2. Abstract
In this Power Point, it consists of a “network diagram containing the following
components, such as, “workstation, switch, server, application service, router,
firewall, internet cloud, PCs and Computer-Printer. In addition, “label all
components, and briefly describe the purpose of each component in your
network. Each description should be placed near its associated component. You
may use any additional relevant components, making sure to justify their
purpose toward the effectiveness of your network.” However, there are 14 slides
and number 13 and 14 are the references used to created the 7-2 Network
Diagram’s Power Point. However, the Abstract is recorded for the listen. On the
other hand, the first slide which is the cover plays music. In addion, the slides
involve either notes, videos or recording. *However, after slide 14, the Internet
Cloud Network Diagram is on slide 16.
3. Work Station
According to Britannica Encyclopaedia (2014), The Workstation is a computer
system operated with a rich history as following:
• 1981: For The First Time Introduce to U.S. National Aeronautics and Space
Administration the Work Station was used for the Apollo space program.
• 1983: Introduce To Public and Business
• Design for an individual
• Individual to do a particular job
• Advance graphics large storage, powerful microprocessor and data-processing
4. Switch
According to Britannica Encyclopaedia (2014), The Switch involves
controlling packets and it is either unmanaged or managed as following:
• Control the flow of network traffic
• Different devices are connect to the ports of the switch
• Monitor the packets it received and forward the packets to the appropriate port
only
• Information sharing and resources allocation
• Unmanaged Switch: Does Not Configure working with the Switch
• Managed Switch: Configurable, offering great flexibility, monitoring, and
adjust a managed switch locally or remotely
5. Server
According to Laudon, K.C and Laudon, J.P. (2012), a server is:
• The transmission control Protocol/Internet Protocol (TCP/IP) networking
standard to tie their disparate networks together
• IT infrastructure links computer hardware and smaller networks into an
enterprise-wide network
• Information flows freely across the organization and other organization
• The computer brings files and services to other computers
• Server” refer to both software application and the physical computer on which
the network software run
6. Application Server
According to Oracle (2014), an Application Server is:
• Application Server Choices for Different Needs
• To meet the needs of traditional and cloud IT environments
• Performance, scalability, efficiency, management, and unified application
server offering
• Java EE platform for clouding applications
• Application server for building and running enterprise applications and
services
7. Router
According to Laudon, K.C and Landon, J.P. (2012), a router is:
• Specialized communication processor 1983: Introduce To Public and Business
• Forward packages of data from one network to another network
• Routers connect networks
• A router links computers to the Internet
8. Firewall
According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the
privacy of computers
• Prevention: malware and intruders from entering in the computer
• Identifies things like names, IP addresses, applications,
• Large businesses: Specially designated computer separate from the rest of the
network in order to protect their computer from the access of incoming traffic
• Screening technology
• Protect the system’s privacy
9. Internet Cloud
According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a
web-based application that are stored on remote servers and accessed via the
“cloud” of the Internet using a standard Web browser.
• Cloud computing also called Internet cloud
• Are billions of devices transmitting and exchanging information
• Single location management (controlling multiple IOT application)
• Running IoT devices in the cloud (protected from security threats and
malware)
• Industry IoT cloud alliances (a delivery of cloud-based solution)
10. PCs
According to Britannica Encyclopaedia (2014), A PC is:
• Digital computer
• Personal computer
• Consists of a central processing unit (CPU)
• Display screen, keyboard and mouse, modem and printer
11. Printer
According to Whatis.com, a computer printer is:
• A device
• Text and graphic output from a computer
• Transfers the information to paper
12. 7-2 Network Diagram
Firewall: Protect Computer from Viruses
Data Leaving from Internal System
Data Incoming to the
Internal Computer
Router connects
networks
To meet the needs
of traditional and
cloud IT
environments
Switch: Monitor the
packets it received
and forward the
packets to the
appropriate port only
Personal
computer
PC)
Transfers the
information to paper
The computer brings
files and services to
other computers
Incoming data from
another computer
WAN
LAN
13. References
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems, Part Two Information Technology Infrastructure, Client/Server Era
(1983 to Present) (12 Edition and page 168-170), Retrieve from Pearson Education, Inc., Upper Saddle
River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page 314 and 315), Firewalls, Intrusion Detection
Systems and Antivirus Software, Retrieved from Pearson Education, Inc., Upper Saddle River, New
Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G2), Retrieved from Pearson Education, Inc.,
Upper Saddle River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G11), Retrieved from Pearson Education, Inc.,
Upper Saddle River, New Jersey
Laudon, K.C and Landon, J.P. (2012).
Management Information Systems (12 Edition and page G11), Retrieve from Pearson Education, Inc.,
Upper Saddle River, New Jersey
14. References
Britannica Encyclopaedia. (2014).
Personal Computer (PC), Retrieved from
http://www.britannica.com/EBchecked/topic/452928/personal-computer-PC
Britannica Encyclopaedia. (2014).
Workstation, Retrieved from http://www.britannica.com/EBchecked/topic/648195/workstation
CISCO. (2014).
What is a Network Switch vs. a Router? Retrieved from
http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/connect_employ
ees_and_offices/what_is_a_network_switch/index.html?referring_site=smartnavRD
ITProPortal. (2014).
How the cloud is the engine behind Internet of Things, Retrieved form
http://www.itproportal.com/2014/07/24/how-the-cloud-is-the-engine-behind-the-growing-internet-
of-things/
Oracle (2014).
Application Server Choices for Different Needs, Retrieved from
http://www.oracle.com/us/products/middleware/cloud-app- foundation/weblogic/overview/index.html
16. 7-2 Network Diagram
Cloud computing also called Internet cloud
Internet Cloud Connects: Hardware, Software and Serves.
Types of Servers: Linux, Mac OS, Windows 2000,
Windows NT , Unix
Motherboard
Hardware
LapTop Hardware
Mouse
Hardware
Types of Software
Microsoft
Hardware
Internet Clouds
It needs a protection system against “malware and intruders.” According to Laudon, K.C and Landon, J.P. (2012), firewalls protects the privacy of computers that controls the flow of incoming and outgoing network traffic resulting in protecting the privacy of the company’s computers. According to Laudon, K.C and Landon, J.P. (2012), “falls identifies things like names, IP addresses, applications, and other characteristics of incoming traffic.” In a large business, it resides on a specially designated computer separate from the rest of the network in order to protect their computer from the access of incoming traffic. This means that all incoming traffic cannot collect information from another computer or access another computer to steal private information. The types of firewalls that are common to “screening technology”, such as, static package filtering, stateful inspection, network address translation, and application proxy filtering resulting in use as a combination to create a firewall protection (Laudon, K.C and Landon, J.P., 2012). According to Laudon, K.C. and Laudon, J.P. (2012), each screening technology performs differently to protect the system’s privacy (See page 315-317) for more information have each screening technology is protected.
According to Laudon, K.C and Landon, J.P. (2012), a cloud computing is a web-based application that are stored on remote servers and accessed via the “cloud” of the Internet using a standard Web browser. Cloud computing also called Internet cloud according to ITProPortal (2014) understanding the engine behind the Internet, there are billions of devices transmitting and exchanging information to aid in different operations around the cloud. There are three ways in which the cloud is used, such as, Single location management, Running IoT devices in the cloud and Industry IoT cloud alliances. First, the Single location management is capable of controlling multiple IOT application. Secondly, the running IoT devices in the cloud needs authenticated and it is protected from security threats and malware resulting from that they are detected, monitored, updated and managed over the air across multiple operations (devices) (ITProProtal, 2014). Thirdly, Industry IoT cloud alliances are a delivery of cloud-based solution, such as, communications hardware specialist, data storage specialists, analytics software leaders and mobile operators according to ITProProtal (2014). According to ITProProtal (2014) “The cloud, by providing a front-end management interface for IoT devices, offers organisations the scalability and flexibility they need to update and manage those devices. It can also provide the necessary online and shareable capacity to store the data collected from them.”