Welcome to ICT IN Business Outcome 2

22
Home Communication LANS WANS Internet Innovation Topics Menu Security OUTCOME 2 Topology What is … Welcome to ICT IN Business Welcome to ICT IN Business Outcome 2 Outcome 2 During this outcome you will learn about Electronic Data Communication Systems

description

Welcome to ICT IN Business Outcome 2. During this outcome you will learn about Electronic Data Communication Systems. By the end of this programme, you should be able to:. By the end of this programme, you should be able to:. Describe different data communications systems - PowerPoint PPT Presentation

Transcript of Welcome to ICT IN Business Outcome 2

Page 1: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

Welcome to ICT IN Business Welcome to ICT IN Business Outcome 2Outcome 2

During this outcome you will learn about Electronic Data Communication Systems

Page 2: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

By the end of this programme, you should be able to:By the end of this programme, you should be able to:

Describe different data communications systems

Evaluate different data communications systems

Identify security threats and procedures

Describe new ICT innovations

Evaluate new ICT innovations

Page 3: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is … LANS

WANS

INTERNET

SECURITYINNOVATION

COMMUNICATION

TOPOLOGY

OUTCOME 2OUTCOME 2OUTCOME 3OUTCOME 2

Page 4: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is … All organisations need good communication systems if they are to be successful.

THE COMMUNICATION PROCESS

DATA INFORMATION DECISION

IMPLEMENTREVIEWFEEDBACK

COMMUNICATION SYSTEMS

Page 5: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

Improves communication within and between organisations

Reduces costs

Improves quality of information

Improves availability of information

Allows sharing of resources

Allows for flexible working

Promotes collaboration

Contributes to success of business

BENEFITS OF ELECTRONIC COMMUNICATION SYSTEMS

Page 6: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

WHAT IS A NETWORK?

A network is two or more computer systems linked by a communication medium such as cable, telephone line, radio waves, satellite or infra-red light.

A network will provide the following benefits:

Sharing of information

Sharing of resources

Improve efficiency

Allow electronic communication

TYPES OF NETWORK

The main types of network are:

Local Area Network (LAN)

Wide Area Network (WAN)

Metropolitan Area Network (MAN)

Click here to learn more about different types of networks

Page 7: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

LOCAL AREA NETWORK

A Local Area Network generally has the following characteristics:

Confined to a relatively small area

Limited to a particular building

Computers usually less than 1 mile apart

Used by small to medium sized businesses

File Server

HOW A LAN WORKS

A computer called a file server controls the network by sending files from its disk drive to all parts of the system.

Page 8: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

WIDE AREA NETWORK

A Wide Area Network generally has the following characteristics:

covers a wide geographical area

used by large organisations

connected by telephone line, leased line or satellite

provides online conferencing between

employees in different locations

Page 9: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

NETWORK HARDWARE

The following components are used in computer networks

Servers

Clients or Workstations

Routers

Hubs

Switches

Network Interface Cards

Click on the above image and then on devices to find out more about network components

Page 10: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

OPERATING SYSTEMS

The two main types of network operating systems are:

Client/Server

Peer to Peer

Click here and then on network types to find out more

Page 11: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

NETWORK TOPOLOGIES

Network topology refers to the physical layout of the network systems.

The main topologies are

Bus

Ring

Star

Mesh

HybridClick on the this image and then on topologies to find out more

Page 12: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

INTERNET

The Internet is a network of networks that links computers across the world.It consists of servers and communications links between them.

Click on the image below for more information.

Page 13: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

BUSINESS USES OF THE NET

Email provides a quick and cheap method of communication

World Wide Web provides means of publishing company information globally

File Transfer allows files to be transferred across the internet

Newsgroups are discussion forums that can be used for market research purposes

Page 14: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

SECURITY THREATS

Hackers

FireTheft

Power Surge

Accidental Damage

DisclosureFlood

Power Failure

Data Deletion

Data Modification

Virus

Page 15: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

SECURITY PROCEDURES

Good practice involves:

Development of security policy

Allocation of responsibilities

Security training

Incident reporting

Implementing Security Measures

Reviewing and updating Security Measures

Page 16: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

SECURITY MEASURES

Fireproof cabinets Positioning of computer to minimise unauthorised use Shred confidential printouts Passwords Door Locks Identification System Equipment Log Burglar Alarms Regular Back-ups Install anti-virus software Encryption System Install firewall

Page 17: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

INNOVATION

Tasks

OUTCOME 3

Links

Broadband

Wi-fi

Innovation

XML

Page 18: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

LINKS

http://www.zdnet.com

http://technology.guardian.co.uk/

http://www.microsoft.com/homepage/ms.htm

http://news.bbc.co.uk/1/hi/technology/default.stm

Page 19: Welcome to ICT IN Business  Outcome 2

Home

Communication

LANS

WANS

Internet

Innovation

Topics Menu

Security

OUTCOME 2

Topology

What is …

You have now completed this tutorial

Click here to return to the home page

Page 20: Welcome to ICT IN Business  Outcome 2

OPERATING SYSTEMS

Client/Server In a client/server system resources are controlled by a central computer called a file server. Client resources are accessed through the server

OUTCOME 2

Page 21: Welcome to ICT IN Business  Outcome 2

OPERATING SYSTEMS

Peer to PeerA peer-to-peer system does not have a dedicated server. Each computer may act as both a client and a server. Users can share folders and peripherals.

OUTCOME 2

Page 22: Welcome to ICT IN Business  Outcome 2

FIREWALL

Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria

OUTCOME 2