0% found this document useful (0 votes)
7 views57 pages

Networks Mod09

The document discusses the impact of the Internet on communication and collaboration, outlining various network types, structures, and protocols. It covers how users interact with networks, the advantages of home and business networks, and the importance of network standards and security. Additionally, it details the hardware necessary for network connections and the roles of network professionals.

Uploaded by

asandazibisi613
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views57 pages

Networks Mod09

The document discusses the impact of the Internet on communication and collaboration, outlining various network types, structures, and protocols. It covers how users interact with networks, the advantages of home and business networks, and the importance of network standards and security. Additionally, it details the hardware necessary for network connections and the roles of network professionals.

Uploaded by

asandazibisi613
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 57

Icebreaker: Interview Simulation

The Internet has changed the way we work and has turned the entire
world into a digital village.

Discuss the ways the Internet has affected our lives and our ways of
working together.
Module Objectives

By the end of the module, you should be able to:


• Explain how a user interacts with a network
• Identify types of network structures
• Describe network standards and protocols
• Explain how to use hardware to connect to a network
• Explain how to set up a network
• Identify network security tools
• Describe the role of a network professional
How Do You Interact with a Network
(1 of 9)
• A Network is a system of two or more
devices linked by wires, cables, or a
telecommunications system.
• Networks allow computers to share
resources, such as hardware, software,
data, and information.
• A Network requires a combination of
hardware and software to operate.
• Networks act as a communications
system around the globe through the
Internet. Figure 9-1 Networks can share
resources and data
How Do You Interact with a Network
(2 of 9)
• The process in which two or more computers or devices transfer
data, instructions, and information is known as digital
communications.
• All types of computers and mobile devices serve as sending and
receiving devices in a communications system.
• Communications devices are modems, wireless access points,
routers, and so on.
• Transmission media can be wired or wireless.
How Do You Interact with a Network
(3 of 9)
Table 9-1 Communication system components.

Device Purpose
Communications device Connects the sending device to the transmission
media
Receiving device Accepts the transmission of data, instructions, or
information
Sending device Initiates an instruction to transmit data, instructions,
or information
Transmission media or a Means by which the data, instructions, or
communications channel information travel
How Do You Interact with a Network
(4 od 9)
Home
* Exist within a single building
Structures, * Easy to install and configure
standards, range, * Accessed by only a few users
and so on
Classification of
Networks
Business
* Accommodate many users
* Access large amounts of data
* Can be spread across many
buildings
How Do You Interact with a Network
(5 of 9)

Figure 9-3 Typical home network.


How Do You Interact with a Network
(6 of 9)
Home Networks provide home users with the following capabilities:
• Multiple users can share a single Internet connection.
• Files on each computer, such as photos, can be shared.
• Multiple computers can share a single hardware resource, such as a printer.
• Game consoles can connect to the Internet to facilitate online gaming.
Business Networks provide the following advantages to businesses:
• Facilitate communication among employees
• Share hardware, such as printers and scanners
• Share data, information, and software with one another
• Centrally store and backup critical information
How Do You Interact with a Network
(7 of 9)
Businesses use intranets, extranets, and VPNs (virtual private
networks) to provide different services to employees.
Intranet Extranet VPN
• An intranet An extranet (extra A VPN can allow an
(intra means means outside or individual to access
within) is an beyond) allows an organization’s
internal network customers or network by using
that uses suppliers to access encryption and other
Internet part of its intranet. technologies to secure
technologies. the data transmitted
along the path.
How Do You Interact with a Network
(8 of 9)
Wired Networks
• It sends signals and data through cables traveling through floors and walls to connect
to other network devices.
• Wired networks tend to be more secure and transmit data faster than wireless
networks.
Wireless Networks
• It sends signals through airwaves and usually does not require cables.
• Wireless networks can be less secure but more convenient and easier to set up than
wired networks.
Cellular network or mobile network is a communication network where the link to and
from end nodes is wireless.
• Various types of cellular networks are 3G, 4G, and 5G.
How Do You Interact with a Network
(9 of 9)
Communications software consists of programs and apps that:
• Help users establish a connection to another computer, mobile
device, or network
• Manage the transmission of data, instructions, and information
• Provide an interface for users to communicate with one another
Network Structures (1 of 7)

• Home and business networks describe the main users of a Network.


• Networks can be classified by:
✔ Their topology (the method by which computers and devices are
physically arranged on a network)
✔ Network architecture (the logical design of all devices on a network)
✔ Geographic reach
• Topology describes the layout of network devices, architecture describes the
role of servers and users, and the geographic span of a network determines how
wide the network reaches.
• Common network topologies include bus network, ring network, star network, and
mesh network.
Network Structures (2 of 7)
Table 9-2 Network topologies.
Type Description Layout
Bus network All devices are attached to a central cable, called a
“bus,” that carries the data. If the bus fails, the
devices on the network will no longer be able to
communicate.

Mesh All devices are interconnected with one another. If


network a single device on the network fails, the rest of the
network will continue to function by
communicating via an alternate route. Two types of
mesh topologies are a full mesh topology (each
device on the network is connected to every other
device on the network) and a partial mesh
technology (each device may or may not be
connected to all other devices on the network).
Network Structures (3 of 7)
Table 9-2 Network topologies (continued).
Type Description Layout
Ring network Data travels from one device to the next in a
sequential fashion. If one device on the
network fails, all communication on the
network could cease to function. Ring
networks are no longer common.

Star network Each device on the network is attached to a


central device, such as a server or switch. If
the central device fails, the other devices
will be unable to communicate. If a
connected device fails, all other devices will
still be able to communicate. Two or more
star networks may be joined together using
a bus to form a tree topology. Tree
topologies are often are used in schools and
businesses.
Network Structures (4 of 7)
• On a client/server network,
one or more computers act as a
server, and the other computers
on the network request resources
from the server.
• A client is a computer or mobile
device on the network that relies
on the server for its resources.
• Client/server networks are
controlled by a network Figure 9-5 Sample client/server network.
administrator.
Network Structures (5 of 7)
• A peer-to-peer (P2P) network is a network architecture that
connects a small number of computers, fewer than 10.
• With this type of network, computers communicate directly with
one another and can share one another’s resources.
• All computers are treated equally, and a network administrator is
not required.
• A type of P2P network where users share files over the Internet.
• The files in an Internet peer-to-peer network transfer directly
from one user’s computer to the other.
• It is illegal to share copyright-protected files or other resources.
Network Structures (6 of 7)
• A local area network (LAN) connects computers and devices in a
limited area.

Figure 9-6 Sample LAN.


Network Structures (7 of 7)
• Network configurations come in a variety of sizes, which can be
determined not only by the number of devices they connect but also by
their geographic reach.
• A wireless LAN (WLAN) is a LAN that uses wireless connections.
• A wide area network (WAN) is a network that connects devices in a large
geographic region.
• A metropolitan area network (MAN) is a type of wide-area network that
is operated by a city or county.
• A personal area network (PAN) connects personal digital devices
connected via Bluetooth like a smartwatch.
• A body area network (BAN) is a form of personal area network that
consists of small, lightweight biosensors implanted in the body.
Discussion Activity 9-1

Are Bluetooth devices a boon or a bane? Discuss the advantages and


disadvantages of using Bluetooth connectivity.
Network Standards and Protocols (1
of 11)
• Network standards define guidelines that specify the way computers access a
network, the type(s) of hardware used, data transmission speeds, and the types of
cable and wireless technology used.
• A protocol is a standard that outlines the characteristics of how devices
communicate on a network, such as data format, coding schemes, error handling,
and the sequence in which data transfers over the network.
• Network standards and protocols work together to move data through a network.
• The most common standard for wired networks is Ethernet. It controls how
network interface cards (NICs), routers, and modems share access to cables and
phone lines, as well as how they transmit data.
• Most businesses use a standard, such as EDI (electronic data interchange),
that defines how business documents travel across transmission media.
Network Standards and Protocols (2
of 11)
Table 9-3 Network standards and protocols.
Name Type Sample Usage
Bluetooth Protocol Wireless headset
IrDA Standard Remote control
LTE Standard Mobile phones
NFC Protocol Mobile phone
payment
RFID Protocol Tollbooth
TCP/IP Protocol Internet
Token ring Standard LAN
UWB Standard Inventory tracking
Wi-Fi Standard Hot spots
Network Standards and Protocols (3
of 11)
• A protocol may define data format, coding schemes, error handling, and the
sequence in which data transfers over a network.
• One common family of protocols is TCP/IP (Transmission Control
Protocol/Internet Protocol).
• TCP defines how data is routed through a network, and IP specifies that all
computers and devices connected to a network have a unique IP address.
• Two types of IP addresses: IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6).
• The network protocols for LANs, WANs, MANs, and other wireless protocols support
close-distance communication.
• These standards include Wi-Fi, LTE, Bluetooth, UWB, IrDA, RFIC, and NFC.
Network Standards and Protocols (4
of 11)
• Wireless capability of computers or devices to communicate via radio waves
with other computers or devices using Wi-Fi, which identifies any network based
on the 802.11 standards.
• 802.11 is a series of network standards developed by the IEEE.
• Common standards include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and
802.11ax, with data transfer rates ranging from 11 Mbps to 7 Gbps.
• A designation of 802.11 ac/b/g/n/ac/ax on a computer, router, or other device
indicates that it supports those six standards (ac, b, g, n, ac, and ax).
• Wi-Fi networks can easily be integrated with wired Ethernet networks.
• Extra hardware needs to be installed to extend or strengthen a wireless signal.
Network Standards and Protocols (5
of 11)
• Bluetooth is a network protocol that defines how two Bluetooth devices use
short-range radio waves to transmit data.
• The data transfers between devices at a rate of up to 3 Mbps.
• A Bluetooth device contains a small chip that allows it to communicate with other
Bluetooth devices.
• Two Bluetooth devices are connected initially using a code, and devices that
share a Bluetooth connection are said to be paired.
• Connect devices with vehicle stereos to use the vehicle’s speakers to project
sound
• Use GPS receivers to send directions to a mobile phone or GPS-enabled device
• Transfer photos wirelessly from a digital camera to a laptop or server. Replace
wired communications devices, such as barcode readers, with wireless devices to
enhance portability
Network Standards and Protocols (6
of 11)

Figure 9-7 Connecting your phone to your car’s Bluetooth.


Network Standards and Protocols (7
of 11)
• UWB is a network standard that specifies how two UWB devices use short-range
radio waves to communicate at high speeds with each other.
• UWB can transmit signals through doors and other obstacles.
• UWB is best suited for the transmission of large files, such as video, graphics, and
audio.
• Examples of UWB uses include locating and tracking inventory, equipment, or
personnel in remote or dangerous areas.
• Devices, such as television remote controls, use the IrDA (Infrared Data
Association) standard to transmit data wirelessly to each other via infrared (IR)
light waves.
• Since Bluetooth and UWB do not require line-of-sight transmission, these
technologies are more widespread than IrDA.
Network Standards and Protocols (8
of 11)
• RFID (radio frequency identification) is a protocol that defines
how a network uses radio signals to communicate with a tag placed
in or attached to an object, an animal, or a person.
• The tag, called a transponder, consists of an antenna and a memory
chip that contains the information to be transmitted.
• An RFID reader, also called a transceiver, reads the radio signals and
transfers the information to a computer or other computing device.
• Readers can be handheld or embedded in an object, such as a
doorway or a tollbooth.
Network Standards and Protocols (9
of 11)

Figure 9-8 How electronic RFID toll collection works.


Network Standards and Protocols (10
of
• NFC (near-field communications) is
11)
a protocol based on RFID.
• Smartphones, digital cameras,
televisions, and terminals are NFC-
enabled devices.
• Credit cards, tickets, and NFC tags are
examples of objects that also use NFC
technology.
• An NFC tag is a chip that can store small
amounts of data.
• NFC tags can be found in many different
items, including business cards, Figure 9-9 NFC communication
wristbands, stickers, and ski lift tickets. examples.
Network Standards and Protocols (11
of 11)
Table 9-4 Close-distance network protocols.
Network Common Uses
Protocol
Bluetooth Devices communicating with one another over a short range (usually
less than 30 feet/9 meters)
IrDA Remote controls or other data transmission within close proximity
LTE Uses radio signals to communicate data over cellular networks
NFC Used in credit cards, smartphones, and tickets to facilitate close-range
communication
RFID Radio signals transmitted through antennas, often found in tollbooth
transponders or embedded chips in animals
UWB Low-energy radio technology for short-range, high-bandwidth
communications
Wi-Fi Hot spots and wireless home and small business networks using TCP/IP
Knowledge Check Activity 9-1

Which of the following close-distance protocols does NOT use radio


signals?
a. RFID
b. UWB
c. IrDA
d. LTE
Knowledge Check Activity 9-1: Answer

Which of the following close-distance protocols does NOT use radio


signals?

Answer: c
IrDA
Network Connection Hardware (1 of 8)
• Nodes, or devices on a network, can be computers, tablets, mobile
phones, printers, game consoles, or smart home devices.
• Hubs provide a central point for network cables in a network and
are used to transfer data to all devices.
• Switches, used more frequently than hubs, also provide a central
point for network cables in a network and transfer data only to the
intended recipient.
• Routers connect two or more networks and direct, or route, the flow
of information along the networks.
Network Connection Hardware(2 of 8)

• A modem connects a sending or receiving device, such as a


computer, to a communications channel, such as the Internet.
• The modem connects your network to the Internet through an ISP.
• A digital modem, also called a broadband modem, is a
communications device that sends and receives data and
information to and from a digital line.
• Three types of digital modems are cable modems, DSL
modems, and ISDN modems.
Network Connection Hardware (3 of 8)

A cable modem uses a


cable TV connection. A
splitter connects one part
of the cable to your cable
box or device, and the
other part to the cable
modem.

Figure 9-10 Typical cable modem installation.


Network Connection Hardware (4 of 8)

• A DSL modem uses standard copper


telephone wiring.
• An ISDN (Integrated Services
Digital Network) modem is a
broadband modem that sends digital
data and information from a computer
to an ISDN line and receives digital
data and information from an ISDN
Figure 9-11 Cable modem
line. and
• DSL and ISDN modems are external wireless router.
devices.
Network Connection Hardware (5 of 8)

• A dedicated line is a type of always-on physical connection that is


established between two communications devices.
• Businesses often use dedicated lines to connect geographically
distant offices.
• Dedicated lines can be either analog or digital.
• Multiplexing is a process that combines multiple analog or digital
signals into a single signal over a shared medium, such as a cable.
• Digital dedicated lines include cable television lines, DSL, ISDN lines,
FTTP, T-carrier lines, and ATM.
Network Connection Hardware (6 of 8)
Table 9-5 Digital dedicated lines.
Type Description

Cable The cable television (CATV) network provides high-speed Internet connections.
The CATV signal enters a building through a single line, usually a coaxial cable,
which connects to a modem that typically attaches to your computer via an
Ethernet cable.

DSL, ADSL DSL (Digital Subscriber Line) transmits on existing standard copper phone
wiring. ADSL (Asymmetric Digital Subscriber Line) is a type of DSL that
supports faster downstream rates than upstream rates.

ISDN ISDN (Integrated Services Digital Network) refers to both a circuit-switched


telephone network system and a set of communication standards used to
transmit data, voice, and signaling.
Network Connection Hardware (7 of 8)

Table 9-5 Digital dedicated lines (continued).


Type Description
FTTP FTTP (Fiber to the Premises) uses fiber-optic cable to provide extremely high-
speed Internet access to a user’s physical permanent location. An optical
terminal at your location receives the signals and transfers them to a router
connected to a computer.

ATM ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video,
and media at very high speeds. Phone networks, the Internet, and other
networks with large amounts of traffic use ATM.
Network Connection Hardware (8 of 8)

Table 9-5 Digital dedicated lines (continued).


Type Description
T-Carrier Any of several types of long-distance digital phone lines that carry multiple
signals over a single communications line. Digital T-carrier lines use
multiplexing so that multiple signals share the line. T-carrier lines provide
very fast data transfer rates. Only medium to large companies usually can
afford the investment in T-carrier lines because these lines are so expensive.
The most popular T-carrier line is the T1 line. Main users of T3 lines include
large corporations, phone companies, and ISPs connecting to the Internet
backbone.
The Internet backbone itself also uses T3 lines.
How To: Set Up a Network (1 of 5)

• A home network can be as simple as using a cable to connect two devices.


• A wireless, Internet-connected home network requires hardware like:
✔ a modem
✔a router
✔ a wireless access point
✔devices to be connected
• Installation of a home wireless network depends on factors such as:
✔ the type of wireless network hardware you purchase
✔ the size of your home
✔ the devices you want to connect to the wireless network
How To: Set Up a Network (2 of 5)

• Purchase a modem or separate wireless router and


connect it to your home’s Internet service
Step 1

• Enable the wireless network


Steps to set • Configure a name for the network
up a Network Step 2 • Configure a wireless network key

• Enable the device’s wireless functionality


• Search for and connect to the name of the wireless
network you specified in Step 2
Step 3 • Enter the wireless network key you set in Step 2
How To: Set Up a Network (3 of 5)
• Adding a wireless printer to a home
or small office network has several
advantages.
• Multiple computers and mobile
devices on the network can use the
printer.
• Once the printer is installed on the
network, you can download an app
from the manufacturer to send
documents to the printer from
network-connected devices.
Figure 9-12 Sending a document to a
wireless printer.
How To: Set Up a Network (4 of 5)

• Set the location of the wireless printer within the range of the
wireless network
• Place the printer on a stable surface
• Access the printer’s settings and navigate to the network settings
• Connect to the wireless network in your home or small office
• Enter any remaining required information
• Install the printer app on the computer(s) and devices from which
you want to print to the wireless printer
How To: Set Up a Network (5 of 5)

• If your wireless router or wireless access point


has an antenna(s), extend it completely
• If you can remove the antenna(s) from your
wireless router or wireless access point,
replace it with a wireless signal booster
• Place the wireless router or wireless access
point in a central location of your home
• Purchase a booster (or repeater), which is
an amplifier used to improve reception and Figure 9-13 Wireless signal
extend the range booster.
• Change the router if problems persist
Secure IT: Secure a Network (1 of 5)

• Wireless Networks are easily accessible.


• It leads to several common network risks.
• Change the default password for the wireless access point, the SSID
name, encryption, and a MAC address
• Keep a regular check on the number of connected devices to the
wireless router
Secure IT: Secure a Network (2 of 5)
Table 9-6 Common network risks.
Risk Description
Adware Displays unwanted advertisements on your computer
Spyware Tracks and transmits personal information from your computer or
device without your knowledge
Virus Damages data on your computer or device or changes system
settings
Worm Spreads throughout a computer and/or network without requiring user
interaction
Trojan Disguises itself as or hides in a legitimate file and then causes
damage to programs and data when opened
Ransomware Locks you out of programs and data on your computer until you pay a
ransom to regain access
Rootkit Gains administrator-level, or root-level, access to a computer or
network without the system or users detecting its
presence
Secure IT: Secure a Network (3 of 5)
The Network attached storage (NAS) devices provide a
centralized location for storing programs and data on large and
small networks. Authentication identifies you to
the network. The most
common type of authentication
Encryption scrambles is providing a username and
or codes data as it password.
is transmitted over a
network.

Biometric devices
Firewalls create a authenticate identity by
blockade between scanning your physical
corporate or personal characteristics, such
Networks and the Internet. as a fingerprint.

Figure 9-14 Securing a network.


Secure IT: Secure a Network (4 of 5)

• Network monitoring software constantly assesses the status of a


network and sends an email or text message, when it detects a
problem.
• Monitoring software can measure the amount of network traffic,
graph network usage, determine when a specific program uses the
network, and show the bandwidth used by each computer or mobile
device.
• Packet sniffer software monitors and logs packet traffic for later
analysis.
• Hackers use packet sniffer software to hijack a computer.
Secure IT: Secure a Network (5 of 5)
Use the following steps to determine if someone is accessing a wireless
network without permission:
• Sign in to the administrative interface
• Count the number of connected devices
• Secure the network
• Enable the router’s firewall and, if possible, use “stealth mode” to
make the network less visible to outsiders
Ethics and Issues: Responsibilities of
a

Network
The role of a network
Professional (1 of 2)
administrator is to plan,
design, purchase equipment for,
set up, secure, and maintain a
network.
• USENIX is a nonprofit
organization that was founded
in 1975 to support network and
system engineers and operators
in innovation and research. Figure 9-15 A network administrator
is in a position of trust.
Ethics and Issues: Responsibilities of
a
Network Professional (2 of 2)
The code includes guidelines for:
• Professionalism • System Integrity
• Social Responsibility • Education
• Personal Integrity • Responsibility to Computing
• Privacy Community
• Laws and Policies • Ethical Responsibility

• Communication
Case Study Activity 9-1 (1 of 2)

Marina resides in a large apartment and uses a wireless network with


data transfer rates ranging from 11 Mbps to 20 Mbps within a 100-foot
range. She noticed poor network performance in her room while her
roommates are enjoying access to the network at their various
locations.

Whenever she needs to send files or photos through her computer or


device, she has to leave her room.
Case Study Activity 9-1 (2 of 2)

After reading the case study on the previous slide, answer the following
question, “What could be the problem? Is there an issue with the
settings of her handset or computers?”

What is the most likely cause of Marina’s issue?


a. The router does not support all locations.
b. The wireless signal is too strong for the apartment.
c. The strength of the wireless signal needs to be improved.
d. The router is open to five connections only.
Case Study Activity 9-1: Answer

What is the most likely cause of Marina’s issue?


Answer: c.
The strength of wireless signals needs to be improved.
Self-Assessment

1. Take a few minutes and reflect on what you learned about networks
and network devices. What topics would you like to learn more
about?
2. Were there any sections in this module that you found difficult or
confusing? If so, describe what they were.
Summary

Click the link to review the objectives for this module.


Link to Objectives

You might also like