computer network is a group of interconnected computers that share information and resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself can be considered a computer network. Two basic network types are local-area networks (LANs) and wide-area networks (WANs). LANs connect computers and peripheral devices in a limited physical area, such as a business office, laboratory, or college campus, by means of links (wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly.
computer network is a group of interconnected computers that share information and resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server. The Internet itself can be considered a computer network. Two basic network types are local-area networks (LANs) and wide-area networks (WANs). LANs connect computers and peripheral devices in a limited physical area, such as a business office, laboratory, or college campus, by means of links (wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly.
technology is changing rapidly that hardly any human activity will be possible in the coming year without the use of computer. we must be aware of these technological changes.
This presentation is a summary of the subject of the computer network presented at the Electronic University of Saudi Arabia for the computer introduction book
technology is changing rapidly that hardly any human activity will be possible in the coming year without the use of computer. we must be aware of these technological changes.
This presentation is a summary of the subject of the computer network presented at the Electronic University of Saudi Arabia for the computer introduction book
Finding and hiring talented developers takes more work than just hitting "send" on an email. With recruiting tactics of the past proving time and time again to be ineffective, it’s time to learn how today’s developers want to be recruited.
group of computers connected with each other to share information or resources. A network can be small or a large. it can be created in a building or spread all over the world. Networks are main source of communication all over the world. The most common resource shared today is connection to the Internet.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
2. Chapter 8 Objectives
• 8.1 Explain the principles of networking
• 8.2 Describe types of networks
• Modes of Data Transmission
• 8.4 Describe the physical components of a network
3. • Networks are systems that are formed by links.
• People use different types of networks every
day:
– Mail delivery system
– Telephone system
– Public transportation system
– Corporate computer network
– The Internet
• Computers can be linked by networks to share
data and resources.
• A network can be as simple as two computers
connected by a single cable or as complex as
hundreds of computers connected to devices
that control the flow of information.
Principles of Networking
4. Computer Networks
• Network devices include:
– Desktop and laptop computers
– Printers and scanners
– PDAs and Smartphones
– File and print servers
• Resources shared across networks include:
– Services, such as printing or scanning
– Storage devices, such as hard drives or optical
drives
– Applications, such as databases
• Different types of network media:
– Copper cabling
– Fiber-optic cabling
– Wireless connection
5. Benefits of Networking
• Fewer peripherals
needed
• Increased
communication
capabilities
• Avoid file duplication
and corruption
• Lower cost licensing
• Centralized
administration
• Conserve resources
6. Types of Networks
A computer network is identified by:
• The type of media used to connect the devices
• The type of networking
devices used
• How the resources are
managed
• How the network is
organized
• How the data is stored
• The area it serves
7. Local Area Network (LAN)
• A group of interconnected
computers that is under
the same administrative
control.
• Can be as small as a single
local network installed in
a home or small office.
• Can consist of
interconnected local
networks consisting of
many hundreds of hosts,
installed in multiple
buildings and locations.
8. Wide Area Network (WAN)
• A WAN connects LANs in geographically
separated locations.
• A WAN covers a much larger
area than a LAN.
The Internet is a large WAN.
• Telecommunications service
providers (TSP) are used to
interconnect these LANs at
different locations.
9. Wireless LAN (WLAN)
• Wireless devices are used to transmit and receive
data using radio waves.
• Wireless devices connect to access points within a
specified area.
• Access points connect to the
network using copper cabling.
• WLAN coverage can be limited
to the area of a room, or can
have greater range.
• You can share resources such
as files and printers, and access
the Internet on a WLAN.
10. Peer-to-Peer Networking
• Share files, send messages, and print to a
shared printer.
• Each computer has similar capabilities and
responsibilities.
• Each user decides which data and devices to
share.
• No central point of control in the network.
• Best if there are ten or fewer computers.
11. Disadvantages of Peer-to-Peer
• Without centralized network
administration, it is difficult to determine
who controls network resources.
• Without centralized security, each
computer must use separate security
measures for data protection.
• More complex and difficult to manage as
the number of computers on the network
increases.
12. Client/Server Network
• Client/server network model provides
security and control for the network.
• Client requests information or services from
the server.
• Server provides the requested information
or service.
• Servers are maintained by network
administrators.
– Data backups and security measures
13. Bandwidth
• amount of data that can
be transmitted within a
fixed time period
• measured in bits per
second and is usually
denoted by the following:
– bps - bits per second
– Kbps - kilobits per
second
– Mbps - megabits per
second
14. Three Modes of Channel Operation
Modes of channel operation are:
1. Simplex (Unidirectional transmission) is a single, one-way transmission.
– Example: The signal sent from a TV station to your TV.
1. Half-duplex allows data to flow in one direction at a time.
– Simultaneous transmission in two directions is not allowed.
– Example: Two-way radios, police or emergency mobile radios
1. Full-duplex allows data to flow in both directions at the same time.
– Bandwidth is measured in only one direction. 100 Mbps full-duplex
means a bandwidth of 100 Mbps in each direction.
– Broadband technologies, such as digital subscriber line (DSL) and cable,
operate in full-duplex mode.
15. Internet Protocols
• Internet protocols are sets of rules governing communication
within and between computers on a network.
• Many protocols consist of a suite (or group) of protocols stacked in
layers. These layers depend on the operation of the other layers in
the suite to function properly.
• The main functions of protocols:
– Identifying errors
– Compressing the data
– Deciding how data is to be sent
– Addressing data
– Deciding how to announce sent and received data
Cisco Networking Academy Program
IT Essentials: PC Hardware and Software v4.0
Chapter 8: Networks
Slide 3 - Chapter 8 Objectives
The purpose of this chapter is to provide an overview of network principles, standards, and purposes.
After completing this chapter, students will meet these objectives:
Explain the principles of networking
Describe types of networks
Describe basic networking concepts and technologies
Describe the physical components of a network
Describe LAN topologies and architectures
Identify standards organizations
Identify Ethernet standards
Explain OSI and TCP/IP data models
Describe how to configure a NIC and a modem
Identify names, purposes, and characteristics of other technologies used to establish connectivity
Identify and apply common preventive maintenance techniques used for networks
Troubleshoot a network
Slide 6 - Principles of Networking
8.1 Explain the principles of networking
Networks are systems that are formed by links. Websites that allow individuals to link to each other’s pages are called social networking sites. A set of related ideas can be called a conceptual network. The connections you have with all your friends can be called your personal network.
People use networks everyday. Examples of networks are a mail delivery system, a telephone system, a public transportation system, a corporate computer network, and the Internet.
Computers can be linked by networks to share data and resources. A network can be as simple as two computers connected by a single cable or as complex as hundreds of computers connected to devices that control the flow of information. Converged data networks can include general purpose computers, such as PCs and servers, as well as devices with more specific functions, including printers, phones, televisions, and game consoles.
All data, voice, video, and converged networks share information and use various methods to direct how this information flows. The information on the network goes from one place to another, sometimes via different paths, to arrive at the appropriate destination.
The public transportation system is similar to a data network. The cars, trucks, and other vehicles are like the messages that travel within the network. Each driver defines a starting point (source) and an ending point (destination). Within this system, there are rules such as stop signs and traffic lights that control the flow from the source to the destination.
After completing this section, students will meet these objectives:
Define computer networks
Explain the benefits of networking
Teaching Strategy: The mail system allows messages to travel between any place that can be reached. The telephone system allows worldwide voice, fax, and Internet connections. Public transportation moves people and packages from source to destination. Each of these has a way of getting into and out of the network and a means of directing traffic. It is much the same with computer networks.
Slide 7 – Computer Networks
8.1.1 Define computer networks
A computer data network is a collection of hosts connected by networking devices. A host is any device that sends and receives information on the network. Peripherals are devices that are connected to hosts. Some devices can serve either as hosts or peripherals.
Computer networks are used globally in businesses, homes, schools, and government agencies. Many of the networks are connected to each other through the Internet. Network devices include:
Desktop and laptop computers
Printers and scanners
PDAs and Smartphones
File and print servers
Resources shared across networks include:
Services, such as printing or scanning
Storage space on removable devices, such as hard drives or optical drives
Applications, such as databases
Network uses include:
Access information stored on other computers
Print documents using shared printers
Synchronize the calendar between your computer and your smart phone
Different types of network media:
Copper cabling uses electrical signals to transmit data between devices
Fiber-optic cabling uses glass or plastic wire, also called fiber, to carry information as light pulses
Wireless connection uses radio signals, infrared technology (laser), or satellite transmissions
Slide 8 - Benefits of Networking
8.1.2 Explain the benefits of networks
The benefits of networking computers and other devices include lower costs and increased productivity. With networks, resources can be shared, which results in less duplication and corruption of data.
Fewer peripherals needed – Printers, scanners, and backup devices can be shared among the network users.
Increased communication capabilities - Collaboration tools facilitate communicate between users; Examples: e-mail, forums and chats, voice and video, and instant messaging
Avoid file duplication and corruption - Servers store data and share it with network users. Confidential or sensitive data can be protected and shared with the users who have permission to access that data. Document tracking software can be used to prevent users from changing files that others are accessing at the same time.
Lower cost licensing – The site license allows a group of people or an entire organization to use the application for a single fee.
Centralized administration - Fewer people needed to manage the network. Lower cost to the company. Easier data backup to a central location.
Conserve resources - Data processing is distributed across many computers to prevent overloading one computer with processing tasks.
Student Activity: The student course content includes a matching activity, 8.1.2 Advantages and Disadvantages of Networking. To complete this activity, students will identify each phrase as an advantage or a disadvantage.
Slide 9 - Types of Networks
8.2 Describe types of networks
Data networks continue to evolve in complexity, use, and design. To communicate about networks, different types of networks are given different descriptive names. A computer network is identified by the following specific characteristics:
The type of media used to connect the devices
The type of networking devices used
How the resources are managed
How the network is organized
How the data is stored
The area it serves
After completing this section, students will meet these objectives:
Describe a LAN
Describe a WAN
Describe a WLAN
Explain peer-to-peer networks
Explain client/server networks
Slide 10 – Local Area Network (LAN)
8.2.1 Describe a LAN
Local Area Network (LAN) refers to a group of interconnected computers that is under the same administrative control. In the past, LANs were considered to be small networks that existed in a single physical location. Although LANs can be as small as a single local network installed in a home or small office, over time, the definition of LANs has evolved to include interconnected local networks consisting of many hundreds of hosts, installed in multiple buildings and locations.
All the local networks within a LAN are under one administrative control group that governs the security and access control policies that are in force on the network. In this context, the word “Local” in Local Area Network refers to local consistent control rather than being physically close to each other. Devices in a LAN may be physically close, but it is not a requirement.
Slide 11 – Wide Area Network (WAN)
8.2.2 Describe a WAN
Wide Area Networks (WANs) are networks that connect LANs in geographically separated locations. A WAN covers a much larger area than a LAN. The most common example of a WAN is the Internet. The Internet is a large WAN that is comprised of millions of interconnected LANs. All of these networks are connected together using WAN connections, such as a phone company, cable company, or Internet Service Provider (ISP).
Telecommunications service providers (TSP) are used to interconnect these LANs at different locations.
Slide 12 – Wireless LAN (WLAN)
8.2.3 Describe a WLAN
Traditionally, in a LAN, devices are connected together using copper cabling. In some environments, installing copper cabling may not be practical, desirable, or even possible. In these situations, wireless devices are used to transmit and receive data using radio waves. These networks are called wireless LANs, or WLANs.
In a WLAN, wireless devices connect to access points within a specified area. Access points are typically connected to the network using copper cabling.
WLAN coverage can be limited to the area of a room or can have greater range.
As with LANs, you can share resources such as files and printers, and access the Internet on a WLAN.
Student Activity: The student course content includes a matching activity, 8.2.3 Network Types. To complete this activity, students will match each description to its network type.
Teaching Strategy: The physical cables that connect devices in a LAN can be replaced by radio waves. In this case, a LAN becomes a Wireless Local Area Network (WLAN). A hotspot is the area where wireless access is available around a wireless access point. Hotspots can overlap, causing them to interconnect.
Slide 13 – Peer-to-Peer Networking
8.2.4 Explain peer-to-peer networks
In a peer-to-peer network, devices are connected directly to each other without any additional networking devices between them. Each device has equivalent capabilities and responsibilities. Individual users are responsible for their own resources and can decide which data and devices to share. There is no central point of control or administration in the network.
Peer-to-peer networks work best in environments with ten or fewer computers.
Teaching Strategy: In a peer-to-peer network, networked computers act as equal partners, or peers, to each other. Individual users control their own resources. They may decide to share certain files with other users and may require passwords before they allow others to access their resources. Since individual users make these decisions, there is no central point of control or administration in the network. In addition, individual users must back up their own systems to be able to recover from data loss in case of failures. Peer-to-peer networks are relatively easy to install and operate. No additional equipment is necessary beyond a suitable operating system in each computer. Since users control their own resources, no dedicated administrators are needed. A peer-to-peer network works well with ten or fewer computers.
Slide 14 – Disadvantages of Peer-to-Peer
8.2.4 Explain peer-to-peer networks
Peer-to-peer networks have several disadvantages:
There is no centralized network administration which makes it difficult to determine who controls resources on the network.
There is no centralized security. Each computer must use separate security measures for data protection.
The network becomes more complex and difficult to manage as the number of computers on the network increases.
There may be no centralized data storage. Separate data backups must be maintained. This responsibility falls on the individual users.
Peer-to-peer networks still exist inside larger networks today. Even on a large client network, users can still share resources directly with other users without using a network server. In your home, if you have more than one computer, you can set up a peer-to-peer network.
Slide 15 – Client Server Network
8.2.5 Explain client/server networks
In a client/server model, the client requests information or services from the server. The server provides the requested information or service to the client. Servers on a client/server network commonly perform some of the processing work for client machines; for example, sorting through a database before delivering only the records requested by the client.
In a client/server model, the servers are maintained by network administrators. Data backups and security measures are implemented by the network administrator. The network administrator also controls user access to the network resources. All of the data on the network is stored on a centralized file server. Shared printers on the network are managed by a centralized print server. Network users with the proper permissions can access both the data and shared printers. Each user must provide an authorized username and password to gain access to network resources that they are permitted to use.
For data protection, an administrator performs a routine backup of all the files on the servers. If a computer crashes, or data is lost, the administrator can easily recover the data from a recent backup.
Teaching Strategy: As networks grow larger, peer-to-peer relationships become increasingly difficult to coordinate. They do not scale well, since their efficiency decreases rapidly as the number of computers on the network increases. Since individual users control access to the resources on their computers, security may be difficult to maintain. Client/server networks address these limitations of the peer-to-peer arrangement.
Slide 17 - Bandwidth
8.3.1 Explain bandwidth and data transmission
Data is sent in small chunks called packets.
A packet has a header, containing the source and destination of the packet.
A header has sequencing information so that the packets can be assembled at the destination.
Bandwidth is the amount of data that can be transmitted within a fixed time period.
Bandwidth is measured in bits per second and is usually denoted by the following:
bps - bits per second
Kbps - kilobits per second
Mbps - megabits per second
Bandwidth can be compared to highway traffic flow
On a highway, cars represent the data.
Number of lanes represents the number of cars that could travel on the highway at the same time.
An eight-lane highway allows four times as many cars as a two-lane highway.
Slide 18 – Three Modes of Transmission
8.3.1 Explain bandwidth and data transmission
Data is transmitted in one of three modes:
Simplex (Unidirectional transmission) is a single, one-way transmission.
Example: The signal sent from a TV station to your TV.
Half-duplex allows data to flow in one direction at a time.
Simultaneous transmission in two directions is not allowed.
Example: Two-way radios, police or emergency mobile radios
Full-duplex allows data to flow in both directions at the same time.
Bandwidth is measured in only one direction. 100 Mbps full-duplex means a bandwidth of 100 Mbps in each direction.
A telephone conversation is an example of full-duplex communication. Both people can talk at the same time, and can still hear each other.
Broadband technologies, such as digital subscriber line (DSL) and cable, operate in full-duplex mode. Broadband allows multiple signals to travel on the same wire simultaneously.
Full-duplex networking technology increases network performance because data can be sent and received at the same time. Example: With DSL, users can download data and talk on the telephone at the same time.
Slide 26 – Internet Protocols
8.3.4 Describe Internet protocols and applications
A protocol is a set of rules. Internet protocols are sets of rules governing communication within and between computers on a network. Protocol specifications define the format of the messages that are exchanged.
Timing is crucial to network operation. Protocols require messages to arrive within certain time intervals so that computers will not wait indefinitely for messages that may have been lost. Therefore, systems maintain one or more timers during transmission of data. Protocols also initiate alternative actions if the network does not meet the timing rules.
Many protocols consist of a suite of other protocols that are stacked in layers. These layers depend on the operation of the other layers in the suite to function properly.
These are the main functions of protocols:
Identifying errors
Compressing the data
Deciding how data is to be sent
Addressing data
Deciding how to announce sent and received data
Slide 31 – Physical Network Components
8.4 Describe the physical components of a network
There are many devices that can be used in a network to provide connectivity. The device you use will depend on how many devices you are connecting, the type of connections that they use, and the speed at which the devices operate. These are the most common devices on a network:
Computers
Hubs
Switches
Routers
Wireless access points
The physical components of a network are needed to move data between these devices. The characteristics of the media determine where and how the components are used. These are the most common media used on networks:
Twisted-pair copper cabling
Fiber-optic cabling
Radio waves
After completing this section, students will meet these objectives:
Identify names, purposes, and characteristics of network devices
Identify names, purposes, and characteristics of the common network cables