Download presentation
Presentation is loading. Please wait.
Published byLorraine Bates Modified over 7 years ago
1
Saudi Telecom Company Group members: Sara Abu Al-Saud 200700492
MISY 3312: Introduction to Telecommunications Instructor: Dr. Valentina Korzhova Group members: Sara Abu Al-Saud Fatimah Al-Ismail Zahraa Al-Faraj Sumanh Al-Saihati
2
History of STC It was Incorporated in 1998.
Saudi Telecom Company (STC) is the leading national provider of telecommunication services in the Kingdom of Saudi Arabia. It was Incorporated in 1998. STC is a Saudi Arabia- based telecommunications company that offers landline, mobile and internet services. The Saudi Telecommunication Group provides integrated mobile, fixed and broadband communications services to over 142 million subscribers in 10 markets including Saudi Arabia.
3
Problem Statement A- Regarding business
STC in previous year upgraded its system customers which caused some technical problems such as, losing some of the databases. Also, when they attempted to restore data for its old customers , it caused some problems to their participants, including changing the service account, mobile phone and the separation of service for mobile.
4
B- Regarding network:-
There are interferences in the line contact of the STC network. They have many problems with broadband speed and network is too slow. Sometimes the network does not reach certain areas, even when all of the devices in a home can communicate with each other, they may still fail to reach Web sites.
5
Network Classification
There are different network classification that each one vary in their connation methods like it can be through: Optical fiber Wireless LAN Twisted wired
6
Optical fiber: STC use it to transmit the data. For the first time in the region, Saudi Telecom launched a house fiber optic service (FTTH) and provides the fastest Internet speed up to 100MB per second for its customers in the Kingdom.
7
Wireless (LAN): In general STC use the wireless technology for different reasons: To extends a distance beyond the capabilities of typical cabling. To provide backup communications link in case of failure of the regular network, To connect the workstations, portable or temporary, To overcome situations where normal cabling is difficult or impractical in financial terms, To remote connectivity for mobile users or network
8
Twisted Pair: Twisted pair is technology wired that use copper wire that connects home computers and many of the businesses to the telephone company. For example, STC have telephones in every office so, the twisted pair is used for telephone services and that made it widely available in STC.
9
Types of networks based on physical scope
There are various types of network that base on physical scope like STC use such as Local area network (LAN) Home area network (HAN) Wide area network (WAN) Enterprise private network (EPN) Virtual private network (VPN)
10
Local area network (LAN)
A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building. STC use these devices to transmit data between different departments in fast percentage.
11
Home area network (HAN)
A home area network is a residential LAN which is used for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, such as printers and mobile computing devices. STC provide an important function is sharing of Internet access, like they often use a broadband service provisioned by fiber-to-the-home or via Cable Internet access, Digital Subscriber Line (DSL) or mobile broadband by Internet service providers (ISPs).
12
Virtual Private Network (VPN)
There are three kinds of Virtual Private Network in STC Company: 1- Managed Virtual Private Network (VPN). 2- Mobile Internet Protocol-Virtual Private Network (IP-VPN). 3- MPLS IP-VP. The service benefits of the VPN are high availability, high controllability and high security.
13
Service Overview The kinds of VPN
Provides secure communication over the Internet between the customer's hosted equipment at STC’s data center and the customer’s remote sites. VPN Allows your company to replacement information and data between all its branches over the GSM network IP- VPN Provides end-to-end connectivity and allows intranet, extranet and remote access capabilities. Also, provides national and international MPLS network connectivity for clients in KSA and foreign countries. MPLS- IP- VP
14
Network Classification
Network architecture: Network architecture refers to the structural and logical layout of the network which is includes transmission equipment, software and communication protocols and infrastructure (both wired or wireless) transmission of data and connectivity between components. Network architectures are classified into three broad categories: Active networking. Client–server. Peer-to-peer.
15
Network architecture Active networking:
Active networking refers to the communication pattern that allows packets flowing through a telecommunications network in order to modify the operation of the network in effective way. The nodes are programmed to achieve custom operations on the message that pass through the node. The active network is expected to be important especially in mobile users’ network.
16
Network architecture Client–server:
The client-server model refers to a popular model for computer network that acts as distributed application which divided tasks or workloads between the service or recourse provider (which is called servers), and the service requesters (which is called clients). The file server on a client-server network has high capacity and high-speed computers with a large hard disk capacity. STC use client-server architecture in order to manage their different network applications.
17
Network architecture Peer -to- peer:
Peer-to-peer (P2P) refers to a type of computer networks in which each computer in the network has the ability to act as a server or a client for the other computers in the same network, allowing the users to access to the shared files without the need for a central server. P2P networks can be used in a business, homes or over the Internet. P2P network is widely used in shared files programs and also can be used for sharing content such as audio, video, data or anything in digital format. STC use this type of network because it allows the employee to access and share the information that they need related to customers or services by easy way.
18
Network Classification
Network topology: Network topology refers to the layout model of interconnections of the different elements (such as; links and nodes) of a computer or biological network. The basic network topologies : Bus Network Star Network. Ring Network. Mesh network.
19
Network topology Star network:
It is one of the most common used of the computer network topologies. It refers to the network that consists of one central switch, hub or computer, which all acts as a channel to transmit messages. It reduces the chance of network failure by connecting all of the systems to a central node. For this reason, STC use it on the most of their departments. They use this type of topology because it is provide better performance for the users than the bus topology.
20
Basic hardware components
Computer hardware refers to the physical part of the computer; including the devices that are build the block of the computer and the digital circuits inside the computer. Examples of computer hardware: Network interface cards. Repeaters. Hubs. Bridges. Switches. Routers.
21
Network interface cards.
it is refers to a device that allows computer to connect to the network or to be joined with the other computers in local area network, and it is installed in an available slot inside the computer. LANs are still building with a network interface card in each networked computer. STC use NICs in order to connect LANs located in different areas of Saudi Arabia cities together to create wide area network. Also, they use it to share files, printers and other recourses between their employees by connecting computers that use the same LAN.
22
Router: Router is the device that connects one or more computers to other computers, networked devices, or even other networks. STC used the routers to connect their computers and networks for two main reasons: The first reason is the router makes sure that information doesn't go where it's not needed. This is very important for keeping large volumes of data from clogging the network. The other reason is the router ensures that information does make it to the intended destination.
23
Network Security The Firewall: - A firewall is a device or software application which serves as a flexible barrier between the computers on your internal network and the outside world. - A firewall provides an excellent means for protecting your network and the machines connected to it.
24
How the firewall work in STC:
The telecom firewall works together with data firewalls to establish a cost effective front line defense against the numerous threats against corporate data and voice security. The telecom firewall an part and parcel of the security applications.
25
The Encryption: The STC company have encryption security. It's create an encrypted folder that is password-protected so documents get encrypted as soon as they are saved to the folder. All files are encrypted using DES encryption which is selected by the user with their own personal encryption code which is only known by the user of the system.
26
Conclusion: This report introduced the history of network in Saudi Telecomm Company and the purpose of it It discussed the problem of statement regarding business and network. It classified networks connection methods, which are: optical fiber,. wireless LAN, and twisted wired. It also presented the types of networks based on physical scope such as LAN. In addition, the report discussed the basic hardware components have network interface such as hubs and bridges. Finally, there are network security which are firewalls, and encryption
27
Recommendation: STC have to do some step to enhance their protection throughout: Enhanced wireless router configuration setting that mean Additional protections can be applied to the wireless network to limit access. Enable Data Execution Prevention (DEP) for all Programs that mean by default, DEP is only enabled for essential Windows programs and services.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.