You are on page 1of 20

ROLE OF COMPUTER

NETWORKS IN BUSINESS
By: IRAM EHSAN
WHAT IS COMPUTER NETWORK
Devices that enables you to store, retrieve, and share information.
Commonly connected devices include personal computers (PCs),
minicomputers, mainframe computers, terminals, workstations, thin clients,
printers, fax machines, pagers, and various data-storage devices. Recently,
other types of devices have become network connectable, including
interactive televisions, videophones, handheld devices, and navigational
and environmental control systems.
USE OF CN IN BUSINESS
In todays business world a computer network is more than a collection of
interconnected devices. For many businesses the computer network is the resource
that enables them to gather, analyze, organize, and disseminate information that is
essential to their profitability. The rise of intranets and extranets business networks
based on Internet technology is an indication of the critical importance of computer
networking to businesses. Intranets, extranets, and the Internet will be treated in
more detail in a later section. For now, it is enough to understand that most
businesses have installed intranets to collect, manage, and disseminate information
more quickly and easily than ever before.
BENEFITS OF COMPUTER
NETWORKING
Cost-Effective Resource Sharing
Streamlined Business Processes
Freedom to Choose the Right Tool
Powerful, Flexible Collaboration between Companies
Improved Customer Relations
Secure Management of Sensitive Information
Worldwide, Instantaneous Access to Information

FUNCTIONS OF SOFTWARES IN CN
ISO AND THE OSI MODEL
The OSI model was developed by the International Organization for
Standardization(ISO) as a guideline for developing standards to enable the
interconnection of dissimilar computing devices. It is important to understand
that the OSI model is not itself a communication standard. In other words, it is
not an agreed-on method that governs how data is sent and received; it is
only a guideline for developing such standards.
NETWORK COMMUNICATIONS
THROUGH THE OSI MODEL
HARDWARE TECHNOLOGY
Now that we understand how information is converted to data and how
computers send and receive data over the network, we can discuss the
hardware used to transport the data from one computer to another. This
hardware can generally be divided into two categories:
Network Transmission Media
Transmitting and Receiving Devices.
NETWORK TRANSMISSION MEDIA
When data is sent across the network it is converted into electrical signals. These
signals are generated as electromagnetic waves (analog signaling) or as a
sequence of voltage pulses (digital signaling). To be sent from one location to
another, a signal must travel along a physical path. The physical path that is used to
carry a signal between a signal transmitter and a signal receiver is called the
transmission medium. There are two types of transmission media:
Guided
Unguided.
GUIDED MEDIA
TRANSMITTING AND RECEIVING
DEVICES
SWITCHES AND ROUTERS
THE NETWORK OPERATING SYSTEM
ORGANIZATION NETWORKING
SCENARIO

VIRTUAL PRIVATE NETWORK (VPN)
A VPN is a private WAN that uses the public Internet as a low-cost WAN
backbone to transport data between two or more geographically separate
sites.

HOW TO SECURE NETWORK
1. Get a Firewall
The first step for any attacker is to find network vulnerabilities by scanning for open
ports. Ports are the mechanisms by which your small business network opens up and
connects to the wider world of the Internet. A hacker sees an open port to as an
irresistible invitation for access and exploitation. A network firewall locks down ports
that don't need to be open.
2. Password Protect your Firewall
Great you've got a firewall, but it's never enough to simply drop it into your network
and turn it on. One of the most common mistakes in configuring network equipment is
keeping the default password.
3.Use VPN
If you've gone through all the trouble of protecting your small business network, it
makes sense to extend that protection to your mobile and remotely connected
employees as well.

HOW TO SECURE NETWORK
4. Update Router Firmware
Outdated router or firewall firmware is another common issue. Small business
network equipment, just like applications and operating systems, needs to be
updated for security and bug fixes. The firmware that your small business router
and/or firewall shipped with is likely out-of-date within a year, so it's critical to
make sure you update it.
5. Block Pings
Most router and firewalls include multiple settings that help to determine how
visible your router and/or firewall will be to the outside world. One of the
simplest methods that a hacker uses to find a network is by sending a ping
request, which is just a network request to see if something will respond.
HOW TO SECURE NETWORK
6. Scan Yourself
One of the best ways to see if you have open ports or visible network vulnerabilities is
to do the same thing that an attacker would do -- scan your network.
7. Lock Down IP Addresses
By default, most small business routers use something called DHCP, which
automatically allocates IP addresses to computers that connect to the network.
8. Use VLANs
Not everyone in your small business necessarily needs access to the same network
assets. While you can determine and set access with passwords and permissions on
applications, you can also segment your network with VLAN or virtual LANs.
THANKS!!

You might also like