Internet protocols and network hardware

Size: px
Start display at page:

Download "Internet protocols and network hardware"

Transcription

1

2 Internet protocols and network hardware Protocols are sets of rules or standards that are used for communication. They work together to help devices to communicate. The rules apply to different layers used for communication purposes. A network protocol is a standard method for transmitting data from one computer to another.

3 Protocols/Services Physical layer-data is transmitted bit by bit from one device to another e.g on modems Data Link Layer: It acts upon requests for services from the physical and network layer e.g wifi and ethernet Network/Internet layer: It is responsible for forwarding packets and routing e.g internet protocol Transport layer: It divides data to be transmitted and adds the address of the source and destination address e.g UDP and TCP Application: It consists of protocols that use the transport layer to deliver services to the network or Internet layer.

4 Ethernet It refers to a basic set of protocols used to operate a local area network(lan). It is made up of the following: Devices that send and receive data such as PCs, printers and servers. Network devices such as hubs, switches and routers. Medium connecting devices such as twisted pair, fibre optic and coaxial cables.

5 TCP/IP Transmission Control Protocol(TCP) ensures that data is delivered correctly Internet Protocol(IP) ensures that the data is delivered to the correct address. An IP address consists of 4 bytes which are given in decimal form Techniques such as subnetting and local addressing are used to increase the number of addresses

6 TCP/IP TCP ensures that the correct number of packets reach the destination and that there are no duplicates as a result of retransmission. Any duplicates are deleted Each packet contains a destination address, source address and a sequence number which will be used for assembling the packets at the destination. It is used on the www, s and for file transfer.

7 Handshaking It refers to the exchange of signals between devices to establish a communication channel eg the rate of transfer, parity checking and interrupts to be used. Parity can be odd or even. It refers to the total number of bits within a transmitted message. The number of bits is checked to make sure that there are no errors in transmission

8 UDP The UDP is a basic protocol. It is considered to be a connectionless service. No handshaking is required. It has no congestion control mechanisms. It is unreliable because packets of data may fail to reach the destination. It is still better suited for real-time transmissions e.g video on demand systems

9 FTP FTP is used for the transfer of files when downloading and uploading files. FTP makes use of client-server systems. Clients have to log on in order to download files. SSL and SSH are used to enable encryption of files during transmission.

10 HTTP HTTP is the protocol used for transmitting data across the internet/intranets. It uses a client-server system in which a browser makes a request using a URL. The URL is converted to an IP address. The server will then provide the required resources

11 Telnet Telnet is a network protocol used on the internet or within local area networks. It is used to enable a user to gain access to another computer and use the resources provided there. It works at the same layer as FTP. The remote compter should have telnet client/server software. Telnet has major security problems which has decreased its popularity. It is still used for network diagnostics and troubleshooting problems.

12 SSH It allows data to be shared between two computers. It allows users to log in remotely and also uses encryption. It uses uses public-key authentication. Its main purpose is to log into a machine remotely and execute commands. It is therefore used by administrators.

13 Network Hardware

14 Devices used in a computer network

15 Network Hub A hub is a devices that has a number of network devices or computers connected to it. When a hub receives data packets it broadcasts them to all computers on that network including itself. It does not read the data packets. Hubs that amplify the signal are called active hubs and those that do not amplify the signal are passive hubs.

16 Switches A switch is more advanced than a hub. When hubs are used congestion may occur when several computers are transmitting data at the same time. The same packet of data is send to all the ports on the hub. In a switch the data from any computer is sent directly to its destination port without congesting the other ports unnecessarily. A switch uses address tables to find the correct port to send data packets. It stores the Media Access Control(MAC) address. It is used for connecting local computers and devices.

17 Routers A router enables data to be sent transmitted between different networks e.g from a LAN to a WAN. It provides facilities for protocol conversion. It may also have a firewall installed. The router inspects packets of data and checks the IP address so that it can forward it to the correct network. The first part of an IP address is the network address which is then used for routing.

18 Dedicated cabling Twisted pair: two conducting wires twisted around each other which reduces magnetic interference and data loss Coaxial: A conducting wire surrounded by a plastic non-conducting layer, then conducting material and a PVC Fibre optic cable: Optic fibres which are individually coated by a plastic resin and sheathed in a plastic layer Networks that require fast speeds use twisted pair and fibre optic cables.

19 Servers File Servers- Store user data. Users must log on to use the servers. Application Server-Distribute application software to client machines e.g the isams servers Other servers include print servers, servers, proxy servers etc One computer can be used as multiple servers. File servers make use of groups and access rights in order to manage security.

20 Network cards A network interface card is a card that fits onto a computer s motherboard. A network interface card may allow both wired and wireless communication.

21 Network Types Local Area Networks- These are house within a building or the same geographical area e.g schools, offices etc The networks normally use switches/hubs The switch is in turn connected to a broadband modem in order to connect to the internet.

22 Network Topologies There are 3 main types of network topologies: The Ring Network The Bus Network The Star Network

23 Network Topologies The Ring Network: Computers are connected together to form a ring shape so that none of them is more important than any of the others.

24 Network Topologies The Ring Network: Advantages: They are cheap to expand. The data flows around the network in one direction so it is fast. It performs better than a star network when traffic is heavy. There is no reliance on a central computer. Disadvantages: If there are a lot of users on the network, it could slow down as all the data is sent along a single line. If one computer in the ring stops working, the whole network stops. Adding a new computer may cause disruptions to the network.

25 Network Topologies The Bus (or line) Network: Computers are connected like bus stops on a main road. None of them is more important than any of the others. The spine has cables which connect to each network.

26 Network Topologies The Bus (Line) Network: Advantages: It is cheap as it uses the least amount of cable. More computers can be added without disruption. If one of the devices fails the network will continue to function as normal No hubs/switches are required Disadvantages: With a lot of users, the network will be slow as data has to travel through the same central cable. Failure of the central cable will stop the network from working. It is difficult to troubleahoot when the whole network breaks down.

27 Network Topologies The Star Network: Computers are connected like a star to a central hub/switch/serve r/router.

28 Network Topologies The Star Network: Advantages: If a cable fails, it will only affect one workstation. More computers can be added without disruption. Disadvantages: It is more expensive as it uses the most cabling. Failure of the central computer/network device will stop the network from working.

29 Hybrid Networks It is made up of star networks where each hub/switch is connected to one backbone. The backbone cable forms a bus-type network. The switches may also connect to each other forming multiple interconnected star networks.

30 Network Topologies The Hybrid Network: Advantages: It employs the advantages of a star network and bus network More computers can be added without disruption. Disadvantages: Sections can stop working if a hub/switch breaks down. The whole network will not work if there is a fault in the spine.

31 Intranets Local Area Networks are used for creating intranets. An intranet can be defined as a private company network that makes use of internet technology. It is for the use of members of that organisation. Users are given usernames and passwords Dedicated telecommunication links may also be used for linking different locations such as fibre optic cable and telephone lines. It uses internet protocols.

32 Uses of Intranets Providing local Video conferences Sharing information Fast access to documents and statistics Sharing diaries Organising meetings Discussion forums Policy information

33 Local and Business Networks Intranets are very secure and businesses use them put up information that employees need to access. Intranets reduce paper costs Lan-based reduces the cost of printing An ISP can be used for providing the service

34 WLANs A WLAN uses either spread spectrum( a signal with an initially low bandwidth is spread to have a wider bandwidth) radio waves or infrared signals for communication. Computers or devices must have WNICs Devices can be added easily to the network problems with the WLANs include security issues, interference and poor speeds

35 Wi-fi Wifi is short for wireless fidelity. Data is transmitted into radio signals and then transmitted. The wireless router decodes the signal. The following hardware devices are used: Wireless Network Cards Wireless Routers Wireless Access Points

36 Wireless Network Cards It transmits data as radio waves. Most laptops a fitted with WNICs by manufacturers Desktop computers can also have these fitted Most mobile devices have wireless NICs

37 Wireless Router It converts data signals into radio signals as well as radio signals back to data signals. Features include: Wifi protected access(wpa), a complexi encryption system MAC address filtering and IP address filtering Invisible mode

38 Wireless Access Points They are used for connecting wireless devices to a wired network. They cover a limited area and number of computers. List Devices that have wireless capabilities:

39 Methods of Data transmission Spread spectrum radio waves are used for transmitting data by increasing its bandwidth.

40 Methods of Data transmission contd. The same random number generators are used by the receiver and sender to generate random frequencies and stay synchronised. It allows computers and other devices to communicate through walls. Another method is to use infrared signals. As it pulses on and off it willl be transmitting data in bits. It is secure because it cannot be used across walls. There is also no interference. The main disadvantage of the system is the lack of range.

41 WPAN Pg Don t have to do network security.

42 Network Security Network security is there to ensure that unauthorised users do not view data or understand it if they manage to intercept/access the data.

43 Physical Security This prevents users from gaining physical access to computers. This can be achieved by: -Securing Computer Rooms- All doors and windows should be locked when computers are not in use. Burglar alarms may also be used. Some Servers are lockable. CCTVs can also be used for deterring thieves. Pass cards can be used for giving users different times and levels of access. -Security Guards for patrolling and responding to alarms.

44 Software Security Most computer threats come from hackers who access computer systems remotely. The following methods may be used for preventing access: Firewall Encryption Digital Certification Authentication Techniques Anti-virus Software

45 Firewalls A firewall can be in the form of hardware or software or a combination of both. Firewalls prevent unwanted network traffic from accessing a computer network. Packets of data are inspected and if their ip address/network address is not wanted then they are prevented from accessing the computer network. Domains, words, phrases can be filtered out. Packets with these phrases are prevented from entering the system. At school we have a firewall that does this.

46 Encryption Encryption refers to encoding data by scrambling or encoding it. This is for preveting hackers from understanding data sfter intercepting it. The sending computer uses an encryption key for encoding data. The receiving computer has a decryption key for decoding it. Public key/private key encryption is used. The sender computer uses the public key for encrypting data and the receiver will use a private key for decoding it.

47 Digital Certification Digital certificates are issued by a certification authority. The authority certifies that both receiving and sending computers are who they say they are. Once certified each one may get the public key of the other.

48 Authentication Techniques This can be achieved by using a for example a username and password, card and pin code, biometrics such as facial recognition and finger print scanners.

49 Anti-virus software It is used to find viruses and remove them. The anti-virus software has a database to remove known viruses. One way is to scan the hard disk or monitor ports for suspicious behaviour. Actions taken by viruses include the following: -Repair the files -Quarantine the file by not allowing any program to access it. -Delete the file Anti-virus software must be updated regularly. Antivirus definitions are becoming longer

50 Other Types Of Viruses Trojan horses Worms

51 User ID These are used for identifying users and must match a password in the database. Users can also be grouped and be given privileges. Users are given a limited number of attempts when logging in usually three attempts Good password policies must be maintained such as?

52 Chip and PIN cards Chip and pin card readers are slotted into keyboards

53 Anti-spam This is software for rejecting unsolicited s

54 Anti-pop-up software Pop up blockers are usually incorporated into the browser. It identifies part of html code that will open another window and prevents it from being executed.

55 Anti-spyware software Spyware software allows people to access and control your computer. It allows pop ups, changes browser settings. In its worst form it searches for user names and passwords. Anti-spyware software searches the hard disk for known spyware software and removes it. It needs constant updating. Key logging software may also be used to detect the keys presssed.

56 Wired Equivalent Privacy of information(wep) and Wi-fi Protected Access(WPA) WEP is used for encrypting data on wireless networks but uses a weak key WPA uses stronger encryption keys and also includes user authentication

57 Electronic conferencing Hardware Requirements Electronic conferencing requires additional hardware such as microphones, earphones/speakers, webcams including in some cases phone handsets.

58 Software Requirements Conference Software VOIP software Instant messaging

59 Coference Software Compression Decompression software is used to reduce the size of the packets of data transmitted. The packets of data must be transmitted in real time. Echo cancellation software is used for keeping communication synchronised VOIP software may also be used for conducting telephone conferences.

60 VOIP Software It is cheaper than using conventional telephone lines. The software coverts the speech into digital data and compresses the audio data so that it can be transmitted in real time.

61 Instant Messaging It is the exchange of text messages across the internet in real time. Businesses and Institutions can also make use of IM on Local Area Networks.

62 Video Conferencing Advantages Meetings can be called at short notice No time spend on travelling No money spend on travelling No money spend on booking facilities It is environmentally friendly Meetings are kept shorter It is safer No payments for travelling time

63 Video Conferencing Disadvantages Confidential documents may need to be seen in their original form There is no direct eye contact Delegates may be put off by the camera Quality of the video depends on the bandwidth Transmission breakdowns may occur Environmental factors such as power cuts may also affect the video conference

64 Phone Conference Advantages Cheaper than a video conference because there are no webcams ot large screens Less bandwidth No need to worry about appearance

65 Phone Conference Disadvantages Documents cannot be seen Facial expressions cannot be seen Number of participants is limited Power cuts may interrup services

66 Instant messaging Advantages It is instant Saves time and money when resolving problems Easy to use

67 Instant messaging Disadvantages Users may be exposed to dangerous people It may lead to obescity It is disruprive in workplaces when used for socialising It may also pose a security risk when files are sent.

68 Uses Of Electronic Conferencing Businesses Schools Research Meetings

What is a Network? A connection of two or more computers so that they can share resources.

What is a Network? A connection of two or more computers so that they can share resources. NETWORKS What is a Network? A connection of two or more computers so that they can share resources. Network Benefits Remote access Sharing files & resources Communication Cost Maintenance Communication

More information

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance)

Computer Networks. Cables Radio signals (wireless/wifi) Telephone lines Satellite links (Long distance) COMPUTER NETWORKS Computer Networks A network is two or more computers connected together to allow them to share information and resources. Network connections are created by Cables Radio signals (wireless/wifi)

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS

Introduction to Computer Networks INTRODUCTION TO COMPUTER NETWORKS INTRODUCTION TO COMPUTER NETWORKS Computer Networks Computer network connects two or more autonomous computers. The computers can be geographically located anywhere. LAN, MAN & WAN Network in small geographical

More information

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security Chapter Topics Part 1 Behind the Scenes: Networking and Security CS10001 Computer Literacy Business Networks Network Advantages Client/Server Networks Network Classifications Servers Toplogies Chapter

More information

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall 1 All rights reserved. No part of this

More information

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES

CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES CHAPTER 8 NETWORKS: COMMUNICATING AND SHARING RESOURCES This chapter focuses on the fundamentals of computer networking. As students continue on their journey toward computer fluency, they will need to

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Local Area Networks Client/server networks o Made up of one or more file servers and clients (any type of computer) o Client software enables requests to

More information

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Network Basics Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT E-mail :Agha.m@mcit.gov.af Cell:0700148122 After this lesson,you will be able to : Define

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Chapter 5 Local Area Networks. Computer Concepts 2013

Chapter 5 Local Area Networks. Computer Concepts 2013 Chapter 5 Local Area Networks Computer Concepts 2013 5 Chapter Contents Section A: Network Building Blocks Section B: Wired and Wireless Technologies Section C: Network Setup Section D: Sharing Files Section

More information

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices Technology in Action Chapter 7 Networking: Connecting Computing Devices 1 2 Chapter Topics Networking fundamentals Network architecture Network components Peer-to-peer networks Ethernet networks Power-line

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Dr./ Ahmed Mohamed Rabie Sayed

Dr./ Ahmed Mohamed Rabie Sayed 1 Dr./ Ahmed Mohamed Rabie Sayed 2 A network is a group of two or more computer systems linked together to exchange data and share resources, including expensive peripherals. 3 A local area network (LAN)

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

Chapter 9. Introduction. Communications

Chapter 9. Introduction. Communications Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. 1 Introduction Page 247 Cell phones and other wireless technologies are allowing

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 8 Networking Essentials A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e Chapter 8 Networking Essentials Objectives Learn about the protocols and standards Windows uses for networking Learn how to connect

More information

Chapter 11: Networks

Chapter 11: Networks Chapter 11: Networks Devices in a Small Network Small Network A small network can comprise a few users, one router, one switch. A Typical Small Network Topology looks like this: Device Selection Factors

More information

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them

ICT Theory Revision Presentation - Networks and the effects of using them 4.1 Networks. Chapter 4: Networks and the effects of using them Understand how a router works and its purpose Understand the use of other common network devices, including: network interface cards, hubs, bridges, switches, modems Understand the use of WiFi and Bluetooth

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e Chapter 10 Networking Essentials Objectives Learn about hardware devices used for networking Learn about the different types of networks

More information

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Chapter 12 Behind the Scenes: Networking and Security 1 Networking Advantages Networks Increase productivity Enable the sharing of hardware resources Facilitate knowledge sharing Enable

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

Networks. Computer Technology

Networks. Computer Technology Networks Computer Technology Network Two or more computers and other devices (printers or scanners) that are connected, for the purpose of sharing data and programs Advantages of Networks Communication

More information

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Lecture #25: Networks and Communications. Communication and Networks. What will we learn? Lecture #25: Networks and Communications Communication and Networks What will we learn? How a communications system works What a network is What networks used for What network operating systems do What

More information

Discovering Computers Chapter 9 Communications and Networks

Discovering Computers Chapter 9 Communications and Networks Discovering Computers 2009 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Describe

More information

It is the process of sharing data, programs, and information between two or more computers.

It is the process of sharing data, programs, and information between two or more computers. 1 Communications It is the process of sharing data, programs, and information between two or more computers. Numerous applications depend on communication systems: E-mail Instant messaging (IM) Internet

More information

Technology in Action

Technology in Action Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

COMPONENTS OF DATA COMMUNICATION

COMPONENTS OF DATA COMMUNICATION COMPONENTS OF DATA COMMUNICATION ANALOG AND DIGITAL TRANSMISSION An analog signal is one that is continuous with respect to time and may take on any value within a given range of values. Eg Human voice.

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK

OSI Model. Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK OSI Model Teran Subasinghe MBCS, Bsc.(Hons) in Computer Science - University of Greenwich, UK What is OSI Model? Open Systems Interconnection Reference Model Developed in 1984 by the International Standards

More information

Review: Networking Fall Final

Review: Networking Fall Final Review: Networking Fall Final Question 1 of 43 You have implemented a network where each device provides shared files with all other devices on the network. What type of network do you have? Peer to peer

More information

COMPUTER NETWORKING. Terminology of Network:

COMPUTER NETWORKING. Terminology of Network: COMPUTER NETWORKING Network: A computer network is a collection of interconnected computers. Two computers are said to be interconnected if they are capable of sharing hardware, software and exchanging

More information

The ULTIMATE GUIDE. to Buying Networking Equipment

The ULTIMATE GUIDE. to Buying Networking Equipment The ULTIMATE GUIDE to Buying Networking Equipment 1 Networks allow people to share information, resources and devices. Built with a combination of computer hardware and software,networks vary in their

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

Chapter 9 Introduction to Networks

Chapter 9 Introduction to Networks Chapter 9 Introduction to Networks 9.1 Uses of a network Networks are used in many situations. We can see networks in places like offices, airports and factories. In fact we use networks in many situations

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

Brief Summary of the Chapter: CHAPTER 1 NETWORKING AND OPEN STANDARDS In this chapter we are going to study about computer Networks, associated terminology and related concept along with network devices.

More information

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer Q1 What is a computer network? A computer network, often simply referred to as a network, is a collection of computers and other hardware

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA

Navpreet Singh INTRODUCTION TO COMPUTER NETWORKS. Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA INTRODUCTION TO COMPUTER NETWORKS Navpreet Singh Computer Centre Indian Institute of Technology Kanpur Kanpur INDIA (Ph : 2597371, Email : navi@iitk.ac.in) About Myself About Myself I am Network Manager

More information

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web Chapter Topics Chapter 7: Computer Networks, the Internet, and the World Wide Web CS10051: Intro. to Computer Science Kent State University History of the Internet History of the World Wide Web Internet

More information

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11

Types of Computer Networks. ICS 614: Computer Networks Concepts and Principles 11 Types of Computer Networks ICS 614: Computer Networks Concepts and Principles 11 Types of networks Networks are categorized by distribution, size, and architecture. A network can be as simple as a single

More information

NAPIER UNIVERSITY SCHOOL OF COMPUTING

NAPIER UNIVERSITY SCHOOL OF COMPUTING NAPIER UNIVERSITY SCHOOL OF COMPUTING Level III SESSION 2000/2001 Duration: 2 hours Computer Networks and Distributed Systems MODULE NO: CO32006 (MM32021) There are SIX questions in this paper Attempt

More information

Chapter 11: It s a Network. Introduction to Networking

Chapter 11: It s a Network. Introduction to Networking Chapter 11: It s a Network Introduction to Networking Small Network Topologies Typical Small Network Topology IT Essentials v5.0 2 Device Selection for a Small Network Factors to be considered when selecting

More information

Introduction to Networking

Introduction to Networking Introduction to Networking Chapters 1 and 2 Outline Computer Network Fundamentals Defining a Network Networks Defined by Geography Networks Defined by Topology Networks Defined by Resource Location OSI

More information

Stratford School Academy Schemes of Work

Stratford School Academy Schemes of Work Number of weeks (between 6&8) Content of the unit Assumed prior learning (tested at the beginning of the unit) 6 This is a theoretical unit covering the basic principles and architecture of local and wide

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 Chapter 4 Introduction to Computer Networks Definitions and Terminologies Computer Network A network consists of two or more computers that are linked in order to share resources

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

CtrlS Datacenters Placement Questions And Answers

CtrlS Datacenters Placement Questions And Answers DATA CENTER Q1. What is Data Center? Data centers are physical or virtual infrastructure used by enterprises to house computer, server and networking systems and components for the companys information

More information

Network Communications Standards. Applied Information Technology

Network Communications Standards. Applied Information Technology Network Communications Standards Applied Information Technology Network Standards Why do we need network standards? Defined guidelines for how computers or networked devices communicate Think of it as

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1

IT 4504 Section 4.0. Network Architectures. 2008, University of Colombo School of Computing 1 IT 4504 Section 4.0 Network Architectures 2008, University of Colombo School of Computing 1 Section 4.1 Introduction to Computer Networks 2008, University of Colombo School of Computing 2 Introduction

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published

Cambridge International Examinations Cambridge International General Certificate of Secondary Education. Published Cambridge International Examinations Cambridge International General Certificate of Secondary Education COMPUTER SCIENCE 078/12 Paper 1 MARK SCHEME Maximum Mark: 75 Published This mark scheme is published

More information

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks Discuss connectivity, the wireless revolution, and communication systems. Describe physical and wireless communications channels. Discuss connection devices and services, including dial-up, DSL, cable,

More information

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness

Networking. Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness Networking and Communication Trends Convergence (Accessibility) Speed Stability Simplicity* Embeddedness What is a Computer Network General definition Related hardware Network Interface Card Network Operating

More information

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS

WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS WEEK 9 TCP/IP, PHYSICAL AND DATA LINK LAYERS PHYSICAL LAYER Physical (hardware) layer: lowest level layer of the Internet Model. - Contains the actual network hardware cables, antennas, network interfaces

More information

ITP 140 Mobile Applications Technologies. Networks

ITP 140 Mobile Applications Technologies. Networks ITP 140 Mobile Applications Technologies Networks A First Look Under the Hood 2 3 Communication Channels Mediums for transporting data from one system to another Physical Twisted Pair (CAT-3, CAT-5/6)

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3

Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 1. Slide 2. Slide 3 Slide 1 Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Networking and Health Information Exchange Unit 1a ISO Open Systems Interconnection (OSI) Slide 2 Unit

More information

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam CSC 170 Fall 2017 Dr. R. M. Siegfried Study Guide for Final Exam Definitions to know: Lecture #1 1. Data 2. Digitization 3. Bit 4. Byte 5. Binary Numbers 6. How Are Characters Stored? a. ASCII b. Unicode

More information

Typical Network Uses

Typical Network Uses Computer Networks Introduction The next Great Revolution - Computer Networks- computers connected together for exchanging information Our information-oriented society - applications in education, commerce,

More information

Networks: Communicating and Sharing Resources

Networks: Communicating and Sharing Resources Networks: Communicating and Sharing Resources 1 Network Fundamentals Networks o Links multiple computer systems and enables them to share data and resources o Types of computer networks: Local area network

More information

Topic 4 Transfer of Data in ICT Systems

Topic 4 Transfer of Data in ICT Systems Topic 4 Transfer of Data in ICT Systems Key The Key concepts for this topic are: Students awareness of current and emerging communication technologies Basic elements of an ICT network Characteristics of

More information

(Network Programming) Basic Networking Hardware

(Network Programming) Basic Networking Hardware EEE 448 Computer Networks with (Network Programming) Basic Networking Hardware Lecture #2 Dept of Electrical and Electronics Engineering Çukurova University Agenda What is a network device? Network Media

More information

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks

1. What is a network protocol and why are protocols needed when two machines communicate? 2 marks Topic1: Common Network Protocols 1. What is a network protocol and why are protocols needed when two machines communicate? 2. Describe the function of each of the following protocols: a. SMTP b. HTTP c.

More information

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking

Lecture Outline. Lecture 2. OSI model and networking. The OSI model and networking. The OSI model and networking. The OSI model and networking Lecture 2 The OSI model Chapter 2, specifically pages 42-58 Dave Novak School of Business Administration, University of Vermont Sources: 1) Network+ Guide to Networks, Dean 2013 2) Comer, Computer Networks

More information

Data Communication and Network. Introducing Networks

Data Communication and Network. Introducing Networks Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You can connect

More information

Chapter 12. Network Organization and Architecture

Chapter 12. Network Organization and Architecture Chapter 12 Network Organization and Architecture Chapter 12 Objectives Learn the basic physical components of networks. Become familiar with routing protocols. 2 Computer networks are often classified

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Part I: Hardware and communication

Part I: Hardware and communication Part I: Hardware and communication The following are a list of definitions for most things in the first section of the syllabus for CG1(Computing Theory). To test yourself on these items, you should attempt

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

LECTURE WK4 NETWORKING

LECTURE WK4 NETWORKING LECTURE WK4 NETWORKING Workbook and Quiz Workbook o Due in WK5 o Must hand in a hard copy to the tutor as well as an online submission Quiz o In the practical class o 30mins to complete the quiz o Short,

More information

MTA_98-366_Vindicator930

MTA_98-366_Vindicator930 MTA_98-366_Vindicator930 Number: 98-366 Passing Score: 700 Time Limit: 45 min File Version: 1.0 http://www.gratisexam.com/ Microsoft Technology Associate Networking Fundamentals MTA 98-366 Exam A QUESTION

More information

Wireless technology Principles of Security

Wireless technology Principles of Security Wireless technology Principles of Security 1 Wireless technologies 2 Overview This module provides an introduction to the rapidly evolving technology of wireless LANs (WLANs). WLANs redefine the way the

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

CSC Introduction to Computers and Their Applications

CSC Introduction to Computers and Their Applications CSC 170 - Introduction to Computers and Their Applications Lecture 6 An Introduction to Networks Communication Systems Networks can be classified in many ways; as a network user, you ll want to keep in

More information

Networking. Prof. Abdul Hameed

Networking. Prof. Abdul Hameed Networking Prof. Abdul Hameed http://informationtechnology.pk http://informationtechnology.pk 0 Chapter Topics Networking Fundamentals Network Architectures and Components Connecting to the Internet Installing

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks Rev.Confirming Pages VISUAL SUMMARY Communications and Networks COMMUNICATIONS COMMUNICATION CHANNELS Communications is the process of sharing data, programs, and information between two or more computers.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

CONTENTS IN DETAIL INTRODUCTION

CONTENTS IN DETAIL INTRODUCTION CONTENTS IN DETAIL ACKNOWLEDGMENTS xiii INTRODUCTION xv 1 HOW A NETWORK WILL IMPROVE YOUR LIFE 1 What s a Network?... 2 Sneakernet... 3 Data Networks and What You Can Do with Them... 4 File Sharing...

More information