0% found this document useful (0 votes)
270 views9 pages

ICF 8 Book2

1. The document discusses networking fundamentals, including defining a network as two or more connected computers that share resources and information. 2. It describes requirements for connecting to a network such as cabling/connection options, a network interface card, a hub or switch, and potentially network segments connected by bridges or routers. 3. The advantages of networking include improved communication through electronic sharing of information, as well as shared access to devices and files/information stored on a network. However, networks also present disadvantages like dependency on the network, high expenses, security risks, reduced privacy, and potential for viruses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
270 views9 pages

ICF 8 Book2

1. The document discusses networking fundamentals, including defining a network as two or more connected computers that share resources and information. 2. It describes requirements for connecting to a network such as cabling/connection options, a network interface card, a hub or switch, and potentially network segments connected by bridges or routers. 3. The advantages of networking include improved communication through electronic sharing of information, as well as shared access to devices and files/information stored on a network. However, networks also present disadvantages like dependency on the network, high expenses, security risks, reduced privacy, and potential for viruses.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

INTERNET

Lesson 1.1: Networking Fundamentals

Objectives:
1. Define network.
2. Determine some Network Standards.
3. Identify different types of network.

What is a Network?
 Two or more computers connected together to share resources and information is called
Network.
 “Living online” refers to the process of being able to connect to the Internet and find
information whenever it is needed.

 Computers connected to network can be any type of computer.


– Each computer could be configured with different operating system.
No restrictions other than having network software understand rules and language needed to recognize
computer type and operating system.

Where the Personal Computer Fits


 PC most commonly used tool to connect to network
– Microprocessor chip is the “brain” of PC.
– Communicates with other components of PC via internal connecting device called “bus”.
– To communicate with external devices, PC needs interface card.
To connect PC to network, need interface card for type of network, suitable cable, and appropriate
software.

Networking Standards
1. When two or more computers interconnected to communicate and share resources, you have a
network.
2. Protocols are rules governing that we need to follow in Networking. Example: type of cables,
interface cards, and electrical signal format.
3. Also govern how information flows between computers on network called transport protocols:
– indicates how computer needs to send information over network.
– how receiving computer checks that information was received correctly.
– how sending computer must address information so it goes to correct destination
computer.
4. Application level protocols determine how program on one computer communicates with
program on another computer.

Types of Network
 Client-Server Network
 Peer-to-peer Network
 LAN (Local Area Network)
 WAN (Wide Area Network)
Client - Server Networks
 Central Server computer as all files stored here.
 Provides better performance and security as server controls (who can access, what resources
and when to send).
 Server can be in any type of computer with server software installed, and users clearly identified
with access rights.
 Client computer can be in any type of computer with network card and appropriate software to
connect to server.
 Typical on large networks where one computer (network server) dedicated to controlling
network traffic and managing resources.

Peer-to-Peer Networks
 It is known as PC to PC Network.
 Called peer-to-peer because all computers have equal authority.
 Ideal for home and small office networks.
 Inexpensive and easy to put together.

LAN and WAN


 Difference lies in who is responsible for cabling.
– LAN network stays within a building.
– WAN if network crosses public street and uses publicly-supplied cabling for part of
network.
When computer or LAN connected to another computer or LAN in another city or country, public
portion of WAN represented schematically by “cloud”.

Lesson 1.2: Networking Fundamentals

Objectives:
1. Identify some requirements in order to connect to a network.
2. Enumerate the advantages and disadvantages of being connected to a network.

Requirements in connecting to a Network?

1. Connections/Cabling Options
a) Coaxial CABLE Wire with center wire surrounded with insulation and then grounded cover of
braided wire.
b) Fiber Optics Made up of bundled glass or plastic fibers (threads) to transmit data.
c) Broadband Single wire that can handle multiple paths or channels.
d) Wireless Work with radio frequencies for data transmission.
e) Infrared Wireless option works with infrared light waves to transmit data.
2. The Network Interface Card (NIC)
 To connect to network, PC must have network interface card (NIC)
 Each NIC has unique number or address and connector appropriate for type of cabling chosen.
 Come in variety of styles and models appropriate for computer type being connected to
network.

3. The Hub
 Connects all Personal Computers together to form a network:
– Cable from NIC in each PC connects to port on hub.
– Cable from hub required to connect to network
 Relatively inexpensive to purchase and install
 Main disadvantage of hub is all users connected to hub share equal maximum transfer speed.

The Switch
 Works similar to hub, each user connected to switch has access to full bandwidth.
 Can also be used to join network segments.

Network Segments

 If network has two or more network interface cards, each card considered a segment.
 Segments allow network traffic to flow faster, depending on which devices are used to manage
amount of requests at network.

The Bridge
 Connects network segments to handle network requests.
 Do not analyze or re-route messages which makes receiving information faster
 Will not re-route or re-transmit information if anything is wrong with connection at either end
until first transmission received completely.
The Router
 Works similar to bridges except examines destination address of information and pass it on
appropriate segments only.
 Bridges may be faster than routers but will not check information coming in.
 When installing wireless router to network, be sure to set up encryption security options to
prevent unauthorized access from external sources using connection.

The Firewall
 Can be physical device or specialized software installed to prevent any unauthorized external
access into any network connected to Internet.
 Designed to check any messages that travel through network and ensure it matches specified
security requirements set up by company.

Advantages of Networking

The Advantages or Benefits of Networking


 Benefits of networking fall into two main categories:
1. Communication
2. Sharing of Resources:
a. Devices
b. Information
Note: Networking does not make individual workstations faster or more powerful!

1. Communication
 To send information generated on stand-alone PC requires manual process whereas users on
network send information electronically.
 Messages can be stored on network and are not lost if recipient isn’t available when messages
sent or received
 Many communication software allows users to instantly message someone else without using
e-mail
– “Real time interaction”
– Multiple users can participate in same conversation
– Some limitations but can be minor issues in exchange for ability to communicate with
each other in real time.

2. Sharing Resources
A. Sharing Devices
 Some devices can be expensive to set up on every PC and networking allows devices to be
shared.
 Can be cost savings for capital expenditures as well as productivity time for technical support or
maintenance.
Connecting devices shared by multiple users via network allows Network Administrator to perform
updates or troubleshoot problems from server location.

Sharing Information
 In network environment, files or folders on any disk can be set up to be shared.
 Whenever group of people want to share information, referred to as workgroup.
– Group of users who share business documents transfer or save files to common
network.
– Common network becomes centralized server wherein server has control over which
files are accessed and which users can use those files.
 Extremely helpful to network administrator for setting up rights or performing maintenance for
workgroups.

Using Dedicated Servers


 Network
– Control network traffic and security
– May perform same tasks and contain same information as file or database server
 File
– High speed, high capacity hard drive, usually to handle back-up needs
 Web
– Stores information in web format and information accessed with browser for company
intranets
 Mail
– Manages high volume of internal and external e-mail
 Database
– Generally used in complex database applications where many users need to access data
at same time.

Disadvantages of Networking

The Disadvantages of Networking


1. Dependency
2. Expensive
3. Security Risk
4. Loss of Autonomy or Privacy
5. Viruses
Dependency
 Big disadvantage in that organization’s activities dependent on network:
 If network fails, users lose access to information and ability to communicate
electronically.
 In some instances can work from local drive, but if company’s information stored and
shared from server, cost of downtime may be more expensive in long term.
Expensive
 For installation and maintenance
 If network complex with many users, additional need and expense to employ network
administrator
 Need “disaster and recovery” plan, not just for theft or security breach, but also power outages
or potential hardware failure
 Setting up or upgrading a network server should always be discussed with network
administrator or consultant who specializes in networks prior to making any decisions

Security Risk
 Every person who logs into server has valid login id and password, and set up according to
company’s standards.
 When setting up new user, ensure name and information about user entered correctly.
 Audit each user to ensure access rights to programs and files are same.
 Requests received for access rights must have signature from corresponding manager.
 Delete users who no longer work for company.
 Do not ever give out passwords.
 Staff who work with network administrator should have own login id and password set up
 Firewall set up for Internet connection that has been set up to check user id when sending or
receiving messages
 If access authorized for users outside network, ensure firewall checks these user ids when
request received to access network from remote location.
 Restrict any users from being able to delete files from any folder on any network drives.
 Antivirus program installed on server is current and has latest protection files.
 Perform maintenance checks periodically as well to see what activities may have occurred
 Encourage users to have latest updates of Windows on local computers.

Loss of Autonomy or Privacy


 Privacy may be concern for confidential material
“Private” drive set up on network for personal or confidential files but network administrator can
still see these files.
 If shared computer, even though they log in with their own id, they can still see files on local
area network.
Note: General business rules dictate that anything you work on a company computer belongs to the
company, even though you may work on it on your own time.

Viruses
 Vulnerable to virus attacks.
 Some viruses, called worm viruses, specifically target servers.
 New viruses being created every day and it becomes more prudent to read screen carefully
before automatically opening message or clicking highlighted button on screen.
 All antivirus programs provide a feature to automatically detect in “real time”.
 Remember to run scan of computer on frequent basis and check for updates.
Lesson 2: Looking at the Internet

Objectives:
1. Define Internet.
2. What an Internet Service Provider (ISP) is?
a. The requirements in order to connect to the internet.
b. The services provided by the ISP.
3. Recognize Intranet and Extranet.

Introducing the Telephone Network


The Telephone Network
 Two requirements to communicate successfully:
– need to know number of other person
– must speak same language
 Each country has organization responsible for telephone network in that country and ensure
network conforms to international telephony protocols or standards
 Network is multifunction and used for transmitting voice, facsimile and data information over
same network
The Computer Network (Internet)
Same principles for telephones apply to Internet.
Each country has network that conforms to international standards and form interconnected
network or Internet.
Any computer connected to Internet can “talk” to any other computer connected to Internet if:
– know number (internet account) of other computer
– computers speak same language
Set of protocols used by Internet
called TCP/IP.
Multifunctional
 Computers connected to Internet
typically:
– servers that provide services
– clients who use services
 Servers connected based on service
type
– Computer must use same protocol
– Client requirements handled by
browser
 Referred to as Super Information
Highway or Super Network
 Servers actually connect to Network Access Points that provide services to “get” items.
 Backbone of Internet.
Looking at Internet Service Providers (ISP)
 Represent method of getting relatively inexpensive access to Internet.
 Will obtain high-speed, high capacity (bandwidth) direct connection to network access point
that connects to Internet.
 Resells portion of that capacity to companies or individual users.
– User’s connection to the Internet paid for on set basis.
 Maintenance of connection lines
– Ensure lines work whenever users log in
– Inform all users about anticipated downtimes
 Maintenance of hardware or software used at ISP’s site
– Includes modems to connect to ISP’s server
– Updates for technology advances or software
 Customer support
 Technical support
 Protection against potential viruses or unauthorized access requests
 Maintenance of connection lines
– Ensure lines work whenever users log in
– Inform all users about anticipated downtimes
 Maintenance of hardware or software used at ISP’s site
– Includes modems to connect to ISP’s server
– Updates for technology advances or software
 Customer support
 Technical support
 Protection against potential viruses or unauthorized access requests
 Hardware and software considerations:
– What extra items will you need to purchase?
– Will you need to go with a wireless option?
– What extra services are you willing to pay for?
 Costs
– How much is the service and what does it include?
– Do you need all the services and is there a variety of packages?
 Choosing the ISP
– What about the reputation of the ISP?
– Can you rely on them for good and constant service?
– Is customer service more valuable than a low fee?
– Is ISP local or do you need to call a toll free number?
– How fast are the connections in your area?

Services Provided by the ISP


1. Telephone Access (Dial-up access)
 When set up account with ISP, get telephone number to dial to connect to ISP
 Need modem to convert message from sound to computer signal before it goes on the Internet
 Software to set up access included in Windows, or may be provided by ISP for installation
 Considered low bandwidth
 Connection can be very cost effective if:
– not sure how much time may spend on Internet
– only want to send or receive e-mail
2. TV Cable Access
 Process same as telephone access wherein cable modem needed to convert computer message
 Connected all the time to Internet
 Much faster than dial-up access but also more expensive
 Very popular option for home users as usually packaged with television cable services and very
fast speeds
3. Using Online Services
 Have their own networks with access points in most major cities
 Provide full range of services on their networks including electronic mail
 Most companies also have gateway between their networks and Internet so users access all
their
services as well as Internet
 Relatively inexpensive
 Requires modem to connect
 When set up account, necessary
software provided
 Very popular as sense of community
quickly established once signed up
4. Digital Connections
 Message travels in computer signal form via cable modem
 Dedicated access where each user has own line connection
 T1 digital line type very fast in comparison but generally much more expensive

Recognizing Intranets and Extranets

Intranet
 Private local area network in company that uses same set of network protocols as Internet
 Intranet connected to Internet so employees can access resources on Internet and communicate
via electronic mail with external contacts
 Danger that confidential information on intranet can be accessed by external people so firewall
then placed between intranet and Internet
Extranet
 Uses Internet technology to allow company to share information with another company or
organization for purposes of e-commerce
 Higher risk for unauthorized access
Lesson 3: Getting Started

Objectives:

1. Familiarize with basic terminologies: 2. Recognize Web Page Elements


• What the World Wide Web is
• web browser
• Web site
• Etc

Understanding Basic Terminology


Looking at the Information on the Internet
 Two groups of computers:
– Provide service (servers)
– Make use of services (users or clients)
 Many types of services available

Understanding the World Wide Web


 World Wide Web is collection of all web sites hosted by all web servers connected to Internet
 Web server provides service of hosting or storing company’s or person’s web site and typically
hosts many web sites.
 Web browser is a software or program used to open the Web and different web sites.
 Web site is collection of pages containing information. Must use hypertext transfer protocol
(HTTP) to communicate with other computers.
 “Hypertext” refers to technique of accessing web pages using hyperlinks.
 Web pages popular due to display although no formatting saved with these pages.
– Browser has to format page before it is displayed on screen.
– Formatting instructions included in web page and written in language called hypertext
markup language (HTML).

Recognizing Web Page Elements


 URL Box Uniform Resource Locator - identifies where to find information, or
enter text to display list of matching web sites.
 Field Box Enter information on form sent to web server for processing.
 Banner Ad Advertising on web page.
 Button Interactive graphic that activates action.
 Picture Either static, animated, or hyperlink to other web pages, sites, or other
action.
 Status Bar Tells you what software is busy doing or which web page or site is
displayed.
 Hyperlink Text or a graphic with URL associated.

Lesson 4: Using Internet Explorer Browser

Objectives:
1. Gain knowledge on how to Start Internet Explorer Browser and
Open the Yahoo Web Page.

To Start Internet Explorer Browser


1st Strategy- Using START button
1. Click on Start Button,
2. Choose All Programs,
3. Click on Internet Explorer
2nd Strategy – Using Desktop
1. Double-click on icon.
rd
3 Strategy – Using Quick Launch Toolbar
1. Click on icon.
Home Page
After starting the web browser, the first page that will appear is called the Home Page (MSN Web Page).
To change with other Home Page:
 Click Tools
 Internet Options
 Type other website as new Home Page.
 Click on OK button.

To open the Yahoo Web Page


1. On the URL Box or Web Site Address Box just type www.yahoo.com

2. Then click the Go button that will activate action to go to the yahoo web site.

3. Wait until such time that the Yahoo Web Page appears.

Lesson 5 & 6: Surfing/ Searching for Information and Opening Other Web Sites

Objectives:
1. Define What is “Internet Surfing”.
2. Search information using Google AND Yahoo search engine.

“Surfing” the Internet


 “Finding information” in the internet. It really involves the process of finding URL for site that
contains information or services required.

Lesson 9: Sending E-mail


Objectives:
1. Students will perform to send email on Yahoo.

What is E-Mail?
 E-mail most popular means of Electronic Mailing which communicating from one computer to
another computer.
 Follows same process as for postal mail
– Need to have name and address of recipient in order to have post office deliver.
 Ways of communicating available:
– Instant messaging occurs on computers where feature included with e-mail program or
part of chat program where multiple conversations occur.
– Text messaging generally refers to the process of sending message but only text shown
at receiver’s end.

What is Electronic Mail?


Speed Can send message to someone without waiting for
reply. Can also send (or receive) messages to
multiple people.
Paper Trail Create folders to file or store messages, giving
history and storage of older messages.
Sharing Information Attach file to message to send to others.
Easy Access People outside office (or home) can continue to
send or receive messages from remote locations.
Collaborating with Others Can set up message to be sent to other people at
same time as recipient.
Cost Savings Sending e-mail is relatively low in comparison to
long distance, courier, or physical visits.

You might also like