Swimlanes must be arranged in a logical order. The swimlane activity diagram clearly states who does what in a process. Now let's understand the term " Swimlanes." They are boundaries or borderlines which separate an organization's activities from the activities of other organizations. Activity diagrams are also used to visually represent a complex process, such as an algorithm or workflow. In a use case diagram, they can also describe the steps. During the early design phase, activity diagrams are especially beneficial. Activity diagrams are frequently employed in business process modeling. Activity diagram for intranet chatting system series#Like a flowchart or a data flow diagram, an activity diagram visually depicts a system's series of actions or control flow. Let's understand activity diagrams first. They can therefore be accessed by authorized members from different physical locations.1. Often their functions are similar to those provided by an intranet: information and file sharing, collaboration tools, discussion boards, etc.īoth intranets and extranets run on the same kind of infrastructure as the Internet, and use the same protocols. They are typically used to safely and securely share information with clients and stakeholders who work closely with a business. Portals for performing business administration tasks, and collaboration tools like wikis, discussion boards, and messaging systems.Įxtranets are very similar to Intranets, except they open all or part of a private network to allow sharing and collaboration with other organizations. They are commonly used to provide a portal for members to securely access shared resources, collaborate and communicate.įor example, an organization's intranet might host web pages for sharing department or team information, shared drives for managing key documents and files, Intranets are private networks that are restricted to members of a particular organization. The Internet consists of this whole infrastructure of networks. So the message from our network is carried through the network of ISP networks to the destination network. An ISP is a company that manages some special routers that are all linked together and can also access other ISPs' routers. To do that, we will connect our network to an Internet Service Provider (ISP). The next step is to send the messages from our network to the network we want to reach. So we are connected to the telephone infrastructure. This modem turns the information from our network into information manageable by the telephone infrastructure and vice versa. To connect our network to the telephone infrastructure, we need a special piece of equipment called a modem. The telephone infrastructure already connects your house with anyone in the world so it is the perfect wire we need. But it's not really possible to set cables up between your house and the rest of the world, so how can you handle this? Well, there are already cables linked to your house, for example, electric power and telephone. There are other networks out there: your friends, your neighbors, anyone can have their own network of computers. We built that network for our own purposes. Such a network comes very close to what we call the Internet, but we're missing something. But what about connecting hundreds, thousands, billions of computers? Of course a single router can't scale that far, but, if you read carefully, we said that a router is a computer like any other, so what keeps us from connecting two routers together? Nothing, so let's do that.īy connecting computers to routers, then routers to routers, we are able to scale infinitely.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |