Computer Skills
Computer Skills
Summaries
DR:ABDULAZIZ ALDERHAMI
STUDENT NAME.: NADA MOHAMMED
Networks (part2)
Communication Systems
communication network (or communication system) links together devices to
data and information can be shared among them.
Networks classification
❖ PAN (personal area network)
within a range of about 30 feet (10 meters) and without the use of wires or cables. The
reference to personal indicates that the network serves a single individual, rather than
multiple users.
LANs are data communication networks that connect personal computers within a very
limited geographical area—usually a single building. EXAMPLE :School computer labs and
home networks are
WANs cover a large geographical area and usually consist of several smaller networks,
which might use different computer platforms and network technologies. The
Internet is the world’s largest WAN.
Communication Channels
Wireless channels transport data from one device to another without the
use of cable or wires
❖ Advantages of wireless
• Mobility
• No unsightly cables
• Less susceptible to power spikes
❖ Disadvantages of wireless
• Speed
• Range
• Security
• Licensing
Network Topology
• Mesh topology connects multiple devices to each other, either as a full mesh
or as a partial mesh
Network Nodes
❖ router is a device that controls the flow of data within a network and also
acts as a gateway to pass data from one network to another
❖ A modem contains circuitry that converts the data carrying signals from a
digital device to signals that can travel over various communications
Communication Protocols
-communication protocol refers to a set of rules for efficiently transmitting data from
one network node to another
-this process is called handshaking
-PHYSICAL PROTOCOLS Specify cable and signal standards for the channels that carry
data
-ARRIVAL PROTOCOLS :Convert data into standard formats that can be used by
applications, such as email, Web browsers, and Skype
Networks that form the Internet are maintained by Internet service providers (ISPs)
packets
A communication port (usually referred to simply as a port) is a virtual end point for
data entering and leaving a digital device.
Internet Addresses
-IPv4 – (Internet Protocol version 4); is the Internet address standard; uses 32bit
addresses to identify Internet connected devices
-IPv6 – (Internet Protocol version 6); uses 128 bits for each address; produces billions
and billions of unique Internet addresses
Internet addresses that are temporarily assigned to a device are called
dynamic addresses
IP addresses can be assigned by a network administrator, but more
commonly they are automatically assigned by DHCP (Dynamic Host
Configuration Protocol)
A private IP address can be allocated by any network without
supervision from ICANN – but it cannot be used to send data over the
Internet; it’s not routable
Domain Names
The mechanism for tracking domain names and their corresponding IP addresses
is called the domain name system (DNS)
Domain name servers are scattered around the world and maintain lists of all domain
names and their corresponding IP addresses
Networks (part2)
Connection Basics
ISPs control connection speeds based on the service plan you’ve selected
Your bandwidth cap is the top speed allowed by your plan
During peak times, ISPs can place further limits on speed, a process called
bandwidth throttling.
When Internet upload speed differs from download speed, you have an
asymmetric connection
When upload and download speeds are the same, you have a symmetric
connection
Ping is utility software designed to measure responsiveness
Ping rate indicates how quickly data can reach a server and bounce back to you
Latency is the elapsed time for data to make a roundtrip from point A to point B and
back to point A
Jitter measures the variability of packet latency caused when network traffic and
interference can delay packets and create erratic data flow
Packet loss refers to data that never reaches its destination or gets discarded because
it arrives too late
Cable Internet Service
❖ CATV coaxial and fiber-optic cables have plenty of bandwidth to
carry television signals for hundreds of channels in addition to
digital data.
❖ CATV cables provide bandwidth for television signals, incoming
data signals, and outgoing data signals.
▪ Cell networks transmit voice and data using radio signals; the signals flow between a device and a cellular
radio tower (1), transmitters and receivers on each tower cover a specific area and use a unique frequency;
data signals are passed to ground stations (2), where they are forwarded over a packets witched network to
the Internet (3); voice signals may be routed to a circuits witched network (4)
Wi-Fi Hotspots
A Wi-Fi hotspot is a wireless local area
network that offers Internet access to the
public.
The network has an Internet connection
and device called an access point that
broadcasts Wi-Fi signals within a range of
about 150 feet
Low: Browsing. When using a Wi-Fi hotspot for simple browsing activities such as checking
sports scores, reading Google news
Low: Using secure sites. Your security risk is low when you are accessing secured Web sites
that have addresses beginning with HTTPS.
MED: File sharing. Eavesdroppers might be able to access the files on your computer if you
have file sharing turned on.
HIGH: Using unsecured sites. When you log in to unsecured sites while using public Wi-Fi
hotspots, a wireless eavesdropper could potentially snag your user ID and password
information, then use it later to access your accounts
Ethernet
o Secure – the wired connections in an Ethernet LAN are more secure than
wireless LAN technologies
o Inexpensive – as a nonproprietary technology, Ethernet equipment is
available from a variety of vendors; market competition keeps prices low
o Flexible – current Ethernet standards allow extensive flexibility in
network configurations
Wi-Fi
Wireless ad-hoc networks are conceptually simple but
provide few security safeguards. This type of
connection is best limited to occasional use when
you want to temporarily connect two computers to
share a few files.
▪ WPA (Wi-Fi Protected Access) and its cousins, WPA2 and PSK, offer more security
– Create a wireless encryption key (a network security) key or password)
– Configure the Guest Network (a second network on your LAN’s router)
– Activate DHCP (assigns addresses to each device that joins your network)
o
Network Monitoring
When your network has stopped sending and receiving packets, you might be able
to correct the problem by turning off your router and Internet modem, waiting a
few seconds, and then turning them on again
IoT Networks
The Internet of Things (IoT) connects active sensors and passive tags to
communications network
Wi-Fi is power hungry, so it’s not an optimal IoT technology
Existing wireless technologies such as RFID and NFC offer potential solutions
A sensor, such as a thermometer or heart rate monitor, actively collects data
An NFC tag might be attached to merchandise
File Sharing
File sharing allows files containing documents, photos, music, and more to be
accessed from computers other than the one on which they are stored.
Sharing can take place within a LAN or across multiple networks, including the
Internet
Read and write permission –(full control) allows access for opening, viewing, modifying,
and deleting files
Read permission –allows authorized people to open a file and view it, but not modify or
delete it
Write-only permission –works like drop box, allowing people to put files in one of your
folders, but not open, copy, or change any files you have stored there
Internet-Based Sharing
FTP(File Transfer Protocol) provides a way to transfer files from one computer to
another over any TCP/IP network, such as a LAN or the Internet
You can access FTP servers with FTP client software, such as FileZilla, or with a
browser.
Dropbox and similar file hosting services store files in the cloud
Torrents
BitTorrent is a file sharing protocol that distributes the role of a file server across a
collection of dispersed computers
How a BitTorrent works:
❖ A BitTorrent network server breaks a movie file into pieces and begins to download
those pieces to the first computer that requested the movie
❖ As more computers request the file, they become part of a “swarm” that uses peer-
to-peer technology to exchange movie segments with each other
❖ After the server has downloaded all the segments to the swarm, its job is complete,
and it can service other requests