SlideShare a Scribd company logo
1 of 42
A Deep Dive in the World of IT Networking (Part 1)
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a
Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!
NetCom Learning
NetCom Learning – Managed Learning Services
Agenda
• To be a Successful ICT Professional.
• Running the IT projects successfully.
• Benefit of networking.
• Network Components.
• Data Transfer.
• IP Address.
• Windows Commands.
• Types of LANS.
• Network Topologies.
• Centralized Computing Vs. Distributive Computing.
• Client Server Model.
• Peer to Peer Networks
• Q&A
To be successful ICT Professional
The main qualities that any successful ICTP must be
keen to merit:
• Certificates.
• Experiences.
• Language Skills.
• Communications Skills.
• Eagerly learn more.
Running the ICT projects successfully
To Run any ICT Project successfully regardless of it’s
type whether it’s infrastructure project of software
development or programming project. It’s
• Documentation.
• Backup .
• Patch.
Benefit Of Networking
• Networks are used to exchange data.
• Sharing.
• Communication.
• Organization.
• Money.
What is the Network
•A data network is a group of devices connected by network medium.
•The network medium carries signals between computers.
•Signals reduce complex information to the simplest possible form.
•Devices communicate by using a language called a protocol.
Network Components
Network adapters
Cables and connectors
Cables and connectors
Hub
•A hub is the most basic of central connecting
devices.
•It connects each of the networked computers,
known as hosts, to one another by way of
copper-based cables.
•Any host that sends data must first send that
data to the hub, where it is amplified and
broadcast to the rest of the network.
Switch
•Switch is like a Hub but built in with
advanced features. It uses physical device
addresses in each incoming messages so
that it can deliver the message to the
right destination or port.
•switch don’t broadcast the received
message to entire network, rather before
sending it checks to which system or port
should the message be sent. In other
words switch connects the source and
destination directly which increases the
speed of the network. Both switch and
hub have common features: Multiple RJ-
45 ports, power supply and connection
lights.
Router
•The router acts as a central connecting
device, but it also has a special
communications link to the Internet,
thereby allowing the hosts to send data
to and receive data from computers on
the Internet.
•This communications link between the
router and the Internet is where the LAN
ends.
Data Transfer
Serial Data Transfer
•Generally, when data is transferred on a Network, it is sent in a serial
fashion over twisted-pair cabling.
•Serial data transfer means the transfer of one bit at a time … in other
words, transfer in a single-bit stream.
Types of Data Transfer
•Broadcast has data sent to every other host on the network.
•Unicast has data sent to one host only.
Data Transfer Rate
•Data transfer rate, otherwise known as bit rate defines the maximum bits
per second (bps) that can be transmitted over a network.
•As mentioned, this value is rated in bits, and it is signified with a
lowercase b (for example, 10 Mbps).
•The lowercase b helps differentiate this amount from data that is stored
on a hard drive, which uses an upper case B that stands for bytes (for
example 10 MB).
Ethernet
•Ethernet is a set of rules that govern the transmission of data between
network adapters and various central connecting devices.
•All network adapters and central connecting devices must be compatible
with Ethernet in order to communicate with each other.
•Common types of Ethernet include:
802.3u or Fast Ethernet that runs at 100 Mbps.
802.3ab or Gigabit Ethernet runs at 1000 Mbps.
IP Address
•every computer and many other devices have such an address.
•An IP address allows each computer to send and receive information
back and forth in an orderly and efficient manner.
•An IP address identifies your computer number and the network it
lives on.
•IP address is made of 32-bit address. The address is divided into four
sections of eight bits each called octets (math).
•IP divided in to 5 classes or categories class (A,B,C,D,E) each of them
has a unique range of addresses
•In order to know the class of the address we are forced to look to the
first octet of the address.
Class A (1-126),(255.0.0.0),(N.H.H.H)
Class B (128-191),(255,255,0,0),(N.N.H.H)
Class C (192-223),(255,255,255,0),(N.N.N.H)
•127.0.0.0 : This network address is reserved for the loopback
address. (Note: This address is not included in the range of Class A or
Class B addresses.) The address 127.0.0.1 refers to the local host.
•The following address ranges have been reserved for private use.
10.0.0.0 to 10.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
•Use addresses in these ranges for your private networks. Routers
connected to the Internet typically filter messages within these ranges
and prevent them from being propagated to the Internet.
Special IP Address
Subnet Mask
•The subnet mask is a group of four numbers that define what IP network the
computer is a member of.
•All of the 255s in a subnet mask collectively refer to the network portion,
whereas the 0s refer to the host portion.
Windows Commands
IPConfig command shows IP configuration information.
IPConfig
Ping Command
Types Of Local Area Network
Wired LAN
Computers and
other devices are
wired using
copper-based
twisted-pair
cables
Wireless Local Area Network (WLAN)
•A wireless local
area network
(WLAN) has many
advantages, the
most obvious of
which is the ability
to roam.
•The wireless access
point (WAP) acts as
the central
connecting device
for the network.
Virtual Local Area Network (VLAN)
A Virtual LAN is a
group of hosts with
a common set of
requirements that
communicate as if
they were
connected together
in a normal fashion
on one switch,
regardless of their
physical location.
Network Topology
A network topology : defines the physical connections of hosts in a computer network.
There are several types of physical topologies including:
Bus, Ring, Star, Mesh, … etc.
Star Topology
•Most Common topology
•Each computer is
individually wired to a
central connecting device
(hub, switch or SOHO
router) with twisted-pair
cabling.
Mesh Topology
Every computer connects to
every other computer; no
central connecting device is
needed.
Ring Topology
•In a LAN environment, each computer is
connected to the network using a closed
loop.
•Used by Token Ring and FDDI.
•A Token Ring network sends data logically in
a ring fashion, meaning that a token goes to
each computer, one at a time, and continues
on in cycles.
•However, Token Ring computers are
physically connected in a star fashion.
•Namely, all computers in a Token Ring
network are connected to a central
connecting device known as a Multi Access
Unit (MAU) or MultiStation Access Unit
(MSAU).
Centralized Computing
•The older type of
computing was known as
centralized computing.
•This was the case during
the days of the mainframe,
in which there was one
super computer and the rest
of the devices that
connected to the super
computer were known as
terminals (or dumb
terminals).
•Each terminal consisted
solely of a keyboard and
display with no processing
power.
Distributive Computing
Today’s computing is
known as
distributive
computing and is
used for both client-
server and peer-to-
peer networks.
This means that
every device or
workstation has its
own processing
power.
Client/Server ModelThe client-server model
is an architecture that
distributes applications
between servers that
typically powerful
computers that run the
software that controls
and maintains the
network. This software
is known as the network
operating system such
as Windows Server
2016 and client
computers such as
Windows 8 or Windows
10 machines.
Computers that
provide services:
•File Server
•Print Server
•Web Server
•Database server
•Proxy Server
•Application Server
•Mail (Messaging )
Server
•Fax Server
•Remote Access
Server
•Telephony Server
Servers
Peer-to-Peer Networking
•Peer-to-peer networking first and
foremost means that each computer
is treated as an equal.
•Today, peer computers can serve
data; the only difference is that they
can only serve it to a limited number
of computers at the same time.
•Each user is responsible for local
backup.
• Security considerations are minimal.
Watch the Live Demonstration
Watch the recorded webinar here!
Recommended Courses
NetCom Learning offers a comprehensive portfolio for IT Networking training
options. Please see below the list of recommended courses:
CompTIA Network+ Certification
Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry)
Routing & Switching (ICND1 and ICND2) v3.0 Prep Boot Camp - CCNAX
(Associate)
Check out more IT Networking training options with NetCom Learning – CLICK
HERE
Our live webinars will help you to touch base a wide variety of IT, soft skills and
business productivity topics; and keep you up to date on the latest IT industry trends.
Register now for our upcoming webinars:
How to Manage & Secure Data with Microsoft Datacenters?- May 11
VMware vCenter 6.5 Consoles and Connections – May 15
Office 365 on any Platform (Windows, Mac, Mobile/Tablet) – May 18
Microsoft Word Power Shortcuts & Tips Part-1 – May 23
A Deep Dive in the World of IT Networking (Part 2) – May 25
Special Promotion
Whether you're learning new IT or Business skills, or you are developing a learning plan for
your team, now you can register for our Guaranteed to Run classes with confidence.
From Microsoft, to CompTIA, to CISSP; all classes delivered by top-notch instructors in in-
person Instructor-led Classroom or Live Online.
Learn more»
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a Smarter
Workforce, Adapt to Change, and Drive Growth”. Download now!
SarderTV is a B2B Media Platform headquartered in New York. The platform publishes exclusive
video based media content from Top Corporate Leaders of Fortune 1000, Best Selling Global
Authors & Ivy League Professors. Learn more - http://sardertv.com
To get latest technology updates, please follow our social media pages!
THANK YOU !!!
We manage learning.
“Building an Innovative Learning Organization. A Framework to Build a
Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!

More Related Content

What's hot

Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5APSU
 
Networking Components
Networking ComponentsNetworking Components
Networking ComponentsAkNirojan
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7APSU
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2APSU
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1WedgeB
 
Power point presentation
Power point presentationPower point presentation
Power point presentationrajasekarsankar
 
Setting up a network
Setting up a networkSetting up a network
Setting up a networkRachel Espino
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and StandardsRubal Sagwal
 
Computer networks
Computer networks Computer networks
Computer networks ABUBAKAR270
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6suddenven
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scopeSanat Maharjan
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13APSU
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyKarthikeyan Dhayalan
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...The University of Texas (UTRGV)
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11APSU
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12APSU
 
Communication using network
Communication using networkCommunication using network
Communication using networkOnline
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6APSU
 

What's hot (20)

Networking
Networking Networking
Networking
 
Net essentials6e ch5
Net essentials6e ch5Net essentials6e ch5
Net essentials6e ch5
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Net essentials6e ch7
Net essentials6e ch7Net essentials6e ch7
Net essentials6e ch7
 
Net essentials6e ch2
Net essentials6e ch2Net essentials6e ch2
Net essentials6e ch2
 
Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1Net+, 6th Ed. CH. 1
Net+, 6th Ed. CH. 1
 
Power point presentation
Power point presentationPower point presentation
Power point presentation
 
Setting up a network
Setting up a networkSetting up a network
Setting up a network
 
Wireless Technologies and Standards
Wireless Technologies and StandardsWireless Technologies and Standards
Wireless Technologies and Standards
 
Computer networks
Computer networks Computer networks
Computer networks
 
98 366 mva slides lesson 6
98 366 mva slides lesson 698 366 mva slides lesson 6
98 366 mva slides lesson 6
 
Network protocol structure scope
Network protocol structure scopeNetwork protocol structure scope
Network protocol structure scope
 
Net essentials6e ch13
Net essentials6e ch13Net essentials6e ch13
Net essentials6e ch13
 
CISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network TopologyCISSP - Chapter 4 - Network Topology
CISSP - Chapter 4 - Network Topology
 
Networking.
Networking.Networking.
Networking.
 
Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...Building an Enterprise Fiber Network for a Local Government, An Architectural...
Building an Enterprise Fiber Network for a Local Government, An Architectural...
 
Net essentials6e ch11
Net essentials6e ch11Net essentials6e ch11
Net essentials6e ch11
 
Net essentials6e ch12
Net essentials6e ch12Net essentials6e ch12
Net essentials6e ch12
 
Communication using network
Communication using networkCommunication using network
Communication using network
 
Net essentials6e ch6
Net essentials6e ch6Net essentials6e ch6
Net essentials6e ch6
 

Similar to A Deep Dive in the World of IT Networking (part 1)

network fundamentals
network fundamentalsnetwork fundamentals
network fundamentalsSithu PM
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1TnNguyn57021
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocolGLIM Digital
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxmbombongafu
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6Irsandi Hasan
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and NetworkingSajitha Pathirana
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESManas Rai
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxADITYAKUMAR554673
 

Similar to A Deep Dive in the World of IT Networking (part 1) (20)

Networking basics
Networking basicsNetworking basics
Networking basics
 
network fundamentals
network fundamentalsnetwork fundamentals
network fundamentals
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Networking Today Chapter 1 Networking Today Chapter 1
Networking Today  Chapter 1 Networking Today  Chapter 1Networking Today  Chapter 1 Networking Today  Chapter 1
Networking Today Chapter 1 Networking Today Chapter 1
 
Vision
VisionVision
Vision
 
Computer Networks basics
Computer Networks basicsComputer Networks basics
Computer Networks basics
 
Networks Intro.ppt
Networks Intro.pptNetworks Intro.ppt
Networks Intro.ppt
 
Internet architecture protocol
Internet architecture protocolInternet architecture protocol
Internet architecture protocol
 
4.1 Networks.pdf
4.1 Networks.pdf4.1 Networks.pdf
4.1 Networks.pdf
 
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptxICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
ICT 101 LECTURE 2 - BASICS OF COMPUTER NETWORKS.pptx
 
ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6ITE v5.0 - Chapter 6
ITE v5.0 - Chapter 6
 
Communications and Networking
Communications and NetworkingCommunications and Networking
Communications and Networking
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Networking
NetworkingNetworking
Networking
 
Network Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICESNetwork Interface Card (NIC) AND NETWORKING DEVICES
Network Interface Card (NIC) AND NETWORKING DEVICES
 
Network Concepts
Network ConceptsNetwork Concepts
Network Concepts
 
ppt on servicenow.pptx
ppt on servicenow.pptxppt on servicenow.pptx
ppt on servicenow.pptx
 
KRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptxKRISHNA_COMPUTER_PROJECT.pptx
KRISHNA_COMPUTER_PROJECT.pptx
 
Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 

More from Tuan Yang

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfTuan Yang
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfTuan Yang
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfTuan Yang
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfTuan Yang
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfTuan Yang
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...Tuan Yang
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfTuan Yang
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfTuan Yang
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfTuan Yang
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfTuan Yang
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfTuan Yang
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management Tuan Yang
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)Tuan Yang
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Tuan Yang
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsTuan Yang
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSTuan Yang
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.Tuan Yang
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Tuan Yang
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...Tuan Yang
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freTuan Yang
 

More from Tuan Yang (20)

Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdfLearn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
 
Best Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdfBest Practices to Cybersecurity Vulnerability Management,.pdf
Best Practices to Cybersecurity Vulnerability Management,.pdf
 
Defense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdfDefense Against Multi-Network Breaches.pdf
Defense Against Multi-Network Breaches.pdf
 
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdfCybersecurity Incident Handling & Response in Under 40 Minutes.pdf
Cybersecurity Incident Handling & Response in Under 40 Minutes.pdf
 
An Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdfAn Introduction to CompTIA Security+ - SY0-601.pdf
An Introduction to CompTIA Security+ - SY0-601.pdf
 
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
CCNP Enterprise Networks Move One Step Closer to Advanced Networking(Handout)...
 
What is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdfWhat is New with CompTIA Network+.pdf
What is New with CompTIA Network+.pdf
 
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdfWhat is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
What is new with CompTIA PenTest+- PT0 002 - NetCom Learning.pdf
 
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdfAgile Fundamentals One Step Guide for Agile Projects(Handout).pdf
Agile Fundamentals One Step Guide for Agile Projects(Handout).pdf
 
Getting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdfGetting Started with AWS Devops.pdf
Getting Started with AWS Devops.pdf
 
Certified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdfCertified Ethical Hacker v11 First Look.pdf
Certified Ethical Hacker v11 First Look.pdf
 
An overview of agile methods and agile project management
An overview of agile methods and agile project management An overview of agile methods and agile project management
An overview of agile methods and agile project management
 
The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)The essentials of ccna master the latest principles(handouts)
The essentials of ccna master the latest principles(handouts)
 
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
Unlock the value of itil 4 with 5 key takeaways that can be used today(handout)
 
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital ForensicsCHFI First Look by NetCom Learning - A Free Course on Digital Forensics
CHFI First Look by NetCom Learning - A Free Course on Digital Forensics
 
Master Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWSMaster Class: Understand the Fundamentals of Architecting on AWS
Master Class: Understand the Fundamentals of Architecting on AWS
 
How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.How to Deploy Microsoft 365 Apps and Workloads.
How to Deploy Microsoft 365 Apps and Workloads.
 
Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...Learn to utilize cisco unified communications for better collaboration( hando...
Learn to utilize cisco unified communications for better collaboration( hando...
 
NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...NetCom learning webinar how to manage your projects with disciplined agile (d...
NetCom learning webinar how to manage your projects with disciplined agile (d...
 
NetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender freNetCom learning webinar cnd first look by netcom learning - network defender fre
NetCom learning webinar cnd first look by netcom learning - network defender fre
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

A Deep Dive in the World of IT Networking (part 1)

  • 1. A Deep Dive in the World of IT Networking (Part 1) We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!
  • 3. NetCom Learning – Managed Learning Services
  • 4.
  • 5. Agenda • To be a Successful ICT Professional. • Running the IT projects successfully. • Benefit of networking. • Network Components. • Data Transfer. • IP Address. • Windows Commands. • Types of LANS. • Network Topologies. • Centralized Computing Vs. Distributive Computing. • Client Server Model. • Peer to Peer Networks • Q&A
  • 6. To be successful ICT Professional The main qualities that any successful ICTP must be keen to merit: • Certificates. • Experiences. • Language Skills. • Communications Skills. • Eagerly learn more.
  • 7. Running the ICT projects successfully To Run any ICT Project successfully regardless of it’s type whether it’s infrastructure project of software development or programming project. It’s • Documentation. • Backup . • Patch.
  • 8. Benefit Of Networking • Networks are used to exchange data. • Sharing. • Communication. • Organization. • Money.
  • 9. What is the Network •A data network is a group of devices connected by network medium. •The network medium carries signals between computers. •Signals reduce complex information to the simplest possible form. •Devices communicate by using a language called a protocol.
  • 13. Hub •A hub is the most basic of central connecting devices. •It connects each of the networked computers, known as hosts, to one another by way of copper-based cables. •Any host that sends data must first send that data to the hub, where it is amplified and broadcast to the rest of the network.
  • 14. Switch •Switch is like a Hub but built in with advanced features. It uses physical device addresses in each incoming messages so that it can deliver the message to the right destination or port. •switch don’t broadcast the received message to entire network, rather before sending it checks to which system or port should the message be sent. In other words switch connects the source and destination directly which increases the speed of the network. Both switch and hub have common features: Multiple RJ- 45 ports, power supply and connection lights.
  • 15. Router •The router acts as a central connecting device, but it also has a special communications link to the Internet, thereby allowing the hosts to send data to and receive data from computers on the Internet. •This communications link between the router and the Internet is where the LAN ends.
  • 16. Data Transfer Serial Data Transfer •Generally, when data is transferred on a Network, it is sent in a serial fashion over twisted-pair cabling. •Serial data transfer means the transfer of one bit at a time … in other words, transfer in a single-bit stream.
  • 17. Types of Data Transfer •Broadcast has data sent to every other host on the network. •Unicast has data sent to one host only. Data Transfer Rate •Data transfer rate, otherwise known as bit rate defines the maximum bits per second (bps) that can be transmitted over a network. •As mentioned, this value is rated in bits, and it is signified with a lowercase b (for example, 10 Mbps). •The lowercase b helps differentiate this amount from data that is stored on a hard drive, which uses an upper case B that stands for bytes (for example 10 MB).
  • 18. Ethernet •Ethernet is a set of rules that govern the transmission of data between network adapters and various central connecting devices. •All network adapters and central connecting devices must be compatible with Ethernet in order to communicate with each other. •Common types of Ethernet include: 802.3u or Fast Ethernet that runs at 100 Mbps. 802.3ab or Gigabit Ethernet runs at 1000 Mbps.
  • 19. IP Address •every computer and many other devices have such an address. •An IP address allows each computer to send and receive information back and forth in an orderly and efficient manner. •An IP address identifies your computer number and the network it lives on. •IP address is made of 32-bit address. The address is divided into four sections of eight bits each called octets (math). •IP divided in to 5 classes or categories class (A,B,C,D,E) each of them has a unique range of addresses •In order to know the class of the address we are forced to look to the first octet of the address. Class A (1-126),(255.0.0.0),(N.H.H.H) Class B (128-191),(255,255,0,0),(N.N.H.H) Class C (192-223),(255,255,255,0),(N.N.N.H)
  • 20. •127.0.0.0 : This network address is reserved for the loopback address. (Note: This address is not included in the range of Class A or Class B addresses.) The address 127.0.0.1 refers to the local host. •The following address ranges have been reserved for private use. 10.0.0.0 to 10.255.255.255 172.16.0.0 to 172.31.255.255 192.168.0.0 to 192.168.255.255 •Use addresses in these ranges for your private networks. Routers connected to the Internet typically filter messages within these ranges and prevent them from being propagated to the Internet. Special IP Address
  • 21. Subnet Mask •The subnet mask is a group of four numbers that define what IP network the computer is a member of. •All of the 255s in a subnet mask collectively refer to the network portion, whereas the 0s refer to the host portion.
  • 22. Windows Commands IPConfig command shows IP configuration information. IPConfig
  • 24. Types Of Local Area Network Wired LAN Computers and other devices are wired using copper-based twisted-pair cables
  • 25. Wireless Local Area Network (WLAN) •A wireless local area network (WLAN) has many advantages, the most obvious of which is the ability to roam. •The wireless access point (WAP) acts as the central connecting device for the network.
  • 26. Virtual Local Area Network (VLAN) A Virtual LAN is a group of hosts with a common set of requirements that communicate as if they were connected together in a normal fashion on one switch, regardless of their physical location.
  • 27. Network Topology A network topology : defines the physical connections of hosts in a computer network. There are several types of physical topologies including: Bus, Ring, Star, Mesh, … etc. Star Topology •Most Common topology •Each computer is individually wired to a central connecting device (hub, switch or SOHO router) with twisted-pair cabling.
  • 28. Mesh Topology Every computer connects to every other computer; no central connecting device is needed.
  • 29. Ring Topology •In a LAN environment, each computer is connected to the network using a closed loop. •Used by Token Ring and FDDI. •A Token Ring network sends data logically in a ring fashion, meaning that a token goes to each computer, one at a time, and continues on in cycles. •However, Token Ring computers are physically connected in a star fashion. •Namely, all computers in a Token Ring network are connected to a central connecting device known as a Multi Access Unit (MAU) or MultiStation Access Unit (MSAU).
  • 30. Centralized Computing •The older type of computing was known as centralized computing. •This was the case during the days of the mainframe, in which there was one super computer and the rest of the devices that connected to the super computer were known as terminals (or dumb terminals). •Each terminal consisted solely of a keyboard and display with no processing power.
  • 31. Distributive Computing Today’s computing is known as distributive computing and is used for both client- server and peer-to- peer networks. This means that every device or workstation has its own processing power.
  • 32. Client/Server ModelThe client-server model is an architecture that distributes applications between servers that typically powerful computers that run the software that controls and maintains the network. This software is known as the network operating system such as Windows Server 2016 and client computers such as Windows 8 or Windows 10 machines.
  • 33. Computers that provide services: •File Server •Print Server •Web Server •Database server •Proxy Server •Application Server •Mail (Messaging ) Server •Fax Server •Remote Access Server •Telephony Server Servers
  • 34. Peer-to-Peer Networking •Peer-to-peer networking first and foremost means that each computer is treated as an equal. •Today, peer computers can serve data; the only difference is that they can only serve it to a limited number of computers at the same time. •Each user is responsible for local backup. • Security considerations are minimal.
  • 35. Watch the Live Demonstration Watch the recorded webinar here!
  • 36. Recommended Courses NetCom Learning offers a comprehensive portfolio for IT Networking training options. Please see below the list of recommended courses: CompTIA Network+ Certification Interconnecting Cisco Networking Devices, Part 1 v 3.0 - ICND1 (Entry) Routing & Switching (ICND1 and ICND2) v3.0 Prep Boot Camp - CCNAX (Associate) Check out more IT Networking training options with NetCom Learning – CLICK HERE
  • 37. Our live webinars will help you to touch base a wide variety of IT, soft skills and business productivity topics; and keep you up to date on the latest IT industry trends. Register now for our upcoming webinars: How to Manage & Secure Data with Microsoft Datacenters?- May 11 VMware vCenter 6.5 Consoles and Connections – May 15 Office 365 on any Platform (Windows, Mac, Mobile/Tablet) – May 18 Microsoft Word Power Shortcuts & Tips Part-1 – May 23 A Deep Dive in the World of IT Networking (Part 2) – May 25
  • 38. Special Promotion Whether you're learning new IT or Business skills, or you are developing a learning plan for your team, now you can register for our Guaranteed to Run classes with confidence. From Microsoft, to CompTIA, to CISSP; all classes delivered by top-notch instructors in in- person Instructor-led Classroom or Live Online. Learn more»
  • 39. We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now! SarderTV is a B2B Media Platform headquartered in New York. The platform publishes exclusive video based media content from Top Corporate Leaders of Fortune 1000, Best Selling Global Authors & Ivy League Professors. Learn more - http://sardertv.com
  • 40. To get latest technology updates, please follow our social media pages!
  • 41.
  • 42. THANK YOU !!! We manage learning. “Building an Innovative Learning Organization. A Framework to Build a Smarter Workforce, Adapt to Change, and Drive Growth”. Download now!

Editor's Notes

  1. Cable is one way of transmission media which can transmit communication signals. The wired network typology uses special type of cable to connect computers on a network. There are a number of solid transmission Media types, which are listed below. - Twisted pair wire It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed cables that can transmit 1Gbps or more. - Coaxial cable Coaxial cable more resembles like TV installation cable. It is more expensive than twisted-pair cable but provide high data transmission speed.
  2. Fiber-optic cable It is a high-speed cable which transmits data using light beams through a glass bound fibers. Fiber-optic cable is high data transmission cable comparing to the other cable types. But the cost of fiber optics is very expensive which can only be purchased and installed on governmental level. ST (an AT&T Trademark) is probably still the most popular connector for multimode networks (ca. 2005), like most buildings and campuses. It has a bayonet mount and a long cylindrical 2.5 mm ceramic (usually) or polymer ferrule to hold the fiber. Most ferrules are ceramic, but some are metal or plastic. ST (an AT&T Trademark) is probably still the most popular connector for multimode networks (ca. 2005), like most buildings and campuses. It has a bayonet mount and a long cylindrical 2.5 mm ceramic (usually) or polymer ferrule to hold the fiber. Most ferrules are ceramic, but some are metal or plastic.
  3. Ping command is used to test network connectivity between two hosts.
  4. Today, such networks can consist of many types of devices other than traditional PCs, including smart phones, PDAs, tablet computers, and micro computers. Not to mention the fact that PCs and laptops equipped with wireless network adapters can connect to these networks as well.
  5. SOHO stands for small office/home office. SOHOs usually consist of businesses that are privately owned or individuals who are self-employed, so the term usually refers to both a small office space as well as a small number of employees. Since the workload for these types of businesses are often primarily on the internet, they require a local area network (LAN), which means their network hardware is structured specifically for that purpose. A SOHO network can be a mixed network of wired and wireless computers just like other local networks. Since these types of networks are meant for businesses, they also tend to include printers and sometimes voice over IP (VoIP) and fax over IP technology. A SOHO router is a model of broadband router built and marketed for use by such organizations. These are often the same routers used for standard home networking. Note: SOHO is sometimes referred to as a virtual office or single location firm. SOHO Routers vs. Home Routers While home networks shifted to predominantly Wi-Fi configurations years ago, SOHO routers continued to feature wired Ethernet. In fact, many SOHO routers did not support Wi-Fi at all. Typical examples of Ethernet SOHO routers were common such as the TP-Link TL-R402M (4-port), TL-R460 (4-port), and TL-R860 (8-port).  Another common feature of older routers was ISDN internet support. Small businesses relied on ISDN for internet connectivity as a faster alternative to dial-up networking. Modern SOHO routers require most all the same functions as home broadband routers, and in fact small businesses use the same models. Some vendors also sell routers with more advanced security and manageability features added, like the ZyXEL P-661HNU-Fx Security Gateway, a DSL broadband router with SNMP support. Another example of a popular SOHO router is the Cisco SOHO 90 Series, which is meant for up to 5 employees and includes firewall protection and VPN encryption. Other Types of SOHO Network Equipment Printers that combine the features of a basic printer with copy, scanning, and fax capability are popular with home office professionals. These so-called all-in-one printers include Wi-Fi support for joining to a home network. SOHO networks sometimes also operate an intranet web, email, and file server. These servers can be high-end PCs with added storage capacity (multi-drive disk arrays). Issues with SOHO Networking Security challenges impact SOHO networks more than other kinds of networks. Unlike larger ones, small businesses generally cannot afford to hire professional staff to manage their networks. Small businesses also are more likely targets of security attacks than households due to their financial and community position. As a business grows, it can be difficult to know how much to invest in the network infrastructure to keep it expanding to meet the company's needs. Over-investing too soon wastes valuable funds, while under-investing can significantly impact business productivity. Monitoring the network load and the responsiveness of the company's top few business applications can help identify bottlenecks before they become critical. How Small Is the "S" in SOHO? The standard definition limits SOHO networks to those that support between 1 and 10 people, but there isn't any magic that happens when the 11th person or device joins the network. The term "SOHO" is used only to identify a small network, so the number isn't as relevant. In practice, SOHO routers can support somewhat larger networks than this.
  6. Fiber Distributed Data Interface (FDDI) is a standard for data transmission in a local area network. It uses optical fiber as its standard underlying physical medium, although it was also later specified to use copper cable, in which case it may be called CDDI (Copper Distributed Data Interface), standardized as TP-PMD (Twisted-Pair Physical Medium-Dependent), also referred to as TP-DDI (Twisted-Pair Distributed Data Interface). "MSAU" redirects here. For the settlement in the Coast Province, An IBM 8226 Multistation Access Unit featuring LEDs An IBM 8228 Multistation Access Unit with accompanying Setup Aid A Media Access Unit (MAU), also known as a Multistation Access Unit (MAU or MSAU) is a device to attach multiple network stations in a Star topology as a token ring network, internally wired to connect the stations into a logical ring (generally passive i.e. non-switched and unmanaged; however managed token ring MAUs do exist in the form of CAUs, or Controlled Access Units). Passive token ring was an active IBM networking product in the 1997 time-frame, after which it was rapidly displaced by switched