The Role of Computer Networks in Smb Operations

In: Computers and Technology

Submitted By mfon1991
Words 10202
Pages 41
CHAPTER ONE
1.0 INRODUCTION

1.1 Background of the case study
Small and Medium businesses (SMBs) have played great roles in the development of various economies of the world. They are recognized and acknowledged worldwide as vital and significant contributors to economic development, job creation, and the general health and welfare of economies, both nationally and internationally. Over the years there have been many attempts at defining what constitutes SMBs. Researchers and policy makers, looking for an objective definition of SMBs, have used a variety of criteria including total assets, total employees and net worth (Cochran, 1981). There have been various definitions given to small and medium businesses in Ghana but the most commonly used criterion is the number of employees of the enterprise. In defining small and medium businesses in Ghana (Osei et al 1993) classified SMBs into three categories. There are micro-employing less than 6 people, medium-employing 6-9 people and small businesses-between 10 and 29 employees. In terms of activities they are mostly engaged in retailing, trading or manufacturing and education. In Ghana SMBs have been noted as the engine of growth by the National board for small scale industries through the provision of employment and income. They represent about 92% of Ghanaian business and contribute about 70% to Ghana’s GDP and over 80% to employment (Ghana statistical service 1998). Information is needed and distributed every day in businesses. Every business start with high hopes of success but with inaccurate data and the wrong means of transferring this information may lead to the sudden collapse of the business. Computer network is one tool owners of businesses can utilize to gain access to accurate information and transfer those information generated at rapid speed. Data generation, dissemination and storage are at the…...

Similar Documents

Computer Networks

...security. Finally, two detailed case studies are given: UNIX/Linux and Windows 2000. Structured Computer Organization, 4th edition This widely-read classic, now in its fourth edition, provides the ideal introduction to computer architecture. It covers the topic in an easy-to-understand way, bottom up. There is a chapter on digital logic for beginners, followed by chapters on microarchitecture, the instruction set architecture level, operating systems, assembly language, and parallel computer architectures. Operating Systems: Design and Implementation, 2nd edition This popular text on operating systems, co-authored with Albert S. Woodhull, is the only book covering both the principles of operating systems and their application to a real system. All the traditional operating systems topics are covered in detail. In addition, the principles are carefully illustrated with MINIX, a free POSIX-based UNIX-like operating system for personal computers. Each book contains a free CD-ROM containing the complete MINIX system, including all the source code. The source code is listed in an appendix to the book and explained in detail in the text. About the Author Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands, where he heads the Computer Systems Group. He is also Dean of the Advanced School for Computing and Imaging, an......

Words: 292171 - Pages: 1169

Operation Richman’s Company It Network

...Richman Company’s, Final Project “Corey Networks” Situation: Operation Richman’s Company You are a networking security intern at Richman. You have asked to submit a proposal to Richman senior management. In the proposal, you must choose to address seven of the following and relate it to the appropriate SSCP domains: Issue one. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system. Issue two. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and non-repudiation, and the recovery of encrypted information in its original form. Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.......

Words: 2271 - Pages: 10

Computer Network

...Week 2 – Case Study SEC-280 11-9-2013 The first point that I will address consist on the multiple dangers that computer networks are exposed, that are in majority done by perpetrators that get access to servers of Windows and Linux to explode their vulnerabilities.. The use of these codes or malware in the form of viruses, worms, time bombs or any peculiar name this individuals use to give to their destructive toys, are a major concern to the protection of confidential information. Data so sensitive that in their majority is composing of identity, credit, and property information so well collected and compiler that is plenty for the creation of a clone of a company or a person. These identity theft atrocities are not limit to the software and information appropriation; also the attacks diminish computer performance, affecting their velocity and cause computers to crash. The CIO should possess a compendium of way’s to defend his network, and a rapid decision capability to take decisions in a short time period. Furthermore, in general terms security; as we can define “ the act of provide a sense or protection against lost, attack or harm”, can use or integrate a complete protection plan. Depending on the resources of the company the integration of a security plan that can integrate “the five pillars of security IT security operation: policy and audit management, access management, infrastructure and hardware security and incident response.” The real world presents to us a...

Words: 591 - Pages: 3

Computer Networks

...Form * No tags edit Save Cancel Bottom of Form * * Notify * RSS * Backlinks * * Source * Print * Export (PDF) Review Summary 1. What are the principal components of telecommunications networks and key networking technologies? A simple network consists of two or more connected computers. Basic network components include computers, network interfaces, a connection medium, network operating system software, and either a hub or a switch. The networking infrastructure for a large company includes the traditional telephone system, mobile cellular communication, wireless local area networks, video-conferencing systems, a corporate Web site, intranets, extranets, and an array okf local and wide area networks, including the Internet. Contemporary networks have been shaped by the rise of client/server computing, the use of packet switching, and the adoption of Transmission Control Protocol (TCP/IP) as a universal communications standard for linking disparate networks and computers, including the Internet. Protocols provide a common set of rules that enable communication among diverse components in the telecommunications network. 2. What are the main telecommunications transmission media and types of networks? The principal physical transmission media are twisted copper telephone wire, coaxial copper cable, fiber-optic cable, and wireless transmission. Twisted wire enables companies to use existing wiring for telephone systems......

Words: 783 - Pages: 4

Computer Networks

...computer networks Table of Contents DECLARATION 2 INTRODUCTION 5 PURPOSE 5 NETWORK CRITERIA 6 Performance 6 Reliability 6 Security 6 TYPES OF NETWORK CONNECTION 6 NETWORK CLASSIFICATION 7 Connection method 7 Wired technologies 7 Wireless technologies 8 Scale 9 Personal Area Network 9 Local Area Network 9 Metropolitan Area Networks 10 Wide Area Network 10 Network Architecture 10 BASIC HARDWARE COMPONENTS 14 Network interface cards 14 Repeaters 14 Hubs 14 Bridges 15 Switches 15 Routers 15 Modem 16 CABLE STANDARD 16 Connectors and other information 16 Conductors required 17 Characteristics 17 ACCESS CONTROL METHODS 19 Token Based Access 19 Token priority 19 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) 20 Collision detected procedure 20 INTRODUCTION A computer network, often simply referred to as a network, is a group of computers and devices interconnected by communications channels that facilitate communications among users and allows users to share resources. Networks may be classified according to a wide variety of characteristics. A computer network allows sharing of resources and information among interconnected devices. In the 1960s, the Advanced Research Projects Agency (ARPA) started funding the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first computer network in the World.  Development of the......

Words: 5343 - Pages: 22

Role of Computer

...The dawn of the new age - The Computer Era - glows before us with the promise of new and improved ways of thinking, living and working. The amount of information in the world is said to be doubling every six to seven years. The only way to keep up with these increased amounts of data and information is to understand how computers work and the ability to control them for a particular purpose. A computer can be defined as an electronic data processing device, capable of accepting data, applying a prescribed set of instructions to the data, and displaying in some manner or form. Any configuration of the devices that are interconnected and are programmed to operate as a computer system. The computer is said to have literally revolutionised the way one person does his job or a whole multinational organisation operates their businesses. Together with this reason and many more, computers are considered more than just an essential piece of fancy equipment. Whether or not people know anything about it, they invoke computers in every day lives when they make a bank withdrawal, buy groceries at the supermarket and even when they drive a car. Today, millions of people are purchasing fully functional personal computers for individual reasons. In their homes, people use various forms of computer technology for writing memos, for keeping track of bank accounts, for communication with friends and associates, for accessing knowledge, for purchasing goods and many other countless tasks. It......

Words: 1150 - Pages: 5

Computer Network

...Computer Network A computer network is a group of computers that are interconnected by electronic circuits or wireless transmissions of various designs and technologies for the purpose of exchanging data or communicating information between them or their users. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of types and categories and also presents the basic components of a network. Introduction A computer network allows sharing of resources and information among devices connected to the network. The Advanced Research Projects Agency (ARPA) funded the design of the Advanced Research Projects Agency Network (ARPANET) for the United States Department of Defense. It was the first operational computer network in the world.[1] Development of the network began in 1969, based on designs developed during the 1960s. For a history see ARPANET, the first network. Purpose Facilitating communications Using a network, people can communicate efficiently and easily via e-mail, instant messaging, chat rooms, telephony, video telephone calls, and videoconferencing. Sharing hardware In a networked environment, each computer on a network can access and use hardware on the network. Suppose several personal computers on a network each require the use of a laser printer. If the personal computers and a laser are connected to a network, the personal computers users each can access the laser printer on the network, as they......

Words: 3658 - Pages: 15

Computer Network

...ARP: The Address Resolution Protocol (ARP) plays a key role in the process of IP routing. ARP finds the hardware Media Access Control (MAC) address of a host from its known IP address. ARP maintains a cache called ARP table in which Link-layer addresses (MAC address) are mapped to network-layer addresses (IP address). How ARP works: The capture of local traffic from my home network is shown below. At my home network my Home PC (source) IP address is 192.168.1.2 where as my default gateway (Home router) IP address is 192.168.1.1 Findings from the Capture: Before a source sends a datagram to destination, it looks in its ARP table to check if there is a MAC address for the corresponding IP address of the destination. If there is no such entry in the ARP table, the source sends a Broadcast request to every single device on the subnet. Each device on the subnet compares the destination IP address to its own IP address. If the destination IP address match with the any of the device IP address in the subnet then only the matching IP address device gives a Unicast reply to the source with its MAC address. If the destination address is out of the subnet then the edge router (IP address of default gateway) will send a Unicast reply with its connected interface MAC address. The source then adds the destination MAC address to its ARP table encapsulates the datagram by adding header and trailer content, and proceeds to transfer the data....

Words: 263 - Pages: 2

Computer Network

...TRADEMARK LAW AND CYBERSPACE Paras Nath Singh M.Tech. Cyber Security Centre for Computer Science & Technology Central University of Punjab, Bathinda (Punjab). Abstract—Trademark law aids consumers who use trademarks in the marketplace to identify swiftly and without problems a product they liked or disliked in the past, distinguishing among the different competing manufacturers of a product. No one is entitled to sell or deliver commodities under the appearance that the commodities derive from someone else. The importance of consumer protection cannot be overemphasized and the average consumer standard should remain the central point of the inquiry, even under domain name litigation. Replacing the initial interest confusion doctrine is one decisive step, along with the introduction of a doctrine representing the fact that there should be no confusion at the point the sale, and this doctrine would intervene to allow for the capacity of the consumer to choose freely the products they want. Keywords: - trademarks; cyberspace; generic; domain names I. INTRODUCTION Trademarks have been used to designate the source or origin of products for years and a trademark is “any word, name, symbol, or device, or any combination thereof”1 used by a company to identify itself as the source of particular goods and distinguish its goods from those manufactured or sold by competitors. Section 2 of the Canadian Trademark Act2 considers “trademarks” as: * a mark that......

Words: 2830 - Pages: 12

Computer Network

...EENG30002/EENGM0007 Networks and Protocols - 2015 Graduates have told me that the material we're going to cover is very useful in their careers Textbook-based teaching at the request of previous students - book is available free electronically Wetherill also posts video lectures online Important to keep up with reading (200 pages) - nightmare if left until two weeks before the exam Do answer the in-class questions Visit pollev.com/mike99 and log in with your UoB username - initial password is: Networking28976 but please change it as soon as possible by visiting polleverywhere.com Lectures (screen activity & audio) will be recorded and uploaded to Blackboard soon afterwards. Support is provided via piazza.com Assessment: EENG30002: 2-hour exam in January; EENGM0007: Lab-based coursework (10%) plus 2-hour exam in January (90%) NPP Lectures 2015 Page 2 NPP Lectures 2015 Page 3 NPP Lectures 2015 Page 4 NPP Lectures 2015 Page 5 NPP Lectures 2015 Page 6 NPP Lectures 2015 Page 7 NPP Lectures 2015 Page 8 NPP Lectures 2015 Page 9 NPP Lectures 2015 Page 10 1 Networks, Protocols and the Internet Read 1.1 (esp. 1.1.3) and 1.2 Classify applications as wireless or mobile or both. Describe the attributes of Personal Area Networks, Local Area Networks, Metropolitan Area Networks, Wide Area Networks, and the Internet. http://pollev.com/mike99 Bookmark this. (a) Q1 The book says that the iPhone is an example of… Q2 A......

Words: 1984 - Pages: 8

Computer Networks

... | Computer Networks | By:Yaafiz Mohamed (S12425216)Zimna Ahmed (S12465436)Shahuma Abdulla (S12465351)Najudha Adam (S12465351)Sama Ali (S12465333) | | | | | Table of Contents Introduction 3 Computer and Networking. 3 Characteristics of Computer Networks. 3 Types of Computer Networks. 4  PAN (Personal Area Network) 4  LAN (Local Area Network) 5  MAN (Metropolitan Area Network) 5  WAN (Wide Area Network) 5  CAN (Campus Area Network) 5  SAN (Storage Area Network) 5 Why do we network our computers? 6 Peer-to-peer networking. 6 Computer Network Technologies 7 Conclusion: 8 Reference: 9 Introduction The purpose of the report is to survey and monitor the current state of computer network and the types of computer networks. This report is written by examining a range of recent published articles, magazine articles, and internet sites on the topic of computer networks used which are used commonly. The report is mainly about the types of computer network and their functions. Computer and Networking. A computer is a programmable machine, which is designed to sequentially and arithmetically carry out a sequence of logical operations. The particular sequence of operation allowing to solve more than one kind of problem. It responds to a specific set of instructions in a well defined manner. It can execute a pre-recorded list of instructions. Main components of computers are input, output and process. (Thakur) According to (Mitchell, What is......

Words: 1669 - Pages: 7

Computer Network

...I. Computer Dynamics Computer Dynamics is a microcomputer software development company that has a 300-computer network. The company is located in three adjacent five-story buildings in an office park, with about 100 computers in each building. The current network is a poorly designed mix of Ethernet and token ring (Ethernet in two buildings and token ring in the other). The networks in all three buildings are heavily overloaded, and the company anticipates significant growth in network traffic. There is currently no network connection among the buildings, but this is one objective in building the new network. Describe the network you would recommend and how it would be configured with the goal of building a new network that will support the company’s needs for the next 3 years with few additional investments. Be sure to include the devices and type of network circuits you would use. You will need to make some assumptions, so be sure to document your assumptions and explain why you have designed the network in this way. Because we are considering the company present needs and over the next 3 years and not adding any addition investments, I would design the network using the traditional network design process. Computer Dynamics is centrally located in three adjacent five-story buildings, however there is no network connectivity amongst the buildings, which means we have to build a backbone to connect all three LANs. Before addressing the connectivity issues amongst the......

Words: 460 - Pages: 2

Computer Networks

...  North South University  School of Business MIS 105 Introduction to the Computer  Group Presentation   Summer 2012  Presentation Date:  05‐Aug‐2012 Sunday    Venue: Classroom         Time: Normal Class time       Out of: 30    Topic: Computer networks    Scenario: You work in the mid‐level management position of a large multinational  corporation handling millions of records per month. The corporation has about 10  different concerns with around 50 branches countrywide. The corporation has recently  decided to overhaul their computer network system in order to tune up their data  communication system. You, as in charge of the project, are to design a new networking  plan that will improve the performance of their existing data communication system.    What to do:  • Prepare a Multimedia presentation (Power Point) in your group that clearly  explains your plan. If you are planning to use any software/hardware you must  be very specific with their names and the way they work along with their success  history. You are required to perform an extensive online research for this  purpose. You may assume any other parameter that has not been mentioned in  the above scenario.  • You must reference every page (in‐text referencing) of your presentation in  Harvard style. Remember, your work do not have any value without appropriate  referencing. Your presentation must include at least 6 in‐text references; at least ......

Words: 531 - Pages: 3

Network and Computers

...to a server in a network of computers that use the Windows NT Operating System. (Domain controller) Windows NT uses the thought of a domain to manage access to a set of network resources for a group of users. (Domain controller) The person only needs to log in, to gain access to the resources connected to the domain; but could be on any number of different servers in a network. The primary domain controller (which is one server) manages the master user database for the domain. (Domain controller) Backup domain controllers are one or more servers. The primary domain controller will send copies of the database periodically to the backup domain controllers. The backup domain controllers also steps in as the primary domain controller, when the primary domain controller server fails; to help keep the balance of the work if the network is busy. “In Windows NT, a domain combines some of the advantages of a workgroup (a group of users who exchange access to each other’s resources on different computers) and a directory (a group of users who are managed centrally by an administrator).” (Domain controller) The domain concept not only lets a person to obtain access to different resources that are on different servers, but it lets one domain to be given access to another domain in a trusted relationship. In this relationship, the person only needs to log into the first domain to gain access to the second domain. (Domain controller) “In a Windows NT network, not all......

Words: 1064 - Pages: 5

Computer Network

...penting sebagai ukuran klasifikasi karena diperlukan teknik-teknik yang berbeda untuk jarak yang berbeda. Tabel berikut menggambarkan hubungan antar jarak dan prosessor yang ditempatkan pada tempat yang sama. Jarak antar prosessor 0.1 m Prosesor di tempat yang sama Papan rangkaian Jenis jaringan Data flow machine: komputer-komputer paralel, memiliki beberapa unit fungsi yang semuanya bekerja untuk program yang sama Multicomputer, sistem yang berkomunikasi dengan cara mengirim pesan-pesannya melalui bus* pendek dan sangat cepat. Local Area Network (LAN) Local Area Network (LAN) Local Area Network (LAN) Metropolitan area Network (MAN) Wide Area Network (WAN) Secara garis besar ada dua jenis teknologi transmisi: 1m 10 m 100 m 1 km 10 km 100 km Sistem Ruangan Gedung Kampus Kota Negara 3 Pengantar Teknologi Informasi Prodi Sistem Informasi UKDW Umi Proboyekti, S.Kom, MLIS 1.000 km 10.000 km mainboard. Benua Planet Wide Area Network (WAN) Internet *Jalan data elektrik yang mana bit dikirimkan dalam CPU, antar CPU dan komponen-komponen lain di Disini secara terbatas dan sederhana dijelaskan secara singkat LAN, MAN, WAN dan Internet. a. LAN: menghubungkan komputer-komputer pribadi dalam kantor perpusahaan, pabrik atau kampus: LAN dapat dibedakan dari jenis jaringan lainnya berdasarkan 3 karakteristik: ukuran, teknologi transmisi dan topologi jaringan. Topologi LAN jenis broadcast : BUS (kabel linier) Topologi LAN jenis broadcast:......

Words: 2301 - Pages: 10