230 likes | 315 Views
Welcome to ICT IN Business Outcome 2. During this outcome you will learn about Electronic Data Communication Systems. By the end of this programme, you should be able to:. By the end of this programme, you should be able to:. Describe different data communications systems
E N D
Welcome to ICT IN Business Outcome 2 During this outcome you will learn about Electronic Data Communication Systems
By the end of this programme, you should be able to: By the end of this programme, you should be able to: • Describe different data communications systems • Evaluate different data communications systems • Identify security threats and procedures • Describe new ICT innovations • Evaluate new ICT innovations
LANS TOPOLOGY WANS COMMUNICATION INTERNET OUTCOME 2 OUTCOME 2 OUTCOME 3 OUTCOME 2 INNOVATION SECURITY
COMMUNICATION SYSTEMS All organisations need good communication systems if they are to be successful. THE COMMUNICATION PROCESS DATA INFORMATION DECISION FEEDBACK REVIEW IMPLEMENT
BENEFITS OF ELECTRONIC COMMUNICATION SYSTEMS • Improves communication within and between organisations • Reduces costs • Improves quality of information • Improves availability of information • Allows sharing of resources • Allows for flexible working • Promotes collaboration • Contributes to success of business
WHAT IS A NETWORK? A network is two or more computer systems linked by a communication medium such as cable, telephone line, radio waves, satellite or infra-red light. A network will provide the following benefits: • Sharing of information • Sharing of resources • Improve efficiency • Allow electronic communication TYPES OF NETWORK The main types of network are: Local Area Network (LAN) Wide Area Network (WAN) Metropolitan Area Network (MAN) Click here to learn more about different types of networks
File Server HOW A LAN WORKS A computer called a file server controls the network by sending files from its disk drive to all parts of the system. LOCAL AREA NETWORK A Local Area Network generally has the following characteristics: • Confined to a relatively small area • Limited to a particular building • Computers usually less than 1 mile apart • Used by small to medium sized businesses
WIDE AREA NETWORK A Wide Area Network generally has the following characteristics: • covers a wide geographical area • used by large organisations • connected by telephone line, leased line or satellite • provides online conferencing between employees in different locations
NETWORK HARDWARE The following components are used in computer networks • Servers • Clients or Workstations • Routers • Hubs • Switches • Network Interface Cards Click on the above image and then on devices to find out more about network components
OPERATING SYSTEMS The two main types of network operating systems are: • Client/Server • Peer to Peer Click here and then on network types to find out more
NETWORK TOPOLOGIES Network topology refers to the physical layout of the network systems. The main topologies are • Bus • Ring • Star • Mesh • Hybrid Click on the this image and then on topologies to find out more
INTERNET The Internet is a network of networks that links computers across the world. It consists of servers and communications links between them. Click on the image below for more information.
BUSINESS USES OF THE NET • Email provides a quick and cheap method of communication • World Wide Web provides means of publishing company information globally • File Transfer allows files to be transferred across the internet • Newsgroups are discussion forums that can be used for market research purposes
Theft Power Surge SECURITY THREATS Hackers Flood Disclosure Virus Data Deletion Fire Data Modification Accidental Damage Power Failure
SECURITY PROCEDURES Good practice involves: • Development of security policy • Allocation of responsibilities • Security training • Incident reporting • Implementing Security Measures • Reviewing and updating Security Measures
SECURITY MEASURES • Fireproof cabinets • Positioning of computer to minimise unauthorised use • Shred confidential printouts • Passwords • Door Locks • Identification System • Equipment Log • Burglar Alarms • Regular Back-ups • Install anti-virus software • Encryption System • Install firewall
INNOVATION Tasks Links Wi-fi Innovation OUTCOME 3 XML Broadband
LINKS • http://www.zdnet.com • http://technology.guardian.co.uk/ • http://www.microsoft.com/homepage/ms.htm • http://news.bbc.co.uk/1/hi/technology/default.stm
You have now completed this tutorial Click here to return to the home page
OUTCOME 2 ICT in Business OPERATING SYSTEMS • Client/Server In a client/server system resources are controlled by a central computer called a file server. Client resources are accessed through the server
OUTCOME 2 ICT in Business OPERATING SYSTEMS • Peer to Peer A peer-to-peer system does not have a dedicated server. Each computer may act as both a client and a server. Users can share folders and peripherals.
OUTCOME 2 ICT in Business FIREWALL • Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria