This document provides an overview of networking and communications basics, including network addresses, protocols, and infrastructure. It discusses IP addresses and their functions, the OSI model layers, URL structures, networking ports, and hosting/domain registration services. IP addresses allow devices on a network to communicate by providing unique identifiers. The seven-layer OSI model standardizes network communications. URLs, domains, and ports facilitate finding and accessing resources over the internet. Hosting facilities and registrars manage physical infrastructure and domain name resolution.
The document is an introduction to networking and communications. It discusses the history of networks beginning with ARPANET in the 1960s and the development of TCP/IP that allowed different networks to communicate. This led to the creation of the Internet. The introduction of the World Wide Web in the 1990s, beginning with Tim Berners-Lee's project, made the Internet easy to use and browse with graphical web pages. Today, networks are ubiquitous and integral to our daily lives, enabling communication, social media, commerce and more from anywhere through connected devices.
The document discusses various topics related to Windows security, including computer viruses, malware, vulnerabilities, and attacks. It defines viruses as malicious code designed to spread from computer to computer and alter operations. Malware is described as any malicious software intended to damage or access a computer without the owner's permission, including viruses, ransomware, and spyware. The document also covers vulnerabilities in operating systems that can be exploited in attacks, and defines denial-of-service attacks and backdoors as examples of security threats.
This document discusses databases and their importance in information systems. It begins by defining data, information, and knowledge, explaining how data is transformed into useful information and knowledge through organization and context. It then describes different types of databases, focusing on flat file databases and relational databases. Flat file databases store all data in one file but have limitations around data duplication, searchability, and concurrent access. Relational databases break data into normalized tables with relationships between them, addressing those limitations through their structure and use of queries. The document provides examples to illustrate key differences between the two database types.
The document discusses database security and common threats. It notes that database breaches exposing personally identifiable information increased significantly in 2013, with over 822 million records exposed. Common causes of database breaches included hacking, which accounted for over 59% of reported incidents and 72% of exposed records. Specific large breaches discussed included those affecting Adobe, Target, and the US National Security Agency. The document stresses that database security presents ongoing challenges given the emergence of new threats and no database is completely secure.
This document provides an introduction to web development. It discusses the brief history of the internet and how it started in the 1960s between government researchers and universities. It also covers website design, including considerations like the fold and landing pages. Finally, it discusses HTML, CSS, fonts, and site maps as important aspects of web development.
The document discusses cybercrime and computer misuse laws in the UK. It summarizes key pieces of legislation like the Computer Misuse Act of 1990, which created three new computer-related offenses. The Act aims to address issues like unauthorized access to computer material, systems, or modification of content. The document also discusses offenses related to hacking, viruses, fraud, and issues around existing laws not fully covering computer-related crimes.
The effects of Social Networking upon societyBishrul Haq
This document discusses the effects of social networking on society. It outlines some of the main positive effects, including the ability to communicate instantly with people, share photos and videos, share opinions and emotions, promote advertisements, and increase reputation. Some negative effects mentioned are political and religious corruption enabled by social media, the threat of unauthorized information tapping by hackers, addiction to social media, underage access without parental guidance, and emotional and heartbreaking situations caused by social media interactions. The document provides examples of popular social media platforms and how they contribute to these effects on individuals and society.
This document provides an overview of networking and communications basics, including network addresses, protocols, and infrastructure. It discusses IP addresses and their functions, the OSI model layers, URL structures, networking ports, and hosting/domain registration services. IP addresses allow devices on a network to communicate by providing unique identifiers. The seven-layer OSI model standardizes network communications. URLs, domains, and ports facilitate finding and accessing resources over the internet. Hosting facilities and registrars manage physical infrastructure and domain name resolution.
The document is an introduction to networking and communications. It discusses the history of networks beginning with ARPANET in the 1960s and the development of TCP/IP that allowed different networks to communicate. This led to the creation of the Internet. The introduction of the World Wide Web in the 1990s, beginning with Tim Berners-Lee's project, made the Internet easy to use and browse with graphical web pages. Today, networks are ubiquitous and integral to our daily lives, enabling communication, social media, commerce and more from anywhere through connected devices.
The document discusses various topics related to Windows security, including computer viruses, malware, vulnerabilities, and attacks. It defines viruses as malicious code designed to spread from computer to computer and alter operations. Malware is described as any malicious software intended to damage or access a computer without the owner's permission, including viruses, ransomware, and spyware. The document also covers vulnerabilities in operating systems that can be exploited in attacks, and defines denial-of-service attacks and backdoors as examples of security threats.
This document discusses databases and their importance in information systems. It begins by defining data, information, and knowledge, explaining how data is transformed into useful information and knowledge through organization and context. It then describes different types of databases, focusing on flat file databases and relational databases. Flat file databases store all data in one file but have limitations around data duplication, searchability, and concurrent access. Relational databases break data into normalized tables with relationships between them, addressing those limitations through their structure and use of queries. The document provides examples to illustrate key differences between the two database types.
The document discusses database security and common threats. It notes that database breaches exposing personally identifiable information increased significantly in 2013, with over 822 million records exposed. Common causes of database breaches included hacking, which accounted for over 59% of reported incidents and 72% of exposed records. Specific large breaches discussed included those affecting Adobe, Target, and the US National Security Agency. The document stresses that database security presents ongoing challenges given the emergence of new threats and no database is completely secure.
This document provides an introduction to web development. It discusses the brief history of the internet and how it started in the 1960s between government researchers and universities. It also covers website design, including considerations like the fold and landing pages. Finally, it discusses HTML, CSS, fonts, and site maps as important aspects of web development.
The document discusses cybercrime and computer misuse laws in the UK. It summarizes key pieces of legislation like the Computer Misuse Act of 1990, which created three new computer-related offenses. The Act aims to address issues like unauthorized access to computer material, systems, or modification of content. The document also discusses offenses related to hacking, viruses, fraud, and issues around existing laws not fully covering computer-related crimes.
The effects of Social Networking upon societyBishrul Haq
This document discusses the effects of social networking on society. It outlines some of the main positive effects, including the ability to communicate instantly with people, share photos and videos, share opinions and emotions, promote advertisements, and increase reputation. Some negative effects mentioned are political and religious corruption enabled by social media, the threat of unauthorized information tapping by hackers, addiction to social media, underage access without parental guidance, and emotional and heartbreaking situations caused by social media interactions. The document provides examples of popular social media platforms and how they contribute to these effects on individuals and society.
Trabalho de TIC - «Os Perigos da Internet»Maria Freitas
Este trabalho foi feito no âmbito da disciplina de TIC, no ano letivo 2012/2013.
É de destacar que estes trabalhos não estão de acordo com o novo acordo ortográfico e podem conter erros ortográficos/científicos/históricos visto que foram efetuados por alunos, alguns deles sem posterior correção.
Introduction to Ethics and Social Media Powerpoint 22.10.14Jessica Stokes
This document discusses the ethical considerations lawyers must follow when using social media. It notes that while social media allows lawyers to market themselves and communicate with clients, it also poses risks if confidentiality is breached or professional conduct rules are violated. The document outlines the various rules of conduct for lawyers, examines specific ethical situations that can arise on social media, and provides tips for social media use to avoid ethical issues.
Computer ethics is a branch of ethics that deals with moral principles regarding computer and technology use. It addresses issues like intellectual property, privacy, how technology impacts society, and proper computer behavior. The document outlines several principles of computer ethics including avoiding harming others, respecting privacy and intellectual property, being honest, and considering the social consequences of one's work. It also discusses specific issues like software piracy, computer viruses, plagiarism, and hacking from an ethical perspective. The goal of computer ethics is to provide guidelines for responsible and ethical computer use as technology continues to evolve.
1) O documento discute fenômenos climáticos como furacões e tornados. 2) Explica como furacões se formam através de troca de calor, chuvas torrenciais e baixa pressão atmosférica. 3) Detalha os danos causados por furacões como Katrina e Sandy, incluindo inundações, ventos fortes e marés de tempestade.
This document discusses software liability, including what it is, who can be liable, and best practices. Software liability refers to the legal responsibility of developers, manufacturers, and users for any damages caused by software failures. Thorough testing and documentation are important practices to mitigate liability risks. Software liability involves various legal frameworks around contract law, tort law, and federal and state regulations. It is crucial for all parties to understand their responsibilities to ensure software is safe and reduce the risks of liability claims.
ICT and the transformation of the legal profession Oluwaseyi K. Oni
ICT is transforming the legal profession in several ways:
1. Technology is being leveraged to deliver legal services more efficiently through tools like video conferencing, online legal communities, e-libraries and case management systems.
2. The rise of e-commerce requires new approaches to legal documentation and dispute resolution, like online dispute resolution and smart contracts on blockchain.
3. Certain routine legal tasks like company formation and basic legal research may become automated, but complex legal work requiring judgment and nuance will still need human lawyers.
The future legal profession is uncertain but will likely see subscription pricing models, an emphasis on technology skills, and changing roles for legal professionals and tools.
Computer ethics provides guidelines for the moral and responsible use of computer technology. It addresses issues like privacy, intellectual property, authentication, verification, and controversial content. The document outlines 10 commandments of computer ethics that instruct users to not harm others, steal, snoop, or misuse resources without permission. It also discusses privacy threats from technologies like cookies and spyware, and methods to protect privacy through laws, software, authentication using biometrics or callbacks, and verification of users and processed objects. Intellectual property is also covered, describing how works are legally protected.
A importância das redes sociais para a comunicaçãoDanielmendesGO
O documento discute a importância das redes sociais para a comunicação empresarial, destacando que elas podem agregar mercado, melhorar relacionamentos com clientes e fornecedores, e reduzir custos com marketing. Também aborda as principais características, vantagens, desvantagens, objetivos e custos associados ao uso de redes sociais por empresas.
O projeto visa capacitar idosos no uso de tecnologias digitais, ensinando noções básicas de informática e internet para promover a inclusão digital e melhorar a qualidade de vida dos idosos. O projeto será realizado para 20 idosos e inclui oficinas sobre editor de texto, internet e chat.
The document provides an introduction to computer networks, including:
- ARPANET was the first network established by the US Department of Defense in the 1960s to connect research institutions over telephone lines.
- Key milestones include the development of email in 1972 and the introduction of TCP/IP as the standard protocol in 1982.
- Computer networks allow for resource sharing, high reliability, and flexible access across connected devices through hardware like routers and switches, transmission media, and network protocols.
1. The document discusses the history and development of computer networks, beginning with ARPANET in the late 1960s which was funded by the U.S. Defense Department and linked research institutions over telephone lines.
2. It provides definitions and examples of common computer network hardware such as routers, servers, clients, and switches. Twisted pair cable, coaxial cable, and fiber-optic cable are described as connection types.
3. Network protocols like TCP/IP and OSI are mentioned as the established rules that allow devices to communicate over a network, along with network operating systems to facilitate connection between autonomous computers.
This document outlines learning objectives and concepts related to telecommunications and networking. It covers 13 key topics including understanding networks, Metcalfe's law, telecommunications trends, components of telecommunication networks, client/server networking, peer-to-peer networking, digital vs analog signals, transmission media, wireless technologies, TCP/IP, the OSI model, and more. Diagrams and examples are provided to explain concepts like intranets, extranets, routers, wireless technologies, and models like OSI and TCP/IP.
The document provides an introduction to computer networks including:
- The origins of computer networks dating back to the 1950s and 1960s with mainframe-based networks.
- Definitions of a computer network as the interconnection of computer systems for sharing information and resources.
- Examples of different types of networks including LAN, MAN, WAN.
- Goals of computer networks such as resource sharing, improved performance, high reliability, and cost reduction.
- Hardware and software components including hubs, switches, routers, modems, servers, protocols, and cable types.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the U.S. Defense Department to connect research computers and allow for more effective communication. It served as the basis for the modern Internet and implemented the TCP/IP protocol. A computer network connects computers together to share resources, data, and applications over various connection types. Key network components include network interface cards, servers, routers, bridges, hubs, switches, and gateways. Modern computer technologies that utilize networks include artificial intelligence, data science, the Internet of Things, blockchain, and edge computing.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Computer networks allow two or more computers to connect and communicate electronically for sharing resources and data. The key goals of networking include resource sharing, high performance, reliability, inter-process communication, security, and flexible access to files from any computer on the network. Computer networks have hardware components like network interface cards, servers, clients, and transmission media, as well as software including network operating systems and protocols. Cables that connect the hardware include twisted pair, coaxial, and fiber-optic cables.
This document provides an introduction and overview of computer networks. It defines a computer network as a group of interconnected computers that share resources. It discusses the history of computer networks including ARPANET, the precursor to the modern Internet. It also outlines the goals of computer networks such as resource sharing, high reliability, inter-process communication, and flexible access. Finally, it identifies some key hardware and software components that make up computer networks, including network interface cards, hubs, switches, routers, modems, and different cable types.
This document provides an introduction to computer networks, covering the history of networks like ARPANET, goals of computer networking like resource sharing, applications like e-commerce, and network hardware and software components. It discusses the development of early networks in the 1960s-70s that led to the Internet, goals of high reliability and flexible access. The document also summarizes network hardware like network interface cards, servers, clients, and cables; software components like network operating systems and protocols; and defines common network devices like routers, bridges, hubs, and switches.
The document provides an introduction to computer networks including:
1. The origins and early development of the Internet from ARPANET in the 1960s-1980s.
2. The basic components, goals, and applications of computer networks including resource sharing, reliability, and performance.
3. The key hardware, software, and transmission media that enable computer networking including hubs, switches, routers, network interface cards, transmission control protocol, and fiber optic cables.
This document provides an overview of computer networks, including definitions, history, purposes, types, and how networks have changed the world. It defines a computer network as a collection of interconnected devices that allow sharing of resources and information. Networks originated in the late 1950s and were developed by the military and for airline reservations. There are three main types of networks based on organization (peer-to-peer and server-based), geography (LAN, WAN, MAN), and computing model (centralized and client-server). Networks now connect computers worldwide, allowing fast transmission of documents and information.
This note is about the basic introduction of computer networks. It contains a detailed description of computer network, ARPANET, goals of computer network, application of computer network and details about networking hardware & software components.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
Trabalho de TIC - «Os Perigos da Internet»Maria Freitas
Este trabalho foi feito no âmbito da disciplina de TIC, no ano letivo 2012/2013.
É de destacar que estes trabalhos não estão de acordo com o novo acordo ortográfico e podem conter erros ortográficos/científicos/históricos visto que foram efetuados por alunos, alguns deles sem posterior correção.
Introduction to Ethics and Social Media Powerpoint 22.10.14Jessica Stokes
This document discusses the ethical considerations lawyers must follow when using social media. It notes that while social media allows lawyers to market themselves and communicate with clients, it also poses risks if confidentiality is breached or professional conduct rules are violated. The document outlines the various rules of conduct for lawyers, examines specific ethical situations that can arise on social media, and provides tips for social media use to avoid ethical issues.
Computer ethics is a branch of ethics that deals with moral principles regarding computer and technology use. It addresses issues like intellectual property, privacy, how technology impacts society, and proper computer behavior. The document outlines several principles of computer ethics including avoiding harming others, respecting privacy and intellectual property, being honest, and considering the social consequences of one's work. It also discusses specific issues like software piracy, computer viruses, plagiarism, and hacking from an ethical perspective. The goal of computer ethics is to provide guidelines for responsible and ethical computer use as technology continues to evolve.
1) O documento discute fenômenos climáticos como furacões e tornados. 2) Explica como furacões se formam através de troca de calor, chuvas torrenciais e baixa pressão atmosférica. 3) Detalha os danos causados por furacões como Katrina e Sandy, incluindo inundações, ventos fortes e marés de tempestade.
This document discusses software liability, including what it is, who can be liable, and best practices. Software liability refers to the legal responsibility of developers, manufacturers, and users for any damages caused by software failures. Thorough testing and documentation are important practices to mitigate liability risks. Software liability involves various legal frameworks around contract law, tort law, and federal and state regulations. It is crucial for all parties to understand their responsibilities to ensure software is safe and reduce the risks of liability claims.
ICT and the transformation of the legal profession Oluwaseyi K. Oni
ICT is transforming the legal profession in several ways:
1. Technology is being leveraged to deliver legal services more efficiently through tools like video conferencing, online legal communities, e-libraries and case management systems.
2. The rise of e-commerce requires new approaches to legal documentation and dispute resolution, like online dispute resolution and smart contracts on blockchain.
3. Certain routine legal tasks like company formation and basic legal research may become automated, but complex legal work requiring judgment and nuance will still need human lawyers.
The future legal profession is uncertain but will likely see subscription pricing models, an emphasis on technology skills, and changing roles for legal professionals and tools.
Computer ethics provides guidelines for the moral and responsible use of computer technology. It addresses issues like privacy, intellectual property, authentication, verification, and controversial content. The document outlines 10 commandments of computer ethics that instruct users to not harm others, steal, snoop, or misuse resources without permission. It also discusses privacy threats from technologies like cookies and spyware, and methods to protect privacy through laws, software, authentication using biometrics or callbacks, and verification of users and processed objects. Intellectual property is also covered, describing how works are legally protected.
A importância das redes sociais para a comunicaçãoDanielmendesGO
O documento discute a importância das redes sociais para a comunicação empresarial, destacando que elas podem agregar mercado, melhorar relacionamentos com clientes e fornecedores, e reduzir custos com marketing. Também aborda as principais características, vantagens, desvantagens, objetivos e custos associados ao uso de redes sociais por empresas.
O projeto visa capacitar idosos no uso de tecnologias digitais, ensinando noções básicas de informática e internet para promover a inclusão digital e melhorar a qualidade de vida dos idosos. O projeto será realizado para 20 idosos e inclui oficinas sobre editor de texto, internet e chat.
The document provides an introduction to computer networks, including:
- ARPANET was the first network established by the US Department of Defense in the 1960s to connect research institutions over telephone lines.
- Key milestones include the development of email in 1972 and the introduction of TCP/IP as the standard protocol in 1982.
- Computer networks allow for resource sharing, high reliability, and flexible access across connected devices through hardware like routers and switches, transmission media, and network protocols.
1. The document discusses the history and development of computer networks, beginning with ARPANET in the late 1960s which was funded by the U.S. Defense Department and linked research institutions over telephone lines.
2. It provides definitions and examples of common computer network hardware such as routers, servers, clients, and switches. Twisted pair cable, coaxial cable, and fiber-optic cable are described as connection types.
3. Network protocols like TCP/IP and OSI are mentioned as the established rules that allow devices to communicate over a network, along with network operating systems to facilitate connection between autonomous computers.
This document outlines learning objectives and concepts related to telecommunications and networking. It covers 13 key topics including understanding networks, Metcalfe's law, telecommunications trends, components of telecommunication networks, client/server networking, peer-to-peer networking, digital vs analog signals, transmission media, wireless technologies, TCP/IP, the OSI model, and more. Diagrams and examples are provided to explain concepts like intranets, extranets, routers, wireless technologies, and models like OSI and TCP/IP.
The document provides an introduction to computer networks including:
- The origins of computer networks dating back to the 1950s and 1960s with mainframe-based networks.
- Definitions of a computer network as the interconnection of computer systems for sharing information and resources.
- Examples of different types of networks including LAN, MAN, WAN.
- Goals of computer networks such as resource sharing, improved performance, high reliability, and cost reduction.
- Hardware and software components including hubs, switches, routers, modems, servers, protocols, and cable types.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the U.S. Defense Department to connect research computers and allow for more effective communication. It served as the basis for the modern Internet and implemented the TCP/IP protocol. A computer network connects computers together to share resources, data, and applications over various connection types. Key network components include network interface cards, servers, routers, bridges, hubs, switches, and gateways. Modern computer technologies that utilize networks include artificial intelligence, data science, the Internet of Things, blockchain, and edge computing.
Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code . Common targets for web application attacks are content management systems Web application security is important to any business as it helps to keep web applications functioning smoothly and protect businesses from cyber vandalism, data theft, unethical competition, and other negative consequences . Web applications may face a number of attack types depending on the attacker’s goals, the nature of the targeted organization’s work. A web application (web app) is an application program that is stored on a remote server and delivered over the internet through a browser interface. Web services are web apps by definition and many, although not all, websites contain web apps.
Computer networks allow two or more computers to connect and communicate electronically for sharing resources and data. The key goals of networking include resource sharing, high performance, reliability, inter-process communication, security, and flexible access to files from any computer on the network. Computer networks have hardware components like network interface cards, servers, clients, and transmission media, as well as software including network operating systems and protocols. Cables that connect the hardware include twisted pair, coaxial, and fiber-optic cables.
This document provides an introduction and overview of computer networks. It defines a computer network as a group of interconnected computers that share resources. It discusses the history of computer networks including ARPANET, the precursor to the modern Internet. It also outlines the goals of computer networks such as resource sharing, high reliability, inter-process communication, and flexible access. Finally, it identifies some key hardware and software components that make up computer networks, including network interface cards, hubs, switches, routers, modems, and different cable types.
This document provides an introduction to computer networks, covering the history of networks like ARPANET, goals of computer networking like resource sharing, applications like e-commerce, and network hardware and software components. It discusses the development of early networks in the 1960s-70s that led to the Internet, goals of high reliability and flexible access. The document also summarizes network hardware like network interface cards, servers, clients, and cables; software components like network operating systems and protocols; and defines common network devices like routers, bridges, hubs, and switches.
The document provides an introduction to computer networks including:
1. The origins and early development of the Internet from ARPANET in the 1960s-1980s.
2. The basic components, goals, and applications of computer networks including resource sharing, reliability, and performance.
3. The key hardware, software, and transmission media that enable computer networking including hubs, switches, routers, network interface cards, transmission control protocol, and fiber optic cables.
This document provides an overview of computer networks, including definitions, history, purposes, types, and how networks have changed the world. It defines a computer network as a collection of interconnected devices that allow sharing of resources and information. Networks originated in the late 1950s and were developed by the military and for airline reservations. There are three main types of networks based on organization (peer-to-peer and server-based), geography (LAN, WAN, MAN), and computing model (centralized and client-server). Networks now connect computers worldwide, allowing fast transmission of documents and information.
This note is about the basic introduction of computer networks. It contains a detailed description of computer network, ARPANET, goals of computer network, application of computer network and details about networking hardware & software components.
ARPANET was the first wide-area packet switching network developed in the late 1960s under the US Advanced Research Projects Agency (ARPA). It served as the basis for today's internet and initially linked computers located at Pentagon-funded research institutions over telephone lines. A computer network connects computers together to allow for sharing of resources like files, printers or internet access. There are several types of computer networks including local area networks (LANs), personal area networks (PANs), metropolitan area networks (MANs), and wide area networks (WANs). Key components of computer networks include hardware like network interface cards (NICs), cables, routers, switches and software.
This document provides an overview of networks and telecommunications for an information systems course. It discusses the key components of telecommunications networks, including terminals, processors, channels, computers and software. It describes different network topologies like star, ring and bus configurations. The document also covers telecommunications protocols like OSI and TCP/IP, trends in telecommunications, and popular business uses of the internet like email, e-commerce and overcoming barriers.
This document provides an overview of computer networks including their history, goals, components, types, and technologies. It discusses how the ARPANET was developed in the late 1960s to enable resource sharing between computers. The key components that enable computer networks are described such as network interface cards, servers, clients, routers, switches, and cables. Different types of computer networks are defined including personal area networks, local area networks, metropolitan area networks, and wide area networks.
This chapter provides an overview of computer networks, including different network types, topologies, protocols, and hardware components. It discusses how networks connect various devices to share resources and information. Local area networks (LANs) connect devices within a single location, while wide area networks (WANs) connect multiple LANs across large geographical areas. Network types include wireless LANs, personal area networks, metropolitan area networks, and peer-to-peer networks. The chapter also covers benefits of networking such as reduced costs, increased communication and collaboration capabilities, centralized administration and backup, and avoidance of file duplication.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEKate Campbell
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network, including network interface cards, hubs, routers, modems, and switches. These components work together to connect devices and allow for the exchange of digital information across computer networks. The document also covers different types of computer networks like local area networks, wide area networks, and wireless networks. It explains how networks are designed and configured, with a focus on important aspects like security, performance, and dependability.
A SURVEY OF COMPUTER NETWORKING THEORY AND PRACTICEIRJET Journal
This document provides an overview of computer networking theory and practice. It discusses the key components of a computer network including network interface cards, hubs, routers, modems, switches, and cables. It describes different types of networks like local area networks, wide area networks, and wireless networks. The document also covers the uses of computer networks like resource sharing, communication, the server-client model, e-commerce, and as a communication medium. Finally, it discusses the benefits of computer networks such as sharing resources, improved communication, increased security, remote access, and cost savings, as well as some potential disadvantages.
This document provides information about network basics including definitions of key network concepts and components. It discusses network architecture such as peer-to-peer and client-server models. It also covers different network topologies including bus, star, and ring configurations. Finally, it describes classifications of networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs).
The document discusses computer networks and networking. It begins by explaining that a computer network allows sharing of resources and information among interconnected devices. It then discusses the history and development of computer networks, including the ARPANET developed in the 1960s. The document outlines the basic components of communication (sender, receiver, medium) and explains how computer networks facilitate communication between computers. It defines different types of networks including local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). The document also discusses the components of networks including servers, clients, media, and resources. It describes server-based networks and peer-to-peer networks, highlighting their differences in size, security, administration, and
The document discusses different managerial roles in information systems. A Chief Information Officer (CIO) heads the information systems function and aligns technology with organizational goals. Functional managers oversee specific functions that report to the CIO, such as systems analysis. An ERP manager maintains and implements changes to enterprise resource planning systems. Project managers are responsible for keeping IT projects on schedule and on budget. An Information Security Officer sets and enforces information security policies to protect organizational data from internal and external threats.
This document discusses different roles that people play in creating information systems. It describes systems analysts as identifying business needs and designing systems to address them. Programmers then write the code to build the systems based on designs. Computer engineers design the underlying hardware and software technologies, with roles in hardware, software, systems integration, and networking. Creators generally have technical backgrounds in fields like computer science and mathematics.
The document discusses operating systems and their functions. It describes how operating systems manage computer hardware and software resources, provide common services to programs, and how the most common operating systems are Windows and MacOS. It provides several methods to identify the specific Windows or MacOS version running on a computer. The document also discusses the history and versions of Windows, MacOS, and Android operating systems.
This document discusses file systems and how they provide an abstraction of data storage on hardware. It defines a file system as a mapping from file names to file contents, with files being sequences of bytes. It also notes that different operating systems commonly use different file systems like FAT, NTFS, ext2/3/4, and HFS+. Hard drives and solid state drives actually store data in more complex ways at the physical level.
This document discusses computer software, including system software and application software. It describes how operating systems are a key type of system software that provides essential functions like managing hardware resources and providing a platform for applications. Popular desktop operating systems today include Windows, MacOS, Chrome OS, and Linux, while mobile operating systems include Android and iOS. The document also discusses how operating systems have evolved over time to take advantage of improvements in processing power and memory.
This document discusses downloading files from the internet. It explains that links can point to files that can be downloaded to a computer. To download a file, you can right-click the link and select "Save link as" or "Save target as." Files are often downloaded to the downloads folder by default. The document also notes that downloading files carries security risks and that one should only download files from trusted sources. It defines downloading as copying data from the internet or external storage to one's computer, while uploading is the reverse of copying to the internet or external storage.
The document discusses file management in Windows operating systems. It describes how to use the Windows File Explorer to organize and manage files and folders on a computer. Key functions covered include copying, moving, and deleting files using tools on the ribbon toolbar like Home, Share, and View tabs. It also explains how to cut, copy, and paste files between locations, and use keyboard shortcuts to perform common file management tasks.
This document discusses different types of computer hardware. It describes personal computers, laptops, mobile phones, tablets, and wearable devices. It explains how these systems have evolved over time as technology has advanced, with smartphones and mobile devices now dominating the market. The document also discusses integrated computing and how technology is being built into everyday products like homes, vehicles and appliances.
This document provides an overview of information systems and their evolution. It begins by defining key terms like data, information, and information systems. It then describes how information systems have evolved over time, starting from the mainframe era where only large organizations could afford room-sized computers, to the PC revolution bringing computers to businesses and individuals with the launch of the IBM PC. The document traces this evolution through additional stages like client-server systems and the modern Internet-connected world. It provides examples and context throughout to illustrate how information systems have transformed and taken on new roles within organizations over decades of technological advancement.
This document provides an introduction to an introductory information technology course. It outlines the course topics which include different types of computing devices, computer applications and software, data analysis, programming, ethics in technology, and information security. It describes the student learning outcomes and evaluations methods which include discussions, quizzes, assignments, exams and a presentation. Guidelines and expectations are provided around assignments, grading, attendance and communication policies.
This document discusses internet privacy, security, and netiquette. It begins by defining internet privacy and noting that privacy concerns have existed since the beginnings of computer sharing. It describes personally identifying information and how privacy relates to information collection. The document outlines risks to internet privacy like cookies and photos online. It emphasizes being careful about what personal information is submitted or posted online so as to avoid issues like identity theft, spam, or information being used by companies for targeted advertising.
The document discusses internet privacy, security, and netiquette. It provides 10 tips for staying safe online, including keeping software updated, being wary of emails from unknown sources, avoiding clicking suspicious links, realizing that free software can still pose risks, not revealing private information on social media, using unique passwords for all accounts, and enabling two-factor authentication. Following basic netiquette rules and safety tips can help users avoid threats like phishing and malware infections.
The document discusses various topics relating to internet privacy, security, and netiquette. It covers computer security and the importance of protecting systems from harm. Examples are given of different systems that are at risk of attacks, including financial systems, utilities, aviation, consumer devices, large corporations, and automobiles. Specific security issues and past attacks are described for each one.
The document provides an introduction to HTML and web development. It discusses what HTML is, the different versions of HTML, HTML elements and tags, how to structure an HTML document with the doctype, head, body and other tags. It also covers creating HTML files, adding images, links, and navigation to pages. The goal is to teach the basics of HTML to create simple websites and web pages.
This document discusses several roles involved in the day-to-day operations and administration of information systems, including computer operators who oversee mainframe computers and data centers, database administrators who manage organizational databases, help desk analysts who are the first line of support for computer users, and trainers who conduct classes to teach users specific computer skills. These roles work to ensure technology systems run effectively and that users can make the most of available resources.
The document discusses the relational data model and databases. It introduces the relational data model, which describes data as interrelated tables. It describes key concepts in relational databases including tables, rows, columns, fields/attributes, records, domains, and degrees. It also discusses database design principles, data warehouses for analysis, and approaches to data warehouse design.
The document discusses the design of a database for a university to track student club participation. A design team determined that tables were needed to track clubs, students, club memberships, and club events. The team defined the fields for each table, including primary keys. Examples of normalized database tables are also provided, along with explanations of 1st, 2nd, and 3rd normal forms. Additional database topics like data types, file-based systems, and database security are also briefly covered.
The document discusses file-based systems for managing organizational data, which were used before modern database systems. File-based systems had several disadvantages, including data redundancy, data isolation, integrity problems, security issues, and concurrency access conflicts. The development of database management systems provided a new approach for storing and organizing data that helped address these issues.
A database is a shared collection of related data used to support organizational activities. A database management system (DBMS) is a computerized data system that allows users to perform operations on a database. DBMSs can be classified based on data model (relational, hierarchical, etc.), number of users supported (single or multi-user), and database distribution (centralized, distributed, homogeneous, heterogeneous). Database users include end users, application users, application programmers, sophisticated users, and database administrators.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
Reimagining Your Library Space: How to Increase the Vibes in Your Library No ...Diana Rendina
Librarians are leading the way in creating future-ready citizens – now we need to update our spaces to match. In this session, attendees will get inspiration for transforming their library spaces. You’ll learn how to survey students and patrons, create a focus group, and use design thinking to brainstorm ideas for your space. We’ll discuss budget friendly ways to change your space as well as how to find funding. No matter where you’re at, you’ll find ideas for reimagining your space in this session.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
INT 1010 06-3.pdf
1. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
1
06.3
Networking & Communications:
Providing Resources in a Network
2. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
2
Introduction Network
Basics
Resources in
Networks
Internet
Connections
Network
trends
Network
Security
Summary
3. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
3
Clients and
Servers
Network
Components
Network
Representations
Networks in
many sizes
Resources in
Networks
Types of
Networks
4. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
4
Networks in
many sizes
Networking &
Communications
5. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
5
Networks come in all sizes.
They can go from basic networks consisting of two
PCs to networks interfacing with many gadgets.
Basic networks introduced in homes empower
sharing of assets, for example, printers, archives,
pictures, and music between a couple of nearby
PCs.
Worldwide internet users expect always to stay
connected to the internet.
They expect their connected devices to do the
following:
• Stay connected to the internet to complete their work.
• Have the ability to send and receive data fast.
• Have the ability to send small and large quantities of data
globally via any device connected to the internet.
6. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
6
Home office networks and small office networks are regularly
set up by people who work from home or remote offices.
They need to associate with a corporate network or other
concentrated assets.
Moreover, numerous independently employed business
people utilize home office and small office networks to
publicize and sell items, request supplies and speak with
clients.
The Internet is the biggest network presently.
Indeed, the term Internet implies a network of networks.
The internet is the global worldwide network that connects
millions of computers around the world.
A computer can connect to another computer in a different
country via the internet.
7. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
7
Clients and
Servers
Network
Components
Network
Representations
Networks in
many sizes
Resources in
Networks
Types of
Networks
8. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
8
Clients and
Servers
Networking &
Communications
9. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
9
All PCs associated with a network are named
hosts. Hosts are also called end devices.
Servers are PCs with programming that
empower them to give data, similar to emails
or website pages, to other network devices
called clients.
Each assistance requires separate server
programming.
For instance, a server requires web server
programming to give web administrations to
the network.
A PC with server programming can offer types
of assistance at the same time to one or
numerous customers.
10. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
10
Furthermore, a solitary PC can run numerous sorts
of server programming.
It might be vital for one PC to go about as a
document server, a web server, and an email server
in a home or private company.
Clients are PCs with programming introduced that
empower them to ask for and show the server's data.
A case of client programming is an internet browser,
similar to Chrome or Firefox.
A solitary PC can likewise run different kinds of
custom programming.
For instance, a client can browse email and view a
site page while texting and tuning in to Internet
radio.
11. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
11
Clients and
Servers
Network
Components
Network
Representations
Networks in
many sizes
Resources in
Networks
Types of
Networks
12. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
12
Network
Components
Networking &
Communications
13. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
13
The link between the sender and the receiver can be as
simple as a single cable connection between these two
devices or more sophisticated as a set of switches and
routers between them.
The network framework contains three classes of
network segments:
• Devices
• Media
• Services
Devices and media are the physical components, or
equipment, of the network.
Equipment is regularly the noticeable segment of the
network stage, for example, a PC, switch, remote
passageway, or the cabling used to associate the devices.
14. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
14
Administrations incorporate a
significant number of the basic
network applications individuals
utilize each day, similar to email
facilitating administrations and
web facilitating administrations.
Procedures give the usefulness
that coordinates and moves the
messages through the network.
Procedures are more subtle to us
yet are basic to the activity of
networks.
15. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
15
End Devices
An end device is either the source or
destination of a message transmitted over the
network.
Each end device is identified by an IP address
and a physical address.
Both addresses are needed to communicate
over a network.
IP addresses are unique logical IP addresses
that are assigned to every device within a
network.
If a device moves from one network to
another, then the IP address has to be
modified.
16. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
16
Physical addresses, also known as MAC (Media Access Control) addresses, are
unique addresses assigned by the device manufacturers.
These addresses are permanently burned into the hardware.
17. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
17
Intermediary Network Devices
Some devices act as intermediaries
between devices.
They are called delegated devices.
These delegated devices give
availability and guarantee that
information streams over the network.
Routers utilize the destination end
device address, related to data about
the network interconnections, to
decide how messages should take
through the network.
18. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
18
Network Media
A medium called network media carries the act of
transport data.
The medium gives the channel over which the
message makes a trip from source to destination.
Present-day organizations basically utilize three
sorts of media to interconnect devices and give the
pathway over which information can be transmitted.
These media are:
• Metallic wires within cables (Copper) - information is
encoded into electrical driving forces.
• Glass or plastic fibers (fiber optic cable) - information is
encoded as beats of light.
• Wireless transmission - information is encoded utilizing
frequencies from the electromagnetic range.
19. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
19
Various sorts of network media have various highlights and advantages.
Not all network media have similar qualities, nor are they all appropriate for the
same purpose.
Network Cables Fiber Optic Cable
20. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
20
Bluetooth
While Bluetooth is not generally used
to connect a device to the Internet, it is
an important wireless technology that
has enabled many functionalities that
are used every day.
When created in 1994 by Ericsson, it
was intended to replace wired
connections between devices.
Today, it is the standard method for
connecting nearby devices wirelessly.
21. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
21
Bluetooth has a range of approximately
300 feet and consumes very little
power, making it an excellent choice
for various purposes.
Some applications of Bluetooth
include: connecting a printer to a
personal computer, connecting a
mobile phone and headset, connecting
a wireless keyboard and mouse to a
computer, and connecting a remote for
a presentation made on a personal
computer.
22. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
22
Clients and
Servers
Network
Components
Network
Representations
Networks in
many sizes
Resources in
Networks
Types of
Networks
23. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
23
Network
Representations
Networking &
Communications
24. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
24
To draw a diagram of a network, symbols are
utilized by network professionals to represent
the different devices and connections which
make up a network.
A diagram gives a simple method to see how
devices in a huge network are associated.
This kind of "picture" of a network is
known as a topology diagram.
The capacity to perceive the legitimate
portrayals of the physical systems
administration segments is basic to have the
option to imagine the association and activity
of a network.
25. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
25
Notwithstanding these portrayals, particular
phrasing is utilized while discussing how every one
of these devices and media interfaces with one
another. Significant terms to recall are:
• Network Interface Card: A NIC or LAN connector gives
the physical association with the PC or opposite end
device's network. The media that are associating the PC to
the network administration device plug legitimately into
the NIC.
• Physical Port: A connector or outlet on a network
administration device where the media is associated with
an end device or another network administration device.
• Interface: Specialized ports on a network administration
device that associate with singular networks. Since
switches are utilized to interconnect networks, the ports
on a network allude to network interfaces.
26. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
26
Switches in a rack
27. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
27
Topology Diagrams
Understanding topology diagrams are required for
anybody working with a network.
They give a visual guide of how the network is
associated.
There are two sorts of Topology diagrams:
• Physical topology and Logical topology diagrams. The
physical topology diagrams identify the physical location
of intermediary devices and cable installation.
• The Logical topology diagrams identify devices,
addressing schemes, and ports.
With physical topology, it is quite self-explanatory.
It is how they are interconnected with cables and
wires physically. The logical topology is how
connected devices are seen to the user.
30. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
30
Point-to-point: displays the network of exactly two hosts (computers,
servers, switches or routers) connected with a cable.
Bus: nodes are directly connected to a common half-duplex link called a bus.
Ring: each node connects to exactly two other nodes, forming a single
continuous pathway for signals through each node – a ring.
Star: each network component is physically connected to a central node
such as a router, hub or switch. The central hub acts like a server and the
connecting nodes act like clients.
31. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
31
Tree: hybrid network topology in which star networks are interconnected via
bus networks. Tree networks are hierarchical, and each node can have an
arbitrary number of child nodes.
Mesh: infrastructure nodes (i.e. bridges, switches, and other infrastructure
devices) connect directly, dynamically and non-hierarchically to as many
other nodes as possible and cooperate with one another to efficiently route
data to and from clients.
Hybrid: type of network topology that uses two or more differing network
topologies.
32. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
32
Clients and
Servers
Network
Components
Network
Representations
Networks in
many sizes
Resources in
Networks
Types of
Networks
33. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
33
Types of
Networks
Networking &
Communications
34. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
34
Networks foundations can fluctuate extraordinarily
regarding:
• Size of the territory secured
• Number of users connected
• Number and kinds of administrations accessible
• Territory of obligation
The two most normal sorts of system frameworks:
• Local Area Network (LAN): A network framework that
gives access to clients and end devices in a small
geographical zone, commonly an enterprise, small
business, home, or small business network possessed and
oversaw by an individual or IT department.
• Wide Area Network (WAN): A network foundation that
gives access to different networks over a wide geographical
region, commonly possessed and overseen by a broadcast
communications specialist co-op.
35. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
35
Different kinds of networks include:
• Metropolitan Area Network (MAN): A
network foundation that traverses a
physical region bigger than a LAN yet
smaller than a WAN (e.g., a city). Keep
an eye that they are ordinarily
maintained by a solitary substance, for
example, a huge association.
• Wireless LAN (WLAN): Like a LAN, it
remotely interconnects clients and
focuses on a small geographical region.
• Storage Area Network (SAN): A network
foundation intended to help record
servers and give information stockpiling,
recovery, and replication.
37. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
37
Local Area Networks
LANs are a network foundation that
traverses a small geographical territory.
Explicit highlights of LANs include:
• LANs interconnect end devices in a restricted
region, for example, a home, school, place of
business, or grounds.
• A solitary association or person normally
directs a LAN. The managerial control that
oversees the security and access control
arrangements is upheld on the network level.
• LANs give rapid data transfer capacity to
inward end gadgets and delegate devices.
38. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
38
Wide Area Networks
WANs are a network foundation that
traverses a wide topographical zone.
WANs are ordinarily overseen by
specialist organizations (SP) or
Internet Service Providers (ISP).
Explicit highlights of WANs include:
• WANs interconnect LANs over wide
geographical zones, for example, between
urban areas, states, territories, nations, or
the mainland.
• Numerous specialist organizations typically
manage WANs.
• WANs ordinarily give more slow speed joins
between LANs
39. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
39
The Internet
The Internet is an overall assortment
of interconnected networks
(internetworks or web for short).
A portion of the LAN models is
associated with one another through a
WAN association. WANs are then
associated with one another.
The WAN association lines speak to all
the assortments of ways we interface
networks.
WANs can connect through copper
wires, fiber optic cables, and wireless
transmissions.
40. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
40
No individual or group own the
Internet.
Guaranteeing compelling
correspondence over this various
framework requires the use of
steady and generally perceived
advances and norms, just as the
collaboration of many network
organization offices.
Some associations have been
produced to keep up the structure
and normalization of Internet
conventions and procedures.
41. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
41
These organizations incorporate the Internet
Engineering Task Force (IETF), Internet
Corporation for Assigned Names and
Numbers (ICANN), and the Internet
Architecture Board (IAB), in addition to
numerous others.
Have you ever wondered how your
smartphone can function the way it does?
Have you ever wondered how you can search
for information on the web and find it within
milliseconds?
The world’s largest implementation of
client/server computing and internetworking
is the Internet.
42. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
42
The internet is also a system, which is the most
extensive public way of communicating.
The internet began in the 20th century; it initially
started as a network for the U.S Department of
Defense to globally connect university professors
and scientists.
Most small businesses and homes have access to
the internet by subscribing to an internet service
provider (ISP), a commercial organization with a
permanent connection to the internet, which sells
temporary connections to retail subscribers.
43. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
43
A DSL (Digital subscriber line) operates over
existing telephone lines to carry data, voice,
and video transmission rates.
The base of the internet is TCP/IP networking
protocol suite.
When two users on the internet exchange
messages, each message is decomposed into
packets using the TCP/IP protocol.
Have you ever wondered what happens when
you type a URL in the browser and press
enter?
The browser checks a DNS record in the
cache to find the corresponding IP address to
the domain.
44. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
44
First, you type in a specific URL into your browser.
The browser then checks the cache for a DNS record
to find the website's corresponding IP address.
If the URL is not in the cache, ISP’s (Internet Service
Provider)’s DNS server starts a DNS query to find
the server's IP address that hosts the website.
The browser then starts a TCP connection with the
server.
Then, the browser sends an HTTP request to the
webserver.
After that, the server handles the request and sends
an HTTP response back.
Finally, the browser shows the HTML content.
45. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
45
For example, www.Wikipedia.org has an
IP address, that specific IP address could
be searched starting with http:// on a
browser.
The DNS contains a list of URLs,
including their IP addresses.
The DNS (Domain Name System)
changes domain names into IP addresses.
The domain name is the English name of
the thing, and that has 32-bits which are
unique and numeric to that English name.
To access a computer on the internet,
they only need to specify the domain
name.
46. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
46
Intranets and Extranets
There are two different terms which
are like the term Internet: Intranets
and Extranets.
Intranet is a term frequently used to
describe a private association of LANs
and WANs that has a place with an
association.
It is intended to be available only for
approved individuals, workers, or
others of an organization.
48. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
48
An extranet is a term used to
describe the case when an organization
wants to give secure and safe access to
people who work for another
organization yet expect access to the
association's information.
Examples of extranets include:
• An organization that is giving access to
outside providers and temporary workers.
• An emergency clinic gives a booking system
to specialists so they can make
arrangements for their patients.
• A nearby office of training gives spending
plans and staff data to the schools in its
region.
51. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
51
True or False?
Server are more powerful computers and clients are
standalone computers
FALSE
TRUE
52. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
52
True or False?
The Internet is the biggest network presently
FALSE
TRUE
53. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
53
What is an “End Device”?
(all that apply)
1. is the source of a message transmitted
over the network.
2. is the destination of a message
transmitted over the network.
3. is identified by an IP address and a
physical address
4. all PCs associated with a network devices
54. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
54
What are physical or MAC
addresses?
1. IP address assigned by the server
2. unique address assigned by the End
Device
3. IP address and physical address
together
4. unique addresses assigned by the device
manufacturers
55. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
55
What is a network
topology?
1. a diagram of a network
2. a detailed description or representation
on a map of the features of an area
3. IP address and physical address
together
4. unique addresses assigned by the device
manufacturers
56. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
56
What do these acronyms
stand for?
1. LAN
2. WAN
3. MAN
4. WLAN
59. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
Textbook
59
https://eng.libretexts.org/Courses/Prince_
Georges_Community_College/INT_1010%
3A_Concepts_in_Computing
Purchase of a book is not
required.
60. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
Professor C
60
castellr@pgcc.edu
eLearning Expert
BS in Systems Engineering
MS in Systems Engineering
HC Dr in Education
IT Professor | Spanish Instructor
LCINT1010.wordpress.com
Presentation created in 01/2022.
Slides last updated on 10/2023
61. Introduction to Information Technology
6.3. Networking & Communications: Resources in Networks
Introduction to Information Technology
INT-1010
Prof C
Luis R Castellanos
61
06.3
Networking & Communications:
Providing Resources in a Network