Professional Documents
Culture Documents
PREL Dc1 LessonQ
PREL Dc1 LessonQ
PREL Dc1 LessonQ
Tacloban City
Chapter 1
DEFINITION OF TERMS
NIC
Short for network interface card, the NIC is also referred to as an Ethernet
card and network adapter. A NIC is a computer expansion card for connecting to a network (e.g.,
home network or Internet) using an Ethernet cable with an RJ-45 connector.
Switch
Switch is a hardware device that filters and forwards network packets, but is often not
capable of much more. A network switch is more advanced than a hub, but not as advanced as
a router.
Router
A router is hardware device designed to receive, analyze and move incoming packets to
another network. It may also be used to convert the packets to another network
interface, drop them, and perform other actions relating to a network.
Network Topology
Topology is the physical configuration of a network that determines how the network's
computers are connected. Common configurations include the bus, mesh topology, ring
topology, star topology, tree topology and hybrid topology.
UTP Configuration
UTP stands for Unshielded Twisted Pair cable. UTP cable is a 100 ohm copper cable that
consists of 2 to 1800 unshielded twisted pairs surrounded by an outer jacket. They have no
metallic shield. This makes the cable small in diameter but unprotected against electrical
interference. The twist helps to improve its immunity to electrical noise and EMI.
Straight-through
Straight-through cables get their name from how they are made. Out of the 8 pins that
exist on both ends of an Ethernet cable, each pin connects to the same pin on the opposite side.
Crossover
Crossover cables are very similar to straight-through cables, except that they have pairs
of wires that crisscross. This allows for two devices to communicate at the same time. Unlike
straight-through cables, we use crossover cables to connect like devices.
Crimping Tool
A crimping tool is a device used to conjoin two pieces of metal by deforming one or both
of them in a way that causes them to hold each other. The result of the tool's work is called
a crimp. A good example of crimping is the process of affixing a connector to the end of a cable.
For instance, network cables and phone cables are created using a crimping tool to join the RJ-
45 and RJ-11 connectors to both ends of either phone or Cat 5 cable.
RJ45 Connector
Short for Registered Jack-45, an RJ-45 is an 8-pin connection used for Ethernet network
adapters. This connector resembles the RJ-11 or 6-pin connector used with telephones in the
United States, but they're completely different.
RJ11 Connector
Short for Registered Jack-11, is a telephone interface that uses a cable of twisted wire
pairs and a modular jack with two, four or six contacts. RJ-11 is the common connector for
plugging a telephone into the wall and the handset into the telephone.
TCP/IP
TCP/IP is the basic communication protocol for two or more computers or electronic
devices (e.g mobile phone) to communicate with one another on a network setup. TCP/IP stands
for Transmission Control Protocol/Internet Protocol. TCP/IP defines how electronic devices (like
computers) should be connected to the Internet, and how data should be transmitted between
them. TCP/IP is the major protocol in communication network that communication can do
without.
Inside the TCP/IP standard there are several protocols for handling data communication
these are: TCP (Transmission Control Protocol) communication between applications; UDP (User
Datagram Protocol) simple communication between applications; IP (Internet Protocol)
communication between computers; ICMP (Internet Control Message Protocol) for errors and
statistics; DHCP (Dynamic Host Configuration Protocol) for dynamic addressing; and TCP Uses a
Fixed Connection.
Subnet Mask
A gateway is a networked device which serves as an entry point into another network.
For example, a wireless router is commonly the default gateway in a home network.
MAC Address
LINUX OS
Linux is the best-known and most-used open source operating system. As an operating
system, Linux is software that sits underneath all of the other software on a computer, receiving
requests from those programs and relaying these requests to the computer’s hardware.
Chapter 2
NETWORK
A network is a combination of hardware and software that sends data from one location
to another. The hardware consists of the physical equipment that carries signals from one point
of the network to another. The software consists of instruction sets that make possible the
services that we expect from a network.
A. Topologies
Bus Topology
The Bus topology consists of a single cable that runs to every work-station. The bus
topology is also known as linear bus. In other words, all the nodes (computers and servers) are
connected to the single cable (called bus), by the help of interface connectors. This central cable
is the back bone of the network and every workstation communicates with the other device
through this bus.
Ring Topology
The ring topology connects computers on a single circle of cable. There are no terminated
ends. A ring topology connects one host to the next and the last host to the first.
The signal travels around the loop in one direction and pass through each computer.
Unlike the passive bus topology, each computer acts like a repeater to boost the signal and send
it on to the next computer. Because the signal passes through each computer, the failure of one
computer can impact the entire network.
Star Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has
hosts in point-to-point connection with every other host or may also have hosts which are in
point-to-point connection with few
hosts only.
Hybrid Topology
In this type of topology we integrate two or more different topologies to form a resultant
topology which has good points (as well as weaknesses) of all the constituent basic topologies
rather than having characteristics of one specific topology. This combination of topologies is done
according to the requirements of the organization.
B. Categories
A local area network (LAN) is usually privately owned and links the devices in
a single office, building, or campus. Depending on the needs of an organization and
the type of technology used, a LAN can be as simple as two PCs and a printer in
someone's home office; or it can extend throughout a company and include audio and
video peripherals.
NETWORK MODELS
Internet Model
Today most end users who want Internet connection use the services of Internet service
providers (lSPs). There are international service providers, national service providers, regional
service providers, and local service providers. The Internet today is run by private companies,
not the government.
Terms:
- The national Internet service providers are backbone networks created and
maintained by specialized companies. To provide connectivity between the end
users, these backbone networks are connected by complex switching stations
(normally run by a third party) called network access points (NAPs).
- Regional internet service providers or regional ISPs are smaller ISPs that are
connected to one or more national ISPs. They are at the third level of the
hierarchy with a smaller data rate.
- Local Internet service providers provide direct service to the end users. The
local ISPs can be connected to regional ISPs or directly to national ISPs. Most
end users are connected to the local ISPs. a local ISP can be a company that
just provides Internet services, a corporation with a network that supplies
services to its own employees, or a nonprofit organization, such as a college
or a university, that runs its own network.
A protocol is a set of rules that govern data communications. A protocol defines what is
communicated, how it is communicated, and when it is communicated. The key elements of a
protocol are syntax, semantics, and timing
Standards are essential in creating and maintaining an open and competitive market for
equipment manufacturers and in guaranteeing national and international interoperability of data
and telecommunications technology and processes. Standards provide guidelines to
manufacturers, vendors, government agencies, and other service providers to ensure the kind of
interconnectivity necessary in today's marketplace and in international communications.
OSI Model
An ISO standard that covers all aspects of network communications is the Open Systems
Interconnection model. It was first introduced in the late 1970s. An open system is a set of
protocols that allows any two different systems to communicate regardless of their underlying
architecture. The purpose of the OSI model is to show how to facilitate communication between
different systems without requiring changes to the logic of the underlying hardware and software,
a model for understanding and designing a network architecture that is flexible, robust, and
interoperable
The physical form (e.g., voltages, frequencies, timing) in which data bits (binary values 0
and 1) are represented.
Whether transmission of data can take place in one or both directions over the same
physical connection.
Characteristics of the physical media that carry the signals (e.g., copper wire, optical fiber,
radio waves)
How data from a number of sources should be multiplexed before transmission and
demultiplexed upon arrival, and the type of multiplexing technique to be used.
The type of modulation to be used for transmitting digital data over analog transmission
lines.
The physical layer defines mechanical, electrical, functional and procedural properties, in
order to establish, hold and tear down a physical connection between Data Terminal
Equipment (DTE) and Data Circuit-Terminating Equipment (DCE).
The physical layer hides the above details from the higher layers. To the data link layer,
it appears as a logical communication channel which can send a stream of bits from one
point in the network to another.
DATA LINK LAYER -Reliable transfer of data over the communication channel provided by the
physical layer
checks for transmission errors by requiring the receiving end to send back
acknowledgment frames.
The data link layer hides the above details from the higher layers. To the network layer,
it appears as a reliable communication channel which can send and receive data packets
as frames
FUNCTIONS:
NETWORK LAYER
If two systems are connected to the same link, there is usually no need for a network
layer. However, if the two systems are attached to different networks (links) with connecting
devices between the networks (links), there is often a need for the network layer to accomplish
source-to-destination delivery.
TRANSPORT LAYER
The transport layer is responsible for process-to-process delivery of the entire message.
A process is an application program running on a host. Whereas the network layer oversees
source-to-destination delivery of individual packets, it does not recognize any relationship
between those packets. It treats each one independently, as though each piece belonged to a
separate message, whether or not it does. The transport layer, on the other hand, ensures that
the whole message arrives intact and in order, overseeing both error control and flow control at
the source-to-destination level.
SESSION LAYER
The services provided by the first three layers (physical, data link, and network) are not
sufficient for some processes. The session layer is the network dialog controller. It establishes,
maintains, and synchronizes the interaction among communicating systems.
PRESENTATION LAYER
The presentation layer is concerned with the syntax and semantics of the information
exchanged between two systems.
FUNCTIONS:
APPLICATION LAYER
The application layer enables the user, whether human or software, to access the network.
It provides user interfaces and support for services such as electronic mail, remote file access
and transfer, shared database management, and other types of distributed information services.
Summary
QUIZ 1
11. Among the topologies, which one is the most efficient to be used in internet cafe?
21-30. Explain and reflect the issue regarding the “Cyber Digital Divide”
QUIZ 2
3. What is a NAPs?
5. OSI means?