This lecture describes wireless communication networks, including their advantages and disadvantages, standards and operation, and setup. Wireless devices communicate using radio frequencies without cabling. A typical home wireless setup involves computers with wireless network interface cards, a wireless router to broadcast the network signal, and configuring wireless security like WPA2. The lecture also outlines the major components of network hardware, including networked devices, network interface cards, switches, routers, servers, and devices to protect networks from power issues.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
This document discusses network media for wired and wireless networking. It describes the primary types of wired network media, including copper-based twisted-pair cable and fiber-optic cables. Characteristics like bandwidth, maximum segment length, interference susceptibility, cable grade, and cost are important criteria for choosing network media. The document focuses on unshielded twisted-pair cable, describing cable categories and components of a structured UTP cable plant.
This document provides an overview of network topologies and technologies. It describes common physical topologies including bus, star, ring, and point-to-point. Logical topologies determine how data travels between devices and can mimic the physical topology or operate differently using switches. Popular network technologies are also examined, particularly Ethernet, wireless LANs, and Token Ring. Ethernet remains the most widely used LAN technology and comes in various speeds and media types.
This chapter discusses networking concepts including:
1) Different types of physical network architectures like Ethernet, wireless networks, telephone networks, and older token ring and FDDI networks.
2) How Windows supports network connections using protocols like TCP/IP, IPX/SPX, NetBEUI, and AppleTalk.
3) How to install a network card, connect to a network, and set up networking in Windows. This includes configuring settings like the computer name, IP address, and network protocols.
4) How to set up and secure a wireless network, including choosing security methods like disabling SSID broadcasting, using data encryption, and setting a firewall.
This chapter discusses network hardware in depth, including switches, routers, wireless access points, and network interface cards. It describes the operation and advanced features of switches, such as creating the switching table, frame forwarding methods, and features like VLANs and port security. For routers, it explains routing tables, routing protocols, and access control lists. It also covers wireless security options, advanced wireless settings, and bus and feature options for network interface cards.
This document provides an introduction to networking, including definitions of basic networking concepts and components. It defines what a computer network is and discusses reasons for networking. It also describes different types of networks including LANs and WANs, transmission media like twisted pair, coaxial, and fiber optic cables. Additionally, it covers topics like network topologies, peer-to-peer vs. client-server networks, and network devices.
The document provides an introduction to networking concepts including:
- A network consists of two or more connected computers that can communicate and share resources.
- Networks allow for sharing information, hardware, software and centralized administration across connected computers.
- Networks can be classified based on transmission media, size, management methods and topology. Common guided transmission media include twisted-pair cables, coaxial cables and fiber-optic cables.
- Local area networks (LANs) connect computers within a short distance while wide area networks (WANs) connect LANs over longer distances using technologies like broadband, frame relay and ATM.
This document discusses various tools and techniques for testing and troubleshooting networks. It describes loopback tests, network monitors, LAN testers, cable testers, protocol analyzers, and troubleshooting models for isolating network issues. Common commands like ipconfig, netstat, nbtstat and route are also summarized for examining TCP/IP settings and troubleshooting connectivity problems.
This document discusses network media for wired and wireless networking. It describes the primary types of wired network media, including copper-based twisted-pair cable and fiber-optic cables. Characteristics like bandwidth, maximum segment length, interference susceptibility, cable grade, and cost are important criteria for choosing network media. The document focuses on unshielded twisted-pair cable, describing cable categories and components of a structured UTP cable plant.
This document provides an overview of network topologies and technologies. It describes common physical topologies including bus, star, ring, and point-to-point. Logical topologies determine how data travels between devices and can mimic the physical topology or operate differently using switches. Popular network technologies are also examined, particularly Ethernet, wireless LANs, and Token Ring. Ethernet remains the most widely used LAN technology and comes in various speeds and media types.
This chapter discusses networking concepts including:
1) Different types of physical network architectures like Ethernet, wireless networks, telephone networks, and older token ring and FDDI networks.
2) How Windows supports network connections using protocols like TCP/IP, IPX/SPX, NetBEUI, and AppleTalk.
3) How to install a network card, connect to a network, and set up networking in Windows. This includes configuring settings like the computer name, IP address, and network protocols.
4) How to set up and secure a wireless network, including choosing security methods like disabling SSID broadcasting, using data encryption, and setting a firewall.
This chapter discusses network hardware in depth, including switches, routers, wireless access points, and network interface cards. It describes the operation and advanced features of switches, such as creating the switching table, frame forwarding methods, and features like VLANs and port security. For routers, it explains routing tables, routing protocols, and access control lists. It also covers wireless security options, advanced wireless settings, and bus and feature options for network interface cards.
This document provides an introduction to networking, including definitions of basic networking concepts and components. It defines what a computer network is and discusses reasons for networking. It also describes different types of networks including LANs and WANs, transmission media like twisted pair, coaxial, and fiber optic cables. Additionally, it covers topics like network topologies, peer-to-peer vs. client-server networks, and network devices.
The document provides an introduction to networking concepts including:
- A network consists of two or more connected computers that can communicate and share resources.
- Networks allow for sharing information, hardware, software and centralized administration across connected computers.
- Networks can be classified based on transmission media, size, management methods and topology. Common guided transmission media include twisted-pair cables, coaxial cables and fiber-optic cables.
- Local area networks (LANs) connect computers within a short distance while wide area networks (WANs) connect LANs over longer distances using technologies like broadband, frame relay and ATM.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
The chapter discusses different components and architectures for backbone networks. It describes switches, routers, and gateways that can be used in backbone networks. It outlines common backbone architectures including switched, routed, and virtual LAN (VLAN) backbones. Switched backbones are most popular and use switches to interconnect local area networks (LANs) instead of routers. VLANs assign computers to network segments through software rather than hardware. The chapter provides examples of how different backbone designs are implemented in organizations and their advantages.
This document provides an introduction to computer networks. It discusses e-commerce and electronic commerce, hardware components like NICs, servers, clients, transmission mediums, routers, bridges, hubs, switches, gateways, and repeaters. It also discusses network operating systems, protocols, cables, and connectors like twisted pair cables, coaxial cables, and fiber optic cables. The document is submitted by Shohana akter kakon for their computer networks course.
This document provides an introduction to computer networking concepts. It begins with defining a computer network as consisting of two or more connected computers that can communicate and share resources. The main advantages of networking are sharing information, software/hardware, and centralized administration. There are two main types of networks: peer-to-peer and client-server. Local, metropolitan, and wide area networks are also introduced based on geographical range. Common network topologies like bus, ring, and star are described along with their advantages and disadvantages. Standards organizations that set networking standards are listed. Finally, the basic components and devices used for data communication are outlined.
This document provides an agenda and information for a Tech 2Tech event at Durham discussing Jisc's new Janet access infrastructure. The agenda includes welcome remarks, presentations on the current and new Janet architectures, member experiences, and future Janet services. It is aimed at providing information on the network access program, opportunities to ask questions, and discussing challenges of the future. Working with partner Ciena, the new infrastructure aims to standardize equipment, management, and reduce costs while improving reliability and provisioning speeds. The regions of South, South West, East Midlands, West Midlands and London have started transitioning to the new infrastructure as existing regional contracts expire over the next 3-4 years.
The document provides information on DCS networks from ABB and Siemens. The ABB network uses Ethernet cables for the operation network and a high-speed serial network for communications. It discusses improvements made to the network design to enhance HMI availability. The Siemens network uses a CS275 bus system that uses token passing and distributed control to improve availability. Both networks aim to maximize availability of operator interfaces and communication between field devices, controllers, and engineering stations.
The document summarizes key concepts about data link layer protocols from Chapter 4 of the textbook. It discusses media access control using contention-based and controlled access methods. It also covers error control techniques like error detection using parity checks, checksums, and cyclic redundancy checks. Error correction is achieved using retransmission-based automatic repeat request and forward error correction methods. Asynchronous and synchronous transmission protocols are compared, along with common file transfer protocols for asynchronous lines.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
The document is a lecture on computer networks that describes different network topologies and standards. It defines physical and logical network topologies. For physical topologies, it describes bus, ring, star, mesh and fully connected configurations. It also outlines several key network standards including Ethernet, Token Ring, Wi-Fi, WiMAX, Bluetooth and more. The lecture provides examples of how these standards govern wired and wireless communication protocols to ensure compatibility.
01 elements of modern networking by nader elmansiNader Elmansi
Foundations of Modern Networking SDN, NFV, QoE, IoT, and Cloud
PART I MODERN NETWORKING
CHAPTER 1 Elements of Modern Networking
regenerated by Nader Elmansi
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
1) Setting up a home network requires a few basic pieces of hardware: a DSL or cable modem to connect to the internet, a wired or wireless router to connect devices on the network to the modem, and wired or wireless network adapters for devices to connect to the router.
2) A router connects devices on a home network and shares an internet connection from a modem. Devices connected to the router are given IP addresses to direct network traffic.
3) Important router specifications include wireless standard and throughput, wired throughput, range, number of ports, and wireless security settings. Choosing a router based on these specifications ensures optimal network performance and security.
This document provides an introduction to networking, including definitions, types, and components. It defines a network as consisting of two or more connected entities that can share resources and communicate. Networks are used to share information and hardware/software, enhance communication, and enable centralized administration. There are several ways to classify networks, including by transmission media (wired vs wireless), size (LAN, MAN, WAN), management structure (peer-to-peer, client-server), and topology (bus, star, ring). The document discusses these classifications in detail and provides examples of each type of network.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
This document provides an introduction to a networking essentials class, including information about the instructor, class times and structure, textbook, and course outline. It also summarizes key topics that will be covered in the class, such as networking history, types of networks, network operating systems, networking terminology, roles of servers, skills required of network professionals, and certifications.
Basics of Network Layer and Transport LayerRubal Sagwal
This document provides an overview of computer networks, focusing on the network, transport, and application layers. It discusses IPv4 and IPv6 packet structure, addressing, and protocols like ICMP, IGMP, TCP, and UDP. Specifically, it examines IPv4 and IPv6 addressing schemes, packet headers, classes of addresses, subnetting, and IPv6 advantages over IPv4. It also describes functions of protocols like ICMP for error reporting and queries, and IGMP for multicast group management.
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
This document provides an overview of network administration and support topics including managing users and groups, best practices, passwords, computer accounts, user rights, groups, security features, and hardware and software firewalls. Key points covered include having separate administrator and standard user accounts, disabling guest accounts, auditing administrative access, regularly changing complex passwords, and using groups to manage permissions and security. Hardware firewalls filter packets between screened subnets and DMZs while software firewalls provide an extra layer of protection at the application level.
Introduction to computer networks for performance venuesartsit
This document introduces computer networks for performance venues. It discusses terminology like LANs, WLANs, and WANs. Devices like switches and routers are also covered. VLANs are explained as a way to segment one physical network into multiple virtual networks using a managed switch or router. This allows sharing of cables while keeping traffic separate. VLANs provide security benefits and reduce infrastructure needs by limiting traffic crossing between segments. The document provides an example network architecture showing how VLANs can isolate lighting, sound, and internet systems on their own virtual networks for a performance venue.
Introduction to Networks & Networking Conceptszaisahil
The document provides an overview of computer networks and networking concepts. It defines what a computer network is, discusses the key components of networks including hardware, software, media and design. It also covers different types of networks like LANs, WANs and MANs. The document discusses peer-to-peer and client-server network models and the roles of clients, servers and network services. It provides examples of specialized servers like file servers, mail servers and web servers. Finally, it discusses factors to consider when selecting the right type of network.
The document discusses computer networks and networking concepts. It defines what a computer network is and provides examples of common network devices like routers, switches, hubs, bridges and modems. It explains how these devices work and their purposes. The document also discusses network connection methods like WiFi and Bluetooth. It outlines the advantages and disadvantages of networks as well as factors to consider when using different connection types.
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYIGN MANTRA
This document summarizes a training session on wireless security and wardriving. The session objectives are to explain wireless technology, standards, authentication processes, wardriving, and wireless hacking tools. It describes the basic components of a wireless network including access points, which connect the wireless and wired networks, and wireless network interface cards in devices. It also covers wireless network configuration options and standards like the 802.11 standard for wireless connectivity within local area networks.
The document discusses computer networks and networking. It describes the advantages of networks such as resource sharing, high speed communication, and reliability. It discusses different network models including peer-to-peer and client-server models. It also covers network devices, operating systems, cabling standards, and network topologies.
The chapter discusses different components and architectures for backbone networks. It describes switches, routers, and gateways that can be used in backbone networks. It outlines common backbone architectures including switched, routed, and virtual LAN (VLAN) backbones. Switched backbones are most popular and use switches to interconnect local area networks (LANs) instead of routers. VLANs assign computers to network segments through software rather than hardware. The chapter provides examples of how different backbone designs are implemented in organizations and their advantages.
This document provides an introduction to computer networks. It discusses e-commerce and electronic commerce, hardware components like NICs, servers, clients, transmission mediums, routers, bridges, hubs, switches, gateways, and repeaters. It also discusses network operating systems, protocols, cables, and connectors like twisted pair cables, coaxial cables, and fiber optic cables. The document is submitted by Shohana akter kakon for their computer networks course.
This document provides an introduction to computer networking concepts. It begins with defining a computer network as consisting of two or more connected computers that can communicate and share resources. The main advantages of networking are sharing information, software/hardware, and centralized administration. There are two main types of networks: peer-to-peer and client-server. Local, metropolitan, and wide area networks are also introduced based on geographical range. Common network topologies like bus, ring, and star are described along with their advantages and disadvantages. Standards organizations that set networking standards are listed. Finally, the basic components and devices used for data communication are outlined.
This document provides an agenda and information for a Tech 2Tech event at Durham discussing Jisc's new Janet access infrastructure. The agenda includes welcome remarks, presentations on the current and new Janet architectures, member experiences, and future Janet services. It is aimed at providing information on the network access program, opportunities to ask questions, and discussing challenges of the future. Working with partner Ciena, the new infrastructure aims to standardize equipment, management, and reduce costs while improving reliability and provisioning speeds. The regions of South, South West, East Midlands, West Midlands and London have started transitioning to the new infrastructure as existing regional contracts expire over the next 3-4 years.
The document provides information on DCS networks from ABB and Siemens. The ABB network uses Ethernet cables for the operation network and a high-speed serial network for communications. It discusses improvements made to the network design to enhance HMI availability. The Siemens network uses a CS275 bus system that uses token passing and distributed control to improve availability. Both networks aim to maximize availability of operator interfaces and communication between field devices, controllers, and engineering stations.
The document summarizes key concepts about data link layer protocols from Chapter 4 of the textbook. It discusses media access control using contention-based and controlled access methods. It also covers error control techniques like error detection using parity checks, checksums, and cyclic redundancy checks. Error correction is achieved using retransmission-based automatic repeat request and forward error correction methods. Asynchronous and synchronous transmission protocols are compared, along with common file transfer protocols for asynchronous lines.
The document provides an overview of wireless networking, including:
- Descriptions of common wireless standards such as 802.11b, 802.11a, and 802.11g.
- Considerations for deploying a wireless network such as effective range, interference issues, and security measures.
- Potential applications of wireless networking and how it can connect to existing wired networks.
- Factors to assess for a wireless deployment including building structure and existing technologies.
The document is a lecture on computer networks that describes different network topologies and standards. It defines physical and logical network topologies. For physical topologies, it describes bus, ring, star, mesh and fully connected configurations. It also outlines several key network standards including Ethernet, Token Ring, Wi-Fi, WiMAX, Bluetooth and more. The lecture provides examples of how these standards govern wired and wireless communication protocols to ensure compatibility.
01 elements of modern networking by nader elmansiNader Elmansi
Foundations of Modern Networking SDN, NFV, QoE, IoT, and Cloud
PART I MODERN NETWORKING
CHAPTER 1 Elements of Modern Networking
regenerated by Nader Elmansi
Wireless local area networks (WLANs) use radio waves to connect devices in a building or campus wirelessly. They integrate with wired networks through access points that bridge wireless and wired traffic. WLANs operate similarly to wired LANs but have some differences like lower security, limited bandwidth, and variable performance depending on location within the network coverage area. Common devices that use WLANs include tablets, smartphones and laptops.
1) Setting up a home network requires a few basic pieces of hardware: a DSL or cable modem to connect to the internet, a wired or wireless router to connect devices on the network to the modem, and wired or wireless network adapters for devices to connect to the router.
2) A router connects devices on a home network and shares an internet connection from a modem. Devices connected to the router are given IP addresses to direct network traffic.
3) Important router specifications include wireless standard and throughput, wired throughput, range, number of ports, and wireless security settings. Choosing a router based on these specifications ensures optimal network performance and security.
This document provides an introduction to networking, including definitions, types, and components. It defines a network as consisting of two or more connected entities that can share resources and communicate. Networks are used to share information and hardware/software, enhance communication, and enable centralized administration. There are several ways to classify networks, including by transmission media (wired vs wireless), size (LAN, MAN, WAN), management structure (peer-to-peer, client-server), and topology (bus, star, ring). The document discusses these classifications in detail and provides examples of each type of network.
Member Name: Alvin Tse
Service Site: Pui Tak Center
Site Location: Chicago, IL
Project Description:
Alvin Tse spent his TechMission Corps service year with the Pui Tak Center in Chicago, IL. At Pui Tak Center, Alvin helped establish various tech based resources with a specific emphasis on online maintenance.
Alvin's final project is a PowerPoint presentation on the various functions of wireless networks. It details various types of networks and illustrates their functions.
The document provides an overview of computer networks and details regarding the school's network. It discusses why networks are important, defines what a network is, and describes the key components and types of networks. The school's network uses a hierarchical extended star design with fiber optic cables connecting the school to servers located offsite. The network includes a wireless local area network (WLAN) within the school, a wide area network (WAN) connecting the school to other district sites, a storage area network (SAN) for student data, personal area networks (PANs) within classrooms, and a virtual private network (VPN) allowing remote access to files.
Networking Essentials Lesson 01 - Eric VanderburgEric Vanderburg
This document provides an introduction to a networking essentials class, including information about the instructor, class times and structure, textbook, and course outline. It also summarizes key topics that will be covered in the class, such as networking history, types of networks, network operating systems, networking terminology, roles of servers, skills required of network professionals, and certifications.
Basics of Network Layer and Transport LayerRubal Sagwal
This document provides an overview of computer networks, focusing on the network, transport, and application layers. It discusses IPv4 and IPv6 packet structure, addressing, and protocols like ICMP, IGMP, TCP, and UDP. Specifically, it examines IPv4 and IPv6 addressing schemes, packet headers, classes of addresses, subnetting, and IPv6 advantages over IPv4. It also describes functions of protocols like ICMP for error reporting and queries, and IGMP for multicast group management.
Networking Concepts Lesson 10 part 1 - Network Admin & Support - Eric VanderburgEric Vanderburg
This document provides an overview of network administration and support topics including managing users and groups, best practices, passwords, computer accounts, user rights, groups, security features, and hardware and software firewalls. Key points covered include having separate administrator and standard user accounts, disabling guest accounts, auditing administrative access, regularly changing complex passwords, and using groups to manage permissions and security. Hardware firewalls filter packets between screened subnets and DMZs while software firewalls provide an extra layer of protection at the application level.
Introduction to computer networks for performance venuesartsit
This document introduces computer networks for performance venues. It discusses terminology like LANs, WLANs, and WANs. Devices like switches and routers are also covered. VLANs are explained as a way to segment one physical network into multiple virtual networks using a managed switch or router. This allows sharing of cables while keeping traffic separate. VLANs provide security benefits and reduce infrastructure needs by limiting traffic crossing between segments. The document provides an example network architecture showing how VLANs can isolate lighting, sound, and internet systems on their own virtual networks for a performance venue.
Introduction to Networks & Networking Conceptszaisahil
The document provides an overview of computer networks and networking concepts. It defines what a computer network is, discusses the key components of networks including hardware, software, media and design. It also covers different types of networks like LANs, WANs and MANs. The document discusses peer-to-peer and client-server network models and the roles of clients, servers and network services. It provides examples of specialized servers like file servers, mail servers and web servers. Finally, it discusses factors to consider when selecting the right type of network.
The document discusses computer networks and networking concepts. It defines what a computer network is and provides examples of common network devices like routers, switches, hubs, bridges and modems. It explains how these devices work and their purposes. The document also discusses network connection methods like WiFi and Bluetooth. It outlines the advantages and disadvantages of networks as well as factors to consider when using different connection types.
Hari 2 BIMTEK ACEH WARDRIVING dan WIRELESS SECURITYIGN MANTRA
This document summarizes a training session on wireless security and wardriving. The session objectives are to explain wireless technology, standards, authentication processes, wardriving, and wireless hacking tools. It describes the basic components of a wireless network including access points, which connect the wireless and wired networks, and wireless network interface cards in devices. It also covers wireless network configuration options and standards like the 802.11 standard for wireless connectivity within local area networks.
This document provides an overview of wide area network (WAN) concepts and technologies. It discusses the purpose of WANs in connecting local area networks, common WAN topologies, and how WANs relate to the OSI model. The document also examines various WAN technologies including dedicated circuits, Frame Relay, ATM, Ethernet, MPLS, and broadband options. Key considerations for selecting a WAN technology include whether to use a private WAN infrastructure with a service provider or a public WAN over the internet using VPNs.
This chapter overview document summarizes the contents and objectives of Chapter 8 from the IT Essentials textbook on networking principles, standards, and purposes. The chapter covers topics like network topologies, protocols, hardware components, configuration, troubleshooting, and more. It includes student worksheets, activities, and labs to help instructors teach the material.
Wireless lan electronics and communication engineeringeceb9198
The document discusses wireless local area networks (WLANs) and the IEEE 802.11 standards. It provides an overview of WLAN fundamentals and network architecture, describing components like access points, distribution systems, and stations. It then summarizes the various 802.11 standards from 802.11 to 802.11ac, outlining their key features such as modulation schemes and data rates. The document also covers topics like WLAN security protocols, wireless hotspots, virtual private networks, and an alternative WLAN standard called HIPERLAN.
Hello!
Welcome to our CCNA Training (R&S) 200-125 series in Urdu.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses,
We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
EZXPRT an IT Trainnig Institute offers CISCO , Microsoft, Vmware, Huawei, Trainings in Rawalpindi, Lahore, Mirpur and Wah Cant campuses, We offer ONLINE Live and Recorded Training's on demand and we provide services of Career Counseling, Motivation etc.
.
CCNA stands for Cisco Certified Network Associate. R&S means Routing & Switching. The Exam Code of this course in 200-125. It's the basic course of CCNA track. If you want to start any certification like CCNA Security then you must pass the exam of CCNA R&S first. The exam time of this course is 90-120 mints. Here 90 mints time is for English Speaking Person & 120 mints time for non-native speakers. Total Marks of Exam is 1000 & Passing mark is 860. Number of Questions in Exam is 55 to 65.
You can book the exam from Pearson testing service.
Here is the link of Exam website.
https://home.pearsonvue.com
For more details you may contact
WhatsApp/Call :+923-23-4699123
shafqaat@ezprt.com
www.ezxprt.com
www.facebook.com/ezxprt
www.youtube.com/c/ezxprt
This document discusses network protocol models, including the OSI 7-layer model and IEEE 802 project model. It describes the purpose of having standardized network models and some of the organizations that define these models, such as ISO and IEEE. Each layer of the OSI model is defined, from the physical layer up to the application layer, along with example protocols and functions of each layer. The relationship between the layers is illustrated. The IEEE 802 project categories and its enhancements to the OSI model by dividing the data link layer are also summarized.
The document discusses plans to implement a wireless network at Morrisville College Library to allow students with laptops to access library resources anywhere in the building. It describes the hardware used, including Cisco access points and wireless network cards, and the benefits of a wireless network for a laptop-focused student body. Case studies from other academic libraries that implemented wireless networks are also presented to demonstrate how wireless can enhance the library experience for mobile users.
communication_technologies_Internet of things topicDurgaDeviP2
The document discusses various connectivity technologies for Internet of Things (IoT) devices. It begins by explaining that the choice of communication technology dictates hardware requirements and costs for IoT devices. It then covers network terminology like LAN, WAN, nodes and gateways. The document summarizes key IoT protocols including IEEE 802.15.4, Zigbee, IPv6, 6LoWPAN, WiFi and Bluetooth. It provides details on each protocol's features, applications, and how they enable communication at both the network and application layers for IoT. The document aims to explain the various connectivity options and standards that enable communication and networking for IoT devices.
The document provides information about basic local area networks (LANs). It defines LANs and wireless LANs, and describes their key characteristics such as topology and protocols. The document also discusses various network hardware including hubs, switches, bridges, routers, and network interface cards. It covers different types of network media like twisted pair, coaxial, fiber optic, and wireless. Finally, the document presents sample LAN implementations for home and business configurations.
Network system on Ahsanullah University of Science & TechnologyManas Saha
This document provides an overview of the network system at Ahsanullah University of Science & Technology (AUST) in Bangladesh. It describes the types of networks, topologies, hardware, and media used. The university uses both wired and wireless networks to connect computers. The wired network uses UTP and fiber optic cables in a star topology. Routers, switches, and servers connect the departments and buildings. The wireless network provides internet access across campus. In total, the network system at AUST effectively connects computers to share resources while managing bandwidth usage.
This document provides an overview of Chapter 8 which covers networking principles, standards, and purposes. It discusses types of networks like LANs, WANs, and WLANs. Key topics covered include network topologies, protocols, hardware components, configuration, troubleshooting and more. The chapter objectives are outlined and various worksheets, activities and labs for students are provided.
This course introduces students to issues in IT infrastructu.docxchristalgrieg
This course introduces students to issues in IT infrastructure.The course will cover computer and system architecture, and communication networks:
Infrastructure architecture
Organizational structure
Security
Metrics
Capacity PlanningThe course also focuses on the best practices employed in IT Infrastructure management, resource estimating, compliance and business continuity.
Course Description
*
7-*
IT INFRASTRUCTURE OVERVIEW
IT infrastructure - includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goalsClient/server networks, the Internet, and n-tier infrastructures are central to an organization’s IT infrastructureThe three primary components of any IT infrastructure include:
Client/server networks
Internet
N-tier infrastructures
Computer Networks:Arguably, the greatest advancement in technology and communication over the past 20 years has been the development and advancement of the “computer network”. From emailing a friend to on-line bill paying to downloading data off the Internet to e-commerce, networking has made our world much smaller and changed the way we communicate forever.
What is Network: a system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.
*
The Network Diagram
The Internet
Other LANS
Firewall
Router
Fiber Optic Network Cable
Server
PC
Wireless Network
Wired Network
Switch
*
I wanted to present this diagram to help the viewer visually understand how a computer network was set-up. I linked each component to the same text links throughout the project.
Some network appse-mailwebtext messagingremote loginP2P file sharingmulti-user network gamesstreaming stored video (YouTube, Hulu, Netflix)
voice over IP (e.g., Skype)real-time video conferencingsocial networkingsearch……
*
Types of Networks
LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
PAN Personal Area Network
SAN Storage Area Network
GAN Global Area Network
*
I used this slide as a Introduction to the different types of networks. I tried to let the graphics do the talking on this slide. I elaborated more on each network type on subsequent slides.
Local Area NetworkA Local Area Network spans a relatively small areaLANs are usually confined to one building or a group of buildings Data travel between network devices via network cablesThe most common type of Local Area Network is called Ethernet
*
I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
Wide Area NetworkA Wide Area Network exist over a large geographical area Data travels through telephone or cable lines across networks Usually requires a Mod ...
Network architecture refers to the design of a communications network, including its physical components, configuration, operational principles, and data formats. There are two main types: peer-to-peer networks connect computers directly to share resources, while client/server networks have one or more dedicated server computers that clients request services from. Networking hardware allows computers and devices to communicate over a network. Key hardware includes servers to control access and store files/programs, network interface cards to connect devices to the network, routers and switches to direct data transmission, firewalls for security, and modems or wireless access points for internet connectivity.
This document contains lecture notes on fundamentals of computer systems from Dr. Atif Shahzad. It covers topics such as logic, Boolean algebra, memory, CPU, registers, fetch-execute cycle, file management, networking, OSI model, LAN, WAN, communication protocols, latency, capacity, broadcast, firewalls, and network speeds. The document provides definitions and explanations of key computer science concepts.
This document provides an overview of computer networks and the TCP/IP protocol suite. It describes network criteria like performance and reliability. It discusses physical network structures like point-to-point, multipoint, mesh, star, bus and ring topologies. It also defines categories of networks such as local area networks (LANs), wide area networks (WANs) and metropolitan area networks (MANs). A key point is that the TCP/IP protocol suite, which controls the Internet, is organized into five layers: application, transport, internet, network interface and physical. The layers are described along with how a message travels through them.
This document provides an overview of networking concepts. It begins with an introduction explaining how networks connect people globally and describes typical network components like servers, clients, and intermediary devices. Several types of common networks are also compared such as home, SOHO, large enterprise, and worldwide networks. Network diagrams and topologies are explained along with internet access technologies for homes, small offices, and businesses. Requirements for reliable networks such as fault tolerance, scalability, quality of service, and security are outlined. The document provides a high-level tour of fundamental networking topics.
CCNA 1
Communication is almost as important to us as our reliance on air, water, food, and shelter. In today’s world, through the use of networks, we are connected like never before.
Every computer on a network is called a host or end device.
Servers are computers that provide information to end devices:
email servers
web servers
file server
Clients are computers that send requests to the servers to retrieve information:
the web page from a web server
email from an email server.
An end device is where a message originates from or where it is received. Data originates with an end device, flows through the network, and arrives at an end device.
An intermediary device interconnects end devices. Examples include switches, wireless access points, routers, and firewalls.
Management of data as it flows through a network is also the role of an intermediary device, including:
Regenerate and retransmit data signals.
Maintain information about what pathways exist in the network.
Notify other devices of errors and communication failures.
The document provides an overview of networking concepts covered in Module 1. It discusses how networks affect daily lives and the components that make up networks, including hosts, servers, clients, switches, routers and more. It also covers common network types like LANs and WANs, how networks are represented, internet connection technologies for homes/small offices and businesses, and the objectives of Module 1.
This document provides an overview of health informatics. It defines key terms like information management, information systems, and informatics. It describes the basic theoretical concept underlying informatics practice and defines biomedical and health informatics as fields of study. It outlines the learning objectives which include describing informatics areas of application, summarizing drivers and trends, and identifying professional roles and skills of health informaticians in processing data into information and knowledge to improve patient care. It then discusses the skills, tools, and domains of health informaticians and their roles in academic, research, and health care delivery environments.
Evolution of and Trends in Health Care - Lecture DCMDLearning
The document describes Lecture d of a course on the evolution of and trends in health care in the U.S. It discusses the patient-centered medical home model of care coordination, including characteristics like having a personal physician, team-based care, and quality/safety measures. It also introduces Accountable Care Organizations as a new model of care coordination promoted by the Affordable Care Act. Finally, it provides references for Lecture d.
Evolution of and Trends in Health Care - Lecture CCMDLearning
This lecture defined healthcare quality and gave examples of quality indicators such as process measures and outcome measures. It described approaches to quality improvement like the "Plan, Do, Study, Act" (PDSA) cycle. Comparative Effectiveness Research (CER) was introduced as a way to compare benefits and harms of alternative healthcare methods using evidence from studies. CER aims to help patients and physicians choose between treatment options.
Evolution of and Trends in Health Care - Lecture BCMDLearning
This lecture defines clinical practice guidelines and describes their purpose in helping clinicians and patients make appropriate healthcare decisions. It discusses the U.S. Preventive Services Task Force (USPSTF), an independent panel that issues evidence-based recommendations on clinical preventive services using a grading system (A to I) based on certainty of net benefit. The lecture also briefly introduces the Grading of Recommendations Assessment, Development and Evaluation (GRADE) framework for assessing evidence quality in clinical guidelines.
Evolution of and Trends in Health Care - Lecture ACMDLearning
This document discusses key concepts in evidence-based medicine and trends in the U.S. healthcare system. It defines evidence-based medicine as using the best available evidence from research to inform patient care decisions. Clinical practice guidelines and clinical decision support systems aim to promote evidence-based practices. The hierarchy of evidence ranks study types to determine the strength of evidence. Systematic reviews systematically analyze the literature on a topic.
The document discusses topics covered in Lecture c of Public Health, Part 2. It describes the importance of chronic diseases as leading causes of mortality in the US. Behavior modification is discussed as the main public health focus for prevention through education. The World Health Organization's STEPwise Framework for chronic disease prevention and policy is also presented. Environmental public health topics are reviewed, including overlap with chronic and communicable diseases. Air and water quality, hazardous waste management, and topics like smoking and urban planning are discussed.
This document discusses terrorism and public health in three parts. It begins by introducing four main categories of terrorism: bioterrorism, agricultural terrorism, chemical terrorism, and nuclear/radiation terrorism. It then discusses bioterrorism in more detail, including a history of bioterrorism incidents in the US and the CDC's categorization of bioterrorism agents. It concludes by describing the Laboratory Response Network and providing an overview of the public health response and challenges for the other categories of terrorism.
This document discusses communicable diseases and public health activities related to communicable disease prevention and control. It provides examples of communicable disease categories and historic public health triumphs in eradicating smallpox and bringing polio under control. The document also outlines public health investigations of disease outbreaks and monitoring/surveillance efforts at the federal, state, and local levels to control communicable diseases.
The document provides an overview of key concepts from Lecture c of Public Health, Part 1. It discusses the radical improvements public health has made to population health, including examples of successes in communicable disease control. It also reviews some historical highlights of public health in the US, noting how life expectancy has increased 30 years since 1900 due largely to public health initiatives. Major causes of death in 2014 are listed, with all but one being chronic or injury-related.
This document provides an overview of key concepts in public health from Lecture b, including:
- Defining important public health terminology like endemic, epidemic, morbidity, and mortality.
- Illustrating the general organization of public health agencies in the United States at the local, state, and federal levels.
- Explaining several roles of public health like education, policy, monitoring and surveillance, and regulating reportable diseases.
The document provides an overview of public health in the United States through a series of lectures. It begins with distinguishing between private health, which focuses on treating individuals, and public health, which aims to maintain population health through education, policy, and other measures. Next, it reviews the history of public health in the US from the 1700s to present, highlighting milestones like the establishment of the CDC and responses to health crises. The document concludes with learning objectives and references for further information.
The document discusses regulating health care in the United States. It covers several topics: the role of clinical documentation in health records to support patient safety, quality of care, and as a legal record; the importance of compliance programs to ensure adherence to laws and regulations regarding issues like fraud, abuse, and privacy; and the functions of organizations that oversee healthcare quality and standards like accreditation bodies. Thorough and complete clinical documentation is necessary to protect healthcare providers from legal risks while also supporting patient care, reimbursement, and organizational operations.
The document discusses key aspects of regulating health care in the United States as covered in Lecture d. It describes the Health Insurance Portability and Accountability Act (HIPAA) which establishes requirements for protecting patient health information and applies to covered entities like health care providers, health plans, and clearinghouses. It also discusses efforts by organizations like The Joint Commission and Agency for Health Care Research and Quality to improve patient safety and reduce medical errors through initiatives and research.
This lecture discusses how health care is regulated in the United States. It covers laws related to the Affordable Care Act, standards of care, informed consent, medical malpractice, and fraud/abuse. Providers must follow numerous complicated laws, obtain informed consent from patients, meet reasonable standards of care, and avoid fraudulent billing practices. The system is changing rapidly due to reforms like the Affordable Care Act and tort law proposals.
Lecture a discusses how health care in the US is regulated through accreditation, regulatory bodies, and professional associations. The Joint Commission is a major nonprofit accrediting body that establishes standards and accredits hospitals and other organizations through reviews and core measure reporting. Other accrediting organizations include URAC and the National Committee for Quality Assurance. Regulatory agencies like the Food and Drug Administration enforce standards to protect consumers. Professional associations represent various health professions and promote quality through certification, education, and advocacy.
This lecture discusses how the US legal system regulates health care. It describes the three branches of government - legislative, executive, and judicial - and how the court system is divided into trial courts that hear evidence and appellate courts that review cases. The lecture outlines the main sources of law and different types of laws, such as civil/private laws that govern relationships between people/organizations and public laws that govern relationships between people and the government. It provides examples of how civil cases involve private parties and criminal cases involve the government and a defendant.
The document discusses factors contributing to rising health care expenditures in the United States. It identifies increased demand from chronic disease and an aging population, new medical technologies, high pharmaceutical costs, and administrative inefficiencies compared to other countries as key drivers. While the uninsured account for some costs, evidence shows their emergency department utilization has not increased and is not a primary cause of overcrowding. Overall rising medical costs are challenging to curb due to demand for new, often expensive treatments and an inability to control utilization.
This document discusses reimbursement methodologies used by insurers to pay healthcare providers. It describes fee-for-service reimbursement, where separate payments are made for each service provided, and episode-of-care reimbursement, where one sum is paid for all services during an illness. Specific fee-for-service methods covered include traditional retrospective reimbursement using fee schedules, self-pay, and prospective payment models like capitation, per diem, case rates, and diagnosis-related groups. The document also reviews the revenue cycle of submitting claims and receiving reimbursement.
This document discusses the revenue cycle and billing process in healthcare. It describes how healthcare organizations capture charges for services provided, code diagnoses and procedures, and submit claims to insurers for reimbursement. Accurate coding using standardized code sets like ICD-10-CM, ICD-10-PCS, CPT and HCPCS is essential for reimbursement. The revenue cycle involves registration of patient information, charge capture, coding, claims submission, and payment receipt.
This document discusses methods for controlling rising health care costs in the United States. It explores how increased use of health information technology, evidence-based medicine, and new models of primary care such as the patient-centered medical home can improve efficiency and reduce expenditures. Alternative delivery methods like urgent care clinics and greater use of nurse practitioners and physician assistants may also lower costs. While concierge medicine provides enhanced services, there is no data showing it contains overall spending. Tort reform aims to curb defensive medicine practices that drive up healthcare costs.
Deep Leg Vein Thrombosis (DVT): Meaning, Causes, Symptoms, Treatment, and Mor...The Lifesciences Magazine
Deep Leg Vein Thrombosis occurs when a blood clot forms in one or more of the deep veins in the legs. These clots can impede blood flow, leading to severe complications.
Hypertension and it's role of physiotherapy in it.Vishal kr Thakur
This particular slides consist of- what is hypertension,what are it's causes and it's effect on body, risk factors, symptoms,complications, diagnosis and role of physiotherapy in it.
This slide is very helpful for physiotherapy students and also for other medical and healthcare students.
Here is summary of hypertension -
Hypertension, also known as high blood pressure, is a serious medical condition that occurs when blood pressure in the body's arteries is consistently too high. Blood pressure is the force of blood pushing against the walls of blood vessels as the heart pumps it. Hypertension can increase the risk of heart disease, brain disease, kidney disease, and premature death.
MBC Support Group for Black Women – Insights in Genetic Testing.pdfbkling
Christina Spears, breast cancer genetic counselor at the Ohio State University Comprehensive Cancer Center, joined us for the MBC Support Group for Black Women to discuss the importance of genetic testing in communities of color and answer pressing questions.
Empowering ACOs: Leveraging Quality Management Tools for MIPS and BeyondHealth Catalyst
Join us as we delve into the crucial realm of quality reporting for MSSP (Medicare Shared Savings Program) Accountable Care Organizations (ACOs).
In this session, we will explore how a robust quality management solution can empower your organization to meet regulatory requirements and improve processes for MIPS reporting and internal quality programs. Learn how our MeasureAble application enables compliance and fosters continuous improvement.
This particular slides consist of- what is hypotension,what are it's causes and it's effect on body, risk factors, symptoms,complications, diagnosis and role of physiotherapy in it.
This slide is very helpful for physiotherapy students and also for other medical and healthcare students.
Here is the summary of hypotension:
Hypotension, or low blood pressure, is when the pressure of blood circulating in the body is lower than normal or expected. It's only a problem if it negatively impacts the body and causes symptoms. Normal blood pressure is usually between 90/60 mmHg and 120/80 mmHg, but pressures below 90/60 are generally considered hypotensive.
Letter to MREC - application to conduct studyAzreen Aj
Application to conduct study on research title 'Awareness and knowledge of oral cancer and precancer among dental outpatient in Klinik Pergigian Merlimau, Melaka'
Under Pressure : Kenneth Kruk's StrategyKenneth Kruk
Kenneth Kruk's story of transforming challenges into opportunities by leading successful medical record transitions and bridging scientific knowledge gaps during COVID-19.
Michigan HealthTech Market Map 2024. Includes 7 categories: Policy Makers, Academic Innovation Centers, Digital Health Providers, Healthcare Providers, Payers / Insurance, Device Companies, Life Science Companies, Innovation Accelerators. Developed by the Michigan-Israel Business Accelerator
KEY Points of Leicester travel clinic In London doc.docxNX Healthcare
In order to protect visitors' safety and wellbeing, Travel Clinic Leicester offers a wide range of travel-related health treatments, including individualized counseling and vaccines. Our team of medical experts specializes in getting people ready for international travel, with a particular emphasis on vaccines and health consultations to prevent travel-related illnesses. We provide a range of travel-related services, such as health concerns unique to a trip, prevention of malaria, and travel-related medical supplies. Our clinic is dedicated to providing top-notch care, keeping abreast of the most recent recommendations for vaccinations and travel health precautions. The goal of Travel Clinic Leicester is to keep you safe and well-rested no matter what kind of travel you choose—business, pleasure, or adventure.
Gemma Wean- Nutritional solution for Artemiasmuskaan0008
GEMMA Wean is a high end larval co-feeding and weaning diet aimed at Artemia optimisation and is fortified with a high level of proteins and phospholipids. GEMMA Wean provides the early weaned juveniles with dedicated fish nutrition and is an ideal follow on from GEMMA Micro or Artemia.
GEMMA Wean has an optimised nutritional balance and physical quality so that it flows more freely and spreads readily on the water surface. The balance of phospholipid classes to- gether with the production technology based on a low temperature extrusion process improve the physical aspect of the pellets while still retaining the high phospholipid content.
GEMMA Wean is available in 0.1mm, 0.2mm and 0.3mm. There is also a 0.5mm micro-pellet, GEMMA Wean Diamond, which covers the early nursery stage from post-weaning to pre-growing.
PET CT beginners Guide covers some of the underrepresented topics in PET CTMiadAlsulami
This lecture briefly covers some of the underrepresented topics in Molecular imaging with cases , such as:
- Primary pleural tumors and pleural metastases.
- Distinguishing between MPM and Talc Pleurodesis.
- Urological tumors.
- The role of FDG PET in NET.
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardso...rightmanforbloodline
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
TEST BANK For Accounting Information Systems, 3rd Edition by Vernon Richardson, Verified Chapters 1 - 18, Complete Newest Version
Rate Controlled Drug Delivery Systems, Activation Modulated Drug Delivery Systems, Mechanically activated, pH activated, Enzyme activated, Osmotic activated Drug Delivery Systems, Feedback regulated Drug Delivery Systems systems are discussed here.
Let's Talk About It: Breast Cancer (What is Mindset and Does it Really Matter?)bkling
Your mindset is the way you make sense of the world around you. This lens influences the way you think, the way you feel, and how you might behave in certain situations. Let's talk about mindset myths that can get us into trouble and ways to cultivate a mindset to support your cancer survivorship in authentic ways. Let’s Talk About It!
Chandrima Spa Ajman is one of the leading Massage Center in Ajman, which is open 24 hours exclusively for men. Being one of the most affordable Spa in Ajman, we offer Body to Body massage, Kerala Massage, Malayali Massage, Indian Massage, Pakistani Massage Russian massage, Thai massage, Swedish massage, Hot Stone Massage, Deep Tissue Massage, and many more. Indulge in the ultimate massage experience and book your appointment today. We are confident that you will leave our Massage spa feeling refreshed, rejuvenated, and ready to take on the world.
Visit : https://massagespaajman.com/
Call : 052 987 1315
1. Introduction to Computer Science
Networks
Lecture d
This material (Comp 4 Unit 6) was developed by Oregon Health & Science University, funded by the Department
of Health and Human Services, Office of the National Coordinator for Health Information Technology under
Award Number 90WT0001.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
2. Learning Objectives - 1
• Define what a communication network is
(Lecture a)
• Explain the purposes and benefits of a
communication network. (Lecture a)
• Explain the Internet and World Wide Web,
their histories, and their structures.
(Lecture a)
• Describe different ways of connecting to
the Internet. (Lecture a)
2
3. Learning Objectives - 2
• Explain the basics of network addressing
– Internet Protocol (IP) addresses
– Domain names
– Lease vs. purchase from an Internet service
provider (Lecture b)
• Introduce network classification by the
coverage size. (Lecture b)
3
4. Learning Objectives - 3
• Describe different network topologies.
(Lecture c)
• Outline different standards and protocols
that govern wired and wireless
communications. (Lecture c)
4
5. Learning Objectives - 4
• Describe benefits and disadvantages of
wireless communication and a typical
wireless network setup. (Lecture d)
• Describe network hardware. (Lecture d)
• Introduce networking logical models and
discuss Open Systems Interconnection
(OSI) model. (Lecture e)
5
6. Wireless Communications
• Wireless devices communicate without
cabling
• Signals sent via
– Infrared light: laptop to laptop
– Microwave: requires clear line of sight
– Radio frequency: most common method
• Governed by IEEE 802.11 standard
• Seems to be available everywhere!
6
7. Wireless – The Good, The Bad, &
The Ugly
• Good
– Cleaner work environment
– Device portability
– Easy to connect
• Bad
– Can be slower than wired networks
– Limited signal range
• Ugly
– Security issues
7
8. How Does Wireless Function
• Home wireless communication uses radio
frequency
– Radio frequency bands are mapped to channels
– In North America, channels are 1-13 for 802.11
a/b/g
• For typical home setup
– Computers need wireless NICs
– Network needs a wireless router (aka WAP)
– To get access, wireless router needs to connect to
a wired device, such as cable modem router
8
9. Wireless Network Setup
• WAP
– SSID: name for wireless network
– Change WAP default password
– IP address and subnet mask
– Configure WPA2 and record the code/phrase
– Cable WAP so it somehow connects to ISP device
• Each wireless client
– SSID configured same as WAP
– IP and subnet mask in same range as WAP
– Configure WPA2 using code/phrase from WAP
9
10. Wireless Network Setup - 2
• Standards are backwards compatible
– 802.11g NICs work in 802.11 a/b device-
controlled WLANs
• Wireless RF channels
– WAPs and clients must use same channel
– Different channels cannot communicate
– Channel numbers correspond to an RF range
– Channels 1, 6, and 11 do not overlap
10
11. Network Hardware
• Common components are:
– Networked devices
– NIC (wired and wireless)
– Switch
– Router
– ISP device
– Server
– Surge protector
– Uninterruptable Power Supply (UPS)
11
12. Network Hardware –
Networked Devices
• Computers / Laptops with:
– Network-enabled operating system (OS)
– NIC to connect to switch/router
o Newer computers have a network interface built
into the motherboard
– Cabling for wired network
12
13. Network Hardware - NICs
• Required for network communication
– Hardware uses OS services to communicate on
network
• Wired – requires cabling, jacks, switch/router
• Wireless – requires WAP and some wired
device to communicate with wired devices
Vintage 10 Mbps Ethernet NIC for wired network.
(Helix84, 2005, CC BY-SA 3.0)
54 Mbps Wireless LAN PCI Card (802.11g).
(Wheeler, 2007, CC BY-SA 3.0 13
14. Network Hardware – Switch
• Very important
network component
• Devices plug into
switch to
communicate with
each other
• Switch plugs into ISP
device to provide
Internet access 5-port Atlantis Ethernet switch.
(Sub, 2007, PD-US)
14
15. Network Hardware – Router
• Defined by IP address
and subnet mask
numbers
• Connects different IP
networks so they can
communicate with
each other
• Can be wired or
wireless
• ISP devices are
routers
Cisco Linksys WRT54GL wireless router
(Jackzor, 2008, PD-US)
15
17. Network Hardware – ISP Device
• Connects SOHO and Office networks to
Internet
• Usually has one Internet port to connect to
a wall port
• Usually has one switch port to connect
one device using Ethernet cable
– Can use that port to connect to a switch
– All devices then share the one Internet
connection
17
18. ISP Device Examples
• Motorola cable modem
– Uses the ISP’s coaxial
cable to provide Internet
connectivity
• Wireless D-Link
router/modem
– Uses the ISP’s Ethernet
cable to provide Internet
connectivity
(Larocomp, 2010, PD-US)
(Macic7, 2007, CC BY 3.0
18
19. Network Hardware – Server – 1
• Computer with specialized OS installed
– Windows Server 2008
– Ubuntu Server
– Novell Open Enterprise Server
• Creates ‘gated community’ of devices
and users
– Server maintains database of objects,
restricts access and manages them
19
20. Network Hardware – Server – 2
• Can provide various functions
– Domain controller
o Print server
– Domain Host Configuration Protocol (DHCP)
– Domain Naming System (DNS)
o File Server
o Certificate server
– Network Access Protection (NAP)
20
21. Network Hardware –
Surge Protector
• Protects devices from spikes in power
– Some power strips are also surge protectors
• Devices need to be plugged in to gain
protection
• Power surge can destroy a devices circuitry
• Protection rating
– Measured in Joules
– Amount of energy the protector can absorb
without failure
21
22. Network Hardware – UPS
• Uninterruptible power supply (UPS)
provides emergency power to attached
devices when power fails
• Short battery power time (5-30 min)
– Computer and monitor – portable unit okay
– Whole building – need large (site) solution
• Never plug laser printer into UPS
• Important to read documentation
22
23. Surge Protector and
UPS Examples
(Cgxke, 2008, PD-US)
(Amakuru, 2006, CC BY-SA 3.0)
(Amakuru, 2006, CC BY-SA 3.0)
23
24. Networks
Summary – Lecture d
• Describe wireless communication
– advantages and disadvantages
– standards and modes of operation
– wireless network setup
• Describe major network hardware
components
24
25. Networks
References – 1 – Lecture d
References
Wikipedia. Medical Implant Communication Service. [Internet]. 2011 Jun [cited 2011 Nov
07]. Available from:
http://en.wikipedia.org/wiki/Medical_Implant_Communication_Service.
Wikipedia. Wireless LAN. [Internet]. 2011 Jun [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Wireless_LAN.
Wikipedia. Network switch. [Internet]. 2011 Jun [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Network_switch.
Wikipedia. Surge protector. [Internet]. 2011 Jun [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Surge_protector.
Wikipedia. Uninterruptible power supply. [Internet]. 2011 Jun [cited 2011 Nov 07].
Available from: http://en.wikipedia.org/wiki/Uninterruptible_power_supply.
25
26. Networks
References – 2 – Lecture d
Images
Slide 13: Network Card[image on the Internet]. (Helix84, 2005, CC BY-SA 3.0) [cited 2011
Nov 07]. Retrieved Jan 2012 from:
http://en.wikipedia.org/wiki/Network_interface_card. Licensed through Creative
Commons Attribution-ShareAlike 3.0 Unported License
Slide 13: WLAN PCI Card [image on the Internet]. (Wheeler, 2007, CC BY-SA 3.0) [cited
2011 Nov 07]. Retrieved Jan 2012 from:
http://en.wikipedia.org/wiki/File:WLAN_PCI_Card_cleaned.png. Licensed through
Creative Commons Attribution-ShareAlike 3.0 Unported License
Slide 14: Network Switch [image on the Internet]. (Sub, 2007, PD-US) [cited 2011 Nov
07]. Retrieved Jan 2012 from:
http://en.wikipedia.org/wiki/File:Ethernet_switch_Atlantis_A02-
F5P_5_ports_backend.jpg. (PD-US, 2007)
Slide 15: Cisco Linksys Wireless Router [image on the Internet]. c2008 [cited 2011 Nov
07]. Retrieved Jan 2012 from: http://en.wikipedia.org/wiki/File:Linksys_WRT54GL.jpg.
(PD-US, 2008)
26
27. Networks
References – 3 – Lecture d
Images
Slide 16: SOHO Wireless Network [image on the Internet]. (Feval, 2006, CC BY-SA 3.0)
[cited 2011 Nov 07]. Retrieved Jan 2012 from:
http://en.wikipedia.org/wiki/File:SPOF.png. (PD-US, 2006)
Slide 18: Motorola Cable Modem Router [image on the Internet]. (Larocomp, 2010, PD-
US) [cited 2011 Nov 07]. Retrieved Jan 2012 from:
https://commons.wikimedia.org/wiki/File:SBV6120E.jpg. (PD-US, 2010)
Slide 18: Router Dlink [image on the Internet]. (Macic7, 2007) [cited 2011 Nov 07].
Retrieved Jan 2012 from: https://commons.wikimedia.org/wiki/File:SBV6120E.jpg.
(GNU)
Slide 23: Large UPS Device [image on the Internet]. (Cgxke, 20087, PD-US) [cited 2011
Nov 07]. Retrieved Jan 2012 from: http://en.wikipedia.org/wiki/File:500kVA-UPS.jpg.
(PD-US, 2009)
Slide 23: Small UPS Device [image on the Internet]. (Amakuru, 2006, GNU) [cited 2011
Nov 07]. Retrieved Jan 2012 from: http://en.wikipedia.org/wiki/File:UPSRearView.jpg.
(GNU)
Slide 23: Multi-outlet Surge Protector [image on the Internet]. (Amakuru, 2006) [cited
2011 Nov 07]. Retrieved Jan 2012 from:
http://en.wikipedia.org/wiki/File:Surge_protector.jpg. (PD-US, 2008) 27
28. Introduction to Computer Science
Networks
Lecture d
This material was developed by Oregon
Health & Science University, funded by the
Department of Health and Human Services,
Office of the National Coordinator for Health
Information Technology under Award
Number 90WT0001.
28
Editor's Notes
Welcome to Introduction to Computer Science: Networks. This is Lecture d.
The component, Introduction to Computer Science, provides a basic overview of computer architecture; data organization, representation, and structure; structure of programming languages; and networking and data communication. It also includes some basic terminology from the world of computing.
The objectives for this unit on Networks are to:
Define what a communication network is,
Explain the purposes and benefits of a communication network,
Explain the Internet and World Wide Web, their histories, and their structures,
Describe different ways of connecting to the Internet,
Explain basics of network addressing: IP addresses and domain names, and how they can be leased or purchased from an Internet service provider.
Introduce network classification by the coverage size.
Describe different network topologies.
Outline different standards and protocols that govern wired and wireless communications.
Describe benefits and disadvantages of wireless communication and a typical wireless network setup.
Describe network hardware.
And, finally, to introduce networking logical models and discuss Open Systems Interconnection, or OSI model.
This lecture will discuss wireless communication and network hardware.
Wireless communication occurs without cabling. Signals are sent via infrared light, for example, from laptop-to-laptop;
by microwave, which requires a clear line of sight between the sending and receiving devices;
and by radio frequency, which is the most common method used today.
All signals are governed by the IEEE 802.11 standard.
Wireless communication is prevalent throughout the world, and its use is only going to continue to grow.
As with most technology, there are good, bad, and ugly aspects of wireless communication.
Wireless communication usage is ever increasing because cables are not needed to connect devices to a network. The benefits of not using cables include a cleaner physical work environment; portability—for example, anyone can carry a laptop around campus and connect to the Internet everywhere; and it is easy for users to connect to the network, if the network provides open connectivity.
The bad part about wireless is that signal interference and other factors can cause slower connection speeds than wired networks. For example, a signal may not have the ability to fully penetrate walls, which weakens the signal. Additionally, the signal range is often limited. In fact, the farther a wireless device moves from its wireless access point, the lower the throughput. Once the device moves outside of the wireless access point's effective range, no wireless communication can occur. In a typical home network, this is usually only about 50 feet, or approximately 15 meters.
The ugly part about wireless communication pertains to security issues. All wireless devices have the ability to view all wireless network traffic, using special software known as a sniffer. Network administrators must plan for this type of activity and prevent it. To ensure that users are able to use wireless communication without concern about whether their passwords and usernames and even data itself are stolen, administrators must be on guard against those who are going to try to sniff, or intercept, electronic communications.
How does wireless communication happen?
Home wireless communication uses radio frequency. Wireless equipment uses different channels for communication, each channel representing a specific frequency band. Radio frequency bands map to specific wireless channel numbers. In North America, channels are one through 13 for the technologies that are governed by the IEEE 802.11A, B, and G standards.
The following equipment is necessary to set up wireless communication in a home:
Computers need wireless network interface cards, or NICs, to enable the connection to a wireless access point, or WAP, also known as a router.
The network also needs a wireless router.
The wireless router then connects to a wired device. For example, to obtain Internet access, the wireless router needs a wired connection to an ISP device, such as a cable modem router.
When setting up a wireless network, it is very important that the WAP for secure communication be configured. One of the things to be set is the service set identifier, or SSID, this is the name for the wireless network. It is basically the same thing as the workgroup name in a wired network.
Next, change the WAP's default password; the default password of any wireless router can be found on the Internet.
After that, supply the WAP with an IP address and subnet mask. Ensure that the IP address and subnet mask are in the range of the computer and other devices that will connect to the wireless network.
Next, configure WPA2, a wireless security protocol. Write down the code or phrase you use; you’ll need it later when configuring wireless clients.
Next, attach the cable between the WAP and the ISP device.
You will need to configure each wireless client. One configuration is to ensure that the wireless client has the same SSID configured on the WAP. The wireless client also needs an IP address and subnet mask that is in the same IP address range as the WAP.
The WAP and client cannot have the same IP address, although they should have the same subnet mask.
Ensure that all devices are configured with unique IP addresses and the same subnet mask.
Finally, configure WPA2 using the code or phrase you wrote down when you configured the WAP.
It is important to keep in mind that standards are backwards compatible. In other words, IEEE 802.11G NICs work with IEEE 802.11A or B device-controlled wireless LANs.
WAPs and clients must also use the same channel. Remember, valid channels in North America are between 1 and 13. If a WAP is on channel 6 and a client is on channel 1, the two will not be able to communicate with each other. Again, channel numbers correspond to an RF range.
Note that channels 1, 6, and 11 do not overlap.
Therefore, in North America, it is good practice to use one of these channels. For example, channel 5 uses the radio frequency range of 2.421 through 2.443 gigahertz. Notice that channel 6 uses the radio frequency range of 2.426 through 2.448, which slightly overlaps the range of channel 5. This overlap can interfere with wireless communication for devices using both frequencies.
Typical network hardware includes networked devices; a NIC, either wired or wireless; a switch; a router; an ISP device, if Internet access is required; a server, if managing a domain; a surge protector; and an uninterruptable power supply, which is known as a UPS.
Let’s look at each of these in more detail.
Network devices include computers, laptops, printers, and scanners that have a network enabled operating system. For example, a computer might be running Windows 10, Windows 8, or Windows XP. Each of these operating systems can provide the services required for network communication between applications installed on the computer and the network hardware. These devices need an installed NIC, which will allow them to connect to a switch or router, as well as cabling for a wired network.
For a device to communicate on a network, it must have a NIC or network interface card. The hardware uses operating system services to communicate on the network. A service is a program that is part of the operating system and is always running.
A wired NIC requires cabling and jacks, and, ultimately, a switch and a router for network access and communication.
A wireless NIC requires a WAP and some wired device through which the WAP will communicate with other wired devices. The images on the screen illustrate a couple of NICs.
The image on the bottom left of the slide is a vintage 10-megabit per second Ethernet NIC for wired network communication. This old-style NIC has two connector types on it.
The connector type on the left side of the image is an old BNC connector type. The connector type on the right side of the image is what a user would use to plug in an RJ-45 jack Ethernet cable.
The image on the right side of the slide is a 54-megabit per second wireless PCI, peripheral component interconnect card, which relates to the IEEE 802.11G standard.
One of the most important pieces of hardware in a network is the switch. Wired devices plug into the switch via an Ethernet cable to communicate with each other. In other words, if a computer has a wired NIC installed, then a user would plug a network cable’s RJ-45 jack into the NIC and then plug the RJ-45 jack on the other end of the cable into one of the ports shown on the switch. Then any other device that is plugged into that switch will be able to communicate with the computer. The switch then plugs into an ISP device to provide Internet access. The figure on the slide shows a five-port switch.
Switches allow communication only between hosts sharing the same IP address and subnet mask range. Switches forward traffic to devices in their network based on the MAC address of the devices. However, switches are programmed so that devices in different IP address ranges—different networks—are unable to communicate with each other unless the communication is permitted by a router through an access control list rule.
Switches are not routers. However, some of the more expensive routers perform the actions of switches and routers. Switches that can perform router operations are called Layer 3 switches.
A switch learns MAC addresses by reading traffic sent through all of its ports. Therefore, with a computer plugged into a switch port, when the computer communicates, the switch itself receives that information and reads the communication. Part of that communication includes the NIC’s MAC address, IP address, and subnet mask assigned to the computer.
If the switch receives traffic for a MAC address that it is familiar with, the switch sends that traffic to the switch port associated with that MAC address. If the switch receives traffic for an unknown MAC address, the switch forwards that traffic out of all of its other ports. That traffic will eventually make its way to a router, which will try to locate the destination network, and then route the traffic accordingly.
Another important piece of hardware in a network is the router. A network boundary is defined by IP addresses and subnet mask numbers. A router can connect different IP addressed networks so they can communicate with each other. Routers such as ISP devices and WAPs can be wired or wireless.
The image on this slide is a Cisco-Linksys wireless router, typically found in a small office/home office, or SOHO network. The blue Ethernet cable extending from the back, right of the router, connects this WAP to the wired network.
As mentioned previously, routers use IP addressing to route network traffic. Note that routers route, and switches forward traffic. Routers have routing tables so that they know where to route received traffic. Switches do not have routing tables; they just keep track of MAC addresses by switch port, and can send communication to its local area network, not to a remote network.
Routers are usually configured with a default route, which is the IP address of another router. In other words, if the router has no idea where a destination device is located, it sends that traffic to its default router.
If a router receives traffic for a destination not found in its routing table, the router sends that traffic to its default route. The hope is that the default router will know where to route this traffic. Ultimately, if the router does not have a destination route in its routing table and the router is not configured with a default route, the router drops that traffic. This means that the communication does not reach its destination. This might happen in a small office network, but it should never happen in a business network or on the Internet.
This image shows a small office network interconnected by an ISP router with switch ports. The ISP router connects the devices in the small home office to the Internet. Assuming correct IP addressing, the three home devices can communicate with each other and the Internet.
An ISP device, for example, a cable modem router, connects either a home or an office network to the Internet. Users can lease these pieces of hardware from their ISP when they sign up for Internet service.
The ISP device usually has one Internet port, which can be connected to a wall port. The ISP will usually provide the necessary cabling and other supplies needed to connect to the ISP device. This device usually has one switch port to connect one office or home device via an Ethernet cable.
Users can decide to use that port to connect to a switch, which can then connect to other devices or even other switches to extend the network. There is no need to purchase or lease a more expensive device from an ISP to connect other devices to the network. In this case, all the devices share the one Internet connection, which is fine.
Now we will examine some ISP devices. The top right image shows a Motorola cable modem router. This router uses the ISP's coaxial cable to provide Internet connectivity. The bottom right image is a wireless D-Link router modem, typically used as a residential DSL gateway. This router uses the ISP's Ethernet cable to provide Internet connectivity.
Another network device is a server, which is a computer with a specialized operating system installed. Server examples are Windows Server 2008 or 2003, Ubuntu Server, and Novell's Open Enterprise Server.
A server creates what we refer to as a gated community of devices and users. A server maintains a database of its objects (objects being devices and users). It restricts access to the network to only authorized devices and users, and manages all of these objects. In other words, a server determines which users can log on to the network, if at all. A server can also enforce rules that determine who can print to a specific printer.
Servers can provide a number of functions, including:
Taking on the role of domain controller, which is the guard of the gated community
A print server managing the printers that are part of the network
A DHCP or domain host configuration protocol, which is the server that provides IP addresses and other configurations to devices
A DNS, or domain naming system, server, so that device names can be translated into IP addresses
The file server, which might allow users to store their documents within specific folders on a hard drive of the server
A certificate server, which involves secure communications within a network and with other types of functionality
Finally, a NAP, or network access protection server, which acts to protect the network from devices without virus protection software.
These are just a few of the roles a server can fulfill in a domain.
A device with a motherboard should be plugged into a surge protector, which is plugged into the wall.
Surge protectors protect devices from spikes in power, usually originating from the power company. Some power strips are also surge protectors. Carefully read the product information to differentiate between the two.
Devices need to be plugged into the surge protector to gain protection. If a power surge occurs and the device was not plugged into a surge protector, the motherboard circuitry might be destroyed. This means that if any microwave device, computer, iPod, iPhone, and other devices are plugged directly into a wall outlet that experiences a surge in power, the motherboard on any of those devices can be destroyed. Always use a surge protector for all electronic devices, but especially for computers, servers, printers, and portable devices.
Protection through the use of a surge protector is measured in joules. Protection rating is defined as the amount of energy the surge protector can absorb without failure.
To ensure that a device does not immediately shut down due to power loss, purchase and install an uninterruptable power supply or a UPS, which provides emergency power to attached devices when power fails.
A UPS provides short battery time, usually 5 to 30 minutes, depending on the devices that are attached to the UPS and the battery power provided by the UPS. Plug the computer and monitor directly into a UPS outlet. Then, if a power loss occurs, there will be time to safely shut down the computer rather than have it abruptly shut down due to a lack of power.
There are more robust solutions to protect a whole building or campus. For example, a UPS might be placed in a central location, with all electricity connected to the UPS. Call centers typically have this type of a setup.
Note that users should never plug a laser printer into a UPS. A laser printer will instantly drain all of the available UPS battery power. This means that if a computer, monitor, and a laser printer are plugged into the UPS, and power is lost, all of those devices will immediately shut down because the laser printer itself will drain all of the power in a matter of moments, rendering the UPS useless.
Always plug a laser printer into a surge protector, and then plug the surge protector into a wall outlet. Then, plug the computer or monitor and other devices into the UPS, and then plug the UPS into another wall outlet.
Finally, most UPS hardware devices also provide surge protection. It is important to read the documentation to understand specifically how each type of device protects your electronic equipment.
The images on this slide show surge protectors and UPS devices.
The image on the top-left shows a large datacenter-scale UPS being installed by electricians. The size of this UPS device indicates that all devices within the building will retain power in the event of a power loss.
The bottom, left image shows a multi-outlet surge protector available for purchase from any hardware store. In this case, all of the devices plug into the surge protector, and then the surge protector plugs into the wall.
Finally, the image on the right shows a freestanding UPS. This unit has different types of connectors for input and output. Computers, monitors, printers, and other devices plug into the UPS, which plugs into a wall outlet.
This concludes Lecture d of Networks.
In summary, this lecture discussed wireless communication and the major hardware components of a network.