Sunteți pe pagina 1din 34

INTRA-ORGANIZATIONAL

ELECTRONIC COMMERCE
CHAPTER 12: APPENDIX
BY: ANNA JANINAH E. RAMOS
NETWORK TOPOLOGIES
A network topologies is the physical
arrangement of the components
(e.g., nodes, servers, and
communication links) of the network.
LOCAL AREA NETWORKS
(LAN)
• A federation of computers located close together (on the same
floor or in the same building) linked together to share data and
hardware.
• The physical connection of workstations to the LAN is achieved
through a network interface Card (NIC) which fits into a PC’s
expansion slot and contains the circuitry necessary for inter-node
communications.
• A server is used to store the network operating system, application
programs, and data to be shared.
WIDE AREA NETWORKS (WAN)
• A WAN is a network that is dispersed over a wider
geographic area than a LAN. It typically requires the use
of:
• GATEWAYS to coneect different types of LANs
• BRIDGES to connect same-type LAN
• WANs may use common carrier facilities, such as
telephone lines, or they may use a Value Added Network
STAR TOPOLOGY
• A network of IPUs with a large central
computer (the host)
• The host computer has direct connections
to smaller computers, typically desktop or
laptop PCs.
• Popular for mainframe computing.
• All communications must go through the
host computer, except for local computing.
HIERARCHICAL
TOPOLOGY
• A host computer is connected to several
levels of subordinate smaller computers in
master-slave relationship.
• Applicable to firms with many
organizational Ievels that must be
controlled from a central location.
RING TOPOLOGY
• This configuration eliminates the central
site. All nodes in this configuration are
equal status (peer-to-peer arrangement)
• Responsibility for managing
communications is distributed among the
nodes.
• Common resources that are shared by all
nodes can be centralized and managed by
a file server that is also a node.
BUS TOPOLOGY
• The nodes are all connected to a common
cable - The bus.
• Communications and file transfer between
workstations are controlled by a server.
• It is generally less costly to install than a
ring topology.
CLIENT-SERVER
TOPOLOGY
• This configuration distributes the
processing between the user's (client's)
computer and the central file server.
• Both types of computers are part of the
network, but each is assigneel functions
that a best performs.
• This approach reduces data communication
traffic, thus reducing queues and increasing
NETWORK CONTROL
OBJECTIVES
• Establish a communications session between
the sender and the receiver.
• Manage the flow of data accross the network.
• Detect and resolve data collisions between
competing nodes.
• Detect errors in data that line failure or signal
degeneration cause.
DATA COLLISION
• Toachieve effective network control, there must be an
exclusive link or session established between a
transmitting and a receiving node. Only one node at a
time can transmit a message on a single line. Two or
more signals transmitted simultaneously will result in a
data collision, which destroys both messages. When
this happens, the messages must be retransmitted.
There are several techniques for managing sessions
and controlling data collisions, but most of them are
variants of three basic methods: polling, token passing,
and carrier sensing.
POLLING
• Pollingis the most popular technique for establishing a
communication session in WANs. One site, designated the
master, polls the other slave sites to determine if they
have data to transmit. If a slave responds in the
affirmative, the master site locks the network while the
data are transmitted. The remaining sites must wait until
they are polled before they can transmit.
• Primary advantages:
1. noncontentious
2. an organization can set priorities for data
TOKEN PASSING
• Token passing involves transmitting a special
signal—the token—around the network from
node to node in a specific sequence. Each node
on the network receives the token, regenerates
it, and passes it to the next node. Only the
node possessing the token is allowed to
transmit data.
• Token passing can be used with either ring or
bus topologies
CARRIER SENSING
• a random access techniques that detects collisions
when they occur.
• this technique is widely used; found on Ethernets.
• The node wishing to transmit listens to the line to
determine if in use. If it is, it waits pre-specified time
to transmit.
• collisions occur when nodes listen, hear no
transmissions, and then simultaneously transmit. Data
collides and the nodes are instrated to hang up and
try again.
ELECTRONIC DATA
INTERCHANGE (EDI)
•The exchange of business transaction
information:
•between companies
•in a standard format (ANSI X.12 or
EDIFACT)
•via a computerized information system
•In "pure" EDI systems, human
COMMUNICATIONS LINKS

•Companies may have internal EDI


translation/communication software
and hardware; or
•Then may subscribe to VAN to
perform this function without having
to invest in personnel, software, and
hardware.
ADVANTAGES OF EDI
• Reduction or elimination of data entry.
• Reduction of errors.
• Reduction of paper.
• Reduction of paper processing and
postage.
• Reduction of inventories (via JIT
systems)
OPEN-SYSTEM INTERFACE (OSI) NETWORK
PROTOCOL
Provides standards by which the products of different manufacturers can interface
with one another in a seamless interconnection at the user level.

GENERAL EATURES OF OSI STANDARDS


1. Each layer iin the model is independent, which allows the development of
separate protocols specifically for each layer.
2. The layers at each node communicates logically with their counterpart layer
across nodes.
3. The model distinguishes between the tasks of date commiunications and data
manipulation.
THE LAYER FUNCTION
• PHYSICAL LAYER – first and lowest level in the protocol that is
concerned with pin connections to devices, the wiring of workstations,
and cabling standards.
• DATA LINK LAYER – concerned with the transmission of packets of
data from node to node based on the workstations address.
• NETWORK LAYER – deals with the routing and relaying of data to
different LANs and WANs based on the network address.
• TRANSPORT LAYER – ensure deliveryof the entire file or message
across individual networks and multiple networks, regardless of the
number and the type of dissimilar devices involved. If a transmission
error is detected, it defines the retransmission methods to ensure the
complete and accurate delivery of the messages
• SESSION LAYER – it guarantee a correct and synchonized
connection.
• PRESENTATION LAYER - provides the rules for editing,
formatting, converting, and displaying datato the user’s
system.
• APPLICATION LAYER – provides overall environment for
the user’s application to acccess the network. This provides
the common application services such as protocols for
management, file transfer, and email.

S-ar putea să vă placă și