Download presentation
Presentation is loading. Please wait.
1
Telecommunications & Network
ACM 312 MIS Week 6
2
Types of Application & System Software
3
Groupware /\ Software Alternatives
Collaborate on group assignments , discussion groups, databases, video conferencing Lotus Notes Novell GroupWise Microsoft Exchange Some allow teams to create websites Windows SharePoint Services, WebSphere Outsourcing – domestic, offshore Application service providers – Companies that own, operate, and maintain application software and computer system resources, pay-as-you-go (cloud-like) Cloud services
4
Open-Source Applications
Open-source software Source code available for use, study, modification, enhancement and redistribution. Advantages Peer review eliminates defects Speeds changes Reduction in maintenance and ownership costs Rapid prototyping and experimentation Reduces reliance on proprietary vendors Departure from traditional approach Business processes not controlled by software logic
5
>Network Concepts<
Interconnected chain, group, or system Connections created by nodes Exponential growth Metcalf’s Law Usefulness, or utility, of a network Equals the square of the number of users More users = more useful
6
Telecommunication Trends
7
Value of Telecommunications Networks
8
Business Use of the Internet
9
Business Value of the Internet
10
Network Alternatives for Company
An intranet is a private network that is contained within an enterprise. It may consist of many interlinked local area networks and accessible only to an organization's staff. An extranet is a controlled private network (restricted to authorized users) that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
11
Intranets as Information Portals
12
<=Extranet Connectivity=>
13
Network Component Alternatives
14
((( Wireless Technologies )))
Communications Satellites Geosynchronous orbit Serve as relay stations Wireless LANS Wireless radio-wave technology (Wi-Fi) Bluetooth Short-range wireless technology Other Wireless Systems Cellular phones, Mobile radio, PDAs Wireless Web Smartphones, thin clients in wireless networks
15
Radio frequency identification (RFID)
Use tiny tags with embedded microchips containing data about an item and location, and antenna Tags transmit radio signals over short distances to special RFID readers, which send data over network to computer for processing Active RFID: Tags have batteries, data can be rewritten, range is hundreds of feet, more expensive Passive RFID: Range is shorter, also smaller, less expensive, powered by radio frequency energy Common uses: Automated toll-collection Tracking goods in a supply chain Requires companies to have special hardware and software Reduction in cost of tags making RFID viable for many firms
16
Wireless sensor networks (WSNs)
Networks of hundreds or thousands of interconnected wireless devices embedded into physical environment to provide measurements of many points over large spaces Devices have built-in processing, storage, and radio frequency sensors and antennas Require low-power, long-lasting batteries and ability to endure in the field without maintenance Used to monitor building security, detect hazardous substances in air, monitor environmental changes, traffic, or military activity
17
A WIRELESS SENSOR NETWORK
The small circles represent lower-level nodes and the larger circles represent high-end nodes. Lower level nodes forward data to each other or to higher-level nodes, which transmit data more rapidly and speed up network performance. FIGURE 7-18 © Prentice Hall 2011
18
Comparing Technologies
19
Network Architectures and Protocols
Rules and procedures Handshaking Exchanging predetermined to agree on a protocol Network Architecture Master plan of standards Goal is to promote an open, simple, flexible, and efficient telecommunications environment
20
Key networking technologies
Packet switching Method of slicing digital messages into parcels (packets), sending packets along different communication paths as they become available, and then reassembling packets at destination Previous circuit-switched networks required assembly of complete point-to-point circuit Packet switching more efficient use of network’s communications capacity
21
OSI Model Open Systems Interconnection Model
Seven-layer standard for network architectures Controls how messages should be transmitted Ensures consistency among products
22
CORPORATE NETWORK INFRASTRUCTURE
Today’s corporate network infrastructure is a collection of many different networks from the public switched telephone network, to the Internet, to corporate local area networks linking workgroups, departments, or office floors FIGURE 7-2 © Prentice Hall 2011
23
Virtual Private Network (VPN)
24
A VIRTUAL PRIVATE NETWORK USING THE INTERNET
This VPN is a private network of computers linked using a secure “tunnel” connection over the Internet. It protects data transmitted over the public Internet by encoding the data and “wrapping” them within the Internet Protocol (IP). By adding a wrapper around a network message to hide its content, organizations can create a private connection that travels through the public Internet.
25
CLIENT/SERVER COMPUTING ON THE INTERNET
The Global Internet CLIENT/SERVER COMPUTING ON THE INTERNET FIGURE 7-10 © Prentice Hall 2011
26
Web 2.0 Four defining features
Interactivity Real-time user control Social participation User-generated content Technologies and services behind these features Cloud computing Blogs/RSS Mashups & widgets Wikis Social networks
27
Web 3.0 − the Semantic Web Other visions
Effort of W3C to add meaning to existing Web Make searching more relevant to user Other visions More “intelligent” computing 3D Web Pervasive Web (create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available) Increase in cloud computing, SaaS Ubiquitous connectivity between mobile and other access devices Make Web a more seamless experience
28
SUPPORTING OPERATIONS:RECOVERY
Companies should choose a backup and recovery strategy in line with their goals and operational needs Backup and Recovery Plan Backup—An exact copy of a system’s information Recovery—The ability to get a system up and running in the event of a system crash or failure Fault tolerance Failover Failback
29
SYSTEM RECOVERY Fault tolerance>> is the property that enables a system to continue operating properly in the event of the failure of some of its components Failover>> is switching to a redundant or standby computer server, system, hardware component or network upon the failure or abnormal termination of the previously active application, server, system Failback>> is the process of restoring VMs and vApps from replicated storage back to a pool on your primary (production) site when the primary site comes back up after a disaster event
30
Disaster Recovery Plan
Hot Site—A separate and fully equipped facility where the company can move immediately after a disaster and resume business Cold Site—A separate facility that does not have any computer equipment, but is a place where employees can move after a disaster Warm Site—A separate facility with computer equipment that requires installation and configuration
31
Business Continuity Plan
Business Continuity Planning (BCP)—A plan for how an organization will recover and restore partially or completely interrupted critical function(s) within a predetermined time after a disaster or extended disruption Emergency Notification Service—An infrastructure built for notifying people in the event of an emergency
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.