Enterprise Computing Preliminary Course Unit 2: Networking Systems & Social Computing

Christopher Kalodikis
18 Apr 202323:45

Summary

TLDRThis video covers the networking systems and social computing unit of an enterprise computing preliminary course. It explores how network infrastructure and systems, like routers and transmission media, enable efficient virtual interaction through online platforms. Key topics include network and graph theories related to mapping social connections, factors impacting network performance, optimizing bandwidth and traffic flow, securing access with passwords and biometrics, supporting remote work through cloud storage and file sharing, and configuring basic network components like protocols and topology to improve transmission quality.

Takeaways

  • 😊 The unit covers networking systems and social computing, focusing on infrastructure for different network types and encouraging virtual communities.
  • πŸ“ˆ Graph and network theory are used to map social networking users, pages they access, and information flow.
  • πŸ“± Hardware and software influence the internet of things and internet of me, impacting individuals and enterprises.
  • πŸ’Ύ Requirements for data storage capacity, accessibility, location and security are discussed.
  • ☁️ Cloud computing service foundations like IaaS, SaaS and PaaS are covered.
  • 🌐 Network architecture and components like hubs, switches, routers, transmission media and interference are explained.
  • πŸ“Ά Methods to optimize network data flow and traffic are provided.
  • πŸ”“ Network access security like passwords, biometrics and captcha are overviewed.
  • 🏠 Intelligent home network capabilities are mentioned.
  • πŸ›  Steps for designing, modeling, configuring and evaluating a basic network are given.

Q & A

  • What are the three main cloud computing service models discussed?

    -The three main cloud computing service models discussed are: Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).

  • How can network performance be optimized?

    -Network performance can be optimized by improving bandwidth through logical routing of pathways and mediums, updating device drivers and firmware, monitoring traffic flows, and implementing flow scheduling.

  • What is the purpose of graph and network theory in social networking?

    -Graph and network theory in social networking aims to map out the connections between different users, pages, and groups to portray the flow of information through the network.

  • What are some examples of biometric authentication?

    -Some examples of biometric authentication are facial recognition, fingerprint scanning, retina scanning, and voice recognition.

  • What is a TPM chip used for in terms of security?

    -A TPM (Trusted Platform Module) chip is used to support security measures like secure system booting and checking digital signatures to ensure they are coming from trusted locations.

  • What causes transmission interference in networks?

    -Factors like distance between nodes, network topology, physical barriers like buildings and cliffs, and environmental factors can all cause interference in network data transmission.

  • How do software updates improve security?

    -Software updates often contain security patches that fix vulnerabilities and add new protections against emerging cyber threats.

  • What is the purpose of CAPTCHA tests?

    -CAPTCHA tests are designed to distinguish human users from bots by presenting a challenge that is easy for humans but difficult for bots to interpret.

  • What are some examples of disruptive technologies?

    -Some examples of disruptive technologies include the internet, smartphones, cloud computing, artificial intelligence, and cryptocurrencies.

  • How does remote working technology support accessibility?

    -Remote working technology like video conferencing, file sharing, and cloud platforms support accessibility by enabling people with disabilities to more easily participate without needing to physically go to a workplace.

Outlines

00:00

πŸ˜ƒ Introduction: Human-centric computing, disruptive technology & social network graph theory

This paragraph introduces concepts of human-centric computing systems, disruptive technology effects, innovations pushing change, and social network graph & network theory related to mapping user connections and information flow.

05:02

😊 Influence of apps on social networks and impacts of IoT data

This paragraph discusses the expanding functionality and influence of apps built into social platforms and the personal/enterprise impacts of internet-connected data related to identity and reputation.

10:03

🌐 Cloud services, network architecture and optimizing data transmission

This paragraph covers cloud computing service foundations, network architecture components, transmission media/interference, and optimizing network data flow/traffic monitoring using AI-based systems.

15:04

πŸ”’ Network access security, home automation, and intelligent systems

This paragraph focuses on network access and security protocols like biometrics and TPM chips, trends in home automation through intelligent connectivity, and machine learning for automated network optimization.

20:06

πŸ›  Designing and evaluating a basic network with security

This final paragraph discusses practical aspects of designing, modeling, configuring and securing a basic network, including project management, performance optimization, and secure data transmission techniques.

Mindmap

Keywords

πŸ’‘Network systems

Network systems refer to the infrastructure and components that enable devices to connect and communicate over a network. This includes things like routers, switches, transmission media like fiber optic cables, wireless signals, etc. The video discusses different network systems like local networks and the internet that facilitate communication, especially for social media and virtual communities.

πŸ’‘Social Computing

Social computing refers to systems and platforms that enable social interaction between users, allowing them to connect, communicate, and collaborate. The video relates this to social media sites and online communities that bring people together.

πŸ’‘Graph Theory

Graph theory is a branch of mathematics that studies the properties of graphs and networks. In the context of social networks, it involves mapping out the connections between different users, pages, and groups to understand the overall structure and information flow.

πŸ’‘Network Theory

Network theory analyzes the exchange and distribution of resources and information across links in a network. For social networks, it looks at how information spreads amongst users through their connections.

πŸ’‘Internet of Things (IoT)

The Internet of Things (IoT) refers to the vast number of everyday objects and devices that are now connected to the internet and can collect and exchange data. This impacts individuals through the data collected about them and businesses in terms of identity/reputation.

πŸ’‘Cloud Computing

Cloud computing involves storing data and running applications over the internet rather than on local servers. The video discusses different cloud service models like IaaS, PaaS, SaaS and storage options like public, private, hybrid models.

πŸ’‘Network Architecture

Network architecture refers to the layout and configuration of network components required to establish connectivity and communication. This includes things like hubs, switches, routers, gateways, transmission media, etc.

πŸ’‘Machine Learning (ML)

Machine learning is an application of AI that allows systems to learn from data and improve at tasks overtime without explicit programming. The video discusses using ML to monitor and optimize networks by analyzing traffic data.

πŸ’‘Network Security

Network security involves protecting networks and network-enabled resources from unauthorized access. This includes things like passwords, biometrics, captcha, trusted platform modules (TPM), and regular software updates.

πŸ’‘Network Optimization

Network optimization refers to maximizing network efficiency by enhancing throughput and reliability. This can involve upgrading bandwidth, improving network topology, updating drivers/firmware, and evaluating protections.

Highlights

Focuses on network systems and infrastructure for local and internet networks, with a focus on social computing and virtual communities

Relates graph theory to mapping social network users, pages they access, and groups they create to portray connections

Apps build functionality and expand what can be done and shared on social media platforms

Hardware and software influence Internet of Things and Internet of Me - data available about individuals and enterprises online

Remote working capabilities expanded through video conferencing, file sharing platforms, and workflow tools

Data storage capacity and accessibility are key considerations, along with location, security, and accessibility

Cloud services provide infrastructure, software, platforms for flexible data storage models - public, private or hybrid access

Network architecture components like routers, switches, transmission media enable connection to cloud services

Environmental barriers like topography and buildings impact network transmission and need to be managed

Traffic flow optimization improves user experience - AI and machine learning can help automatically monitor and adapt

Network access security methods like passwords, biometrics, captchas defend against bots and unauthorized access

Intelligent home networks allow centralized control of devices and functions using mobile phones

Students design and model networks using hardware, software, and project management tools

Network optimization improves performance via routing, bandwidth management, driver and firmware updates

Evaluating transmission security and infrastructure setup ensures efficient, logical data flow

Transcripts

play00:00

Enterprise Computing preliminary course

play00:02

unit 2. networking systems and social

play00:05

Computing so as the name suggests for

play00:08

this unit we are taking a look at

play00:10

Network systems and the infrastructure

play00:12

that kind of sets up different types of

play00:15

networks whether it be local or through

play00:16

the internet but with a focus on social

play00:19

Computing uh that of the social media

play00:23

and the fact that we are trying to

play00:25

encourage networks that bring people

play00:27

together have interaction and set up

play00:30

virtual communities for people to

play00:32

interact through online platforms so you

play00:35

can see a bit of connection here to what

play00:36

was already alert with unit one but this

play00:39

unit gets a lot more Technical and it's

play00:41

probably contains the most terminology

play00:44

out of all three preliminary units so

play00:47

there's a lot to learn here and it leads

play00:48

to a very messy mind map so let's see if

play00:50

we can follow along

play00:51

the first area is that of the

play00:54

introduction to human-centric Computing

play00:56

that we are developing systems with

play00:58

individuals humans in mind and their

play01:01

efficiency to get on the system and

play01:03

engage in their work so areas related to

play01:06

this is the effects of disruptive

play01:08

technology so how when we have new

play01:10

technology being invented or improved

play01:13

communication it changes everything it

play01:16

changes how we work it means we can do

play01:17

work in different ways so it has that

play01:20

effect on individuals in both a personal

play01:22

and work related manner

play01:25

the Innovations push change so when a

play01:28

new technology comes out it means new

play01:30

systems can be built with this new

play01:31

technology and based on Trends and what

play01:34

people are using that becomes kind of

play01:36

New Foundations for what systems need to

play01:38

include in order to support users in

play01:41

order to make systems human-centric for

play01:43

them

play01:44

the next area is out of graph and

play01:46

network Theory and in particular in

play01:48

relation to social networking so with

play01:51

that in social networking the graph

play01:53

Theory relates to different users pages

play01:57

and groups that they might be accessing

play01:59

and tries to map that out and portray a

play02:03

kind of picture of what users go to what

play02:04

pages and what kinds of groups do they

play02:07

set up and all that so it kind of

play02:09

displays that in graph Theory

play02:11

and then from there is the network

play02:13

Theory which shows the flow of

play02:16

information through all these elements

play02:18

all right so they're the two theories in

play02:21

place there and trying to map that out

play02:23

in social media obviously it's very

play02:25

important in social media in particular

play02:27

if you're a platform for managing the

play02:29

success of getting users getting them

play02:32

interested and allowing for people to

play02:34

grow and information to go through as to

play02:37

expand their brands okay for specific

play02:39

users

play02:40

the next Theory then is the influence on

play02:42

apps on social networking as with social

play02:45

networking and outside of social

play02:47

networking apps build on functionality

play02:49

so when we include an app on within

play02:52

social networking it expands what we can

play02:54

do whether it can be we can embed a game

play02:57

into the social media platform or it

play02:59

could be a new element that can be

play03:01

allowed for creativity and that can be

play03:03

shared through social networking so the

play03:05

apps build upon this and probably the

play03:07

easiest way you can see that is through

play03:09

your phone every time you download a new

play03:10

app onto your phone you have a new

play03:12

function something you can do okay but

play03:15

we're talking about this in a social

play03:17

media platform type of way where you can

play03:20

share that element with your networks

play03:23

and the people who you've been set up

play03:24

with through your social media

play03:27

the next area here is in hardware and

play03:29

software's influence on the iot and iome

play03:33

those two acronyms stand for the

play03:35

internet of things which relates to all

play03:38

the information available on the

play03:40

internet that we can access and View and

play03:43

then the io me the internet of me things

play03:46

out there on the internet about myself

play03:48

so there's a lot of categories related

play03:50

to this specifically the impact on the

play03:53

individual with this data that is out

play03:55

there as well as the impact on

play03:57

Enterprises we develop an identity and a

play04:00

reputation online okay whether it be

play04:03

ourselves or our business what we do

play04:05

there's info out there and that will

play04:07

influence how people see us or our

play04:11

business now the other side of this too

play04:13

is what's going on in the background the

play04:16

hardware infrastructure that allows us

play04:17

to connect with these networks so what

play04:20

technology is running behind the scenes

play04:21

so that will come up a bit later in this

play04:22

unit

play04:23

okay and the software protocols that

play04:25

need to be used okay for specific types

play04:28

of communication whether it be through

play04:30

accessing websites accessing social

play04:32

media accessing email there are

play04:34

protocols in place so that all the

play04:36

different types of technology that are

play04:38

being used to access the networks mobile

play04:40

devices computers game consoles are all

play04:43

still speaking the same language when

play04:44

online together

play04:46

data obviously needs to be backed up

play04:48

because if something happens to a

play04:50

particular server on a network data

play04:53

could potentially be lost and we still

play04:54

want that data so we need backup making

play04:56

secondary copies of data in place to

play04:59

protect data whether it means storing it

play05:01

offline or storing it at a different

play05:03

server in a secondary location okay just

play05:05

that it's somewhere else so that if

play05:07

anything happens to our primary source

play05:09

we can get it again

play05:10

and then obviously things need to be in

play05:12

place with regulation compliance and

play05:15

cyber security and cyber security is

play05:17

actually the third unit of Enterprise

play05:18

computing's preliminary course okay but

play05:21

the fact that things are set up to make

play05:23

sure that businesses are bound by some

play05:26

sort of rules for their ethical use as

play05:28

well as the protection of data

play05:31

and then finally characteristics related

play05:33

to the startup and success of startup

play05:35

groups okay people want to start

play05:37

businesses online and we want to create

play05:39

systems that people want to use there

play05:41

are platforms available out there that

play05:44

give people the tools they need to have

play05:47

a network without having all the network

play05:49

infrastructure ready they can start it

play05:51

from their home and connect to their

play05:53

website of the actual platform giving

play05:56

them Network capabilities the chance to

play05:59

find users for their businesses and

play06:01

allow their brands to grow whether it be

play06:03

through some sort of specific platform

play06:05

or through social media they can share

play06:08

their ideas they can share their

play06:09

business and find customers

play06:12

the next area of this unit is of storage

play06:14

and workflow in Enterprise systems and

play06:16

here we're going through a lot of the

play06:18

technical components so that up the

play06:20

benefits and limitations of digital

play06:22

workplace so data is digital so we can

play06:25

share it quite easily

play06:27

okay through a variety of platforms and

play06:29

through obviously making posts online

play06:31

okay but then obviously there's

play06:33

limitations too and potential

play06:35

consequences too in the areas of

play06:37

protecting our data protecting our

play06:39

ownership of data that we need to be

play06:41

mindful of and obviously think where

play06:43

we're going to be sharing our data

play06:46

we then got developments in network

play06:48

connectivity and obviously a lot has

play06:50

happened in recent years where we can do

play06:53

a lot of our work that traditionally we

play06:54

need to go into our workplace for from

play06:56

home so obviously that first point there

play06:58

is of remote working we can use video

play07:00

conferencing software uh to have

play07:02

meetings now and then after those

play07:04

meetings we can do our work at home

play07:07

okay and still have all my team members

play07:10

faces on screen so we can still speak as

play07:12

if we're in the same office another

play07:14

layer to this is of file sharing there

play07:17

are now Cloud platforms such as Dropbox

play07:19

iCloud

play07:20

um and even Microsoft to have their

play07:23

OneDrive okay where multiple users can

play07:26

access

play07:27

um shared drives online and be working

play07:30

on the same documents in those drives

play07:32

okay to collaboratively develop their

play07:35

work depending on whatever their

play07:37

workplace is okay these items are set up

play07:39

once again to allow users to work

play07:41

remotely and then obviously tools that

play07:44

support workflows with task delegation

play07:47

who's going to be doing what so we do

play07:49

have our once again face-to-face through

play07:51

video conferencing but then we'll go

play07:53

what specific items and apps that can be

play07:55

downloaded where we can share schedules

play07:58

through calendars and allow people to

play08:00

know when things will take place because

play08:02

we aren't in the workplace together we

play08:04

are at home we are off site that

play08:06

communication still needs to take place

play08:07

so that can be automatically logged into

play08:09

calendars so people know when things

play08:10

going to happen okay but obviously these

play08:14

things all support the changing nature

play08:16

of work that moving away from the

play08:17

workplace and now more so working from

play08:20

home which is a bargaining chip people

play08:21

you now use when going for jobs that

play08:23

they want to work from home x amount of

play08:25

days per week

play08:27

the next area is data storage

play08:29

requirements okay and look it's twofold

play08:31

it depends if we're going to be storing

play08:33

our data locally okay in our own drives

play08:36

but more so these days online so what

play08:40

capacity do we need okay of storage do I

play08:42

need one terabyte of online storage or

play08:45

more to support all my businesses data

play08:47

we've got to think of that capacity

play08:48

there and then accessibility

play08:51

how will users access the data stored on

play08:54

our Cloud platform or on our local

play08:57

platform and then based on login

play09:00

procedures what data within our storage

play09:03

can each user access to because we've

play09:05

also got to protect privacy and factor

play09:07

in not all users within my Enterprise

play09:10

need to have access to all work okay but

play09:13

then also on the other side of that too

play09:15

through making it accessible the fact

play09:17

that people who might have impairments

play09:19

or disabilities okay all of that is kind

play09:21

of broken right down because they don't

play09:23

have to travel into the workplace

play09:24

anymore so having our data stored in

play09:27

network drive supports accessibility

play09:29

because people can just be seeing a

play09:31

computer at home

play09:32

and getting to the data they need quite

play09:35

easily we've got to think of the

play09:37

location of where this data is going to

play09:38

be stored it's going to be logical so in

play09:40

the cloud that's usually self-managed by

play09:42

the platform we're using but locally how

play09:44

is it a centralized drive is it going to

play09:46

be a single centralized drive or maybe a

play09:48

distributed model if we've got a larger

play09:50

Enterprise and then obviously as alluded

play09:53

to with accessibility security measures

play09:55

that are going to be put in place and

play09:57

we'll get to that in a bit later within

play09:58

this unit too in order to protect data

play10:01

ensure that the user is viewing the data

play10:03

have a reason and right to be viewing

play10:05

that data as per their task

play10:08

the next area is our Cloud Computing

play10:10

Services and really it is what is the

play10:13

foundations of the services so whether

play10:16

it be infrastructure as service which is

play10:18

iaas software as service saas and

play10:22

platform as service these will help set

play10:25

up our cloud services in how we're going

play10:28

to use them how people will access them

play10:29

okay when we want to use these

play10:32

and then we got the different types of

play10:34

cloud-based data storage and it

play10:36

basically relates to how it's going to

play10:38

be used and the restrictions in place so

play10:40

will it just be a public Cloud where

play10:42

anyone can access and share data and

play10:44

work on information is it going to be a

play10:46

private Cloud which is more of an

play10:48

internet where actual users need to log

play10:51

in and be specifically a part of an

play10:53

organization okay to view the data

play10:55

within the cloud and then in these days

play10:57

most of these cloud services may be

play10:59

hybrid we can have General customers

play11:01

coming in and viewing our data through

play11:03

our sites but there is a portion within

play11:06

our Cloud that is restricted to only

play11:08

authenticated users and only they can

play11:10

access it to do their work and then we

play11:13

also have non-cloud on-premises okay

play11:14

where we don't use cloud technology it's

play11:16

pretty much just the data we've stored

play11:18

on local hard drives there so Cloud

play11:20

technology can be used in a variety of

play11:21

ways to support our business based on

play11:24

what we are doing

play11:26

Okay the third area then relates to

play11:28

network architecture and infrastructure

play11:30

now we're getting into the technical

play11:31

nitty-gritty of the actual networking

play11:34

systems so the key components of it

play11:36

required the Network Technologies Hub

play11:38

switch routers gateways Bridges all of

play11:41

that okay the on-premise stuff we need

play11:44

in order to connect to the Internet or

play11:47

to our customers okay what

play11:49

infrastructure do we need is it just a

play11:50

router that is connected to our phone

play11:52

line or NBN that gets us to that network

play11:54

connection we need or are we managing a

play11:57

lot of the network ourselves from our

play11:59

businesses location

play12:01

and then how does that connect us to

play12:02

cloud computing

play12:04

this is supported by transmission media

play12:06

okay and I already said NBN just before

play12:09

what is connecting our devices together

play12:11

both locally and through the internet to

play12:13

get to our data that is online so our

play12:16

wide mediums of twisted pair ethernet

play12:18

um our coaxial cabling and then

play12:20

obviously optical fiber which is the

play12:21

main infrastructure in Australia now

play12:23

okay within the roads of the NBN and

play12:26

then our wireless mediums too our

play12:27

microwaves our satellites and radio

play12:29

signals that allow for wider area

play12:32

communication without the need for wires

play12:35

okay and obviously expanding upon the

play12:37

data in order to connect to services

play12:39

that are a lot further away without

play12:41

needing a physical connection

play12:43

the next area is the transmission

play12:45

interference we are using these mediums

play12:48

but what can affect our data while being

play12:51

transmitted so things such as distance

play12:53

between the nodes that are communicating

play12:55

between each other and the topography

play12:57

how specific nodes and mediums are laid

play12:59

out on a network okay the mountain

play13:01

ranges the height and the The Valleys

play13:04

all of that will impact on how the data

play13:06

is sent so there are physical and

play13:09

environmental barriers that will also

play13:11

include too so just physical barriers

play13:13

could be transmitting high above a

play13:15

Clifford trees being in the way or

play13:18

specific buildings that have been built

play13:19

okay that data needs to be transmitted

play13:22

through okay unfortunately Landscapes

play13:24

aren't all flat we have houses we have

play13:26

nature all of that is impacting on the

play13:29

actual data being sent between our

play13:31

devices through our transmission mediums

play13:33

and that obviously needs to be factored

play13:35

into our Network infrastructure

play13:37

okay we want to improve the data flow in

play13:40

a sense so based on what we just said

play13:42

about interference we need to think of

play13:44

our antenna power our actual traffic

play13:47

filtering by how many users are

play13:49

accessing our Network and then how is

play13:51

that being dispersed among our

play13:53

technologies that we're using on our

play13:55

Network to support that flow and give

play13:57

users a good experience interacting and

play13:59

getting to the data they need and

play14:01

getting it back to them as information

play14:03

and the things that can support that is

play14:05

flow scheduling and traffic monitoring

play14:07

which obviously a network administrator

play14:09

needs to use but we are also talking

play14:11

about Smart Systems too and we have ai

play14:13

supporting this as well that is

play14:15

monitoring this and then moving users

play14:17

down different Pathways to support their

play14:19

work on a network

play14:21

okay once again we're talking about

play14:23

graphene Network Theory but how can we

play14:25

optimize this for users okay so we said

play14:29

that social media needs this stuff but

play14:31

we want to optimize it if our Enterprise

play14:32

is going to maximize its success so the

play14:36

adjacency and centrality of the actual

play14:38

Network how are people getting to the

play14:40

data they want how is that information

play14:43

flowing and being shared through the

play14:46

actual graph Theory

play14:48

okay and how it's all set up how does it

play14:51

give users that feeling of connectedness

play14:53

to their data okay and allowing them to

play14:55

expand through those social networks and

play14:57

then what are the things that actually

play14:59

weighted on these graphs okay so

play15:01

obviously an area that needs to be

play15:03

optimized for an Enterprise to maximize

play15:05

their success

play15:06

okay and then we've got to talk about

play15:08

specific devices that support the

play15:10

Internet of Things So once again getting

play15:12

users onto the internet and knowing

play15:15

specific protocols HTTP https

play15:19

um that's incorporates SSL SMTP all of

play15:22

that that is required to access certain

play15:25

systems and services online

play15:28

okay we then talk about machine learning

play15:31

ml in conjunction with the internet of

play15:34

things as I said before with managing

play15:36

networks a lot of these are run by smart

play15:39

AI systems that will help map users on a

play15:42

network through specific routes of

play15:44

mediums and devices to control the flow

play15:47

of a network for their user experience

play15:49

on the network so they don't get too

play15:51

much lag or get dropped off an actual

play15:52

platform okay ml the machine learning is

play15:56

data driven so it will read numbers of

play15:59

traffic and bits per second and

play16:02

bottlenecking and bandwidth and all of

play16:04

that and try to control this traffic

play16:06

okay it will report any types of

play16:09

diagnoses going place on the network and

play16:11

then try to respond to this at this

play16:14

stage we still want a physical human

play16:16

network administrator there to support

play16:18

the AI managing it with its machine

play16:20

learning okay but a key area here is

play16:22

automation this these types of tasks are

play16:25

being taken over by AI because they can

play16:29

it is numbers based they can make the

play16:32

diagnostic decisions and respond to them

play16:34

okay and they can operate 24 hours where

play16:37

humans traditionally can't so we're

play16:39

developing Smart Systems to allow these

play16:41

Network systems to function for users

play16:44

all over the world and control the flows

play16:46

of traffic

play16:47

okay we then and as mentioned before

play16:49

need to focus on network access and

play16:51

security now we already know that we

play16:53

need logins and passwords to get onto

play16:55

the internet and that controls users

play16:57

allowing them to identify who they are

play16:59

and what network rights they have to

play17:01

access information okay and that

play17:04

obviously passwords involves you typing

play17:05

in a string of characters but then these

play17:08

are also replaced with things such as

play17:09

Biometrics okay and you see it on your

play17:11

phone your phone these days you used to

play17:13

have to put in a PIN code and you still

play17:14

do sometimes but it can also just do

play17:16

facial recognitions facial recognition

play17:19

thumb print recognition that's

play17:20

Biometrics it's reading your biology in

play17:22

order to gain access into a system

play17:25

we also have a thing known as captcha

play17:27

okay and that capture that's used for

play17:30

detecting Bots that's when you log into

play17:32

a website with your password then you

play17:33

might get a prompt come on screen of an

play17:35

image and it might say what does this

play17:37

word say and it might be in a more

play17:39

calligraphy style of writing with a

play17:41

grainness behind it and robots can't

play17:44

read that because it's not in an OCR

play17:46

type of character that they can read off

play17:49

screen so only humans can interpret that

play17:51

and it keeps the Bots out okay same when

play17:54

you've got to click on the different

play17:55

squares on screen saying where is the

play17:58

traffic lights or where are the

play17:59

mountains okay robots can't distinguish

play18:01

that from a multiple panel of images but

play18:04

humans can so it ensures that only

play18:05

humans are getting into the system

play18:07

and then um what also might be on our

play18:10

systems too is that TPM The Trusted

play18:12

platform modules which is a chip that is

play18:15

used to support security measures so

play18:18

support the booting of systems making

play18:20

sure they are booting in a secure

play18:21

location as well as checking the

play18:23

signatures of users their digital

play18:25

signatures that are coming from trusted

play18:27

locations okay TPM supports that and

play18:30

then finally software updates and you

play18:33

guys are updating software on your

play18:35

mobile phones and on your computers

play18:36

software updates don't just uh update

play18:40

for uh compatibility and efficiency they

play18:44

also update for security okay so when

play18:46

you update your software it could be new

play18:48

protections are being put in place on

play18:50

your systems through the OS to protect

play18:52

you from malicious software and

play18:55

unauthorized users because they've

play18:57

picked up a pattern and then obviously

play18:59

um the platforms are trying to defend

play19:01

their users from this and they'll push

play19:03

that stuff out through software updates

play19:06

and then we've got the use of

play19:08

intelligent home networks okay and um

play19:10

you know we've seen things such as Alexa

play19:13

where we can speak out loud commands and

play19:16

things will happen in our home switching

play19:18

lights on and off the ability to check

play19:20

your mobile phone to see internal

play19:22

security cameras with you on a house so

play19:23

this internal intelligent home networks

play19:26

that are being established where Digital

play19:28

Data is allowing us to do a lot of

play19:30

things from centralized devices from our

play19:33

mobile phone from our computers and we

play19:35

can control functions within our house

play19:37

wow we're living in the future now

play19:38

aren't we okay so the final area of this

play19:43

unit is creating a basic Network okay so

play19:46

obviously a lot of the creativity here

play19:48

is happening in this portion of the unit

play19:50

so we want to design and model a network

play19:54

we are setting up some sort of network

play19:57

okay and it might be fully physical

play19:59

we're designing it we're designing it's

play20:01

a logic what nodes are we using to

play20:03

connect what devices and illustrating

play20:05

what mediums are we using to connect it

play20:07

all together

play20:09

we are going to apply project management

play20:11

Tools in order to do this okay so what

play20:14

tools can we use so the use of hardware

play20:16

and software to illustrate this here and

play20:19

map it out and how we're going to set up

play20:21

our Network there

play20:22

okay we've got to have a bit of

play20:25

knowledge on how to configure network

play20:27

devices and that can be embedded into an

play20:29

assessment so The Logical naming of

play20:31

specific devices and then later on

play20:34

updating these devices with their naming

play20:36

with their properties and what they're

play20:38

connecting with how to configure

play20:40

specific protocols on a network and

play20:43

configuring our actual devices for

play20:45

connection to the Internet so that stuff

play20:48

is potentially accessible within this

play20:50

unit in relation to the preliminary

play20:52

course and your knowledge in Enterprise

play20:54

computing

play20:55

okay also the implementation of security

play20:58

protocols that we just mentioned before

play21:00

the setting up of passwords the setting

play21:03

up of potentially Biometrics if you've

play21:05

got cameras enabled and all of that what

play21:07

things need to be done in order to

play21:09

protect users on a network so a working

play21:10

knowledge of how to do that

play21:13

we want to be able to optimize a

play21:15

performance on a network so knowing how

play21:18

to improve a bandwidth so mapping out

play21:21

the routing of pathways on a network the

play21:23

actual mediums we are using okay to

play21:26

distribute data so as we know optic

play21:28

fiber is the best wide medium but it's

play21:30

expensive the actual nodes that are at

play21:32

our Central nodes so our routers and

play21:35

switches that might be centralized how

play21:36

have we placed them out of network and

play21:38

has our Network traffic mapped through

play21:40

that all of that helps improve bandwidth

play21:43

but then also the other side of it too

play21:45

of updating drivers and firmware okay so

play21:48

pushing out updates to our devices which

play21:51

manufacturers do for phones and

play21:52

computers all the time okay allowing the

play21:55

actual software to be updated so it can

play21:57

continue to be optimized and compatible

play22:00

with new technology out there and then

play22:02

the final area of this unit okay

play22:04

evaluating the transmission it okay how

play22:08

good is it can it be improved how can we

play22:10

evaluate the I.T so looking at when data

play22:13

is unsecured what can we do about it

play22:15

there to ensure that it gets secured the

play22:17

use of encryption the ability to

play22:19

scramble data prior to transmission so

play22:21

that when it is transmitted okay if it

play22:23

does get intercepted it won't make sense

play22:25

it can't be read but ensuring that when

play22:27

the user gets it therein they have the

play22:29

appropriate decryption key okay to

play22:31

translate that data back into readable

play22:33

form

play22:34

okay so that comes along with it so they

play22:37

can interpret the data there and then

play22:38

finally just ensuring that our

play22:40

infrastructure is set up in a way that

play22:42

is logical and allows for data to flow

play22:44

through our Network logically and

play22:46

efficient so I hope this video has given

play22:48

you an understanding of the network

play22:50

systems and social Computing unit of the

play22:53

Enterprise Computing preliminary course

play22:55

it is the most technologically heavy

play22:58

Topic in relation to understanding

play23:00

content there is a lot here and as you

play23:03

can see this mind map it's a big mess

play23:05

but it is all terminology so learning

play23:08

this terminology here and understanding

play23:09

the relationship between terminology

play23:11

will allow you to be successful at

play23:13

understanding this unit okay and

play23:15

remember we're not just learning about

play23:17

Network Technology and infrastructure

play23:18

but how it is used to support social

play23:22

networking okay the fact that it allows

play23:25

for the efficient interaction between

play23:27

different users globally in many cases

play23:29

with these Enterprise systems to allow

play23:31

them to share ideas and have a pleasant

play23:34

online experience through their

play23:36

technology so no lag and they can get to

play23:38

the data they want and it loads quickly

play23:40

okay based on the efficient setup of

play23:43

these Network systems