Networks and the Internet
|
|
- Laura Hunt
- 5 years ago
- Views:
Transcription
1 UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department 2018 v2.1 ed. Networks and the Internet A network is a collection of computers and devices connected together, often wirelessly, via communications devices and transmission media The Internet is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals Page : Discovering Computers Chapter 1 2 The Internet 1
2 Networks and the Internet Page 8 Figure : Discovering Computers Chapter 1 4 The Internet Page 47 Figure : Discovering Computers Chapter 2 5 Networks Network interface card (NIC) LAN WAN WLAN PAN WiMax 2
3 The Internet An IP address is a number that uniquely identifies each computer or device connected to the Internet A domain name is the text version of an IP address Top-level domain (TLD) Page 48 Figure : Discovering Computers Chapter 2 7 The Internet Page 48 Figure : Discovering Computers Chapter 2 8 The World Wide Web Page 50 Figure : Discovering Computers Chapter 2 9 3
4 Uniform Resource Locator Each web page has a unique address called a URL URL s can be comprised of: Example: Protocol://Host/Path/File.name 10 The World Wide Web Page 51 Figure : Discovering Computers Chapter 2 11 Uniform Resource Locator Path is the directory/subdirectories where the web page is located on the host Web page stored in a file with an extension (aka suffix) of HTML or HTM File names consist of prefix.suffix (suffix also called extension) Protocol http hypertext transfer protocol ftp file transfer protocol https secure http 12 4
5 The World Wide Web Information presented on the Web must be evaluated for accuracy No one oversees the content of Web pages Page 58 Figure : Discovering Computers Chapter 2 13 Things You Should Know How to get your IP address How to tell if you are connecting to the network (and what path is used to connect two systems) How to register a computer on the UofM Network Know your IP Address? To find your computer s IP address Start In Search programs and files box type cmd At the DOS prompt Ipconfig On campus, IP addresses start with 141. for a wired connection and 10. for wireless connections (172. for the UofM Guest Network). 15 5
6 Are you Connected? To see if you are connected to the internet you can use the DOS prompt window (as in the last slide) but type: ping google.com And you should see (something like): Pinging google.com [ ] with 32 bytes of data: Reply from : bytes=32 time=60ms TTL=239 Reply from : bytes=32 time=42ms TTL=239 Reply from : bytes=32 time=61ms TTL=239 Reply from : bytes=32 time=63ms TTL=239 Ping statistics for : Packets: Sent = 4, Received = 4, Lost = 0 (0% loss), Approximate round trip times in milli-seconds: Minimum = 42ms, Maximum = 63ms, Average = 56ms 16 Path Between Computers To see the path (or ROUTE) used to connect two computers you can use the DOS prompt window (as in the last slide) but type: tracert google.com And you should see (something like): Tracing route to google.com [ ] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms ea306-s1.memphis.edu [ ] 2 <1 ms <1 ms <1 ms <1 ms <1 ms <1 ms jo100-s1.memphis.edu [ ] 4 1 ms <1 ms <1 ms ms <1 ms <1 ms jo100-r4.memphis.edu [ ] 6 86 ms 88 ms 101 ms xe rtsw.chic.net.internet2.edu [ ] 7 70 ms 75 ms 79 ms ms 344 ms 585 ms * * * Request timed out ms ms 57 ms ms 73 ms 73 ms ord38s08-in-f14.1e100.net [ ] Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software 6
7 Internet and Network Attacks Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Pages Figure : Discovering Computers Chapter 5 19 Computer Security Risks Pages Figure : Discovering Computers Chapter 5 20 University of Memphis Network 7
8 Network Login If you Bring your own device on campus, you will need to log into the network the network: Network Login On Windows and Mac machines you will need to follow instructions to install Safe Connect iprint To facilitate students wishing to print from their own computers, ITD has given access to print via iprint to many of the printers in labs and other locations around campus. Instructions 8
9 LiveSafe An emergency alert system on campus Informs you, via push message, of: University closings and delays Emergencies on campus Features Download Instructions Android Device ios UMWare UM Ware allows students to use SELECTED software from off campus Blogs Students have access to create WordPress Blogs on their University Account 9
10 Using MyMemphis 28 Go to mymemphis 29 Type name and password 30 10
11 A good place to start is UofMOnline 31 UMdrive (file space accessible from anywhere with internet access) 32 For UMdrive Help umservices/umdrive.php You can give access to files placed on UMDrive to individuals and groups Many faculty use UMDrive to give students access to files 33 11
12 Library Search 34 Identity Management 35 12
13 Campus 37 Etiquette Always include a subject line and include your name if you think the person might not know who you are from your account name. Remember, without facial expressions and body language, written comments may be taken the wrong way. Be careful in wording your s. Use standard fonts. Don t use all capital letters when typing; all caps is understood to be the equivalent of shouting. Do not send large attachments without permission. Special formatting such as centering, audio messages, tables, html, etc. should be avoided unless necessary to complete an assignment or other communication. Avoid using text messaging choppiness and use capital letters to start sentences. Other Notes Do not open attachments (especially from people you do not know) VIRUSES! Use appropriate account names (sending a resume via an account ilovegames@aol.com is a bad idea) When attaching a file, make sure the person you are sending has the program to open it (when in doubt PDF!) 13
14 One Last Note Once you put something on the internet (via facebook, , etc) it is there forever do you really want an employer to see that picture of you at that party? Bibliography New Perspectives on Microsoft Office 2007, First Course, Windows XP Edition Class Notes for CGS1100, Prof. Robert W Janson, Florida Community College University of Memphis - MyMemphis webpages 14
Networks and the Internet
UofM Internet Concepts TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Networks and the Internet A network is a collection of computers and devices connected together, often
More informationSecurity. Internet and Network Attacks. Computer Security Risks 1/23/2019
Security Security refers to the steps a computer owner takes to prevent unauthorized use of or damage to the computer Malware Viruses Spyware Adware Firewall Phishing Pharming Antivirus software Internet
More informationLesson 12 Lab Key Lab Exercises
Lab 1 Doing a Ping Test Lesson 12 Lab Key Lab Exercises The purpose of this lab is to familiarize the student with running a ping test. This lab will also help the student correctly interpret the results
More informationFix network connection issues in Windows 10
0 Sign in Fix network connection issues in Windows 10 If you re having problems getting connected to a network and can t connect to the Internet, here are some things you can try in Windows 10. Things
More informationAPPLICATION NOTE AN0004 CHANGING THE IP ADDRESS ON AN EWSi PORTAL PLUS CONTROLLER WITH WINDOWS 7
INTRODUCTION Before installing an EWSi Portal Plus Controller on a network it is necessary to change the default IP address of the unit to one supplied by the network administrator. The following screen
More informationUofM Secure Wireless 2/14/2018. Brought to you by: umtech & The Center for Teaching & Learning
UofM Secure Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 2/14/2018
More informationum Wireless Revised 8/17/18
um Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website Revised 8/17/18
More informationNetworking. INFO/CSE 100, Spring 2005 Fluency in Information Technology.
Networking INFO/CSE 100, Spring 2005 Fluency in Information Technology http://www.cs.washington.edu/100 Apr-4-05 networks @ university of washington 1 Readings and References Reading Fluency with Information
More informationChapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.
Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard
More informationWindows Help document Part A
Compiled by: Todd Johnstone Before starting these steps, open a Word document, save it in documents in a folder called computing problems and use that document to capture items that show as bad as you
More informationLab 9.8.1: Address Resolution Protocol (ARP)
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0 10.10.10.5
More informationHow does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics
How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web
More informationThe flow of transferring the machining programs of the server PC and starting an automatic operation is as below.
CONTENTS 1 OUTLINE... 1 2 OVERALL FLOW... 1 3 NETWORK CONNECTION... 1 4 SETTING EXAMPLE... 1 5 SET SERVER PC... 2 5.1 Windows 7... 2 5.1.1 Install IIS... 2 5.1.2 Set IIS... 4 5.1.3 Set firewall... 9 5.1.4
More informationNetworking Notes. Common Internet Speeds. Online Speed Test myspeed.visualware.com
Networking Notes Common Internet Speeds Dial Up 56 kbs 1000kbs = 1 mbs (1 user capacity) DSL 1.5 mbs (1 channel 10 user capacity) T1 1.5 mbs (24 channel 500 user capacity) Scalable Ethernet (Adjustable
More informationLab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
More informationLab 6.7.1: Ping and Traceroute
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationEntry Level Assessment Blueprint Computer Networking Fundamentals
Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment safety and maintenance
More informationNetworking By: Vince
Networking 192.168.1.101 By: Vince Disclaimer I am NOT a Networking expert you might ask questions that I don t know the answer to Networking is hard to teach but I know how to do your homeworks so that
More informationum-guest Wireless Revised 8/8/18
um-guest Wireless Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website Revised
More informationCOMP 2000 W 2012 Lab no. 3 Page 1 of 11
COMP 2000 W 2012 Lab no. 3 Page 1 of 11 Lab Introduction Background The Internet is based on packet-switched protocols. Information is carried in packets (it is divided into packets), which can be imagined
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationWireless b/g/n 150Mbps AP Router
Wireless 802.11b/g/n 150Mbps AP Router User Manual V1.2 2009-11-30 Package Contents The following items should be found in your package: One Wireless 802.11b/g/n 150Mbps Broadband Router One DC 9v power
More informationSUMMARIES OF INTERACTIVE MULTIMEDIA
SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes
More informationCHAPTER 1. Welcome to Grand IP Camera III
CHAPTER 1 Welcome to Grand IP Camera III 3. Remote view through the IE browser, simply type in the IP address. 4. 6 infrared LEDs provide imaging in the dark. 5. Many Valuable Internet services: Email,
More informationiprint to Print
iprint Email to Print Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 12/19/2017
More informationNetworking. INFO/CSE 100, Spring 2006 Fluency in Information Technology.
Networking INFO/CSE 100, Spring 2006 Fluency in Information Technology http://www.cs.washington.edu/100 Apr-3-06 networks @ university of washington 1 Readings and References Reading Fluency with Information
More informationINFORMATION TECHNOLOGY 402
NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy
More informationDuplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.
Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following
More information( ) old style CPU board ( ) new style CPU board. Circled items show differences for each board
IJ3000 Controller IJ3000 Firmware Upgrade Process 5760-136 Revision D Page 1 of 12 These instructions assume you already know how to change the IP address of your computer, create directories and copy
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationChapter 1 Introduction to TCP/IP
Chapter 1 Introduction to TCP/IP Published: November 02, 2004 Updated: April 16, 2007 Writer: Joe Davies 1 Abstract This chapter introduces Transmission Control Protocol/Internet Protocol (TCP/IP), both
More information2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationData Communication & Networking
Data Communication & Networking O level Computer Science (2210) Prepared By: Fahad Khan Data transmission refers to the movement of data in form of bits between two or more digital devices. This transfer
More informationA+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network
Chapter 17 Windows Resources on a Network Objectives Learn how to support some client/server applications Learn how to share and secure files and folders on the network Learn how to troubleshoot network
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More information1/29/2019. Storage Media. Storage Media
File Management TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Last update 1/29/18 (WIN10) Storage Media A computer file is a named collection of stored data An executable file
More information9/2/2016. Storage Media. Storage Media
File Management TECH 1010 Dan Kohn University of Memphis Engineering Technology Department Last update 1/24/14 Storage Media A computer file is a named collection of stored data An executable file contains
More informationComputer Networking Fundamentals
Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4514 / Version: 01 Copyright 2016. All Rights Reserved. General Assessment Information Computer Networking Fundamentals Blueprint
More informationHOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP
HOW TO: Establishing a VPN Connection For use with File Sharing on Windows 98, 2000, and Windows XP 1. Go to the Start Menu, choose Programs, Accessories, Communications, and open the Network Connections
More informationLAB 1 HOW THE WEB WORKS
LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route
More informationGeneral Network Troubleshooting
Overview Contents This document outlines some basic network troubleshooting techniques that can be used to test network connectivity. They are useful when troubleshooting issues with Crystal Enterprise
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationGET TO KNOW YOUR COMMAND PROMPT
PC TERMINAL COMMANDS GET TO KNOW YOUR COMMAND PROMPT A command line interface (or the command line) is a text-only way of browsing and interacting with your computer. In Windows, the command line is called
More informationProcedure Note: The research steps for this lab are not included in this procedure.
Objective The objective of this lab assignment is to research and gain an understanding of the different tools and options available when needing to perform network analysis, and seek an understanding
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
More informationChapter 16: Advanced Security
: Advanced Security IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents, including
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More informationName: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.
More informationJianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.
Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet
More informationZyAIR B-500 Wireless Access Point Quick Installation Guide
ZyAIR B-500 Wireless Access Point Quick Installation Guide Version 3.50 June 2004 Table of Contents 1 Introducing the ZyAIR... 4 2 Hardware Connections... 4 2.1 Rear Panel and Connections... 4 2.2 The
More informationEXAM - HP0-Y52. Applying HP FlexNetwork Fundamentals. Buy Full Product.
HP EXAM - HP0-Y52 Applying HP FlexNetwork Fundamentals Buy Full Product http://www.examskey.com/hp0-y52.html Examskey HP HP0-Y52 exam demo product is here for you to test the quality of the product. This
More informationOtasuke Pro-ServerEX! Introduction. What is Pro-Server EX? - Introduction-0 -
Introduction What is Pro-Server EX? Introduction What is Pro-Server EX? - Introduction-0 - Table of contents Introduction What is Pro-Server EX? What is Pro-Server EX? What is Pro-Server EX? -2 Things
More informationFacilitator. Introduction to IT Networking for Facilities Managers. Class Logistics
Introduction to IT Networking for Facilities Managers APPA Institute for Facilities Management Dallas, TX January 16, 2017 Facilitator J. Craig Klimczak, D.V.M., M.S. Chief Information Officer Community
More informationDocument: #HT Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000
Document: #HT000132 Document Title: Zebra Wired and Wireless Network Setup Product(s): T-375 & T-1000 Navigating this document: Every chapter in this guide is available to click in the following Table
More informationVendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo
Vendor: Microsoft Exam Code: 98-367 Exam Name: MTA Security Fundamentals Practice Test Version: Demo DEMO QUESTION 1 To prevent users from copying data to removable media, you should: A. Lock the computer
More informationMODUL 7 DATA LINK LAYER
Pokok Bahasan MODUL 7 DATA LINK LAYER Upon completion of this lab, you will be able to: Explain the header fields in an Ethernet II frame. Use Wireshark to capture and analyze Ethernet II frames. Tugas
More informationComputer Networking Fundamentals
Job Ready Assessment Blueprint Computer Networking Fundamentals Test Code: 4414 / Version: 01 Measuring What Matters Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical
More informationThe Basics of Networking
c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and
More informationGame100 Networking Lab 4. Part 1 (5.1.4) Using the Windows Calculator with Network Addresses
Game100 Networking Lab 4 Name: Part 1 (5.1.4) Using the Windows Calculator with Network Addresses Objectives Switch between the two Windows Calculator modes. Use Windows Calculator to convert between decimal,
More informationUpgrading Your Home Network Security
Upgrading Your Home Network Security For Free! Dr. Glen Sagers Illinois State University Outline Passwords & Passphrases Two-factor authentication Updates Viruses and Malware WiFi security Internet of
More informationTalia: idirect infiniti series Troubleshooting Guide 2 of 12 Start the isite application. You should see information about your IDU in the left pane,
Talia: idirect infiniti series Troubleshooting Guide 1 of 12 idirect infiniti series Troubleshooting Guide System information rev.2007-10-03 - download the latest version of this guide at www.talia.net
More informationAn introduction to the Internet. Joining a connected world
An introduction to the Internet Joining a connected world Agenda 1.! What do you already know about using the Internet? 2.! What is this thing called the World Wide Web? 3.! How the Internet works 4.!
More informationUsername: Lab Section (Circle One): 9:30 12:30 2:00 3:30
Name: Email Username: Lab Section (Circle One): 9:30 12:30 2:00 3:30 CSC 101: Lab #12: Networking [based largely on work by William Turkett] Lab due date: 12 noon, Friday, Dec 2 Purpose: The purpose of
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informationWelcome to KGI. SALS Technology Setup 2015 Keck Graduate Institute
Welcome to KGI SALS Technology Setup 2015 Keck Graduate Institute Technology Setup Goals Introductions and overview of IT at KGI Important documents Overview of laptop and software requirements Your KGI
More informationUsing the AETA Remote Access service
Using the AETA Remote Access service 1. Background AETA codecs can all be controlled via an IP interface, and for instance a computer can easily take control over a codec when it is connected on the same
More informationLab Configuring HSRP and GLBP Topology
Topology 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 9 Addressing Table Objectives Device Interface IP Address Subnet Mask Default Gateway R1 G0/1 192.168.1.1
More informationGet Max Internet Security where to buy software for students ]
Get Max Internet Security where to buy software for students ] Description: Features of Max Secure Internet Security 2013 Exciting, Easy to understand GUI Easy, Quick installation Get immediate protection
More informationThe Features and Uses of Computer Networking. Unit 11 Task 1
The Features and Uses of Computer Networking Unit 11 Task 1 Features Office Network Peer to peer A peer to peer network is mostly used in homes or small businesses. The network consists of two or more
More informationE-companion. Quiz for IT-knowledge
E-companion Quiz for IT-knowledge 1. The is used in combination with other keys to perform shortcuts and special tasks. A) Control (Ctrl) key B) Function key C) Toggle key D) Windows key 2. is the place
More informationCCNA Exploration Network Fundamentals. Chapter 03 Application Functionality and Protocols
CCNA Exploration Network Fundamentals Chapter 03 Application Functionality and Protocols Updated: 27/04/2008 1 3.1 Applications: The Interface Between Human and Networks Applications provide the means
More informationNetworking Jamie Tees
Ethernet is the main networking technology, UTP (Unshielded Twisted Pair) cabling is the main networking cable types, this cabling uses RJ-45 connectors either end. While UTP is the main type we have STP
More informationFundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code
Fundamentals of Information Systems Security Lesson 8 Mitigation of Risk and Threats to Networks from Attacks and Malicious Code Learning Objective Explain the importance of network principles and architecture
More informationCS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal
CS 356 Lab #1: Basic LAN Setup & Packet capture/analysis using Ethereal Tasks: Time: 2:00 hrs (Task 1-6 should take 45 min; the rest of the time is for Ethereal) 1 - Verify that TCP/IP is installed on
More informationNetworking 101 By: Stefan Jagroop
Networking 101 By: Stefan Jagroop The Internet The Internet is governed by a series of protocols that form the rules for how communications should happen The Internet is a network of networks. There is
More informationInstalling and Configuring the Voice UPB Bridge updated 1-Jan-2019
Installing and Configuring the Voice UPB Bridge updated 1-Jan-2019 Before starting these instructions, you should already have your Voice assistant installed and working. These instructions can be used
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationConfiguring your Home Wireless Network
Configuring your Home Wireless Network Questions How many of you have more than one computer at home? How many of you connect to the Internet using broadband (Cable or DSL) How many already have a home
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationiconnect625w Copyright Disclaimer Enabling Basic Wireless Security
iconnect625w Enabling Basic Wireless Security Copyright Copyright 2006 OPEN Networks Pty Ltd. All rights reserved. The content of this manual is subject to change without notice. The information and messages
More informationStaying Safe Online. My Best Internet Safety Tips. and the AgeWell Computer Education Center.
Staying Safe Online My Best Internet Safety Tips and the AgeWell Computer Education Center Welcome to our first Webinar of 2017! Agenda o How to use the Webinar Room o Upcoming CEC Classes o My tips for
More informationHP 5120 EI Switch Series
HP 5120 EI Switch Series Layer 3 - IP Routing Configuration Guide Part number: 5998-1793 Software version: Release 2220 Document version: 6W100-20130810 Legal and notice information Copyright 2013 Hewlett-Packard
More informationMeeting 39. Guest Speaker Dr. Williams CEH Networking
Cyber@UC Meeting 39 Guest Speaker Dr. Williams CEH Networking If You re New! Join our Slack ucyber.slack.com Feel free to get involved with one of our committees: Content, Finance, Public Affairs, Outreach,
More informationNetworking and Health Information Exchange: ISO Open System Interconnection (OSI)
Networking and Health Information Exchange: ISO Open System Interconnection (OSI) Lecture 4 Audio Transcript Slide 1 Welcome to Networking and Health Information Exchange, ISO Open System Interconnection
More informationChapter 12. Information Security Management
Chapter 12 Information Security Management We Have to Design It for Privacy... and Security. Tension between Maggie and Ajit regarding terminology to use with Dr. Flores. Overly technical communication
More informationSetting IPSec VPN connection between two SMC BR21VPN
Page 1/24 Page 2/24 Setting IPSec VPN connection between two SMC BR21VPN Preparation Company A WAN IP: 192.168.34.109 LAN IP: 192.168.2.X Company B WAN IP: 192.168.34.111 LAN IP: 192.168.3.X This example
More informationNETWORKS AND THE EFFECTS OF USING THEM (Work Sheet)
NETWORKS AND THE EFFECTS OF USING THEM (Work Sheet) 1. An organization is planning to train all staff online rather than video-conference. Describe what is meant by a web conference. 2. Explain the differences
More informationLab: Configure Wireless Security
16.3.1 Lab: Configure Wireless Security Introduction Print and complete this lab. In this lab, you will configure and test the wireless settings on the Linksys WRT300N. Recommended Equipment Two computers
More informationHHH Instructional Computing Fall
Quick Start Guide for School Web Lockers Teacher log-on is the same as for Infinite Campus Student log-on is the same initial log on to the network except no school year is required before their user name
More information- NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP
Hooking up imixg3 Tieline for Remote Broadcasts - NEVER USE A PHONE LINE YOU WILL CAUSE MAJOR DAMAGE TO THE IMIXG3 1. HOW TO TELL IF THE IMIXG3 IS SET UP FOR DHCP OR STATIC IP 2. HOW TO CONNECT TO THE
More informationResource:http://whatis.techtarget.com/
A1 Terminology Urichuck Resource:http://whatis.techtarget.com/ Term Definition Image Blog Short for Web log, a blog is a Web page that serves as a publicly accessible personal journal for an individual.
More informationNEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department
NEW YORK CITY COLLEGE OF TECHNOLOGY/CUNY Computer Systems Technology Department COURSE: CST2307 Networking Fundamentals (2 class hours, 2 lab hours, 3 credits) Course Description: This course introduces
More informationInstalling and Configuring the Voice UPB Bridge updated 22-Jan-2018
Installing and Configuring the Voice UPB Bridge updated 22-Jan-2018 Before starting these instructions, you should already have your Voice assistant installed and working. These instructions can be used
More informationTCP/IP Diagnostic Utilities on Windows 2008 Server
TCP/IP Diagnostic Utilities on Windows 2008 Server June 20, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. TCP/IP Utilities In this lesson, we will learn about how to use the TCP/IP
More informationFACULTY OF ENGINEERING. Lab Experiment
FACULTY OF ENGINEERING ECE2056 Data Communications and Networking Lab Experiment DCN1: Network Setup and Study Using Routers Last revised: 20-11- 2015 Revised by: GVT Learning Outcome: Pre- Requisite:
More informationACN Premium Technical Support. 24/7/365 Remote Computer Support
ACN Premium Technical Support 24/7/365 Remote Computer Support What is ACN Premium Technical Support? Premier provider of technical assistance for your computer and electronic devices 24/7/365 remote on-demand
More informationLAB 1 HOW THE WEB WORKS
LAB 1 HOW THE WEB WORKS What You Will Learn About IP addresses and Domain Names About some web browser plugins to help with development Examine headers sent by the HTTP protocol How to trace the route
More informationOctopus Online Service Safety Guide
Octopus Online Service Safety Guide This Octopus Online Service Safety Guide is to provide you with security tips and reminders that you should be aware of when using online and mobile services provided
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More information