0% found this document useful (0 votes)
78 views18 pages

Computer Network

Two digital devices can exchange information if interconnected. A network connects autonomous computers. Networks allow resource sharing, reliability through file copies, lower costs by sharing servers, and remote communication. There are peer-to-peer and client-server architectures. Nodes request services and servers provide them. Networks include LANs within buildings, MANs within cities, WANs between locations, and PANs around individuals. Transmission media can be wired like twisted pair, coaxial, fiber optic cables or wireless like microwave, radio, satellite, infrared, and laser. Topology is the pattern of node interconnection and considers cost, flexibility, and reliability.

Uploaded by

rupeshkr.3905
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
78 views18 pages

Computer Network

Two digital devices can exchange information if interconnected. A network connects autonomous computers. Networks allow resource sharing, reliability through file copies, lower costs by sharing servers, and remote communication. There are peer-to-peer and client-server architectures. Nodes request services and servers provide them. Networks include LANs within buildings, MANs within cities, WANs between locations, and PANs around individuals. Transmission media can be wired like twisted pair, coaxial, fiber optic cables or wireless like microwave, radio, satellite, infrared, and laser. Topology is the pattern of node interconnection and considers cost, flexibility, and reliability.

Uploaded by

rupeshkr.3905
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Introduction

Two digital devices are said to be interconnected if they are capable of exchanging information or
data sharing or share resources.

Tanenbaum defines a network as ‘an interconnected collection of autonomous computers’.

Need for Networking:


i. Resource sharing: The aim is to make all programs, data and peripheral devices available
to anyone on the network irrespective of the physical location of the resources and the
user.
ii. Reliability: A file can have copies on two or more different machines, so if one of them is
unavailable due to some reason (like hardware crash), the other copies could be used.
For military, banking, air reservation and many other applications it is of great
importance.
iii. Cost factor: Personal computers have better price/performance ratio than micro
computers. So, it is better to have PC’s one per user, with data stored on one shared/
file server machine.
iv. Communication Medium: Using a network, it is possible for any user, working far apart,
to prepare any report/document of the company. The changes at one end can be
immediately noticed at another end and hence it speeds up co-operation among them.

Types of architecture:
i. Peer to Peer architecture: In this architecture, each and every computer acts as both
requestor and responder(Client and Server).
ii. Client-Server architecture: In this architecture, there is a dedicated machine that is
completely devoted as service provider(Server) and rest of the devices are the request
generator(Client).

Elementary Terminologies of Network:


Nodes: It is also known as workstations. The nodes are the devices attached to the network and
that gives the request for providing the services to the server. If there is no node, then there would
be no network at all.

Server: A server is service provider for the nodes who sends the request for providing services. A
network can have more than one server also. Each server has a unique name on the network and all
the users of network identify the server by its unique name.

Types of Servers:

a. Non-dedicated: These servers can act as both service requestor as well service provider
b. Dedicated: These servers are completely dedicated for service providing.

Types of Network:
On the basis geographical spread, the network is classified into four categories:

i. LAN(Local Area Network):This type of network is confined to a localised area(i.e small


office, a building or a factory) The purpose of a LAN is to server its users in resource
sharing like sharing of softwares, hardwares etc. LAN users can share data, information,
programs, printer, hard-disk etc. The range of LAN is upto 1000 mtrs.
ii. MAN(Metropolitan Area Network): This type of network is accessible within a city
having the range upto 10-20 kms. For example, cable TV networks that are spread over a
city.
iii. WAN(Wide Area Network): The network spread across countries or that can establish
network between two continents are known as WAN. A WAN is a group of computers
that are separated by large distances and tied together. It can even be a group LANs that
are spread across several locations and connected together to look like one big LAN. The
WANs link computers to facilitate fast and efficient exchange of information at lesser
costs and higher speed.
iv. PAN(Personal Area Network): A personal area network is the interconnection of
information technology devices within the range of an individual person, typically within
the range of 10 meters. You can use this type network to transfer files including email,
digital photos and music etc. form your portable devices such as mobile and tablets to
PC and vice versa.

Transmission Media/ Transmission medium/Communication Channel:


By transmission media or communication channel of network, it is meant that the connecting cables
or connecting media are being talked about. The cables that connect two or more
workstations/nodes are communication channels.

The communication channel is classified in two categories:

i. Guided media/Wired media: It includes cables.


a. Twisted Pair cable: The most common form of wiring in data communication
application is the twisted pair cable. As a Voice Graded Medium(VGM), it is the basis
for most internal office telephone wiring. It consists of two identical wires wrapped
together in a double helix.
Problem can occur due to differences in the electrical characteristics between the
pair (e.g. length, resistance, capacitance etc). For this reason, LAN application will
tend to use a higher quality cable known as data graded medium (DGM)
The twisted pair cable reduces crosstalk, which is the bleeding of signal from one
wire to another and which can corrupt signal and cause network errors.

b. Co-axial cable: This type of cable consists of a solid wire core surrounded by one or
more foil or wire shields, each separated by some kind of plastic insulator. The inner
core carries the signal and the shield provides the ground. The coaxial cable has high
electrical properties and is suitable for high speed communication. It is widely used
for television signals. In the form of (CATV) cable, it provides a cheap means of
transporting multi-channel television signals around metropolitan areas. It is also
used by large corporations in building security systems.
c. Optical Fiber cable/Fiber optics: Optical fibers consists of thin strands of glass or
glass like material which are so constructed that they carry light from a source at
one end of the fiber to a detector at the other end. The light sources used are light
emitting diodes(LEDs) or laser diodes(LDs) The data to be transmitted is modulated
onto the light beam using frequency modulation techniques. The signals can then
picked up at the receiving end and demodulated. The bandwidth of the medium is
potentially very high.

The fiber cable consists of three pieces:

1. Core: The glass or the plastic through which the light travels
2. Cladding: It is covering of the core that reflects light back to the core
3. Protecting Coating: It protects the fiber cable from hostile environment.

ii. Unguided media/wireless media: It includes waves through air, water or vaccum.
a. Microwave(Terrestrial Microwave): Microwave signals are used to transmit data
without the use of cables. It is very much similar to radio and television signals and
are used for long distance communication. The microwave transmission consists of a
transmitter, receiver and the atmosphere.
In microwave communication, a parabolic antennas are mounted on towers to send
a beam to other antenna placed at tens of kilometres away. The higher the tower,
the greater the range.
b. Radiowave: In this media radio frequency is used, that’s why it is termed as
radiowave transmission. It is preferably used in hilly areas where, wired media
cannot be installed because digging or hanging the cables is difficult. One more
reason is frequent occurrence of natural calamities that leads to repetitive
installation of wires, if used.
c. Satellite: Satellite communication is special case of microwave relay system. It uses
the synchronous to relay the radio signal transmitted from ground station.
In satellite communication the earth station consists of a satellite dish that functions
as an antenna and communication equipment to transmit and receive data from
satellite passing overhead.
d. Infrared: This type of transmission uses infrared light to send data. You can see the
use of this type of transmission in everyday life- TY remotes, automotive garage
doors, wireless speakers etc.
The infrared light transmits data through the air and can propagate throughout a
room.
e. Laser: The laser transmission requires direct line of sight. It is unidirectional like
microwave, but has much higher spend than microwave. It requires a laser
transmitter and photo-sensitive receiver at each end. This type of transmission is
point -to-point, typically between buildings.
But lasers have a certain disadvantage, which is: It can be adversely affected by
weather.

Network Topology:
The pattern of interconnection of nodes in a network is called the Topology.

The selection of topology for a network cannot be done in isolation as it affects the choice of media
and the access method used. There are a number of factors to consider in making this choice, the
most important of which are mentioned below:

i. Cost: For a network to be cost effective, one would try to minimize installation cost. This
may be achieved by using well understood media and also, to a lesser extent, by
minimizing the distances involved.
ii. Flexibility: Because the arrangement of furniture, internal walls etc in offices is often
subject to change, the topology should allow for easy reconfiguration of the network.
This involves moving existing nodes and adding new ones.
iii. Reliability: Failure in a network can take two forms. Firstly, an individual node can
malfunction. This is not nearly as serious as the second type of fault where the network
itself fails to operate. The topology chosen for the network can help by allowing the
location of the fault to be detected and to provide some means of isolating it.

Following are the topologies discussed:

a. Bus Topology or Linear topology: This topology consists of a single length of the
transmission medium (cables) onto which the various nodes are attached. The topology is
used in traditional communication network where the host at the one end of the bus
communicates with several terminals attached along its length.
The transmission from any station travels the length of the bus, in both directions and can
be received all other stations.
Advantages:
 Short Cable Length
 Resilient Architecture
 Easy to extend

Disadvantages:

 Fault Diagnosis is difficult


 Fault isolation is difficult
 Repeater configuration
 Nodes must be intelligent

b. Ring Topology: In this topology, each node is connected to two and only two neighbouring
nodes. Data is accepted from one of the neighbouring nodes and is transmitted onwards to
another. Thus data travels in one direction only, from node to node around the ring.
Advantages:
 Short length
 No wiring closet space is required
 Suitable for Optical fiber cable

Disadvantages:

 Node failure causes network failure


 Difficult to diagnose faults
 Network reconfiguration is difficult

c. Star Topology: This topology consists of a central node to which all of the other nodes are
connected by a single path. It is the topology used in most existing information networks
involving data processing or voice communication.
Advantages of Star topology:
 Ease of service
 One device per connection.
 Centralized Control/Problem Diagnosis
 Simple access protocols

Disadvantages of the Star Topology:

 Long Cable Length


 Difficult to expand
 Central node dependency
iv. Tree Topology: A variation of bus topology is the tree topology. The shape of the
network is that of an inverted tree with the central root branching and sub branching to
extremities of the network.

Transmission in this topology takes place in the same way as in the bus topology. In both
cases, there is no need to remove packets from the medium because when a signal
reaches the end of the medium, it is absorbed by the terminators
v. Mesh Topology: In this topology, each node is connected to more than one node to
provide an alternative route in the case the host is either down or too busy.
The mesh topology is excellent for long distance networking because it provides
extensive back-up, rerouting and pass-through capabilities. Communication is possible
between any two nodes on the network either directly or by passing through. The mesh
topology is commonly used in large internetworking environments with star, ring and
buses attached to each node. This is also ideal for distributed networks.
Network Devices:

i. Modem: A modem is a computer peripheral device that allows you to connect and
communicate with other computers via telephone lines.
Modem converts digital signals to A/F(Audio Frequency) tones which are in the
frequency range that the telephone lines can transmit and also it can convert
transmitted tones back to digital information.

ii. Rj-45: it stands for Registered Jack-45. Rj-45 is an eight-wire connector, which is
commonly used to connect computers on the local area networks I,e LANs especially
Ethernets. Ethernet uses either bus or star topology and supports data transfer rates up
to 10Mbps.

iii. Ethernet Card: An Ethernet card contains connection for either coaxial or twisted pair
cables(or both), If it is designed for coaxial cable, the connection will be BNC(Bayone-
Neill-Concelman). If it is designed for twisted pair, it will have a RJ-45 connection.
Ethernet card is inserted in its on the motherboard. Usually Ethernet Cards are
purchased separately from a computer, but these days many computers include an
option for pre-installed Ethernet card.

iv. Hub: It is a hardware device to connect several computers together. A hub that contains
multiple independent but connected modules of network and inter-networked
equipment. It is also known as Concentrator. In star topology, twisted pair wire is run
from each workstation to a central concentrator.

Hubs can be either Passive or Active.


a. Active Hub: It electrically amplify the signal as it moves from one connected device
to another. Active concentrators are used like repeaters to extend the length of a
network.
b. Passive Hub: It allow the signal to pass from one computer to another without any
change.
v. Switch: It is a device that is used to segment networks into different subnetworks called
subnets or LAN segments., Segmenting the network into smaller subnets, prevents
traffic overloading in a network.

A switch is responsible for filtering i.e transforming data in a specific way and forwarding
packets between LAN and segments. Switch supports Packet Protocol.
vi. Repeater: It is a device that amplifies a signal being transmitted on the network. It is
used in long network lines (distance more than 100 mtrs). which exceeds the maximum
rated distance for a single run.
Over distance, the cables connecting a network loses the signal transmitted. If the signal
degrades too much, it fails to reach the destination. Or if it does arrive, the degradation
of the message makes it useless. Repeaters can be installed along the way to ensure that

data packets reach their destination.


vii. Bridge: A bridge is a device that establishes an intelligent connection between two Local
area networks with the same standard but with different types of cables. Bridges are
smart enough to know which computers are on which side of the bridge, so they only
allow those messages that need to get to the other side to cross the bridge.

viii. Router: A router is a network device that is used to separate different segments in a
network to improve performance and reliability. A router works like a bridge but can
handle different protocols. A Router differs from a bridge in a way that former uses
logical addresses and the latter uses physical addresses.
IP(Internet Protocol): 192.168.0.1
MAC(media access control): 26:A6:56:12:B4:32

Manufacturer’s Id Custormer’s ID

ix. Gateway: A Gateway is a network device that connects dissimilar network. It establishes
an intelligent connection between a local area network and external networks with
completely different structures.

x. Wifi-Card: A WIFI card is either an internal or external local area network adapter built-
in wireless radio and antenna. The most common WIFI cards are used in desktop
computers are PCI -Express WIFI cards made to fit the PCI-Express card slots on the
motherboard.
The benefit of using WIFI card in a desktop computer is that it allows you to setup your
workstation or home office without considering the proximity or availability of hard line
network access.

Differences between Hub and Switch:

Hub Switch
It repeats the incoming traffic to all connections It sends only to appropriate connections
It offers single lane connection, hence either It establishes two-lane communication,
send or receive at a time facilitating send and receive at the same time
It shares the bandwidth among its connections It does not share bandwidth, each connection
gets full bandwidth.
It is an inexpensive choice It is expensive than hub

ARPANET:- Short for Advanced Research Projects Agency Network, ARPANET or ARPAnet began
development in 1966 by the United States ARPA. ARPANET was created to make it easier for people
to access computers, improve computer equipment, and to have a more effective communication
method for the military. Between 1969 and 1977, ARPANET grew from a network of four computer
sites to one with 111 computers belonging to universities, research facilities and the military. Using
satellite links, ARPANET connected computer systems in the continental United States to computers
in Hawaii and Europe.

INTERSPACE:- Interspace is a software that allows multiple users in a client-server environment to


communicate with each other to send and receive data of various types such as data files, video,
audio and textual data. The Interspace is a vision of what the Internet will become, where users
cross-correlate information in multiple sources.

Switching techniques:-
switching techniques are:-
packet switching and message switching
communication channel:-
A communication channel refers either to a physical transmission medium such as a wire, or to a
logical connection over a multiplexed medium such as a radio channel in telecommunications and
computer networking.

Bandwidth:- It is the maximum amount of data transmitted over an internet connection in a


given amount of time. it's actually the volume of information that can be sent over a
connection in a measured amount of time.

Data transfer rate (bps, Kbps, Mbps, Gbps, Tbps).


1 kbps = 1000 bits per second.
1 Mbps = 1000 kilobits per second.
1 Gbps = 1000 Megabits per second.

NETWORK PROTOCOL

TCP/IP:-TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of


communication protocols used to interconnect network devices on the internet.

FTP:- The File Transfer Protocol is a standard network protocol used for the transfer of computer
files between a client and server on a computer network. FTP is built on a client-server model
architecture using separate control and data connections between the client and the server.

HTTP:- As a request-response protocol, HTTP gives users a way to interact with web
resources such as HTML files by transmitting hypertext messages between clients and
servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to
communicate with servers.
SMTP:- SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication
guidelines that allow software to transmit an electronic mail over the internet is called Simple
Mail Transfer Protocol. It is a program used for sending messages to other computer users
based on e-mail addresses.
POP3:- POP3 is a client/server protocol in which e-mail is received and held for you by your
Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the
server and download any mail, probably using POP3.

Remote Login (Telnet):- A remote login facility permits a user who is using one computer to
interact with a program on another computer. ... The Internet's remote login service is
called TELNET. To use the service, one must invoke a local application program and specify
a remote machine.

Wireless / Mobile Communication protocol


1. GSM:- The Global System for Mobile Communications (GSM) is a standard
developed by the European Telecommunications Standards Institute (ETSI) to
describe the protocols for second-generation (2G) digital cellular networks used by
mobile devices such as mobile phones and tablets.
2. GPRS :- The General Packet Radio Service (GPRS) is an enhancement to the
existing GSM network infrastructure and provides a connectionless packet data
service. The same cellular base-stations that support voice calls are used to
support GPRS and as a consequence GPRS can be used wherever it is possible to
make a voice call.
3. WLL.:- Wireless local loop (WLL) is a generic term for an access system that
uses wireless links rather than conventional copper wires to connect subscribers to
the local telephone company's switch.

Mobile Telecommunication Technologies:


1G, 2G, 3G, 4G and 5G;

Electronic mail protocols are SMTP, POP3

Protocols for Chat and Video Conferencing:

1. VoIP:- VOIP is an acronym for Voice Over Internet Protocol, or in more common
terms phone service over the Internet. If you have a reasonable quality Internet
connection you can get phone service delivered through your Internet connection
instead of from your local phone company.
2. Wireless technologies such as Wi-Fi and WiMax.

Network Security Concepts:


Network security is a broad term that covers a multitude of technologies, devices
and processes. In its simplest term, it is a set of rules and configurations designed to
protect the integrity, confidentiality and accessibility of computer networks and data
using both software and hardware technologies.

Viruses:- a computer virus is a type of malicious code or program written to alter


the way a computer operates and is designed to spread from one computer to
another. A virus operates by inserting or attaching itself to a legitimate program
or document that supports macros in order to execute its code.

Worms:- A computer worm is a type of malware that spreads copies of itself


from computer to computer. A worm can replicate itself without any human
interaction, and it does not need to attach itself to a software program in order to
cause damage.

Trojan horse:- A Trojan horse or Trojan is a type of malware that is often


disguised as legitimate software. Trojans can be employed by cyber-thieves and
hackers trying to gain access to users' systems. Users are typically tricked by
some form of social engineering into loading and executing Trojans on their
systems.

Spams:- Spam is increasingly sent from computers infected by computer viruses.


... These malicious programs spread rapidly and generate massive amounts
of spam pretending to be sent from legitimate addresses.

Firewall:- In computing, a firewall is a network security system that monitors and


controls incoming and outgoing network traffic based on predetermined security
rules. A firewall typically establishes a barrier between a trusted network and an
untrusted network, such as the Internet.

India IT Act:- The IT Act was introduced to grant impetus to the rise of digital
technologies in the country and establish a legal system to foster e-commerce.
Some of the purported aims of the Act have, indeed, been realised as may be
evinced by the proliferation of smartphones and digital businesses.

Cyber Law:- Cyber law, also known as cyber crime law, is legislation focused on
the acceptable behavioral use of technology including computer hardware and
software, the internet, and networks. Cyber law helps protect users from harm by
enabling the investigation and prosecution of online criminal activity.

Cyber Crimes:- Cybercrime, or computer-oriented crime, is a crime that involves a


computer and a network. The computer may have been used in the commission of a
crime, or it may be the target. Cybercrime may threaten a person, company or a
nation's security and financial health.

IPR issues:- Intellectual property rights are legal rights that provide creators protection for
original works, inventions, or the appearance of products, artistic works, scientific
developments, and so on. There are four types of intellectual property rights (IP): patents,
trademarks, copyrights, and trade secrets.
Hacking. Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorised access to or control over computer network
security systems for some illicit purpose. Description: To better describe hacking, one
needs to first understand hackers.

Introduction to Internet, URL, WWW, and its applications- Web, email, Chat, VoIP.

INTORDUCTION TO INTERNET: Internet is a network of networks.

Or Internet is a worldwide network of computer networks.

Web Browser: A web browser is an application that navigates through World Wide Web and
displays web pages.

Website: It is a collection of web pages and is a location on net server.

Web Address: Each website has a unique address called URL (Uniform Resource Locator).

Web Pages: The pages where the actual information/content is stored.

URL and Domain Names:

The Internet structure of World Wide Web is built on a set of rules called Hypertext Transfer
Protocol(HTTP) and a page description language called Hypertext Markup Language(HTML) . HTTp
uses internet addresses in a special format called a Uniform Resource Locator(URL).

URL looks like:

type://address/path

e..g http://www.chinmayabokaro.org/student/login.aspx

Here, http: specifies the type of server, www.chinmayabokaro.org is the address of the server and
student/login.aspx is the path of the file login.aspx

Domain Name: A URl specifies the distinct address for each resource on the Internet. An Internet
address is character based is called Domain Name. The naming scheme by which servers are
identified is also known as the Domain Name System.

Some most common Domains are:

Domain ID Affilaiation Remarks


Com Commercial for commercial firms
Edu Education for educational firms
Gov Government for government organisations
Net Network Resources for ISPs/networks
Org Usually non-profit for NGOs and other non-profit
organisations organisations
Co Company for listed companies
Biz Business for Business
Tv Television for television companies and
channels
Mil Military for Military

In addition to it, a two-letter abbreviation indicating the country name may be used

e.g.
Au Australia In India
Dk Denmark Fr France
Ca Canada Jp Japan
Nz New Zealand Uk United Kingdom
HTML:- Hypertext Markup Language is the standard markup language for documents designed to
be displayed in a web browser. It can be assisted by technologies such as Cascading Style
Sheets and scripting languages such as JavaScript. The markup tells web browsers how to
display a web page's words and images.
XML:- Extensible Markup Language (XML) is a markup language that defines a set of rules
for encoding documents in a format that is both human-readable and machine-
readable. XML is designed to store and transport data.
WWW and its Applications:

WWW stands for World Wide Web: It is a set protocols that allows us to access any type of
documents on the internet through a naming system based on URLs. WWW also specifies a way- the
hypertext transfer protocol (HTTP)- to read, receive and send the documents over the internet. With
these standard protocols of WWW in place, one can setup a server and construct hypertext
documents with links in them that point to the documents on the server.

WWW attributes:

i. user-friendly
ii. Multi-media documents
iii. Hypertext and Hyperlinks

c:\\sudha\abc.docx

Applications of WWW:

i. WEB: WWW is also known as Web.


ii. Email:
iii. Chat
iv. VoIP: It stands for Voice over Internet Protocol.

Website: Introduction, difference between a website and webpage, static vs dynamic web page,
web server and hosting of a website.

Web Browsers: Introduction: A web browser (commonly referred to as a browser) is an application


software for accessing information on the World Wide Web. When a user requests a web page from
a particular website, the web browser retrieves the necessary content from a web server and then
displays the page on the user's device.

Commonly used browsers: Internet Explorer, Microsoft Edge, Google Chrome, Mozilla Firefox,
Safari, Opera.

Browser settings:

Browser Settings for use with Blackboard


Browsers Settings
Internet
Explorer
(PC Enable Cookies: Tools > Internet Options > Privacy > Advanced > Check "Override Automatic
only) Cookie Handling (accept 1st party; Prompt 3rd party)" and check the option to always accept
session cookies. OK and OK back to browser.

Enable Javascript: Tools > Internet Options > Security Tab > Internet > Custom Level > Scroll
down to Scripting and enable "Active Scripting," "Allow Programmatic clipboard access," "Allow
status bar updates via script," "Allow websites to prompt for information ...," and "Scripting of
Java applets".
OK back browser.

Enable Status bar: View > Toolbars > Check "Status Bar".

Get New Page Each Visit: Tools > Internet Options > General Tab > in Browsing history
section, click the Settings button > select "Every time I visit the webpage." OK and OK back to
browser.

Pop-up Blocker Settings: Tools > Pop-up Blocker > Pop-up Blocker Settings ... > Add
ucmo.edu and ucmo.blackboard.com > Close back to browser.

Trusted Sites: Tools > Internet Options > Security > Trusted sites > Sites > Uncheck "Require
server verification for all sites in this zone"

Add ucmo.edu and blackboard.com > Close and OK back to browser.

Discussion Board Issues: Tools > Internet Options > Security Settings > Custom Level > scroll
down to Miscellaneous and set “Launching programs and files in an IFRAME” to Prompt. OK
and OK back to browser.

NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Firefox>Preferences).

Enable Cookies: Tools > Options > Privacy > History pane: Use custom settings for history >
Cookies > select “Accept cookies from sites” and "Accept third-party cookies." OK back to
browser.
Mozilla
Firefox Enable Javascript: Tools > Options > Content > check the “Enable Javascript” box. OK back to
(PC and browser.
Mac)
Get new page each visit: Tools > Options > Privacy > History pane: Use custom settings for
history > select "Clear history when Firefox closes.“ Click Settings and select "Cache.” OK and
OK back to browser.

Popup Blocker Settings: Tools > Options > Content > Click the “Exceptions” button next to
Block Pop-up Windows > Add ucmo.edu and ucmo.blackboard.com > Click Allow and Close.
OK back to browser.

Clear Browser Cache: Tools > Clear Recent History > Select Cache. OK back to browser.

Google NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Chrome Chrome>Preferences).
(PC and Enable Cookies: Settings > Show advanced settings > Privacy > Content Settings... > Cookies
Mac) > check "Allow local data to be set.." OK and close Settings tab back to browser.

Enable Javascript: Settings > Show advanced settings > Privacy > Content Settings... >
Javascript > check “Allow sites to run Javascript”. OK and close Settings tab back to browser.

Get new page each visit: Settings > Show advanced settings > Privacy > Content Settings... >
Cookies > Select "Keep local data only unitl I quit my browser” OK. Close Settings tab back to
browser.

NOTE: This will also clear your cookie each time the browser is closed. Unfortunately, Chrome
doesn't have a mechanism to automatically clear only the cache. You could alternatively just
routinely clear the browser cache (instructions provided below).

Popup Blocker Settings: Settings > Show advanced settings > Privacy > Content Settings... >
Pop-ups > Click the “Manage exceptions” button > Add ucmo.edu and ucmo.blackboard.com >
set behavior to "Allow." OK and close Settings tab back to browser.

Clear Browser Cache: History > Clear browsing data: Select "the beginning of time" from the
"Obliterate..." drop down, Select "Emtpy the cache" and click the Clear brwosing data button.
Close Settings tab back to browser.

All Settings: Safari Menu > Preferences > click Security icon > Check: Enable Plugins, Java, &
Safari Javascript.
(Mac
Only) Clear checkbox on "Block Popup Windows."

Accept Cookies > select "Only From Sites I Visit."

Add-ons and plug-ins: In computing, a plug-in (or plugin, add-in, addin, add-on, or addon) is a
software component that adds a specific feature to an existing computer program. When a program
supports plug-ins, it enables customization.

Applications support plug-ins for many reasons. Some of the main reasons include:

 to enable third-party developers to create abilities which extend an application


 to support easily adding new features
 to reduce the size of an application
 to separate source code from an application because of incompatible software licenses.

Cookies: Cookies are text files with small pieces of data — like a username and password — that are
used to identify your computer as you use a computer network. The purpose of the computer cookie
is to help the website keep track of your visits and activity. This isn’t always a bad thing. For
example, many online retailers use cookies to keep track of the items in a user’s shopping cart as
they explore the site. Without cookies, your shopping cart would reset to zero every time you clicked
a new link on the site. That would make it difficult to buy anything online!

You might also like