This document provides an overview of computer networks and networking concepts. It defines what a network is and discusses common network types like LANs, WANs, and wireless networks. It describes how networks are structured using client-server and peer-to-peer models. The document outlines different network topologies including bus, star, ring and mesh. It also discusses network hardware, cabling, protocols and other technical aspects of computer networking. There is an assigned networking project involving the card game FreeCell.
This document provides instructions for a homework assignment to play the card game FreeCell. Students are assigned a specific game number based on the last two digits of their student ID plus 1000. The document lists out the step-by-step moves required to solve game number 617 as an example. Students must print out each move taken to solve their assigned FreeCell game and turn in the solution.
This document provides an overview of computer networks, including definitions, common uses, types, topologies, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication between users. Common uses of networks include simultaneous access to shared data files, shared peripheral devices like printers, personal communication via email, and easier data backup when stored on a server. The document discusses different network types including LANs, WANs, MANs, and topologies like star, bus, ring and mesh. It also covers common networking hardware, cabling standards, and protocols such as TCP/IP, IPX/SPX, and NetBEUI.
This document provides an overview of computer networks, including their definition, common uses, types, topologies, media, hardware, cabling, and protocols. Specifically, it defines a network as a set of technologies that connects computers to allow communication and collaboration between users. It describes how networks enable simultaneous access to shared data, devices, software, and communication tools. The document also outlines common network types like LANs, WANs, and hybrid networks, as well as topologies including bus, star, ring, and mesh. Finally, it discusses network components such as network interface cards, hubs, switches, bridges, routers and gateways, as well as popular protocols like TCP/IP.
This document provides an overview of networks and network basics. It defines a network as a set of technologies that connects computers, allowing for resource sharing and communication between users. The document discusses the uses of networks, including simultaneous access to shared data and devices, personal communication tools like email, and easier data backup. It also covers common network types, topologies, media, and hardware components like hubs, switches, bridges and routers.
Modern Ethernet standards include 100-megabit Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. 100-megabit Ethernet standards include 100BaseT and 100BaseFX. Gigabit Ethernet standards include 1000BaseT, 1000BaseCX, 1000BaseSX and 1000BaseLX. 10-Gigabit Ethernet standards include 10GBaseSR, 10GBaseLR and 10GBaseER which use different fiber types and wavelengths, and 10GBaseT which uses copper cabling. Higher speeds require fiber optic cabling and support longer transmission distances.
Ethernet is a standard for network technologies that share a bus topology and frame format. Early Ethernet implementations transferred data at speeds up to 10Mbps using coaxial cable or twisted pair cabling. 10BaseT networks used twisted pair cabling and hubs to connect computers in a star topology up to 100 meters apart. Switches were later introduced to avoid bandwidth limitations of hubs by creating point-to-point connections between communicating devices using MAC addresses. This increased overall network speed and allowed larger, more complex network topologies.
This document discusses various technologies used for remote connectivity over wide area networks (WANs). It describes how analog signals were originally used for long-distance telephone calls but lost quality over distance, requiring the development of digital systems. Common digital WAN technologies discussed include SONET, T1, T3, cable modems, DSL, satellite, wireless, and fiber connections. Fiber networks are presented as a technology that telephone providers are implementing to compete with cable companies in providing high-speed internet to homes and businesses.
The document discusses cabling and network topology. It describes different types of network topologies like bus, ring, star, mesh and point-to-point. It also discusses different types of cabling used in networks like coaxial cable, twisted pair cable, fiber optic cable and other cables. It provides details on IEEE standards for networking technologies and cabling.
This document provides instructions for a homework assignment to play the card game FreeCell. Students are assigned a specific game number based on the last two digits of their student ID plus 1000. The document lists out the step-by-step moves required to solve game number 617 as an example. Students must print out each move taken to solve their assigned FreeCell game and turn in the solution.
This document provides an overview of computer networks, including definitions, common uses, types, topologies, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication between users. Common uses of networks include simultaneous access to shared data files, shared peripheral devices like printers, personal communication via email, and easier data backup when stored on a server. The document discusses different network types including LANs, WANs, MANs, and topologies like star, bus, ring and mesh. It also covers common networking hardware, cabling standards, and protocols such as TCP/IP, IPX/SPX, and NetBEUI.
This document provides an overview of computer networks, including their definition, common uses, types, topologies, media, hardware, cabling, and protocols. Specifically, it defines a network as a set of technologies that connects computers to allow communication and collaboration between users. It describes how networks enable simultaneous access to shared data, devices, software, and communication tools. The document also outlines common network types like LANs, WANs, and hybrid networks, as well as topologies including bus, star, ring, and mesh. Finally, it discusses network components such as network interface cards, hubs, switches, bridges, routers and gateways, as well as popular protocols like TCP/IP.
This document provides an overview of networks and network basics. It defines a network as a set of technologies that connects computers, allowing for resource sharing and communication between users. The document discusses the uses of networks, including simultaneous access to shared data and devices, personal communication tools like email, and easier data backup. It also covers common network types, topologies, media, and hardware components like hubs, switches, bridges and routers.
Modern Ethernet standards include 100-megabit Ethernet, Gigabit Ethernet, and 10-Gigabit Ethernet. 100-megabit Ethernet standards include 100BaseT and 100BaseFX. Gigabit Ethernet standards include 1000BaseT, 1000BaseCX, 1000BaseSX and 1000BaseLX. 10-Gigabit Ethernet standards include 10GBaseSR, 10GBaseLR and 10GBaseER which use different fiber types and wavelengths, and 10GBaseT which uses copper cabling. Higher speeds require fiber optic cabling and support longer transmission distances.
Ethernet is a standard for network technologies that share a bus topology and frame format. Early Ethernet implementations transferred data at speeds up to 10Mbps using coaxial cable or twisted pair cabling. 10BaseT networks used twisted pair cabling and hubs to connect computers in a star topology up to 100 meters apart. Switches were later introduced to avoid bandwidth limitations of hubs by creating point-to-point connections between communicating devices using MAC addresses. This increased overall network speed and allowed larger, more complex network topologies.
This document discusses various technologies used for remote connectivity over wide area networks (WANs). It describes how analog signals were originally used for long-distance telephone calls but lost quality over distance, requiring the development of digital systems. Common digital WAN technologies discussed include SONET, T1, T3, cable modems, DSL, satellite, wireless, and fiber connections. Fiber networks are presented as a technology that telephone providers are implementing to compete with cable companies in providing high-speed internet to homes and businesses.
The document discusses cabling and network topology. It describes different types of network topologies like bus, ring, star, mesh and point-to-point. It also discusses different types of cabling used in networks like coaxial cable, twisted pair cable, fiber optic cable and other cables. It provides details on IEEE standards for networking technologies and cabling.
This document provides an overview of wireless networking standards and implementations. It describes how wireless networks use radio waves to communicate and follow the same OSI layers as wired networks. It outlines several IEEE 802.11 wireless standards including 802.11a, b, g, and n. It also discusses how Wi-Fi networks can operate in ad-hoc or infrastructure modes and how CSMA/CA is used to allow multiple devices to share the wireless medium. Finally, it covers common wireless security methods like MAC address filtering, wireless authentication, and data encryption using WEP.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
This chapter discusses networking concepts including:
1) Different types of physical network architectures like Ethernet, wireless networks, telephone networks, and older token ring and FDDI networks.
2) How Windows supports network connections using protocols like TCP/IP, IPX/SPX, NetBEUI, and AppleTalk.
3) How to install a network card, connect to a network, and set up networking in Windows. This includes configuring settings like the computer name, IP address, and network protocols.
4) How to set up and secure a wireless network, including choosing security methods like disabling SSID broadcasting, using data encryption, and setting a firewall.
This document discusses advanced networking devices and concepts. It covers four logical network topologies: client/server, peer-to-peer, virtual private network (VPN), and virtual local area network (VLAN). It also discusses trunking between switches and quality of service (QoS) policies for prioritizing network traffic. Home routers are highlighted as combining switch and router functionality into one advanced device that can operate at multiple layers of the OSI model.
The document describes the OSI 7-layer model and how it can be used to understand network communication. It explains each of the 7 layers, including the physical, data link, network, transport, session, presentation and application layers. Examples are provided to illustrate how data moves through each layer of the OSI model when transferring a file between two computers on a network.
The document discusses several key networking services including DHCP, Remote Desktop Services, Routing and Remote Access Service (RRAS), IPsec, DNS, and WINS. It defines each service and explains how DHCP uses the four-step DORA process to assign IP addresses. The document also provides instructions for installing and configuring DHCP, disabling APIPA, and using Remote Desktop Connection. It describes how RRAS supports remote access VPNs and routing. IPsec encryption and authentication protocols are defined. Finally, it explains that DNS and WINS are both name resolution services, with WINS required for NetBIOS name resolution.
This document discusses various tools used for network troubleshooting, including cable testers, protocol analyzers, multimeters, and software diagnostic tools. Cable testers like TDRs and OTDRs are used to identify cable breaks, while protocol analyzers monitor network activity at different layers. Software tools like ping, tracert, nslookup and dig help diagnose connectivity and DNS issues. The overall goal of troubleshooting is to analyze and resolve a variety of network problems using the appropriate tools.
IPv6 was developed to replace IPv4 due to IPv4's limited 32-bit address space and inefficient use of addresses. IPv6 supports 2128 addresses, improves security with IPSec, and uses more efficient routing through address aggregation. IPv6 addresses are 128-bit and written in hexadecimal, with groups of zeros represented by double colons. IPv6 implements subnet masks as CIDR prefixes between /48 and /64. It uses DNS clusters, global unicast addresses, and DHCPv6 to assign addresses and DNS servers to clients.
This document discusses local area networks (LANs) and their applications, architectures, and technologies. It covers:
1) Common LAN applications like personal computer networks, back-end networks, storage area networks, and high-speed office networks.
2) Key aspects of LAN architecture including topology (e.g. bus, star, ring), transmission medium, IEEE 802 standards, and the functions of bridges and switches.
3) Protocol architectures with descriptions of the physical, logical link control, and media access control layers, as well as common frame formats.
This document provides an overview of common TCP/IP tools including the command prompt, ipconfig, ping, and tracert. It also covers advanced TCP/IP tools such as netstat, nbtstat, pathping, nslookup, netsh, route, net, and telnet. The objectives are to understand basic and advanced TCP/IP commands and their functionality in displaying network configuration, testing connectivity, tracing network paths, and troubleshooting. Additional resources like books, courses, and exams are listed to further learning.
1. Asynchronous Transfer Mode (ATM) is a cell-switching and multiplexing technology that combines the benefits of circuit switching and packet switching. It uses fixed-length cells to carry information across networks.
2. ATM networks are built using ATM switches and end-points. Switches are connected via User-Network Interfaces (UNI) and Network-Network Interfaces (NNI). Common ATM end-points include workstations, routers, and video codecs.
3. ATM provides guaranteed bandwidth through virtual circuits established over packet-switched networks. It is highly scalable and efficient for transmitting voice and video due to its small, fixed-length cells.
The document provides an introduction to networking commands and software in Windows XP. It discusses how to configure the TCP/IP settings such as IP address, subnet mask, default gateway and DNS server. Common networking commands like ipconfig, ping, tracert and nslookup are explained. Ipconfig is used to view IP configuration, ping tests connectivity, tracert traces the route to a destination, and nslookup looks up domain names to IP addresses. Networking software like Net Tools and Free IP Tools that provide GUI interfaces for commands are also introduced.
The document provides an overview of wide area network (WAN) technologies and routing concepts. It defines static and dynamic routing, and covers common dynamic routing protocols like RIP and OSPF. The document also describes WAN technologies such as X.25, Frame Relay, ATM, SONET/SDH, FDDI, DSL, broadband cable, and POTS/PSTN. It provides details on T-carrier systems and their international counterparts. The summary concludes with resources for additional learning on networking fundamentals and the MTA 98-366 exam.
This document provides an introduction to computer networking concepts. It discusses the basic model of a network as moving data from one end to another. It also describes standards that allow different devices to communicate on a network. The document outlines the key requirements for networks such as reliability, speed, scalability and cost effectiveness. It defines different network types like local area networks and wide area networks. Finally, it introduces concepts like data encoding, switching, and the OSI reference model layers that are important for understanding how networks function.
IP addresses identify devices on the network and have a standard dotted decimal format. MAC addresses uniquely identify a device's network interface and are burned into the hardware. Port numbers further specify applications/services within devices, with well-known ports below 1024.
This document discusses selecting technologies and devices for enterprise networks. It covers remote access technologies like PPP, ISDN, cable modems and DSL. For WANs it discusses leased lines, SONET, Frame Relay and ATM. Selection criteria for remote access devices, VPN concentrators, routers and WAN service providers are provided. Key factors include business needs, cost, performance, security, manageability, supported protocols and geographical coverage.
This document provides an overview of wide area network (WAN) technologies and routing. It defines routing as managing data flow between network segments and hosts. Routers use routing tables and IP addresses to determine the path for sending data. Dynamic routing protocols like RIP and OSPF dynamically determine routes and update them when network changes occur. Common WAN technologies discussed include Frame Relay, X.25, ATM, SONET, FDDI, and various types of DSL. The document also covers topics like interior gateway protocols, exterior gateway protocols, virtual circuits, and leased lines.
The document discusses several key networking services including DHCP, Remote Desktop Services, Routing and Remote Access Service (RRAS), IPsec, DNS, and WINS. It defines each service and explains how DHCP uses the four-step DORA process to assign IP addresses. The document also provides instructions for installing and configuring DHCP, disabling APIPA, and using Remote Desktop Connection. It describes how RRAS supports remote access VPNs and routing. IPsec encryption protocols and when to use them are also outlined. Finally, DNS and WINS name resolution services are compared.
This document provides an overview of computer networks including definitions, common uses, types of networks, how networks are structured, network topologies, media, hardware, cabling, and protocols. Some key points include:
- A network connects computers and allows communication and data sharing between users
- Common uses are file/resource sharing, email/communication, data backup, and printing
- Types include local area networks (LANs), wide area networks (WANs), and hybrid networks
- Networks can be structured as server-based, client-server, or peer-to-peer
- Popular topologies include bus, star, ring, and mesh configured with various media like twisted pair, coaxial, and fiber
This document provides an overview of computer networks, including definitions, common uses, types of networks, topologies, media, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication between users. Networks allow for simultaneous access to shared data, peripheral devices, communication, data backup, and more. Common network types include local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs).
This document provides an overview of wireless networking standards and implementations. It describes how wireless networks use radio waves to communicate and follow the same OSI layers as wired networks. It outlines several IEEE 802.11 wireless standards including 802.11a, b, g, and n. It also discusses how Wi-Fi networks can operate in ad-hoc or infrastructure modes and how CSMA/CA is used to allow multiple devices to share the wireless medium. Finally, it covers common wireless security methods like MAC address filtering, wireless authentication, and data encryption using WEP.
This document discusses selecting technologies and devices for campus network designs. It covers considerations for the physical cabling plant design including centralized vs distributed topologies. Common media types are discussed such as copper, optical fiber, and wireless. Specific technologies like Ethernet variants and their characteristics are outlined. Selection criteria for internetworking devices that will make up the campus network are presented, including processing power, port counts, latency, throughput and support/quality factors. The document provides guidance on evaluating options for building out the physical implementation of a previously designed logical campus network.
This chapter discusses networking concepts including:
1) Different types of physical network architectures like Ethernet, wireless networks, telephone networks, and older token ring and FDDI networks.
2) How Windows supports network connections using protocols like TCP/IP, IPX/SPX, NetBEUI, and AppleTalk.
3) How to install a network card, connect to a network, and set up networking in Windows. This includes configuring settings like the computer name, IP address, and network protocols.
4) How to set up and secure a wireless network, including choosing security methods like disabling SSID broadcasting, using data encryption, and setting a firewall.
This document discusses advanced networking devices and concepts. It covers four logical network topologies: client/server, peer-to-peer, virtual private network (VPN), and virtual local area network (VLAN). It also discusses trunking between switches and quality of service (QoS) policies for prioritizing network traffic. Home routers are highlighted as combining switch and router functionality into one advanced device that can operate at multiple layers of the OSI model.
The document describes the OSI 7-layer model and how it can be used to understand network communication. It explains each of the 7 layers, including the physical, data link, network, transport, session, presentation and application layers. Examples are provided to illustrate how data moves through each layer of the OSI model when transferring a file between two computers on a network.
The document discusses several key networking services including DHCP, Remote Desktop Services, Routing and Remote Access Service (RRAS), IPsec, DNS, and WINS. It defines each service and explains how DHCP uses the four-step DORA process to assign IP addresses. The document also provides instructions for installing and configuring DHCP, disabling APIPA, and using Remote Desktop Connection. It describes how RRAS supports remote access VPNs and routing. IPsec encryption and authentication protocols are defined. Finally, it explains that DNS and WINS are both name resolution services, with WINS required for NetBIOS name resolution.
This document discusses various tools used for network troubleshooting, including cable testers, protocol analyzers, multimeters, and software diagnostic tools. Cable testers like TDRs and OTDRs are used to identify cable breaks, while protocol analyzers monitor network activity at different layers. Software tools like ping, tracert, nslookup and dig help diagnose connectivity and DNS issues. The overall goal of troubleshooting is to analyze and resolve a variety of network problems using the appropriate tools.
IPv6 was developed to replace IPv4 due to IPv4's limited 32-bit address space and inefficient use of addresses. IPv6 supports 2128 addresses, improves security with IPSec, and uses more efficient routing through address aggregation. IPv6 addresses are 128-bit and written in hexadecimal, with groups of zeros represented by double colons. IPv6 implements subnet masks as CIDR prefixes between /48 and /64. It uses DNS clusters, global unicast addresses, and DHCPv6 to assign addresses and DNS servers to clients.
This document discusses local area networks (LANs) and their applications, architectures, and technologies. It covers:
1) Common LAN applications like personal computer networks, back-end networks, storage area networks, and high-speed office networks.
2) Key aspects of LAN architecture including topology (e.g. bus, star, ring), transmission medium, IEEE 802 standards, and the functions of bridges and switches.
3) Protocol architectures with descriptions of the physical, logical link control, and media access control layers, as well as common frame formats.
This document provides an overview of common TCP/IP tools including the command prompt, ipconfig, ping, and tracert. It also covers advanced TCP/IP tools such as netstat, nbtstat, pathping, nslookup, netsh, route, net, and telnet. The objectives are to understand basic and advanced TCP/IP commands and their functionality in displaying network configuration, testing connectivity, tracing network paths, and troubleshooting. Additional resources like books, courses, and exams are listed to further learning.
1. Asynchronous Transfer Mode (ATM) is a cell-switching and multiplexing technology that combines the benefits of circuit switching and packet switching. It uses fixed-length cells to carry information across networks.
2. ATM networks are built using ATM switches and end-points. Switches are connected via User-Network Interfaces (UNI) and Network-Network Interfaces (NNI). Common ATM end-points include workstations, routers, and video codecs.
3. ATM provides guaranteed bandwidth through virtual circuits established over packet-switched networks. It is highly scalable and efficient for transmitting voice and video due to its small, fixed-length cells.
The document provides an introduction to networking commands and software in Windows XP. It discusses how to configure the TCP/IP settings such as IP address, subnet mask, default gateway and DNS server. Common networking commands like ipconfig, ping, tracert and nslookup are explained. Ipconfig is used to view IP configuration, ping tests connectivity, tracert traces the route to a destination, and nslookup looks up domain names to IP addresses. Networking software like Net Tools and Free IP Tools that provide GUI interfaces for commands are also introduced.
The document provides an overview of wide area network (WAN) technologies and routing concepts. It defines static and dynamic routing, and covers common dynamic routing protocols like RIP and OSPF. The document also describes WAN technologies such as X.25, Frame Relay, ATM, SONET/SDH, FDDI, DSL, broadband cable, and POTS/PSTN. It provides details on T-carrier systems and their international counterparts. The summary concludes with resources for additional learning on networking fundamentals and the MTA 98-366 exam.
This document provides an introduction to computer networking concepts. It discusses the basic model of a network as moving data from one end to another. It also describes standards that allow different devices to communicate on a network. The document outlines the key requirements for networks such as reliability, speed, scalability and cost effectiveness. It defines different network types like local area networks and wide area networks. Finally, it introduces concepts like data encoding, switching, and the OSI reference model layers that are important for understanding how networks function.
IP addresses identify devices on the network and have a standard dotted decimal format. MAC addresses uniquely identify a device's network interface and are burned into the hardware. Port numbers further specify applications/services within devices, with well-known ports below 1024.
This document discusses selecting technologies and devices for enterprise networks. It covers remote access technologies like PPP, ISDN, cable modems and DSL. For WANs it discusses leased lines, SONET, Frame Relay and ATM. Selection criteria for remote access devices, VPN concentrators, routers and WAN service providers are provided. Key factors include business needs, cost, performance, security, manageability, supported protocols and geographical coverage.
This document provides an overview of wide area network (WAN) technologies and routing. It defines routing as managing data flow between network segments and hosts. Routers use routing tables and IP addresses to determine the path for sending data. Dynamic routing protocols like RIP and OSPF dynamically determine routes and update them when network changes occur. Common WAN technologies discussed include Frame Relay, X.25, ATM, SONET, FDDI, and various types of DSL. The document also covers topics like interior gateway protocols, exterior gateway protocols, virtual circuits, and leased lines.
The document discusses several key networking services including DHCP, Remote Desktop Services, Routing and Remote Access Service (RRAS), IPsec, DNS, and WINS. It defines each service and explains how DHCP uses the four-step DORA process to assign IP addresses. The document also provides instructions for installing and configuring DHCP, disabling APIPA, and using Remote Desktop Connection. It describes how RRAS supports remote access VPNs and routing. IPsec encryption protocols and when to use them are also outlined. Finally, DNS and WINS name resolution services are compared.
This document provides an overview of computer networks including definitions, common uses, types of networks, how networks are structured, network topologies, media, hardware, cabling, and protocols. Some key points include:
- A network connects computers and allows communication and data sharing between users
- Common uses are file/resource sharing, email/communication, data backup, and printing
- Types include local area networks (LANs), wide area networks (WANs), and hybrid networks
- Networks can be structured as server-based, client-server, or peer-to-peer
- Popular topologies include bus, star, ring, and mesh configured with various media like twisted pair, coaxial, and fiber
This document provides an overview of computer networks, including definitions, common uses, types of networks, topologies, media, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication between users. Networks allow for simultaneous access to shared data, peripheral devices, communication, data backup, and more. Common network types include local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs).
This document provides an overview of computer networks, including definitions, common uses, types of networks, topologies, media, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication and collaboration between users. Common uses of networks include simultaneous access to shared data and devices, personal communication methods like email, and easier backup of data. [END SUMMARY]
This document provides an overview of computer networks, including definitions, common uses, types of networks, topologies, media, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication and collaboration between users. Common uses of networks include simultaneous access to shared data and devices, personal communication methods like email, and easier backup of data. [END SUMMARY]
A computer network connects computers and allows communication and collaboration between users. It consists of hosts like PCs and laptops, routers and switches, links like cables, protocols like TCP and IP, applications, and humans. Networks are used to share data, devices, software, and communication. Common network types include local area networks within an office, wide area networks between locations, and hybrid networks like home or campus networks. Networks can be structured as client/server, peer-to-peer, or use a combination. Topologies include star, bus, ring and mesh configurations. Wired networks use cables while wireless uses radio waves. Network hardware and protocols enable communication between nodes on the network.
This document provides an overview of computer networks and their basic components. It defines what a computer network is and describes some common uses like sharing data, printers, and communication. It also discusses different types of networks including local area networks (LANs), wide area networks (WANs), and wireless networks. Additionally, it covers fundamental network concepts such as topologies, hardware, cabling, and protocols.
This document provides an overview of computer networks, including definitions, common uses, types of networks, hardware, cabling, and protocols. It defines a network as a set of technologies that connects computers and allows communication between users. Networks allow for simultaneous access to shared data files, shared peripheral devices like printers, personal communication methods like email, and easier data backup when stored on a server. Common network types include local area networks (LANs), wide area networks (WANs), and hybrid network types like campus area networks (CANs) and home area networks (HANs). Networks are structured with servers that control access and clients that access resources. Key hardware includes routers, gateways, and different cabling options like Ethernet
This document discusses network basics, including definitions of different types of networks like local area networks (LANs) and wide area networks (WANs). It describes common uses of networks like sharing data, printers, and communication tools. The document also outlines different network topologies including bus, star, ring and mesh, and how networks can be structured as server-based, client-server or peer-to-peer.
This document summarizes different types of computer networks and their basic components. It discusses how networks can be used for personal communication like email and video conferencing. It also describes common network types including local area networks (LANs) contained within a building, wide area networks (WANs) connecting two or more LANs over a large geographic area, and hybrid networks like campus area networks (CANs). The document outlines basic network hardware such as routers that connect networks and gateways that connect different types of networks. It also discusses common networking cabling standards and protocols used to facilitate communication between devices on a network.
Network Basics
Local Area Network (LAN)
Contains printers, servers and computers
Systems are close to each other
Contained in one office or building
Organizations often have several LANS
This document discusses different types of computer networks including local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs). It also covers common network hardware such as routers and gateways, cabling standards including Ethernet, Fast Ethernet, and Gigabit Ethernet, and network protocols like TCP/IP, IPX/SPX, and NetBEUI. The document provides information on network structures, how data is backed up and shared over networks, and considerations for network installation and configuration.
This document defines and describes different types of computer networks, including local area networks (LANs), wide area networks (WANs), and hybrid networks like campus area networks (CANs) and metropolitan area networks (MANs). It also discusses common network hardware, cabling technologies, protocols, and how networks are structured with servers and clients. The key information provided includes definitions of different network types based on geographic scope and usage, as well as descriptions of basic components, standards, and functions that enable network communication and connectivity.
This document discusses different types of networks and their uses. It describes how local area networks (LANs) connect computers and devices within an office or building, while wide area networks (WANs) connect two or more LANs over a larger geographic area, such as the Internet. It also discusses hybrid network types like campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs). The document outlines common network hardware like routers and gateways and cabling standards including Ethernet, Fast Ethernet, Gigabit Ethernet, and Token Ring. It also explains important network protocols such as TCP/IP, IPX/SPX, NetBE
This document discusses different types of computer networks including wide area networks (WANs), local area networks (LANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs). It also describes how networks are structured using client/server and server-based models and discusses common network hardware like routers and gateways. Finally, it covers various networking cabling technologies and protocols used for communication on networks like Ethernet, Fast Ethernet, Gigabit Ethernet, Token Ring, TCP/IP, IPX/SPX, and NetBEUI.
The document discusses different types of computer networks including local area networks (LANs), wide area networks (WANs), campus area networks (CANs), metropolitan area networks (MANs), home area networks (HANs), and personal area networks (PANs). It also describes common network hardware such as routers and gateways. Additionally, it covers different types of network cabling including Ethernet, Fast Ethernet, Gigabit Ethernet, and Token Ring as well as several network protocols like TCP/IP, IPX/SPX, NetBEUI, and Token ring.
The document discusses various network technologies, categorizing them based on geographical coverage, users, transmission medium, mobility, and link configuration. It covers wired access network technologies like Ethernet, telephone networks using copper or fiber, and digital subscriber line technologies. Core network technologies discussed include digital circuits using telephone networks, packet switching networks, and IP networks. Wireless network technologies for both access and core networks are also mentioned.
This document provides an overview of networking concepts including the basic components of a network, common network topologies, network devices, network addressing using IP addresses and subnet masks, network models like OSI and TCP/IP, and basic network communication. Key topics covered include LANs, WANs, Ethernet, wireless networks, routers, switches, TCP, UDP, ports, MAC addresses, and the layers of the OSI and TCP/IP models.
A network connects two or more computers together to allow sharing of resources and information. There are several types of networks including local area networks (LANs) within a building and wide area networks (WANs) connecting locations further apart. Networks can be configured in different topologies like bus, star, or ring and use various transmission media such as twisted pair cables, coaxial cable, or fiber optic cables to transmit data. Common network types include peer-to-peer networks with equal access between computers and client-server networks with dedicated server computers providing resources to client computers.
The document provides an overview of wired and wireless telecommunication and network technologies. It discusses wired technologies such as T-carrier protocols, SONET, Frame Relay, ATM, DSL, MPLS and various wired network technologies including Ethernet, network cabling standards, switches, routers and topologies. It also discusses wireless technologies such as CDMA2000, GPRS, EDGE, UMTS, WiMAX, Bluetooth, IrDA and network protocols including the OSI model and TCP/IP model.
The document provides an overview of wired and wireless telecommunication and network technologies. It discusses wired technologies such as T-carrier protocols, SONET, Frame Relay, ATM, DSL, MPLS and various wired network technologies including Ethernet, network cabling standards, switches, routers and topologies. It also discusses wireless technologies such as CDMA2000, GPRS, EDGE, UMTS, WiMAX, Bluetooth, IrDA and network protocols including the OSI model and TCP/IP model.
This document discusses different types of printers used in computer programming and civil engineering. It begins by distinguishing between impact printers, which use force to strike an ink ribbon, and non-impact printers, which use other methods. Several specific printer types are described, including dot matrix, inkjet, and laser printers. High-quality printers for tasks like photography and blueprinting are also outlined. The document provides details on factors to consider when selecting a printer, such as cost, speed, and image quality.
This document contains lecture slides on computer monitors, video cards, and sound systems for an introduction to computer programming course for civil engineering students. It discusses different types of monitors like CRT, LCD, and plasma displays. It covers monitor features like resolution, refresh rate, and dot pitch. It also summarizes video cards, ergonomics considerations, data projectors, and sound systems. The slides were presented by Dr. Shafiullah Soomro and include his contact information and links to additional course resources.
This document discusses input devices for computer programming courses, including pen-based devices, touch screens, game controllers, optical scanners, microphones, and digital cameras. It provides examples of how each device allows for input into a computer, such as using a pen for writing, touch screens for pointing, bar code scanners for converting codes into database entries, and microphones for speech recognition. The document is presented by Dr. Shafiullah Soomro and provides resources for further information on the course slides and textbooks.
This document contains information about an introduction to computer programming course taught by Dr. Shafiullah Soomro. It includes contact information for the instructor and a link to course slides. It also covers topics like the keyboard, mouse, variants of mice, and ergonomics as they relate to computer input devices. It discusses repetitive strain injuries and provides suggestions to help avoid them.
This document provides an introduction to computer programming for civil engineering students. It discusses the key components of a computer system, including hardware, software, data, and users. It describes the central processing unit, memory, input/output devices, and storage components that make up computer hardware. It also explains the different types of software, such as operating systems, network operating systems, utilities, and application programs. The document provides an overview of computer data and the roles of various types of computer users.
This document provides an introduction to a course on computer programming for civil engineering students. It discusses key topics that will be covered, including programming concepts and problem solving using inputs, algorithms, and outputs. The instructor's contact information and textbook references are also provided. It then gives examples of how computers represent and process different types of data using binary numbers, ASCII encoding for letters and characters, and RGB values for digital images. The importance of abstraction in building upon past work in computer science fields is emphasized.
This document discusses operating systems and their core functions. It describes different types of operating systems including real-time, single-user/single-tasking, single-user/multitasking, and multi-user/multitasking. The key functions of operating systems are providing a user interface, running programs, managing hardware devices, and organizing file storage. Graphical user interfaces and command line interfaces are discussed. Utilities that enhance operating systems like backup software, anti-virus software, firewalls, and intrusion detection are also outlined.
This document discusses ways to measure and improve computer drive performance. It describes average access time and data transfer rate as two key metrics of drive performance. To optimize performance, the document recommends regularly cleaning unnecessary files, scanning for and fixing disk errors, defragmenting disks, and compressing files. It also outlines common drive interface standards like EIDE, SCSI, USB, and FireWire and their characteristics.
This document discusses computer processors and how they can be extended. It describes several major processor manufacturers like Intel, AMD, and Freescale. It explains differences in processor architecture, speed, and features. It also outlines various ports and interfaces that can expand a processor's capabilities, such as USB, serial, parallel, SCSI, and expansion slots. Plug and play functionality allows for easy installation of new hardware.
The document discusses how computers represent and process data. It explains that computers use the binary number system to represent data as strings of 0s and 1s at the hardware level. Bytes made up of 8 bits are used to represent individual characters. The CPU processes data through cycles that fetch and execute instructions at extremely fast speeds. Memory stores open programs and data, and components like registers, the clock speed, cache memory, and buses all impact processing speed.
The document discusses different types of printers commonly used in computing. It describes impact printers that use an inked ribbon like dot matrix printers, and non-impact printers like inkjet printers that spray ink onto paper and laser printers that use toner and heat to print high quality documents. The document compares factors to consider when choosing a printer like cost, speed, and image quality. It also outlines special purpose high-quality printers used for photos, durable outputs, or large format blueprints.
This document discusses computer monitors and sound systems. It describes different types of monitors including CRT, LCD, and plasma displays. It covers monitor features like resolution, refresh rate, and dot pitch. It also discusses video cards and ergonomic issues related to monitor usage. The document concludes by briefly covering sound systems, including sound cards, headphones, and headsets.
The document discusses different types of printers commonly used in computing. It describes impact printers that use an inked ribbon like dot matrix printers, and non-impact printers like inkjet printers that spray ink and laser printers that use toner and heat to print. It compares factors to consider when choosing a printer like cost, speed, and image quality. The document also outlines special purpose high-quality printers used for photos, durable outputs, or large format printing.
The document discusses various computer input devices like keyboards and mice. It describes how keyboards work by sending key codes to the CPU when a key is pressed. Mice allow users to select objects on screen by moving a pointer and clicking. Variants of mice include trackballs, trackpads, and trackpoints. The document emphasizes ergonomics and proper techniques to avoid repetitive strain injuries that can result from prolonged use of input devices. It recommends adjustable chairs and desks, wrist supports, taking breaks, and keeping arms straight while keyboarding.
The document discusses various input devices for computers beyond the traditional keyboard and mouse. It describes pen-based devices like tablets and PDAs that use a pen for writing and pointing. Touch screens that detect finger touches as input are discussed, as well as game controllers. Optical scanning devices like bar code readers and image scanners are covered, along with how optical character recognition works. Audio input devices like microphones and their use for speech recognition are summarized. Musical Instrument Digital Interface and digital cameras are also briefly outlined.
The document discusses the five generations of computers from the 1940s to present. The first generation used vacuum tubes and were large, consuming significant power. The second generation used transistors, making computers smaller and more efficient. The third generation used integrated circuits, further reducing size and power usage. The fourth generation used microprocessors and marked the development of personal computers and networks. The fifth generation uses artificial intelligence techniques like neural networks and expert systems. Each generation was enabled by new technological developments that made computers more powerful, compact, and accessible over time.
The document discusses different types of computers and their uses. It defines computers as electronic devices that convert data into information. Computers can be used by individuals or organizations. Individual computers include desktops, notebooks, tablets, handhelds, and smartphones. Organizational computers include network servers, mainframes, minicomputers, and supercomputers. The document also outlines how computers are used in various sectors of society like education, business, healthcare, and more.
The Motorola 6800 was an 8-bit microprocessor introduced in 1974. It had a 16-bit address bus and 8-bit data bus. The 6800 architecture included six registers - two 8-bit accumulators, three 16-bit registers for the program counter, stack pointer, and index register, and an 8-bit status register. It supported seven addressing modes and had 72 instructions. The document provides details on the 6800 register set, addressing modes, and architecture.
The document discusses the Intel 8086 microprocessor. It provides details about its introduction, architecture, registers, addressing modes, and operation. Specifically:
- The Intel 8086 is a 16-bit microprocessor introduced in 1978 that gave rise to the x86 architecture. It has approximately 29,000 transistors and a 16-bit data bus.
- The architecture is divided into two units - the Bus Interface Unit which handles fetching and memory/I/O operations, and the Execution Unit which decodes/executes instructions.
- It has segment registers to address memory segments, general purpose registers like AX, BX, CX and DX, and a flag register. Addressing modes include register, direct
The document provides information about the Intel 8085 microprocessor system. It discusses the history of Intel microprocessors before 8085 including the 4004, 8008, and 8080. It then provides details about the 8085 such as its year of release, number of transistors, clock speed, pin configuration, and functions of the pins. The document also describes the architecture of the 8085 including its functional blocks like registers, ALU, data/address buffer, and interrupt control. It explains the different instruction word sizes and addressing modes in the 8085.
More from Quaid-e-Awam University of Engineering Science and Technology Nawabshah Sindh Pakistan (20)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
3. 9A-3
Network Definition
• Set of technologies that connects
computers
• Allows communication and collaboration
between users
4. 9A-4
The Uses of a Network
• Simultaneous access to data
– Data files are shared
• Access can be limited
– Shared files stored on a server
– Software can be shared
• Site licenses
• Network versions
• Application servers
5. 9A-5
The Uses of a Network
• Shared peripheral device
– Printers and faxes are common shares
– Reduces the cost per user
– Devices can be connected to the network
– Print servers control network printing
• Manage the print queue
6. 9A-6
Sharing Data
File server contains documentsFile server contains documents
used by other computers.used by other computers.
7. 9A-7
The Uses of a Network
• Personal communication
– Email
• Instantaneous communication
– Conferencing
• Tele conferencing
• Videoconferencing
• Audio-conferencing
• Data-conferencing
– Voice over IP
• Phone communication over network wires
9. 9A-9
The Uses of a Network
• Easier data backup
– Backup copies data to removable media
– Server data backed up in one step
10. 9A-10
Common Network Types
• Local Area Network (LAN)
– Contains printers, servers and computers
– Systems are close to each other
– Contained in one office or building
– Organizations often have several LANS
11. 9A-11
Common Network Types
• Wide Area Networks (WAN)
– Two or more LANs connected
– Over a large geographic area
– Typically use public or leased lines
• Phone lines
• Satellite
– The Internet is a WAN
12. 9A-12
Hybrid Network Types
• Campus Area Networks (CAN)
– A LAN in one large geographic area
– Resources related to the same organization
– Each department shares the LAN
13. 9A-13
Hybrid Network Types
• Metropolitan Area Network (MAN)
– Large network that connects different
organizations
– Shares regional resources
– A network provider sells time
14. 9A-14
Hybrid Network Types
• Home Area Network (HAN)
– Small scale network
– Connects computers and entertainment
appliances
– Found mainly in the home
15. 9A-15
Hybrid Network Types
• Personal Area Network (PAN)
– Very small scale network
– Range is less than 2 meters
– Cell phones, PDAs, MP3 players
16. 9A-16
How Networks Are Structured
• Server based network
– Node is any network device
– Servers control what the node accesses
– Users gain access by logging in
– Server is the most important computer
17. 9A-17
How Networks Are Structured
• Client/Server network
– Nodes and servers share data roles
– Nodes are called clients
– Servers are used to control access
– Database software
• Access to data controlled by server
– Server is the most important computer
18. 9A-18
How Networks Are Structured
• Peer to peer networks (P2PN)
– All nodes are equal
– Nodes access resources on other nodes
– Each node controls its own resources
– Most modern OS allow P2PN
– Distributing computing is a form
– Kazaa
19. 9A-19
Network Topologies
• Topology
– Logical layout of wires and equipment
– Choice affects
• Network performance
• Network size
• Network collision detection
– Several different types
20. 9A-20
Network Topologies
• Packets
– Pieces of data transmitted over a network
• Packets are created by sending node
• Data is reassembled by receiving node
– Packet header
• Sending and receiving address
– Packet payload
• Number and size of data
• Actual data
– Packet error control
21. 9A-21
Network Topologies
• Bus topology
– Also called linear bus
– One wire connects all nodes
– Terminator ends the wires
– Advantages
• Easy to setup
• Small amount of wire
– Disadvantages
• Slow
• Easy to crash
22. 9A-22
Network Topologies
• Star topology
– All nodes connect to a hub
• Packets sent to hub
• Hub sends packet to destination
– Advantages
• Easy to setup
• One cable can not crash network
– Disadvantages
• One hub crashing downs entire network
• Uses lots of cable
– Most common topology
24. 9A-24
Network Topologies
• Ring topology
– Nodes connected in a circle
– Tokens used to transmit data
• Nodes must wait for token to send
– Advantages
• Time to send data is known
• No data collisions
– Disadvantages
• Slow
• Lots of cable
25. 9A-25
Network Topologies
• Mesh topology
– All computers connected together
– Internet is a mesh network
– Advantage
• Data will always be delivered
– Disadvantages
• Lots of cable
• Hard to setup
28. 9A-28
Wire Based Media
• Twisted-pair cabling
– Most common LAN
cable
– Called Cat5 or
100BaseT
– Four pairs of copper
cable twisted
– May be shielded from
interference
– Speeds range from
1 Mbps to 1,000 Mbps
29. 9A-29
Wire Based Media
• Coaxial cable
– Similar to cable TV wire
– One wire runs through cable
– Shielded from interference
– Speeds up to 10 Mbps
– Nearly obsolete
30. 9A-30
Wire Based Media
• Fiber-optic cable
– Data is transmitted
with light pulses
– Glass strand instead
of cable
– Immune to
interference
– Very secure
– Hard to work with
– Speeds up to
100 Gbps
31. 9A-31
Wireless Media
• Data transmitted through the air
• LANs use radio waves
• WANs use microwave signals
• Easy to setup
• Difficult to secure
32. 9A-32
Network Hardware
• Network interface cards
– Network adapter
– Connects node to the media
– Unique Machine Access Code (MAC)
33. 9A-33
Network Hardware
• Network linking devices
– Connect nodes in the network
– Cable runs from node to device
– Crossover cable connects two computers
36. 9A-36
Network Hardware
• Bridge
– Connects two or more LANs together
– Packets sent to remote LAN cross
• Other packets do not cross
– Segments the network on MAC addresses
37. 9A-37
Network Hardware
• Router
– Connects two or more LANs together
– Packets sent to remote LAN cross
– Network is segmented by IP address
– Connect internal networks to the Internet
– Need configured before installation
38. 9A-38
Network Hardware
• Gateway
– Connects two dissimilar networks
– Connects coax to twisted pair
– Most gateways contained in other devices
39. 9A-39
Network Cabling
• Cabling specifications
– Bandwidth measures cable speed
• Typically measured in Mbps
– Maximum cable length
– Connector describes the type of plug
40. 9A-40
Network Cabling
• Ethernet
– Very popular cabling technology
– 10 Base T, 10Base2, 10Base5
– Maximum bandwidth 10 Mbps
– Maximum distances100 to 500 meters
41. 9A-41
Network Cabling
• Fast Ethernet
– Newer version of Ethernet
– Bandwidth is 100 Mbps
– Uses Cat5 or greater cable
• Sometimes called 100Base T
– Requires a switch
42. 9A-42
Network Cabling
• Gigabit Ethernet
– High bandwidth version of Ethernet
– 1 to 10 Gbps
– Cat 5 or fiber optic cable
– Video applications
43. 9A-43
Network Cabling
• Token ring
– Uses shielded twisted pair cabling
– Bandwidth between 10 and 25 Mbps
– Uses a multiple access unit (MAU)
– Popular in manufacturing and finance
44. 9A-44
Network Protocols
• Language of the network
– Rules of communication
– Error resolution
– Defines collision and collision recovery
– Size of packet
– Naming rules for computers
45. 9A-45
Network Protocols
• TCP/IP
– Transmission Control Protocol/Internet
Protocol
– Most popular protocol
– Machines assigned a name of 4 numbers
• IP address
• 209.8.166.179 is the White House’s web site
– Dynamic Host Configuration Protocol
• Simplifies assignment of IP addresses
– Required for Internet access
46. 9A-46
Network Protocols
• IPX/SPX
– Internet Packet Exchange/Sequenced
Packet Exchange
– Older protocol
– Associated with Novell Netware
– Replaced by TCP/IP
47. 9A-47
Network Protocols
• NetBEUI
– Network BIOS Extended User Interface
– Used by Windows to name computers
– Transmission details handled by TCP/IP
50. 9A-50
Project due Nov. 16
• Play the game of FreeCell.
• small number on next larger number and alternating color
• e.g. Heart Queen on Club King and Spade Jack on Heart Queen
• goal: to throw all cards to destination pile
• current smallest number of the suit: can be thrown to destination pile
• any card can be moved to empty line (stack)
• any card can be moved to temporary work space (TMP)
• Print every step.
• Your last two digits + 1000 are the game number you have to solve.
• Game #617:
• HQ CK, S2 TMP, SJ HQ, C10 DJ, HK TMP, HK Line8,
• SK TMP, S10 TMP, SQ HK, HJ SQ, S10 HJ, H4 TMP,
• D5 C6, H9 S10, C3 TMP, D9 C10, C3 throw, S3 TMP,
• H4 Line4, S3 H4, D4 TMP, D3 TMP, D2 S3, C10 Line7,
• H5 TMP, DJ CQ, S4 D5, C4 throw, D3 S4, CQ DK,
• C10 DJ, S7 TMP, SK Line7, HQ SK, D4 throw, S3 throw,
• S4 throw, H5 C6, CK TMP, C9 TMP, S9 TMP, CK Line4,
• DQ CK, CJ DQ, C7 throw, H6 throw, S8 H9, H7 S8,
• S6 H7, D6 throw, S8 throw, S9 throw, CQ Line2, DK TMP,
• H10 TMP, D10 TMP
Editor's Notes
Teaching Tip
Figure 9A.2 on page 342 visually describes the sharing process. It can be helpful to have students open a shared file that you control. Make a change then have the students open it again. Alternatively, share a document and allow your students to write in it. Then demonstrate how the shared document changes.
Spend time discussing why application servers need to be so powerful.
Teaching tip
Figure 9A.4 on page 344 shows a print queue. It can be helpful to demonstrate your classroom queue.
Teaching tip
It is fun if you can setup a teleconference in your classroom. Students get to learn how to join or create the conference. Additionally, they learn how to participate. Finally, students have fun, especially with shared whiteboards.
Insider information
The text describes needing special software to back up data from user drives. However, the backup utility that comes with Windows 2000 and XP is capable of performing this chore.
Teaching tip
Use a real world example to describe an organization with interconnected LANs.
Teaching tip
Blockbuster Video uses a WAN to connect it’s stores nationwide. Customers from Pittsburgh may rent videos in Hilton Head. Late fees will even be displayed!
Teaching tip
An example of a regional resource is a supercomputer. For example, Pittsburgh has the Pittsburgh Super Computing center (www.psc.edu). The various colleges in Pittsburgh connect to the center through a MAN in Pittsburgh.
Insider information
PAN is very new. Few devices support PAN. High end cell phones include Bluetooth technology. Once the technology matures, Bluetooth will allow the creation of a PAN.
Teaching tip
Spend a few minutes here discussing password policies. Describe why it is important not to give out a password. Also describe why longer, more complicated passwords are important.
Teaching tip
Discuss how users managing their own security settings can be bad.
Teaching tip
Discuss how your network topology handles collisions. If your students are technical, contrast this with an inferior topology.
Teaching tip
For technical students take the time to draw the packet structure on the board. The typical structure is destination address | sending address | packet number | total packets | data size | payload | error control.
Teaching tip
Pages 352 and 353 have diagrams of each network topology
Insider information
Interference is usually electrical. Magnets, solar flares or electronic devices generate interference.
Teaching tip
Remind students that bps is bits per second. Gbps then is billion bits per second.
Teaching tip
Now is the time to briefly discuss 802.11 standards. A full discussion of 802.11 is covered in the next section.
Insider Information
The Xerox Corporation controls the assignment of Ethernet addresses to NIC manufacturers.
Insider information
Twisted pair networks cannot achieve higher than 10 Mbps using a hub. Switches are necessary to achieve 100 Mbps or higher.
Discussion point
Ask who in the class has high speed Internet. Then determine if anyone is sharing this to the rest of the house or dorm. If they are, see if they can describe the setup. Most likely, the sharing is done with a router.
Teaching tip
Point out that the speed of the cable is the number before the word Base.
Teaching tip
Have students determine IP addresses for the computer. On 2000/XP enter ipconfig /all. Windows 98 and back enter winipcfg.
Discussion Point
Have students tell you what BIOS stands for.