SlideShare a Scribd company logo
1 of 49
Data Communications Making computers talk to each other
Types of usage's ,[object Object],[object Object],[object Object],[object Object]
Two methods of communication ,[object Object],[object Object]
How computers communicate Let’s do lunch
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S.
Telecommunications 0  1  0  0  0  0  0  1 LA NY Bandwidth  =  300 - 3000 hz
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Bandwidth  =  300 - 3000 hz What are two terms that describe this form of information?
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Bandwidth  =  300 - 3000 hz 1)  Binary 2)  Digital
Telecommunications Ok, so what we want to do is send  digital information over a network designed to support  analog  signals. This presents some compatibility  problems ...
Telecommunications Lets take a look at what  ANALOG  information looks like... Time --> + - 0
Telecommunications Lets take a look at what  DIGITAL  information looks like... + - 0 Time -->
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. OK, so what we need is a  DIGITAL  to  ANALOG  converter. First thing we need to design is a . . .
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S.
Telecommunications 0  1  0  0  0  0  0  1 LA NY Analog Phone System in U.S. Black Box
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box...
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... Bit control  software Bit control  software
Telecommunications 0  1  0  0  0  0  0  1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... How to handle a zero or a one?  Bit control  software
Telecommunications 0  1  0  0  0  0  0  1 0  LA NY Need to convert the zero to a tone... Lets use 1000 hz Working with  bit # 1  Send  1000 hz --> Receive --> 1000 hz  Working with  bit # 1  Convert tone into a zero ... Convert zero into a tone ...
Telecommunications 0  1  0  0  0  0  0  1 0  1  LA NY Need to convert the ONE to a tone... Lets use 2000 hz Working with  bit # 2  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 2  Convert tone into a  ONE  ... Convert  ONE into a tone ...
Telecommunications 0  1  0  0  0  0  0  1 LA NY Need to convert the ONE to a tone... Working with  bit # 8  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 8  Convert tone into a  ONE  ... Convert  ONE into a tone ... 0  1  0  0  0  0  0  1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Need to convert the ONE to a tone... Working with  bit # 8  Send  2000 hz --> Receive --> 2000 hz  Working with  bit # 8  Convert tone into a  ONE  ... Convert  ONE into a tone ... 0  1  0  0  0  0  0  1 What term describes the black box ?
Telecommunications Modem (Modulator-Demodulator) Digital to Analog  =  Modulator Analog to Digital  =  Demodulator
Telecommunications 0  1  0  0  0  0  0  1 LA NY Have some logistical problems... How does NY know that LA is getting ready to send the FIRST bit ? Working with  bit # 1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Before every byte, a  start tone  is sent to the receiving computer Ready to transmit first bit  Get ready to receive bit # 1  Send a  START tone 500 hz --> Receive START tone --> 500 hz
Telecommunications 0  1  0  0  0  0  0  1 LA NY After every byte, a  stop tone  is sent to the receiving computer Done with  last bit  Sequenced  completed  Send a  STOP tone 800 hz --> Receive STOP tone --> 800 hz 0  1  0  0  0  0  0  1
Telecommunications 0  1  0  0  0  0  0  1 LA NY Last major logistical problem ... How fast are we sending the bits down the phone line? 0  1  0  0  0  0  0  1
Telecommunications BAUD RATES 300  baud 600  baud 1200 baud 2400 baud 4800 baud 9600 baud 12,000 baud 14,400 baud 19,200 baud 28,800 baud 38,400 baud 57,600 baud Low speed Medium speed High speed An approximate definition of BAUD is “bits per second”
Computer Networks Making computers work together
What is a Computer Network Two or more computers connected together
Why Network ,[object Object],[object Object],[object Object],[object Object]
Types of Networks ,[object Object],[object Object],[object Object]
Local Area Network (LAN) ,[object Object],[object Object]
Wide Area Network (WAN) Computers interconnected in a large area (campus, multiple building, office complex)
Municipal Area Network (MAN) Computers interconnected throughout the municipality (city-wide/county-wide)
Network Configurations ,[object Object],[object Object],[object Object],[object Object]
Sneaker Net Hand carry a floppy disk from one computer to another in order to share files.
Peer to Peer Sharing Data
Client/Server Clients Server Clients use files and programs that are stored on the server
Distributed Data is distributed between servers on various networks. When data is requested, the computer checks all connected systems for data. The user probably does not know which computer the data came from. Connected Servers
Necessary Devices ,[object Object],[object Object],[object Object]
Network Topologies ,[object Object],[object Object]
Ethernet (Twisted Pair) HUB
Ethernet (Coaxial) Echo Terminator
Token Ring
How Data Flows A B Computer A wants to send information to computer B.
How Data Flows A B Network software in computer A builds a  PACKET  or  PACKETS  and puts the information onto the network media.
How Data Flows A B Packet(s) Start Length | Destination Address | Source Address | Length Count | Data | Frame Check Sequence What the packet contains:
How Data Flows A B Computer B receives the PACKET(S) from the network media. The network software separates the information from the PACKET(S).
Next, What’s the internet?

More Related Content

Similar to I Networks

Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
Eric Vyncke
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
John Mathias
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
Eric Vyncke
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
eysipi
 

Similar to I Networks (20)

Wan technology
Wan technologyWan technology
Wan technology
 
Wan technology
Wan technologyWan technology
Wan technology
 
Networking Basics
Networking Basics Networking Basics
Networking Basics
 
adapters2.PPT
adapters2.PPTadapters2.PPT
adapters2.PPT
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009Aspects Strategiques Des Réseaux 2008 2009
Aspects Strategiques Des Réseaux 2008 2009
 
Understanding computer networks
Understanding computer networksUnderstanding computer networks
Understanding computer networks
 
Welcome to IP Surveillance 101
Welcome to IP Surveillance 101Welcome to IP Surveillance 101
Welcome to IP Surveillance 101
 
How new technologies affect the art of contesting
How new technologies affect the art of contestingHow new technologies affect the art of contesting
How new technologies affect the art of contesting
 
SIGFOX Makers Tour - Porto
SIGFOX Makers Tour - PortoSIGFOX Makers Tour - Porto
SIGFOX Makers Tour - Porto
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
 
Information system
Information systemInformation system
Information system
 
Important terms in understanding internet programming
Important terms in understanding internet programmingImportant terms in understanding internet programming
Important terms in understanding internet programming
 
Aspects Stratégiques des Réseaux
Aspects Stratégiques des RéseauxAspects Stratégiques des Réseaux
Aspects Stratégiques des Réseaux
 
Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0Linux Internals - Interview essentials 2.0
Linux Internals - Interview essentials 2.0
 
CCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networkingCCNA 1 : introduction_to_networking
CCNA 1 : introduction_to_networking
 
Uart
UartUart
Uart
 
Gbell Ra
Gbell RaGbell Ra
Gbell Ra
 

More from CTIN

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
CTIN
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
CTIN
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
CTIN
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
CTIN
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
CTIN
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
CTIN
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
CTIN
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
CTIN
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
CTIN
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
CTIN
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
CTIN
 
Nra
NraNra
Nra
CTIN
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
CTIN
 
Edrm
EdrmEdrm
Edrm
CTIN
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
CTIN
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
CTIN
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
CTIN
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
CTIN
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
CTIN
 
Raidprep
RaidprepRaidprep
Raidprep
CTIN
 

More from CTIN (20)

Mounting virtual hard drives
Mounting virtual hard drivesMounting virtual hard drives
Mounting virtual hard drives
 
Open Source Forensics
Open Source ForensicsOpen Source Forensics
Open Source Forensics
 
Encase V7 Presented by Guidance Software august 2011
Encase V7 Presented by Guidance Software   august 2011Encase V7 Presented by Guidance Software   august 2011
Encase V7 Presented by Guidance Software august 2011
 
Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3Windows 7 forensics -overview-r3
Windows 7 forensics -overview-r3
 
Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3Windows 7 forensics event logs-dtl-r3
Windows 7 forensics event logs-dtl-r3
 
Msra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troylaMsra 2011 windows7 forensics-troyla
Msra 2011 windows7 forensics-troyla
 
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics thumbnail-dtl-r4
 
Windows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-publicWindows 7 forensics jump lists-rv3-public
Windows 7 forensics jump lists-rv3-public
 
Time Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows SystemsTime Stamp Analysis of Windows Systems
Time Stamp Analysis of Windows Systems
 
Vista Forensics
Vista ForensicsVista Forensics
Vista Forensics
 
Mac Forensics
Mac ForensicsMac Forensics
Mac Forensics
 
Nra
NraNra
Nra
 
Live Forensics
Live ForensicsLive Forensics
Live Forensics
 
Edrm
EdrmEdrm
Edrm
 
Computer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer TrespassComputer Searchs, Electronic Communication, Computer Trespass
Computer Searchs, Electronic Communication, Computer Trespass
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Search Warrants
Search WarrantsSearch Warrants
Search Warrants
 
Part6 Private Sector Concerns
Part6 Private Sector ConcernsPart6 Private Sector Concerns
Part6 Private Sector Concerns
 
Sadfe2007
Sadfe2007Sadfe2007
Sadfe2007
 
Raidprep
RaidprepRaidprep
Raidprep
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

I Networks

  • 1. Data Communications Making computers talk to each other
  • 2.
  • 3.
  • 4. How computers communicate Let’s do lunch
  • 5. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S.
  • 6. Telecommunications 0 1 0 0 0 0 0 1 LA NY Bandwidth = 300 - 3000 hz
  • 7. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Bandwidth = 300 - 3000 hz What are two terms that describe this form of information?
  • 8. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Bandwidth = 300 - 3000 hz 1) Binary 2) Digital
  • 9. Telecommunications Ok, so what we want to do is send digital information over a network designed to support analog signals. This presents some compatibility problems ...
  • 10. Telecommunications Lets take a look at what ANALOG information looks like... Time --> + - 0
  • 11. Telecommunications Lets take a look at what DIGITAL information looks like... + - 0 Time -->
  • 12. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. OK, so what we need is a DIGITAL to ANALOG converter. First thing we need to design is a . . .
  • 13. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S.
  • 14. Telecommunications 0 1 0 0 0 0 0 1 LA NY Analog Phone System in U.S. Black Box
  • 15. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box...
  • 16. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... Bit control software Bit control software
  • 17. Telecommunications 0 1 0 0 0 0 0 1 LA NY The black box is a hardware device, next we need some type of software to control how and when the bits are sent from the computer to the black box... How to handle a zero or a one? Bit control software
  • 18. Telecommunications 0 1 0 0 0 0 0 1 0 LA NY Need to convert the zero to a tone... Lets use 1000 hz Working with bit # 1 Send 1000 hz --> Receive --> 1000 hz Working with bit # 1 Convert tone into a zero ... Convert zero into a tone ...
  • 19. Telecommunications 0 1 0 0 0 0 0 1 0 1 LA NY Need to convert the ONE to a tone... Lets use 2000 hz Working with bit # 2 Send 2000 hz --> Receive --> 2000 hz Working with bit # 2 Convert tone into a ONE ... Convert ONE into a tone ...
  • 20. Telecommunications 0 1 0 0 0 0 0 1 LA NY Need to convert the ONE to a tone... Working with bit # 8 Send 2000 hz --> Receive --> 2000 hz Working with bit # 8 Convert tone into a ONE ... Convert ONE into a tone ... 0 1 0 0 0 0 0 1
  • 21. Telecommunications 0 1 0 0 0 0 0 1 LA NY Need to convert the ONE to a tone... Working with bit # 8 Send 2000 hz --> Receive --> 2000 hz Working with bit # 8 Convert tone into a ONE ... Convert ONE into a tone ... 0 1 0 0 0 0 0 1 What term describes the black box ?
  • 22. Telecommunications Modem (Modulator-Demodulator) Digital to Analog = Modulator Analog to Digital = Demodulator
  • 23. Telecommunications 0 1 0 0 0 0 0 1 LA NY Have some logistical problems... How does NY know that LA is getting ready to send the FIRST bit ? Working with bit # 1
  • 24. Telecommunications 0 1 0 0 0 0 0 1 LA NY Before every byte, a start tone is sent to the receiving computer Ready to transmit first bit Get ready to receive bit # 1 Send a START tone 500 hz --> Receive START tone --> 500 hz
  • 25. Telecommunications 0 1 0 0 0 0 0 1 LA NY After every byte, a stop tone is sent to the receiving computer Done with last bit Sequenced completed Send a STOP tone 800 hz --> Receive STOP tone --> 800 hz 0 1 0 0 0 0 0 1
  • 26. Telecommunications 0 1 0 0 0 0 0 1 LA NY Last major logistical problem ... How fast are we sending the bits down the phone line? 0 1 0 0 0 0 0 1
  • 27. Telecommunications BAUD RATES 300 baud 600 baud 1200 baud 2400 baud 4800 baud 9600 baud 12,000 baud 14,400 baud 19,200 baud 28,800 baud 38,400 baud 57,600 baud Low speed Medium speed High speed An approximate definition of BAUD is “bits per second”
  • 28. Computer Networks Making computers work together
  • 29. What is a Computer Network Two or more computers connected together
  • 30.
  • 31.
  • 32.
  • 33. Wide Area Network (WAN) Computers interconnected in a large area (campus, multiple building, office complex)
  • 34. Municipal Area Network (MAN) Computers interconnected throughout the municipality (city-wide/county-wide)
  • 35.
  • 36. Sneaker Net Hand carry a floppy disk from one computer to another in order to share files.
  • 37. Peer to Peer Sharing Data
  • 38. Client/Server Clients Server Clients use files and programs that are stored on the server
  • 39. Distributed Data is distributed between servers on various networks. When data is requested, the computer checks all connected systems for data. The user probably does not know which computer the data came from. Connected Servers
  • 40.
  • 41.
  • 45. How Data Flows A B Computer A wants to send information to computer B.
  • 46. How Data Flows A B Network software in computer A builds a PACKET or PACKETS and puts the information onto the network media.
  • 47. How Data Flows A B Packet(s) Start Length | Destination Address | Source Address | Length Count | Data | Frame Check Sequence What the packet contains:
  • 48. How Data Flows A B Computer B receives the PACKET(S) from the network media. The network software separates the information from the PACKET(S).
  • 49. Next, What’s the internet?

Editor's Notes

  1. Filename: Networks.ppt This presentation introduces data communications, modems, networks, and data packets.