SlideShare a Scribd company logo
NETWORKS, &
SAFEGUARDS THE
WIRED & WIRELESS
WORLD
Douglas C. Pippen
American Military University
Introduction
Growth is suppose to happen over time and gradually, but for
technology the last few years it has taken off. Going from Analog
to digital, and going from wired to wireless. Also the security has
evolved, but so has the threats. With so many changes and so
fast one must remain current on all technology updates and
threats.
Analog to Digital
When thinking about Analog to Digital, all you have to do is look
at your TV set.
This tech jump has been more notable because everyone has a TV.
Modem
I see a modem as a bridge that connects to highways, but you
have to pay the toll to use it.
A modem is a combined device for modulation and
demodulation, for example, between the digital data of a
computer and the analog signal of a telephone line.
Networks
A series of points interconnected by communication paths.
Wired Communication
There are 3 types of wired communication media. Twisted,
Coaxial, and Fiber-optic cable.
Even though these wires are different and do different things.
They play an integrate role in networking and bringing
communication together. I have version fios and I have all 3 wires
in use right now.
Wireless Communication Media
Wireless communication is thought of as cell phones and laptops,
but wireless communication is known as:
Infrared transmission
Broadcast Radio
Cellular Radio
Microwave Radio
Communications Satellites
Cyberthreats, Hackers, &
Safeguards
Conclusion
Here we have covered Analog to Digital, how networks work,
wired communication media, wireless communications media,
and cyberthreats, hackers, and safeguards. All of these things
have one thing in common. They are all communication avenues
that we use everyday. Rather it be business or personal.
Referances
• https://www.youtube.com/watch?v=M_nTmRtAD98
•
• http://www.sctv.com.vn/en/news/75/hdtvfaqswhatisthedifferencebetweendigitaltvandanalogtv?.html
•
• http://computer.howstuffworks.com/modem1.htm
•
• Using Information Technology: A practical Introduction to Computers & Communication, Complete Tenth Edition,
McGraw-Hill 2013 Page 317
•
• http://upload.wikimedia.org/wikipedia/en/1/12/Sample-network-diagram.png
•
•
• https://www.youtube.com/watch?v=EWTJKcg7Pj8
•
• http://rodrepel.com/blog/blog/rodents-a-threat-to-fiber-optics/
•
• http://www.homedepot.com/b/Electrical-Wire-Coaxial-Cable/N-5yc1vZc59v
•
• http://en.wikipedia.org/wiki/File:UTP_cable.jpg
•
• https://www.youtube.com/watch?v=le5IJhja5C0
•

More Related Content

What's hot

Nirbhay seminar
Nirbhay seminarNirbhay seminar
Nirbhay seminar
yourloving18
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
FARAZ QURESHI(BLACK HAT)
 
Ck sharma
Ck sharmaCk sharma
Ck sharma
ChetanBhardwaj19
 
Blog tetradbushm
Blog tetradbushmBlog tetradbushm
Blog tetradbushmmarbush50
 
Mr Mechaly Alcatel Lucent IP at all stages
Mr Mechaly Alcatel Lucent IP at all stagesMr Mechaly Alcatel Lucent IP at all stages
Mr Mechaly Alcatel Lucent IP at all stagesIDATE DigiWorld
 
LI-FI TECHNOLOGY ( an emerging technology)
LI-FI TECHNOLOGY ( an emerging technology) LI-FI TECHNOLOGY ( an emerging technology)
LI-FI TECHNOLOGY ( an emerging technology)
Anil Kumar
 
LiFi technology
LiFi technologyLiFi technology
LiFi technology
Md. Tasdikul Islam Khan
 
IOT
IOTIOT
Lifi - Light Fidelity
Lifi - Light FidelityLifi - Light Fidelity
Lifi - Light Fidelity
Rohit Jain
 
What is the technology behind wireless communication
What is the technology behind wireless communicationWhat is the technology behind wireless communication
What is the technology behind wireless communication
Paul van Greene
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
Calen Legaspi
 
Li fi presentation final
Li fi presentation finalLi fi presentation final
Li fi presentation final
Amit kumar
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
Rajendra Dangwal
 
SMIL it should all be open and on the Internet
SMIL it should all be open and on the InternetSMIL it should all be open and on the Internet
SMIL it should all be open and on the Internet
signagelive
 
Nightmare on Connected Street
Nightmare on Connected StreetNightmare on Connected Street
Nightmare on Connected Street
gvanderh
 
Lifi (Light Fidility)
Lifi (Light Fidility)Lifi (Light Fidility)
Lifi (Light Fidility)
Vishal Mittal
 
Li fi
Li fiLi fi
Digital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics TrendspottingDigital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics Trendspotting
UCSD Cntr For Astrophysics & Space Science; The Clarke Cntr For Human Imagination
 

What's hot (20)

Nirbhay seminar
Nirbhay seminarNirbhay seminar
Nirbhay seminar
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
 
Ck sharma
Ck sharmaCk sharma
Ck sharma
 
Blog tetradbushm
Blog tetradbushmBlog tetradbushm
Blog tetradbushm
 
Presentation2
Presentation2Presentation2
Presentation2
 
Mr Mechaly Alcatel Lucent IP at all stages
Mr Mechaly Alcatel Lucent IP at all stagesMr Mechaly Alcatel Lucent IP at all stages
Mr Mechaly Alcatel Lucent IP at all stages
 
LI-FI TECHNOLOGY ( an emerging technology)
LI-FI TECHNOLOGY ( an emerging technology) LI-FI TECHNOLOGY ( an emerging technology)
LI-FI TECHNOLOGY ( an emerging technology)
 
LiFi technology
LiFi technologyLiFi technology
LiFi technology
 
IOT
IOTIOT
IOT
 
Lifi - Light Fidelity
Lifi - Light FidelityLifi - Light Fidelity
Lifi - Light Fidelity
 
What is the technology behind wireless communication
What is the technology behind wireless communicationWhat is the technology behind wireless communication
What is the technology behind wireless communication
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
Li fi presentation final
Li fi presentation finalLi fi presentation final
Li fi presentation final
 
Li Fi Technology
Li Fi TechnologyLi Fi Technology
Li Fi Technology
 
SMIL it should all be open and on the Internet
SMIL it should all be open and on the InternetSMIL it should all be open and on the Internet
SMIL it should all be open and on the Internet
 
Nightmare on Connected Street
Nightmare on Connected StreetNightmare on Connected Street
Nightmare on Connected Street
 
Lifi (Light Fidility)
Lifi (Light Fidility)Lifi (Light Fidility)
Lifi (Light Fidility)
 
Li fi
Li fiLi fi
Li fi
 
Li fi
Li fiLi fi
Li fi
 
Digital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics TrendspottingDigital Media and Consumer Electronics Trendspotting
Digital Media and Consumer Electronics Trendspotting
 

Similar to Wk5 Presentation

MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docxMACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
infantsuk
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
Custom Paper Writing Murrieta
 
Wireless Communication Has Changed Our World
Wireless Communication Has Changed Our WorldWireless Communication Has Changed Our World
Wireless Communication Has Changed Our World
Can Someone Write My Paper Waltham
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
Deborah Gastineau
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and180192
 
Mobile computing
Mobile computingMobile computing
Mobile computingLi Zhao
 
basics information of technology
basics information of technologybasics information of technology
basics information of technology
Mansi sharma
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techcheqala5626
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
AnneilynLeal
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
Tara Hardin
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
Punit Kumar
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
Eshwar Prasad
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vfJustino Lourenço
 
Gi-Fi Technology
Gi-Fi TechnologyGi-Fi Technology
Gi-Fi Technology
Carmen Sanborn
 
Essay On Wireless Technology
Essay On Wireless TechnologyEssay On Wireless Technology
Essay On Wireless Technology
Paper Writer Services
 
Computer communication
Computer communicationComputer communication
Computer communication
Sadam Hussain ✅
 
Career oppurtunities in the field of
Career oppurtunities in  the field ofCareer oppurtunities in  the field of
Career oppurtunities in the field of
sushruth kamarushi
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
Mandar Pathrikar
 

Similar to Wk5 Presentation (19)

MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docxMACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
MACQUARIE UNIVERSITY ELECTRONIC ENGINEERING 1Future Tech W.docx
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
Wireless Communication Has Changed Our World
Wireless Communication Has Changed Our WorldWireless Communication Has Changed Our World
Wireless Communication Has Changed Our World
 
It 241 Week 1 Cp Essay
It 241 Week 1 Cp EssayIt 241 Week 1 Cp Essay
It 241 Week 1 Cp Essay
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
basics information of technology
basics information of technologybasics information of technology
basics information of technology
 
Chp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce techChp 6 infrastructure- the backbone of e-commerce tech
Chp 6 infrastructure- the backbone of e-commerce tech
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
M mwave
M mwaveM mwave
M mwave
 
Uses Of Voice Over Internet Protocol
Uses Of Voice Over Internet ProtocolUses Of Voice Over Internet Protocol
Uses Of Voice Over Internet Protocol
 
Punit kumar
Punit kumarPunit kumar
Punit kumar
 
Wireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdfWireless Communications - Presentation.pdf
Wireless Communications - Presentation.pdf
 
Digital footprint@artesis vf
Digital footprint@artesis vfDigital footprint@artesis vf
Digital footprint@artesis vf
 
Gi-Fi Technology
Gi-Fi TechnologyGi-Fi Technology
Gi-Fi Technology
 
Essay On Wireless Technology
Essay On Wireless TechnologyEssay On Wireless Technology
Essay On Wireless Technology
 
Computer communication
Computer communicationComputer communication
Computer communication
 
Career oppurtunities in the field of
Career oppurtunities in  the field ofCareer oppurtunities in  the field of
Career oppurtunities in the field of
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Wk5 Presentation

  • 1. NETWORKS, & SAFEGUARDS THE WIRED & WIRELESS WORLD Douglas C. Pippen American Military University
  • 2. Introduction Growth is suppose to happen over time and gradually, but for technology the last few years it has taken off. Going from Analog to digital, and going from wired to wireless. Also the security has evolved, but so has the threats. With so many changes and so fast one must remain current on all technology updates and threats.
  • 3. Analog to Digital When thinking about Analog to Digital, all you have to do is look at your TV set.
  • 4. This tech jump has been more notable because everyone has a TV.
  • 5. Modem I see a modem as a bridge that connects to highways, but you have to pay the toll to use it.
  • 6. A modem is a combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a telephone line.
  • 7. Networks A series of points interconnected by communication paths.
  • 8.
  • 9. Wired Communication There are 3 types of wired communication media. Twisted, Coaxial, and Fiber-optic cable. Even though these wires are different and do different things. They play an integrate role in networking and bringing communication together. I have version fios and I have all 3 wires in use right now.
  • 10. Wireless Communication Media Wireless communication is thought of as cell phones and laptops, but wireless communication is known as: Infrared transmission Broadcast Radio Cellular Radio Microwave Radio Communications Satellites
  • 12. Conclusion Here we have covered Analog to Digital, how networks work, wired communication media, wireless communications media, and cyberthreats, hackers, and safeguards. All of these things have one thing in common. They are all communication avenues that we use everyday. Rather it be business or personal.
  • 13. Referances • https://www.youtube.com/watch?v=M_nTmRtAD98 • • http://www.sctv.com.vn/en/news/75/hdtvfaqswhatisthedifferencebetweendigitaltvandanalogtv?.html • • http://computer.howstuffworks.com/modem1.htm • • Using Information Technology: A practical Introduction to Computers & Communication, Complete Tenth Edition, McGraw-Hill 2013 Page 317 • • http://upload.wikimedia.org/wikipedia/en/1/12/Sample-network-diagram.png • • • https://www.youtube.com/watch?v=EWTJKcg7Pj8 • • http://rodrepel.com/blog/blog/rodents-a-threat-to-fiber-optics/ • • http://www.homedepot.com/b/Electrical-Wire-Coaxial-Cable/N-5yc1vZc59v • • http://en.wikipedia.org/wiki/File:UTP_cable.jpg • • https://www.youtube.com/watch?v=le5IJhja5C0 •