Module 1 (Reviewer)
Module 1 (Reviewer)
Module 1 (Reviewer)
Network: consists of two or more computers that are linked in order to share
resources exchange files, or allow electronic communications.
Hosts:
All computers that are connected to a network and participate directly in
network communication.
specifically refers to devices on the network that are assigned a number for
communication purposes
Can be called end devices. Some hosts are also called clients.
Internet Protocol (IP) address: host and the network to which the host is attached.
Servers:
Are computers with software that allow them to provide information, like email
or web pages, to other end devices on the network.
Each service requires separate server software. E.g. A
server requires web server software to provide web services to the
network
Clients:
are a type of host
have software for requesting and displaying the information obtained from the
server
An example of client software is a web browser, like Chrome or FireFox
End Device:
each end device on a network has an address
is either the source or destination of a message transmitted over the network.
Intermediary Device:
connect the individual end devices to the network
They can connect multiple individual networks to form an internetwork
provide conectivity and ensure that data flows across the network
MODULE 1
Network Media:
Communication transmits across a network on media.
The media provides the channel over which the message travels from source
to destination.
Modern networks primarily use three types of media to interconnect devices, as
shown in the figure:
Metal wires within cables - Data is encoded into electrical impulses.
Glass or plastic fibers within cables (fiber-optic cable) - Data is encoded
into pulses of light.
Wireless transmission - Data is encoded via modulation of specific
frequencies of electromagnetic waves.
Intermediary Devices:
Wireless Router
LAN Switch
Router
Firewall Appliance
Multilayer Switch
Network Media:
Wireless Media
LAN Media
WAN Media
MODULE 1
Network Media:
Topology diagrams are mandatory documentation for anyone working with a
network
They provide a visual map of how the network is connected.
LANs: network infrastructure that spans a small geographical area. LANs have
specific characteristics:
LANs interconnect end devices in a limited area such as a home, school,
office building, or campus.
A LAN is usually administered by a single organization or individual.
Administrative control is enforced at the network level and governs the
security and access control policies.
LANs provide high-speed bandwidth to internal end devices and
intermediary devices, as shown in the figure.
WANs: is a network infrastructure that spans a wide geographical area. WANs are
typically managed by service providers (SPs) or Internet Service Providers (ISPs).
WANs have specific characteristics:
WANs interconnect LANs over wide geographical areas such as between
cities, states, provinces, countries, or continents.
WANs are usually administered by multiple service providers.
WANs typically provide slower-speed links between LANs.
There are two other terms which are similar to the term internet: intranet and
extranet.
Intranet:
is a term often used to refer to a private connection of LANs and WANs
that belongs to an organization.
Is designed to be accessible only by the organization's members,
employees, or others with authorization.
MODULE 1
An organization may use an Extranet to provide secure and safe access to
individuals who work for a different organization but require access to the
organization’s data. Here are some examples of extranets:
A company that is providing access to
outside suppliers and contractors
A hospital that is providing a booking
system to doctors so they can make
appointments for their patients
A local office of education that is
providing budget and personnel
information to the schools in its district
The figure illustrates the levels of access that
different groups have to a company intranet, a
company extranet, and the internet.
Have you ever tried to watch a video with constant breaks and pauses? As
data, voice, and video content continue to converge onto the same
network, QoS becomes a primary mechanism for managing congestion and
ensuring reliable delivery of content to all users.
Network bandwidth
is measured in the number of bits that can be transmitted per
second (bps).
When simultaneous communications are attempted across the
network, the demand for network bandwidth can exceed its availability,
creating network congestion.
Congestion
occurs when the demand for bandwidth exceeds the amount
available.
4. Network Security
Types of Network Security Concerns:
network infrastructure security
information security.
Requirements of Security:
Confidentiality - Data confidentiality means that only the intended and
authorized recipients can access and read data.
MODULE 1
Integrity - Data integrity assures users that the information has not been
altered in transmission, from origin to destination.
Availability - Data availability assures users of timely and reliable access to
data services for authorized users.
2. Online Collaboration:
Individuals want to connect to the network, not only for access to data
applications, but also to collaborate with one another.
Collaboration:
defined as “the act of working with another or others on a joint
project.”
is a critical and strategic priority that organizations are using to
remain competitive.
3. Video Communications
Another facet of networking that is critical to the communication and
collaboration effort.
Video is used for communications, collaboration, and entertainment.
Video calls are made to and from anyone with an internet connection,
regardless of location.
4. Cloud computing
is one of the ways that we access and store data.
contains options such as Public, Private, Custom and Hybrid.
Cloud computing is possible because of data centers.
allows us to store personal files, even backup an entire drive on servers
over the internet.
Applications such as word processing and photo editing can be accessed
using the cloud.
Network Trends
are not only affecting the way we communicate at work and at school, but also
changing many aspects of the home.
The newest home trends include ‘smart home technology’.
Network security
is an integral part of computer networking, regardless of whether the network
is in a home with a single connection to the internet or is a corporation with
thousands of users.
It must be able to secure data while still allowing for the quality of service
that users expect of the network.
Firewall filtering
Firewall filtering blocks unauthorized access into and out of the network.
This may include a host-based firewall system that prevents unauthorized
access to the end device, or a basic filtering service on the home router
to prevent unauthorized access from the outside world into the network.