The document provides an overview of basic computer networking concepts, defining a computer network and describing different types of networks including WAN, LAN, and peer-to-peer. It also explains key components of networks such as switches, routers, servers, and topologies including star, bus and ring configurations. The document aims to introduce readers to fundamental networking topics in a clear and straightforward manner.
Basics of Computer Communication and Network with Emphasis on the history of communication. It also mentions the current scenario of computer networks.
Basics of Computer Communication and Network with Emphasis on the history of communication. It also mentions the current scenario of computer networks.
Computer Networks and Internet Basics:
Computer Networks: Introduction to networks, types of networks (LAN, WAN, WLAN), network topologies.
Networking Basics: Network components (routers, switches, hubs), IP addressing (IPv4, IPv6), TCP/IP Protocol.
Internet and World Wide Web: Understanding the Internet, web browsers, search engines, online research techniques.
This course introduces students to issues in IT infrastructu.docxchristalgrieg
This course introduces students to issues in IT infrastructure.The course will cover computer and system architecture, and communication networks:
Infrastructure architecture
Organizational structure
Security
Metrics
Capacity PlanningThe course also focuses on the best practices employed in IT Infrastructure management, resource estimating, compliance and business continuity.
Course Description
*
7-*
IT INFRASTRUCTURE OVERVIEW
IT infrastructure - includes the hardware, software, and telecommunications equipment that, when combined, provide the underlying foundation to support the organization’s goalsClient/server networks, the Internet, and n-tier infrastructures are central to an organization’s IT infrastructureThe three primary components of any IT infrastructure include:
Client/server networks
Internet
N-tier infrastructures
Computer Networks:Arguably, the greatest advancement in technology and communication over the past 20 years has been the development and advancement of the “computer network”. From emailing a friend to on-line bill paying to downloading data off the Internet to e-commerce, networking has made our world much smaller and changed the way we communicate forever.
What is Network: a system containing any combination of computers, computer terminals, printers, audio or visual display devices, or telephones interconnected by telecommunication equipment or cables: used to transmit or receive information.
*
The Network Diagram
The Internet
Other LANS
Firewall
Router
Fiber Optic Network Cable
Server
PC
Wireless Network
Wired Network
Switch
*
I wanted to present this diagram to help the viewer visually understand how a computer network was set-up. I linked each component to the same text links throughout the project.
Some network appse-mailwebtext messagingremote loginP2P file sharingmulti-user network gamesstreaming stored video (YouTube, Hulu, Netflix)
voice over IP (e.g., Skype)real-time video conferencingsocial networkingsearch……
*
Types of Networks
LAN Local Area Network
WAN Wide Area Network
MAN Metropolitan Area Network
PAN Personal Area Network
SAN Storage Area Network
GAN Global Area Network
*
I used this slide as a Introduction to the different types of networks. I tried to let the graphics do the talking on this slide. I elaborated more on each network type on subsequent slides.
Local Area NetworkA Local Area Network spans a relatively small areaLANs are usually confined to one building or a group of buildings Data travel between network devices via network cablesThe most common type of Local Area Network is called Ethernet
*
I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
Wide Area NetworkA Wide Area Network exist over a large geographical area Data travels through telephone or cable lines across networks Usually requires a Mod ...
This pesentation explains some topics realated to the computer networking...
Basically we are covering the following areas...
1. Ethernet Technology and its Evolution
2. Wireless Networking Technologies
3. IPv4 and IPv6 Coexistence
This will help the students to get a good idea about Computer Networking field...
It deals with the definition of network, its types, different networking devices, different network architecture, network topology and switching techniques.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
The basics of computer networking
1. The Basics of
Computer
Networking
YULISA ROSLIANA
Hys.yulisarosliana@gmail.com
http://sif.uin-suska.ac.id/
http://fst.uin-suska.ac.id/
http://www.uin-suska.ac.id/
2. The Computer Network
Arguably, the greatest advancement in technology and
communication over the past 20 years has been the development
and advancement of the computer network. From emailing a
friend to on-line bill paying to downloading data off the Internet to
e-commerce, networking has made our world much smaller and
changed the way we communicate forever.
3. The Computer Network
What is a Computer Network
net·work: [net-wurk] – noun, a system containing any
combination of computers, computer terminals, printers,
audio or visual display devices, or telephones
interconnected by telecommunication equipment or
cables: used to transmit or receive information.
4. Navigation Links
Network Diagram – Basic Layout and map of a traditional computer network.
Network Types – Computer networks vary in shape and size depending on usage.
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable – One of the Latest innovations in network cabling.
Switches and Hubs – The central device within a network that transmit data.
Servers – The central storage device for the names and locations of various data.
- IP Addresses
Topologies – The layouts of various network designs.
- Star
- Bus
- Ring
Firewalls – The network software that keeps destructive forces from a network.
Routers – The device that let messages flow between networks.
Wireless Networks - Allows computers to be moved without wires or cables.
The Internet – The world’s largest network.
References
5. The Network Diagram
(Click on the Words Below and Learn More About Each Component)
The Internet
Other LANS
Firewall
Router
Fiber Optic Network Cable
Server
PC
Wireless Network
Wired Network
Switch
6. Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
The Three Types of Networks
PEER TO PEER
WIDE AREA LOCAL AREA
7. Wide Area Network
• A Wide Area Network exist over a large area
• Data travels through telephone or cable lines
• Usually requires a Modem
• The world’s largest Wide Area Network in the
Internet
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
8. Local Area Network
• A Local Area Network spans a relatively small
area
• LAN are usually confined to one building or a
group of buildings
• Data travel between network devices via
network cables.
• The most common type of Local Area Network
is called Ethernet
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
9. Peer to Peer Network
• Usually very small networks
• Each workstation has equivalent capabilities
and responsibilities
• Does not require a switch or a hub.
• These types of networks do not perform well
under heavy data loads.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
10. Fiber Optic Cable
• Reduces interference in the network
• Transmit data faster than copper network cable
• Allows for more bandwidth
• Smaller and more fragile than copper cable
Standard
Network
Copper Cable
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
11. Switches and Hubs
• Data travels faster through switches because data is not
sequenced as it is in a hub
• The information is more secure when it passes through
a switch as opposed to a hub.
• Information travels more efficiently through a switch
because travels directly to it’s destination as opposed to
being broadcast to all PC’s on the network hub.
Network Switches Network Hubs
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
12. Servers
Users are connected to
certain servers which
will fulfill the required
request.
There are 3 Principle
Types of Servers
Print Servers
Contains the name and
location of all printers
that are on the
Network
File Servers
Contain the location and
names of the various
drives, files, and
folders on a Network
Web Servers
Contain the Programs,
Files, and Internet
Web Sites
Rack of Servers
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
13. Web Servers
IP Addresses
“IP” stands for Internet Protocol. IP Addresses serve as
the location of websites on the Internet as well as the
workstations that are connected to the web. IP addresses
are made up of four sets of numbers called “Octets”.
There are two types of IP Addresses: Static and
Temporary. Below is a description of both.
Static IP Addresses Temporary IP Addresses
Static IP addresses are
found only on servers and
remain the same.
A Domain Name Server
assigns a “human
readable” web address to
each static IP address to
make it more user friendly.
Temporary IP addresses
are found only on PC’s are
constantly changing each
time it is logged on.
Temporary IP addresses
are assigned by an ISP
(Internet Service Provider)
each time it is logged on to
the Internet.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
14. Network Topologies
Network Topology refers to the shape of a
network, or the network's layout. How different
nodes in a network are connected to each other
and how they communicate are determined by
the network's topology.
There are three basic topologies:
Star Ring
Bus
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
15. Star Topology
• All devices are connected to a central hub.
• Nodes communicate across the network by
passing data through the hub or switch.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
16. Ring Topology
• All devices are connected to one another in
the shape of a closed loop.
• Each device is connected directly to two
other devices, one on either side of it.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
17. Bus Topology
TT
• All devices are connected to a central
cable, called the bus or backbone.
• There are terminators at each end of the bus
that stops the signal and keeps it from
traveling backwards.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
18. Firewalls
• A firewall is a software that can be loaded on to
a network that can serve as a barrier that keeps
destructive forces away from a network of
computers.
• Packets of data are analyzed against a set of
criteria or standards called filters.
• Filters block certain designated IP addresses.
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
19. Routers
Whether a Router is traditional or wireless, its
purposes remain the same.
Routers are specialized computers that send
your messages and those of every other
Internet user speeding to their destinations
along thousands of pathways.
Routers are crucial devices that let messages
flow between networks, rather than within
networks.
Standard Router Wireless Router
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
20. Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
Wireless Networks
Allows for
computers to be
moved easily
without having to
worry about wires
or cables
Walkie-Talkie Network
• You would equip each computer with basically,
a walkie-talkie.
• You would give each computer a way to set
whether it wants to transmit or receive.
• A wireless network converts binary signal (0’s
and 1’s) into a radio signal (series of beeps).
21. The Internet
The simplest definition of the Internet
is that it's a network of computer
networks
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
22. The Internet
How Information Travel Through the Internet
A page on the Internet—whether it's full of words, images
or both—doesn't come to you in one shipment. It's
translated into digital information, chopped into 1500
byte pieces called PACKETS, and sent to you like a
puzzle that needs to be reassembled. Each part of the
packet has a specific function:
Header
Provides the
complete
destination
address for the
packet
Data Block
The portion of the overall
information carried by the packet
Sequence ID
ID’s where the information
belongs in relation to the
rest of the information
End of Message
ID’s the end of the
packet
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
23. The Internet
How Information Travel Through the Internet
When you connect to a Web site through an ISP and start
exchanging information, there isn't a fixed connection
between your computer and the Web server computer
hosting the Web site. Instead, information is exchanged
using the best possible path at that particular time.
Special computers called routers determine these paths,
avoiding slow links and favoring fast ones.
Your
Computer
ISP
Routers
Web
Servers
Navigation
Network Diagram
Network Types
- WAN
- LAN
- Peer to Peer
Fiber Optic Cable
Switches and Hubs
Servers
- IP Addresses
Topologies
- Star
- Bus
- Ring
Firewalls
Routers
Wireless Networks
The Internet
References
24. References
Intel Corporation, (2004). www.intel.com. Retrieved May 11, 2007,
from .The Journey Inside: The Internet. website:
http://www97.intel.com/discover/JourneyInside/TJI_Internet/default.asp
x
Webdopedia (2007). http://www.webopedia.com/. Retrieved May 11,
2007, online dictionary and search engine you need for computer and
Internet technology definitions. http://www.webopedia.com/.
Editor's Notes
I tried to keep the colors oranges, tans, and black for consistency throughout my presentation. I also felt a border throughout my project would make it stand out more. I kept the font at Arial throughout the presentation. The only change that I used was to bold it and highlight with colors here and there.
I especially liked this graphic. I felt it would be good for an introduction. While it wasn’t really in the color scheme, it was modern and caught people’s eye.
I wanted to use the dictionary version of the network to be both informative as well as a gimmick to catch attention. If I had a text box under the main title or text box I tried to differentiate it by making in yellow and orange borders. I tried to do this throughout the presentation.
I used this page to help explain the navigational links. Being the networking is foreign to so many, I felt this might be effective.
I wanted to present this diagram to help the viewer visually understand how a computer network was set-up. I linked each component to the same text links throughout the project.
I used this slide as a Introduction to the different types of networks. I tried to let the graphics do the talking on this slide. I elaborated more on each network type on subsequent slides.
I kept the graphic the same as the previous graphic representing the Wide Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
I kept the graphic the same as the previous graphic representing the Local Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
I kept the graphic the same as the previous graphic representing the Peer to Peer Area Network in hopes of creating a degree familiarity. I also include some basic facts about it.
I felt this fiber optic cable graphic was a great graphic in that it, not only showed the fiber optic glass cables but, the colors fit in well with my project. I also wanted to show a small picture of a traditional wire cable just to contrast the two.
I used the same principle with switches and hubs as I did with the fiber optic cable in that I tried to contrast the newer component (switches) with the older ones (hubs). They two are hard to differentiate and look very similar but, I tried to outline the components below.
There is a lot of information that could be elaborated on in regards to servers but, I chose to make brief comments about Print, File, and Web servers. I tried to use contrasting colors to make it effective.
IP addresses tend to go along with servers, especially web servers in that they store data for websites. Once again there is a good deal of information on this slide and I might could have separated Static and Temporary IP addresses into separate slides but I felt a side by side comparison was effective.
The topology section of my presentation may have been a little confusing for those who are not in the IT or networking field. I tried to explain the process and function of topologies using the three subsequent slides and the features of each topology.
I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
I wanted to beak each of these down so it could be explained and understood better. While topology diagrams can be easily understood in the IT field they may be a little hard to grasp to average person.
I used to same graphic from the network diagram to get my point across and hopefully, be able to use it to create some familiarity. I tried to keep the graphics and explanations easy to understand by anyone viewing my presentation.
Once again, I tried to pull graphics from the original network diagram. I had to alter the wireless router graphic in Photoshop to make it look better. I darken the and removed a white background to make it look consistent in relation to the standard router.
I pull this graphic on the original network diagram. Use the radio waves to demonstrate that the network was wireless. I also wanted to notate a big advantage of wireless network by putting it in orange.
I used three slides to go over the Internet. I wanted to start of the first slide with a basic statement but, it would have an impact on the viewer.
I felt that although a lot of information was on this slide, I feel it was not too crowded and well places. I used color coding on the packet to help the reader determine where it should go.
I would have like to use some animation for this but it would have been very difficult so I went ahead and use green and red colors to represent the flowing in data into the Internet and the flowing of data out of the Internet. I wanted to stress that data does not take the same path all the time when traveling to and from the Internet.
The two main references that I pulled information from was Intel Corp. and a Webdopedia website which provided definitions and descriptions of various network components.