Lesson 24 Network Fundamentals

Size: px
Start display at page:

Download "Lesson 24 Network Fundamentals"

Transcription

1 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition 1

2 Objectives Describe a network. Explain the benefits of a network. Identify the risks of network computing. Describe the roles of clients and servers on a network. List and describe the types of networks. List and describe communications media and hardware. Describe network security. 2

3 Vocabulary 3 biometric security measures cable modem client client/server network communication channels digital subscriber line (DSL) extranet firewall hacker hub Internet intranet local area network (LAN) modem

4 Vocabulary (continued) node peer-to-peer network proxy server Public Switched Telephone Network (PSTN) router server server operating system T-1 line wide area network (WAN) WiMAX wireless Internet service provider (WISP) wireless LAN (WLAN) 4

5 Introduction Connecting computers through a network, a group of two or more computers linked together, allows users to share software applications and to share hardware devices such as printers, scanners, and other hardware add-ons. Companies and organizations use networks to connect employees and subsidiaries nationally and even internationally. 5

6 Introducing Networks The Public Switched Telephone Network (PSTN) supports telephone service and is the world s collection of interconnected commercial and government-owned voice-oriented systems. 6

7 Network Benefits The biggest network of all is the Internet. Network benefits include: Information sharing Collaborative environment Hardware sharing Software sharing Enhanced communications Information sharing 7

8 Risks of Networked Computing As with any technology, disadvantages also exist. Disadvantages of networks include: Individual loss of autonomy Malicious code Network faults Setup and management costs is not necessarily private 8

9 Client/Server Networks 9 The term client/server network describes a software architectural model relationship. In most instances, the client is a software program such as Internet Explorer. The server is hardware and can be one of many types of servers, such as a mail server, a database server, an FTP server, an application server, or a Web server. Server operating systems are high-end programs designed to provide network control and include special functions for connecting computers and other devices into a network.

10 Network Types Networks are divided into two main types: local area networks (LANs) and wide area networks (WANs). 10

11 Network Types (continued) Local Area Networks: Most LANs connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area. 11 Wireless LAN

12 Network Types (continued) Wide Area Networks: A WAN covers a large geographical area and can contain communication links across metropolitan, regional, or national boundaries. Network types include: Client/server network: Server manages resources Peer-to-peer network: All computers are equal Intranet: Used within an organization Extranet: Specific outside users can access Internet: Global network allows worldwide connection 12

13 Network Communications Communication Hardware: Communication hardware devices facilitate the transmitting and receiving of data. Examples are: Modem: Converts analog signals to digital and vice versa Cable modem: Uses coaxial cable Digital subscriber line: Uses ordinary phone lines T-1: Type of fiber-optic telephone line Wireless: Delivers fast connection speeds 13

14 Network Security Issues Establishing and maintaining computer security is necessary to keep hardware, software, and data safe from harm or destruction. Passwords are the most common form of restricting access to data. 14

15 Network Security Issues (continued) Other security measures include: Electronic identification cards Firewalls to protect companies networks from external networks Antivirus software A proxy server that acts as an intermediary between a user and the Internet. 15

16 Network Security Issues (continued) Planning for Security: Companies must plan for security before it is needed Institute a selective hiring process. Regularly back up data and store it off site. Employ biometric security measures. 16

17 Network Security Issues (continued) Wireless Security: Wireless networking is very common, but has many security issues and hackers have found it very easy to access wireless networks. 17

18 Summary In this lesson, you learned: A network is a group of two or more computers linked together. A telephone network is similar in makeup to a computer network. The Public Switched Telephone Network (PSTN) supports telephone service, and it is the world s largest collection of interconnected commercial and governmentowned voice-oriented systems. 18

19 Summary (continued) You can use a network for information sharing, hardware sharing, software sharing, and as a collaborative environment. Networks are divided into two main types: local area networks and wide area networks. Local area networks (LANs) connect personal computers, workstations, and other devices such as printers and scanners in a limited geographical area, such as an office building, a school, or a home. 19

20 Summary (continued) A wide area network (WAN) is made up of several connected local area networks. In a client/server network, one or more computers on the network act as a server. The server manages network resources. In a peer-to-peer network, all of the computers are equal. No computer is designated as the server. People on the network each determine what files on their computer they share with others on the network. 20

21 Summary (continued) Data security is a risk with many networks. Some risks to computers are natural causes, some are accidents, and others are intentional. The best way to protect data is to effectively control the access to it. Generally, this protection is the responsibility of the network administrators and security personnel. If unauthorized persons gain access to data, they may obtain valuable information or trade secrets. Hackers are people who break into computer systems to steal services and information. 21

22 Summary (continued) Transmission media can be either physical or wireless. A modem is a type of communication device. A hub is a device that controls the incoming and forwarding of data. A router directs traffic on the Internet or on multiple connected networks. 22

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,

More information

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Chapter 9 Communications and Networks

Chapter 9 Communications and Networks Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications

More information

Introduction. Network Basics. Workstations. Server. Hub

Introduction. Network Basics. Workstations. Server. Hub Introduction If you re planning to use eivf soon, you may want to install a computer network to improve access to your eivf Provider Portal from any PC in your office. This paper provides information you

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Chapter 1 Instructor Version

Chapter 1 Instructor Version Name Date Objectives: Instructor Version Explain how multiple networks are used in everyday life. Explain the topologies and devices used in a small to medium-sized business network. Explain the basic

More information

MANAGEMENT INFORMATION SYSTEMS 8/E

MANAGEMENT INFORMATION SYSTEMS 8/E MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the

More information

Network Technology CMP-354-TE. TECEP Test Description

Network Technology CMP-354-TE. TECEP Test Description Network Technology CMP-354-TE This TECEP tests knowledge of the fundamental concepts of data communications. Topics covered include: network architectures, topologies, media and devices, protocols, types

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

G11_EoT_Solved Quizzes and Worksheets

G11_EoT_Solved Quizzes and Worksheets G11_EoT_Solved Quizzes and Worksheets Part I: Selected Questions What type of hackers is responsible for break into a system to steal credit card details? A. Theft of services B. Theft of information C.

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts

More information

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

ET225 Networking Concepts. Chapter 1 What is a Computer Network?

ET225 Networking Concepts. Chapter 1 What is a Computer Network? ET225 Networking Concepts Chapter 1 What is a Computer Network? Objectives Identify the advantages of connecting computers and devices on a network. Recognize common network components in a lab setting.

More information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information

Think! Think! Data communications. Long-Distance. Modems: to analog and back. Transmission Media. The last mile is the hardest for digital information Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done

More information

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers.

Lesson Plan. Upon completion of this assignment, the student will be able to build a small network and identify the different types of hackers. Lesson Plan Course Title: Principles of IT Session Title: Networks and Hackers Lesson Duration: Lesson length is subjective and will vary from instructor to instructor. Performance Objective: Upon completion

More information

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009 Systems Development Proposal Scott Klarman March 15, 2009 Systems Development Proposal Page 2 Planning Objective: RAS Associates will be working to acquire a second location in Detroit to add to their

More information

Internet Public Network

Internet Public Network Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500

More information

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications

How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications How Small Businesses Can Use Voice over Internet Protocol (VoIP) Internet Technology for Voice Communications Small businesses will find this booklet useful for learning how VoIP works and for clarifying

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES

COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency

More information

Higher Computing Networking 1

Higher Computing Networking 1 Networking Briefly state what is meant by a computer network. What does the term topology refer to in this context? What are the ideal goals a network designer should aim for? Compare and contrast a star

More information

Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200

Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200 Information Technology Career Cluster Networking Systems and Support Course Number: 11.46200 Course Description: Wireless? Wired? How do you communicate? Now that students know the fundamental basics,

More information

How do SMB benefit from using the Small but Secured Aries Server Appliance

How do SMB benefit from using the Small but Secured Aries Server Appliance How do SMB benefit from using the Small but Secured Aries Server Appliance white paper Internet Needs The Internet revolution is like nothing in the history of mankind. E-mail can be sent from San Francisco

More information

TYPE OF INTERNET CONNECTIONS. Dialup Cable Connection DSL Broadband Dedicated Leased Line ISDN Wireless Connection

TYPE OF INTERNET CONNECTIONS. Dialup Cable Connection DSL Broadband Dedicated Leased Line ISDN Wireless Connection Internet Connections By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com How to acquire Connection? We are Basically connected

More information

Data Transmission. from one person or place to another. person or place to another of passing something

Data Transmission. from one person or place to another. person or place to another of passing something Data Transmission Transmission: the process of passing something from one person or place to another of passing something from one person or place to another Data Transmission Main types of Transmission

More information

Computer Networks and Internet working

Computer Networks and Internet working Computer Networks and Internet working By completing this module you will be able to understand and learn the following: Computer Networking, Types of Networks and network Services Different Cables used

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET 3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs

More information

Troubleshoot your ADSL Router/Modem Setup

Troubleshoot your ADSL Router/Modem Setup Troubleshoot your ADSL Router/Modem Setup Cannot open configuration screen: Power down your equipment for 30 seconds, then retry. Disable your firewall software. Ensure your Web browser is not configured

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Telecommunications, the Internet, and Wireless Technology

Telecommunications, the Internet, and Wireless Technology Chapter 6 Telecommunications, the Internet, and Wireless Technology 6.1 Copyright 2011 Pearson Education, Inc. STUDENT LEARNING OBJECTIVES What are the principal components of telecommunications networks

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

Internet and Services

Internet and Services 3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

Using the Internet Outcome1

Using the Internet Outcome1 Using the Internet Outcome1 1.1 Identify different types of connection methods that can be used to access the internet When connecting to the Internet there are many different options available in this

More information

Policy on Connection to the University Network

Policy on Connection to the University Network Policy on Connection to the University Network Revision History Version Date Changes 0.1 01/12/04 David Conway 0.2 02/12/04 David Conway 0.3 19/01/05 David Conway 0.4 21/01/05 David Conway 1.0 07/03/05

More information

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract

IP-VPN Architecture and Implementation O. Satty Joshua 13 December 2001. Abstract Abstract Virtual Private Networks (VPNs) are today becoming the most universal method for remote access. They enable Service Provider to take advantage of the power of the Internet by providing a private

More information

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET

GETTING STARTED WITH A COMPUTER SYSTEM FACTSHEET FACTSHEET When setting up a small business there can be many areas of uncertainty, but getting your IT or computer systems right and connected does not need to be one of them. If your company is either

More information

The Journey Inside SM : The Internet Background Information, Part 1

The Journey Inside SM : The Internet Background Information, Part 1 SM : The Internet Background Information, Part 1 Growth of the Internet It is almost impossible to make it through a day without hearing a reference to the Internet. The Internet began in 1969 as the ARPANET

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Living Online. Module C

Living Online. Module C Living Online Module C Unit 7: Getting Connected Living Online The Living Online examination covers aspects of working in an Internet or networked environment, including basic knowledge of networks and

More information

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Tenth Edition. Copyright 2014 Pearson Education, Inc. Publishing as Prentice Hall Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Technology in Action Chapter 10 Behind the Scenes: Networking and Security in the Business World 2 Chapter Topics Client/Server

More information

ICAI4099A Build an intranet

ICAI4099A Build an intranet ICAI4099A Unit Descriptor Unit Sector Build an intranet This unit defines the competency required to design, build and implement an intranet for a client. It does not however cover aspects relating to

More information

Overview of WAN Connections Module 1

Overview of WAN Connections Module 1 Overview of WAN Connections Module 1 Objectives This module introduces the basic elements of WAN connections and describes the role each element plays in creating that connection. After completing this

More information

Cable Access Q&A - Part One

Cable Access Q&A - Part One Cable Access Q&A - Part One Accessing the Internet using a Cable Network (and a cable modem) is becoming increasingly more popular due to the much greater speed than is available through telephone-modem

More information

Mathatma Gandhi University

Mathatma Gandhi University Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Computer Networking Networks

Computer Networking Networks Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office

More information

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC)

CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC) CERTIFICATE IN COMPUTER HARDWARE AND NETWORK TECHNOLOGY (CCHNT) COURSE STRUCTURE UNIVERSITY SCIENCE INSTRUMENTATION CENTRE (USIC) GUJARAT VIDYAPITH: AHMEDABAD 14 USIC DEPARTMENT: GUJARAT VIDYAPITH CERTIFICATE

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

CMPT 165: The Internet, Part 3

CMPT 165: The Internet, Part 3 CMPT 165: The Internet, Part 3 Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University September 15, 2011 1 Basic Communication Technology Packet Switching (sharing a tranmission

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes ZyXEL V100 (V100 Softphone 1 Runtime License) Support Notes Version 1.00 April 2009 1 Contents Overview 1. Overview of V100 Softphone...3 2. Setting up the V100 Softphone.....4 3. V100 Basic Phone Usage.....7

More information

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network.

Public Network. 1. Relatively long physical distance 2. Requiring a service provider (carrier) Branch Office. Home. Private Network. Introduction to LAN TDC 363 Week 4 Connecting LAN to WAN Book: Chapter 7 1 Outline Wide Area Network (WAN): definition WAN Topologies Choices of WAN technologies Dial-up ISDN T1 Frame Relay DSL Remote

More information

SAN MATEO COUNTY OFFICE OF EDUCATION

SAN MATEO COUNTY OFFICE OF EDUCATION SAN MATEO COUNTY OFFICE OF EDUCATION CLASS TITLE: NETWORK ENGINEER BASIC FUNCTION: Under the direction of the Manager, Network Services, perform a variety of highly complex and specialized activities involved

More information

3 COMPUTER NETWORKS AND NETWORK SECURITY

3 COMPUTER NETWORKS AND NETWORK SECURITY 3 COMPUTER NETWORKS AND NETWORK SECURITY 1. Definition of Computer Network: A network is a set of devices (also known as nodes, terminals or stations) interconnected by communication links. A computer

More information

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test:

Chapter 12 Homework CIT 105 - J001/02/04/06. Name: Date: Course: Test: 1. Which of the following is an advantage of installing a client/server network in a business? a. decentralization of peripherals b. centralization of network security protection c. decentralization of

More information

Computer Networking Type A: Very Short Answer Questions

Computer Networking Type A: Very Short Answer Questions Computer Networking Type A: Very Short Answer Questions 1. Define a network. What is its need? Ans: A computer network is a system in which computers are connected to share information and resources. Computer

More information

Network Fundamentals CHAPTER 1

Network Fundamentals CHAPTER 1 CHAPTER 1 Network Fundamentals 1 Exam objectives in this chapter What Is a Network? Logical Network Topologies Physical Network Topologies Network Types WHAT IS A NETWORK? The basic concept of networking

More information

INFORMATION TECHNOLOGY ENGINEER V

INFORMATION TECHNOLOGY ENGINEER V 1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County

More information

Local Area Network System

Local Area Network System N1 P.0 Hong Kong Certificate of Education Examination Computer and Information Technology Paper 3 : Coursework Report Local Area Network System Student ID : Date : N1 P.1 Content : I. Introduction 2 II.

More information

CST111 Networking Page 1

CST111 Networking Page 1 CST Networking Page 3 34 34 34 4 5 5 5 5 6 6 6 6 7 78 78 78 8 9 9 9 9 0 0 0 0 3 3 3 3 4 Networks and Telecommunications CST: Introduction to Information Technology A Network (Page ) A collection of computers

More information

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2)

8/27/2014. What is a computer network? Introduction. Business Applications (1) Uses of Computer Networks. Business Applications (2) What is a computer network? Introduction Chapter 1 A number of separate but interconnected computers A collection of autonomous computers interconnected by a single technology COURSE FOCUS: design and

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.

More information

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016

BCIS 4680 -- BUSINESS DATA COMMUNICATIONS and NETWORKING Mr. Cengiz Capan -- Spring 2016 Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm

More information

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard

Alexander Nikov. 6. Telecommunications and networks, the Internet. Hyundai Heavy Industries Creates A Wireless Shipyard. a Wireless Shipyard INFO 1500 Introduction to IT Fundamentals Learning Objectives 6. Telecommunications and networks, the Internet 1. Identify the principal components of telecommunications networks and key networking technologies.

More information

Local Area Networks: Software and Support Systems

Local Area Networks: Software and Support Systems Local Area Networks: Software and Support Systems Chapter 8 Learning Objectives After reading this chapter, you should be able to: Identify the main functions of operating systems and network operating

More information

Understanding IP Faxing (Fax over IP)

Understanding IP Faxing (Fax over IP) Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures for voice

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

CONFIGURING THE AVG FIREWALL

CONFIGURING THE AVG FIREWALL Computers that have the new AVG software installed are capable of networking even with the Firewall running. This is a major security improvement from prior years where any firewall generally had to be

More information

TAXONOMY OF TELECOM TERMS

TAXONOMY OF TELECOM TERMS TAXONOMY OF TELECOM TERMS Prepared by TUFF Ltd This short taxonomy is designed to describe the various terms used in today s telecommunications industry. It is not intended to be all embracing but to describe

More information

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business

Building Technologies. Access Control. SiPass integrated Fully expandable system that grows with your business s Building Technologies Access Control SiPass integrated Fully expandable system that grows with your business SiPass integrated : a system, that leaves nothing to be desired. SiPass integrated is the

More information

Understanding IP Faxing (Fax over IP)

Understanding IP Faxing (Fax over IP) A RICOH COMPANY Understanding IP Faxing (Fax over IP) A detailed technical overview of how VoIP technology and IP Faxing (Fax over IP) are changing the way organizations utilize existing network infrastructures

More information

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka

Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka Networking 101 (Networking Basics) Presentation to UCHUG - 1/03/07 G. Skalka What is a network? A computer network is two or more computers connected together using a telecommunication system for the purpose

More information

Celestix Networks, Inc. 702 Brown Road. Fremont, California 94539. Ph 510.668.0700 Fx 510.668.0710. Aries Server Appliance Deployment Guide

Celestix Networks, Inc. 702 Brown Road. Fremont, California 94539. Ph 510.668.0700 Fx 510.668.0710. Aries Server Appliance Deployment Guide Aries Server Appliance Deployment Guide white paper Overview The purpose of this paper is to provide you with information about the installation and deployment of Aries Server Appliance with Celinux version

More information

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123

THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 THE 123 OF WIRELESS SECURITY AT HOME 家 居 WIFI 保 安 123 CONFIGURING YOUR HOME WIRELESS NETWORK Presented by: Mr. Eric Fan, Chairman, PISA Knowledge 123 Firmware 軟 韌 體 Knowledge 123 Home Network Functions

More information

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG

Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments

More information

Technical papers Virtual private networks

Technical papers Virtual private networks Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

Network Security Topologies. Chapter 11

Network Security Topologies. Chapter 11 Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network

More information

Optimize your network for voice.

Optimize your network for voice. RingCentral Office Optimize your network for voice. To contact RingCentral, please visit www.ringcentral.com RingCentral or call 1-800-574-5290. Office 1 Complete Business Phone System Design your network

More information

ADM:49 DPS POLICY MANUAL Page 1 of 5

ADM:49 DPS POLICY MANUAL Page 1 of 5 DEPARTMENT OF PUBLIC SAFETY POLICIES & PROCEDURES SUBJECT: IT OPERATIONS MANAGEMENT POLICY NUMBER EFFECTIVE DATE: 09/09/2008 ADM: 49 REVISION NO: ORIGINAL ORIGINAL ISSUED ON: 09/09/2008 1.0 PURPOSE The

More information

FUNCTIONAL AREA 12. Network Administration (NET)

FUNCTIONAL AREA 12. Network Administration (NET) FUNCTIONAL AREA 12 Network Administration (NET) Incumbents in this functional area address interoperability issues related to hardware, software, and connectivity of communications such as cable, fiber

More information

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION

COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION COMPUTERS ARE YOUR FUTURE CHAPTER 8 WIRED & WIRELESS COMMUNICATION Answers to End-of-Chapter Questions Matching g 1. whiteboard i 2. sending device o 3. streaming j 4. WiFi m 5. Webcam d 6. data transfer

More information

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks.

Bandwidth Primer The basic conditions and terms used to describe information exchange over networks. The basic conditions and terms used to describe information exchange over networks. 385 Jordan Road Troy, NY 12180 Phone 518.286.7000 518.286.2439 www.learnlinc.com Table of Contents TABLE OF CONTENTS...2

More information