SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Networking
WALT: Networking Fundamentals

ď‚ź Know about:
ď‚ź What a network is
ď‚ź Network standards
ď‚ź Different types of networks
 What’s required to connect to a network
ď‚ź Advantages and disadvantages of being
  connected to a network


© CCI Learning Solutions Inc.               2
What is a Network?
ď‚ź Two or more computers connected together to
  share resources and information




© CCI Learning Solutions Inc.                   3
What is a Network?

ď‚ź Computers connected to network can be any
  type of computer
      – Each computer could be configured with
        different operating system
      – No restrictions other than having network
        software understand rules and language
        needed to recognize computer type and
        operating system



© CCI Learning Solutions Inc.                       4
Where the Personal Computer Fits
ď‚ź       PC most commonly used tool to
        connect to network
         – Microprocessor chip is “brains”
            of PC
         – Communicates with other
            components of PC via internal
            connecting device called “bus”
         – To communicate with external
            devices, PC needs interface
            card
ď‚ź       To connect PC to network, need
        interface card for type of network,
        suitable cable, and appropriate
        software



    © CCI Learning Solutions Inc.             5
Networking Standards
ď‚ź When two or more computers interconnected to
  communicate and share resources, you have a network
ď‚ź Protocols are rules governing type of cables, interface
  cards, and electrical signal format
ď‚ź Also govern how information flows between computers on
  network called transport protocols:
   – indicates how computer needs to send information over
     network
   – how receiving computer checks that information was
     received correctly
   – how sending computer must address information so it
     goes to correct destination computer
ď‚ź Application level protocols determine how program on one
  computer communicates with program on another
  computer
 © CCI Learning Solutions Inc.                               6
Peer-to-Peer Networks
ď‚ź Inexpensive and easy to put together
ď‚ź Ideal for home and small office networks
ď‚ź Called peer-to-peer because all computers have equal
  authority
ď‚ź Protocols included in Microsoft Windows 95/98/ME but
  several proprietary peer-to-peer network systems available
  also
ď‚ź Windows NT (or higher) has network component built in
  with more complex protocols to connect computers




 © CCI Learning Solutions Inc.                                 7
Client - Server Networks
ď‚ź Typical on large networks where one computer (network
  server) dedicated to controlling network traffic and
  managing resources
ď‚ź Provides better performance and security as server controls
  who can access what resources and when
ď‚ź Also called central server as all files stored here
ď‚ź Server can be any type of computer with server software
  installed, and users clearly identified with access rights
ď‚ź Client computer can be any type of computer with network
  card and appropriate software to connect to server




 © CCI Learning Solutions Inc.                              8
Topologies - Structure
ď‚ź Star
   – All the network devices connected to a central computer which
     is often used as the file server
ď‚ź Ring
   – Each of the devices on the network is connected in a ring or a
     loop. (Each machine has a connection to the one previous and
     the one after it in the loop)
ď‚ź Bus
   – Each of the devices is connected directly to a main
     communications line, called a bus
ď‚ź MESH
   – All the computers connected to each other
   Click here to view animations on topologies
    CJR 2008                                                      9
Star Network Topology




             Figure 8-
             5
  CJR 2008               10
Star: Advantages and Disadvantages

ď‚ź Advantages of a Star
  – If one cable fails the other stations are not affected
  – Consistent performance even under heavy use
  – Reliable market proven system
  – No problems with collisions of data since each station
    has its own cable to the server
  – Easy to add new stations without disrupting the network
ď‚ź Disadvantages of a Star
  – May be costly to install because of the cable lengths
    required



   CJR 2008                                                  11
Bus Network Topology




                          12
  CJR 2008
             Figure 8-6
Bus: Advantages and Disadvantages

  ď‚ź Advantages of a Bus
         – Easy and inexpensive to install as it requires the
           least amount of cable of the network types
         – Easy to add more stations without disrupting
           the network
  ď‚ź Disadvantages of a Bus
         – The whole network goes down if the main cable
           fails at any point
         – Cable failure is difficult to isolate
         – Network performance degrades under a heavy
           load
         – Information can be transmitted in either
  CJR 2008 direction and occasionally there is data collision.   13
Ring Network Topology




  CJR 2008                14
             Figure 8-7
Ring: Advantages and Disadvantages

ď‚ź Advantages of a Ring
  – No dependence on a central computer or file server and
    each node controls communication to and from itself
  – Transmission around the network is one way only
  – High data transmission rates are possible
ď‚ź Disadvantages of a Ring
  – If one node breaks down transmission is disrupted




   CJR 2008                                              15
Mesh Network Topology




  CJR 2008              16
Mesh: Advantages and Disadvantages

ď‚ź Advantages of a MESH
  – Communication is not disrupted
  – Alternative routes to node points/machines
  – Security – packages can arrive/be sent via many
    different routes
  – Backup – with multiple connections it is easier to
    distribute the data in case of disaster
ď‚ź Disadvantages of a MESH
  – Cost
     • of cables required to link machines together
     • Of machines – similar spec machines required at
        each location to be able to take over
  – Difficult to install and reconfigure
   CJR 2008                                              17
LANs and WANs
ď‚ź Difference lies in who is
  responsible for cabling
     – LAN network stays within
       building
     – WAN if network crosses
       public street and uses
       publicly-supplied cabling
       for part of network
ď‚ź When computer or LAN
  connected to another
  computer or LAN in another
  city or country, public
  portion of WAN represented
  schematically by “cloud”
  © CCI Learning Solutions Inc.    18
Connecting to a Network
ď‚ź Standard network devices facilitate putting
  network together
ď‚ź Cabling comes in standard lengths complete with
  appropriate connectors
ď‚ź Which options, devices, or software you use
  depends on needs and requirements for network
ď‚ź Variety of connection or cabling options available
  to access information to or from network
      – Newer connection types allow the data to be
        transferred between computer and network to
        flow much faster
© CCI Learning Solutions Inc.                         19
Connection/Cabling Options
Coaxial                         Wire with center wire surrounded
                                with insulation and then grounded
                                cover of braided wire.
Fiber Optics                    Made up of bundled glass or plastic
                                fibers (threads) to transmit data.
Broadband                       Single wire that can handle multiple
                                paths or channels
Wireless                        Work with radio frequencies for
                                data transmission.
Infrared                        Wireless option works with infrared
                                light waves to transmit data.
© CCI Learning Solutions Inc.                                       20
The Network Interface Card (NIC)

ď‚ź To connect to network, PC
  must have network interface
  card (NIC)
ď‚ź Each NIC has unique
  number or address and
  connector appropriate for
  type of cabling chosen
ď‚ź Come in variety of styles
  and models appropriate for
  computer type being
  connected to network

© CCI Learning Solutions Inc.      21
The Hub
ď‚ź Connect PCs together to
  form network
       – Cable from NIC in each
         PC connects to port on
         hub
       – Cable from hub
         required to connect to
         network
ď‚ź Relatively inexpensive to
  purchase and install
ď‚ź Main disadvantage of hub
  is all users connected to
  hub share equal maximum
  transfer speed

 © CCI Learning Solutions Inc.    22
Network Segments
ď‚ź If network has two or more network interface
  cards, each card considered a segment
ď‚ź Segments allow network traffic to flow faster,
  depending on which devices are used to
  manage amount of requests at network




© CCI Learning Solutions Inc.                  23
The Bridge

ď‚ź Connects network segments
  to handle network requests
ď‚ź Do not analyze or re-route
  messages which makes
  receiving information faster
ď‚ź Will not re-route or re-
  transmit information if
  anything is wrong with
  connection at either end until
  first transmission received
  completely



 © CCI Learning Solutions Inc.     24
The Router
ď‚ź Work similar to bridges except examine destination address
  of information and pass it on appropriate segments only
ď‚ź Bridges may be faster than routers but will not check
  information coming in
ď‚ź When installing wireless router to network, be sure to set
  up encryption security options to prevent unauthorized
  access from external sources using connection




 © CCI Learning Solutions Inc.                            25
The Switch
ď‚ź Works similar to hub
  except that each user
  connected to switch
  has access to full
  bandwidth
ď‚ź Can also be used to
  join network segments




© CCI Learning Solutions Inc.   26
The Firewall
ď‚ź Can be physical device or specialized software installed to
  prevent any unauthorized external access into any network
  connected to Internet
ď‚ź Designed to check any messages that travel through
  network and ensure it matches specified security
  requirements set up by company




 © CCI Learning Solutions Inc.                              27
Benefits of Networking
ď‚ź Networking does not make individual
  workstations faster or more powerful!
ď‚ź Benefits of networking fall into two main
  categories:
      – Communication
      – Sharing of resources




© CCI Learning Solutions Inc.                 28
Communicating
ď‚ź To send information generated on stand-alone PC
  requires manual process whereas users on network
  send information electronically
ď‚ź Messages can be stored on network and are not lost if
  recipient isn’t available when messages sent or
  received
ď‚ź Many communication software allows users to
  instantly message someone else without using e‑mail
   – “Real time interaction”
   – Multiple users can participate in same conversation
   – Some limitations but can be minor issues in
     exchange for ability to communicate with each
     other in real time
 © CCI Learning Solutions Inc.                         29
Sharing Devices
ď‚ź Some devices can be expensive to set up on
  every PC and networking allows devices to be
  shared
      – Can be cost savings for capital expenditures as
        well as productivity time for technical support
        or maintenance
ď‚ź Connecting devices shared by multiple users via
  network allows Network Administrator to perform
  updates or troubleshoot problems from server
  location


© CCI Learning Solutions Inc.                         30
Sharing Information
ď‚ź In network environment, files or folders on any
  disk can be set up to be shared
ď‚ź Whenever group of people want to share
  information, referred to as workgroup
   – Group of users who share business documents
     transfer or save files to common network
   – Common network becomes centralized server
     wherein server has control over which files are
     accessed and which users can use those files
ď‚ź Extremely helpful to network administrator for
  setting up rights or performing maintenance for
  workgroups
© CCI Learning Solutions Inc.                      31
Using Dedicated Servers
ď‚ź Network
   – Control network traffic and security
   – May perform same tasks and contain same information
     as file or database server
ď‚ź File
   – High speed, high capacity hard drive, usually to handle
     back-up needs
ď‚ź Web
   – Stores information in web format and information
     accessed with browser for company intranets
ď‚ź Mail
   – Manages high volume of internal and external e-mail
ď‚ź Database
   – Generally used in complex database applications where
     many users need to access data at same time
 © CCI Learning Solutions Inc.                                 32
Disadvantages of Networking
Dependency
 Big disadvantage in that organization’s activities
  depend on network to be up and running
      – If network fails, users lose access to
        information and ability to communicate
        electronically
      – In some instances can work from local drive,
        but if company’s information stored and shared
        from server, cost of downtime may be more
        expensive in long term


© CCI Learning Solutions Inc.                          33
Disadvantages of Networking
Expensive
ď‚ź For installation and maintenance
ď‚ź If network complex with many users, additional
  need and expense to employ network
  administrator
 Need “disaster and recovery” plan, not just for
  theft or security breach, but also power outages
  or potential hardware failure
ď‚ź Setting up or upgrading a network server should
  always be discussed with network administrator
  or consultant who specializes in networks prior to
  making any decisions
© CCI Learning Solutions Inc.                      34
Disadvantages of Networking
Security Risk
ď‚ź Every person who logs into server has valid login id,
  and set up according to company’s standards
ď‚ź Every person who logs into server has valid password
ď‚ź When setting up new user, ensure name and
  information about user entered correctly
ď‚ź Audit each user to ensure access rights to programs
  and files are same
ď‚ź Requests received for access rights must have
  signature from corresponding manager
ď‚ź Delete users who no longer work for company
ď‚ź Do not ever give out passwords
 © CCI Learning Solutions Inc.                            35
Disadvantages of Networking
ď‚ź Staff who work with network administrator should have
  own login id and password set up
ď‚ź Firewall set up for Internet connection that has been set up
  to check user id when sending or receiving messages
ď‚ź If access authorized for users outside network, ensure
  firewall checks these user ids when request received to
  access network from remote location
ď‚ź Restrict any users from being able to delete files from any
  folder on any network drives
ď‚ź Antivirus program installed on server is current and has
  latest protection files
ď‚ź Perform maintenance checks periodically as well to see
  what activities may have occurred
ď‚ź Encourage users to have latest updates of Windows on local
  computers
 © CCI Learning Solutions Inc.                              36
Disadvantages of Networking
Loss of Autonomy or Privacy
ď‚ź Obliged to work in network environment
ď‚ź Privacy may be concern for confidential material
 “Private” drive set up on network for personal or
  confidential files but network administrator can
  still see these files
ď‚ź If share computer, even though they log in with
  their own id, they can still see files on local
ď‚ź General business rules dictate that anything you
  work on a company computer belongs to the
  company, even though you may work on it on
  your own time
© CCI Learning Solutions Inc.                         37
Disadvantages of Networking
Viruses
ď‚ź Vulnerable to virus attacks
ď‚ź Some viruses, called worm viruses, specifically
  target servers
ď‚ź New viruses being created every day and it
  becomes more prudent to read screen carefully
  before automatically opening message or clicking
  highlighted button on screen
ď‚ź All antivirus programs provide a feature to
  automatically detect in “real time”
ď‚ź Remember to run scan of computer on frequent
  basis and check for updates
© CCI Learning Solutions Inc.                    38

Weitere ähnliche Inhalte

Was ist angesagt?

Computer networks
Computer networksComputer networks
Computer networksMenath Winni
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...shahbaz ahmad
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabhaSuprabha Sahoo
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topologyDEVI NATARAJAN
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi Swapi Pawar
 
Computer network
Computer networkComputer network
Computer networkkainat fatima
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingRasan Samarasinghe
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technologyChittagong University
 
Local area network.
Local area network.Local area network.
Local area network.Anu varghese
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.pptSiddique Ibrahim
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology'sRaja Adapa
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer networkSaahilIT
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic conceptsAnkit Garg
 
Networking ppt
Networking ppt Networking ppt
Networking ppt Shovan Mandal
 

Was ist angesagt? (20)

Computer networks
Computer networksComputer networks
Computer networks
 
Network topology
Network topologyNetwork topology
Network topology
 
Types of computer network ...
Types of computer network ...Types of computer network ...
Types of computer network ...
 
Basic networking in power point by suprabha
Basic networking in power point by suprabhaBasic networking in power point by suprabha
Basic networking in power point by suprabha
 
Network types & its topology
Network types & its topologyNetwork types & its topology
Network types & its topology
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Networking ppt by swapi
Networking ppt by swapi Networking ppt by swapi
Networking ppt by swapi
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Computer network
Computer networkComputer network
Computer network
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
Communication information technology
Communication information technologyCommunication information technology
Communication information technology
 
Computer network
Computer networkComputer network
Computer network
 
Local area network.
Local area network.Local area network.
Local area network.
 
Transmission Mode
Transmission ModeTransmission Mode
Transmission Mode
 
Network topology.ppt
Network topology.pptNetwork topology.ppt
Network topology.ppt
 
Network Topology's
Network Topology'sNetwork Topology's
Network Topology's
 
Basic concept of computer network
Basic concept of computer networkBasic concept of computer network
Basic concept of computer network
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 

Andere mochten auch

Techniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabTechniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabChristopher Casal
 
Welcome To The Computer Lab
Welcome To The Computer LabWelcome To The Computer Lab
Welcome To The Computer LabD Jarrell
 
Computer Lab Expectations
Computer Lab ExpectationsComputer Lab Expectations
Computer Lab Expectationsjaimejoyh
 
Rules & regulation in ict lab
Rules & regulation in ict labRules & regulation in ict lab
Rules & regulation in ict labNik Ainy
 
Ppt on managing it classrooms
Ppt on managing it classroomsPpt on managing it classrooms
Ppt on managing it classroomsMarilu Bandolon
 
Chapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thChapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thHarsh Mathur
 
Technology Tools In The Classroom: Using Computers To Engage Your Students
Technology Tools In The Classroom:  Using Computers To Engage Your StudentsTechnology Tools In The Classroom:  Using Computers To Engage Your Students
Technology Tools In The Classroom: Using Computers To Engage Your Studentsforestfortrees
 
Classroom Management in the Computer Lab
Classroom Management in the Computer LabClassroom Management in the Computer Lab
Classroom Management in the Computer Labhamptonk
 
traditional teaching and learning and computer teaching and learning
traditional teaching and learning and computer teaching and learningtraditional teaching and learning and computer teaching and learning
traditional teaching and learning and computer teaching and learningMohammad Yousif
 
Low-Performing Students - Why They Fall Behind and How to Help Them Succeed
Low-Performing Students- Why They Fall Behind and How to Help Them Succeed   Low-Performing Students- Why They Fall Behind and How to Help Them Succeed
Low-Performing Students - Why They Fall Behind and How to Help Them Succeed EduSkills OECD
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptDot Rutherford
 
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBA
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBATRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBA
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBAJohysfer
 
Managing the 21st century classroom
Managing the 21st century classroomManaging the 21st century classroom
Managing the 21st century classroomCarlo Magno
 
Red De Computadoras
Red De ComputadorasRed De Computadoras
Red De Computadorasguest896c6a
 
Smart Classroom
Smart ClassroomSmart Classroom
Smart Classroombutterfly2020
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerNur Azlina
 

Andere mochten auch (20)

Ict 230613
Ict 230613Ict 230613
Ict 230613
 
Techniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer LabTechniques, Tips & Tools for Managing a Computer Lab
Techniques, Tips & Tools for Managing a Computer Lab
 
Welcome To The Computer Lab
Welcome To The Computer LabWelcome To The Computer Lab
Welcome To The Computer Lab
 
Computer Lab Expectations
Computer Lab ExpectationsComputer Lab Expectations
Computer Lab Expectations
 
Rules & regulation in ict lab
Rules & regulation in ict labRules & regulation in ict lab
Rules & regulation in ict lab
 
Ms Amif 2010
Ms Amif 2010Ms Amif 2010
Ms Amif 2010
 
Modern education
Modern educationModern education
Modern education
 
Ppt on managing it classrooms
Ppt on managing it classroomsPpt on managing it classrooms
Ppt on managing it classrooms
 
Chapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12thChapter 1 computer networking Class 12th
Chapter 1 computer networking Class 12th
 
Technology Tools In The Classroom: Using Computers To Engage Your Students
Technology Tools In The Classroom:  Using Computers To Engage Your StudentsTechnology Tools In The Classroom:  Using Computers To Engage Your Students
Technology Tools In The Classroom: Using Computers To Engage Your Students
 
Computer lab etiquette
Computer lab etiquetteComputer lab etiquette
Computer lab etiquette
 
Classroom Management in the Computer Lab
Classroom Management in the Computer LabClassroom Management in the Computer Lab
Classroom Management in the Computer Lab
 
traditional teaching and learning and computer teaching and learning
traditional teaching and learning and computer teaching and learningtraditional teaching and learning and computer teaching and learning
traditional teaching and learning and computer teaching and learning
 
Low-Performing Students - Why They Fall Behind and How to Help Them Succeed
Low-Performing Students- Why They Fall Behind and How to Help Them Succeed   Low-Performing Students- Why They Fall Behind and How to Help Them Succeed
Low-Performing Students - Why They Fall Behind and How to Help Them Succeed
 
Welcome To Your Computer Lab Ppt
Welcome To Your Computer Lab PptWelcome To Your Computer Lab Ppt
Welcome To Your Computer Lab Ppt
 
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBA
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBATRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBA
TRADITIONAL AND MODERN EDUCATION BY FERNANDA QUINCHIMBA
 
Managing the 21st century classroom
Managing the 21st century classroomManaging the 21st century classroom
Managing the 21st century classroom
 
Red De Computadoras
Red De ComputadorasRed De Computadoras
Red De Computadoras
 
Smart Classroom
Smart ClassroomSmart Classroom
Smart Classroom
 
Computer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using ComputerComputer Lab Management and Ethics in Using Computer
Computer Lab Management and Ethics in Using Computer
 

Ă„hnlich wie Networking Fundamentals in 40 Characters

CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.pptUndeadban2
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Ramadan Babers, PhD
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05Ramadan Babers, PhD
 
01 - Topology.ppt
01 - Topology.ppt01 - Topology.ppt
01 - Topology.pptssuserf7cd2b
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networkingNor Zailani
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of NetworksUttar Tamang âś”
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4Vasanti Dutta
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2wilfredo dela cerna
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And TelecommunicationsUMaine
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESManas Rai
 
Lec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxLec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxHasankaWijesinghe1
 
Computer Networks 2
Computer Networks 2Computer Networks 2
Computer Networks 2Mr Smith
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Conceptszaisahil
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxchristalgrieg
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsSubas Paudel
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyRaphaff
 
Computer network updated
Computer network updatedComputer network updated
Computer network updatedKing Abidi
 

Ă„hnlich wie Networking Fundamentals in 40 Characters (20)

CSIT108 Module-2.ppt
CSIT108 Module-2.pptCSIT108 Module-2.ppt
CSIT108 Module-2.ppt
 
Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018Introduction to computer_lec_05_fall_2018
Introduction to computer_lec_05_fall_2018
 
Introduction to computer_lec_05
Introduction to computer_lec_05Introduction to computer_lec_05
Introduction to computer_lec_05
 
01 - Topology.ppt
01 - Topology.ppt01 - Topology.ppt
01 - Topology.ppt
 
Tata Chuna
Tata Chuna Tata Chuna
Tata Chuna
 
1 introduction to-networking
1 introduction to-networking1 introduction to-networking
1 introduction to-networking
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Unit 2B.pdf
Unit 2B.pdfUnit 2B.pdf
Unit 2B.pdf
 
Networking lec1 4
Networking lec1 4Networking lec1 4
Networking lec1 4
 
Install network cable module CSS NC2
Install network cable module CSS NC2Install network cable module CSS NC2
Install network cable module CSS NC2
 
Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Lec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptxLec 01 - Introduction to Computer Network.pptx
Lec 01 - Introduction to Computer Network.pptx
 
Computer Networks 2
Computer Networks 2Computer Networks 2
Computer Networks 2
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 
This course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docxThis course introduces students to issues in IT infrastructu.docx
This course introduces students to issues in IT infrastructu.docx
 
Computer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber EthicsComputer Network, Internet, Computer Security and Cyber Ethics
Computer Network, Internet, Computer Security and Cyber Ethics
 
Fundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of TechnologyFundamentals of Computer Networking - Shift Education of Technology
Fundamentals of Computer Networking - Shift Education of Technology
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Computer network updated
Computer network updatedComputer network updated
Computer network updated
 

Mehr von mrscjrobertson

36 class presentations
36 class presentations36 class presentations
36 class presentationsmrscjrobertson
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systemsmrscjrobertson
 
Section 1 for blog
Section 1 for blogSection 1 for blog
Section 1 for blogmrscjrobertson
 
Using information
Using informationUsing information
Using informationmrscjrobertson
 

Mehr von mrscjrobertson (8)

36 class presentations
36 class presentations36 class presentations
36 class presentations
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Wan internet
Wan internetWan internet
Wan internet
 
E mail features
E mail featuresE mail features
E mail features
 
Organisational information systems
Organisational information systemsOrganisational information systems
Organisational information systems
 
Robots
RobotsRobots
Robots
 
Section 1 for blog
Section 1 for blogSection 1 for blog
Section 1 for blog
 
Using information
Using informationUsing information
Using information
 

KĂĽrzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

KĂĽrzlich hochgeladen (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Networking Fundamentals in 40 Characters

  • 2. WALT: Networking Fundamentals ď‚ź Know about: ď‚ź What a network is ď‚ź Network standards ď‚ź Different types of networks ď‚ź What’s required to connect to a network ď‚ź Advantages and disadvantages of being connected to a network © CCI Learning Solutions Inc. 2
  • 3. What is a Network? ď‚ź Two or more computers connected together to share resources and information © CCI Learning Solutions Inc. 3
  • 4. What is a Network? ď‚ź Computers connected to network can be any type of computer – Each computer could be configured with different operating system – No restrictions other than having network software understand rules and language needed to recognize computer type and operating system © CCI Learning Solutions Inc. 4
  • 5. Where the Personal Computer Fits ď‚ź PC most commonly used tool to connect to network – Microprocessor chip is “brains” of PC – Communicates with other components of PC via internal connecting device called “bus” – To communicate with external devices, PC needs interface card ď‚ź To connect PC to network, need interface card for type of network, suitable cable, and appropriate software © CCI Learning Solutions Inc. 5
  • 6. Networking Standards ď‚ź When two or more computers interconnected to communicate and share resources, you have a network ď‚ź Protocols are rules governing type of cables, interface cards, and electrical signal format ď‚ź Also govern how information flows between computers on network called transport protocols: – indicates how computer needs to send information over network – how receiving computer checks that information was received correctly – how sending computer must address information so it goes to correct destination computer ď‚ź Application level protocols determine how program on one computer communicates with program on another computer © CCI Learning Solutions Inc. 6
  • 7. Peer-to-Peer Networks ď‚ź Inexpensive and easy to put together ď‚ź Ideal for home and small office networks ď‚ź Called peer-to-peer because all computers have equal authority ď‚ź Protocols included in Microsoft Windows 95/98/ME but several proprietary peer-to-peer network systems available also ď‚ź Windows NT (or higher) has network component built in with more complex protocols to connect computers © CCI Learning Solutions Inc. 7
  • 8. Client - Server Networks ď‚ź Typical on large networks where one computer (network server) dedicated to controlling network traffic and managing resources ď‚ź Provides better performance and security as server controls who can access what resources and when ď‚ź Also called central server as all files stored here ď‚ź Server can be any type of computer with server software installed, and users clearly identified with access rights ď‚ź Client computer can be any type of computer with network card and appropriate software to connect to server © CCI Learning Solutions Inc. 8
  • 9. Topologies - Structure ď‚ź Star – All the network devices connected to a central computer which is often used as the file server ď‚ź Ring – Each of the devices on the network is connected in a ring or a loop. (Each machine has a connection to the one previous and the one after it in the loop) ď‚ź Bus – Each of the devices is connected directly to a main communications line, called a bus ď‚ź MESH – All the computers connected to each other Click here to view animations on topologies CJR 2008 9
  • 10. Star Network Topology Figure 8- 5 CJR 2008 10
  • 11. Star: Advantages and Disadvantages ď‚ź Advantages of a Star – If one cable fails the other stations are not affected – Consistent performance even under heavy use – Reliable market proven system – No problems with collisions of data since each station has its own cable to the server – Easy to add new stations without disrupting the network ď‚ź Disadvantages of a Star – May be costly to install because of the cable lengths required CJR 2008 11
  • 12. Bus Network Topology 12 CJR 2008 Figure 8-6
  • 13. Bus: Advantages and Disadvantages ď‚ź Advantages of a Bus – Easy and inexpensive to install as it requires the least amount of cable of the network types – Easy to add more stations without disrupting the network ď‚ź Disadvantages of a Bus – The whole network goes down if the main cable fails at any point – Cable failure is difficult to isolate – Network performance degrades under a heavy load – Information can be transmitted in either CJR 2008 direction and occasionally there is data collision. 13
  • 14. Ring Network Topology CJR 2008 14 Figure 8-7
  • 15. Ring: Advantages and Disadvantages ď‚ź Advantages of a Ring – No dependence on a central computer or file server and each node controls communication to and from itself – Transmission around the network is one way only – High data transmission rates are possible ď‚ź Disadvantages of a Ring – If one node breaks down transmission is disrupted CJR 2008 15
  • 16. Mesh Network Topology CJR 2008 16
  • 17. Mesh: Advantages and Disadvantages ď‚ź Advantages of a MESH – Communication is not disrupted – Alternative routes to node points/machines – Security – packages can arrive/be sent via many different routes – Backup – with multiple connections it is easier to distribute the data in case of disaster ď‚ź Disadvantages of a MESH – Cost • of cables required to link machines together • Of machines – similar spec machines required at each location to be able to take over – Difficult to install and reconfigure CJR 2008 17
  • 18. LANs and WANs ď‚ź Difference lies in who is responsible for cabling – LAN network stays within building – WAN if network crosses public street and uses publicly-supplied cabling for part of network ď‚ź When computer or LAN connected to another computer or LAN in another city or country, public portion of WAN represented schematically by “cloud” © CCI Learning Solutions Inc. 18
  • 19. Connecting to a Network ď‚ź Standard network devices facilitate putting network together ď‚ź Cabling comes in standard lengths complete with appropriate connectors ď‚ź Which options, devices, or software you use depends on needs and requirements for network ď‚ź Variety of connection or cabling options available to access information to or from network – Newer connection types allow the data to be transferred between computer and network to flow much faster © CCI Learning Solutions Inc. 19
  • 20. Connection/Cabling Options Coaxial Wire with center wire surrounded with insulation and then grounded cover of braided wire. Fiber Optics Made up of bundled glass or plastic fibers (threads) to transmit data. Broadband Single wire that can handle multiple paths or channels Wireless Work with radio frequencies for data transmission. Infrared Wireless option works with infrared light waves to transmit data. © CCI Learning Solutions Inc. 20
  • 21. The Network Interface Card (NIC) ď‚ź To connect to network, PC must have network interface card (NIC) ď‚ź Each NIC has unique number or address and connector appropriate for type of cabling chosen ď‚ź Come in variety of styles and models appropriate for computer type being connected to network © CCI Learning Solutions Inc. 21
  • 22. The Hub ď‚ź Connect PCs together to form network – Cable from NIC in each PC connects to port on hub – Cable from hub required to connect to network ď‚ź Relatively inexpensive to purchase and install ď‚ź Main disadvantage of hub is all users connected to hub share equal maximum transfer speed © CCI Learning Solutions Inc. 22
  • 23. Network Segments ď‚ź If network has two or more network interface cards, each card considered a segment ď‚ź Segments allow network traffic to flow faster, depending on which devices are used to manage amount of requests at network © CCI Learning Solutions Inc. 23
  • 24. The Bridge ď‚ź Connects network segments to handle network requests ď‚ź Do not analyze or re-route messages which makes receiving information faster ď‚ź Will not re-route or re- transmit information if anything is wrong with connection at either end until first transmission received completely © CCI Learning Solutions Inc. 24
  • 25. The Router ď‚ź Work similar to bridges except examine destination address of information and pass it on appropriate segments only ď‚ź Bridges may be faster than routers but will not check information coming in ď‚ź When installing wireless router to network, be sure to set up encryption security options to prevent unauthorized access from external sources using connection © CCI Learning Solutions Inc. 25
  • 26. The Switch ď‚ź Works similar to hub except that each user connected to switch has access to full bandwidth ď‚ź Can also be used to join network segments © CCI Learning Solutions Inc. 26
  • 27. The Firewall ď‚ź Can be physical device or specialized software installed to prevent any unauthorized external access into any network connected to Internet ď‚ź Designed to check any messages that travel through network and ensure it matches specified security requirements set up by company © CCI Learning Solutions Inc. 27
  • 28. Benefits of Networking ď‚ź Networking does not make individual workstations faster or more powerful! ď‚ź Benefits of networking fall into two main categories: – Communication – Sharing of resources © CCI Learning Solutions Inc. 28
  • 29. Communicating ď‚ź To send information generated on stand-alone PC requires manual process whereas users on network send information electronically ď‚ź Messages can be stored on network and are not lost if recipient isn’t available when messages sent or received ď‚ź Many communication software allows users to instantly message someone else without using e‑mail – “Real time interaction” – Multiple users can participate in same conversation – Some limitations but can be minor issues in exchange for ability to communicate with each other in real time © CCI Learning Solutions Inc. 29
  • 30. Sharing Devices ď‚ź Some devices can be expensive to set up on every PC and networking allows devices to be shared – Can be cost savings for capital expenditures as well as productivity time for technical support or maintenance ď‚ź Connecting devices shared by multiple users via network allows Network Administrator to perform updates or troubleshoot problems from server location © CCI Learning Solutions Inc. 30
  • 31. Sharing Information ď‚ź In network environment, files or folders on any disk can be set up to be shared ď‚ź Whenever group of people want to share information, referred to as workgroup – Group of users who share business documents transfer or save files to common network – Common network becomes centralized server wherein server has control over which files are accessed and which users can use those files ď‚ź Extremely helpful to network administrator for setting up rights or performing maintenance for workgroups © CCI Learning Solutions Inc. 31
  • 32. Using Dedicated Servers ď‚ź Network – Control network traffic and security – May perform same tasks and contain same information as file or database server ď‚ź File – High speed, high capacity hard drive, usually to handle back-up needs ď‚ź Web – Stores information in web format and information accessed with browser for company intranets ď‚ź Mail – Manages high volume of internal and external e-mail ď‚ź Database – Generally used in complex database applications where many users need to access data at same time © CCI Learning Solutions Inc. 32
  • 33. Disadvantages of Networking Dependency ď‚ź Big disadvantage in that organization’s activities depend on network to be up and running – If network fails, users lose access to information and ability to communicate electronically – In some instances can work from local drive, but if company’s information stored and shared from server, cost of downtime may be more expensive in long term © CCI Learning Solutions Inc. 33
  • 34. Disadvantages of Networking Expensive ď‚ź For installation and maintenance ď‚ź If network complex with many users, additional need and expense to employ network administrator ď‚ź Need “disaster and recovery” plan, not just for theft or security breach, but also power outages or potential hardware failure ď‚ź Setting up or upgrading a network server should always be discussed with network administrator or consultant who specializes in networks prior to making any decisions © CCI Learning Solutions Inc. 34
  • 35. Disadvantages of Networking Security Risk ď‚ź Every person who logs into server has valid login id, and set up according to company’s standards ď‚ź Every person who logs into server has valid password ď‚ź When setting up new user, ensure name and information about user entered correctly ď‚ź Audit each user to ensure access rights to programs and files are same ď‚ź Requests received for access rights must have signature from corresponding manager ď‚ź Delete users who no longer work for company ď‚ź Do not ever give out passwords © CCI Learning Solutions Inc. 35
  • 36. Disadvantages of Networking ď‚ź Staff who work with network administrator should have own login id and password set up ď‚ź Firewall set up for Internet connection that has been set up to check user id when sending or receiving messages ď‚ź If access authorized for users outside network, ensure firewall checks these user ids when request received to access network from remote location ď‚ź Restrict any users from being able to delete files from any folder on any network drives ď‚ź Antivirus program installed on server is current and has latest protection files ď‚ź Perform maintenance checks periodically as well to see what activities may have occurred ď‚ź Encourage users to have latest updates of Windows on local computers © CCI Learning Solutions Inc. 36
  • 37. Disadvantages of Networking Loss of Autonomy or Privacy ď‚ź Obliged to work in network environment ď‚ź Privacy may be concern for confidential material ď‚ź “Private” drive set up on network for personal or confidential files but network administrator can still see these files ď‚ź If share computer, even though they log in with their own id, they can still see files on local ď‚ź General business rules dictate that anything you work on a company computer belongs to the company, even though you may work on it on your own time © CCI Learning Solutions Inc. 37
  • 38. Disadvantages of Networking Viruses ď‚ź Vulnerable to virus attacks ď‚ź Some viruses, called worm viruses, specifically target servers ď‚ź New viruses being created every day and it becomes more prudent to read screen carefully before automatically opening message or clicking highlighted button on screen ď‚ź All antivirus programs provide a feature to automatically detect in “real time” ď‚ź Remember to run scan of computer on frequent basis and check for updates © CCI Learning Solutions Inc. 38

Hinweis der Redaktion

  1. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 1 This is the third portion for the Module Objectives of the IC 3 Computing Fundamentals exam. CCI has broken down the full exam into two units to facilitate a user-friendly learning environment. Focus in each unit will be on learning the individual components for that portion of the exams and develop/enhance knowledge and skill sets for the student. This Unit is meant to be a digital literacy course to introduce the Internet and how to get connected to the Internet (or other networks). Each unit is broken down into small modules of information for the students to take in. Use this as a guide to let students know what topics will be covered and where they might find information on same. Some units will be a bit larger than others, depending on the amount of pictures used or the type of information. Be prepared that some lessons will require you to do more discussions with the class whereas others can be enhanced through visual aids, e.g., having a hard drive that has been taken apart to show them what it comprises of, different memory chips, etc.
  2. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 2 This is an outline of the topics covered in this Lesson. Wherever possible, try to have additional pictures or examples of topics discussed in this Lesson. Use the book as reference if you don’t have additional pictures or hardware examples.
  3. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 2 Objectives 1.1.1, 1.1.2 Introduce what a network is in very simple terms. Students do not need to know the whole intricacies of what a network is and how it is connected together; focus instead on how a network can be set up the moment you connect two or more computers together to share information or devices. Open the discussion to the class of possible networks they already use and may not be aware of, many of which will likely be discussed in this course (or already mentioned in Unit 1 of the Computing Fundamentals Module). Examples could be the ATM machine, buying insurance, when the realtor displays information about different homes, etc.
  4. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 2 Objective 1.1.3 Have a discussion with the class regarding the types of computers that can be hooked up to a network. Review back to Module A regarding all the different types of computers and then discuss how many are still being used today in various ways. For example, an insurance company may have the history of all insurance purchases stored on a mainframe that is then accessed from PC’s by employees in Head Office and microcomputers set up as terminals in the branch offices. Have students discuss other types of businesses where a network may be used with different computer types, e.g., retail stores, sports organization, government offices, etc.
  5. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 3 Objective 1.1.2 This is a very simple explanation of how a PC can be connected to a network. For the most part, users tend to see only what’s happening on the outside. You may want to have students look at the external components that allow the system they are using to connect to the network at your location. For example, have them find the network cable that connects from the back of the computer to the wall, have them notice the type of connection (look similar to the telephone jack) and how there’s one for the computer as well on the wall (or hub), etc. Don’t go into any technical information regarding how networks are connected. The most important thing here is to point out how the computer needs a card that recognizes the computer type, the appropriate cable, and a connection type to the network.
  6. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 3 Objective 1.1.2 As with most areas in the computer industry, standards have been set up for networks so that a variety of computers can share information regardless of location or type. As technology advances, the speed and size of information that can be shared has increased significantly but must still follow standards. Briefly discuss what protocols are and how they are basically rules that have been set up so information can be shared. This is true regardless of whether it’s for sending information or identifying information for use with applications. As you can point out with the upcoming pages and slides, standards have been set up for different size networks.
  7. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 4 Objectives 1.1.1, 1.1.3 Have a discussion with the class on why this is the most common type of network set up for the home. Do not go into whether it can be a wireless version versus cable. This topic only addresses the fact that most homes tend to have this type of network as everyone can share the same information at any time. You may also want to build into the discussion about how some small businesses may have a peer-to-peer network initially but likely will upgrade to a more complex type of network as the business grows.
  8. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 4 Objective 1.1.3 This is the typical type of network that most people will find when they walk into a large company, although it looks as if each employee has a PC only. In most cases, the data they access comes from a central computer which generally is the network server. The configurations can be much more complex than the diagram shown here. You may want to use this diagram as further explanation on how information can be shared.
  9. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  10. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  11. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  12. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  13. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  14. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  15. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  16. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  17. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide
  18. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 5 Objective 1.1.2 Review from Module A about the different types of networks that are possible. For the purpose of this courseware, focus is primarily on LANs and WANs. Remind students of what these acronyms stand for and then discuss the difference between the two types of networks. Introduce the cloud and what it means as it will be used more frequently as you progress through the book.
  19. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 6 Objectives 1.1.1, 1.1.3 This begins the discussion of what is required in order to connect a PC to a network. It does not go into detail from the network installation or setup area. Keep the discussions simple in that all networks require the same types of components in order to connect to a network but the emphasis here is on what is needed for the PC to connect to a network of some sort.
  20. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 6 Be sure to discuss the benefits and disadvantages of each type of connection. Many of these are used either in entirety or in combination with other types of cabling. For instance, the majority of the company may be connected to the network with coaxial cable and the users with notebooks have wireless technology for portability purposes.
  21. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 6-7 For simplicity purposes, only an internal and wireless card for the PC is shown here. You may want to refer students back to the book for the other types, or if you have actual hardware, distribute for the class to review.
  22. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 7 If you have an example of a hub, be sure to use it as a demonstration to the class on what and how a hub can be useful for connecting several computers to a network. Hubs can be set up for a small number of users (home) or a large number of users (one floor) at a branch. Generally hubs can be purchased with a maximum number of ports based on the type of network set up; the larger the number of ports the more expensive the hub will be. At the same time you may want to discuss how hubs are not required with wireless technology; companies have begun switching to wireless networks if the bandwidth allows for the same or faster speeds for transferring data.
  23. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 8 Segments are basically different areas or locations that are connected together to share information and yet keep the flow of information faster within its own area. This could be similar to a branch office where information about customers in their locale are kept in hard copies in the filing cabinets, and electronic versions of the forms may be stored on a server in the branch that then connects to Head Office for archive storage. As the Head Office server recognizes the branch as a segment, other branches (segments) can also access the same information from the first branch when required. In the meantime, transactions processed on the first branch are faster as it is moving through their own server first and does not need to go through the Head Office server unless someone outside of their location is requesting information.
  24. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 8 Relate the bridge device here to an actual bridge that connects two different cities. Traffic can flow back and forth; the moment there is a problem on the bridge (e.g., broken railing, large hole in one of the lanes, etc.), nothing can be done to fix the flow or the bridge itself until all cars are off the bridge. Once the problem is fixed, then traffic can reflow. A bridge is one method of connecting segments to the main network. This option isn’t used as often anymore by network specialists; most networks now have routers or switches installed instead to allow for constant flow of information, even with problems in the original transmission.
  25. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 8 There will always be pros and cons of each type of device used to connect different segments to the network. The deciding factor will depend on what type of error detection and data transfer requirements. Most companies use routers in one form or another; most popular types of routers are for managing e-mail. Stress the last point here as many home users are switching to wireless so multiple computers can share the Internet connection. However, they don’t always set up the security options and may find that there are additional costs or problems with their computers based on the type of access they leave open to unauthorized users.
  26. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 8 This is the most common type of connector device that networks will use as they take full advantage of the size of the bandwidth from the computer to the network. This open can sometimes be more expense than the hub or router option, but does provide faster access times for users when requesting information from the server.
  27. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 9 Be sure to use the diagram as part of your discussion on firewalls. Firewalls have become much more critical in the past few years as more people get connected to the Internet and want to prevent unauthorized people from accessing the information on their server, or using their connection for free, but mainly to protect the users on the network from any viruses or other types of dangerous information usually sent via e-mail.
  28. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 9 As you begin to look at the benefits of being on a network with the class, be sure to emphasize that being on a network does not make your system faster. What it really does is give you access to other information or other people you would not be able to access as a stand-alone system. Most people get confused about the purpose of a network and do not fully understand the benefits of networking. In most cases, they consider networks to be used by companies only and do not relate this to the Internet or setting one up at home.
  29. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 9 This list of benefits for communicating is not complete by any means. These are the main advantages that most people want or enjoy about being online and having the option to communicate with others, wherever they may be. One of the most common ways to communicate online is with instant messaging. You may want to introduce a few of the more popular IM programs (i.e., MSN, Yahoo, AOL, ICQ, etc.) that perform the same function. If people are not sure about this, relate it to having a conversation with someone else but only one person can talk at a time (no interruptions unless user chooses not to send their next text message). Don’t spend a lot of time discussing IM’s as there is an area in the book that looks at this in a bit more detail to show why IM’s are so popular (Lesson 3).
  30. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 10 From an administrative side, this is one of the major benefits of networking, especially for doing upgrades or technical support. If the device has been set up on the network for users to share, network administrators can generally do maintenance or upgrades from one location instead of having to move from workstation to workstation. Companies often like this option, especially if the device is costly and not everyone needs one for confidential or frequent use. Provide examples of items such as scanners, color printers, photocopier/fax machine/printer (all-in-one device) that are often set up as shared items for users.
  31. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 10 Any time people need to share files or folders of information, it is always handy to have a central area where people can look for the information first. Provide examples of the types of documents that could or should be shared rather than keeping it on a local drive (e.g., marketing promotional material, catalogs, inventory/product listing (limited access depending on user type), customer lists or actions, etc.). This is another advantage for network administrators who can then set up options and features from the network perspective to back up the data, set up rights for specific groups, install devices for groups only, etc.
  32. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 10 Introduce why a company might want to set up a dedicated server to handle specific types of tasks and then discuss the different types available. Not every company will have all of these types of servers in their location; some may have combination or share with another company such as an ISP who manages their mail requirements.
  33. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 11 Objective 1.1.5 The order and amount of detail for the number of disadvantages is not meant to be used as level of importance. Fill in more details based on your experience or preference. This topic can be the biggest disadvantage of being able to share information, especially if the network fails for whatever reason (e.g., blackout, network drive fails, lost connection to the Internet, etc.). In many instances when the network goes down, there generally is no way to keep the productivity until the problem for the network is repaired. Some users can work on their hard drive but the information will still need to be copied back onto the network when available; those who have workstations with no hard drive, they will be down completely.
  34. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 11 For most companies, this will be a big consideration whenever they need to upgrade, change, or add on new servers to their existing server. There are many more costs involved than just buying the hardware and these costs can increase significantly once a decision has been made as to what, when, and how much. Most new network installations of whatever nature tend to occur over the weekend to minimize the downtime for users, which means there is the additional cost of paying overtime or weekend rates for staff or consultants.
  35. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 11 Objective 1.1.6 The points here are not listed in any particular order as much as they are meant to be a checklist of options to set up as standards for a company and its network. Most network administrators are familiar with these options and this is meant to provide a list of items that may cause frustration for the user who doesn’t understand why there are restrictions.
  36. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 12-13 Spend a few moments discussing the other points on how to reduce any security risks on a network. Many of these points will be familiar from earlier discussions in previous Units, but bears discussing, especially in relation to sharing information.
  37. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 13 Some users do feel this is a big disadvantage of working on a network, especially if it is items they create for their own purposes or the feeling that someone else is watching what they’re doing. In most cases, network administrators are too busy to monitor everyone’s activities other than when there’s a problem that needs to be addressed, e.g., theft, viruses, etc. The last point is something that can be a contentious point with most people, depending on the atmosphere in a company. For the most part, users should always check with their employer or take responsibility should there be a problem with having personal documents or items on the computer, even though it may be stored on a local drive. Some companies prefer their employees to be working only on business documents during the day, especially given that most people will have a computer at home they can use for personal documents. Open this up as discussion with students for different viewpoints.
  38. Essential Skills for Digital Literacy Module B: Key Applications © CCI Learning Solutions Inc. Common Elements – Slide Pg 13 This is one area that cannot be stressed enough with users who access the Internet a lot or receive a lot of e-mail. Many students do not consider that they could be a target, even though they may not do a lot of work on the Internet or with mail. Viruses can occur with documents received from other people who are on the same network and because you share the information, this is one of the fastest ways that viruses can spread. There is no need to go into a lot of detail about viruses at this point. More detail about viruses is provided later in this courseware (Lesson 7 of Unit 2: Using the Internet).