ICF 8 Book2
ICF 8 Book2
Objectives:
1. Define network.
2. Determine some Network Standards.
3. Identify different types of network.
What is a Network?
Two or more computers connected together to share resources and information is called
Network.
“Living online” refers to the process of being able to connect to the Internet and find
information whenever it is needed.
Networking Standards
1. When two or more computers interconnected to communicate and share resources, you have a
network.
2. Protocols are rules governing that we need to follow in Networking. Example: type of cables,
interface cards, and electrical signal format.
3. Also govern how information flows between computers on network called transport protocols:
– indicates how computer needs to send information over network.
– how receiving computer checks that information was received correctly.
– how sending computer must address information so it goes to correct destination
computer.
4. Application level protocols determine how program on one computer communicates with
program on another computer.
Types of Network
Client-Server Network
Peer-to-peer Network
LAN (Local Area Network)
WAN (Wide Area Network)
Client - Server Networks
Central Server computer as all files stored here.
Provides better performance and security as server controls (who can access, what resources
and when to send).
Server can be in any type of computer with server software installed, and users clearly identified
with access rights.
Client computer can be in any type of computer with network card and appropriate software to
connect to server.
Typical on large networks where one computer (network server) dedicated to controlling
network traffic and managing resources.
Peer-to-Peer Networks
It is known as PC to PC Network.
Called peer-to-peer because all computers have equal authority.
Ideal for home and small office networks.
Inexpensive and easy to put together.
Objectives:
1. Identify some requirements in order to connect to a network.
2. Enumerate the advantages and disadvantages of being connected to a network.
1. Connections/Cabling Options
a) Coaxial CABLE Wire with center wire surrounded with insulation and then grounded cover of
braided wire.
b) Fiber Optics Made up of bundled glass or plastic fibers (threads) to transmit data.
c) Broadband Single wire that can handle multiple paths or channels.
d) Wireless Work with radio frequencies for data transmission.
e) Infrared Wireless option works with infrared light waves to transmit data.
2. The Network Interface Card (NIC)
To connect to network, PC must have network interface card (NIC)
Each NIC has unique number or address and connector appropriate for type of cabling chosen.
Come in variety of styles and models appropriate for computer type being connected to
network.
3. The Hub
Connects all Personal Computers together to form a network:
– Cable from NIC in each PC connects to port on hub.
– Cable from hub required to connect to network
Relatively inexpensive to purchase and install
Main disadvantage of hub is all users connected to hub share equal maximum transfer speed.
The Switch
Works similar to hub, each user connected to switch has access to full bandwidth.
Can also be used to join network segments.
Network Segments
If network has two or more network interface cards, each card considered a segment.
Segments allow network traffic to flow faster, depending on which devices are used to manage
amount of requests at network.
The Bridge
Connects network segments to handle network requests.
Do not analyze or re-route messages which makes receiving information faster
Will not re-route or re-transmit information if anything is wrong with connection at either end
until first transmission received completely.
The Router
Works similar to bridges except examines destination address of information and pass it on
appropriate segments only.
Bridges may be faster than routers but will not check information coming in.
When installing wireless router to network, be sure to set up encryption security options to
prevent unauthorized access from external sources using connection.
The Firewall
Can be physical device or specialized software installed to prevent any unauthorized external
access into any network connected to Internet.
Designed to check any messages that travel through network and ensure it matches specified
security requirements set up by company.
Advantages of Networking
1. Communication
To send information generated on stand-alone PC requires manual process whereas users on
network send information electronically.
Messages can be stored on network and are not lost if recipient isn’t available when messages
sent or received
Many communication software allows users to instantly message someone else without using
e-mail
– “Real time interaction”
– Multiple users can participate in same conversation
– Some limitations but can be minor issues in exchange for ability to communicate with
each other in real time.
2. Sharing Resources
A. Sharing Devices
Some devices can be expensive to set up on every PC and networking allows devices to be
shared.
Can be cost savings for capital expenditures as well as productivity time for technical support or
maintenance.
Connecting devices shared by multiple users via network allows Network Administrator to perform
updates or troubleshoot problems from server location.
Sharing Information
In network environment, files or folders on any disk can be set up to be shared.
Whenever group of people want to share information, referred to as workgroup.
– Group of users who share business documents transfer or save files to common
network.
– Common network becomes centralized server wherein server has control over which
files are accessed and which users can use those files.
Extremely helpful to network administrator for setting up rights or performing maintenance for
workgroups.
Disadvantages of Networking
Security Risk
Every person who logs into server has valid login id and password, and set up according to
company’s standards.
When setting up new user, ensure name and information about user entered correctly.
Audit each user to ensure access rights to programs and files are same.
Requests received for access rights must have signature from corresponding manager.
Delete users who no longer work for company.
Do not ever give out passwords.
Staff who work with network administrator should have own login id and password set up
Firewall set up for Internet connection that has been set up to check user id when sending or
receiving messages
If access authorized for users outside network, ensure firewall checks these user ids when
request received to access network from remote location.
Restrict any users from being able to delete files from any folder on any network drives.
Antivirus program installed on server is current and has latest protection files.
Perform maintenance checks periodically as well to see what activities may have occurred
Encourage users to have latest updates of Windows on local computers.
Viruses
Vulnerable to virus attacks.
Some viruses, called worm viruses, specifically target servers.
New viruses being created every day and it becomes more prudent to read screen carefully
before automatically opening message or clicking highlighted button on screen.
All antivirus programs provide a feature to automatically detect in “real time”.
Remember to run scan of computer on frequent basis and check for updates.
Lesson 2: Looking at the Internet
Objectives:
1. Define Internet.
2. What an Internet Service Provider (ISP) is?
a. The requirements in order to connect to the internet.
b. The services provided by the ISP.
3. Recognize Intranet and Extranet.
Intranet
Private local area network in company that uses same set of network protocols as Internet
Intranet connected to Internet so employees can access resources on Internet and communicate
via electronic mail with external contacts
Danger that confidential information on intranet can be accessed by external people so firewall
then placed between intranet and Internet
Extranet
Uses Internet technology to allow company to share information with another company or
organization for purposes of e-commerce
Higher risk for unauthorized access
Lesson 3: Getting Started
Objectives:
Objectives:
1. Gain knowledge on how to Start Internet Explorer Browser and
Open the Yahoo Web Page.
2. Then click the Go button that will activate action to go to the yahoo web site.
3. Wait until such time that the Yahoo Web Page appears.
Lesson 5 & 6: Surfing/ Searching for Information and Opening Other Web Sites
Objectives:
1. Define What is “Internet Surfing”.
2. Search information using Google AND Yahoo search engine.
What is E-Mail?
E-mail most popular means of Electronic Mailing which communicating from one computer to
another computer.
Follows same process as for postal mail
– Need to have name and address of recipient in order to have post office deliver.
Ways of communicating available:
– Instant messaging occurs on computers where feature included with e-mail program or
part of chat program where multiple conversations occur.
– Text messaging generally refers to the process of sending message but only text shown
at receiver’s end.