Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1.

Types of Networks: (Alonzo & Santander)


 Local Area Network (LAN): A LAN is a network that covers a small geographic area,
like a home, office, or campus. It typically uses Ethernet cables or Wi-Fi for
connections.
 Wide Area Network (WAN): A WAN covers a larger geographic area and often
connects multiple LANs. The internet itself is a massive WAN.
 Wireless Networks: Wireless networks, like Wi-Fi, use radio waves to connect
devices without physical cables.
 Metropolitan Area Network (MAN): MANs cover cities or large campuses,
connecting multiple LANs.
 Virtual Private Network (VPN): A VPN extends a private network across a public
network (usually the internet), providing secure and encrypted communication.

PowerPoint Presentation Content

Local Area Network (LAN)


- A Local Area Network (LAN) is a network that covers a small geographic area, typically
within a building, home, office, or campus. It's like a digital neighborhood where
computers, printers, and other devices are connected and can communicate with each
other. LANs usually use Ethernet cables or Wi-Fi for connections.

EXAMPLE
 Imagine your home network where all your devices like computers, smartphones,
printers, and smart TVs are connected, allowing you to share files and use the internet
within your home.

ADVANTAGES
Faster data transfer rates within a limited area, enabling quick communication between
devices.
 Easier sharing of resources such as printers, files, and internet connectivity among
devices within the network.

DISADVANTAGES
 Limited geographic coverage, making it suitable for small-scale communication within a
confined area.

Wide Area Network (WAN)


- A Wide Area Network (WAN) is like a digital highway that covers a vast geographic area,
connecting multiple Local Area Networks (LANs) across cities, countries, or even
continents. It's how cities and countries are connected in the digital world, allowing
communication between different locations. The internet itself is the largest example of
a WAN.

EXAMPLE
 Picture the internet as a massive spiderweb, connecting people, businesses, and
organizations across the globe. It's like a worldwide 'net' that links everyone and
everything together.
ADVANTAGES
 Let’s you talk to people far away.
 Helps businesses connect offices globally.
DISADVANTAGES
 Can be slower compared to smaller networks.
 Needs more security because it’s big.

Wireless Networks
- Wireless networks transmit data using radio waves, eliminating the need for physical
cables, and are widely used for internet connectivity and device communication. They
come in various forms, including Wi-Fi, cellular networks, and satellite connections,
providing convenient wireless access for various purposes.

EXAMPLE
 Using Wi-Fi at a café to browse the internet on your phone.

ADVANTAGES
 No need for messy cables.
 Easy to move around while staying connected.

DISADVANTAGES
 Sometimes the signal isn't very strong. Can be slower than wired connections.

Metropolitan Area Network (MAN)


- A Metropolitan Area Network (MAN) is a high-speed network that spans a city or a large
campus, connecting multiple buildings and locations within a specific geographic area.
MANs provide efficient data communication over short to medium distances, serving as
a bridge between Local Area Networks (LANs) and Wide Area Networks (WANs).

EXAMPLE
 A university Wi-Fi network that covers all the campus buildings.

ADVANTAGES
 Connects a whole area, like a university campus. Helps people in one area share
information easily.

DISADVANTAGES
 Not as big as the worldwide internet.
 Can be expensive to set up.

A Virtual Private Network (VPN)


- is a technology that creates a secure and encrypted connection over a public network,
typically the internet. It allows users to access a private network or browse the internet
with enhanced privacy and security, by masking their IP addresses and encrypting data
traffic, making it difficult for third parties to intercept or monitor their online activities.
VPNs are commonly used for remote work, online privacy, and bypassing geo-
restrictions on websites and services.

EXAMPLE
 Working from home but still accessing your work's secure system.

ADVANTAGES
 Keeps your information safe and private online.
 Let’s you connect to your work or home network from anywhere.
DISADVANTAGES
 Can sometimes slow down your internet a bit.
 Can be a bit tricky to set up.

2. Networking Components: (Aurestila & Lambojon)


 Router: A router connects different networks and directs data traffic between them.
In homes, routers often connect the local network to the internet.
 Switch: A switch connects devices within the same network (e.g., in a LAN) and
forwards data packets between them.
 Modem: A modem translates digital data from your network into a form that can be
transmitted over the internet (and vice versa).
 Firewall: A firewall is a security device or software that filters and monitors network
traffic, protecting against unauthorized access and threats.

PowerPoint Presentation Content

Router
- A router is a fundamental networking device that connects different networks and
transfers data between them. Its primary role is to route data packets between a local
network and the internet.

Functions In homes, routers connect Routers are essential for


Routers enable the flow of various devices to the providing internet
data between devices internet, allowing connectivity and allowing
within a local network and seamless internet access devices to communicate
the global internet. for multiple devices like across diverse networks.
smartphones, laptops, and
smart TVs.
Examples Importance

Switch
- A switch is another critical networking component that connects devices within the
same network, such as a Local Area Network (LAN), and efficiently forwards data
between them.

Functions Examples Switches are essential for


Switches facilitate In an office network, creating high-speed and
communication between switches connect efficient local networks.
devices within a local computers, printers, and
network by transferring other devices, ensuring
data only to the device smooth data exchange.
that needs them,
enhancing network
efficiency. Importance

Modems
- A modem, short for modulator-demodulator, translates digital data from your network
into a form that can be transmitted over the internet, and vice versa.
Functions
Modems bridge the gap between digital devices and analog communication channels, allowing
devices to communicate over mediums like telephone lines or cable systems.

Examples
Internet service providers use modems to connect households to the internet, transforming
digital data into signals that can travel across existing infrastructure.

Importance
Modems are key to enabling internet access for homes and businesses.

Firewall
- A firewall is a security device or software that filters and monitors network traffic,
protecting against unauthorized access and threats.

Functions
Firewalls analyze incoming and outgoing network traffic, blocking malicious or unauthorized
activities to maintain network security.

Examples
In a corporate network, a firewall can prevent unauthorized access to sensitive data and
prevent cyberattacks.

Importance
Firewalls are critical for safeguarding networks and preserving the confidentiality and integrity
of data.

Networking Components

Networking components like routers, switches, modems, and firewalls are the backbone of
modern computer networks. They ensure seamless communication, internet access, and
network security. Understanding these components is essential for anyone interested in the
world of networking and information technology.

When properly configured and managed, these components enable us to harness the power of
the internet and create secure, efficient, and interconnected networks.

3. Networking Protocols: (Tambolero & Recentes)


 TCP/IP: Transmission Control Protocol/Internet Protocol is the foundation of the
internet and most modern networks. It ensures data is divided into packets, sent,
and reassembled correctly.
 HTTP/HTTPS: Hypertext Transfer Protocol is used for web communication, while
HTTPS (HTTP Secure) encrypts data for secure web browsing.
 FTP: File Transfer Protocol is used for transferring files between computers.
 SMTP/POP3/IMAP: These protocols are used for sending and receiving email.
 IP Addressing and Subnetting.

4. Network Cabling: (Delosa & Morandarte)


 Types of Network Cables:
 Ethernet Cables (Twisted Pair): These are the most common cables for wired
LAN (Local Area Network) connections. The most prevalent type is Cat5e,
followed by Cat6 and Cat6a, with each offering higher data transmission
speeds and better shielding.
 Fiber Optic Cables: Fiber optic cables use light to transmit data and are
known for their high-speed and long-distance capabilities. They are used in
situations where high bandwidth and data integrity are critical, such as data
centers and long-distance connections.

2. Ethernet Cable Categories:


Ethernet cables come in different categories, which determine their performance
and capabilities:
 Cat5e (Category 5e): Supports up to 1 Gbps (Gigabit per second) data transfer
speeds and is suitable for most home and small office networks.
 Cat6 (Category 6): Supports up to 10 Gbps data transfer speeds over shorter
distances, making it suitable for larger networks and some data center
applications.
 Cat6a (Category 6a): Supports 10 Gbps data transfer speeds over longer
distances and offers better shielding against interference.
3. Cable Connectors:
Ethernet cables use various connectors to attach devices and networking
equipment. The most common connectors include:
 RJ-45: This connector is used for Ethernet cables and is similar in appearance to a
telephone jack but larger.
 LC, SC, ST: These connectors are used with fiber optic cables, with LC being the
most common for modern installations.

4. Cable Installation:
Proper installation of network cabling is essential for maintaining performance and
reliability. Here are some installation considerations:
 Cable Path: Plan the cable routes carefully to avoid physical obstacles and
interference sources.
 Cable Management: Use cable management tools like cable trays, racks, and
labels to keep cables organized and reduce the risk of damage.
 Cable Length: Ethernet cables have length limitations, so ensure that cables are
not too long for their intended purpose.
 Cable Testing: After installation, perform cable testing to verify that each cable is
functioning correctly and transmitting data without errors.

You might also like