Narrative 3
Narrative 3
Narrative 3
NARRATIVE REPORT
In
Seminar 301
TOPIC 3: NETWORKS
https://www.youtube.com/watch?v=bFkYffPJq0M
information such as a web page from a web server or email from an email server. What is
Page
computer network? Computer network is a formed where 2 or more computer are linked
together. Every computer or device on a network can send and receive data from any of the other
computers or devices connected to the network. Network infrastructure contains three broad
categories of network components: Devices, Media, Services. There is what we call connecting
computer systems (hubs, switches, routers). What is Internet? Internet is a globally connected
network system uses TCP/IP protocol to transmit data. How does internet work? The internet
works when data travels in the form of packets. Evry file you send or request you make it split up
into packets over the internet. There is also what we call types of networks. Such as, LAN,
WAN, VLAN, SAN, WLAN, Intranet and Extranet, VPN, PAN, and P2P. Local Area Network
(LAN) – spans a small geographic area owned or operated by an individual or IT department.
Wide Area Network (WAN) – spans a large geographic area typically involving a
telecommunications service provider. Unlike the Internet, an intranet is a private collection of
LANs and WANs internal to an organization that is meant to be accessible only to the
organization’s members or others with authorization. An organization might use an extranet to
provide secure access to their network for individuals who work for a different organization that
need access to their data on their network.
Protocol is a set of rules for data transmission (data packet). Here’s the rules of protocol;
maintain integrity, flow control, prevent deadlock, and prevent error. Transmission Data-a
physical media by which data packets are transmitted. There are two types of transmission data
the wired and the wireless. Network security is an integral part of networking regardless of the
size of the network. The network security that is implemented must take into account the
environment while securing the data, but still allowing for quality of service that is expected of
the network. Securing a network involves many protocols, technologies, devices, tools, and
techniques in order to secure data and mitigate threats. Larger networks have additional security
requirements: Dedicated firewall system to provide more advanced firewall capabilities. Access
control lists (ACL) – used to further filter access and traffic forwarding. Intrusion prevention
systems (IPS) –used to identify fast-spreading threats such as zero-day attacks. Virtual private
networks (VPN) – used to provide secure access for remote workers.
I’ve learned a lot of learnings from the topics that been discussed in the webinar.
Here’s my insights and learnings gained from the topics. Hosts and End Devices: Every
computer connected to a network is called a host or end device. These can be servers that provide
information or clients that request information. Computer Networks: A computer network is
formed when two or more computers are linked together. Every computer or device on a network
can send and receive data from any of the other computers or devices connected to the network.
Network Infrastructure: Network infrastructure contains three broad categories of network
components: Devices, Media, Services. Devices for connecting computer systems include hubs,
switches, and routers Internet: The Internet is a globally connected network system that uses the
TCP/IP protocol to transmit data. It works by sending data in the form of packets. Types of
Networks: There are various types of networks such as LAN, WAN, VLAN, SAN, WLAN,
Intranet and Extranet, VPN, PAN, and P2P. Each type of network has a specific purpose and
scope. Protocols: Protocols are sets of rules for data transmission. They maintain integrity,
control flow, prevent deadlock, and prevent error. Transmission Data: Transmission data is a
physical media by which data packets are transmitted. It can be either wired or wireless.
Network Security: Network security is an integral part of networking. It involves many
protocols, technologies, devices, tools, and techniques to secure data and mitigate threats. Larger
networks have additional security requirements such as dedicated firewall systems, access
2
control lists (ACL), intrusion prevention systems (IPS), and virtual private networks (VPN).
Page
Let us remember that networks are more than cables and routers as we navigate this sea
of data. They're the channels of knowledge, bridges between minds and gateways into a digital
wonderland. So, dear reader, know that you're going through these invisible threads, the
lifeblood of our interconnected world, next time you click a link or send an email. In an era
where information flows like currents through invisible channels, computer networks emerge as
the architects of connectivity. To facilitate global connectivity, communication and collaboration
it is essential that networks are both social and technical. Their significance contributes to the
efficient functioning of an interdependent world, in a variety of sectors such as business,
education, emergency services or logistics. As technology advances, the ability to leverage these
networks and their applications will be an important factor in driving sustainable development
worldwide. These interconnected networks of communication extend beyond physical
boundaries, connecting devices, thoughts and aspirations. Let's take a look at what networks are
all about, their meaning, components and impact on our lives.
3
Page