Presentation is loading. Please wait.

Presentation is loading. Please wait.

Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique.

Similar presentations


Presentation on theme: "Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique."— Presentation transcript:

1 Access Method

2 “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique key. The key serves as a security token for access to the locked area; only persons having the correct key can open the lock and gain access. Lock and Key Security

3 Those are often used in conjunction with staff ad visitor identification systems. Ins teats of using key to access area of building, the system relies on personnel using swap cared or dongles as key. For example, using swipe card to get access on IT room. Sign In and Sign Out

4 “ ” The technology of biometrics is constantly being developed and refined. Common technologies in current use are finger print recognition, retinal scans and voice recognition. Biometrics

5 “ ” Many organisation use visitor pass as a method of entry, with security and reception personnel checking identification in entry. Visitor card are by their nature temporary and indicate that the visitors has limited access right.. Visitor Passes

6 “ ” Other Access methods Pin Lock. Fob Key. QI and Barcode scanner. Password. Magnetic Card.

7 WORK STATION

8 A workstation is simply a desktop computer terminal in which itis a lot more powerful than a personal computer. It has been set up and wired for one specific area/task. It is still connected to the network as well. It has the specific tools required for the tasks it’s assigned too that some other computers cannot complete.

9 Server A server can either be a computer or device on a network which is used to manage network resources.

10 There are multiple types of servers, for example: File server File server – a server that is used as a storage device. Anyone who is connected to the network will have access to the files in the server.

11 Web server Web server – a web server displays the content of the server by loading a file from a disk and serving it across the network to the requested person’s web browser. This exchange of information is controlled by the browser and the servers communicate using HTTP (Hypertext Transfer Protocol).

12 FTP server – FTP server – FTP (File Transfer Protocol) is used to transfer files between computers securely.

13 Servers can be a separate dedicated device or can be hosted on a computer. Having a dedicated device for a server is a major advantage over a computer server because the computer may get slowed down. Also, a dedicated server usually has more storage space compared to a computer as computers will have other non-server related files.

14 A dedicated server is similar to a computer as it contains RAM, a CPU and hard drives. However, dedicated servers are designed to process heavy-duty back-end tasks. This means that they are not suited to run normal desktop workload, an example of this is graphic heavy applications.

15 The CPU is a server is similar to that of a desktop. A server will usually have larger cache which means that data can be accessed quicker. Single core CPUs are sufficient for a small server which contains around 10 users. However, an upgrade to a dual core or quad core can greatly increase the processing power of the system.

16 Network Card

17 Network card

18 A network card is a kind of computer hardware which is an electronic device that connects a computer to a computer network. Mostly is the LAN to connects the network. Nowadays, majority of computers includes network cards to allow a computer to interchange data thru the network. Network cards contain a appropriate protocol. The physical layer and the data link layer are the first two layers of the OSI model and also network cards frequently tool it. Many network cards operate Ethernet on current days.

19 Network card for wireless networking Least network cards do not operate a cable to connect to the network. People usually use wireless lan or wifi for a long distance. For over a short distance, bluetooth will be suitable for it.

20 NIC Similarly recognised as a NIC (Network Interface Card ), these cards connect straight into the motherboard of your computer and feature an outside network socket. This allows the computer to connect to a network via a network cable. Traditionally these network cards use the PCI slot on a motherboard, with fresher cards consuming a PCIe interface. Progressive features contain two or more network ports for specific applications. Note that network adaptors that convert a USB port into a network interface are also obtainable.

21 TP-Link 300Mbps Wireless N PCI Adapter (TL-WN851ND) This PCI card employs MIMO technology and has two external detachable omni directional antennas providing excellent wireless performance.


Download ppt "Access Method. “ ” A key is usually intended to operate one specific lock or a small number of locks that are keyed alike, so each lock requires a unique."

Similar presentations


Ads by Google