames
—Circulate past all stations
—Destination recognizes address and copies frame
—Frame circulates back to source where it is removed
• Media access control determines when station
can insert frame
12. Star Topology
• Each station connected directly to central node
—Usually via two point to point links
• Central node can broadcast
—Physical star, logical bus
—Only one station can transmit at a time
• Central node can act as frame switch
13. Choice of Topology
• Reliability
• Expandability
• Performance
• Needs considering in context of:
—Medium
—Wiring layout
—Access control
14. Bus LAN
Transmission Media (1)
• Twisted pair
—Early LANs used voice grade cable
—Didn’t scale for fast LANs
—Not used in bus LANs now
• Baseband coaxial cable
—Uses digital signalling
—Original Ethernet
15. Bus LAN
Transmission Media (2)
• Broadband coaxial cable
— As in cable TV systems
— Analog signals at radio frequencies
— Expensive, hard to install and maintain
— No longer used in LANs
• Optical fiber
— Expensive taps
— Better alternatives available
— Not used in bus LANs
• All hard to work with compared with star topology twisted pair
• Coaxial baseband still used but not often in new
installations
16. Ring and Star Usage
• Ring
—Very high speed links over long distances
—Single link or repeater failure disables network
• Star
—Uses natural layout of wiring in building
—Best for short distances
—High data rates for small number of devices
17. Choice of Medium
• Constrained by LAN topology
• Capacity
• Reliability
• Types of data supported
• Environmental scope
18. Media Available (1)
• Voice grade unshielded twisted pair (UTP)
—Cat 3
—Cheap
—Well understood
—Use existing telephone wiring in office building
—Low data rates
• Shielded twisted pair and baseband coaxial
—More expensive than UTP but higher data rates
• Broadband cable
—Still more expensive and higher data rate
19. Media Available (2)
• High performance UTP
— Cat 5 and above
— High data rate for small number of devices
— Switched star topology for large installations
• Optical fiber
— Electromagnetic isolation
— High capacity
— Small size
— High cost of components
— High skill needed to install and maintain
• Prices are coming down as demand and product range increases
20. Protocol Architecture
• Lower layers of OSI model
• IEEE 802 reference model
• Physical
• Logical link control (LLC)
• Media access control (MAC)
22. 802 Layers -
Physical
• Encoding/decoding
• Preamble generation/removal
• Bit transmission/reception
• Transmission medium and topology
23. 802 Layers -
Logical Link Control
• Interface to higher levels
• Flow and error control
24. Logical Link Control
• Transmission of link level PDUs between two
stations
• Must support multiaccess, shared medium
• Relieved of some link access details by MAC
layer
• Addressing involves specifying source and
destination LLC users
—Referred to as service access points (SAP)
—Typically higher level protocol
25. LLC Services
• Based on HDLC
• Unacknowledged connectionless service
• Connection mode service
• Acknowledged connectionless service
26. LLC Protocol
• Modeled after HDLC
• Asynchronous balanced mode to support
connection mode LLC service (type 2 operation)
• Unnumbered information PDUs to support
Acknowledged connectionless service (type 1)
• Multiplexing using LSAPs
27. Media Access Control
• Assembly of data into frame with address and
error detection fields
• Disassembly of frame
—Address recognition
—Error detection
• Govern access to transmission medium
—Not found in traditional layer 2 data link control
• For the same LLC, several MAC options may be
available
29. Media Access Control
• Where
— Central
• Greater control
• Simple access logic at station
• Avoids problems of co-ordination
• Single point of failure
• Potential bottleneck
— Distributed
• How
— Synchronous
• Specific capacity dedicated to connection
— Asynchronous
• In response to demand
30. Asynchronous Systems
• Round robin
— Good if many stations have data to transmit over extended
period
• Reservation
— Good for stream traffic
• Contention
— Good for bursty traffic
— All stations contend for time
— Distributed
— Simple to implement
— Efficient under moderate load
— Tend to collapse under heavy load
31. MAC Frame Format
• MAC layer receives data from LLC layer
• MAC control
• Destination MAC address
• Source MAC address
• LLS
• CRC
• MAC layer detects errors and discards frames
• LLC optionally retransmits unsuccessful frames
33. Bridges
• Ability to expand beyond single LAN
• Provide interconnection to other LANs/WANs
• Use Bridge or router
• Bridge is simpler
—Connects similar LANs
—Identical protocols for physical and link layers
—Minimal processing
• Router more general purpose
—Interconnect various LANs and WANs
—see later
35. Functions of a Bridge
• Read all frames transmitted on one LAN and
accept those address to any station on the other
LAN
• Using MAC protocol for second LAN, retransmit
each frame
• Do the same the other way round
37. Bridge Design Aspects
• No modification to content or format of frame
• No encapsulation
• Exact bitwise copy of frame
• Minimal buffering to meet peak demand
• Contains routing and address intelligence
— Must be able to tell which frames to pass
— May be more than one bridge to cross
• May connect more than two LANs
• Bridging is transparent to stations
— Appears to all stations on multiple LANs as if they are on one
single LAN
38. Bridge Protocol Architecture
• IEEE 802.1D
• MAC level
— Station address is at this level
• Bridge does not need LLC layer
— It is relaying MAC frames
• Can pass frame over external comms system
— e.g. WAN link
— Capture frame
— Encapsulate it
— Forward it across link
— Remove encapsulation and forward over LAN link
40. Fixed Routing
• Complex large LANs need alternative routes
—Load balancing
—Fault tolerance
• Bridge must decide whether to forward frame
• Bridge must decide which LAN to forward frame
on
• Routing selected for each source-destination
pair of LANs
—Done in configuration
—Usually least hop route
—Only changed when topology changes
42. Spanning Tree
• Bridge automatically develops routing table
• Automatically update in response to changes
• Frame forwarding
• Address learning
• Loop resolution
43. Frame forwarding
• Maintain forwarding database for each port
—List station addresses reached through each port
• For a frame arriving on port X:
—Search forwarding database to see if MAC address is
listed for any port except X
—If address not found, forward to all ports except X
—If address listed for port Y, check port Y for blocking
or forwarding state
• Blocking prevents port from receiving or transmitting
—If not blocked, transmit frame through port Y
44. Address Learning
• Can preload forwarding database
• Can be learned
• When frame arrives at port X, it has come form
the LAN attached to port X
• Use the source address to update forwarding
database for port X to include that address
• Timer on each entry in database
• Each time frame arrives, source address
checked against forwarding database
45. Spanning Tree Algorithm
• Address learning works for tree layout
—i.e. no closed loops
• For any connected graph there is a spanning
tree that maintains connectivity but contains no
closed loops
• Each bridge assigned unique identifier
• Exchange between bridges to establish spanning
tree
47. Layer 2 and Layer 3 Switches
• Now many types of devices for interconnecting
LANs
• Beyond bridges and routers
• Layer 2 switches
• Layer 3 switches
48. Hubs
• Active central element of star layout
• Each station connected to hub by two lines
— Transmit and receive
• Hub acts as a repeater
• When single station transmits, hub repeats signal on outgoing line
to each station
• Line consists of two unshielded twisted pairs
• Limited to about 100 m
— High data rate and poor transmission qualities of UTP
• Optical fiber may be used
— Max about 500 m
• Physically star, logically bus
• Transmission from any station received by all other stations
• If two stations transmit at the same time, collision
49. Hub Layouts
• Multiple levels of hubs cascaded
• Each hub may have a mixture of stations and other hubs
attached to from below
• Fits well with building wiring practices
— Wiring closet on each floor
— Hub can be placed in each one
— Each hub services stations on its floor
51. Buses and Hubs
• Bus configuration
—All stations share capacity of bus (e.g. 10Mbps)
—Only one station transmitting at a time
• Hub uses star wiring to attach stations to hub
—Transmission from any station received by hub and
retransmitted on all outgoing lines
—Only one station can transmit at a time
—Total capacity of LAN is 10 Mbps
• Improve performance with layer 2 switch
54. Layer 2 Switches
• Central hub acts as switch
• Incoming frame from particular station switched
to appropriate output line
• Unused lines can switch other traffic
• More than one station transmitting at a time
• Multiplying capacity of LAN
55. Layer 2 Switch Benefits
• No change to attached devices to convert bus LAN or
hub LAN to switched LAN
• For Ethernet LAN, each device uses Ethernet MAC
protocol
• Device has dedicated capacity equal to original LAN
— Assuming switch has sufficient capacity to keep up with all
devices
— For example if switch can sustain throughput of 20 Mbps, each
device appears to have dedicated capacity for either input or
output of 10 Mbps
• Layer 2 switch scales easily
— Additional devices attached to switch by increasing capacity of
layer 2
56. Types of Layer 2 Switch
• Store-and-forward switch
— Accepts frame on input line
— Buffers it briefly,
— Then routes it to appropriate output line
— Delay between sender and receiver
— Boosts integrity of network
• Cut-through switch
— Takes advantage of destination address appearing at beginning
of frame
— Switch begins repeating frame onto output line as soon as it
recognizes destination address
— Highest possible throughput
— Risk of propagating bad frames
• Switch unable to check CRC prior to retransmission
57. Layer 2 Switch v Bridge
• Layer 2 switch can be viewed as full-duplex hub
• Can incorporate logic to function as multiport bridge
• Bridge frame handling done in software
• Switch performs address recognition and frame
forwarding in hardware
• Bridge only analyzes and forwards one frame at a time
• Switch has multiple parallel data paths
— Can handle multiple frames at a time
• Bridge uses store-and-forward operation
• Switch can have cut-through operation
• Bridge suffered commercially
— New installations typically include layer 2 switches with bridge
functionality rather than bridges
58. Problems with Layer 2
Switches (1)
• As number of devices in building grows, layer 2 switches
reveal some inadequacies
• Broadcast overload
• Lack of multiple links
• Set of devices and LANs connected by layer 2 switches
have flat address space
— Allusers share common MAC broadcast address
— If any device issues broadcast frame, that frame is delivered to
all devices attached to network connected by layer 2 switches
and/or bridges
— In large network, broadcast frames can create big overhead
— Malfunctioning device can create broadcast storm
• Numerous broadcast frames clog network
59. Problems with Layer 2
Switches (2)
• Current standards for bridge protocols dictate no closed
loops
— Only one path between any two devices
— Impossible in standards-based implementation to provide
multiple paths through multiple switches between devices
• Limits both performance and reliability.
• Solution: break up network into subnetworks connected
by routers
• MAC broadcast frame limited to devices and switches
contained in single subnetwork
• IP-based routers employ sophisticated routing
algorithms
— Allow use of multiple paths between subnetworks going through
different routers
60. Problems with Routers
• Routers do all IP-level processing in software
—High-speed LANs and high-performance layer 2
switches pump millions of packets per second
—Software-based router only able to handle well under
a million packets per second
• Solution: layer 3 switches
—Implementpacket-forwarding logic of router in
hardware
• Two categories
—Packet by packet
—Flow based
61. Packet by Packet or
Flow Based
• Operates insame way as traditional router
• Order of magnitude increase in performance
compared to software-based router
• Flow-based switch tries to enhance performance
by identifying flows of IP packets
—Same source and destination
—Done by observing ongoing traffic or using a special
flow label in packet header (IPv6)
—Once flow is identified, predefined route can be
established
62. Typical Large LAN Organization
• Thousands to tens of thousands of devices
• Desktop systems links 10 Mbps to 100 Mbps
— Into layer 2 switch
• Wireless LAN connectivity available for mobile users
• Layer 3 switches at local network's core
— Form local backbone
— Interconnected at 1 Gbps
— Connect to layer 2 switches at 100 Mbps to 1 Gbps
• Servers connect directly to layer 2 or layer 3 switches at
1 Gbps
• Lower-cost software-based router provides WAN
connection
• Circles in diagram identify separate LAN subnetworks
• MAC broadcast frame limited to own subnetwork