Modul 1 English
Modul 1 English
“Hey Shad, are you online?” “Of course, I am!” How many of us still think about whether or not
we are “online”? We expect our devices, cell phones, tablets, laptops and desktop computers to
always be connected to the global internet. We use this network to interact with our friends, shop,
share pictures and experiences, and learn. The internet has become such a part of everyday life
that we almost take it for granted.
Normally, when people use the term internet, they are not referring to the physical connections in
the real world. Rather, they tend to think of it as a formless collection of connections. It is the
“place” people go to find or share information.
Everything that you access online is located somewhere on the global internet. Social media
sites, multiplayer games, messaging centers that provide email, online courses — all of these
internet destinations are connected to local networks that send and receive information through
the internet.
Think about all of the interactions that you have during the day which require you to be online.
Local Networks
Local networks come in all sizes. They can range from simple networks consisting of two
computers, to networks connecting hundreds of thousands of devices. Networks installed in
small offices, or homes and home offices, are referred to as small office/home office (SOHO)
networks. SOHO networks let you share resources such as printers, documents, pictures, and
music, between a few local users.
In business, large networks can be used to advertise and sell products, order supplies, and
communicate with customers. Communication over a network is usually more efficient and less
expensive than traditional forms of communication, such as regular mail or long distance phone
calls. Networks allow for rapid communication such as email and instant messaging, and provide
consolidation and access to information stored on network servers.
Business and SOHO networks usually provide a shared connection to the internet. The internet
is considered a "network of networks" because it is literally made up of thousands of local
networks that are connected to each other.
The SOHO network allows computers in a home office or a remote office to connect to a
corporate network, or access centralized, shared resources.
Medium to large networks, such as those used by corporations and schools, can have many
locations with hundreds or thousands of interconnected hosts.
The internet is a network of networks that connects hundreds of millions of computers world-
wide.
Mobile Devices
The internet connects more computing devices than just desktop and laptop computers. There
are devices all around that you may interact with on a daily basis that are also connected to the
internet. These include mobile devices, home devices, and a variety of other connected devices.
Smartphone
Smartphones are able to connect to the Internet from almost anywhere. Smart phones combine
the functions of many different products together, such as a telephone, camera, GPS receiver,
media player, and touch screen computer.
Tablet
Tablets, like smartphones, also have the functionality of multiple devices. With the additional
screen size, they are ideal for watching videos and reading magazines or books. With on-screen
keyboards, users are able to do many of the things they used to do on their laptop computer,
such as composing emails or browsing the web.
Smartwatch
A smartwatch can connect to a smart phone to provide the user with alerts and messages.
Additional functions, such as heart rate monitoring and counting steps, like a pedometer, can
help people who are wearing the device to track their health.
Smart Glasses
A wearable computer in the form of glasses, such as Google Glass, contains a tiny screen that
displays information to the wearer in a similar fashion to the Head-Up Display (HUD) of a fighter
pilot. A small touch pad on the side allows the user to navigate menus while still being able to
see through the smart glasses.
Connected Home Devices
Many of the things in your home can also be connected to the internet so that they can be
monitored and configured remotely.
Security System
Many of the items in a home, such as security systems, lighting, and climate controls, can be
monitored and configured remotely using a mobile device.
Appliances
Household appliances such as refrigerators, ovens, and dishwashers can be connected to the
Internet. This allows the homeowner to power them on or off, monitor the status of the appliance,
and also be alerted to preset conditions, such as when the temperature in the refrigerator rises
above an acceptable level.
Smart TV
A smart TV can be connected to the Internet to access content without the need for TV service
provider equipment. Also, a smart TV can allow a user to browse the web, compose email, or
display video, audio, or photos stored on a computer.
Gaming Console
Gaming consoles can connect to the internet to download games and play with friends online.
Smart Cars
Many modern cars can connect to the Internet to access maps, audio and video content, or
information about a destination. They can even send a text message or email if there is an
attempted theft or call for assistance in case of an accident. These cars can also connect to
smart phones and tablets to display information about the different engine systems, provide
maintenance alerts, or display the status of the security system.
RFID Tags
Radio frequency identification (RFIDs) tags can be placed in or on objects to track them or
monitor sensors for many conditions.
Most people use networks to transmit their data in order to share with others, or for long-term
storage. Every time you hit “send” or “share” in an app or computer application, you are telling
your device to send your data to a destination somewhere on the network. Sometimes, data is
being sent by your devices and you may not even be aware that this is happening. Examples of
this are when you set up an automatic backup utility, or when your device automatically searches
for the router in a Wi-Fi hotspot.
Volunteered data - This is created and explicitly shared by individuals, such as social
network profiles. This type of data might include video files, pictures, text or audio files.
Observed data - This is captured by recording the actions of individuals, such as
location data when using cell phones.
Inferred data - This is data such as a credit score, which is based on analysis of
volunteered or observed data.
The Bit
Did you know that computers and networks only work with binary digits, zeros and ones? It can
be difficult to imagine that all of our data is stored and transmitted as a series of bits. Each bit
can only have one of two possible values, 0 or 1. The term bit is an abbreviation of “binary digit”
and represents the smallest piece of data. Humans interpret words and pictures, computers
interpret only patterns of bits.
A bit is stored and transmitted as one of two possible discrete states. This can include two
directions of magnetization, two distinct voltage or current levels, two distinct levels of light
intensity, or any other physical system of two discrete states. For example, a light switch can be
either On or Off; in binary representation, these states would correspond to 1 and 0 respectively.
Every input device (mouse, keyboard, voice-activated receiver) will translate human interaction
into binary code for the CPU to process and store. Every output device (printer, speakers,
monitors, etc.) will take binary data and translate it back into human recognizable form. Within
the computer itself, all data is processed and stored as binary.
Computers use binary codes to represent and interpret letters, numbers and special characters
with bits. A commonly used code is the American Standard Code for Information Interchange
(ASCII). With ASCII, each character is represented by eight bits. For example:
Each group of eight bits, such as the representations of letters and numbers, is known as a byte.
Codes can be used to represent almost any type of information digitally including computer data,
graphics, photos, voice, video, and music.
In the figure, enter up to five characters in the Characters field, then click the Show Me button to
see the ASCII bit translation. Click Reset to enter a different group of characters.
Click Play in the figure to see an animation of the three types of signal transmissions.
In most homes and small businesses, network signals are transmitted across copper wires
(cables) or Wi-Fi enabled wireless connections. Larger networks employ fiber-optic cables in
order to reliably carry signals for longer distances.
Check Your Understanding - Data
Transmission
Check your understanding of data transmission by choosing the correct answer to the following
questions.
1. A basic unit of information that represents one of two discrete states is known as a:
2. When using your credit card to make purchases at several places, the credit card
company can use this information to learn about your location and your preferences. This
type of personal data is known as:
Bandwidth
Streaming a movie or playing a multiplayer game requires reliable, fast connections. To support
these “high bandwidth” applications, networks have to be capable of transmitting and receiving
bits at a very high rate.
Different physical media support the transfer of bits at different speeds. The rate of data transfer
is usually discussed in terms of bandwidth and throughput.
Bandwidth is the capacity of a medium to carry data. Digital bandwidth measures the amount of
data that can flow from one place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent across the media in a second.
Common bandwidth measurements are as follows:
Physical media properties, current technologies, and the laws of physics all play a role in
determining available bandwidth.
The table shows the commonly used units of measure for bandwidth.
h.
Throughput
Like bandwidth, throughput is the measure of the transfer of bits across the media over a given
period of time. However, due to a number of factors, throughput does not usually match the
specified bandwidth. Many factors influence throughput including:
The amount of data being sent and received over the connection
The types of data being transmitted
The latency created by the number of network devices encountered between source and
destination
Latency refers to the amount of time, including delays, for data to travel from one given point to
another.
Throughput measurements do not take into account the validity or usefulness of the bits being
transmitted and received. Many messages received through the network are not destined for
specific user applications. An example would be network control messages that regulate traffic
and correct errors.
In an internetwork or network with multiple segments, throughput cannot be faster than the
slowest link of the path from sending device to the receiving device. Even if all or most of the
segments have high bandwidth, it will only take one segment in the path with lower bandwidth to
create a slowdown of the throughput of the entire network.
There are many online speed tests that can reveal the throughput of an internet connection.
2. Which of the following measurements includes any latency encountered during data
transmissions?
This figure depicts a client PC and a server connected through a cloud symbolizing the
Internet
Servers are hosts that have software installed which enable them to provide information, like
email or web pages, to other hosts on the network. Each service requires separate server
software. For example, a host requires web server software in order to provide web services to
the network. Every destination that you visit online is provided to you by a server located
somewhere on a network that is connected to the global internet.
Clients are computer hosts that have software installed that enables the hosts to request and
display the information obtained from the server. An example of client software is a web browser,
such as Internet Explorer, Safari, Mozilla Firefox, or Chrome.
Type Description
The email server runs email server software. Clients use mail client software, such as
Email
Microsoft Outlook, to access email on the server.
The web server runs web server software. Clients use browser software, such as
Web
Windows Internet Explorer, to access web pages on the server.
The file server stores corporate and user files in a central location. The client devices
File
access these files with client software such as the Windows File Explorer.
Peer-to-Peer Networks
Client and server software usually run on separate computers, but it is also possible for one
computer to run both client and server software at the same time. In small businesses and
homes, many computers function as the servers and clients on the network. This type of network
is called a peer-to-peer (P2P) network.
The simplest P2P network consists of two directly connected computers using either a wired or
wireless connection. Both computers are then able to use this simple network to exchange data
and services with each other, acting as either a client or a server as necessary.
Multiple PCs can also be connected to create a larger P2P network, but this requires a network
device, such as a switch, to interconnect the computers.
The main disadvantage of a P2P environment is that the performance of a host can be slowed
down if it is acting as both a client and a server at the same time. The figure lists some of the
advantages and disadvantages of peer-to-peer networks.
In larger businesses, because of the potential for high amounts of network traffic, it is often
necessary to have dedicated servers to support the number of service requests.
The advantages and disadvantages of P2P networking are summarized in the figure.
The figure shows a small network with three devices. A printer is on the left, connected to a print
sharing PC in the middle, which is also connected to a file sharing PC on the right. Under the
topology is a list of the advantages and disadvantage of peer-to-peer networking.
Easy to set up
Less complex
Lower cost because network devices and dedicated servers may not be required
Can be used for simple tasks such as transferring files and sharing printers
No centralized administration
Not as secure
Not scalable
All devices may act as both clients and servers which can slow their performance
Peer-to-Peer Applications
A P2P application allows a device to act as both a client and a server within the same
communication, as shown in the figure. In this model, every client is a server and every server is
a client. P2P applications require that each end device provide a user interface and run a
background service.
Some P2P applications use a hybrid system where resource sharing is decentralized, but the
indexes that point to resource locations are stored in a centralized directory. In a hybrid system,
each peer accesses an index server to get the location of a resource stored on another peer.
The figure depicts a Instant Message conversation with two machines communicating with each
other through the network. Each machine is acting as both a client and server. The caption states
Both clients can simultaneously send and receive messages.
Additionally, a single computer can run multiple types of server software. In a home or small
business, it may be necessary for one computer to act as a file server, a web server, and an
email server.
A single computer can also run multiple types of client software. There must be client software
for every service required. With multiple clients installed, a host can connect to multiple servers
at the same time. For example, a user can check email and view a web page while instant
messaging and listening to internet radio.
Check Your Understanding - Clients and
Servers
Check your understanding of clients and servers by choosing the correct answer to the following
questions.
1. A computer that has software installed to provide information such as email or web pages
to other devices is known as a:
2. A smart phone uses web browser software to request and display a web page. The smart
phone is considered what type of computer?
3. A network where two computers are communicating with each other as both a client and
as a server is known as a:
Network Infrastructure
The path that a message takes from its source to destination can be as simple as a single cable
connecting one computer to another, or as complex as a network that literally spans the globe.
This network infrastructure is the platform that supports the network. It provides the stable and
reliable channel over which our communications can occur.
The network infrastructure contains three categories of hardware components, as shown in the
figure:
End devices
Intermediate devices
Network media
Devices and media are the physical elements, or hardware, of the network. Hardware is often the
visible components of the network platform such as a laptop, PC, switch, router, wireless access
point, or the cabling used to connect the devices. Occasionally, some components may not be so
visible. In the case of wireless media, messages are transmitted through the air using invisible
radio frequencies or infrared waves.
Make a list of the network infrastructure components installed in your home network. Include the
cables or wireless access points that provide your network connections.
End Devices
The network devices that people are most familiar with are called end devices, or hosts. These
devices form the interface between users and the underlying communication network.
An end device (or host) is either the source or destination of a message transmitted over the
network, as shown in the animation. In order to uniquely identify hosts, addresses are used.
When a host initiates communication, it uses the address of the destination host to specify where
the message should be sent.
Click Play in the figure to see an animation of data flowing through a network.
Check Your Understanding - Identify End and
Intermediary Devices
1. Which two devices would be described as intermediary devices? (Choose two.)
The internet is a worldwide collection of interconnected networks, cooperating with each other to
exchange information using common standards. Using the internet, we can exchange information
through telephone wires, fiber-optic cables, wireless transmissions, and satellite links. The
internet is considered a "network of networks" because it is literally made up of thousands of
local networks that are connected to each other. The internet connects more computing devices
than just desktop and laptop computers. There are devices all around that you may interact with
on a daily basis that are also connected to the internet.
Data Transmission
Volunteered data is created and explicitly shared by individuals, such as social network profiles.
Inferred data, such as a credit score, is based on analysis of volunteered or observed data.
Observed data is captured by recording the actions of individuals, such as location data when
using cell phones. A bit can only have one of two possible values, 0 or 1. Each group of eight
bits, such as the representations of letters and numbers, is known as a byte. There are three
common methods of signal transmission used in networks: electrical, optical, and wireless.
The rate of data transfer is usually discussed in terms of bandwidth and throughput. Bandwidth is
typically measured in the number of bits that (theoretically) can be sent across the media in a
second. Throughput measures the transfer of bits across the media over a given period of time.
Many factors influence throughput including the amount of data being sent and received over the
connection, the types of data being transmitted, and the latency created by the number of
network devices encountered between source and destination. Latency is the amount of time,
including delays, for data to travel from one given point to another.
Servers are hosts that have software installed that enable them to provide information, like email
or web pages, to other hosts on the network. Clients are computer hosts that have software
installed that enable them to request and display the information obtained from the server. In
small businesses and homes, many computers function as the servers and clients on the
network. This type of network is called a peer-to-peer (P2P) network. The simplest peer-to-peer
network consists of two directly connected computers using either a wired or wireless
connection. A P2P application allows a device to act as both a client and a server within the
same communication. In this model, every client is a server and every server is a client. In a
home or small business, it may be necessary for one computer to act as a file server, a web
server, and an email server. A single computer can also run multiple types of client software.
There must be client software for every service used.
Network Components
4. What is the delay in the amount of time for data to travel between two points on a
network?
5. What type of network is defined by two computers that can both send and receive
requests for resources?
7. What type of network must a home user access in order to do online shopping?
Refer to the exhibit. Which term correctly identifies the device type that is included in the
area B?