0% found this document useful (0 votes)
39 views3 pages

Lesson 1 ICF 8 - 094608

Uploaded by

franbobpb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views3 pages

Lesson 1 ICF 8 - 094608

Uploaded by

franbobpb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Lesso

n
Networking Fundamentals
1

Definition of Terms

 Network - A network consists of two or more computers that are linked in order to
share resources (such as printers and CDs), exchange files, or allow electronic
communications. The computers on a network may be linked through cables, telephone
lines, radio waves, satellites, or infrared light beams.
 Ethernet - is a family of wired computer networking technologies commonly used in
local area networks (LAN), metropolitan area networks (MAN) and wide area networks
(WAN). It was commercially introduced in 1980 and first standardized in 1983 as IEEE
802.3.
 Wireless technology provides the ability to communicate between two or more
entities over distances without the use of wires or cables of any sort. This includes
communications using radio frequency (RF) as well as infrared (IR) waves.
 Intranet - is a private network, operated by a large company or other organization,
which uses internet technologies, but is insulated from the global internet.

 Extranet is an intranet that is accessible to some people from outside the company, or
possibly shared by more than one organization.
 INTERNET – stands for Interconnected Network that is a network system that connects
millions of servers. With the help of INTERNET the world is connected.
 Network security is any activity designed to protect the usability and integrity of
your network and data. It includes both hardware and software technologies. It targets
a variety of threats. It stops them from entering or spreading on
your network. Effective network security manages access to
the network.
 WIFI – Wireless Fidelity

A network is several computers, printers, and other devices that are connected together with
cables or radio signals. This allows the computers to “talk” with each other and share information
and resources (usually files and printers).
Networks vary in size; they can be as small as two computers connected to each other by a
cable, or they can span the entire globe—the Internet is actually the world’s largest network.
The collections of interconnected computer networks around the world make up the
Internet. People connected to the network can share resources and information. Computer
programs can be used and accessed simultaneously.

Types of Network

Computer network can be categorized according to range, functional relationship and


topology.

A. Computer Network According to Range.


1. Local Area Network (LAN) – A network that connects computers in the same
geographic area or within a local area, such as, building, room, a home or a school’s
computer laboratory. Computers in this kind of network can be interconnected through
cables or wireless links.
2. Metropolitan Area Network (MAN) – MAN is larger network than LAN. It usually
covers several offices, buildings or schools, each with their own LAN but connected to
each other in the same locality or place.
3. Wide Area Network (WAN) - A network that connects computers across a large
geographic area using telephone lines or satellites. The Internet is actually a huge Wide
Area Network.

B. Computer Network According to Functional Relationship

1. Peer-to-Peer Network - In a peer-to-peer network, everyone stores their files on their


own computer, and anyone on the network can access files stored on any other
computer. Because you don’t need any additional software (Windows 7 includes peer-
to-peer networking), peer-to-peer networking is an inexpensive way to connect
computers in a small office or home. The disadvantages of a peer-to-peer network are
that it doesn’t offer as much security as client/server networks, and it can be difficult to
find files that are stored on many different computers. Windows 7 Home is designed for
use in small home and office peer-to-peer networks.

2. Client/Server Network: In a client/server network, everyone stores their files on a


central computer called a server. Everyone on the network can access the files stored
on the server. Client/server networks are more secure, easier to administer, and much
more powerful than peer-to-peer networks. That’s why they are used to connect
computers in most businesses. The types of computers that can be used as servers
include mainframe computers, minicomputers and powerful PC, Macintosh, or UNIX
computers. Clients can use PCs, Macintosh computers, handheld devices, etc.

C. Computer Network According to Topology

Topology refers to the layout or structure of the network in relation with the flow of
data. The most common types of topologies are:
1. Star Topology - The most commonly applied topology. Uses a central device (hub)
with cables extending in all directions.

2. Linear Bus Topology – Linear bus topology uses one long cable, referred to as
backbone, to which computers and other devices are attached. A terminator is
placed at each end of the backbone to keep the signals from bouncing back and
being received again by the nodes in the network.
3. Ring Topology- It

computer to the next in one direction only. Any data or messages will pass through
adjacent nodes until it reaches the target node.

4. Hybrid Topology- Hybrid topology is a combination of different types of topology used in a


network system to adapt to the different design of floors or rooms in a building.

You might also like