Tuesday, October 26, 2010

5.2 Extranet Diagram


My company would use the extranet to communicate with our supplier to get the materials when needed. We would set up a firewall so that other people outside of the company cannot access our VPN. The VPN would protect our information from other people who can access the internet. we would then be able to communicate with our suppliers without any outside interference.

5.1 B2C website critique

Website:  Pizzahut.com

     Pizzahut.com offers customers the opportunity to create and purchase their pizza products online.  Pizza Hut uses a Click-and-Mortar business strategy to conduct their business. This means that they have a physical store and a offer purchasing through their website. 

Rules and Ratings: 
1.  The website offers something unique - (3/5)
     Pizza Hut's signiture pizzas are unique in their own, but there are other online ordering options.

2. Website is aesthetically pleasing - (5/5)
    Great pictures and see the pizza while you build it.

3. Easy to interface - (5/5)
    Website is very easy to use and appeals to customers of all ages

4. Motivates people to visit - (4/5)
   The only thing I could think of that would motivate people to come back to the site is its convenient and fast.

5. Advertise presence on the web - (3/5)
    Pizza Hut has over 2100 other sites that link into it.

6. Learn something from the website - (2/5)
   There isn't too much to learn from Pizzahut.com.

4.4 Entity Relationship Diagram

This Entity Relationship Diagram shows the attributes of a particular invoice from our company.  It shows the connection between our customer and his purchase on that date.  The different attributes related to this customer is Name, Address, etc.  The attritbute types are name, quantity of order, price of order, place of residence and sex, which we keep a record of for future references and to build our networking and relationships. All these data types are stored for our records and is also included inside of our database table.

4.3 Packet-Switching


This image shows how the router sends off data from A and B converts it into packets and sends it out to C and D. The router uses the client to request the work and the server does all the work. While requesting the work the router creates a peer network between each of the routers. The IP then determines the size of the packets. TCP then checks the packets for errors or duplicates. The IP then delivers the packets to the appropriate routers.  Everything explained in the diagram is packet-switching technology.

Friday, October 22, 2010

5.3 Intranet Achitectural Diagram


    This diagram shows how an intranet works within a corporation.  Inside the "intranet" block, the client  inside the network sends information through the corporate server, through the firewall, and over the internet to the client outside the LAN.  The client can now see the information sent using an intranet.

Friday, October 1, 2010

4.2 A Basic Network

This graph displays a Client-Server Relationship or a Server Centric Relationship.  The connection you see is the transmission medium.  Bandwidth is the amount of data that can be sent over a connection.  The connection can be through wireless media or cable media.  There are protocols, or rules of the relationship, to make sure everything runs smoothly.

4.1 IFS H/W Infrastructure


This image shows how we use input technologies, such as keyboards and mouses, to input letters into the system unit.  The unit then uses processing technologies to convert the letters into binary code, or machine language, so that the CPU can then interpret it.  The CPU uses bytes, which are composed of 8 bits, to understand each letter.  The ALU then calculates the bits into ASCII, which is the language that we understand.  Then the results of the calculations are stored in the control unit and are visible through output technologies.