Networks and the Internet

Size: px
Start display at page:

Download "Networks and the Internet"

Transcription

1 UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department 2018 v2.1 ed. Networks and the Internet A network is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media The Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Page : Discovering Computers Chapter 1 2 The Internet 1

2 Networks and the Internet Page 8 Figure : Discovering Computers Chapter 1 4 The Internet Page 47 Figure : Discovering Computers Chapter 2 5 Networks Network interface card (NIC) LAN WAN WLAN PAN WiMax 2

3 The Internet An IP address is a number that uniquely identifies each computer or device connected to the Internet A domain name is the text version of an IP address Top-level domain (TLD) Page 48 Figure : Discovering Computers Chapter 2 7 The Internet Page 48 Figure : Discovering Computers Chapter 2 8 The World Wide Web Page 50 Figure : Discovering Computers Chapter 2 9 3

4 Uniform Resource Locator Each web page has a unique address called a URL URL s can be comprised of: Example: Protocol://Host/Path/File.name 10 The World Wide Web Page 51 Figure : Discovering Computers Chapter 2 11 Uniform Resource Locator Path is the directory/subdirectories where the web page is located on the host Web page stored in a file with an extension (aka suffix) of HTML or HTM File names consist of prefix.suffix (suffix also called extension) Protocol http hypertext transfer protocol ftp file transfer protocol https secure http 12 4

5 The World Wide Web Information presented on the Web must be evaluated for accuracy No one oversees the content of Web pages Page 58 Figure : Discovering Computers Chapter 2 13 Things You Should Know How to get your IP address How to tell if you are connecting to the network (and what path is used to connect two systems) How to register a computer on the UofM Network Know your IP Address? To find your computer s IP address Start In Search programs and files box type cmd At the DOS prompt Ipconfig On campus, IP addresses start with 141. for a wired connection and 10. for wireless connections (172. for the UofM Guest Network). 15 5

6 Are you Connected? To see if you are connected to the internet you can use the DOS prompt window (as in the last slide) but type: ping google.com And you should see (something like): Pinging google.com [ ] with 32 bytes of data: Reply from : bytes=32 time=60ms TTL=239 Reply from : bytes=32 time=42ms TTL=239 Reply from : bytes=32 time=61ms TTL=239 Reply from : bytes=32 time=63ms TTL=239 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 63ms, Average = 56ms 16 Path Between Computers To see the path (or ROUTE) used to connect two computers you can use the DOS prompt window (as in the last slide) but type: tracert google.com And you should see (something like): Tracing route to google.com [ ] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms ea306-s1.memphis.edu [ ] 2 <1 ms <1 ms <1 ms <1 ms <1 ms <1 ms jo100-s1.memphis.edu [ ] 4 1 ms <1 ms <1 ms ms <1 ms <1 ms jo100-r4.memphis.edu [ ] 6 86 ms 88 ms 101 ms xe rtsw.chic.net.internet2.edu [ ] 7 70 ms 75 ms 79 ms ms 344 ms 585 ms * * * Request timed out ms ms 57 ms ms 73 ms 73 ms ord38s08-in-f14.1e100.net [ ] Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software 6

7 Internet and Network Attacks Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Pages Figure : Discovering Computers Chapter 5 19 Computer Security Risks Pages Figure : Discovering Computers Chapter 5 20 University of Memphis Network 7

8 Network Login If you Bring your own device on campus, you will need to log into the network the network: Network Login On Windows and Mac machines you will need to follow instructions to install Safe Connect iprint To facilitate students wishing to print from their own computers, ITD has given access to print via iprint to many of the printers in labs and other locations around campus. Instructions 8

9 LiveSafe An emergency alert system on campus Informs you, via push message, of: University closings and delays Emergencies on campus Features Download Instructions Android Device ios UMWare UM Ware allows students to use SELECTED software from off campus Blogs Students have access to create WordPress Blogs on their University Account 9

10 Using MyMemphis 28 Go to mymemphis 29 Type name and password 30 10

11 A good place to start is UofMOnline 31 UMdrive (file space accessible from anywhere with internet access) 32 For UMdrive Help umservices/umdrive.php You can give access to files placed on UMDrive to individuals and groups Many faculty use UMDrive to give students access to files 33 11

12 Library Search 34 Identity Management 35 12

13 Campus 37 Etiquette Always include a subject line and include your name if you think the person might not know who you are from your account name. Remember, without facial expressions and body language, written comments may be taken the wrong way. Be careful in wording your s. Use standard fonts. Don t use all capital letters when typing; all caps is understood to be the equivalent of shouting. Do not send large attachments without permission. Special formatting such as centering, audio messages, tables, html, etc. should be avoided unless necessary to complete an assignment or other communication. Avoid using text messaging choppiness and use capital letters to start sentences. Other Notes Do not open attachments (especially from people you do not know) VIRUSES! Use appropriate account names (sending a resume via an account ilovegames@aol.com is a bad idea) When attaching a file, make sure the person you are sending has the program to open it (when in doubt PDF!) 13

14 One Last Note Once you put something on the internet (via facebook, , etc) it is there forever do you really want an employer to see that picture of you at that party? Bibliography New Perspectives on Microsoft Office 2007, First Course, Windows XP Edition Class Notes for CGS1100, Prof. Robert W Janson, Florida Community College University of Memphis - MyMemphis webpages 14

Networks and the Internet

Networks and the Internet UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Networks and the Internet A network is a collection of computers and devices connected together, often

More information

Security. Internet and Network Attacks. Computer Security Risks 1/23/2019

Security. Internet and Network Attacks. Computer Security Risks 1/23/2019 Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software Internet

More information

Lesson 12 Lab Key Lab Exercises

Lesson 12 Lab Key Lab Exercises Lab 1 Doing a Ping Test Lesson 12 Lab Key Lab Exercises The purpose of this lab is to familiarize the student with running a ping test. This lab will also help the student correctly interpret the results

More information

Fix network connection issues in Windows 10

Fix network connection issues in Windows 10 0 Sign in Fix network connection issues in Windows 10 If you re having problems getting connected to a network and can t connect to the Internet, here are some things you can try in Windows 10. Things

More information

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7

APPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7 INTRODUCTION Before installing an EWSi Portal Plus Controller on a network it is necessary to change the default IP address of the unit to one supplied by the network administrator. The following screen

More information

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning

UofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning UofM Secure Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 2/14/2018

More information

um Wireless Revised 8/17/18

um Wireless Revised 8/17/18 um Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website Revised 8/17/18

More information

Networking. INFO/CSE 100, Spring 2005 Fluency in Information Technology.

Networking. INFO/CSE 100, Spring 2005 Fluency in Information Technology. Networking INFO/CSE 100, Spring 2005 Fluency in Information Technology http://www.cs.washington.edu/100 Apr-4-05 networks @ university of washington 1 Readings and References Reading Fluency with Information

More information

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each. Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard

More information

Windows Help document Part A

Windows Help document Part A Compiled by: Todd Johnstone Before starting these steps, open a Word document, save it in documents in a folder called computing problems and use that document to capture items that show as bad as you

More information

Lab 9.8.1: Address Resolution Protocol (ARP)

Lab 9.8.1: Address Resolution Protocol (ARP) Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5

More information

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web

More information

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below.

The flow of transferring the machining programs of the server PC and starting an automatic operation is as below. CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4

More information

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com

Networking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail

More information

Lab 6.7.1: Ping and Traceroute

Lab 6.7.1: Ping and Traceroute Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0

More information

Entry Level Assessment Blueprint Computer Networking Fundamentals

Entry Level Assessment Blueprint Computer Networking Fundamentals Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance

More information

Networking By: Vince

Networking By: Vince Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that

More information

um-guest Wireless Revised 8/8/18

um-guest Wireless Revised 8/8/18 um-guest Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website Revised

More information

COMP 2000 W 2012 Lab no. 3 Page 1 of 11

COMP 2000 W 2012 Lab no. 3 Page 1 of 11 COMP 2000 W 2012 Lab no. 3 Page 1 of 11 Lab Introduction Background The Internet is based on packet-switched protocols. Information is carried in packets (it is divided into packets), which can be imagined

More information

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark

More information

Wireless b/g/n 150Mbps AP Router

Wireless b/g/n 150Mbps AP Router Wireless 802.11b/g/n 150Mbps AP Router User Manual V1.2 2009-11-30 Package Contents The following items should be found in your package: One Wireless 802.11b/g/n 150Mbps Broadband Router One DC 9v power

More information

SUMMARIES OF INTERACTIVE MULTIMEDIA

SUMMARIES OF INTERACTIVE MULTIMEDIA SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes

More information

CHAPTER 1. Welcome to Grand IP Camera III

CHAPTER 1. Welcome to Grand IP Camera III CHAPTER 1 Welcome to Grand IP Camera III 3. Remote view through the IE browser, simply type in the IP address. 4. 6 infrared LEDs provide imaging in the dark. 5. Many Valuable Internet services: Email,

More information

iprint to Print

iprint  to Print iprint Email to Print Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 12/19/2017

More information

Networking. INFO/CSE 100, Spring 2006 Fluency in Information Technology.

Networking. INFO/CSE 100, Spring 2006 Fluency in Information Technology. Networking INFO/CSE 100, Spring 2006 Fluency in Information Technology http://www.cs.washington.edu/100 Apr-3-06 networks @ university of washington 1 Readings and References Reading Fluency with Information

More information

INFORMATION TECHNOLOGY 402

INFORMATION TECHNOLOGY 402 NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy

More information

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.

Duplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law. Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following

More information

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board

( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board IJ3000 Controller IJ3000 Firmware Upgrade Process 5760-136 Revision D Page 1 of 12 These instructions assume you already know how to change the IP address of your computer, create directories and copy

More information

Internet and Mini.K.G Senior Scientist, FRAD, CMFRI

Internet and  Mini.K.G Senior Scientist, FRAD, CMFRI Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several

More information

Chapter 1 Introduction to TCP/IP

Chapter 1 Introduction to TCP/IP Chapter 1 Introduction to TCP/IP Published: November 02, 2004 Updated: April 16, 2007 Writer: Joe Davies 1 Abstract This chapter introduces Transmission Control Protocol/Internet Protocol (TCP/IP), both

More information

2 User Guide. Contents

2  User Guide. Contents E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an

More information

Data Communication & Networking

Data Communication & Networking Data Communication & Networking O level Computer Science (2210) Prepared By: Fahad Khan Data transmission refers to the movement of data in form of bits between two or more digital devices. This transfer

More information

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

1/29/2019. Storage Media. Storage Media

1/29/2019. Storage Media. Storage Media File Management TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Last update 1/29/18 (WIN10) Storage Media A computer file is a named collection of stored data An executable file

More information

9/2/2016. Storage Media. Storage Media

9/2/2016. Storage Media. Storage Media File Management TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Last update 1/24/14 Storage Media A computer file is a named collection of stored data An executable file contains

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Copyright 2016. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint

More information

HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP

HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP 1. Go to the Start Menu, choose Programs, Accessories, Communications, and open the Network Connections

More information

LAB 1 HOW THE WEB WORKS

LAB 1 HOW THE WEB WORKS LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route

More information

General Network Troubleshooting

General Network Troubleshooting Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise

More information

Introduction to the Internet. Part 1. What is the Internet?

Introduction to the Internet. Part 1. What is the Internet? Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected

More information

GET TO KNOW YOUR COMMAND PROMPT

GET TO KNOW YOUR COMMAND PROMPT PC TERMINAL COMMANDS GET TO KNOW YOUR COMMAND PROMPT A command line interface (or the command line) is a text-only way of browsing and interacting with your computer. In Windows, the command line is called

More information

Procedure Note: The research steps for this lab are not included in this procedure.

Procedure Note: The research steps for this lab are not included in this procedure. Objective The objective of this lab assignment is to research and gain an understanding of the different tools and options available when needing to perform network analysis, and seek an understanding

More information

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION

More information

Chapter 16: Advanced Security

Chapter 16: Advanced Security : Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

ZyAIR B-500 Wireless Access Point Quick Installation Guide

ZyAIR B-500 Wireless Access Point Quick Installation Guide ZyAIR B-500 Wireless Access Point Quick Installation Guide Version 3.50 June 2004 Table of Contents 1 Introducing the ZyAIR... 4 2 Hardware Connections... 4 2.1 Rear Panel and Connections... 4 2.2 The

More information

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.

EXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product. HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This

More information

Otasuke Pro-ServerEX! Introduction. What is Pro-Server EX? - Introduction-0 -

Otasuke Pro-ServerEX! Introduction. What is Pro-Server EX? - Introduction-0 - Introduction What is Pro-Server EX? Introduction What is Pro-Server EX? - Introduction-0 - Table of contents Introduction What is Pro-Server EX? What is Pro-Server EX? What is Pro-Server EX? -2 Things

More information

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics

Facilitator. Introduction to IT Networking for Facilities Managers. Class Logistics Introduction to IT Networking for Facilities Managers APPA Institute for Facilities Management Dallas, TX January 16, 2017 Facilitator J. Craig Klimczak, D.V.M., M.S. Chief Information Officer Community

More information

Document: #HT Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000

Document: #HT Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000 Document: #HT000132 Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000 Navigating this document: Every chapter in this guide is available to click in the following Table

More information

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo

Vendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo Vendor: Microsoft Exam Code: 98-367 Exam Name: MTA Security Fundamentals Practice Test Version: Demo DEMO QUESTION 1 To prevent users from copying data to removable media, you should: A. Lock the computer

More information

MODUL 7 DATA LINK LAYER

MODUL 7 DATA LINK LAYER Pokok Bahasan MODUL 7 DATA LINK LAYER Upon completion of this lab, you will be able to: Explain the header fields in an Ethernet II frame. Use Wireshark to capture and analyze Ethernet II frames. Tugas

More information

Computer Networking Fundamentals

Computer Networking Fundamentals Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Measuring What Matters Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical

More information

The Basics of Networking

The Basics of Networking c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and

More information

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses

Game100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,

More information

Upgrading Your Home Network Security

Upgrading Your Home Network Security Upgrading Your Home Network Security For Free! Dr. Glen Sagers Illinois State University Outline Passwords & Passphrases Two-factor authentication Updates Viruses and Malware WiFi security Internet of

More information

Talia: idirect infiniti series Troubleshooting Guide 2 of 12 Start the isite application. You should see information about your IDU in the left pane,

Talia: idirect infiniti series Troubleshooting Guide 2 of 12 Start the isite application. You should see information about your IDU in the left pane, Talia: idirect infiniti series Troubleshooting Guide 1 of 12 idirect infiniti series Troubleshooting Guide System information rev.2007-10-03 - download the latest version of this guide at www.talia.net

More information

An introduction to the Internet. Joining a connected world

An introduction to the Internet. Joining a connected world An introduction to the Internet Joining a connected world Agenda 1.! What do you already know about using the Internet? 2.! What is this thing called the World Wide Web? 3.! How the Internet works 4.!

More information

Username: Lab Section (Circle One): 9:30 12:30 2:00 3:30

Username: Lab Section (Circle One): 9:30 12:30 2:00 3:30 Name: Email Username: Lab Section (Circle One): 9:30 12:30 2:00 3:30 CSC 101: Lab #12: Networking [based largely on work by William Turkett] Lab due date: 12 noon, Friday, Dec 2 Purpose: The purpose of

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning

Review Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called

More information

Welcome to KGI. SALS Technology Setup 2015 Keck Graduate Institute

Welcome to KGI. SALS Technology Setup 2015 Keck Graduate Institute Welcome to KGI SALS Technology Setup 2015 Keck Graduate Institute Technology Setup Goals Introductions and overview of IT at KGI Important documents Overview of laptop and software requirements Your KGI

More information

Using the AETA Remote Access service

Using the AETA Remote Access service Using the AETA Remote Access service 1. Background AETA codecs can all be controlled via an IP interface, and for instance a computer can easily take control over a codec when it is connected on the same

More information

Lab Configuring HSRP and GLBP Topology

Lab Configuring HSRP and GLBP Topology Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1

More information

Get Max Internet Security where to buy software for students ]

Get Max Internet Security where to buy software for students ] Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection

More information

The Features and Uses of Computer Networking. Unit 11 Task 1

The Features and Uses of Computer Networking. Unit 11 Task 1 The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more

More information

E-companion. Quiz for IT-knowledge

E-companion. Quiz for IT-knowledge E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place

More information

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols

CCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means

More information

Networking Jamie Tees

Networking Jamie Tees Ethernet is the main networking technology, UTP (Unshielded Twisted Pair) cabling is the main networking cable types, this cabling uses RJ-45 connectors either end. While UTP is the main type we have STP

More information

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code

Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Learning Objective Explain the importance of network principles and architecture

More information

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal

CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on

More information

Networking 101 By: Stefan Jagroop

Networking 101 By: Stefan Jagroop Networking 101 By: Stefan Jagroop The Internet The Internet is governed by a series of protocols that form the rules for how communications should happen The Internet is a network of networks. There is

More information

Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019

Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019 Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019 Before starting these instructions, you should already have your Voice assistant installed and working. These instructions can be used

More information

Course Outline (version 2)

Course Outline (version 2) Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students

More information

Configuring your Home Wireless Network

Configuring your Home Wireless Network Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home

More information

A Review Paper on Network Security Attacks and Defences

A Review Paper on Network Security Attacks and Defences EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY

More information

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security

iconnect625w Copyright Disclaimer Enabling Basic Wireless Security iconnect625w Enabling Basic Wireless Security Copyright Copyright 2006 OPEN Networks Pty Ltd. All rights reserved. The content of this manual is subject to change without notice. The information and messages

More information

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.

Staying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center. Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for

More information

HP 5120 EI Switch Series

HP 5120 EI Switch Series HP 5120 EI Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-1793 Software version: Release 2220 Document version: 6W100-20130810 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Meeting 39. Guest Speaker Dr. Williams CEH Networking

Meeting 39. Guest Speaker Dr. Williams CEH Networking Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,

More information

Networking and Health Information Exchange: ISO Open System Interconnection (OSI)

Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection

More information

Chapter 12. Information Security Management

Chapter 12. Information Security Management Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication

More information

Setting IPSec VPN connection between two SMC BR21VPN

Setting IPSec VPN connection between two SMC BR21VPN Page 1/24 Page 2/24 Setting IPSec VPN connection between two SMC BR21VPN Preparation Company A WAN IP: 192.168.34.109 LAN IP: 192.168.2.X Company B WAN IP: 192.168.34.111 LAN IP: 192.168.3.X This example

More information

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)

NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences

More information

Lab: Configure Wireless Security

Lab: Configure Wireless Security 16.3.1 Lab: Configure Wireless Security Introduction Print and complete this lab. In this lab, you will configure and test the wireless settings on the Linksys WRT300N. Recommended Equipment Two computers

More information

HHH Instructional Computing Fall

HHH Instructional Computing Fall Quick Start Guide for School Web Lockers Teacher log-on is the same as for Infinite Campus Student log-on is the same initial log on to the network except no school year is required before their user name

More information

- NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP

- NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP Hooking up imixg3 Tieline for Remote Broadcasts - NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP 2. HOW TO CONNECT TO THE

More information

Resource:http://whatis.techtarget.com/

Resource:http://whatis.techtarget.com/ A1 Terminology Urichuck Resource:http://whatis.techtarget.com/ Term Definition Image Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department

NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department COURSE: CST2307 Networking Fundamentals (2 class hours, 2 lab hours, 3 credits) Course Description: This course introduces

More information

Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018

Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018 Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018 Before starting these instructions, you should already have your Voice assistant installed and working. These instructions can be used

More information

TCP/IP Diagnostic Utilities on Windows 2008 Server

TCP/IP Diagnostic Utilities on Windows 2008 Server TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP

More information

FACULTY OF ENGINEERING. Lab Experiment

FACULTY OF ENGINEERING. Lab Experiment FACULTY OF ENGINEERING ECE2056 Data Communications and Networking Lab Experiment DCN1: Network Setup and Study Using Routers Last revised: 20-11- 2015 Revised by: GVT Learning Outcome: Pre- Requisite:

More information

ACN Premium Technical Support. 24/7/365 Remote Computer Support

ACN Premium Technical Support. 24/7/365 Remote Computer Support ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand

More information

LAB 1 HOW THE WEB WORKS

LAB 1 HOW THE WEB WORKS LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route

More information

Octopus Online Service Safety Guide

Octopus Online Service Safety Guide Octopus Online Service Safety Guide This Octopus Online Service Safety Guide is to provide you with security tips and reminders that you should be aware of when using online and mobile services provided

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information