Enterprise Computing Preliminary Course Unit 2: Networking Systems & Social Computing
Summary
TLDRThis video covers the networking systems and social computing unit of an enterprise computing preliminary course. It explores how network infrastructure and systems, like routers and transmission media, enable efficient virtual interaction through online platforms. Key topics include network and graph theories related to mapping social connections, factors impacting network performance, optimizing bandwidth and traffic flow, securing access with passwords and biometrics, supporting remote work through cloud storage and file sharing, and configuring basic network components like protocols and topology to improve transmission quality.
Takeaways
- π The unit covers networking systems and social computing, focusing on infrastructure for different network types and encouraging virtual communities.
- π Graph and network theory are used to map social networking users, pages they access, and information flow.
- π± Hardware and software influence the internet of things and internet of me, impacting individuals and enterprises.
- πΎ Requirements for data storage capacity, accessibility, location and security are discussed.
- βοΈ Cloud computing service foundations like IaaS, SaaS and PaaS are covered.
- π Network architecture and components like hubs, switches, routers, transmission media and interference are explained.
- πΆ Methods to optimize network data flow and traffic are provided.
- π Network access security like passwords, biometrics and captcha are overviewed.
- π Intelligent home network capabilities are mentioned.
- π Steps for designing, modeling, configuring and evaluating a basic network are given.
Q & A
What are the three main cloud computing service models discussed?
-The three main cloud computing service models discussed are: Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).
How can network performance be optimized?
-Network performance can be optimized by improving bandwidth through logical routing of pathways and mediums, updating device drivers and firmware, monitoring traffic flows, and implementing flow scheduling.
What is the purpose of graph and network theory in social networking?
-Graph and network theory in social networking aims to map out the connections between different users, pages, and groups to portray the flow of information through the network.
What are some examples of biometric authentication?
-Some examples of biometric authentication are facial recognition, fingerprint scanning, retina scanning, and voice recognition.
What is a TPM chip used for in terms of security?
-A TPM (Trusted Platform Module) chip is used to support security measures like secure system booting and checking digital signatures to ensure they are coming from trusted locations.
What causes transmission interference in networks?
-Factors like distance between nodes, network topology, physical barriers like buildings and cliffs, and environmental factors can all cause interference in network data transmission.
How do software updates improve security?
-Software updates often contain security patches that fix vulnerabilities and add new protections against emerging cyber threats.
What is the purpose of CAPTCHA tests?
-CAPTCHA tests are designed to distinguish human users from bots by presenting a challenge that is easy for humans but difficult for bots to interpret.
What are some examples of disruptive technologies?
-Some examples of disruptive technologies include the internet, smartphones, cloud computing, artificial intelligence, and cryptocurrencies.
How does remote working technology support accessibility?
-Remote working technology like video conferencing, file sharing, and cloud platforms support accessibility by enabling people with disabilities to more easily participate without needing to physically go to a workplace.
Outlines
π Introduction: Human-centric computing, disruptive technology & social network graph theory
This paragraph introduces concepts of human-centric computing systems, disruptive technology effects, innovations pushing change, and social network graph & network theory related to mapping user connections and information flow.
π Influence of apps on social networks and impacts of IoT data
This paragraph discusses the expanding functionality and influence of apps built into social platforms and the personal/enterprise impacts of internet-connected data related to identity and reputation.
π Cloud services, network architecture and optimizing data transmission
This paragraph covers cloud computing service foundations, network architecture components, transmission media/interference, and optimizing network data flow/traffic monitoring using AI-based systems.
π Network access security, home automation, and intelligent systems
This paragraph focuses on network access and security protocols like biometrics and TPM chips, trends in home automation through intelligent connectivity, and machine learning for automated network optimization.
π Designing and evaluating a basic network with security
This final paragraph discusses practical aspects of designing, modeling, configuring and securing a basic network, including project management, performance optimization, and secure data transmission techniques.
Mindmap
Keywords
π‘Network systems
π‘Social Computing
π‘Graph Theory
π‘Network Theory
π‘Internet of Things (IoT)
π‘Cloud Computing
π‘Network Architecture
π‘Machine Learning (ML)
π‘Network Security
π‘Network Optimization
Highlights
Focuses on network systems and infrastructure for local and internet networks, with a focus on social computing and virtual communities
Relates graph theory to mapping social network users, pages they access, and groups they create to portray connections
Apps build functionality and expand what can be done and shared on social media platforms
Hardware and software influence Internet of Things and Internet of Me - data available about individuals and enterprises online
Remote working capabilities expanded through video conferencing, file sharing platforms, and workflow tools
Data storage capacity and accessibility are key considerations, along with location, security, and accessibility
Cloud services provide infrastructure, software, platforms for flexible data storage models - public, private or hybrid access
Network architecture components like routers, switches, transmission media enable connection to cloud services
Environmental barriers like topography and buildings impact network transmission and need to be managed
Traffic flow optimization improves user experience - AI and machine learning can help automatically monitor and adapt
Network access security methods like passwords, biometrics, captchas defend against bots and unauthorized access
Intelligent home networks allow centralized control of devices and functions using mobile phones
Students design and model networks using hardware, software, and project management tools
Network optimization improves performance via routing, bandwidth management, driver and firmware updates
Evaluating transmission security and infrastructure setup ensures efficient, logical data flow
Transcripts
Enterprise Computing preliminary course
unit 2. networking systems and social
Computing so as the name suggests for
this unit we are taking a look at
Network systems and the infrastructure
that kind of sets up different types of
networks whether it be local or through
the internet but with a focus on social
Computing uh that of the social media
and the fact that we are trying to
encourage networks that bring people
together have interaction and set up
virtual communities for people to
interact through online platforms so you
can see a bit of connection here to what
was already alert with unit one but this
unit gets a lot more Technical and it's
probably contains the most terminology
out of all three preliminary units so
there's a lot to learn here and it leads
to a very messy mind map so let's see if
we can follow along
the first area is that of the
introduction to human-centric Computing
that we are developing systems with
individuals humans in mind and their
efficiency to get on the system and
engage in their work so areas related to
this is the effects of disruptive
technology so how when we have new
technology being invented or improved
communication it changes everything it
changes how we work it means we can do
work in different ways so it has that
effect on individuals in both a personal
and work related manner
the Innovations push change so when a
new technology comes out it means new
systems can be built with this new
technology and based on Trends and what
people are using that becomes kind of
New Foundations for what systems need to
include in order to support users in
order to make systems human-centric for
them
the next area is out of graph and
network Theory and in particular in
relation to social networking so with
that in social networking the graph
Theory relates to different users pages
and groups that they might be accessing
and tries to map that out and portray a
kind of picture of what users go to what
pages and what kinds of groups do they
set up and all that so it kind of
displays that in graph Theory
and then from there is the network
Theory which shows the flow of
information through all these elements
all right so they're the two theories in
place there and trying to map that out
in social media obviously it's very
important in social media in particular
if you're a platform for managing the
success of getting users getting them
interested and allowing for people to
grow and information to go through as to
expand their brands okay for specific
users
the next Theory then is the influence on
apps on social networking as with social
networking and outside of social
networking apps build on functionality
so when we include an app on within
social networking it expands what we can
do whether it can be we can embed a game
into the social media platform or it
could be a new element that can be
allowed for creativity and that can be
shared through social networking so the
apps build upon this and probably the
easiest way you can see that is through
your phone every time you download a new
app onto your phone you have a new
function something you can do okay but
we're talking about this in a social
media platform type of way where you can
share that element with your networks
and the people who you've been set up
with through your social media
the next area here is in hardware and
software's influence on the iot and iome
those two acronyms stand for the
internet of things which relates to all
the information available on the
internet that we can access and View and
then the io me the internet of me things
out there on the internet about myself
so there's a lot of categories related
to this specifically the impact on the
individual with this data that is out
there as well as the impact on
Enterprises we develop an identity and a
reputation online okay whether it be
ourselves or our business what we do
there's info out there and that will
influence how people see us or our
business now the other side of this too
is what's going on in the background the
hardware infrastructure that allows us
to connect with these networks so what
technology is running behind the scenes
so that will come up a bit later in this
unit
okay and the software protocols that
need to be used okay for specific types
of communication whether it be through
accessing websites accessing social
media accessing email there are
protocols in place so that all the
different types of technology that are
being used to access the networks mobile
devices computers game consoles are all
still speaking the same language when
online together
data obviously needs to be backed up
because if something happens to a
particular server on a network data
could potentially be lost and we still
want that data so we need backup making
secondary copies of data in place to
protect data whether it means storing it
offline or storing it at a different
server in a secondary location okay just
that it's somewhere else so that if
anything happens to our primary source
we can get it again
and then obviously things need to be in
place with regulation compliance and
cyber security and cyber security is
actually the third unit of Enterprise
computing's preliminary course okay but
the fact that things are set up to make
sure that businesses are bound by some
sort of rules for their ethical use as
well as the protection of data
and then finally characteristics related
to the startup and success of startup
groups okay people want to start
businesses online and we want to create
systems that people want to use there
are platforms available out there that
give people the tools they need to have
a network without having all the network
infrastructure ready they can start it
from their home and connect to their
website of the actual platform giving
them Network capabilities the chance to
find users for their businesses and
allow their brands to grow whether it be
through some sort of specific platform
or through social media they can share
their ideas they can share their
business and find customers
the next area of this unit is of storage
and workflow in Enterprise systems and
here we're going through a lot of the
technical components so that up the
benefits and limitations of digital
workplace so data is digital so we can
share it quite easily
okay through a variety of platforms and
through obviously making posts online
okay but then obviously there's
limitations too and potential
consequences too in the areas of
protecting our data protecting our
ownership of data that we need to be
mindful of and obviously think where
we're going to be sharing our data
we then got developments in network
connectivity and obviously a lot has
happened in recent years where we can do
a lot of our work that traditionally we
need to go into our workplace for from
home so obviously that first point there
is of remote working we can use video
conferencing software uh to have
meetings now and then after those
meetings we can do our work at home
okay and still have all my team members
faces on screen so we can still speak as
if we're in the same office another
layer to this is of file sharing there
are now Cloud platforms such as Dropbox
iCloud
um and even Microsoft to have their
OneDrive okay where multiple users can
access
um shared drives online and be working
on the same documents in those drives
okay to collaboratively develop their
work depending on whatever their
workplace is okay these items are set up
once again to allow users to work
remotely and then obviously tools that
support workflows with task delegation
who's going to be doing what so we do
have our once again face-to-face through
video conferencing but then we'll go
what specific items and apps that can be
downloaded where we can share schedules
through calendars and allow people to
know when things will take place because
we aren't in the workplace together we
are at home we are off site that
communication still needs to take place
so that can be automatically logged into
calendars so people know when things
going to happen okay but obviously these
things all support the changing nature
of work that moving away from the
workplace and now more so working from
home which is a bargaining chip people
you now use when going for jobs that
they want to work from home x amount of
days per week
the next area is data storage
requirements okay and look it's twofold
it depends if we're going to be storing
our data locally okay in our own drives
but more so these days online so what
capacity do we need okay of storage do I
need one terabyte of online storage or
more to support all my businesses data
we've got to think of that capacity
there and then accessibility
how will users access the data stored on
our Cloud platform or on our local
platform and then based on login
procedures what data within our storage
can each user access to because we've
also got to protect privacy and factor
in not all users within my Enterprise
need to have access to all work okay but
then also on the other side of that too
through making it accessible the fact
that people who might have impairments
or disabilities okay all of that is kind
of broken right down because they don't
have to travel into the workplace
anymore so having our data stored in
network drive supports accessibility
because people can just be seeing a
computer at home
and getting to the data they need quite
easily we've got to think of the
location of where this data is going to
be stored it's going to be logical so in
the cloud that's usually self-managed by
the platform we're using but locally how
is it a centralized drive is it going to
be a single centralized drive or maybe a
distributed model if we've got a larger
Enterprise and then obviously as alluded
to with accessibility security measures
that are going to be put in place and
we'll get to that in a bit later within
this unit too in order to protect data
ensure that the user is viewing the data
have a reason and right to be viewing
that data as per their task
the next area is our Cloud Computing
Services and really it is what is the
foundations of the services so whether
it be infrastructure as service which is
iaas software as service saas and
platform as service these will help set
up our cloud services in how we're going
to use them how people will access them
okay when we want to use these
and then we got the different types of
cloud-based data storage and it
basically relates to how it's going to
be used and the restrictions in place so
will it just be a public Cloud where
anyone can access and share data and
work on information is it going to be a
private Cloud which is more of an
internet where actual users need to log
in and be specifically a part of an
organization okay to view the data
within the cloud and then in these days
most of these cloud services may be
hybrid we can have General customers
coming in and viewing our data through
our sites but there is a portion within
our Cloud that is restricted to only
authenticated users and only they can
access it to do their work and then we
also have non-cloud on-premises okay
where we don't use cloud technology it's
pretty much just the data we've stored
on local hard drives there so Cloud
technology can be used in a variety of
ways to support our business based on
what we are doing
Okay the third area then relates to
network architecture and infrastructure
now we're getting into the technical
nitty-gritty of the actual networking
systems so the key components of it
required the Network Technologies Hub
switch routers gateways Bridges all of
that okay the on-premise stuff we need
in order to connect to the Internet or
to our customers okay what
infrastructure do we need is it just a
router that is connected to our phone
line or NBN that gets us to that network
connection we need or are we managing a
lot of the network ourselves from our
businesses location
and then how does that connect us to
cloud computing
this is supported by transmission media
okay and I already said NBN just before
what is connecting our devices together
both locally and through the internet to
get to our data that is online so our
wide mediums of twisted pair ethernet
um our coaxial cabling and then
obviously optical fiber which is the
main infrastructure in Australia now
okay within the roads of the NBN and
then our wireless mediums too our
microwaves our satellites and radio
signals that allow for wider area
communication without the need for wires
okay and obviously expanding upon the
data in order to connect to services
that are a lot further away without
needing a physical connection
the next area is the transmission
interference we are using these mediums
but what can affect our data while being
transmitted so things such as distance
between the nodes that are communicating
between each other and the topography
how specific nodes and mediums are laid
out on a network okay the mountain
ranges the height and the The Valleys
all of that will impact on how the data
is sent so there are physical and
environmental barriers that will also
include too so just physical barriers
could be transmitting high above a
Clifford trees being in the way or
specific buildings that have been built
okay that data needs to be transmitted
through okay unfortunately Landscapes
aren't all flat we have houses we have
nature all of that is impacting on the
actual data being sent between our
devices through our transmission mediums
and that obviously needs to be factored
into our Network infrastructure
okay we want to improve the data flow in
a sense so based on what we just said
about interference we need to think of
our antenna power our actual traffic
filtering by how many users are
accessing our Network and then how is
that being dispersed among our
technologies that we're using on our
Network to support that flow and give
users a good experience interacting and
getting to the data they need and
getting it back to them as information
and the things that can support that is
flow scheduling and traffic monitoring
which obviously a network administrator
needs to use but we are also talking
about Smart Systems too and we have ai
supporting this as well that is
monitoring this and then moving users
down different Pathways to support their
work on a network
okay once again we're talking about
graphene Network Theory but how can we
optimize this for users okay so we said
that social media needs this stuff but
we want to optimize it if our Enterprise
is going to maximize its success so the
adjacency and centrality of the actual
Network how are people getting to the
data they want how is that information
flowing and being shared through the
actual graph Theory
okay and how it's all set up how does it
give users that feeling of connectedness
to their data okay and allowing them to
expand through those social networks and
then what are the things that actually
weighted on these graphs okay so
obviously an area that needs to be
optimized for an Enterprise to maximize
their success
okay and then we've got to talk about
specific devices that support the
Internet of Things So once again getting
users onto the internet and knowing
specific protocols HTTP https
um that's incorporates SSL SMTP all of
that that is required to access certain
systems and services online
okay we then talk about machine learning
ml in conjunction with the internet of
things as I said before with managing
networks a lot of these are run by smart
AI systems that will help map users on a
network through specific routes of
mediums and devices to control the flow
of a network for their user experience
on the network so they don't get too
much lag or get dropped off an actual
platform okay ml the machine learning is
data driven so it will read numbers of
traffic and bits per second and
bottlenecking and bandwidth and all of
that and try to control this traffic
okay it will report any types of
diagnoses going place on the network and
then try to respond to this at this
stage we still want a physical human
network administrator there to support
the AI managing it with its machine
learning okay but a key area here is
automation this these types of tasks are
being taken over by AI because they can
it is numbers based they can make the
diagnostic decisions and respond to them
okay and they can operate 24 hours where
humans traditionally can't so we're
developing Smart Systems to allow these
Network systems to function for users
all over the world and control the flows
of traffic
okay we then and as mentioned before
need to focus on network access and
security now we already know that we
need logins and passwords to get onto
the internet and that controls users
allowing them to identify who they are
and what network rights they have to
access information okay and that
obviously passwords involves you typing
in a string of characters but then these
are also replaced with things such as
Biometrics okay and you see it on your
phone your phone these days you used to
have to put in a PIN code and you still
do sometimes but it can also just do
facial recognitions facial recognition
thumb print recognition that's
Biometrics it's reading your biology in
order to gain access into a system
we also have a thing known as captcha
okay and that capture that's used for
detecting Bots that's when you log into
a website with your password then you
might get a prompt come on screen of an
image and it might say what does this
word say and it might be in a more
calligraphy style of writing with a
grainness behind it and robots can't
read that because it's not in an OCR
type of character that they can read off
screen so only humans can interpret that
and it keeps the Bots out okay same when
you've got to click on the different
squares on screen saying where is the
traffic lights or where are the
mountains okay robots can't distinguish
that from a multiple panel of images but
humans can so it ensures that only
humans are getting into the system
and then um what also might be on our
systems too is that TPM The Trusted
platform modules which is a chip that is
used to support security measures so
support the booting of systems making
sure they are booting in a secure
location as well as checking the
signatures of users their digital
signatures that are coming from trusted
locations okay TPM supports that and
then finally software updates and you
guys are updating software on your
mobile phones and on your computers
software updates don't just uh update
for uh compatibility and efficiency they
also update for security okay so when
you update your software it could be new
protections are being put in place on
your systems through the OS to protect
you from malicious software and
unauthorized users because they've
picked up a pattern and then obviously
um the platforms are trying to defend
their users from this and they'll push
that stuff out through software updates
and then we've got the use of
intelligent home networks okay and um
you know we've seen things such as Alexa
where we can speak out loud commands and
things will happen in our home switching
lights on and off the ability to check
your mobile phone to see internal
security cameras with you on a house so
this internal intelligent home networks
that are being established where Digital
Data is allowing us to do a lot of
things from centralized devices from our
mobile phone from our computers and we
can control functions within our house
wow we're living in the future now
aren't we okay so the final area of this
unit is creating a basic Network okay so
obviously a lot of the creativity here
is happening in this portion of the unit
so we want to design and model a network
we are setting up some sort of network
okay and it might be fully physical
we're designing it we're designing it's
a logic what nodes are we using to
connect what devices and illustrating
what mediums are we using to connect it
all together
we are going to apply project management
Tools in order to do this okay so what
tools can we use so the use of hardware
and software to illustrate this here and
map it out and how we're going to set up
our Network there
okay we've got to have a bit of
knowledge on how to configure network
devices and that can be embedded into an
assessment so The Logical naming of
specific devices and then later on
updating these devices with their naming
with their properties and what they're
connecting with how to configure
specific protocols on a network and
configuring our actual devices for
connection to the Internet so that stuff
is potentially accessible within this
unit in relation to the preliminary
course and your knowledge in Enterprise
computing
okay also the implementation of security
protocols that we just mentioned before
the setting up of passwords the setting
up of potentially Biometrics if you've
got cameras enabled and all of that what
things need to be done in order to
protect users on a network so a working
knowledge of how to do that
we want to be able to optimize a
performance on a network so knowing how
to improve a bandwidth so mapping out
the routing of pathways on a network the
actual mediums we are using okay to
distribute data so as we know optic
fiber is the best wide medium but it's
expensive the actual nodes that are at
our Central nodes so our routers and
switches that might be centralized how
have we placed them out of network and
has our Network traffic mapped through
that all of that helps improve bandwidth
but then also the other side of it too
of updating drivers and firmware okay so
pushing out updates to our devices which
manufacturers do for phones and
computers all the time okay allowing the
actual software to be updated so it can
continue to be optimized and compatible
with new technology out there and then
the final area of this unit okay
evaluating the transmission it okay how
good is it can it be improved how can we
evaluate the I.T so looking at when data
is unsecured what can we do about it
there to ensure that it gets secured the
use of encryption the ability to
scramble data prior to transmission so
that when it is transmitted okay if it
does get intercepted it won't make sense
it can't be read but ensuring that when
the user gets it therein they have the
appropriate decryption key okay to
translate that data back into readable
form
okay so that comes along with it so they
can interpret the data there and then
finally just ensuring that our
infrastructure is set up in a way that
is logical and allows for data to flow
through our Network logically and
efficient so I hope this video has given
you an understanding of the network
systems and social Computing unit of the
Enterprise Computing preliminary course
it is the most technologically heavy
Topic in relation to understanding
content there is a lot here and as you
can see this mind map it's a big mess
but it is all terminology so learning
this terminology here and understanding
the relationship between terminology
will allow you to be successful at
understanding this unit okay and
remember we're not just learning about
Network Technology and infrastructure
but how it is used to support social
networking okay the fact that it allows
for the efficient interaction between
different users globally in many cases
with these Enterprise systems to allow
them to share ideas and have a pleasant
online experience through their
technology so no lag and they can get to
the data they want and it loads quickly
okay based on the efficient setup of
these Network systems
Browse More Related Video
5.0 / 5 (0 votes)