SlideShare a Scribd company logo
Network
Technologies
Networks
Wide Area Network
• A wide area network (WAN) is a large network of computers that
covers a wide area such as a city, province, country or even the
world.
• Communication methods include cables, microwaves, radio waves
and satellites.
• A WAN connects two or more LANs.
• A typical use of WANs in business is where different branches of a
business are connected to share resources. This can be done
through satellites or telecommunication networks.
EQUIPMENT NEEDED TO CONNECT TO A
NETWORK
• 1. A network adapter: This is a piece of hardware that can be added to a computer and
makes it possible to connect to a network. These days, most computers and laptops
have a network adapter built into their motherboards.
• 2. Network cables: These cables are used to connect a computer to a LAN, or to
connect one network to another network. If you are connecting directly to the internet,
you may require a specific cable for the type of internet connection you are using, for
example, a DSL-enabled phone cable, or a fibre-optic cable.
• 3. Hubs, switches or routers: These are devices that allow multiple computers to
connect to the same network. They can also be used to connect two networks.
INTERNET AS AN EXAMPLE OF A WAN
• The internet is a computer network that consists of billions of
connected devices, allowing people to share information,
obtain entertainment, or chat with one another.
• The internet is a global network of networks. It is made up of
many different networks, in different countries around the
world that are all connected together into one huge WAN.
PROTOCOL
• A protocol is a set of rules for the transmission of data between
devices. Let’s take a look at some of the following common
protocols:
• File transfer protocol (FTP): Used to transfer and manipulate files on the
internet
• Hyper-text transfer protocol (HTTP): An Internet-based protocol for sending
and receiving web pages
• HTTP secure (HTTPS): Secure HTTP protocol; used mainly for e-
commerce
PROTOCOL
• Internet message access protocol (IMAP): Used for email messages on the internet
• Post office protocol version 3 (POP3): Used by email clients to retrieve messages from
remote servers
• Simple mail transfer protocol (SMTP): Used for email messages on the internet
• Email client protocol: is a standard method of exchanging information between email
clients like Thunderbird or Apple Mail and email provider’s servers like Gmail, Outlook,
Yahoo, and vice versa
• Voice over Internet protocol (VoIP): Used to transmit voice data (phone calls) over the
internet.
Internet services
INSTANT MESSAGING
• Instant messaging (IM) is a term used to describe online chat
programs that allow the user to send real-time messages
over the internet.
• This includes text messages, as well as multimedia
messages, such as pictures, voice notes and videos.
• Allows users cheaper communication and multiple users at a
time
ADVANTAGES
• Allows you to chat in “real-time” with other people who also have
an IM client
• Messages are delivered immediately after being sent if the person
is online or is connected to the internet
• One can see when your message has been read
• It connects people regardless of where they are located
• People can speak to multiple people in virtual conferences/groups,
share ideas and reach conclusions.
DISADVANTAGES
• Because it is immediate, you have no time to reflect on the
message you are sending, unlike an email where you can
review the draft before sending it
• Messages are not always saved
• Instant messaging takes away the face-to-face, personal
experience that people have when they are speaking to
someone in person.
EXAMPLES OF INSTANT MESSAGING
• Let’s take a look at some examples of the most popular
instant messaging services:
• WhatsApp: This is a popular instant messaging service that is
used on smartphones and computers
• Facebook Messenger: This service is built into Facebook
• iMessage: This is Apple’s built-in instant messaging service
VOICE OVER INTERNET PROTOCOL (VOIP)
• Internet companies have invented technologies that allow the
user to make voice calls over the Internet.
• VoIP converts sound into data.
• The data is then transmitted over the internet to the recipient,
where it is converted back to sound.
VOICE OVER INTERNET PROTOCOL (VOIP)
EXAMPLES OF VOIP
• Google Hangouts: This is a standard VoIP service provided by Google, which
has recently been built into Android cellular devices.
• WhatsApp: This instant messaging application allows the user to make both
standard and video calls over the internet.
• Discord: This application has become very popular for gamers, allowing them
to talk to each other over the internet.
• TeamSpeak: Like Discord, TeamSpeak is used mostly by gamers to talk to
each other over the internet.
• Skype is an example of a voice over Internet Protocol (VoIP) software
application used for voice, video and instant messaging communications.
CLOUD AND GRID COMPUTING
• Cloud computing lets you make use of storage and application
facilities that are not necessarily hosted on your computer.
• Data and applications can be accessed from any computer
connected to the Internet.
• Grid computing refers to the use of multiple computer systems as
one.
• Grid computing allows processes to happen over multiple systems
that will not be able to happen on one computer system, saving
money.
ADVANTAGES OF GRID COMPUTING
• It can help you solve larger, much more complex problems in
a much shorter time span
• You do not have to buy more powerful hardware as you will
make better use of existing hardware
• If one computer fails, the other computers will take over the
work, which makes the system very reliable
DISADVANTAGES OF GRID COMPUTING
• Training is needed to make full use of grid computing
• May require multiple people in order for the grid system to
function
ADVANTAGES OF CLOUD COMPUTING
• Since the cloud platform is managed and updated, it is much
more reliable
• It can be used from any device capable of connecting to the
internet
DISADVANTAGES OF CLOUD COMPUTING
• You may experience downtime if the cloud server is
undergoing maintenance.
• Even though cloud computing uses security measures to
protect your data, there is always a risk of files being
compromised
• You do not have full control over the platform as it is owned
and managed by the service provider
EXAMPLES OF CLOUD AND GRID
COMPUTING
• World Community Grid: World Community Grid’s mission is to create the largest public
computing grid benefiting humanity, which is funded and operated by IBM. Using the
idle time of computers around the world, World Community Grid’s research projects
have analysed aspects of the human genome, HIV, dengue, muscular dystrophy, and
cancer.
• Scientific research, helping scientists around the world to analyse and store massive
amounts of data.
• SKA (Square Kilometre Array): The SKA is a worldwide network of radio telescopes
that will consist of over one million square metres of collecting area. This will generate
an enormous amount of data that will be processed by an enormous computing grid
consisting of more than half a million computing cores (processors) distributed around
the globe and linked by a powerful network.
FILE SHARING
• Data is stored on servers around the world using the Internet
to transfer files.
• Examples include Dropbox and SkyDrive.
ADVANTAGES AND DISADVANTAGES
EXAMPLES OF CLOUD-BASED FILE SHARING
Internet connections and
access
MODEMS AND ROUTERS
• A modem is a device that connects a computer to the Internet
via a telephone line.
• A router is a device that connects two networks.
• An ADSL modem router is a device where both devices are
combined in one.
BROADBAND AND BANDWIDTH
• Bandwidth: the amount of data that can travel from one point to another
over a specific connection.
• The higher the bandwidth the more data can be transferred in less time.
• Broadband: describes a high-speed (high bandwidth) connection to the
Internet.
• It is important to note that not all broadband connections are available in
all areas.
• ADSL and 3G are examples of broadband connections.
BROADBAND AND BANDWIDTH
• When choosing an internet connection one needs to look at the
following:
• Speed of the internet connection
• Type of connection one can afford
• Downloading refers to the transfer of data from the internet to your
computer. This includes downloading files, for example, videos,
and browsing the internet.
• Uploading: refers to the transfer of data from a computer to the
internet, for example, uploading a video to YouTube.
DATA CAPS AND BUNDLES
• A cap is a limit placed on the amount of uploads and
downloads a user may make on an Internet connection.
• A service provider-imposed limit on the amount of data
transferred by a user account at a specified level of through
put over a given period, for a specified fee.
• The term applies to both home Internet service and mobile
data plans.
DATA CAPS AND BUNDLES
• Data caps are usually imposed as a maximum allowed
amount of data in a month for an agreed-upon charge.
• As a rule, users are charged at a higher rate for further data
use when they exceed that limit.
• An ISP might impose a data cap when a customer shares
access with many users, employs file-sharing software or
otherwise breaks terms of use.
TYPES OF DATA CAPS
Shaped and unshaped accounts
• Shaping allows for certain Internet functions such as
browsing and e-mail to be given priority and activities such as
streaming are limited.
• All downloads on an unshaped account get equal priority
Security issues
MALWARE AND SPYWARE
• Malware is the term we use for harmful software such as
viruses, Trojans and worms that perform unwanted actions on
a computer, or generally disrupt the way a computer normally
works.
• Spyware is a type of malware that secretly collects
information such as your browsing history or even redirects
websites and slows down the Internet connection
ADWARE AND POP-UPS
• Adware is any application that displays online advertisements
on web pages, e-mail or other Internet services.
• Adverts can be in the form of banners or pop-ups.
• A pop-up is an advertisement that opens in a new window,
usually displayed on a web page in the user’s web browser.
KEYLOGGING
• Keyloggers are examples of spyware that records key
combinations such as usernames, passwords and pin codes.
SECURITY SAFETY MEASURES

More Related Content

Similar to Networks - Computer Applications Technology.pptx

Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
Rbalasubramani
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
lisbala
 
Computer networks
Computer networksComputer networks
Computer networks
Keerty Smile
 
Term 2 CAT work.pptx
Term 2 CAT work.pptxTerm 2 CAT work.pptx
Term 2 CAT work.pptx
Sbonelo Biyela
 
Term 2 CAT work.pptx
Term 2 CAT work.pptxTerm 2 CAT work.pptx
Term 2 CAT work.pptx
Sbonelo Biyela
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internet
Maxwell Musonda
 
TYPES OF NETWORKS BY ANAM YOUNAS
TYPES OF NETWORKS BY ANAM YOUNASTYPES OF NETWORKS BY ANAM YOUNAS
TYPES OF NETWORKS BY ANAM YOUNAS
AnamYounas1
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
himz676987
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
Sagar Mehta
 
Network Technologies for Grade 12 .pptx
Network Technologies for Grade 12  .pptxNetwork Technologies for Grade 12  .pptx
Network Technologies for Grade 12 .pptx
gumedesinenhlanhla11
 
Computer networks
Computer networksComputer networks
Computer networks
samina khan
 
Networking
Networking Networking
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
TheMaverick5
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
Abhishek Kesharwani
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
ssusercd3ff8
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
RitikaSharma10949
 
Wide Area Network and Internet services (CAT GRADE 12)
Wide Area Network and Internet services (CAT GRADE 12)Wide Area Network and Internet services (CAT GRADE 12)
Wide Area Network and Internet services (CAT GRADE 12)
cq88wxwjmd
 
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With TechnologyKPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
alatifgapor
 
Planning for the Mobile Enterprise
Planning for the Mobile EnterprisePlanning for the Mobile Enterprise
Planning for the Mobile Enterprise
Anurag Bhusal
 
Introduction to the Internet and Web
Introduction to the Internet and WebIntroduction to the Internet and Web
Introduction to the Internet and Web
Dinoo Gunasekera
 

Similar to Networks - Computer Applications Technology.pptx (20)

Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Term 2 CAT work.pptx
Term 2 CAT work.pptxTerm 2 CAT work.pptx
Term 2 CAT work.pptx
 
Term 2 CAT work.pptx
Term 2 CAT work.pptxTerm 2 CAT work.pptx
Term 2 CAT work.pptx
 
Lec ture 9 using the internet
Lec ture 9   using the internetLec ture 9   using the internet
Lec ture 9 using the internet
 
TYPES OF NETWORKS BY ANAM YOUNAS
TYPES OF NETWORKS BY ANAM YOUNASTYPES OF NETWORKS BY ANAM YOUNAS
TYPES OF NETWORKS BY ANAM YOUNAS
 
Computer communication network
Computer communication networkComputer communication network
Computer communication network
 
Distributed Systems - Information Technology
Distributed Systems - Information TechnologyDistributed Systems - Information Technology
Distributed Systems - Information Technology
 
Network Technologies for Grade 12 .pptx
Network Technologies for Grade 12  .pptxNetwork Technologies for Grade 12  .pptx
Network Technologies for Grade 12 .pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Networking
Networking Networking
Networking
 
Networking.pptx
Networking.pptxNetworking.pptx
Networking.pptx
 
Unit 1 web technology uptu slide
Unit 1 web technology uptu slideUnit 1 web technology uptu slide
Unit 1 web technology uptu slide
 
lecture-1.1.pptx
lecture-1.1.pptxlecture-1.1.pptx
lecture-1.1.pptx
 
it ppt-2.pptx
it ppt-2.pptxit ppt-2.pptx
it ppt-2.pptx
 
Wide Area Network and Internet services (CAT GRADE 12)
Wide Area Network and Internet services (CAT GRADE 12)Wide Area Network and Internet services (CAT GRADE 12)
Wide Area Network and Internet services (CAT GRADE 12)
 
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With TechnologyKPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
KPT6044, KPT4033, Networks and Internet, Teaching and Learning With Technology
 
Planning for the Mobile Enterprise
Planning for the Mobile EnterprisePlanning for the Mobile Enterprise
Planning for the Mobile Enterprise
 
Introduction to the Internet and Web
Introduction to the Internet and WebIntroduction to the Internet and Web
Introduction to the Internet and Web
 

Recently uploaded

BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
sonukumargpnirsadhan
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Henry Hollis
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 

Recently uploaded (20)

BPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end examBPSC-105 important questions for june term end exam
BPSC-105 important questions for june term end exam
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.pptLevel 3 NCEA - NZ: A  Nation In the Making 1872 - 1900 SML.ppt
Level 3 NCEA - NZ: A Nation In the Making 1872 - 1900 SML.ppt
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 

Networks - Computer Applications Technology.pptx

  • 2. Wide Area Network • A wide area network (WAN) is a large network of computers that covers a wide area such as a city, province, country or even the world. • Communication methods include cables, microwaves, radio waves and satellites. • A WAN connects two or more LANs. • A typical use of WANs in business is where different branches of a business are connected to share resources. This can be done through satellites or telecommunication networks.
  • 3. EQUIPMENT NEEDED TO CONNECT TO A NETWORK • 1. A network adapter: This is a piece of hardware that can be added to a computer and makes it possible to connect to a network. These days, most computers and laptops have a network adapter built into their motherboards. • 2. Network cables: These cables are used to connect a computer to a LAN, or to connect one network to another network. If you are connecting directly to the internet, you may require a specific cable for the type of internet connection you are using, for example, a DSL-enabled phone cable, or a fibre-optic cable. • 3. Hubs, switches or routers: These are devices that allow multiple computers to connect to the same network. They can also be used to connect two networks.
  • 4. INTERNET AS AN EXAMPLE OF A WAN • The internet is a computer network that consists of billions of connected devices, allowing people to share information, obtain entertainment, or chat with one another. • The internet is a global network of networks. It is made up of many different networks, in different countries around the world that are all connected together into one huge WAN.
  • 5. PROTOCOL • A protocol is a set of rules for the transmission of data between devices. Let’s take a look at some of the following common protocols: • File transfer protocol (FTP): Used to transfer and manipulate files on the internet • Hyper-text transfer protocol (HTTP): An Internet-based protocol for sending and receiving web pages • HTTP secure (HTTPS): Secure HTTP protocol; used mainly for e- commerce
  • 6. PROTOCOL • Internet message access protocol (IMAP): Used for email messages on the internet • Post office protocol version 3 (POP3): Used by email clients to retrieve messages from remote servers • Simple mail transfer protocol (SMTP): Used for email messages on the internet • Email client protocol: is a standard method of exchanging information between email clients like Thunderbird or Apple Mail and email provider’s servers like Gmail, Outlook, Yahoo, and vice versa • Voice over Internet protocol (VoIP): Used to transmit voice data (phone calls) over the internet.
  • 8. INSTANT MESSAGING • Instant messaging (IM) is a term used to describe online chat programs that allow the user to send real-time messages over the internet. • This includes text messages, as well as multimedia messages, such as pictures, voice notes and videos. • Allows users cheaper communication and multiple users at a time
  • 9. ADVANTAGES • Allows you to chat in “real-time” with other people who also have an IM client • Messages are delivered immediately after being sent if the person is online or is connected to the internet • One can see when your message has been read • It connects people regardless of where they are located • People can speak to multiple people in virtual conferences/groups, share ideas and reach conclusions.
  • 10. DISADVANTAGES • Because it is immediate, you have no time to reflect on the message you are sending, unlike an email where you can review the draft before sending it • Messages are not always saved • Instant messaging takes away the face-to-face, personal experience that people have when they are speaking to someone in person.
  • 11. EXAMPLES OF INSTANT MESSAGING • Let’s take a look at some examples of the most popular instant messaging services: • WhatsApp: This is a popular instant messaging service that is used on smartphones and computers • Facebook Messenger: This service is built into Facebook • iMessage: This is Apple’s built-in instant messaging service
  • 12. VOICE OVER INTERNET PROTOCOL (VOIP) • Internet companies have invented technologies that allow the user to make voice calls over the Internet. • VoIP converts sound into data. • The data is then transmitted over the internet to the recipient, where it is converted back to sound.
  • 13. VOICE OVER INTERNET PROTOCOL (VOIP)
  • 14. EXAMPLES OF VOIP • Google Hangouts: This is a standard VoIP service provided by Google, which has recently been built into Android cellular devices. • WhatsApp: This instant messaging application allows the user to make both standard and video calls over the internet. • Discord: This application has become very popular for gamers, allowing them to talk to each other over the internet. • TeamSpeak: Like Discord, TeamSpeak is used mostly by gamers to talk to each other over the internet. • Skype is an example of a voice over Internet Protocol (VoIP) software application used for voice, video and instant messaging communications.
  • 15. CLOUD AND GRID COMPUTING • Cloud computing lets you make use of storage and application facilities that are not necessarily hosted on your computer. • Data and applications can be accessed from any computer connected to the Internet. • Grid computing refers to the use of multiple computer systems as one. • Grid computing allows processes to happen over multiple systems that will not be able to happen on one computer system, saving money.
  • 16. ADVANTAGES OF GRID COMPUTING • It can help you solve larger, much more complex problems in a much shorter time span • You do not have to buy more powerful hardware as you will make better use of existing hardware • If one computer fails, the other computers will take over the work, which makes the system very reliable
  • 17. DISADVANTAGES OF GRID COMPUTING • Training is needed to make full use of grid computing • May require multiple people in order for the grid system to function
  • 18. ADVANTAGES OF CLOUD COMPUTING • Since the cloud platform is managed and updated, it is much more reliable • It can be used from any device capable of connecting to the internet
  • 19. DISADVANTAGES OF CLOUD COMPUTING • You may experience downtime if the cloud server is undergoing maintenance. • Even though cloud computing uses security measures to protect your data, there is always a risk of files being compromised • You do not have full control over the platform as it is owned and managed by the service provider
  • 20. EXAMPLES OF CLOUD AND GRID COMPUTING • World Community Grid: World Community Grid’s mission is to create the largest public computing grid benefiting humanity, which is funded and operated by IBM. Using the idle time of computers around the world, World Community Grid’s research projects have analysed aspects of the human genome, HIV, dengue, muscular dystrophy, and cancer. • Scientific research, helping scientists around the world to analyse and store massive amounts of data. • SKA (Square Kilometre Array): The SKA is a worldwide network of radio telescopes that will consist of over one million square metres of collecting area. This will generate an enormous amount of data that will be processed by an enormous computing grid consisting of more than half a million computing cores (processors) distributed around the globe and linked by a powerful network.
  • 21. FILE SHARING • Data is stored on servers around the world using the Internet to transfer files. • Examples include Dropbox and SkyDrive.
  • 23. EXAMPLES OF CLOUD-BASED FILE SHARING
  • 25. MODEMS AND ROUTERS • A modem is a device that connects a computer to the Internet via a telephone line. • A router is a device that connects two networks. • An ADSL modem router is a device where both devices are combined in one.
  • 26. BROADBAND AND BANDWIDTH • Bandwidth: the amount of data that can travel from one point to another over a specific connection. • The higher the bandwidth the more data can be transferred in less time. • Broadband: describes a high-speed (high bandwidth) connection to the Internet. • It is important to note that not all broadband connections are available in all areas. • ADSL and 3G are examples of broadband connections.
  • 27. BROADBAND AND BANDWIDTH • When choosing an internet connection one needs to look at the following: • Speed of the internet connection • Type of connection one can afford • Downloading refers to the transfer of data from the internet to your computer. This includes downloading files, for example, videos, and browsing the internet. • Uploading: refers to the transfer of data from a computer to the internet, for example, uploading a video to YouTube.
  • 28. DATA CAPS AND BUNDLES • A cap is a limit placed on the amount of uploads and downloads a user may make on an Internet connection. • A service provider-imposed limit on the amount of data transferred by a user account at a specified level of through put over a given period, for a specified fee. • The term applies to both home Internet service and mobile data plans.
  • 29. DATA CAPS AND BUNDLES • Data caps are usually imposed as a maximum allowed amount of data in a month for an agreed-upon charge. • As a rule, users are charged at a higher rate for further data use when they exceed that limit. • An ISP might impose a data cap when a customer shares access with many users, employs file-sharing software or otherwise breaks terms of use.
  • 31. Shaped and unshaped accounts • Shaping allows for certain Internet functions such as browsing and e-mail to be given priority and activities such as streaming are limited. • All downloads on an unshaped account get equal priority
  • 33. MALWARE AND SPYWARE • Malware is the term we use for harmful software such as viruses, Trojans and worms that perform unwanted actions on a computer, or generally disrupt the way a computer normally works. • Spyware is a type of malware that secretly collects information such as your browsing history or even redirects websites and slows down the Internet connection
  • 34. ADWARE AND POP-UPS • Adware is any application that displays online advertisements on web pages, e-mail or other Internet services. • Adverts can be in the form of banners or pop-ups. • A pop-up is an advertisement that opens in a new window, usually displayed on a web page in the user’s web browser.
  • 35. KEYLOGGING • Keyloggers are examples of spyware that records key combinations such as usernames, passwords and pin codes.