0% found this document useful (0 votes)
27 views8 pages

CSS3 M4

System Service means a service that the Owner elects to receive from the Company which relates to the operation and benefit of the functionality of the System by the Owner, and which the Company shall supply to the Owner in accordance with a System Services Agreement.

Uploaded by

Lielanie Navarro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views8 pages

CSS3 M4

System Service means a service that the Owner elects to receive from the Company which relates to the operation and benefit of the functionality of the System by the Owner, and which the Company shall supply to the Owner in accordance with a System Services Agreement.

Uploaded by

Lielanie Navarro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

COMPUTER SYSTEM SERVICING 3

Topic: COMPUTER NETWORK (Module 4 – Quarter 1)/ First Semester

WHAT I NEED TO KNOW

This module is specifically crafted to focus on Process and Delivery enriched with modular and online activities that will
assess your level in terms of skills and knowledge. Learning procedures are divided into different sections such as: What you are
supposed to learn, What I know, what’s in, what’s more, What I can do, Assessment, What I can show. You will be introduced
to different learning activities preparing you to be skillful before you take the plunge into the world of work as a hardware
service provider and to feel more confident while providing support where needed. Indeed, as learners of hardware servicing,
you are a crucial link in the emergency response process. Ideally, everyone should know what to do in an emergency situation,
but proper training can help an individual provide basic care.
By the end of the lesson, you are expected to;
1. Identify wireless settings and computer networks;
2. Compare network connectivity and system settings configuration; and
3. Appreciate the importance of setting up a computer network.

WHAT I KNOW

DIRECTION: Read the following statement and choose the letter of the correct answer.
1. Every computer looking to access the internet would be known as this.
a. Client c. hub
b. Desktop d. Server
2. Identifies company or commercial sites
a. .org c. .gov
b. .com d. .edu
3. What is indicated when the domain name has only two letters like .us, .uk, .au, .mx, or .ca
a. Invalid domain c. secure domain
b. Private domain d. Country domain
4. Used for educational sites (most commonly four-year universities)
a. .edu c. .org
b. .com d. .net
5. Process of encoding messages or information in such way that only authorized parties can read it.
a. Layering c. encryption
b. Securing d. phishing
6. Network that allows information to be shared between devices over LAN
a. Wifi c. ethernet
b. Hotspots d. server
7. Name for the thin tubes of glass used by much of the internet to send data quickly over long distances underground
a. ethernet c. hub
b. Wifi d. fiber optic
8. The acronym for file transfer protocol
a. http c. ftp
b. https d. pdf
9. Used for government sites
a. .edu c. .com
b. .gov d. .net
10. The acronym for hypertext markup language that is widely considered the language of the internet
a. https c. ftp
b. http d. html

WHAT’S IN
Computer network, two or more computers that are connected with one another for the purpose of communicating data
electronically. Besides physically connecting computer and communication devices, a network system serves the important
1|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT
function of establishing a cohesive architecture that allows a variety of equipment types to transfer information in a near-seamless
fashion. Two popular architectures are ISO Open Systems Interconnection (OSI) and IBM’s Systems Network Architecture
(SNA).

Two basic network types are local-area networks (LANs) and wide-area networks (WANs). LANs connect computers
and peripheral devices in a limited physical area, such as a business office, laboratory, or college campus, by means of links
(wires, Ethernet cables, fibre optics, Wi-Fi) that transmit data rapidly. A typical LAN consists of two or more personal computers,
printers, and high-capacity disk-storage devices called file servers, which enable each computer on the network to access a
common set of files. LAN operating system software, which interprets input and instructs networked devices, allows users to
communicate with each other; share the printers and storage equipment; and simultaneously access centrally located processors,
data, or programs (instruction sets). LAN users may also access other LANs or tap into WANs. LANs with similar architectures
are linked by “bridges,” which act as transfer points. LANs with different architectures are linked by “gateways,” which convert
data as it passes between systems.

WANs connect computers and smaller networks to larger networks over greater geographic areas, including different continents.
They may link the computers by means of cables, optical fibres, or satellites, but their users commonly access the networks via
a modem (a device that allows computers to communicate over telephone lines). The largest WAN is the Internet, a collection of
networks and gateways linking billions of computer users on every continent.

URL, in full Uniform Resource Locator, address of a resource on the Internet, or of a file stored locally. The resource can be any
type of file stored on a server, such as a Web page, a text file, a graphics file, or an application program. The address contains
three elements: the type of protocol used to access the file (e.g., HTTP for a Web page, ftp for an FTP site); the domain
name or IP address of the server where the file resides; and, optionally, the pathname to the file (i.e., description of the file’s
location). For example, the URL http://www.britannica.com/heritage instructs the browser to use the HTTP protocol, go to the
www.britannica.com Web server, and access the file named heritage.

thin client, also called dumb terminal, computer terminal or software application providing access over a network to a
dedicated server. Unlike a personal computer (PC), which hosts applications, performs processing tasks, and stores files locally, a
thin client does little more than transmit keyboard and mouse input to the server and display the resulting output on the local
screen.

Thin clients typically consist of a monitor, a keyboard, and a mouse, with no hard disk and a minimal amount of memory. A thin
client may also be a software application running on a standard PC, providing access to remotely hosted applications.
Applications may be shared among all users on the network, or a server may be partitioned to provide each user with a
personalized “virtual desktop.”

Thin clients are often used by businesses and schools as an efficiency measure. Because terminal hardware is minimal, thin clients
are less costly and consume less energy than PCs, and, because almost all of the computer programs are on a dedicated server,
only a single copy of each software application is needed (though a license for multiple users is generally required). In addition,
thin clients do not process or store data, so malfunctioning units can be seamlessly replaced. The centralized control makes the
system relatively secure and the data easy to back up.

Networked dumb terminals have been in use since the 1970s. The name thin client was introduced in the 1990s by manufacturers
to emphasize the efficiency and cost savings of the technology. (Thick [or fat] clients is the term for computers that rely on their
own resources.) The use of Web browsers to remotely access e-mail and other applications brought a form of thin-client
computing into wide use in the late 1990s; the following decade saw movement toward cloud computing, which allowed scaled-
back PCs, such as netbooks, with some independent storage and processing capacity to access applications over the Internet.

DNS, in full domain name system, network service that converts between World Wide Web “name” addresses and
numeric Internet addresses.

The concept of a name server came about as a result of the first computer networks in the mid-1970s. Each computer on a
network was identified by a unique number, but, as the size of computer networks grew, users had a hard time keeping track of
which machine corresponded to each number. To keep track, researchers developed a database that translated each computer’s
numeric address into a domain name, which is a string of letters and numbers that is generally easier for users to remember than
numeric addresses.

Modern DNS servers work in a similar fashion, with a set of databases running on servers scattered around the Internet. DNS
servers use a hierarchical structure to organize domain names. There are two basic types of DNS servers: primary, which contain
the databases, and secondary, which retrieve information from primary databases. The basic form of this structure is the name of
a machine, followed by a top level domain (TLD), separated by dots (periods). For example, britannica.com has the domain
name “britannica” and the TLD “com.” The most common type of TLD is a generic one such as “com,” “gov,” or “edu,” though
there are also country code TLDs, such as “uk,” “ca,” or “au,” and sponsored TLDs, such as travel or jobs. Domain and TLD
names are registered and controlled by the Internet Corporation for Assigned Numbers and Names (ICANN).

2|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT


Cloud computing, method of running application software and storing related data in central computer systems and providing
customers or other users access to them through the Internet.

Early development

The origin of the expression cloud computing is obscure, but it appears to derive from the practice of using drawings of stylized
clouds to denote networks in diagrams of computing and communications systems. The term came into popular use in 2008,
though the practice of providing remote access to computing functions through networks dates back to the mainframe time-
sharing systems of the 1960s and 1970s. In his 1966 book The Challenge of the Computer Utility, the Canadian electrical
engineer Douglas F. Parkhill predicted that the computer industry would come to resemble a public utility “in which many
remotely located users are connected via communication links to a central computing facility.”

For decades, efforts to create large-scale computer utilities were frustrated by constraints on the capacity of telecommunications
networks such as the telephone system. It was cheaper and easier for companies and other organizations to store data and run
applications on private computing systems maintained within their own facilities.

The constraints on network capacity began to be removed in the 1990s when telecommunications companies invested in high-
capacity fiber-optic networks in response to the rapidly growing use of the Internet as a shared network for exchanging
information. In the late 1990s, a number of companies, called application service providers (ASPs), were founded to supply
computer applications to companies over the Internet. Most of the early ASPs failed, but their model of supplying applications
remotely became popular a decade later, when it was renamed cloud computing.

Types of Computer Networks


A computer network is a cluster of computers over a shared communication path that work for the purpose of sharing resources
from one computer to another, provided by or located on the network nodes.
Some of the uses of computer networks are the following:
 Communicating using email, video, instant messaging, etc.
 Sharing devices such as printers, scanners, etc.
 Sharing files
 Sharing software and operating programs on remote systems
 Allowing network users to easily access and maintain information
Types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Wide Area Network (WAN)
4. Wireless Local Area Network (WLAN)
5. Virtual Private Network (VPN)

LAN (Local Area Network)


o Local Area Network is a group of computers connected to each other in a
small area such as building, office.
o LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.
PAN(Personal Area Network)
o Personal Area Network is a network arranged within an
individual person, typically within a range of 10 meters.
o Personal Area Network is used for connecting the computer
devices of personal use is known as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring
the idea of the Personal Area Network.
o Personal Area Network covers an area of 30 feet.
o Personal computer devices that are used to develop the
personal area network are the laptop, mobile phones, media
player and play stations.

There are two types of Personal Area Network:


o Wired Personal Area Network
o Wireless Personal Area Network

3|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT


Wireless Personal Area Network: Wireless Personal Area Network is developed by simply using wireless technologies such
as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the USB.

Examples Of Personal Area Network:

o Body Area Network: Body Area Network is a network that moves with a person. For example, a mobile network moves
with a person. Suppose a person establishes a network connection and then creates a connection with another device to share
the information.
o Offline Network: An offline network can be created inside the home, so it is also known as a home network. A home
network is designed to integrate the devices such as printers, computer, television but they are not connected to the internet.
o Small Home Office: It is used to connect a variety of devices to the internet and to a corporate network using a VPN

WAN(Wide Area Network)


o A Wide Area Network is a network that extends over a large
geographical area such as states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans
over a large geographical area through a telephone line, fibre optic
cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business,
government, and education.

Examples Of Wide Area Network:


o Mobile Broadband: A 4G network is widely used across a region or
country.
o Last mile: A telecom company is used to provide the internet services
to the customers in hundreds of cities by connecting their home with fiber.
o Private network: A bank provides a private network that connects the 44 offices. This network is made by using the
telephone leased line provided by the telecom company.
Advantages Of Wide Area Network:
Following are the advantages of the Wide Area Network:
o Geographical area: A Wide Area Network provides a large geographical area. Suppose if the branch of our office is in a
different city then we can connect with them through WAN. The internet provides a leased line through which we can
connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy the emails, files or back
up servers.
o Get updated files: Software companies work on the live server. Therefore, the programmers get the updated files within
seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The web application like Facebook, WhatsApp,
Skype allows you to communicate with friends.
o Sharing of software and resources: In WAN network, we can share the software and other resources like a hard drive,
RAM.
o Global business: We can do the business over the internet globally.
o High bandwidth: If we use the leased lines for our company then this gives the high bandwidth. The high bandwidth
increases the data transfer rate which in turn increases the productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area Network:
o Security issue: A WAN network has more security issues as compared to LAN and MAN network as all the technologies
are combined together that creates the security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet which can be changed or hacked by the
hackers, so the firewall needs to be used. Some people can inject the virus in our system so antivirus is needed to protect
from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is difficult.

Internetwork
o An internetwork is defined as two or more computer network LANs or WAN or computer network segments are connected
using devices, and they are configured by a local addressing scheme. This process is known as internetworking.
o An interconnection between public, private, commercial, industrial, or government computer networks can also be defined
as internetworking.
4|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT
o An internetworking uses the internet protocol.
o The reference model used for internetworking is Open System Interconnection(OSI).
Types Of Internetwork:
1. Extranet: An extranet is a communication network based on the internet protocol such as Transmission Control
protocol and internet protocol. It is used for information sharing. The access to the extranet is restricted to only those users
who have login credentials. An extranet is the lowest level of internetworking. It can be categorized as MAN, WAN or other
computer networks. An extranet cannot have a single LAN, atleast it must have one connection to the external network.
2. Intranet: An intranet is a private network based on the internet protocol such as Transmission Control
protocol and internet protocol. An intranet belongs to an organization which is only accessible by the organization's
employee or members. The main aim of the intranet is to share the information and resources among the organization
employees. An intranet provides the facility to work in groups and for teleconferences.
Intranet advantages:
o Communication: It provides a cheap and easy communication. An employee of the organization can communicate with
another employee through email, chat.
o Time-saving: Information on the intranet is shared in real time, so it is time-saving.
o Collaboration: Collaboration is one of the most important advantage of the intranet. The information is distributed among
the employees of the organization and can only be accessed by the authorized user.
o Platform independency: It is a neutral architecture as the computer can be connected to another device with different
architecture.
o Cost effective: People can see the data and documents by using the browser and distributes the duplicate copies over the
intranet. This leads to a reduction in the cost.

Virtual Private Network


VPN stands for "Virtual Private Network" and describes the opportunity to establish a protected network connection when
using public networks. VPNs encrypt your internet traffic and disguise your online identity. This makes it more difficult for
third parties to track your activities online and steal data. The encryption takes place in real time.

How does a VPN work?

A VPN hides your IP address by letting the network redirect it through a specially configured remote server run by a VPN
host. This means that if you surf online with a VPN, the VPN server becomes the source of your data. This means your
Internet Service Provider (ISP) and other third parties cannot see which websites you visit or what data you send and receive
online. A VPN works like a filter that turns all your data into "gibberish". Even if someone were to get their hands on your
data, it would be useless.

What are the benefits of a VPN connection?

A VPN connection disguises your data traffic online and protects it from external access. Unencrypted data can be viewed by
anyone who has network access and wants to see it. With a VPN, hackers and cyber criminals can’t decipher this data.

Secure encryption: To read the data, you need an encryption key . Without one, it would take millions of years for a computer
to decipher the code in the event of a brute force attack . With the help of a VPN, your online activities are hidden even on
public networks.

Disguising your whereabouts : VPN servers essentially act as your proxies on the internet. Because the demographic location
data comes from a server in another country, your actual location cannot be determined. In addition, most VPN services do not
store logs of your activities. Some providers, on the other hand, record your behavior, but do not pass this information on to
third parties. This means that any potential record of your user behavior remains permanently hidden.

Access to regional content: Regional web content is not always accessible from everywhere. Services and websites often
contain content that can only be accessed from certain parts of the world. Standard connections use local servers in the country
to determine your location. This means that you cannot access content at home while traveling, and you cannot access
international content from home. With VPN location spoofing, you can switch to a server to another country and effectively
“change” your location.

Secure data transfer: If you work remotely, you may need to access important files on your company’s network. For security
reasons, this kind of information requires a secure connection. To gain access to the network, a VPN connection is often
required. VPN services connect to private servers and use encryption methods to reduce the risk of data leakage.

Why should you use a VPN connection?

Your ISP usually sets up your connection when you connect to the internet. It tracks you via an IP address. Your network
traffic is routed through your ISP's servers, which can log and display everything you do online.

5|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT


Your ISP may seem trustworthy, but it may share your browsing history with advertisers, the police or government, and/or
other third parties. ISPs can also fall victim to attacks by cyber criminals: If they are hacked, your personal and private data
can be compromised.

This is especially important if you regularly connect to public Wi-Fi networks. You never know who might be monitoring
your internet traffic and what they might steal from you, including passwords, personal data, payment information, or even
your entire identity.

What should a good VPN do?

You should rely on your VPN to perform one or more tasks. The VPN itself should also be protected against compromise.
These are the features you should expect from a comprehensive VPN solution:

Encryption of your IP address: The primary job of a VPN is to hide your IP address from your ISP and other third parties. This
allows you to send and receive information online without the risk of anyone but you and the VPN provider seeing it.

Encryption of protocols: A VPN should also prevent you from leaving traces, for example, in the form of your internet history,
search history and cookies. The encryption of cookies is especially important because it prevents third parties from gaining
access to confidential information such as personal data, financial information and other content on websites.

Kill switch: If your VPN connection is suddenly interrupted, your secure connection will also be interrupted. A good VPN can
detect this sudden downtime and terminate preselected programs, reducing the likelihood that data is compromised.

Two-factor authentication: By using a variety of authentication methods, a strong VPN checks everyone who tries to log in.
For example, you might be prompted to enter a password, after which a code is sent to your mobile device. This makes it
difficult for uninvited third parties to access your secure connection.

WHAT’S MORE

DIRECTION: After reading all of the information about the Computer Network for the past two weeks, answer the following
statements.

1. What is the importance of Computer Networking?


2. How do you see the working industry and the academe without computer networking?
3. Do you believe that Computer Networking plays a vital role in connectivity and inclusivity among different
sectors in the society?

WHAT I CAN DO

DIRECTION: IN YOUR ANSWERSHEET, CREATE A COLLAGE REPRESENTATION OF ANY OF THE 5 TYPES OF


COMPUTER NETWORK (AT LEAST 1 TYPE) AND INCLUDE SOME DESCRIPTION ABOUT IT. USE THE CRITERA
BELOW FOR YOUR GUIDE.
DESCRIPTION SCORE
ELEMENTS OF DESIGN (USED DIFF.
30
COMBINATIONS OD DESIGN)
INFORMATION (INFORMATIVE CONTENT) 40
CLEANLINESS AND PUNCTUALITY 30
TOTAL: 100

ASSESSMENT

DIRECTION: Analyze the following images below and determine what type of computer network is being shown.

1. ________________________

6|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT


2. _________________________

3. _________________________

4. __________________________

5. _________________________

WHAT I CAN SHOW

Which category in 21st Century skills do you think the core of our topic falls in? (Communication, collaboration, creativity, critical
thinking, productivity, leadership and technology literacy). Explain why.

7|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT


REFERENCES
PRINT OUTS:

LINKS:
https://www.britannica.com/technology/cloud-computing
https://www.geeksforgeeks.org/types-of-computer-networks/
https://www.cisco.com/c/en/us/products/switches/what-is-a-lan-local-
area-network.html
https://www.javatpoint.com/types-of-computer-network

8|COMPUTER SYSTEM SERVICING 3 GRADE 12 TECHVOC-ICT

You might also like