The document discusses network basics including different types of networks, components needed for connectivity, wired and wireless technologies, internet infrastructure, and security threats and protections. Networks can be local area networks of varying sizes and connect via wired or wireless methods. Components include routers, switches, and network interface cards. Wireless technologies include Wi-Fi and Bluetooth. The internet relies on protocols, IP addressing, and domain name systems to connect global networks. Security risks include viruses, hacking, and failure, while protections include firewalls, encryption, and antivirus software.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views2 pages
Topic For Discussion. Network Basics
The document discusses network basics including different types of networks, components needed for connectivity, wired and wireless technologies, internet infrastructure, and security threats and protections. Networks can be local area networks of varying sizes and connect via wired or wireless methods. Components include routers, switches, and network interface cards. Wireless technologies include Wi-Fi and Bluetooth. The internet relies on protocols, IP addressing, and domain name systems to connect global networks. Security risks include viruses, hacking, and failure, while protections include firewalls, encryption, and antivirus software.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Unit 3.
Network Basics
Today, networks are everywhere and everyone wants to be connected.
Networks can be classified according to their size and geographic scope. A network is as a spider web with many interconnecting points, referred to as node. A network node usually contains a computer, networked peripheral or network device. The most important network device is a router, which acts as a central distribution point for getting data to its destination. Network devices also include hubs, switches, gateways, bridges, wireless access points, and repeaters. To connect to a LAN, a computer requires network circuitry, sometimes referred to as a network interface card (NIC). Network circuitry is built into the main system board of most personal computers. If not, a NIC can be added to a slot in the system board or a USB port. Data in a network with wired connections travels from one device to another over cables. Wired connections are fast, secure and simple to configure. An example of wired network technology is Ethernet. A network without wires transports data through the air, eliminating the need for cables as RF signals (radio frequency signals), microwaves, infrared light beams. The most popular wireless LAN technologies are WI-FI and Bluetooth. WI- FI refers to a set of wireless networking technologies defined by IEEE802.11 standards. A WI-FI device transmits data as radio waves and is compatible with Ethernet, so you can use the two technologies in a single network. Bluetooth is a short-range wireless network technology that is designed to make connections between two devices and transmits data as radio waves too. Network links must move data and move it quickly. Broadband capacity is essential for networks that support many users, and those that carry lots of audio and video data, such as music and movie downloads. Protocols set standards for encoding and decoding data, guiding data to its destination. Some communications networks (telephone systems), use a technology called circuit switching, but more efficient is packet switching technology. A circuit switching network establishes a dedicated connection between two devices, whereas a packet switching network divides messages into small parcels and handles them on a first-come, first-served basis. The Internet infrastructure is based on high-capacity routers and communications links referred to as the Internet backbone, tied together at network access points where data can cross over from one NSP equipment to another. An Internet Service provider offers Internet access to individuals, businesses, and smaller ISPs. The Internet uses several communications protocols. Every device on the Internet has an IP address. As a rule, computers on the Internet that act as servers use static IP address. Most high-speed Internet connections use DSL technology and even dynamic IP addresses might seem permanent because they do not change unless you turn off your modem. Although IP addresses work for communication between computers, people use an easy-to-remember name a domain name. Every domain name corresponds to a unique IP address that has been entered into a huge database called the Domain Name System (DNS). A domain name server converts numeric IP addresses into familiar names. The speed of an Internet connection measured by utilities such as Ping and Traceroute refers to latency, the elapsed time for data to make a round trip from point A to point B. The speed is a measure of the amount of data that travels between two points in a given amount of time. Many Internet connections are asymetric, meaning the downstream speed is different from the upstream speed. Consumers have several options for connecting to the Internet. There are Fixed Internet access, Portable Internet access (include such services as Wi-Fi, portable satellite, and portable WiMAX), Mobile Internet access(includes mobile WiMAX and cellular broadband service). A dial-up connection is a fixed Internet connection that uses a voiceband modem and telephone lines to transport data between your computer and your ISP. DSL (digital subscriber line) is a high- speed, digital, always-on Internet access technology that runs over standard phone lines. Cable Internet service is a means of distributing always-on broadband Internet access over the same infrastructure that offers cable television service. Satellite Internet service is a means of distributing always-on, high-speed asymmetric Internet access by broadcasting signals to and from a personal satellite dish. WI-FI is also used for public networks operated by merchants, hotels, schools, and municipalities. Networks with wired or wireless connections are vulnerable to a variety of threats, including viruses, theft, and equipment failure. Many threats can be handled using techniques for standalone computers. Network equipment should be connected to power strips to prevent damage from power spikes. Data should be backed up in a case of a hard drive failure and computers should be protected by antivirus software. Wireless signals are broadcasted through the air can be picked up by any device equipped with a receiver tuned to the right frequency. Wired connections funnel data through a cable and wired signals can be intercepted only by physically tapping into the cable or router. If your network is not secured, hackers can easily connect to it, monitor transmitted data, access connected devices, spread viruses, and use your network as a launching pad for spam. One of the most common ways of gaining unauthorized access to a network-based computer is by looking for open port. A port probe (scan) is the use of automated software to locate computers that have open ports and vulnerable to unauthorized access. You should also up to date with the latest OS security patch and service pack. You can also install Firewall software designed to filter out suspicious packets. Corporations try to limit intrusions by setting up virtual private networks that offer encrypted connections for access to a remote server.