An intranet is a private computer network that uses internet protocols and network connectivity to securely share part of an organization's information or operations with its employees. An intranet can be accessed by employees within an organization but not by outside users, and it usually uses the same tools and applications as the public internet but is not accessible from the public internet. An extranet extends an intranet to controlled outsiders such as suppliers, vendors and partners. It allows controlled access to an organization's intranet from outside computers and networks.
The document discusses different types of local area network (LAN) topologies, including bus, star, ring, mesh, and tree. It provides descriptions of each topology's structure and connections between computers. Advantages listed for some topologies include easier installation and fault correction, while disadvantages include higher costs and potential for full network failure if a connection is lost.
This document summarizes a student project on improving quality of service (QoS) in wireless local area networks (WLANs). The project studied medium access control protocols, implemented different protocols in a network simulation, and compared their performance. Key findings were that the Enhanced Distributed Coordination Function protocol provided better service differentiation but reduced performance for lower priority traffic compared to the baseline Distributed Coordination Function protocol. The Distributed Coordination Function protocol had slightly better overall performance due to fewer collisions.
The document discusses different network topologies including bus, ring, mesh, and star. It also provides instructions for configuring a DHCP server, web server, DNS server, and FTP server on a network. The DHCP server configuration involves setting the router IP, enabling ports, and allowing end devices to automatically obtain IPs. Web server configuration involves accessing the server URL from an end device browser. DNS and mail servers are also mentioned but no configuration details are provided for those.
The document defines and compares different types of computer networks and network topologies. It discusses local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and how they differ based on geographic scope. It also covers common network architectures like client-server and peer-to-peer, and topologies like bus, ring, and star networks, explaining their basic structures and differences.
This document provides an overview of computer networking and the Internet. It begins with definitions of key terms like protocols, the network edge, and access networks. It then describes the network core and how data is transferred through circuit switching and packet switching. Packet switching uses statistical multiplexing to efficiently share bandwidth and allow more users to access the network compared to circuit switching. The Internet structure forms a hierarchical network of networks with high bandwidth connections between major tier 1 ISPs at the top level.
Network topology refers to the physical layout of devices in a computer network. There are three main types: bus, ring, and star. A bus topology uses a central backbone cable that devices connect to. While easy to implement, a failure of the backbone affects the whole network. A ring topology connects all devices in a loop, making troubleshooting easier but a single failure impacts the entire LAN. A star topology centers on a hub that each node connects to directly. It isolates failures but the hub is a single point of failure.
The document describes a minor project report on creating a LAN network with redundancy that was completed by two students for their B-Tech degree. It outlines the background, methodology, requirements, and results of designing a network topology on GNS3 using routing protocols, VPN, NAT, firewalls, and Cisco phones to provide redundancy. The project implemented Cisco ASA, MPLS routing, and other protocols to create a secure and reliable network connecting different office locations.
There are three main network topologies: bus, ring, and star. The bus topology broadcasts messages to all connected computers but performance decreases as more computers are added. Ring topologies arrange computers in a circular path and use token passing to control access. Star topologies connect all computers to a central hub or switch device, avoiding single point failures but losing connectivity if the central device fails.
The document discusses different types of local area network (LAN) topologies, including bus, star, ring, mesh, and tree. It provides descriptions of each topology's structure and connections between computers. Advantages listed for some topologies include easier installation and fault correction, while disadvantages include higher costs and potential for full network failure if a connection is lost.
This document summarizes a student project on improving quality of service (QoS) in wireless local area networks (WLANs). The project studied medium access control protocols, implemented different protocols in a network simulation, and compared their performance. Key findings were that the Enhanced Distributed Coordination Function protocol provided better service differentiation but reduced performance for lower priority traffic compared to the baseline Distributed Coordination Function protocol. The Distributed Coordination Function protocol had slightly better overall performance due to fewer collisions.
The document discusses different network topologies including bus, ring, mesh, and star. It also provides instructions for configuring a DHCP server, web server, DNS server, and FTP server on a network. The DHCP server configuration involves setting the router IP, enabling ports, and allowing end devices to automatically obtain IPs. Web server configuration involves accessing the server URL from an end device browser. DNS and mail servers are also mentioned but no configuration details are provided for those.
The document defines and compares different types of computer networks and network topologies. It discusses local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and how they differ based on geographic scope. It also covers common network architectures like client-server and peer-to-peer, and topologies like bus, ring, and star networks, explaining their basic structures and differences.
This document provides an overview of computer networking and the Internet. It begins with definitions of key terms like protocols, the network edge, and access networks. It then describes the network core and how data is transferred through circuit switching and packet switching. Packet switching uses statistical multiplexing to efficiently share bandwidth and allow more users to access the network compared to circuit switching. The Internet structure forms a hierarchical network of networks with high bandwidth connections between major tier 1 ISPs at the top level.
Network topology refers to the physical layout of devices in a computer network. There are three main types: bus, ring, and star. A bus topology uses a central backbone cable that devices connect to. While easy to implement, a failure of the backbone affects the whole network. A ring topology connects all devices in a loop, making troubleshooting easier but a single failure impacts the entire LAN. A star topology centers on a hub that each node connects to directly. It isolates failures but the hub is a single point of failure.
The document describes a minor project report on creating a LAN network with redundancy that was completed by two students for their B-Tech degree. It outlines the background, methodology, requirements, and results of designing a network topology on GNS3 using routing protocols, VPN, NAT, firewalls, and Cisco phones to provide redundancy. The project implemented Cisco ASA, MPLS routing, and other protocols to create a secure and reliable network connecting different office locations.
There are three main network topologies: bus, ring, and star. The bus topology broadcasts messages to all connected computers but performance decreases as more computers are added. Ring topologies arrange computers in a circular path and use token passing to control access. Star topologies connect all computers to a central hub or switch device, avoiding single point failures but losing connectivity if the central device fails.
The document discusses different topics relating to computer networks and communications network topology. It defines computer networks and different network methods, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also describes three common network topologies: bus topology, where all devices connect to a central cable or bus; ring topology, where the cable forms a closed ring and data travels around the ring; and star topology, where all devices connect to a central hub. The advantages and disadvantages of each topology are summarized. Mesh topology is also introduced, where each device has a dedicated connection to every other device providing redundant paths.
The document discusses different network topologies. It defines network and network topology, and lists common topologies including star, bus, and ring. For each topology, it describes the basic structure and provides advantages and disadvantages. The star topology connects all devices to a central hub, and advantages are easy installation and fault detection, while a single hub failure disables the network. The bus topology uses a main backbone cable to connect all devices, and advantages are easy connection and less cable, but a cable break shuts down the whole network. The ring topology connects each device directly to the next to form a circular path, and advantages are low cost and easy installation, but removing a device breaks the ring for all devices.
Computer networks a tanenbaum - 5th editioneepawan1809
This document is the front matter of a textbook on computer networks. It includes the title, copyright information, dedication, and table of contents. The textbook covers topics such as the physical layer, data link layer, network layer, transport layer, and examples of computer networks including the Internet, mobile networks, Ethernet, and wireless networks. It is intended to introduce students to the fundamental concepts and protocols of computer networking.
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
This document discusses different network topologies including bus, star, ring, and mesh. It describes the key characteristics of each topology such as their physical layout, how data is transmitted, advantages and disadvantages. Hybrid topologies that combine two or more standard topologies are also discussed. The document emphasizes understanding network topologies is essential for designing efficient computer networks and choosing the best option for different network requirements.
The document provides an overview of computer networking. It discusses various topics covered including types of topologies (bus, star, ring, mesh), types of servers (application server, catalog server, etc.), types of networks (LAN, WAN, etc.), network components (routers, switches, etc.), and the OSI model. Each section is authored by a different person (Savin Shetty, Ankita Shetty, etc.).
This document discusses networking devices and technologies used to connect local area networks (LANs) and wide area networks (WANs). It describes common physical layer components used in Ethernet LANs such as twisted pair cable, fiber optic cable, and connectors. It also discusses serial connection options and devices used for WAN connections including CSU/DSUs and their roles as data terminal equipment (DTE) and data circuit-terminating equipment (DCE).
This document discusses virtual private networks (VPNs). It begins by defining VPNs as remote network communication through the internet that is used by companies and organizations to communicate confidentially. It then discusses various VPN topologies including remote access VPNs, intranet VPNs, and extranet VPNs. It also covers VPN security measures, tunneling protocols, authentication methods, and provides examples of how VPNs function.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It defines key OSPF terminology like link, router ID, neighbors, adjacency, area, backbone area, Area Border Router (ABR), Autonomous System Boundary Router (ASBR). It describes OSPF network types, neighbor tables, topology tables, routing tables, and the link state advertisement (LSA) process. It also covers OSPF configuration, path calculation using the Dijkstra algorithm, and advantages of OSPF like rapid convergence and scalability.
Star topology in packet tracer By Tanjilur RahmanTanjilurRahman6
This document describes how to configure a simple star topology network in Packet Tracer by selecting PCs, laptops, and a hub. It explains that a star topology provides high data speeds but if the central hub fails, the entire network will go down. The steps shown configure the selected devices, send a message between them, and successfully ping between laptops to demonstrate the working star network topology.
The document discusses conventions of film posters and analyzes the poster created by the author. It begins by defining what a film poster is and common conventions, such as including images of main actors and the film title. The author then explains their poster, which challenges conventions by using two images rather than one large central image. The text in the poster follows conventions by including the title and credits but in a non-traditional location. Color choices on the poster, like dark tones, also align with typical horror film poster conventions. In summarizing their poster design choices, the author evaluates how their poster both challenges conventions and adheres to common expectations for film posters.
The document summarizes key findings from the 2012 Jewish Communal Compensation Survey. It finds that 49% of respondents were under 32, 73% were female, and 31% were from New York. The mean salary was $66,044 and the median was $56,000. Salaries increased with seniority and were higher for those with graduate degrees. Regression analysis found gender, location, education, and negotiation impacted salaries, with women earning $8,679 less than men on average. The gender pay gap persisted even when controlling for age and education. Causes discussed included hours worked, education levels, negotiation rates, and discrimination. The document ends by asking participants to discuss addressing issues of transparency, gender disparity, and
The document discusses HubSpot's position in the customer relationship management (CRM) and inbound marketing software space. It highlights HubSpot's growth strategy of focusing on the mid-market customer segment and expanding its leadership position. It also notes various risks and uncertainties that could affect the company's projections around revenue growth and market opportunity. Financial metrics are provided showing increases in key metrics like revenue, customer base, and average subscription revenue per customer over recent years.
Este documento presenta 5 citas y referencias bibliográficas de diferentes libros en formato APA. Cada cita incluye el nombre del libro, autor, fecha de publicación y página de la cita textual, seguido de una breve explicación del contexto o significado de la cita dentro de la obra literaria.
We offer a variety of expertly developed itineraries; we customize our tours according to the needs of our particular visitors and ensure that the resulting program is perfect to the very last detail. our tours allow our travelers to visit the ancient biblical places as well as the modern developments. merging history and present in a unique place in the world. our knolwdgeable guides interactively work with group organizers to bring the most amazing experience to uor travelers.
Electric scooters and bikes are becoming increasingly popular modes of transportation in cities as they are affordable, convenient alternatives to driving or taking public transit. Riding electric scooters allows you to avoid traffic and find parking while traveling shorter distances around a city quickly and for just pennies per ride. Companies like Lime and Bird have launched dockless electric scooter and bike rental programs in over 100 cities worldwide making it easy to rent scooters by smartphone app and leave them anywhere once finished with a ride.
- Soybean prices fell to their lowest in almost five months due to slower demand from China and improved crop prospects in South America, while corn prices rose and wheat fell.
- Trading of soybean oil declined due to a lack of buying support in the physical market and weak global cues, despite earlier gains driven by strong foreign markets.
- The report provides the daily opening, high, low, closing, and change in prices for various agricultural commodities, along with charts and analysis of trends for soybeans and chickpeas. It recommends buy and sell strategies for different commodities.
The document discusses different topics relating to computer networks and communications network topology. It defines computer networks and different network methods, including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It also describes three common network topologies: bus topology, where all devices connect to a central cable or bus; ring topology, where the cable forms a closed ring and data travels around the ring; and star topology, where all devices connect to a central hub. The advantages and disadvantages of each topology are summarized. Mesh topology is also introduced, where each device has a dedicated connection to every other device providing redundant paths.
The document discusses different network topologies. It defines network and network topology, and lists common topologies including star, bus, and ring. For each topology, it describes the basic structure and provides advantages and disadvantages. The star topology connects all devices to a central hub, and advantages are easy installation and fault detection, while a single hub failure disables the network. The bus topology uses a main backbone cable to connect all devices, and advantages are easy connection and less cable, but a cable break shuts down the whole network. The ring topology connects each device directly to the next to form a circular path, and advantages are low cost and easy installation, but removing a device breaks the ring for all devices.
Computer networks a tanenbaum - 5th editioneepawan1809
This document is the front matter of a textbook on computer networks. It includes the title, copyright information, dedication, and table of contents. The textbook covers topics such as the physical layer, data link layer, network layer, transport layer, and examples of computer networks including the Internet, mobile networks, Ethernet, and wireless networks. It is intended to introduce students to the fundamental concepts and protocols of computer networking.
This document provides an overview of high speed backbone network design and routing. It discusses key elements of backbone networks including fiber optics, layer 2 and 3 switches, dense wavelength division multiplexing (DWDM), quality of service measures, and resilience. Fiber optic cables provide benefits like high bandwidth, low loss, and security. Layer 2 switches operate at the data link layer, while layer 3 switches perform both layer 2 and layer 3 functions for improved performance. DWDM combines multiple light wavelengths on a single fiber to increase bandwidth. Quality of service and resilience features ensure high throughput and network stability.
This document discusses different network topologies including bus, star, ring, and mesh. It describes the key characteristics of each topology such as their physical layout, how data is transmitted, advantages and disadvantages. Hybrid topologies that combine two or more standard topologies are also discussed. The document emphasizes understanding network topologies is essential for designing efficient computer networks and choosing the best option for different network requirements.
The document provides an overview of computer networking. It discusses various topics covered including types of topologies (bus, star, ring, mesh), types of servers (application server, catalog server, etc.), types of networks (LAN, WAN, etc.), network components (routers, switches, etc.), and the OSI model. Each section is authored by a different person (Savin Shetty, Ankita Shetty, etc.).
This document discusses networking devices and technologies used to connect local area networks (LANs) and wide area networks (WANs). It describes common physical layer components used in Ethernet LANs such as twisted pair cable, fiber optic cable, and connectors. It also discusses serial connection options and devices used for WAN connections including CSU/DSUs and their roles as data terminal equipment (DTE) and data circuit-terminating equipment (DCE).
This document discusses virtual private networks (VPNs). It begins by defining VPNs as remote network communication through the internet that is used by companies and organizations to communicate confidentially. It then discusses various VPN topologies including remote access VPNs, intranet VPNs, and extranet VPNs. It also covers VPN security measures, tunneling protocols, authentication methods, and provides examples of how VPNs function.
This document provides an overview of the Open Shortest Path First (OSPF) routing protocol. It defines key OSPF terminology like link, router ID, neighbors, adjacency, area, backbone area, Area Border Router (ABR), Autonomous System Boundary Router (ASBR). It describes OSPF network types, neighbor tables, topology tables, routing tables, and the link state advertisement (LSA) process. It also covers OSPF configuration, path calculation using the Dijkstra algorithm, and advantages of OSPF like rapid convergence and scalability.
Star topology in packet tracer By Tanjilur RahmanTanjilurRahman6
This document describes how to configure a simple star topology network in Packet Tracer by selecting PCs, laptops, and a hub. It explains that a star topology provides high data speeds but if the central hub fails, the entire network will go down. The steps shown configure the selected devices, send a message between them, and successfully ping between laptops to demonstrate the working star network topology.
The document discusses conventions of film posters and analyzes the poster created by the author. It begins by defining what a film poster is and common conventions, such as including images of main actors and the film title. The author then explains their poster, which challenges conventions by using two images rather than one large central image. The text in the poster follows conventions by including the title and credits but in a non-traditional location. Color choices on the poster, like dark tones, also align with typical horror film poster conventions. In summarizing their poster design choices, the author evaluates how their poster both challenges conventions and adheres to common expectations for film posters.
The document summarizes key findings from the 2012 Jewish Communal Compensation Survey. It finds that 49% of respondents were under 32, 73% were female, and 31% were from New York. The mean salary was $66,044 and the median was $56,000. Salaries increased with seniority and were higher for those with graduate degrees. Regression analysis found gender, location, education, and negotiation impacted salaries, with women earning $8,679 less than men on average. The gender pay gap persisted even when controlling for age and education. Causes discussed included hours worked, education levels, negotiation rates, and discrimination. The document ends by asking participants to discuss addressing issues of transparency, gender disparity, and
The document discusses HubSpot's position in the customer relationship management (CRM) and inbound marketing software space. It highlights HubSpot's growth strategy of focusing on the mid-market customer segment and expanding its leadership position. It also notes various risks and uncertainties that could affect the company's projections around revenue growth and market opportunity. Financial metrics are provided showing increases in key metrics like revenue, customer base, and average subscription revenue per customer over recent years.
Este documento presenta 5 citas y referencias bibliográficas de diferentes libros en formato APA. Cada cita incluye el nombre del libro, autor, fecha de publicación y página de la cita textual, seguido de una breve explicación del contexto o significado de la cita dentro de la obra literaria.
We offer a variety of expertly developed itineraries; we customize our tours according to the needs of our particular visitors and ensure that the resulting program is perfect to the very last detail. our tours allow our travelers to visit the ancient biblical places as well as the modern developments. merging history and present in a unique place in the world. our knolwdgeable guides interactively work with group organizers to bring the most amazing experience to uor travelers.
Electric scooters and bikes are becoming increasingly popular modes of transportation in cities as they are affordable, convenient alternatives to driving or taking public transit. Riding electric scooters allows you to avoid traffic and find parking while traveling shorter distances around a city quickly and for just pennies per ride. Companies like Lime and Bird have launched dockless electric scooter and bike rental programs in over 100 cities worldwide making it easy to rent scooters by smartphone app and leave them anywhere once finished with a ride.
- Soybean prices fell to their lowest in almost five months due to slower demand from China and improved crop prospects in South America, while corn prices rose and wheat fell.
- Trading of soybean oil declined due to a lack of buying support in the physical market and weak global cues, despite earlier gains driven by strong foreign markets.
- The report provides the daily opening, high, low, closing, and change in prices for various agricultural commodities, along with charts and analysis of trends for soybeans and chickpeas. It recommends buy and sell strategies for different commodities.
An Evaluation of Pair Programming PracticeKranthi Lakum
This document discusses pair programming, which involves two programmers working together on the same task. It describes the roles of driver and navigator, and variants like remote and ping pong pairing. The strengths include improved quality, learning, and defect prevention from continuous reviews. Weaknesses include some preferring solo work and potential personal conflicts. Metrics for evaluating pair programming productivity and defect rates are also presented. The conclusion recommends pair programming for less complex tasks with schedule pressure or more complex tasks with less schedule pressure.
My books- Learning to Go https://gumroad.com/l/learn2go & The 30 Goals Challenge for Teachers http://amazon.com/The-Goals-Challenge-Teachers-Transform/dp/0415735343
Resources at http://www.pearltrees.com/shellyterrell/teacher-zen/id12262771
Spanish cinema began in 1896 with the first cinematographic exhibitions in Madrid. The first Spanish director of international success was Segundo de Chomón. The first Spanish movie with a plot was "Riña en un café" in 1897 directed by Fructuós Gelabert. Mute Spanish cinema began in 1896 in Barcelona and ended in 1920, highlighted by rural drama "La Aldea Maldita" and surrealist film "Un Perro Andaluz". In 1987, the Goya Awards were created as Spain's equivalent to the Oscars. More recently, the Feroz Awards were established in 2013 as Spain's version of the Golden Globes. Some prominent current Spanish actors include Mario Casas,
This document discusses the problems with traditional project management approaches for software development and proposes an alternative "beyond projects" model. It argues that projects assume predefined outcomes and temporary organizations, which does not fit the reality of changing requirements and need for ongoing software evolution. Instead, it suggests organizing around continuous flow, stable teams, small batches, and governance based on delivered value rather than schedules and budgets.
Implementing several forms of therapy within the matrix of Trauma Focused Cognitive Behavioral Therapy in order to successfully treat victims of child sexual abuse.
UX Camp 2016 Copenhagen - Friction In DesignMikkel Køster
Presentation on "Friction In Design" with heavy inspiration from Steve Selzer's (Experience Design Manager at Airbnb) talk at SXSW 2016 on "Human Centred-Design: Why Empathy Isn't Enough"
So thank you very much Steve Selzer - I hope you endorse me spreading your wise words and observations :)
This document is a project report on computer networking submitted by Manas Chatterjee to the Advanced Regional Telecom Training Center. It includes a certificate verifying Manas completed the project under the guidance of R.K. Ram. The report covers topics such as types of networks, networking models, IP addressing, and basic networking components and concepts.
This document summarizes different types of computer networks. It discusses local area networks (LANs) that connect devices within a small geographic area like a home or office. Metropolitan area networks (MANs) interconnect LANs within a larger region like a city. Wide area networks (WANs) connect LANs across national and international locations using technologies like fiber optics, radio waves, and satellites. The document also describes wired and wireless connection methods, client-server and peer-to-peer network functionality, common network topologies like bus, star and ring, and protocols such as TCP/IP, IPX/SPX, and AppleTalk.
Adhoc mobile wireless network enhancement based on cisco devicesIJCNCJournal
This document discusses enhancing the performance of ad hoc wireless networks using Cisco devices. It proposes using Cisco routers and access points to create a three-layer ad hoc network with endpoints, intermediate coordinators, and a core router layer for improved processing, reliability, cost, power consumption, and accessibility. It then outlines various protocols and configurations that could be implemented using Cisco devices, including NAT, ACLs, DHCP, and wireless security settings. Diagrams and tables show an example network topology and device IP addresses and configurations.
This document is a project report on computer networking prepared by Surender Singh for his summer training. It provides an introduction to networking and covers topics such as network types (LAN and WAN), network models (OSI model), networking cables, devices, IP addressing, routing, firewalls, wireless networks, and ISDN. The report defines what a computer network is, outlines the requirements and benefits of networking, and describes different network components and concepts at a high level.
This document provides information about computer networking including definitions, components, types, and concepts. It defines a computer network as two or more connected computers that allow people to share files, printers, and other resources. There are two main types of networks based on architecture: client-server networks with a dedicated server and peer-to-peer networks without hierarchy. Other key topics covered include network topologies (bus, star, ring, etc.), transmission media (guided, unguided), protocols, and modes of communication (simplex, half-duplex, full-duplex).
COMPUTER NETWORKING SUCH AS- DATA TRANSMISSION,
OVERVIEW OF COMPUTER NETWORKING,
TYPES OF NETWORK & TOPOLOGIES &
PACKET TRANSMISSION
INTERNET & INTRANET INCLUDED-
INTRODUCTION
OVERVIEW OF INTERNET
ARCHITECTURE & FUNCTIONING OF INTERNET
WEB PAGE, HTML
BASIC SERVICES OVER INTERNET
The document discusses networking concepts such as network topologies, devices, and the OSI model. It begins by explaining how businesses realized networking could increase productivity and save costs. It then describes common networking devices like NICs, hubs, switches, and routers. The document also covers standard network topologies and the layers of the OSI model, providing examples of how data is encapsulated as it travels through each layer.
There are three main types of networks: LANs which cover a small area like a building, MANs which span a larger area like a city, and WANs which connect extremely large areas like countries. Networks can use bus, star, or ring topologies. The bus topology allows all devices to communicate directly but has many collisions, while the star topology is most common and efficient with a central hub and fewer collisions. The ring topology uses a token passing between devices. The OSI model has seven layers including the physical, data link, and network layers which deal with raw data transmission, error checking, and packet routing respectively.
The document discusses the CCNA certification exam and provides details about its format, benefits, and requirements. It then covers networking concepts like network devices, topologies, protocols, and the OSI model. Key points include that the CCNA exam tests knowledge of networking fundamentals, has multiple choice and simulation questions, and benefits career advancement. It also defines common network components, topologies, and each layer of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, standards, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, IEEE 802 standards, and an explanation of each of the seven layers of the OSI model.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides information about networking devices, topologies, protocols, and the OSI model layers. Key topics covered include switches, routers, network topologies like star and bus, the 7 layers of the OSI model and what each layer is responsible for, and how data is encapsulated as it moves through the layers from physical to application.
The document discusses the CCNA certification exam including details about the exam such as number of questions, duration, passing score, and benefits of obtaining the certification. It also provides an overview of networking concepts including the purpose of networking, networking devices, network interface cards, hubs, switches, routers, network topologies, LANs/WANs, virtual private networks, bandwidth, the OSI model, and IEEE 802 standards.
The document discusses TCP/IP and the OSI model. It provides details on:
- TCP/IP consisting of rules for protocol used with IP to send data between computers over the Internet. IP handles delivery while TCP tracks data transmission.
- The 7-layer OSI model with layers grouped into physical/data link, network/transport, and application/presentation/session. Layers define communication details and encapsulation/decapsulation of data.
- Common data units including segments, packets, datagrams, frames, cells, and bits/bytes. Encapsulation adds headers at each layer.
- Other topics covered include IP addressing, domain name servers, URLs, wireless networks, Wi-Fi, WiMax
Networking involves connecting electronic devices like computers to share resources and communicate. It allows devices to share internet access, hardware like printers, files and folders, and play multiplayer games. Networks use various topologies like star, bus or mesh to connect devices via physical cables or wireless links, and network protocols allow the connected devices to communicate according to shared rules.
This document discusses various topics related to data communication and computer networks. It defines analog and digital signals and describes different types of data transmission such as parallel, serial, synchronous, and asynchronous. It also discusses different network topologies like bus, star, ring, mesh and tree. Additionally, it defines different types of computer networks based on geographical coverage such as PAN, LAN, MAN, WAN and CAN.
Here are the key differences between flow control and congestion control:
Flow control is used at the data link layer (layer 2) of the OSI model to regulate the amount of data
transferred between two endpoints (e.g. between a computer and a router) so that the receiving
endpoint is not overwhelmed. It ensures reliable delivery of frames by using mechanisms like
windowing and acknowledgments.
Congestion control is used at the transport layer (layer 4) of the OSI model to regulate the amount
of data entering the network to avoid overloading intermediate network nodes and links. It ensures
reliable delivery of packets by adjusting the transmission rate when congestion is detected through
packet loss or queue build-up
The document defines and compares different types of computer networks and network topologies. It defines local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs), and discusses their key differences in size and geographic reach. It also outlines three common network topologies - bus, ring, and star - and compares their structures and properties such as ease of adding/removing nodes and handling failures.
There are three basic types of computer networks: local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). LANs connect computers within a limited area like a building or floor. MANs connect LANs within a town or city up to 50 miles wide. WANs distribute information across thousands of miles between thousands of users spanning cities and continents. Networks allow connected computers to share resources and information.
This document defines and describes various types of computer networks including local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). It discusses key characteristics that define networks such as topology, protocol, architecture, and media. Specific network types covered include Ethernet, switched Ethernet, and the Internet. The document also defines common networking terms like routing, bridging, segmentation, and protocols.
Chapter 8 the role of networking in manufacturingN. A. Sutisna
This document discusses data communication and networking in manufacturing systems. It covers local area network concepts like topologies, protocols, and addressing. The most common high-level network topologies for manufacturing are bus structures and star networks. Bus networks offer flexibility in cable utilization but contention is an issue. Ring and star networks are also discussed along with techniques for resolving contention like CSMA/CD and token passing.
Similar to Learning area-3-e28093-powerpoint-hndybook (20)
The document is an assessment checklist form used to evaluate a student's presentation on the impact of information and communication technology (ICT) on society. It assesses the student based on criteria such as locating information from multiple sources, presenting the information in 5 to 10 slides covering the topic, content, and conclusion with sources referenced. The student is also evaluated on cooperation by listing group members and verification from them or the assessor's observation. The maximum total mark for the assessment is 10.
This document provides the criteria and instructions for a group presentation on the impact of information and communication technology (ICT) on society. Students must:
1. Locate information from more than one source on one of seven topics related to ICT and society.
2. Present the information in a 5-10 slide presentation covering the topic, content, and conclusions.
3. Submit a soft or hard copy of the presentation and display cooperation by including the names of group members or getting verbal confirmation from them.
Teknologi komputer mengancam privasi individu melalui pengumpulan data peribadi tanpa izin seperti alamat, umur, dan status perkahwinan untuk membentuk profil elektronik yang boleh dijual. Ancaman ini termasuk cookies, spyware, spam, dan pengiklanan berprofil tinggi. Undang-undang privasi dan perisian keselamatan perlu dilaksanakan untuk melindungi hak privasi pengguna.
Dokumen tersebut memberikan definisi tentang harta intelektual, maklumat, komunikasi, teknologi, dan ICT. ICT dijelaskan sebagai teknologi yang diperlukan untuk memproses maklumat dengan menggunakan peranti elektronik, komunikasi, dan aplikasi perisian untuk menukar, menyimpan, melindungi, memproses, menghantar, dan mengambil maklumat dari mana-mana tempat dan masa. Undang-undang harta intelektual
1) Ukuran keselamatan komputer seperti data backup, kriptografi, antivirus, anti-spyware dan firewall digunakan untuk melindungi sistem komputer dan maklumat daripada ancaman seperti virus, hacker, dan kecurian.
2) Ancaman komputer termasuk kod jahat, hacker, bencana alam, dan kecurian komputer atau maklumat. Langkah-langkah perlu diambil untuk mengawal akses, mengesan virus, dan mencegah kecurian.
The document summarizes the five generations of computers from the 1940s to present. The 1st generation (1940-1956) used vacuum tubes, were large and unreliable. The 2nd generation (1956-1963) introduced transistors which were smaller and more reliable than vacuum tubes. The 3rd generation (1964-1971) saw the development of silicon chips and microprocessors. The 4th generation (1971-present) brought personal computers from companies like Apple and IBM that were smaller and more powerful due to hardware advances. The 5th generation (present and beyond) involves new technologies like robotics, virtual reality, and artificial intelligence.
Dokumen tersebut membahas tentang etika komputer dan kode etika yang sesuai atau tidak sesuai. Kode etika yang sesuai meliputi memberikan peringatan tentang virus, meminta izin sebelum mengirim iklan, dan menggunakan informasi dengan izin. Kode etika yang tidak sesuai meliputi memodifikasi informasi tanpa izin, menjual informasi tanpa izin, dan mencuri perangkat lunak.
This document outlines topics related to computer systems, including definitions of key concepts like input, processor, output, and storage. It describes the basic information processing cycle and data representation at the bit and byte level. Measurement units for data, clock speed, and types of hardware components like CPUs, memory, storage devices, input/output devices are defined. The document also discusses operating systems, application software, and utility programs. Finally, it addresses assembling computer systems, partitioning and formatting storage, and installing software.
This document discusses information and communication technology (ICT) and its impact on society. It covers topics such as the definition and evolution of ICT, computer ethics and legal issues like intellectual property and privacy, computer security threats and measures, and both the positive and negative impacts of ICT on society. The document provides an overview of key concepts and issues relating to the role of ICT in modern society.
This document outlines topics related to computer networks and communications. It covers basic concepts such as defining networks and communications, types of networks including LAN, MAN and WAN, network architectures like client/server and peer-to-peer, and network topologies including bus, ring and star. The document also discusses hardware requirements for networking including devices like NICs, modems, hubs and routers, as well as cabling and wireless transmission media. Software requirements cover network operating systems and client software. Additional sections provide information on setting up network facilities and current/future developments in networking technology.
The document provides guidelines for assessing coursework for the ICT subject in the SPM examination. It outlines 13 constructs and 15 aspects that will be assessed across 6 learning areas. Candidates will be assessed on their practical skills and knowledge of current and future developments in areas like computer security, networking, multimedia, programming and information systems. Teachers are responsible for conducting assessments using various instruments like demonstrations, presentations, written assignments and projects. Candidates must submit portfolios as evidence and will be penalized for late or repeated submissions.
a. DBMS membolehkan pengguna mengurus dan mengakses maklumat dalam pangkalan data
b. Kunci primer dan asing membolehkan hubungan antara jadual dan mengenal pasti rekod unik
c. Objek pangkalan data seperti jadual, pertanyaan, borang dan laporan memudahkan manipulasi dan persembahan maklumat
Dokumen tersebut membincangkan bahasa pengaturcaraan terkini seperti bahasa generasi kelima yang tertumpu kepada penyelesaian masalah, bahasa tabii yang menggunakan bahasa Inggeris biasa, dan pustaka grafik terbuka (OpenGL) yang menentukan standard untuk aplikasi grafik 3D dan 2D.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
3. 3.1.1 Definition
3.1.1 Define computer networks.
A SYSTEM OF INTERCONNECTED COMPUTER AND PERIPHERAL
DEVICE. INTERCONNECTED COMPUTING DEVICE CAN
COMMUNICATE WITH EACH OTHER THROUGH DEFINED RULES
OF DATA COMMUNICATING USING HARDWARE AND SOFTWARE.
MAY OPERATE ON WIRED OR WIRELESS CONNECTION.
SYSTEM YANG MENYAMBUNGKAN PC DENGAN PERANTI LUARAN
PERANTI PENYAMBUNGAN KOMUNIKASI BOLEH BERINTERAKSI
ANTARA SATU SAMA LAIN DENGAN MENGGUNAKAN PERKAKASAN
DAN PERISIAN YANG TELAH DITETAPKAN CARA DAN PERATURANNYA
BOLEH BEROPERASI SAMADA SECARA WAYAR ATAU TANPA WAYAR
4. 3.1.1 Definition
3.1.2 Define communications.
IS ABOUT TRANFER OF INFORMATION FROM SENDER (CLIENT) TO A
RECEIVER(PRINTER). USING AN ELECTRICITY , RADIO WAVE OR LIGHT .
THE INFORMATION CAN BE TEXT , VIDEO, GRAPHICS, IMAGE OR COMBINATION
OF ALL THESE. TRANSMIT INFORMATION OR DATA USING 2 SIGNAL NAMELY BY
ANALOG AND DIGITAL.
ADALAH BERKENAAN MENGHANTAR MAKLUMAT ATAU DATA DARIPADA
PENGHANTAR KEPADA PENERIMA. IA MENGGUNAKAN ELEKTRIK, GELOMBANG
RADIO ATAU CAHAYA. MAKLUMAT ATAU DATA BOLEH BERUPA TEKS, VIDEO,
GRAFIK, IMEJ ATAU KOMBINASI KESEMUANYA. PENGHANTARAN DATA
MENGGUNAKAN 2 JENIS SIGNAL IAITU ANALOG DAN DIGITAL.
5. 3.1.1 Definition
3.1.3
State the importance of computer networks and communications.
• E- BUSINESS
– SELL AND CONDUCT ONLINE SHOPPING THROUGH
NETWORK
• ONLINE EDUCATION
- SHARE KNOWLEDGE, SEARCH FOR
INFORMATION AND JOIN ONLINE
DISCUSSION
• E- BANKING
- PAYBILLS, ACCOUNT BALANCES, TRANSFER
MONEY
• LONG DISTANCE
COMMNUCATION
- CAN BE FASTER, EASIER AND SAVE COST
•
•
•
•
E- PERNIAGAAN
- JUALAN DAN BELIAN MELALUI ATAS TALIAN
PEMBELAJARAN ATAS
TALIAN
- KONGSI MAKLUMAT DAN PENGETAHUAN,
PERBINCANGAN, DAPATAN MAKLUMAT DSBGNYA
E-PERBANKAN
- BAYARAN BILLS, KELUAR MASUK WANG, SEMAK
BAKI WANG DSBGNYA
KOMUNIKASI JARAK
JAUH
- LEBIH CEPAT, MUDAH DAN JIMAT KOS
7. 3.1.1 Definition
3.1.4
Define types of computer networks:
LAN, MAN and WAN.
LAN - (LOCAL AREA NETWORK)COVER SMALLL REGION OF
SPACE, TYPICALLY A SINGLE BULIDING
DALAM LINGKUNGAN KAWASAN YANG KECIL SEPERTI
DALAM MAKMAL PC
MAN -
METROPLITAN AREA NETWORK. COLLECTION OF LAN’S WITH
THE SAME GEOGRAPHICAL AREA FOR INSTANCE A CITY
KOLEKSI KEPADA LAN’S TETAPI DALAM KAWASAN GEORAFI
YANG BESAR SEPERI BANDAR.
WAN -
WIDE AREA NETWORKCAN BE COLLECTION OF LAN’S AND
MAN’S OR THE MIX WITH A VERY LARGE GEOGRAPHICAL
AREA
MERUPAKAN KOLEKSI KEPADA LAN’S DAN MAN’S ATAU KEDUADUANYA TETAPI DALAM GEOGRAFI YANG SANGAT BESAR
IAITU SATU DUNIA
9. 3.1.1 Definition
3.1.5 Differentiate between the three types of computer networks.
1. COST / KOS
LAN - LOW / RENDAH
MAN - HIGH / TINGGI
WAN - HIGHER / SANGAT TINGGI
2. SIZE / SAIZ
LAN - LIMITED (SCHOOL LAB) / TERHAD (MAKMAL SEKOLAH)
MAN – COVER LIKE CITY OF KL / MERANGKUMI SEBUAH BANDAR SEPERTI KL
WAN – VERY LARGEST ARE(WHOLE WORLD)/ KAWASAN SGT BESAR (DUNIA)
3. SPEED / KELAJUAN
LAN - FASTEST / SANGAT CEPAT KERANA KAWASAN KECIL
MAN - SLOWER / PERLAHAN KERANA BYK PERTUKARANSUMBER BERLAKU
WAN - SLOWEST / BERKAITAN DENGAN JARAK DAN KAWASAN YG SGT BESAR
4. NUMBER OF COMPUTER / JUMLAH KOMPUTER
LAN - SMALLEST / KECIL
MAN - LARGER / BESAR
WAN - LARGEST / SANGAT BESAR
5.TRANSMISSION MEDIUM / MEDIUM PENGHANTARAN
LAN - TWISTED PAIR CABLE
MAN - TWISTED PAIR AND FIBRE OPTIC CABLE
WAN - FIBRE OPTIC CABLE,RADIO WAVE AND SATELLITE
10. 3.1.1 Definition
3.1.6
Define two types of network architecture:
Client/Server and Peer-to-Peer
CLIENT/SERVER
CLIENT –
COMPUTER WHICH REQUEST SERVICES OR FILES FROM SERVER
SERVER COMPUTER THAT SHARED INFORMATION AND RESOURCES WITH
OTHER COMPUTERS ON A NETWORKSUITABLE FOR 10 OR MORE PC.
USE TWISTED PAIR OR COAXIAL CABLE, IF LARGE USE FIBRE OPTIC.
PROVIDE A CENTRALIZED STORAGE ARE FOR PROGRAM , DATA AND
INFORMATION
CLIENT/SERVER
CLIENT –
PC YANG MEMINTA PERKHIDMATAN DARIPADA SERVER
SERVER PC YANG MEMBERIKAN MAKLUMAT DAN DATA KEPADA RANGKAIAN
PC YANG DIKAWALNYA. SESUAI UNTUK 10 ATAU LEBIH PC
MENGGUNAKAN KABLE TWISTED PAIR ATAU COAXIAL CABLE,
JIKA BESAR IA MENGGUNAKAN KABEL FIBRE OPTIC.
ADA KAWALAN BERPUSAT BAGI MAKLUMAT , DATA DAN PROGRAM
11. 3.1.1 Definition
3.1.6
Define two types of network architecture: Client/Server and Peer-to-Peer
PEER-TO-PEER.
ALSO KNOWN AS P2P NETWORKNETWORK WITH ALL THE NODES ACTING AS
BOTH SERVER AND CLIENTSFILES LOCATED ON ANAOTHER PC AND CAN
ALSO PROVIDES FILE TO OTHER PC’SUSUALLY USE TWISTED PAIR OR
COAXIAL CABLE BECAUSE ITS CHEAPER AND EASIERBEST CHOICE FOR
NETWORK PC LESS THAN 10 EXAMPLE –WIRELESS NETWORKING
PEER-TO-PEER .
JUGA DIKENALI SEBAGAI RANGKAIAN P2P. KESEMUA PC BOLEH BERTINDAK
SEBAGAI CLIENT AND SERVER. DATA DAN MAKLUMAT BERTERABUR.
BIASANYA MENGGUNAKAN KABEL TWISTED PAIR ATAU KABEL COAXIAL
CABLE KERANA IA MUDAH DAN MURAH. SESUAI UNTUK RANGKAIAN PC YANG
KURANG DARIPADA 10 .CONTOH –RANGKAIAN TANPA WAYAR
13. 3.1.1 Definition
3.1.8 DIFFERENTIATE BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY
1. DESCRIPTION / PERNYATAAN
BUS FOUND IN LANSOMETIMES HAVE MORE THAN ONE SERVER AND SOMETIMES
DO NOT NEED SERVER
ADA DALAM LAN.KADANGKALA ADA LEBIH SERVER DAN KADANG KALA TIADA
LANGSUNG
RING - FOUND IN LAN. SERVER MAY EXIST BUT NOT CONNECT TO ALL NODES IN THE
NETWORK
ADA DALAM LAN. SERVER BOLEH ADA TETAPI TIDAK SEMUA BERHUBUNG
DENGANNYA DALAM RANGKAIAN
STAR - FOUND IN LAN. MUST HAVE A HOST THAT CAN BE SERVER, HUB OR ROUTER
ADA DALAM LANMESTI ADA HOST YANG BOLEH JADI MENGGUNAKAN SERVER,
HUB ATAU ROUTER
2. DEPENDENCE / KEBERGANTUNGAN
BUS IF ONE NODES FAIL, ITS NOT EFFECT NETWORK
SATU PC GAGAL , TIDAK MENGGANGGU RANGKAIAN
RING - IF ONE NODE FAIL, THE NETWORK WILL FAIL TO FUNCTION
SATU PC GAGAL, MENGGANGGU SELURUH RANGKAIAN
STAR - IF ONE FAIL, NETWORK CAN STILL FUNCTION AS LONG THE HOST STILL
WORKING, IF THE HOST NOT WORKING NETWORK WILL FAIL TO FUNCTION
SATU PC GAGAL, RANGKAIAN MASIH BERJALAN, TETAPI JIKA HOST GAGAL,
MAKA SELURUH RANGKAIAN AKAN GAGAL DAN TERGANGGU
14. 3.1.1 Definition
3.1.8 DIFFERENTIATE BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY
3. ADVANTAGES / KELEBIHAN
BUS EASY IMPLEMENTATION
FAILURE OF NODES DOESNYT EFFECT THE ENTIRE LAN
NO DISRUPTION TO THE NETWORK WHEN CONNECTING OR REMOVING DEVICE
MUDAH DIURUS
KEGAGALAN SATU PC TIDAK MENGGANGGU RANGKAIAN
TIADA GANGGUAN JIKA MEMBUAT HUBUNGAN ATAU MENGGANTI PERANTI
RING -
STAR -
TROUBLESHOOTING IS EASY WHEN ONE OF THE NODES FAILS
REPAIR OR REMOVING NODES, THE NETWORK STLL FUNCTIONING
MUDAH UNTUK MEMBETULKAN RANGKAIAN
MEMBETUL DAN MENGGANTI PERANTI, RANGKAIAN MASIH BERJALAN
EASY IMPLEMENTATION FAILURE OF NODES DOESNYT EFFECT THE ENTIRE
LAN
NO DISRUPTION TO THE NETWORK WHEN CONNECTING OR REMOVING DEVICE
TROUBLESHOOTING IS EASY WHEN THE HOST FAILS. SIMPLY REPAIR OR
REPLACE THE HOST
MUDAH DIURUS
KEGAGALAN SATU PC TIDAK MENGGANGGU RANGKAIAN
MEMBETUL DAN MENGGANTI HOST SEMUDAH GANTI ATAU BETULKAN
SAHAJA.
15. 3.1.1 Definition
3.1.8 DIFFERENTIATE BETWEEN THE THREE TYPES OF NETWORK TOPOLOGY
BUS TOPOLOGY
4. DISADVANTAGE / KEKURANGAN
BUS IF THE BACKBONE(WIRED) FAILS , ENTIRE NETWORK WILL EXTENDED
NETWORK SPEED DICREASE WHEN NUMBER OF PC INCREASE
DIFFICULT TROUBLESHOOTING WHEN ONE NODES FAILS
JIKA KABEL ROSAK, MENGGANGGU RANGKAIAN
KELAJUAN BERKURANG JIKA PC BERTAMBAH
SUKAR BUAT PEMBAIKAN JIKA SATU PC BERMASALAH
RING -
STAR -
DIFFICULT IMPLEMENTATION
FAILURE OF ONE NODES WILL FAILURE THE ENTIRE NETWORK
CONNECTING AND REMOVING DEVICE DIFFICULT
NETWORK SPEED DICREASE WHEN NUMBER OF PC INCREASE
SUKAR DIURUS
KELAJUAN BERKURANG JIKA PC BERTAMBAH
SUKAR BUAT PEMBAIKAN DAN GANTIAN
KEROSAKAN SATU PC MENGGANGGU RANGKAIAN
FAILURE OF HOST WILL EFFECTS THE ENTIRE NETWORK
NETWORK SPEED DICREASE WHEN NUMBER OF PC INCREASE
HOST MUST BE INSTALED TO CONTROL THE NETWORK
HOST ROSAK GANGGU RANGKAIAN
KELAJUAN BERKURANG JIKA PC BERTAMBAH
HOST MESTI DIPASANG DALA RANGKAIAN
RING TOPOLOGY
STAR TOPOLOGY
SER
VER
16. 3.1.1 Definition
3.1.9 Define Transmission Control Protocol/Internet Protocol (TCP/IP) as a protocol to facilitate
communication over computer network
TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL (TCP/IP) AS A PROTOCOL TO
FACILITATE COMMUNICATION OVER COMPUTER NETWORK.
•
IS INTERNET COMMUNICATION PROTOCOL
•
STANDARD THAT SET RULES FOR PC MUST FOLLOW IN COMMUNICATING WITH EACH OTHER ON
A NETWORK
•
SOME REFER TO TCP/IP AS INTERNET PROTOCOL SUITE
•
ADALAH PROTOKOL KOMUNIKASI INTERNET
•
MERUPAKAN SET ARAHAN STANDARD YANG MESTI DIPATUHI OLEH PC BAGI BERKOMUNIKASI
DALAM RANGKAIAN INTERNET
•
SESETENGAH MERUJUK TCPIP SEBAGAI SET PROTOKOL INTERNET
TRANSMISSION CONTROL PROTOCOL(TCP)
– PROTOCOL THAT SET OF COMMUNICAION RULES BETWEEN COMPUTERS.
– ESTABLISHES CONNECTION BETWEEN 2 PC , PROTECT AGAINS DATA LOSS AND DATA
CORRUPTION
– RESPONSIBLE FOR BREAKING THE DATA INTO PACKETS BEFORE THE ARE SENT THAN
ASSEMBLE THE PACKETS WHEN THEY REACH A DESTINATION
– PROTOKOL YANG MENETAPKAN ARAHAN KOMUNIKASI ANTARA KOMPUTER
– MENETAPKAN HUBUNGAN ANTARA 2 PC, ELAKKAN KEHILANGAN DAN KEROSAKAN DATA
– BERTANGGUNGJAWAB BAGI MEMECAHKAN DATA KEPADA PAKET SEBELUM DIHANTAR
KEMUDIAN MENGHIMPUNKAN PAKET APABILA IA SAMPAI KE DESTINASINYA
INTERNET PROTOCOL (IP)
– PROTOCOL THAT TRANSFER DATA FORM NODE TO NODE (PC TO PC)
– IP TAKE CARE OF DELIVERING DATA PACKETS BETWEEN 2 PC
– RESPONSIBLE FOR SENDING THE PACKETS FROM SENDER TO RECEIVER
– ADALAH PROTOKOL YANG MEMINDAHKAN DATA DARI PC KE PC
– IP MENGAMBIL BERAT TENTANG PENGHANTARAN PAKET DATA ANTARA 2 PC
– BERTANGGUNGJAWAB UNTUK HANTAR PAKET DATA DRPD PENGHANTAR KEPADA
PENERIMA
17. 3.1.1 Definition
3.1.10 Describe the types of network communications technology:
• Internet • Intranet • Extranet
INTERNET
THE INTERNET, OR THE NET, IS THE WORLDWIDE, PUBLICLY ACCESSIBLE
SYSTEM OF INTERCONNECTED COMPUTER NETWORKS THAT TRANSMIT DATA
BY PACKET SWITCHING USING THE STANDARD INTERNET PROTOCOL (IP).
IT CONSISTS OF MILLIONS OF SMALLER BUSINESS, ACADEMIC, DOMESTIC
AND GOVERNMENT NETWORKS, WHICH TOGETHER CARRY VARIOUS
INFORMATION AND SERVICES, SUCH AS ELECTRONIC MAIL, ONLINE CHAT,
AND THE INTERLINKED WEB PAGES AND OTHER DOCUMENTS OF THE WORLD
WIDE WEB.INTERNET IS ONE OF THE USES OF COMMUNICATION. THROUGH
THE INTERNET, SOCIETY HAS ACCESS TO GLOBAL INFORMATION AND
INSTANT COMMUNICATION.
INTERNET ATAU NET ADALAH BERSIFAT GLOBAL SYSTEM CAPAIAN AWAM
ANTARA RANGKAIAN KOMPUTER YANG BERHUBUNG, MENGHANTAR
MENERIMA DATA DALAM BENTUK PAKET MENGGUNAKANA STANDARD
PROTOKOL INTERNET.MENGANDUNGI BERJUTA PERKARA BERKAITAN
PERNIAGAAN, AKADEMIK, BAHAGIAN DALAMAN DAN RANGKAIAN KERAJAAN
DIMANA SEMUANYA MEMBAWA PELBAGAI MAKLUMAT DAN PERKHIDMATAN
SEPERTI MEL ELEKTRONIK, BERCAKAP ATAS TALIAN, HUBUNGAN ANTARA
LAMAN WEN DAN BERBAGAI LAGI.
18. 3.1.1 Definition
3.1.10 Describe the types of network communications technology:
• Internet • Intranet • Extranet
INTRANET
AN INTRANET (INTRA MEANS WITHIN) IS AN INTERNAL NETWORK THAT USES INTERNET
TECHNOLOGIES AND IT IS A SMALL VERSION OF THE INTERNET THAT EXISTS WITHIN AN
ORGANISATION. AN INTRANET IS A PRIVATE COMPUTER NETWORK THAT USES INTERNET
PROTOCOLS, NETWORK CONNECTIVITY AND POSSIBLY THE PUBLIC TELECOMMUNICATION SYSTEM
TO SECURELY SHARE PART OF AN ORGANISATION’S INFORMATION OR OPERATION WITH ITS
EMPLOYEES. INTRANET GENERALLY MAKE COMPANY INFORMATION ACCESSIBLE TO EMPLOYEES
AND FACILITATE WORKING IN GROUPS. SIMPLE INTRANET APPLICATIONS INCLUDE ELECTRONIC
PUBLISHING OF ORGANISATIONAL MATERIALS SUCH AS TELEPHONE DIRECTORIES, EVENT
CALENDARS AND JOB POSTINGS
INTRA BERMAKSUD “ANTARA” ADALAH RANGKAIAN DALAMAN YANG MENGGUNAKAN TEKNOLOGI
INTERNET DAN ADALAH VERSI KECIL DAAM INTERNET YANG WUJUD DALAM ORGANISASI. IA
MERUPAKAN RANGKAIAN PC PERIBADI YANG MENGGUNAKAN PROTOKOL INTERNET , BERGUBUNG
SECARA RANGKAIAN DAN KEBERANGKALIAN SISTEM TELEKOMUNIKASI AWAM BAGI BERKONGSI
SECARA SELAMAT DALAM ORGANISASI ATAU MERUPAKAN OPERASI SESAMA PEKERJANYA
SECARA AM, MENJADIKAN ORGANISASI DAN PEKERJANYA DAPAT BEKERJA DALAM KUMPULAN
DENGAN MUDAH DAN CEPATCONTOH: CAPAIAN TLEFON, SENARAI KERJA, MAKLUMAT ORGANISASI
DAN SEBAGAINYA.
20. 3.1.1 Definition
3.1.10 Describe the types of network communications technology:
• Internet • Intranet • Extranet
EXTRANET
EXTRANET IS A PRIVATE NETWORK THAT USES INTERNET PROTOCOLS,
NETWORK CONNECTIVITY, AND POSSIBLY THE PUBLIC TELECOMMUNICATION
SYSTEM TO SECURELY SHARE PART OF A BUSINESS’S INFORMATION OR
OPERATIONS WITH SUPPLIERS, VENDORS, PARTNERS, CUSTOMERS OR
OTHER BUSINESSES.
MERUPAKAN RANGKAIAN PC PERIBADI YANG MENGGUNAKAN PROTOKOL
INTERNET , BERGABUNG SECARA RANGKAIAN DAN KEBERANGKALIAN
SISTEM TELEKOMUNIKASI AWAM BAGI BERKONGSI SECARA SELAMAT DALAM
ORGANISASI ATAU MERUPAKAN OPERASI SESAMA PEMBEKAL, VENDOR,
RAKAN KONGSI, PELANGGAN DAN PERNIAGAAN
• PACKAGE SHIPPING COMPANIES, FOR EXAMPLE, ALLOW CUSTOMERS TO
ACCESS THEIR NETWORK TO PRINT AIR BILLS, SCHEDULE PICKUPS, AND
EVEN TRACK SHIPPED PACKAGES AS THE PACKAGES TRAVEL TO THEIR
DESTINATIONS.
• CONTOH: MEMBENARKAN PELANGGAN MENGAKSES UNTUK MMBAYAR BIL,
MELIHAT JADUAL DAN LAIN-LAIN
23. 3.2.1 Devices
3.2.1.1 Identify the devices needed in computer
network communication :
• NETWORK INTERFACE CARD
• WIRELESS NETWORK INTERFACE CARD
• MODEM (INTERNAL AND EXTERNAL)
• HUB/SWITCH
• ROUTER
• WIRELESS ACCESS POINT
24. 3.2.1 Devices
3.2.1.2 State the functions of the
following:
NETWORK INTERFACE CARD (NIC)
• A NETWORK CARD, SOMETIMES PRONOUNCED AS NICK, IS AN
ADAPTER CARD OR PC CARD THAT ENABLES THE COMPUTER TO
ACCESS THE NETWORK.
• KAD RANGKAIAN YANG KADANGKALA DISEBUT SEBAGAI NICK
ADALAH KAD ADAPTER ATAU PC KAD YANG MEMBOLEHKAN
KOMPUTER MENCAPAI INTERNET DALAM RANGKAIAN
25. 3.2.1 Devices
3.2.1.2 State the functions of the following:
WIRELESS NETWORK INTERFACE CARD
WIRELESS NETWORK INTERFACE CARD IS A NETWORK
CARD THAT PROVIDES WIRELESS DATA TRANSMISSION.
ADALAH KAD RANGKAIAN YANG MEMBOLEHKAN
CAPAIAN INTERNET TANPA WAYAR
26. 3.2.1 Devices
3.2.1.2 State the functions of the following:
MODEM (INTERNAL AND EXTERNAL)
THERE ARE TWO TYPES OF MODEM, INTERNAL AND EXTERNAL
AN INTERNAL MODEM
AN EXTERNAL MODEM
ONLY WORKS IN STAND-ALONE
COMPUTERS. IT IS BUILT INTO THE PC.
IS SEPARATED FROM THE COMPUTER
AND IS ALSO MOBILE.
ADA 2 JENIS MODEM IAITU DALAMAN DAN LUARAN
MODEM DALAMAN
HANYA ADA PADA PC DESKTOP YANG MANA
TELAH SEDIA DIBUAT DALAM PC
MODEM LUARAN
MERUPAKAN MODEM MUDAH ALIH
27. 3.2.1 Devices
3.2.1.2 State the functions of the following:
HUB/SWITCH
• HUB OR SWITCH IS A COMMON CONNECTION POINT
FOR DEVICES IN A NETWORK. HUBS ARE COMMONLY
USED TO CONNECT SEGMENTS OF A LAN.
• HUB ATAU SWITCH ADALAH POINT RANGKAIAN YANG
BIASA BAGI PERANTI DALAM RANGKAIAN. HUB BIASA
DIGUNA DALAM SET RANGKAIAN BAGI LAN.
28. 3.2.1 Devices
3.2.1.2 State the functions of the following:
ROUTER
A ROUTER IS A COMMUNICATIONS DEVICE THAT CONNECTS
MULTIPLE COMPUTERS OR OTHER ROUTERS TOGETHER AND
TRANSMITS DATA TO THE CORRECT DESTINATION.
MERUPAKAN PERANTI TELEKOMUNIKASI YANG MENGHUBUNGKAN
PC DALAM JUMLAH BANYAK ATAU ANTARA ROUTERS BERSAMA
DAN MENGHANTAR DATA KE DESTINASI YANG BETUL
29. 3.2.1 Devices
3.2.1.2 State the functions of the following:
WIRELESS ACCESS POINT
•
•
•
•
A WIRELESS ACCESS POINT IS A CENTRAL COMMUNICATIONS
DEVICE THAT ALLOW COMPUTERS TO TRANSFER DATA. THIS
DEVICE CAN HELP INFORMATION TO BE
TRANSFERRED WIRELESSLY TO OTHER WIRELESS DEVICES OR
TO A WIRED NETWORK.
WIRELESS ACCESS POINT HAS HIGH QUALITY ANTENNAS FOR
OPTIMAL SIGNALS.
MERUPAKAN ALAT PENERIMAAN MENGGUNAKAN SIGNAL BAGI
TUJUAN PENGHANTARAN DAN PENERIMAAN DATA SECARA
TANPA WAYAR.
30. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
TWISTED-PAIR CABLE
THE TWISTED-PAIR CABLE IS GENERALLY A COMMON FORM OF
TRANSMISSION MEDIUM. IT CONSISTS OF TWO WIRES OR CONDUCTORS
TWISTED TOGETHER, EACH WITH ITS OWN PLASTIC INSULATION. THE
TWISTED
WIRES CANCEL OUT ELECTROMAGNETIC INTERFERENCE THAT CAN CAUSE
CROSSTALK . THE MOST COMMON CONNECTOR USED FOR TP CABLE IS RJ-45.
KABEL TWISTED PAIR MERUPAKAN KABEL ASAS YANG BIASA DIGUNAKAN
DALAM MEDIUM PENGHANTARAN.MENGANDUNGI 2 WAYAR ATAU KONDUKTOR
YANG DISIMPUL BERSAMA DAN STIAP SATUNYA DISALUTI PLASTIK LUARAN.
PENYAMBUNG YANG BIASA DIGUNA ADALAH RJ5
31. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
TYPES OF TWISTED PAIR CABLETHE
UNSHIELDED TWISTED-PAIR OR UTP IS THE MOST COMMON TWISTED-PAIR CABLE USED
IN COMMUNICATIONS. IT HAS FOUR PAIRS OF COLOUR-CODED TWISTED-PAIR CABLES
THAT ARE COVERED WITH A PLASTIC OUTER JACKET.
KABEL UTP MERUPAKAN KABEL YANG BIASA DIGUNAKAN DALAM KOMUNIKASI. IA ADA
4 PASANG KABEL YANG DISIMPUL.
THE SHIELDED TWISTED-PAIR OR STP IS ANOTHER FORM OF TWISTED-PAIR CABLE. ITS
FOUR PAIRS OF COLOUR-CODED WIRES ARE EACH WRAPPED IN METALLIC FOIL, AND
ALL FOUR ARE THEN COLLECTIVELY WRAPPED IN A LAYER OF METALLIC BRAID OR
FOIL. FINALLY, THIS LAYER IS WRAPPED WITH A PLASTIC OUTER JACKET.
KABEL STP MERUPAKAN SATU LAGI JENIS KABEL TWISTED PAIR. JUGA ADA 4 PASANG
KABEL YANG DISIMPUL BERSAMA DAN KESEMUANYA DISALUT SATU LAPISAN
METALLIC FOIL. METALLIC FOIL ITU PULA DISALUT JAKET LUARAN
32. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded
Twisted Pair (UTP), Shielded Twisted Pair (STP), Coaxial
and Fibre Optic Cable
COAXIAL CABLE
• THE COAXIAL CABLE, OFTEN REFERRED TO AS ‘COAX’, CONSISTS OF A
SINGLE COPPER WIRE SURROUNDED BY AT LEAST THREE LAYERS.THEY
ARE AN INSULATING MATERIAL, A WOVEN OR BRAIDED METAL AND A
PLASTIC OUTER COATING.
• BIASA DIPANGGIL SEBAGAI COAX. MENGANDUNGI SATU WAYAR TEMBAGA
DISALUT SEKURANG-KURANG 3 LAPISAN IAITU LAPISAN FABRIK BESI
TENUN DAN PLASTIK LUARAN
• THIS CABLE IS OFTEN USED AS CABLE TELEVISION (CATV) NETWORK
WIRING BECAUSE IT CAN BE CABLED OVER LONGER DISTANCES IN
COMPARISON TO THE TWISTED-PAIR CABLE.
• BIASANYA ADALAH KABEL TELEVISYEN SEBAB KETAHANAN DAN BOLEH
DIGUNA UNTUK JARAK YANG JAUH.
33. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
COAXIAL CABLE
CONNECTORS FOR THE COAXIAL CABLE
• THE CONNECTOR MOST COMMONLY USED IN CONNECTING A COAXIAL
CABLE TO A DEVICE IS THE BNC CONNECTOR. BNC IS SHORT FOR BRITISH
NAVAL CONNECTOR OR BAYONET-NEILL-CONCELMAN.
• PENGHUBUNG YANG BIASA DIGUNAKAN UNTUK COAXIAL KABEL KEPADA
PERANTI ADALAH PENYAMBUNG BNC (BRITISH NAVAL CONNECTOR)
• THERE ARE THREE POPULAR BNC CONNECTORS. THEY ARE:
- BNC CONNECTOR: USED TO CONNECT DEVICES SUCH AS THE TV SET
- BNC T CONNECTOR: USED IN ETHERNET NETWORKS
- BNC TERMINATOR: CONNECTED AT THE END OF A CABLE TO PREVENT
THE REFLECTION OF SIGNALS
• ADA 3 JENIS PENYAMBUNG BNC YANG POPULAR. IANYA ADALAH…
- PENYAMBUNG BNC – UNTUK TV
- PENYAMBUNG BNC T – RANGKAIAN ETHERNET
- PENYAMBUNG BNC TERMINATOR – DISAMBUNG PADA HUJUNG KABEL
UNTUK MENGELAKKAN REFLEKSI DARIPADA SIGNAL..
34. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
FIBRE OPTIC CABLE
• THE FIBRE OPTIC CABLE IS A NETWORKING MEDIUM THAT USES LIGHT FOR
DATA TRANSMISSION.
• THE INTENSITY OF LIGHT IS INCREASED AND DECREASED TO REPRESENT
BINARY ONE AND ZERO.
• ITS CORE CONSISTS OF DOZENS OR HUNDREDS OF THIN STRANDS OF
GLASS OR PLASTIC WHICH USES LIGHT TO TRANSMIT SIGNALS.
• EACH STRAND, CALLED AN OPTICAL FIBRE, IS AS THIN AS A HUMAN HAIR.
• ADALAH MEDIUM RANGKAIAN YANG MENGGUNAKAN
• CAHAYA UNTUK PENGHANTARAN DATA. KEUPAYAAN CAHAYA UNTUK
BERKURANG ATAU BERTAMBAH DITAKRIFKAN SEBAGAI 0 DAN 1 DALAM
KOD BINARI
35. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
FIBRE OPTIC CABLE - PARTS OF A FIBRE OPTIC CABLE
• INSIDE A FIBRE OPTIC CABLE, EACH OPTICAL FIBRE IS CLAD WITH AN INSULATING
GLASS AND A PROTECTIVE COATING. TYPICALLY, A FIBRE OPTIC CABLE HAS FIVE
PARTS. 5 BAHAGIAN KABEL FIBER OPTIK
1. THE CORE IS THE LIGHT TRANSMISSION ELEMENT. IT IS TYPICALLY MADE
OF GLASS OR PLASTIC.
TERAS- ADALAH ELEMEN PENGHANTARAN CAHAYA. BIASA DIPERBUAT DARIPADA
KACA ATAU PLASTIK
2. CLADDING SURROUNDS THE CORE.IT IS ALSO MADE OF GLASS OR PLASTIC BUT IS
LESS DENSE THAN THE CORE.
LAPISAN PELINDUNG TERAS – JUGA DIPERBUAT DARI KACA ATAU PLASTIK CUMA
LEBIH PADAT DARIPADA TERAS
3. BUFFER SURROUNDS CLADDING. IT IS USUALLY MADE OF PLASTIC AND HELPS
SHIELDS THE CORE AND CLADDING FROM BEING DAMAGED.
LAPISAN MENGELILINGI PELINDUNG TERAS – BIASANYA DIPERBUAT DARIPADA
PLASTIK DAN MEMBANTU MELINDUNGI TERAS DAN PELINDUNGNYA DRPD ROSAK
4. A STRENGTHENING MATERIAL SURROUNDS THE BUFFER TO PREVENT THE FIBRE
CABLE FROM BEING STRETCHED WHEN INSTALLERS PULL IT.
BAHAN TAHAN LASAK – MENGELILINGI LAPISAN PELINDUNG TERS BAGI
MENGELAKKAN KABEL DARIPADA CALAR DAN ROSAK
5. OUTER JACKET SURROUNDS THE CABLE TO PROTECT THE FIBRE AGAINST
ABRASION, SOLVENTS AND OTHER CONTAMINANTS.
JAKET LUARAN – BAHAGIAN LUAR YANG MEGHALANG KABEL DARIPADA ROSAK
36. 3.2.2 Medium
3.2.2.1 Identify various types of cables such as Unshielded Twisted Pair (UTP),
Shielded Twisted Pair (STP), Coaxial and Fibre Optic Cable
FIBRE OPTIC CABLE - CONNECTORS OF A FIBRE OPTIC CABLE
THE MOST COMMONLY USED FIBRE OPTIC CONNECTORS ARE SC, ST, FC AND MT-RJ.
ADA 4 JENIS PENYAMBUNG BAGI KABEL FIBER OPTIK.
1.SC A FIBRE OPTIC CABLE CONNECTOR THAT USES A PUSH-PULL LATCHING
MECHANISM SIMILAR TO COMMON AUDIO AND VIDEO CABLES.
KABEL YANG BIASA DIGUNA UNTUK PENYAMBUNG AUDIO DAN KABEL VIDEO
2.ST A FIBRE OPTIC CABLE CONNECTOR THAT USES A BAYONET PLUG & SOCKET.
KABEL PENYAMBUNG BAGI PLUG BAYONET DAN SOKET
3.FC A FIBRE OPTIC CABLE CONNECTOR THAT USES A THREADED PLUG & SOCKET.
KABEL PENYAMBUNG BAGI PLUG THREADED DAN SOKET
4.MT-RJ -MECHANICAL TRANSFER REGISTERED JACK (MT-RJ), A FIBRE OPTICS
CONNECTOR POPULAR FOR SMALL FORM FACTOR DEVICES DUE TO ITS
SMALL SIZE.
KABEL PENYAMBUNG YANG POPULAR UNTUK PERANTI-PERANTI KECIL.
ADA TERDAPAT DALAM PC. WAYAR SATA CONTOHNYA
37. 3.2.2 Medium
3.2.2.2 Identify various types of wireless transmission media such as
infrared, radio wave and microwave
RADIO WAVES
THERE IS NO CLEAR DIFFERENCE BETWEEN RADIO WAVES AND
MICROWAVES. ELECTROMAGNETIC WAVES RANGING IN FREQUENCIES
BETWEEN 3 KHZ AND 1 GHZ ARE NORMALLY CALLED RADIO WAVES.
WAVES RANGING IN FREQUENCIES BETWEEN 1 AND 300 GHZ ARE
NORMALLY CALLED MICROWAVES.
TIDAK BANYAK PRBEZAAN ANTARA GELOMBANG RADIO DAN
GELOMBANG MIKRO KECUALI DARI SEGI KEKUATAN FREKUENSI.
• GELOMBANG RADIO – FREKUENSI ANTARA 3 KHZ HINGGA 1 GHZ
• GELOMBANG MIKRO – FREKUENSI ANTARA 1 GHZ HINGGA 300 GHZ
38. 3.2.2 Medium
3.2.2.2 Identify various types of wireless transmission media such as
infrared, radio wave and microwave
MICROWAVES
ELECTRONIC WAVES WITH FREQUENCIES BETWEEN 1 GHZ TO
300GHZ ARE NORMALLY CALLED MICROWAVES.
UNLIKE RADIO WAVES, MICROWAVES ARE UNIDIRECTIONAL, IN
WHICH THE SENDING AND RECEIVING ANTENNAS NEED TO BE
ALIGNED.
TIDAK SEPERTI GELOMBANG RADIO, GELOMBANG MIKRO
BERGERAK SECARA BERTABURAN. IA MEMERLUKAN ANTENNA
UNTUK MENGHANTAR DAN MENERIMA.
39. 3.2.2 Medium
3.2.2.2 Identify various types of wireless transmission media such as
infrared, radio wave and microwave
INFRARED
• INFRARED IS USED IN DEVICES SUCH AS THE MOUSE, WIRELESS
KEYBOARD AND PRINTERS. SOME MANUFACTURERS PROVIDE A
SPECIAL PORT CALLED THE IRDA PORT THAT ALLOWS A WIRELESS
KEYBOARD TO COMMUNICATE WITH A PC. INFRARED SIGNALS HAVE
FREQUENCIES BETWEEN 300 GHZ TO 400 THZ. THEY ARE USED FOR
SHORT-RANGE COMMUNICATION.
• INFRA MERAH DIGUNAKAN OLEH PERANTI-PERANTI SEPERTI MOUSE
TANPA WAYAR, PAPAN KEKUNCI TANPA WAYAR, PENCETAK TANPA
WAYAR DAN SEBAGAINYA. SESETENGAH PENGELUAR
MEMBEKALKAN SATU PORT KHAS DIPANGGIL IrDA YANG
MEMBENARKAN PERANTI-PERANTI SEPERTI DI ATAS BERKOMUNIKASI
DENGAN PC. FREKUENSINYA PULA ANTARA 300GHZ HINGGA 400GHZ.
• BANYAK DIGUNAKAN BAGI JARAK-JARAK YANG SANGAT PENDEK.
41. 3.3.1 Server Software
3.3.1.1 Define Network Operating System
DEFINITION OF NETWORK OPERATING SYSTEMS
1. AN OPERATING SYSTEM IS THE PROGRAM THAT FIRST LOADS
WHEN A COMPUTER BOOTS AND MANAGES ANY OTHER
SOFTWARE OR HARDWARE ON THE COMPUTER.
SISTEM PENGOPERASIAN ADALAH PROGRAM YANG PERTAMA
DIBACA OLEH PC DAN IA MENGURUSKAN PERISIAN DAN
PERKAKASAN DLM PC
2. A NETWORK OPERATING SYSTEM OR KNOWN AS NOS, HAS
ADDITIONAL FUNCTIONALITY THAT ALLOWS IT TO CONNECT
COMPUTERS AND PERIPHERALS TO A NETWORK.
RANGKAIAN SISTEM PENGOPERASIAN DIKENALI SEBAGAI NOS. IA
MEMPUNYAI FUNGSI TAMBAHAN YANG MEMBENARKAN
KOMPUTER DAN PERANTI BERHUBUNG DALAM RANGKAIAN
42. 3.3.1 Server Software
3.3.1.1 Define Network Operating System
DEFINITION OF NETWORK OPERATING SYSTEMS
3. A NETWORK OPERATING SYSTEM IS MOST FREQUENTLY USED WITH
LOCAL AREA NETWORKS AND WIDE AREA NETWORKS, BUT COULD ALSO
HAVE APPLICATION TO LARGER NETWORK
SYSTEMS.RANGKAIAN SISTEM PENGOPERASIAN BIASA ADA DALAM LAN
DAN WAN. NAMUN TERDAPAT JUGA APLIKASI UNTUK SISTEM
RANGKAIAN YANG LEBIH BESAR
4. A NOS IS NOT THE SAME AS THE NETWORKING TOOLS PROVIDED BY
SOME EXISTING OPERATING SYSTEMS, WINDOWS XP FOR INSTANCE.
NOS TIDAK SAMA SEPERTI ALAT RANGKAIAN. CONTOH WINDOWS XP.
5. NOS IS AN OPERATING SYSTEM THAT HAS BEEN SPECIFICALLY WRITTEN
TO KEEP NETWORKS RUNNING AT OPTIMAL PERFORMANCE.
NOS ADALAH SISTEM PENGOPERASIAN YANG SECARA SPESIFIK
MEMBOLEHKAN RANGKAIAN BERJALAN DENGAN LANCAR.
43. 3.3.1 Server Software
3.3.1.2 Name various Network Operating System Software.
EXAMPLES OF NETWORK OPERATING SYSTEMS
SOME POPULAR NETWORK OPERATING SYSTEMS INCLUDE:
•
WINDOWS NT
•
WINDOWS 2000 SERVER
•
WINDOWS SERVER 2003
•
RED HAT LINUX
NOS-NOS YANG POPULAR
TERMASUKLAH
•
WINDOWS NT
•
WINDOWS 2000 SERVER
•
WINDOWS SERVER 2003
•
RED HAT LINUX
44. 3.3.2 Client Software
3.3.2.1 State the functions of various client software.(web browser, email client,
network utilities, network file manager)
FUNCTIONS OF WEB BROWSER
1. A WEB BROWSER IS A SOFTWARE APPLICATION THAT ENABLES A USER TO
DISPLAY AND INTERACT WITH HTML DOCUMENTS HOSTED BY WEB
SERVERS OR HELD IN A FILE SYSTEM. TEXT AND IMAGES ON A WEB PAGE
CAN CONTAIN HYPERLINKS TO OTHER WEB PAGES AT THE SAME OR TO
DIFFERENT WEBSITES.
CARIAN WEB ADALAH PERISIAN APLIKASI YANG MEMBENARKAN
PENGGUNA MEMAPAR DAN BERINTERAKSI DENGAN DOKUMEN HTML YANG
DATANG DARIPADA SERVER WEB. TEKS DAN IMEJ DALAM WEB BOLEH
MENGANDUNGI HIPER RANGKAI KEPADA LAMAN WEB LAIN ATAU SAMA
2. WEB BROWSER ALLOW A USER TO QUICKLY AND EASILY ACCESS
INFORMATION PROVIDED ON MANY WEB PAGES AT MANY WEBSITES BY
SURFING THESE LINKS.
CARIAN WEB MEMBENARKAN PENGGUNA DENGAN CEPAT DAN MUDAH
MENGAKSES MAKLUMAT YANG DIBEKALKAN OLEH BANYAK HALAMAN WEB
PADA BANYAK LAMAN WEB.
45. 3.3.2 Client Software
3.3.2.1 State the functions of various client software.(web browser, email client,
network utilities, network file manager)
FUNCTIONS OF WEB BROWSER
3. WEB BROWSERS AVAILABLE FOR PERSONAL COMPUTER INCLUDE
MICROSOFT INTERNET EXPLORER, SAFARI, NETSCAPE AND OPERA.WEB
BROWSERS ARE THE MOST COMMONLY USED TYPE OF HYPERTEXT
TRANSFER PROTOCOL (HTTP) USER AGENT.
CARIAN WEB BOLEH DIDAPATI PADA PC TERMASUKLAH PADA MICROSOFT
INTERNET EXPLORER, SAFARI, NETSCAPE AND OPERA.
4. ALTHOUGH BROWSERS ARE TYPICALLY USED TO ACCESS THE WORLD
WIDE WEB, THEY CAN ALSO BE USED TO ACCESS INFORMATION PROVIDED
BY WEB SERVERS IN PRIVATE NETWORKS OR CONTENT IN FILE SYSTEMS.
WALAUPUN CARIAN BIASA DIGUNA UNTUK MENGAKSES PADA DUNIA WEB,
PENGGUNA JUGA BOLEH MENGAKSES MAKLUMAT YANG DIBEKALKAN
OLEH SERVER WEB PERIBADI ATAU KANDUNGAN SISTEM FAIL
46. 3.3.2 Client Software
3.3.2.1 State the functions of various client software.(web browser, email client,
network utilities, network file manager)
FUNCTIONS OF WEB BROWSER
3. WEB BROWSERS AVAILABLE FOR PERSONAL COMPUTER INCLUDE
MICROSOFT INTERNET EXPLORER, SAFARI, NETSCAPE AND OPERA.WEB
BROWSERS ARE THE MOST COMMONLY USED TYPE OF HYPERTEXT
TRANSFER PROTOCOL (HTTP) USER AGENT.
CARIAN WEB BOLEH DIDAPATI PADA PC TERMASUKLAH PADA MICROSOFT
INTERNET EXPLORER, SAFARI, NETSCAPE AND OPERA.
4. ALTHOUGH BROWSERS ARE TYPICALLY USED TO ACCESS THE WORLD
WIDE WEB, THEY CAN ALSO BE USED TO ACCESS INFORMATION PROVIDED
BY WEB SERVERS IN PRIVATE NETWORKS OR CONTENT IN FILE SYSTEMS.
WALAUPUN CARIAN BIASA DIGUNA UNTUK MENGAKSES PADA DUNIA WEB,
PENGGUNA JUGA BOLEH MENGAKSES MAKLUMAT YANG DIBEKALKAN
OLEH SERVER WEB PERIBADI ATAU KANDUNGAN SISTEM FAIL
47. 3.3.2 Client Software
3.3.2.1 State the functions of various client software.(web browser, email
client, network utilities, network file manager)
FUNCTIONS OF EMAIL CLIENT
• AN EMAIL CLIENT IS A COMPUTER PROGRAM THAT IS USED TO
READ AND SEND EMAIL.
• EMAIL CLIENT ADALAH PROGRAM KOMPUTER YANG DIGUNAKAN
UNTUK MEMBACA DAN MENGHANTAR EMAIL.
FUNCTIONS OF FILE TRANSFER PROTOCOL (FTP)
• FILE TRANSFER PROTOCOL (FTP) IS USED TO CONNECT TWO
COMPUTERS OVER THE INTERNET SO THAT THE USER OF ONE
COMPUTER CAN TRANSFER FILES AND PERFORM FILE COMMANDS
ON THE OTHER COMPUTER.
• PROTOKOL PENGHANTARAN FAIL DIGUNAKAN UNTUK
MENGHUBUNGKAN 2 PC MELALUI INTERNET SUPAYA PENGGUNA
SALAH SATU PC BOLEH MENGHANTAR FAIL DAN MELAKUKAN
OPERASI ARAHAN FAIL PADA PC YANG SATU LAGI.
48. 3.4 & 3.5
3.4 SETTING NETWORK FACILITIES
• ASSESSMENT S06.1 AND S06.2
3.5 CURRENT AND FUTURE
DEVELOPMENT
• ASSESSMENT S07.1