0% found this document useful (0 votes)
20 views45 pages

GEITE01X - Week 2 - Lec

Uploaded by

paigewildcrii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views45 pages

GEITE01X - Week 2 - Lec

Uploaded by

paigewildcrii
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 45

LIVING IN THE IT ERA

Week 2
Objectives
• Setting up a basic workstation
• Configuring Network Access and Wireless Device

Topics
• Set up a basic workstation
• Network Access and Wireless Device
• Network connection types
• The purpose of a network and alternative technologies
SET UP A BASIC WORKSTATION
To set up a basic workstation, you can follow this process:
1. Gather and connect hardware components.
2. Power on the computer.
3. If necessary, run the operating system setup
utility.
4. If necessary, configure the peripherals.
5. Configure and verify the Internet connection.
SET UP A BASIC WORKSTATION
6. Install security software.
7. Identify which applications should be on the
workstation and install or uninstall applications as
necessary.
8. Update operating system, security, and application
software as needed to ensure that all software is up to
date.
9. Configure user accounts as needed.
10. Perform basic cable management to reduce clutter and
enhance physical safety.
CLUTTERED COMPUTER CABLES
CABLE MANAGEMENT
COMPUTER NETWORKS
A computer network is a group of computers that are connected
together to communicate and share network resources such as
files, applications, and devices.
NETWORK CONNECTION METHODS
▪Wired computer networks use a technology called
Ethernet.
ETHERNET CABLE/CONNECTION
NETWORK CONNECTION METHODS
▪Wireless computer network
WIRELESS COMPUTER NETWORK
▪ Wireless networks are computer networks that
are not connected by cables of any kind.

▪ The use of a wireless network enables enterprises


to avoid the costly process of introducing cables
into buildings or as a connection between different
equipment locations.
NETWORK CONNECTION METHODS
▪Cellular network
CELLULAR NETWORK
CELLULAR NETWORK
▪ A Cellular network or Mobile network is a radio
network distributed over land areas called cells,
each served by at least one fixed-location
transceiver, known as a cell site or base station.

▪ In a cellular network, each cell uses a different set


of frequencies from neighboring cells, to avoid
interference and provide guaranteed bandwidth
within each cell.
NETWORK TYPES
LAN (local area network) WAN (wide area network)
TYPES OF WIRELESS NETWORKS
SOHO NETWORKS
SOHO NETWORK
▪ A small office/home office, or
SOHO, network is a local area
network, or LAN, with less
than 10 computers that serves
a small physical space with a
small number of employees
or home users.
▪ It can be a wired Ethernet LAN
or a LAN made of both wired
and wireless devices.
SOHO NETWORK
NETWORK TECHNOLOGIES
Virtualization
VIRTUALIZATION
▪ Virtualization uses software to create an abstraction
layer over computer hardware that allows the
hardware elements of a single computer—
processors, memory, storage and more—to be
divided into multiple virtual computers, commonly
called virtual machines (VMs).
VIRTUAL MACHINES (VMS)
▪ Virtual machines (VMs) are virtual environments
that simulate a physical computer in software form.

▪ Each VM runs its own operating system (OS) and


behaves like an independent computer, even
though it is running on just a portion of the actual
underlying computer hardware.
HYPERVISOR
▪ A hypervisor is the software layer that coordinates VMs.
▪ It serves as an interface between the VM and the
underlying physical hardware, ensuring that each has
access to the physical resources it needs to execute.
▪ It also ensures that the VMs don’t interfere with each other
by intruding on each other’s memory space or compute
cycles.
CLOUD COMPUTING
CLOUD COMPUTING
▪ In simple terms, cloud computing is a range of
services delivered over the internet, or “the
cloud.”
▪ It means using remote servers to store and access
data instead of relying on local hard drives and
private datacenters
▪ Cloud computing is named as such because the
information being accessed is found remotely in the
cloud or a virtual space.
CLOUD COMPUTING
▪ Companies that provide cloud services enable
users to store files and applications on remote
servers and then access all the data via the
Internet.

▪ Examples would include: Dropbox, a file storage


and sharing system, Google Drive
WEB APPLICATIONS
WEB APPLICATIONS
▪ A Web application (Web app) is an application
program that is stored on a remote server and
delivered over the Internet through a browser
interface.

▪ Web applications include online forms, shopping


carts, word processors, spreadsheets, video and
photo editing, file conversion, file scanning, and
email programs such as Gmail and Yahoo.
VOICE OVER INTERNET PROTOCOL (VOIP)
VOICE OVER INTERNET PROTOCOL (VOIP)
▪ Voice over Internet Protocol (VoIP), is a technology that allows you to
make voice calls using a broadband Internet connection instead of a
regular (or analog) phone line.

▪ The key difference between VoIP and regular phone numbers is the
way they send calls. A VoIP phone number uses the internet to
connect calls, whereas a regular phone does so through traditional
phone lines
SHARING AND STORAGE METHODS
Local vs Hosted Storage
▪ Local storage refers to any storage media
that is directly attached to the computer
that uses it.
▪ external hard drives, flash drives, and CDs


SHARING AND STORAGE METHODS
▪ Hosted storage, or networked storage, places data
on specialized devices that serve files to clients in a
networked based on each client’s need.
▪ Cloud storage stores files on remote servers
connected through the internet.
TCP/IP AND HTTP
▪ TCP
▪ Transmission Control Protocol
▪ IP
▪ Internet Protocol
▪ HTTP
▪ Hyptertext Transfer Protocol
IP (INTERNET PROTOCOL)
▪ It is the set of rules or methods how data are sent from one
computer to another in the internet.
▪ It is like the foundation of how computers and devices talk
to each other on the Internet.
▪ Each device connected in the internet have special
addresses called IP addresses.
▪ These addresses help devices find each other on the
internet.
TRANSFER CONTROL PROTOCOL
▪ TCP is a special set of rules that work together with the
Internet Protocol (IP) to make sure data gets sent and
received correctly between computers on the Internet.

▪ TCP is like a traffic cop on the internet, it helps make sure


that data packets arrive safely at their destinations.
HYPERTEXT TRANSFER PROTOCOL
▪ HTTP is the way your computer and a web server communicate to load
websites. It’s like a conversation where your computer asks for a
webpage, and the server replies by sending it to you.
▪ It’s like a language that web browsers and servers use to talk to each
other.
▪ HTTP has different “verbs” or actions:
▪ GET (fetch something);
▪ POST (send something);
▪ PUT (update something); and
▪ DELETE (remove something).
HYPERTEXT TRANSFER PROTOCOL
SHARING AND STORAGE METHODS
▪Hypertext Transfer Protocol (HTTP) is
the TCP/IP service that enables
clients, such a web browser
application, to connect and interact
with websites.
▪ It is used for transmitting hypermedia
documents, such as HTML.
▪HTML stands for HyperText Markup
Language. It is a well-known markup
language used for web page development.
SHARING AND STORAGE METHODS
▪ Hyper Transfer Protocol Secure (HTTPS) is a secure
version of the HTTP that supports web commerce
by providing a secure connection between web
browsers and servers.
▪ The “s” in “https” stands for secure, which indicates
that the site is using a Secure Sockets Layer (SSL)
Certificate.
▪ This lets you know that all your communication and
data is encrypted as it passes from your browser to
the website's server.
SHARING AND STORAGE METHODS
File Transfer Protocol (FTP)
SHARING AND STORAGE METHODS
File Transfer Protocol (FTP)
▪ It is used to transfer files across a TCP/IP network,
such as the internet
▪ FTP is intended to enable file transfers,
independent of the operating system.
▪ FTP is used for the transfer of computer files from a
server to a client on a computer.
SHARING AND STORAGE METHODS
Bluetooth
▪ A wireless
technology that
facilitates short-
range wireless
communication
between devices.
SHARING AND STORAGE METHODS
Near Field Communication (NFC)

A standard of communication for


mobile devices, such as
smartphones and tablets, that are
very close proximity, usually when
touching or being only a few inches
apart from each other.
SHARING AND STORAGE METHODS
▪ Near Field Communication (NFC) ▪ Examples of devices with
▪ Examples of devices with active
passive tags:
tags: ▪ Credit cards
▪ Reader terminals in retail stores ▪ Bank cards and debit
▪ Smartphones
cards
▪ Wearables such as smartwatches
EXAMPLE OF IMPLEMENTATION OF NFC

You might also like