Professional Documents
Culture Documents
Notes
Structure:
3.1 Introduction
3.2 Network Topologies
3.3 Network Architectures-the OSI Model
3.4 Internet
3.5 Intranet
3.6 Extranets
3.7 World Wide Web
3.8 HTML
3.9 Creating web pages
3.10 Telecommunication Networks
3.11 Wireless Communication
3.12 WAP Protocol
3.13 Summary
3.14 Check Your Progress
3.15 Questions and Exercises
3.16 Key Terms
3.17 Check Your Progress: Answers
3.18 Case Study
3.19 Further Readings
3.20 Bibliography
Objectives
Elements of Networking
(iv) Network Operating system software, such as Microsoft Windows NT or 2000, Notes
Novell NetWare, Unix and Linux.
Advantages of Network
(i) Speed: Sharing and transferring files within networks are very rapid. Thus saving
time, while maintaining the integrity of the file.
(ii) Cost: Individually licensed copies of many popular software programs can be
costly. Networkable versions are available at considerable savings. Shared
programs, on a network allows for easier upgrading of the program on one single
file server, instead of upgrading individual workstations.
(iii) Security: Sensitive files and programs on a network are passwords protected
(established for specific directories to restrict access to authorized users) or
designated as "copy inhibit," so that you do not have to worry about illegal
copying of programs.
(iv) Centralized Software Management: Software can be loaded on one computer
(the file server) eliminating that need to spend time and energy installing updates
and tracking files on independent computers throughout the building.
(v) Resource Sharing: Resources such as, printers, fax machines and modems
can be shared.
(vi) Electronic Mail: e-mail aids in personal and professional communication.
Electronic mail on a LAN can enable staff to communicate within the building
having to leave their desk.
(vii) Flexible Access: Access their files from computers throughout the firm.
(viii) Workgroup Computing: Workgroup software (such as Microsoft BackOffice)
allows many users to work on a document or project concurrently.
Disadvantages of Network
(i) Server faults stop applications being available.
(ii) Network faults can cause loss of data.
(iii) Network fault could lead to loss of resources.
(iv) User work dependent upon network.
(v) System open to hackers.
(vi) Decisions tend to become centralised.
(vii) Could become inefficient.
(viii) Could degrade in performance.
(ix) Resources could be located too far from users.
Notes take while they pass over the network. There are various kinds of physical topologies,
each with distinct advantages and disadvantages. The most commonly used topologies
include –
(i) Bus Network
(ii) Ring Network
(iii) Star Network
(iv) Mesh Network
(v) Star-bus Network
A linear bus topology consists of a main run of cable with a terminator at each end.
All nodes such as file server, workstations, and peripherals are connected to the linear
cable.
Notes (iii)A fault in the ring can disable the entire network.
(iv) It is only really used with Token Ring networks.
(v) This is very bulky and is not really suitable for running voice.
(vi) Moves and additions of node mean rewiring and re-routing cables.
A star topology is designed with each node such as file server, workstations, and
peripherals connected directly to a central network hub, switch or concentrator.
performance and reliability, however the complexity and difficulty of creating one increases Notes
geometrically as the number of nodes on the network increases. For example, a three
or four node mesh network is relatively easy to create, whereas it is impractical to set
up a mesh network of 100 nodes - the number of interconnections would be so ungainly
and expensive that it would not be worth the effort.
A tree topology combines characteristics of linear bus and star topologies. It consists
of groups of star-configured workstations connected to a linear bus backbone cable. Tree
topologies allow for the expansion of an existing network, and enable schools to configure
a network to meet their needs.
Notes
Notes
Notes optimize the use of processors providing the greatest possible return on investment for
the hardware.
Client-Server application design also lets the application provider mask the actual
location of application function. The user often does not know where a specific operation
is executing. The entire function may execute in either the PC or server, or the function
may be split between them.
Advantages:
(i) Centralized: Resources and data security are controlled through the server.
(ii) Scalability: Any or all elements can be replaced individually as needs increase.
(iii) Flexibility: New technology can be easily integrated into system.
(iv) Interoperability: All components (client/network/server) work together.
(v) Accessibility: Server can be accessed remotely and across multiple platforms.
Disadvantages:
(i) Expense: Requires initial investment in dedicated server.
(ii) Maintenance: Large networks will require a staff to ensure efficient operation.
(iii) Dependence: When server goes down, operations will cease across the
network.
Disadvantages: Notes
(i) Decentralized: No central repository for files and applications.
(ii) Security: Does not provide the security available on a client/server network.
Depending on their scale, scope and purpose networks are often classified as:
(i) Local Area Network (LAN)
(ii) Wide Area Network (WAN)
(iii) Metropolitan Area Network (MAN)
(iv) Personal Area Network (PAN)
(v) Campus Area Network (CAN)
(vi) Home area Network (HAN)
(vii) Enterprise Private Network (EPN)
(viii) Virtual Private Network (VPN)
(ix) Storage Area Network (SAN)
(x) Global area Network (GAN)
(i) Local Area Network (LAN)
These are private owned networks within a single building or campus up to a few
kilometres in size. They are widely used to connect personal computers and workstations
in company offices and factories to share resources such as printers and exchange
information. LANs are restricted in size. LANs uses a transmission technology consisting
of a single cable by which all the machines are attached. Only bus and ring topologies
are possible for LANs.
Notes
Notes
Notes
3.4 Internet
The Internet can be defined as a large network that connects other networks of
computers all around the world. An example of a single network of computers might be
all the computers connected within an entire school district. The Internet is tens of
thousands of these networks communicating with one another. Using different applications,
such as e-mail, telnet and gopher. A user is allowed to interact with information found
on the other computers connected to the Internet.
The WWW is not the Internet; the WWW (World Wide Web) is only a portion of
the Internet. The WWW presents information to the user via a graphical browser like
Netscape in the form of text, pictures, video and even sound. Consisting of connected
hypertext “pages” of information, the W.W.W. allows the user to easily move to other
hypertext documents by clicking on links provided by the document’s author. The ease
of navigation and the integration of many Internet protocols for receiving information has
led to a global increase of over a billions pages from 1997 to present.
Definitions of Internet
There is no single, generally agreed-upon answer to this question, because the
Internet is different for each of us:
Amity Directorate of Distance and Online Education
Communication Network 135
· It is a set of computers talking over fiber optics, phone lines, satellite links, Notes
and other media.
· It is a place where you can talk to your friends and family around the world.
· It is a place to get cool game demos.
· It is an ocean or resources waiting to be mined.
· It is a place to do research for your thesis or a business presentation.
· It is a place where “crackers” and other shady characters lurk, waiting to
wreak havoc.
· It is unlimited commercial opportunity.
· It is world-wide support group of any problem needed.
· It is a gold mine of professionals in all fields sharing information about their
work.
· It is hundreds of libraries and archives that will open to your fingertips.
· It is the ultimate time-waster.
· It is the technology of the future that will help make our lives and those of
our children, brighter.
All of these answers are right; none of them is complete.
As a result of the dynamic growth of the Internet, new terminology is emerging almost
daily. One source of confusion is the use of the terms ‘Internet’ (capitalized) and ‘internet’
(noncapitalized). By convention, “Internet” is generally considered to be the global Internet.
In other words, this is the Internet that connects the world. The Internet is often depicted
as a cloud, because the connections that make up the Internet are numerous and vary
depending on the access point of the user.
Fig: Internet
The term “internet” refers to an inter-network without reference to the scope of the
connection. This term is often used to distinguish two or more networks internet-worked
using internet technology and protocols, without being connected to the global Internet
as illustrated in the sample “internet” diagram.
Fig: internet
The internet has no president, chief operating official or owner. The constituent
networks may have owners and presidents but there’s no single authority figure for the
internet as a whole. The Internet is a working example of anarchy.
The closest thing to authority on the internet is the Internet Society (ISOC), a
voluntary membership organization whose purpose is to promote global information
exchange through internet technology.
The ISOC appoints a kind of council of elders, which has responsibility for the
technical management and direction of the internet. This council of elders is groups of
invited volunteers called the Internet Architecture Board (IAB). The IAB meets to approve Notes
“standards” and to allocate unique resources such as IP addresses. The standards, or
protocols, are what allow computers of different manufacture and operating systems to
communicate with each other. The IAB also keeps track of the various numbers ( and
other things) that must be unique, such as the IP address assigned to each computer
on the internet.
The way standards/protocols are developed is through the Internet Engineering Task
Force (IETF), another volunteer organization. IETF sets up a “working group” to further
investigate requests for new standards (when there are enough people to volunteer for the
working group it’s established). Anyone can attend IETF meetings and be on working
groups. These working groups have many different functions, from producing documentation
to deciding how networks should cooperate when problems do arise. A working group
usually produces a report. The report might be documentation available to anyone who
wants it, or it might be sent to the IAB to be declared a standard.
Who Pays
No one pays for the internet. There is no “Internet, Inc.” that collects fees from the
individual networks. Instead everyone pays their part. The NSF pays for the NSFnet,
colleges and corporations pays for their connection to a regional network (NCREN), which
in turn pays a national provider for its access.
There is a myth that the internet is free. It’s not; someone pays for every connection.
Many times these fees are not passed onto the end user (students, employees) and this
feeds the illusion of “free access”.
Let’s take a few examples of domain names for five different web sites.
www.vision.edu
www.dssbl.org
maps.yahoo.com
www.bd.online
These examples will provide an easy way of describing the different parts of a typical
domain name. Using the ‘vision’ web site address, we will break up the address into the
individual parts of a domain name.
Amity Directorate of Distance and Online Education
138 IT for Managers
Drawbacks of Internet
(i) Theft of Personal Information: If you use the Internet, you may be facing
grave danger as your personal information such as name, address, credit card
number etc., can be accessed by other culprits to make your problems worse.
(ii) Spamming: Spamming refers to sending unwanted e-mails in bulk, which
provide no purpose and needlessly obstruct the entire system. Such illegal
activities can be very frustrating for you, and so instead of just ignoring it, you
should make an effort to try and stop these activities so that using the Internet
can become that much safer.
(iii) Virus Threat: Virus is nothing but a program, which disrupts the normal
functioning of your computer systems. Computers attached to Internet are more
prone to virus attacks and they can end up into crashing your whole hard disk,
causing you considerable headache.
(iv) Pornography: This is perhaps the biggest threat related to your children’s
healthy mental life. This is a very serious issue concerning the Internet. There
are thousands of pornographic sites on the Internet that can be easily found
and can be a detrimental factor to letting children use the Internet.
3.5 Intranet
An intranet is a private computer network that uses Internet Protocol technologies
to securely share any part of an organization’s information or operational systems within
that organization. The term is used in contrast to internet, a network between organizations
and instead refers to a network within an organization. Sometimes the term refers only
Notes to the organization’s internal website but may be a more extensive part of the organization’s
information technology infrastructure. It may host multiple private websites and constitute
an important component and focal point of internal communication and collaboration. The
Intranet Server Diagram illustrates the concept of an intranet, which is given below:
3.6 Extranets
An extranet is a private network that uses Internet protocols, network connectivity.
An extranet can be viewed as part of a company’s intranet that is extended to users outside
the company, usually via the Internet. It has also been described as a “state of mind”
in which the Internet is perceived as a way to do business with a selected set of other
companies (business-to-business, B2B), in isolation from all other Internet users.
For example, a manufacturing company might work closely with a parts supplier for
a specific product. The parts supplier might be allowed to log on to the extranet server
to review part inventories. The Extranet Diagram illustrates this point.
Notes
HTML files are just normal text files. They usually have the extension of .htm, .html,
or .shtml. HTML documents have two parts, the head and the body. It is not a case
sensitive language.
The body is the larger part of the document, as the body of a letter you would write
to a friend would be.
The head of the document contains the document’s title and similar information and
the body contains most everything else.
HTML tags are used to create HTML documents. Tags are always enclosed in angle
brackets (< >).
The basic structure of tag is:
<tag_name> some text </tag_name>
For example: The tag is used to make text bold:
<b> this is bold </b>
The above tag displayed as this is bold.
HTML tags are written within the less than (<) and greater than (>) signs. These
are explaining the opening and closing of the commands. The commands for opening and
closing are the same. But closing command has a / attached to it.
Example: General format of HTML program
<html>
<head>
<title> Title of page</title>
</head>
<body>
This is my first homepages. <b> This text is bold</b>
</body>
</html>
Explanation of above Commands:
The first tag is <html>. This tag tells your browser that this is the start of an HTML
document. The last tag is </html>. This tag tells your browser that this is the end of the
HTML document.
The text between the <head> tag and </head> tag is header information. Header
information is not displayed in the browser window.
Notes The text between the <title> tags is the title of your document. The title is displayed
in your browser’s caption.
The text between the <body> tags is the text that will be displayed in your browser.
The text between the <b> and </b> tags will be displayed in a bold font.
The output of the Program is:
This is my first homepages. This text is bold
Web pages are made from two sections. They are head and body. The head section
describes the page content. And a body section defines the actual contents of web pages.
The standard web page structure in HTML is:
<html>
<head>
<title> Title of the page is given here </title>
</head>
<body>
Web page contents displayed here
</body>
</html>
1. <html>:
Syntax: <html>…………………..
……………….</html>
This tag is used in the beginning and end of the document. This tag tells a web
browser where the HTML document begins and ends. The HTML document starts with
a tag called <html> and ends with a tag </html>.
<html>
<body>
</body)
</html>
The first tag <html> indicates the beginning of the HTML document and the last tag
</html> indicates the end of the document. Within these two body of the document
contained.
2. <head>:
Syntax: <head>…………………..
……………….</head>
The second tag in the HTML document is <head>. This tag contained all header
information about the document. They are document title, author name etc. It end with
</head>
<html>
Amity Directorate of Distance and Online Education
Communication Network 145
<head> Notes
</head>
</html>
3. <title>:
Syntax: <title>…………………..
……………….</title>
This appears within the head tag structure. This is the title of web page. It will appear
at the top of the browser’s title bar and also in the history list. The title of document should
be logically related to the content of the web page. And it must be short but informative.
According to norms, there should be one title bar per document.
<title> Title of the page is given here </title>
4. <body>:
Syntax: <body>…………………..
……………….</body>
The actual work lies in the body of the document. This appears after the Head tags.
Between the body tags, all the material gets displayed in the browser window like all of
the text, graphics and links.
<body>
Web page contents displayed here
</body>
5. <headings>:
Syntax: <h1>…………………..
……………….</h1>
The entire HTML document information appears in different parts or section title. There
are six levels of headings, from Heading 1 through Heading 6. They are marked as H1
for heading one and H6 for heading six. Heading 1 (H1) is most important and heading
6 (H6) is least important in the HTML document.
The structure of all six headings tags:
<H1> Heading 1</H1>
<H2> Heading 2</H2>
<H3> Heading 3</H3>
<H4> Heading 4</H4>
<H5> Heading 5</H5>
<H6> Heading 6</H6>
A heading in an HTML document always begins at the margin of a line. It also makes
a line break at the end of heading. It means there cannot be two headings on the same
line.
6. Paragraphs: <P>:
Syntax: <p>…………………
Notes Paragraphs are treated as the most basic structures in HTML. Presenting information
in paragraphs is quite common in web pages. Paragraphs tags are <P> for beginning of
the paragraph and </P> for the end.
The beginning of a paragraph is marked by <P> and the end by </P>.
Note that this tag is special in that it does not require its corresponding end tag
</p>.
7. <br> Tag:
Syntax: <br>…………………..
The tag <br> used to break the text and create new paragraph without blank line
space. It does not require its corresponding end tag </br>.
8. <hr> tag:
Syntax: <hr>…………………..
This tag stands for horizontal rule. This inserts a straight line to separate the sections
of the document. It does not require its corresponding end tag </hr>.
Lists:
Lists are the index of items to be appeared in web pages in a specified format. There
are three types of lists, they are: Unordered, Ordered and Definition lists. Unordered and
Ordered list are widely used.
9. Unordered lists: <UL>
The Unordered List is the first of the three types of lists. This is probably the most
common list you will use.
The <ul> tag is the opening Unordered List Tag. Between these two tags you place
LIST ITEMS, each one having an individual <li> opening tag. (If you want, you can use
an optional </li> closing tag, but it is not needed.) There is no limit to the number of
List Items you may have in a single list.
Syntax: <UL>…………………..
……………….</UL>
In HTML bulleted list is termed as unordered list. Listed item is preceded by a bullet
( a small black circle) is called unordered list. Unordered list starts with a tag <UL> and
ends with a tags </UL>. Now all the items to be listed start with an HTML tag <LI> which
means “Listed Item”. <LI> has a corresponding with closing tag </LI>. But this closing
tag is not compulsory. There is no to the number of list of items.
Example 1: For unordered lists of items:
<UL>
<LI> Food expenses
<LI> Cloth expenses
<LI> Rent expenses
<LI> Education Expenses
<LI> Medical Expenses
<LI> Entertainment Expenses
</UL> Notes
Output or result of the above:
1. Food expenses
2. Cloth expenses
3. Rent expenses
4. Education Expenses
5. Medical Expenses
6. Entertainment Expenses
Example 2: To make a dotted list of: red, orange, green, blue, purple, black
and brown, type:
<UL>
<LI> red
<LI> orange
<LI> green
<LI> blue
<LI> purple
<LI> black
<LI> brown
</UL>
Output or result of the above:
• red
• orange
• green
• blue
• purple
• black
• brown
10. Ordered lists: <OL>
The Ordered List, also known as the Numbered List, is very similar in structure to
the unordered list, except each list item has a number in front of it, instead of a bullet.
Also, the opening tag for the list is <ol> instead of <ul>, and the closing tag is </ol>
instead of </ul>. List Items within the list still use the same tags.
Syntax: <OL>…………………..
……………….</OL>
Ordered list is contained within the tags <OL> and </OL>. And the lists of items
are preceded by numbers such as 1, 2, 3 and so on instead of a bullet. When an ordered
list is displayed in a web browser, it uses an automatically generated sequence of items.
• Manjunath Notes
• Kumara Gowda
• Narayan
• Prakash
1. 35 yrs
2. 55 yrs
3. 47 yrs
4. 56 yrs
5. 52 yrs
6. 56 yrs
11. Boldface: <B>
Syntax: <B>…………………..
……………….</B>
It is character style tag and it is used to make character bold or boldface. And
everything between <B> and </B> is boldface.
Example:
<B> This is Davangere University Davangere </B>
The output or result of the above is: This is Davangere University Davangere
12. Italics: <I>
Syntax: <I>…………………..
……………….</I>
HTML tags <I> and </I> are used to put the character in Italics. Everything between
<I> and </I> is italic style.
Example:
<I> She is Deeksha </I>
The output is: She is Deeksha
13. Underline: <U>
Syntax: <U>…………………..
……………….</U>
The underline tags<U> and </U> are used to put character in underlined format. That
means everything between <U> and </U> should be underlined.
Example:
<U> Malleshwaram Road Bangalore </U>
The output is: Malleshwaram Road Bangalore
14. Links :<A> </A>
Syntax: <A HREF= “the address of the file”>
……………….</A>
Notes A well designed web page will have links to other pages and even to the outside
world. The links in HTML document starts with a tag <A> and ends with </A>. But <A>
tags are not used alone. It contains additional HREF. HREF means Hypertext Reference.
It indicates the location of the file to be linked to current page.
The links are in the form of <A HREF= “the address of the file”>. The address of
the file is the location of the resources to which the file to be linked.
Example: The National Open School web server is at http://www.nos.edu/.
<A HREF= http://www.nos.edu/>National Open School web server</A>
Here is how it will look like National Open School web server.
15. Image:<IMG>
Image is also plays an important role in web page creation. Images are inserted in
web documents using the IMG tag <IMG> and this tag has no closing tag such as </
IMG>. The <IMG> tag requires the location of the images file to be placed in the document.
HTML file and graphics files are separate files.
But <IMG> tags alone do not help place images in the HTML document. It requires
another attributes ‘SRC’ to execute <IMG> tag. ‘SRC’ means source or source of graphics.
It point out the location of the graphics file. The source may be URL (Uniform Resource
Location). Just as the address of a house or office is known as its postal address, the
address on the Internet is known as URL. The URL locate a particular web page, among
all the computer connected the Internet.
When this attribute is used along with <IMG> tags:
Syntax:
<IMG> SRC= “URL/path of graphic file”>
16. <tr> </tr>: Table Row
Syntax: <tr>…………………..
……………….</tr>
17. <td> </td>: Table data
Syntax: <td>…………………..
……………….</td>
18. <Center>: This tag is used to make center of text and it rquires </center> at
the end.
Syntax: <center>…………………..
……………….</center>
19. <Font>: It is used to set font size. It supported by </font>
Syntax: <Font>…………………..
……………….</Font>
20) <Marquee> = (It means supported by, attached to, covering, enclosing). This
tag is used to moving of text or message in the web pages. And it
requires </Marquee>
Syntax: <Marquee>…………………..
……………….</Marquee>
Amity Directorate of Distance and Online Education
Communication Network 151
Notes “<“, “>”, the “©”, “&”, and the “ itself. Instead type &escape_code; (Ampersand,
Escape Code for Character, then a semicolon). For these 5 characters, here
are the escape codes...
o For the < type <
o For the > type >
o For the © type ©
o For the & type &
o For the “ type "
(ii) Use quotes around values in attributes... For example, if you want a horizontal
rule that is half of the screen width, type <hr width=”50%”> rather than <hr
width=50%>, or if you want one that is size 5 type <hr size=”5"> rather than
<hr size=5>. Isn’t it ironic that I don’t? <g>
(iii) ‘Don’t overlap tags... Overlapping occurs when Tag A starts, Tag B starts, Tag
A closes, then Tag B closes. This will cause errors in sensitive browsers.
Examples:
Wrong Way (Overlaps):
<font size=+1><b>This is Bold and One Font Size Bigger</font></b>
Right Way (Doesn’t Overlap):
<font size=+1><b>This is Bold and One Font Size Bigger</b></font>
Wrong Way (Overlaps):
<a href=”here.html”><i>This link is italicized</a></i>
Right Way (Doesn’t Overlap):
<a href=”here.html”><i>This link is italicized</i></a>
35. Tables
Tables are one of the most challenging things to code with HTML. It isn’t very hard,
it just takes a while to get the hang of. Tables start with the <table> tag, and usually
contain the border=”n” attribute within the opening tag. If the border=”0", than the table’s
border is invisible. Usually when you do not use the border attribute the table border will
become invisible. This is useful when you want to align text in rows and columns, but
don’t want a table border around it. border=”1" is a thin border. border=”2" is a little thicker,
border=”3" and so on. The table MUST end with a </table> tag, or the table might not
appear at all.
Example:
<table border=”0">
<tr>
<td>This table has a border of 0.</td>
</tr>
</table>
Output:
This table has a border of 0.
Each row within the table is defined by the opening <tr> tag and the optional </ Notes
tr> closing tag. Within each table row are table cells, which are defined by the <td> opening
and </td> closing tags. Most table rows contain more than one cell. Many times, you
will need a heading for a column of cells of the first row. To do this, use the <th> opening
and </th> closing tag. The table heading tag makes the text in that cell BOLD and
CENTERED. You only need use the heading cells when necessary.
36. Adding Sounds
To add sounds to a web page use the <EMBED> tag. This tag supports many
common file formats such as .wav, .mid, .mp3, and .au. The basic structure of the tag:
<embed src=”filename.ext” width=”x” height=”x” autoplay=”x” hidden=”x” loop=”x”
volume=”x”></embed>
If you want the file to automatically play when the web page is loaded, set
autoplay=”true”, if you do not want the file to automatically start, set autoplay=”false”.
If you want the control box to be hidden, use the hidden=”true” attribute. Normally
the file will stop playing after it is completed the first time, so if you want it to start over
once it is done use the attribute loop=”true”.
You can set the volume setting with the volume attribute, a value from 1 to 100 (default
is 50). The control box size that plays the sound can vary from browser to browser, but
some versions of Netscape won’t show the box at all unless you specify. (145 and 60
are usually good).
Code:
<embed src=”http://www.davesite.com/webstation/html/davesite.mp3" loop=”true”
autoplay=”false” width=”145" height=”60"></embed>
The evolution of wireless technology has brought many advancements with its
effective features.
• The transmitted distance can be anywhere between a few meters (for example,
a television's remote control) and thousands of kilometers (for example, radio
communication).
• Wireless communication can be used for cellular telephony, wireless access
to the internet, wireless home networking, and so on.
development tools will easily support WAP development, and in the future more Notes
development tools will be announced.
3.13 Summary
Computer networks mean an interconnected collection of computers. Two computers
are said to be interconnected if they are able to exchange information. The connection
need not be via a copper wire, fiber optics, microwaves and communication satellites can
also be used.
A linear bus topology consists of a main run of cable with a terminator at each end.
All nodes such as file server, workstations, and peripherals are connected to the linear
cable.
A ring network is a network topology in which each node connects to exactly two
other nodes, forming a single continuous pathway for signals through each node – a ring.
Data travels from node to node, with each node along the way handling every packet.
The ring topology does not require a central server to manage connectivity between the
nodes.
A star topology is designed with each node such as file server, workstations, and
peripherals connected directly to a central network hub, switch or concentrator.
A Mesh topology consists of a network where every device on the network is
physically connected to every other device on the network. This provides a great deal of
performance and reliability, however the complexity and difficulty of creating one increases
geometrically as the number of nodes on the network increases.
A home area network is a residential LAN which is used for communication between
digital devices typically deployed in the home, usually a small number of personal
computers and other accessories.
A Enterprise Private Network is a network built by an enterprise to interconnect the
various company sites (production sites, headoffices, remote offices, shops etc.) in order
to share computer resources over the network.
A storage area network (SAN) is a high-speed special-purpose network (or
subnetwork) that interconnects different kinds of data storage devices with associated data
servers on behalf of a larger network of users. Typically, a storage area network is part
of the overall network of computing resources for an enterprise.
An extranet is a private network that uses Internet protocols, network connectivity.
An extranet can be viewed as part of a company’s intranet that is extended to users outside
the company, usually via the Internet.
Hyper Text Markup Language is the predominant markup language for web pages.
It provides a means to create structured documents by denoting structural semantics for
text such as headings, paragraphs, lists etc. as well as for links, quotes, and other items.
Telecommunication networks are transmission systems enabling information to be
transmitted in analogue or digital form between various different sites by means of
electromagnetic or optical signals. The information may consist of audio or video data
or some other type of data. The networks are based either on wired or wireless
infrastructures.
Wireless communication involves the transmission of information over a distance
without the help of wires, cables or any other forms of electrical conductors. Wireless
Notes communication is a broad term that incorporates all procedures and forms of connecting
and communicating between two or more devices using a wireless signal through wireless
communication technologies and devices.
Notes z PAN: A personal area network is a computer network used for communication
among computer and different information technological devices close to one
person.
z VPN: uses a technique known as tunneling to transfer data securely on the
Internet to a remote access server on your workplace network.
z GAN: A Global Area Network is a network used for supporting mobile
communications across an arbitrary number of wireless LANs, satellite coverage
areas etc.
z Internet: can be defined as a large network that connects other networks of
computers all around the world.
z HTML: means Hyper Text Markup Language. HTML is the language of Internet.
It is used to create Web pages of web sites of the internet. It has a set of tags
(commands).
It also wanted each of its 2500 distributors and repair shops worldwide to see the Notes
information displayed in almost 4000 different site views; which the technology would allow
it to do.
Since the content capability was initiated, Du Pont’s site had grown rapidly. The
body shops can not get training bench marketing tools. and can paint colour formulas
via the portal. There are also job posting and resume services. and for the distributors,
Du Pont is researching adding order - tracking and order accuracy capabilities soon.
Questions:
a) What are the business benefits of the web portal ? Make a critical assessment.
b) What is the importance of ‘content management’ for enterprise web portals?
c) Can a small business develop and maintain such a portal ?
3.20 Bibliography
1. Robert Schultheis and Mary Summer, Management Information Systems – The
Managers View, Tata McGraw Hill, 2012.
2. Kenneth C. Laudon and Jane Price Laudon, Management Information Systems
– Managing the digital firm, PHI Learning / Pearson Education, PHI, Asia, 2015.
3. Rahul de, MIS in Business, Government and Society, Wiley India Pvt Ltd, 2012
4. Gordon Davis, Management Information System : Conceptual Foundations,
Structure and Development, Tata McGraw Hill, 23st Reprint 2014.
5. Haag, Cummings and Mc Cubbrey, Management Information Systems for the
Information Age, McGraw Hill, 2005. 9th edition, 2015.
6. Turban, McLean and Wetherbe, Information Technology for Management –
Transforming Organisations in the Digital Economy, John Wiley, 6th Edition,
2008.
7. Raymond McLeod and Jr. George P. Schell, Management Information
Systems,Pearson Education, 2007.
8. James O Brien, Management Information Systems – Managing Information
Technology in the E-business enterprise, Tata McGraw Hill, 2014.
Notes 9. Raplh Stair and George Reynolds, Information Systems, Cengage Learning,
12th Edition, 2016
10. Corey Schou and Dan Shoemaker, Information Assurance for the Enterprise –
A Roadmap to Information Security, Tata McGraw Hill, 2007.
11. Frederick Gallegor, Sandra Senft, Daniel P. Manson and Carol
Gonzales,Information Technology Control and Audit, Auerbach Publications,
4th Edition, 2013.
±±±±