Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 79

Compiled by: MaNtuli

Reviewed by: V.W


Kambale January 2020
© COPYRIGHT: TSHWANE UNIVERSITY OF
TECHNOLOGY
Private Bag X680
PRETORIA
0001
All rights reserved. Apart from any reasonable quotations for the purposes of research criticism or review as
permitted under the Copyright Act, no part of this book may be reproduced or transmitted in any form or by
any means, electronic or mechanical, including photocopying and recording, without permission in writing from
the TUT.
Page 1 of 68
Table of Contents
A WORLD OF COMPUTERS....................................................................................................4
1. Definitions of a computer....................................................................................................5

The Components of a Computer............................................................................................5


3. Personal Computers..............................................................................................................7

Advantages and Disadvantages of Using Computers...........................................................7


Environmental & Health issues..............................................................................................7
4. What Is Ethical Computing?...............................................................................................8

Ethical Computing Guidelines................................................................................................8


5. System Unit Components...................................................................................................9
The System Unit....................................................................................................................9

6. The World Wide Web (WWW) ........................................................................................11


7. Background and History of Computer Networks .............................................................15

Networks and the Internet ...................................................................................................15


Evolution of the Internet ......................................................................................................17
Different types of Networks .................................................................................................20
8. Digital Communication ....................................................................................................20

Introduction: ........................................................................................................................20
Applications .........................................................................................................................20
Other Internet Services .......................................................................................................21
Guidelines when using e-mail .............................................................................................21

9. Risks of Computing .........................................................................................................22


10. Memory/ Storage .........................................................................................................23
11. Cloud Storage ..............................................................................................................25
12. Input and Devices ........................................................................................................26

Examples of Input Devices: ................................................................................................27


Output and Devices ............................................................................................................28

13. Keeping Your Computer or Mobile Device Clean ........................................................29


14. Software .......................................................................................................................29
Definition .............................................................................................................................29

15. Glossary .......................................................................................................................31


16. BINARY .......................................................................................................................40
17. HEXADECIMAL ...........................................................................................................42

Conversion Between Binary, Hex, and Decimal ........................................................................43


LIVING IN A NETWORK CENTRIC WORLD .............................................................................45

Page 2 of 68
1. Definition ...................................................................................................................................45
2. Network Components ...............................................................................................................47
3. Types of Networks ....................................................................................................................49

Peer-to-Peer Networks .......................................................................................................49


Client/Server Networks .......................................................................................................51
LANs, MANs, and WANs ....................................................................................................54

4. Elements common to Client-Server Networks ..........................................................................56


5. Transmission Media .................................................................................................................60
6. Network Cabling .......................................................................................................................61
7. How Networks are used ...........................................................................................................63

File and Print Services ........................................................................................................63


Access Services ..................................................................................................................63
Communications Services ..................................................................................................64
Internet Services .................................................................................................................65
Management Services ........................................................................................................65

8. Reference .................................................................................................................................67

Page 3 of 68
INTRODUCTION TO COMPUTERS

Source: Microsoft

A WORLD OF COMPUTERS
• Computers are everywhere

© Cengage Learning 2013

Page 4 of 68
1. Definitions of a computer
 A computer is an electronic device that manipulates information, or data. It has the
ability to store, retrieve, and process data. You may already know that you can use a
computer to type documents, send email, play games, and browse the Web. You can
also use it to edit or create spreadsheets, presentations, and even videos.
 A computer is an electronic device, operating under the control of instructions stored in its
own memory.

The Components of a Computer

• A computer contains many electric, electronic, and mechanical components known as


hardware

• Allows you to enter data and instructions


Input into a computer
Device
• Hardware component that
Output Device conveys information to one or
more people
System Unit • Case that contains the electronic components
of the computer that are used to process data
Storage • Holds data, instructions, and information for
future use
Device
• Enables a computer to send and receive data,
instructions, and information to and from one
Communicatio or more computers or mobile devices
n
Device

Page 5 of 68
© Cengage Learning 2013

Your basic computer components are:

© Cengage Learning 2013

Page 6 of 68
3. Personal Computers

• A personal computer can perform all of its input, processing, output, and storage
activities by itself.

© Cengage Learning 2013

Advantages and Disadvantages of Using Computers

Advantages Disadvantages

4. What Is Ethical Computing?

If you were asked to cite an example of unethical behaviour while using a computer, you could
Page 7 of 68
easily provide an answer. You’ve probably heard news stories about people using computers to
commit such crimes as unleashing viruses or committing identity theft. You may also have read
about students who were prosecuted for illegally sharing copyrighted material such as videos.
Or perhaps you heard about the case where the school district was monitoring students
through notebook computer webcams without the students’ knowledge. All of these are
examples of unethical behaviour while using a computer. However, if you were asked what
constitutes ethical behaviour while using a computer, could you provide an answer just as
quickly? Loosely defined, ethics is a system of moral principles, rules, and accepted
standards of conduct. So what are the accepted standards of conduct when using
computers? The Computer Ethics Institute developed the Ten Commandments of Computer
Ethics, which is widely cited as a benchmark for companies that are developing computer
usage and compliance policies for employees. These guidelines are applicable for schools
and students as well. The ethical computing guidelines listed below are based on the Computer
Ethics Institute’s work.

Ethical Computing
Guidelines

 Avoid causing harm to others when using computers.


 Do not interfere with other people’s efforts at accomplishing work
 with computers.
 Resist the temptation to snoop in other people’s computer files.
 Do not use computers to commit theft.
 Agree not to use computers to promote lies.
 Do not use software (or make illegal copies for others) without paying the creator for it.
 Avoid using other people’s computer resources without appropriate authorization or
proper compensation.
 Do not claim other people’s intellectual output as your own.
 Consider the social consequences of the products of your computer labour.
 Only use computers in ways that show consideration and respect for others.

Page 8 of 68
5. System Unit Components
The System
Unit
• The system unit is a case that contains electronic components of the computer used to
process data.

The inside of the system unit on a desktop personal computer includes:

© Cengage Learning 2013

• The motherboard is the main circuit board of the system unit


• A computer chip contains integrated circuits

The motherboard is the main circuit board that contains the central electronic components of the
computer, including the computer’s processor (its brain), its memory, and the many circuit
boards that help the computer function. On a desktop, the motherboard is located inside the
system unit, the metal or plastic case that also houses the power source and all the storage
devices (CD/DVD drive and hard drive). With a notebook computer, the system unit is
combined with the monitor and the keyboard into a single package.

What’s on the motherboard? Recall that the motherboard is the main circuit board that
contains the set of chips that powers the system, including the central processing unit
(CPU). The motherboard also houses ROM, RAM, and cache, the chips that provide the short-
term memory for the computer. The motherboard also includes slots for expansion cards (or
adapter cards), which are circuit boards that provide additional functionality see figure below.

Page 9 of 68
© Cengage Learning 2013

© Cengage Learning 2013

Page 10 of 68
6. The World Wide Web (WWW)

© Cengage Learning 2013

• The WWW is a service that runs on the Internet and consists of a vast collection of
interlinked, interactive documents (Web pages) stored on computers all over the world,
accessed via the Internet.
• Website is a collection of web pages with information about an organization, product or
service.
• A Web server is a computer that delivers requested Web pages to your computer
• Web 2.0 refers to Web sites that provide a means for users to interact
• Web Browser It is a software application that allows one to allows users to view and
explore web pages on the Web either via hyperlinks or URLs

Source: GoogleInc

Example: Internet Explorer, Google Chrome, Opera Mini, Safari, Mozilla Firefox, Android. Etc.
(there is so much)

Page 11 of 68
• URL stands for Uniform Resource Locator which navigates to a web page or web site.

• Hyperlink is a piece of text or graphic that links to a specific web page or location.

 A Web page has a unique address called a URL or Web address

© Cengage Learning 2013

The documents are designed in a language called HTML (HyperText Markup Language). This
language supports links to other documents, as well as graphics, audio, and video files. These
links are called hyperlinks.
Web addresses or
URL:
• Every web page has a unique address, called a Uniform Resource Locator (URL) or
web address.
• A URL is an alpha-numerical address used to identify resources such as web pages,
documents and files stored on web servers on the web. The URL is entered in the
address bar of a web browser.
• Examples of types of organizations:

Page 12 of 68
 com = commercial organizations
 edu = education
 org = non-profit organization
 co = company
 ac = academic organization

• Examples of geographical abbreviations for country domains:


 za = South Africa
 uk = United Kingdom
 au = Australië
 nz = New Zealand
 ca = Canada

 Search Engine is a program that is used to search for documents located on the
Internet; when using a search engine, the user type a keyword in the search box, the
database is scanned and all the websites containing the word or phrase are returned.

 A search engine is helpful in locating items such as:

Images Videos Audio Publications

People or Blogs
Maps Businesses

 Search operators can help to refine your search

Page 13 of 68
© Cengage Learning 2013

 There are thirteen types of Web sites

Portal News Informational Business/Marketing Blog

Wiki Online Social Educational


Network

© Cengage Learning 2013

Features of web browsers:


• Address bar: type the address or URL;
• Search bar: enter search terms;
• Back button: take you to the previous page;
• Forward button: take you to the next page;
• Home button: return to default page;
• Tab browsing: open many web pages on separate tabs.

Page 14 of 68
© Cengage Learning 2013
 A home page is the first page that a Web site displays
 Web pages provide links to other related Web pages
o Surfing the Web
 Downloading is the process of receiving information
 Some Web pages are designed specifically for micro browsers.

© Cengage Learning 2013

7. Background and History of Computer Networks.


Networks and the Internet
 A network is a collection of computers and devices connected together, often wirelessly,
via communications devices and transmission media.

Page 15 of 68
© Cengage Learning 2013

• The Internet is a worldwide collection of networks that connects millions of businesses,


government agencies, educational institutions, and
individuals.

• © Cengage Learning 2013

• The Internet is a worldwide computer network, consisting of computers and networks


that are linked using telephone lines, undersea cables, satellite or microwave for the
purpose of communication and sharing of resources.
• There is no organization in charge of the Internet. There are different
organizations making recommendations, giving information and registering
Internet addresses.
• Every computer that connects to the Internet must have its own unique IP
(Internet Protocol) address. The word ‘protocol’ means a ‘rule of
communication’. An IP address consists of 4 sets of digits separated by dots
e.g. 192.168.103.150.
Page 16 of 68
© Cengage Learning 2013

• People use the Internet for a variety of reasons:

Communicate Research and Shop Bank and Invest Online Trading


Access
Information

Entertainment Download Videos Share Information Web Application

© Cengage Learning 2013

Evolution of the Internet

 The Internet originated as ARPANET in September 1969 and had two main goals:

Allow scientists at
different physical Function even if part
locations to share of the network were
information and disabled or destroyed
work together by a disaster

Page 17 of 68
1986 NSF
connects
NSFnet to
1969 ARPANET ARPANET and
becomes becomes known 1996
functional as the Internet Internet2 is
founded

1984 ARPANET 1995 NSFNet Today More


has more than terminates its than 550 million
1,000 network on hosts connect
individual the to the Internet
computers Internet and
linked as hosts resumes status
as research
network

© Cengage Learning 2013

 Each organization is responsible only for maintaining its own network


o The World Wide Web Consortium (W3C) oversees research and sets
guidelines and standards
 Internet2 connects more than 200 universities and 115 companies via a high-speed
private network
 Many home and small business users connect to the Internet via high-speed broadband
Internet service

Cable Fiber to
Cellular Satellite
the Fixed
Interne DSL Radio Wi-Fi Interne
Premise wireles
t Networ t
s (FTTP) s
service k Service

 An access provider is a business that provides individuals and organizations access to


the Internet free or for a fee.

Page 18 of 68
© Cengage Learning 2013

 An IP address is a number that uniquely identifies each computer or device connected


to the Internet
 A domain name is the text version of an IP address
 Top-level domain (TLD)
 A DNS server translates the domain name into its associated IP address

© Cengage Learning 2013

What is needed to connect to the Internet?


• Computer or smartphone;
• Internet Service Provider (ISP): this is a company that sells internet access and services
to individuals and organizations for a monthly fee e.g. MWEB, TelkomSA, MTN, CellC,
etc.
• Internet connection: Wired connection – ADSL (using telephone lines).
• Wireless connection – cellular technology e.g. 3G modem.

Page 19 of 68
Different types of
Networks:
• Intranet: LAN network uses same Internet protocols but is set within an organization or
company. Must be on the site (campus) and have user rights (authorization) to access
the resources.
• Extranet: Uses the Internet to share information with other companies or organizations.
Users can be anywhere but must still have user rights (authorization) to access the
resources.
• Disadvantages of a network:
o Devices are dependent on each other for resources and communication;
o Security and privacy risks
o Virus attacks

8. Digital Communication
Introduction:
E-communication is to interact and communicate with others by an electronic method. It refers
to all forms of communication via electronic devices. There are many applications or
programs available to facilitate e-communication.

Applications
1. E-mail: compose, send and receive messages over the
Internet.
2. Social networking site: individuals/organizations post their likes, dislikes, interests,
photographs and activities for their friends (and everyone else unless access is blocked) to see
and read e.g. Facebook. Some social networking sites are more business-oriented e.g.
Linkedin.
3. Instant Messaging (IM): IM is live, text-based communication usually between two people
using computers or cell phones e.g. Google Talk.
4. Text, picture & video messaging: brief messages between cell phones e.g. SMS, images,
video and MMS (Multimedia Message Service) for sound.
5. Mailing list: set up by people with common interests to share information via e-
mail.
6. Weblog: where people publish their thoughts, writing opinions, news,
etc.
7. Fax to e-mail: the ability to send or receive a fax to and from a fax machine using your
computer and e-mail system.

 Examples
:
o Instant Messages: messages over Internet (WhatsApp)

Page 20 of 68
o VoIP: Voice over Internet Protocol is a call over the internet (Skype)
o Social Networking Sites: Facebook, Instagram, Pinterest, etc.
o Blogs: Online journal
o Newsgroups: Posts and comments based on a specific topic

Page 21 of 68
Other Internet Services
 E-mail is the transmission of messages and files via a computer network
 An e-mail program allows you to create, send, receive, forward, store, print, and delete e-
mail messages
 A chat is a real-time typed conversation that takes place on a computer
 A chat room is a location on an Internet server that permits users to chat with each other
 VoIP (Voice over IP) enables users to speak to other users over the Internet
o Also called Internet telephony
 A newsgroup is an online area in which users have written discussions about a particular
subject
o Typically requires a newsreader
 A message board is a Web-based type of discussion group
 FTP (File Transfer Protocol) is an Internet standard that permits file uploading and
downloading with other computers on the Internet
o Many operating systems include FTP capabilities
o An FTP server is a computer that allows users to upload and/or download files using
FTP.

Guidelines when using e-mail


1. How e-mail works: you type the message on your computer using e-mail software,
type the recipient’s address, it is send by your ISP server to the ISP server of the
recipient.
2. Advantages:
o Can be delivered and replied to much faster than traditional mail;
o Can be sent anytime from anywhere in the world as long as you have Internet
connection;
o Inexpensive to send and receive messages;
o Versatile – photos and files can be attached;
o Protects the environment by saving paper.
o Share files over e-mails
o Can access messages from any location
o Others can download files from your website

3. Disadvantages:
 Recipient needs access to the Internet;
 Viruses are easily spread via e-mail attachments;
 No guarantee the e-mail will be read immediately;
 A user can receive large amounts of spam (junk mail).
 Hasty response results in miscommunication or misunderstandings

Page 22 of 68
 User rights restrictions at organizations limits access to certain sites and resources
4. Spam or Junk Mail – a unwanted message to promote certain products or services

5. How to avoid Spam:


 Don’t share your e-mail on a public list or add it to a marketing list
 Use a separate e-mail for work and personal use
 Do not reply to spam messages!

6. Outlook is a program used to manage time and information as well as e-


mails. Functions:
 Send/Receive Messages
 Scheduling appointments
 Managing contacts
 Create a to-do list
 Record notes
Flagging a message: to add a reminder on a message to follow-up later
Signatures: automatically appears in a new message and normally contains the sender’s name
and other information
Extra SELF-STUDY: Practice in MS Outlook how to send, reply and forward a message, how to
add an attachment to a message and to mark a message as important.
 Copyright refers to the protection of information or materials that have been created and
published by an individual.
 Plagiarism is the act of copying someone else’s information or materials and claiming it
as their own.
 Libel is making an untrue statement or defaming another person or company. Also
called “cyber bullying” is inappropriate and illegal.

9. Risks of Computing
 Viruses to gain unauthorized access and damage device and information.
 Different types of viruses:
o Boot Sector infects the system when the computer starts up (boots up)
o Program/File virus is started when the specific program of file is opened
o Worms duplicates themselves in such a manner to exhaust resources or hide
files and folders.
o Trojan Horses remain hidden until triggered by a specific action.
 Losing information through hackers who gain unauthorized access to information or
steals or corrupts data.
 To safeguard your work and environment:
o Lock computers in a cabinet or tie them to a desk

Page 23 of 68
o Make frequent backups of your data in another location
o Change personal information like passwords frequently
o Make sure the SSL icon displays on a web browser before making an online
transaction
o Use a stable workstation (desk), keep your feet flat on the floor (correct posture)
and take regular breaks to prevent eye strain and other injuries like:
 Carpal Tunnel syndrome - nerves are inflamed and painful in your wrist
 Repetitive motion injury – injury occurs because of rapid and repeating
motions when using the mouse
• A utility program is a type of system software that allows a user to perform maintenance-
type tasks.

© Cengage Learning 2013

10. Memory/ Storage


 Storage holds data, instructions, and information for future use
 A storage medium is the physical material on which a computer keeps data, instructions,
and information
 Memory consists of electronic components that store instructions waiting to be executed by
the processor, data needed by those instructions, and the results of processing the data
 Memory consists of electronic components that store instructions waiting to be executed by
the processor, data needed by those instructions, and the results of processing the data
 A storage device is the computer hardware that records and/or retrieves items to and from
storage media
o Reading is the process of transferring items from a storage medium into memory
o Writing is the process of transferring items from memory to a storage medium

Page 24 of 68
 Random Access Memory (RAM) is your system's short-term memory. This short-term
memory disappears when the computer is turned off. If you're working on a document,
spreadsheet, or other type of file, you'll need to save it to avoid losing it. When you save a
file, the data is written to the hard drive, which acts as long-term storage.
 RAM chips usually reside on a memory module and are inserted into memory slots
 The amount of RAM necessary in a computer often depends on the types of software you
plan to use.

© Cengage Learning 2013

 Read-only memory (ROM) refers to memory chips storing permanent data and instructions,
it keep the contents even when the computer or device is turned off, usually ROM cannot be
written to when the computer runs normally.
 ROM is used for the BIOS which tells the computer how to start, or run programmes.

Page 25 of 68
© Cengage Learning 2013

11. Cloud Storage

• Cloud storage is an Internet service that provides storage to computer users.

© Cengage Learning 2013

Page 26 of 68
© Cengage Learning 2013

• Users subscribe to cloud storage for a variety of reasons:

12. Input and Devices


 Input is any data and instructions entered into the memory of a computer, data
can include text, numbers, images, audio and video.
 An input device is any hardware component that allows users to enter data and
instructions into a computer.

Page 27 of 68
Examples of Input Devices:

© Cengage Learning 2013

© Cengage Learning 2013

Page 28 of 68
 Several input devices are available to assist physically challenged users:
Keyboards Various
with On-screen pointing
Keyguard
keyboard
larger devices
keys

Head-mounted Computerize
Gesture
d implant
pointer recognition
devices

Output and Devices


 Output is data that has been processed into a useful form
 An output device is any type of hardware component that conveys information to one or
more people.

Speakers,
Display devices headphones,
and earbuds
Printers

Force-
Data Interactive
feedback
projector whiteboard
game
s s
controllers

Tactile output

Page 29 of 68
© Cengage Learning 2013

13. Keeping Your Computer or Mobile Device Clean

14. Software
Definition
 Software also called a program, tells the computer what tasks to perform and how to
perform them.

Page 30 of 68
 System software: consists of the programs that control or maintain the operations of the
computer and its devices e.g. antivirus software and WinZip that reduces the size of
files. o Operating system (OS) software: is a set of programs containing
instructions that work together to coordinate all the activities among computer hardware
resources
e.g.

© Cengage Learning 2013

 Application software: consists of programs designed to make users more productive


and/or assist with personal tasks e.g. Games, Word processing e.g. Microsoft
Word, TypeFaster that practice keyboard skills; other tasks are listed below:

Start and
shut down a Provide a Manage Manage
computer user program memory
interface s

Coordinat Establish
Configur Monitor
e tasks an Internet
e performance
connection
devices

Provide utilities Control Administer


a security
Automatically network
update

• Operating systems often provide users with the capability of:

Page 31 of 68
Searching
Managing files Viewin Securing a
for g computer
files images

Uninstallin Cleaning Defragmenting Diagnosing


g up disks disks problems
programs

Backing up Setting up
files and screen
disks savers

15. Glossary

Introduction to Computers:
An application program is usually a collection of programs and data files
Application Program:
that work together for a specific purpose.
Backup: Making a copy of files.
Each single character we store such as 4 or A or % takes up space
Byte:
which we refer to as a byte.
Character: A character can be a letter, number, or other piece of data.
Software that compresses or decompresses files. Popular examples of
Compression software:
this kind of software are WinZip and WinRAR.
The CPU (Central Processing Unit) is the part of the computer that
CPU:
processes all data and carries out all instructions.
The standard settings that are in effect unless you change them for an
Default: individual document. You can usually adjust the defaults for most
commonly used settings.

Page 32 of 68
The screen background for Windows where windows, icons, and dialog
Desktop:
boxes appear.

Page 33 of 68
Ergonomics refers to the study and design of the workplace for the
Ergonomics:
comfort and safety of people in work environments.
Relatively cheap storage devices that use electronic memory to store
Flash disc:
data (they get their power via the USB port they connect to).
Software that is fully functioning software that can be used, and copied
Freeware:
without any restrictions.
Roughly 1000 MB. This represents (approximately) 1000 X 1000 X
Gigabyte (GB):
1000 bytes.
Term used to describe using computers in a way that is sensitive to
Green computing:
the environment.
The main storage device of a computer located inside the computer box
Hard drive:
or system unit.
Hardcopy: Output on paper.
A graphical representation of various elements in Windows, such as
Icon:
disk drives, applications, and documents.
Kilobyte (KB): Roughly 1000 bytes (1024 to be precise).
Megabyte (MB): Roughly 1000 KB. This represents (approximately) 1000 X 1000 bytes.
The motherboard is a large circuit board inside the computer ‘box’,
Motherboard:
containing slots and connections for all the components of a computer.
A software program that controls all hardware and application software
Operating System:
on the computer.
Plagiarism: The process of taking someone else’s work and using it as your own.
Technologies that allows us to simply plug in a new hardware device
Plug-and-play:
to the computer and for it to be set-up to run automatically.
RAM or Random Access Memory is where any running program and its
RAM:
data is temporarily stored.
ROM or Read Only Memory is a special chip on the motherboard that
ROM: holds the instructions needed to start the computer when you switch it
on.
Software that is often ‘time’ limited in that you can use it for a period of
Shareware: time. After this period or should you wish to get the ‘full’ version of the
program with access to all its features, you will need to pay for it.
Softcopy: Visual output on our computer screen.
The actual physical material or objects on which we store the data and
Storage media:
programs are storage media.
An area at the end of the taskbar that displays certain items for
Task Notification Area: notification, e.g. virus check, new message, network connection, date
and time, etc.
Roughly 1000 GB. This represents (approximately) 1000 X 1000 X
Terabyte (TB):
1000 X 1000 bytes.

Page 34 of 68
Standard port commonly used to connect devices such as keyboards,
USB ports:
mice and printers to a computer.
Memory (RAM) does not keep its contents when the power is switched
Volatile: off and this means that is volatile. Storage keeps its contents at all
times

Electronic Communication, the Internet & WWW:


3G is currently the newest generation of mobile (cellular) phone
3G:
technologies.
Address Bar: A field you can use to enter a path to find a file, folder, or Web address.
This field appears in Windows Explorer as well as the Web browser.
ADSL (Asymmetric Digital ADSL is a permanent digital connection to the Internet using a telephone
Subscriber Line): line.
Bcc: Blind carbon copy; a field in the header of an e-mail message. Other
recipients of the message will not see who was named in the Bcc field.
Refers to a wireless technology that allows devices such as mice, printers
Bluetooth:
and cell phones to communicate over a short distance.
Cc: Carbon copy; a field in the header of any e-mail message. Other
recipients of the message will see who was named in this field.
E-communication refers to all forms of communication via electronic
Electronic communication (E- means. In other words, it is the process by which computers and other
communication): devices such as cell phones are used to exchange messages and/or
digital data.
E-mail is the composing, sending and receiving messages electronically
Electronic mail (E-mail):
over a network including the Internet.
HTML (Hypertext The language in which web pages are written. This language supports
Markup Language): links to other documents, as well as graphics, audio, and video files.
A hyperlink is a built-in connection to another related web page and is
Hyperlink:
indicated as text underlined in blue, or with a graphic with a blue outline.
IM is a live text-based communication usually between two people using
Instant Messaging (IM):
computers or other devices such as a cell phone.
Internet Protocol Address (IP The unique address of every computer connected in a network or to the
address): Internet.
An ISP is a company that has a permanent, fast connection to the
Internet Service
Internet. They sell Internet access and services to individuals or
Provider (ISP):
organisations for
The Internet, also called the Net, is a worldwide computer network,
consisting of computers and networks that are linked using telephone
Internet:
lines, undersea cables, satellite or microwave for the purpose of
communication and sharing of
resources.
Page 35 of 68
Netiquette (Internet + Etiquette) is the name given to the use of good
Netiquette:
manners and showing respect for other users when using the Internet.
A search engine is a program that is used to search for documents
Search engine: located on the Internet by using keywords or phrases entered by the
user when looking for information.
URL (Uniform Resource A URL is an alpha-numerical address used to identify resources such as
Locater): web pages, documents and files stored on web servers on the web.
A web browser is a software application that allows one to view and
explore web pages on the Web either via hyperlinks or in cases where
Web browser:
the URL is already known, by typing the address in the address bar of
the
The World Wide Web is a service that runs on the Internet and consists
World Wide Web (WWW): of a vast collection of interlinked, interactive documents stored on
computers all over the world, accessed via the Internet.
File Management:
A file is a collection of data or information that is stored on a computer
File:
under a single name. Files are represented as icons on the computer.
A set of characters (usually 3 – 5) added to the end of a file name that
File extension:
identifies the type of file, e.g. docx is a Microsoft Word file.
Name given to a file followed by a full stop and the file extension, e.g.
File name:
MyFile.docx.
A folder is a storage place or container in which you can store files or
Folder:
more folders on disk.
PDF (Portable Document File) files are used to distribute document files,
as they do not require the program in which the document was created
PDF files:
to be installed in order to read it. You just need a free utility program
called
Subfolder: A folder that is within another folder.

Word Processing:
Alignment: The positioning of the contents of a cell: e.g. left, right, or cantered.
Centre horizontally: Centre in the middle, from left to right.
Centre vertically: Centre in the middle, from top to bottom.
A cursor marks the position in a document on the screen where text or a
Cursor: graphical object will be placed. A cursor can appear in many different
forms: an Insertion Point, a blinking underline, or a blinking square.
Dialog Box: A window where additional items may be selected or activated.
Double-Click: The process of clicking the left (or primary) mouse button twice quickly.

Page 36 of 68
This means to point the mouse pointer at the selected item, then press
and hold down the left mouse button as you move or drag the mouse
Drag:
pointer to another location. Release the mouse button when the mouse
pointer is over the new
An enlarged, first letter of a paragraph, which is sometimes decorated
Drop Cap:
and drops into the line or lines of text below.
The process of making corrections, changes and improvements to a
Editing:
document while revising it, to round if off neatly and professionally.
Esc: Escape key lets you cancel or get out of options or cancel choices.
A non-breaking space at which word wrapping cannot take place. The
Hard space:
enclosing characters/word will stay together on the same line.
The space within the top and bottom margins used for the display of
Header and Footer:
information that must appear on every page.
Indicates that an object or text is selected and will be affected by the next
Highlighted:
action or command.
The horizontal adjustment of paragraphs on a page in order to obtain
Indenting:
more white space on the sides, and to make lists easier to read.
The alignment option that displays text with even wrapped edges at the
Justification:
left and right margins, similar to a block or rectangle of text.
Margin: The white space or area from the edge of the paper to the text.
Codes provided by Microsoft to help identify certain features or actions
Non-printing
in the document, e.g. display when the [Enter] key is pressed,

Formatting Characters:
Located usually next to the Office Button and contains popular
Quick Access Toolbar: commands such as Save, Undo, and Redo. This toolbar can be
customized for those
Located at the bottom of the screen. The status bar displays messages,
Status Bar: cursor location, page number, section number, and whether specific
features are active.
Specific points on the page where text can be positioned with the help of
Tab stops: the Tab key. By means of the tab key, the amount of horizontal white
space between columns of text can be adjusted to make it more
The area at the bottom of the screen that runs horizontally and contains
Taskbar:
the Start menu and other frequently used programs, folders or files.
The feature that allows you to look up words with similar or opposite
Thesaurus:
meanings.
Watermark: Text or an image that appears as a faint background in a document.
Wrap text: The way in which text wraps around a graphical object.

Page 37 of 68
ASSIGNMENT 1:

ASSIGNMENT 2:
Choose the correct answer:
1. Before e-mailing a Website for assistance, I
should: o Double check that my e-mail address is
correct.
o Get all my questions together and send one e-mail.
o Make a reasonable effort to ensure the info I seek is not already covered on the site.
o All of the above.

2. Before sending very large attachments, I


should: o Compress the files (zip them up).
o Compress the files and then ask first when would be the best time to e-mail them.
o Send them first thing in the morning and call to make sure they were received.
o Send large files only during week
days. o All of the above.

3. Why shouldn’t I type my e-mails in all caps?


o You give the perception that you are mad or yelling!
o It makes you look lazy.
o It is a strain on the eyes and makes reading your e-mail more
difficult. o All of the above.

4. Why should I use the BCc (Blind Courtesy Copy) field?


o So I can send copies to my co-workers without my boss knowing.
Page 38 of 68
o To keep my e-mail looking uncluttered.
o To respect my contact’s privacy.
o So I can send copies to anyone I want.
o All of the above.

5. How should I respond to a rude or insulting e-mail?


o The next day when I have had time cool off and create a calm measured
response. o Respond immediately and set things straight!
o Never! What is the point?
o Report the sender to the ISP.
o All of the above.

6. I should only forward e-mail


when: o I feel it’s important.
o I know the other person should have the information.
o The topic is commendable and important to all onliners.
o I type a personal comment about why I am forwarding that specific e-mail to that specific
person. o All of the above.

7. When is it okay to e-mail strangers about my


business? o When I know they can use my service.
o When I know I can save them big bucks.
o Only when they e-mail me first and ask me for information.
o Anytime – it’s called cold calling.
o All of the above.

8. I should down-edit my e-mail replies by …


o Removing previous signature files.
o Removing everything not necessary to the ongoing conversation.
o Removing the two previous e-mails in my reply.
o Spell checking the sender’s previous e-mail.
o All of the above.

9. What is the most important thing I should do with every e-


mail? o The From Field shows your name displayed properly.
o A short, sweet and well thought out Subject: field.
o Take the time to include a Hello, or Hi and the recipient’s name.
o Complete, correctly structured sentences that reflect proper grammar and punctuation.
o All of the above.

10. How quickly should I reply on e-mail?

Page 39 of 68
o As soon as I can; no longer than 24 – 48 hours.
o When I get around to it.
o I don’t have to
reply. o Doesn’t
matter.

ASSIGNMENT 3:

Across Down
3. Where people publish their thoughts, writing opinions, 1. An electronic device that manipulates
news etc. information.
4. A service that runs the Internet and consist of a vast 2. The physical parts of a computer that we
collection of interlinked, interactive documents stored can touch and see.
on computers all over the world.
7. A computer needs it to place date and keep 5. A worldwide computer network, consisting
programs. of computers and network linked together.

8. Short-term memory. 6. The computer provides us with the results


of its processing.

9. Data and instruction given to a computer

10. Good manners over the Internet.

Page 40 of 68
Across Down

2. The computer provides us with the results of its 1. An electronic device that manipulates
processing. information.

5. Good manners over the Internet. 3. A worldwide computer network, consisting


of computers and network linked together.

6. Short-term memory 4. Where people publish their thoughts, writing


opinions, news etc.

7. Data and instruction given to a computer 10. A service that runs the Internet and consist of
a vast collection of interlinked, interactive
documents stored on computers all over the
world.
8. A computer needs it to place date and keep programs.

Page 41 of 68
16. BINARY
The following sections discuss binary and hexadecimal numbering systems as compared with
the more familiar decimal system. An understanding of binary, in particular, is crucial to success
on the test as it is fundamental to computer systems in general, and to topics such as
subnetting, access lists, routing, and route summarization. This chapter also looks at the
relationship between the IP address and subnet mask in more detail, as well as how it can be
manipulated for more efficient network functionality using route summarization. Finally, IP
Version 6 is introduced and some of its features are explained. Binary is the language of digital
electronic communication.

Binary is another name for Base 2 numbering. Our usual numbering system is Base 10, in
which a single character or column can represent one of 10 values: 0, 1, 2, 3, 4, 5, 6,7, 8, or 9.
The first column indicates how many ones there are in a given value. To represent a value
greater than 9, we need another column, which represents how many “tens” there are; if the
value we want to represent is greater than 99, we use another column for the “hundreds,” and
so on. You might notice that each additional column is ten times greater than the preceding
one: ones, tens, hundreds, thousands, and so forth—all “powers of 10”: 100, 101, 102, 103,
and so on. Base 10 is easy because most of us have 10 fingers and have known how to count
from an early age.

In binary, or Base 2, a single character or column can represent one of only two values: 0 or 1.
The next column represents how many “twos” there are; the next column how many “fours,” and
so on. You’ll notice here that the value of each additional column is two times greater than the
previous—all “powers of 2”: 20, 21, 22, 23, and so on. This is not a coincidence. Given that a
Base 2 or binary column can have only two possible values (0 or1), this makes it easy to
represent a binary value as an electrical value: either off (0) or on (1). Computers use binary
because it is easily represented as electrical signals in memory or digital values on storage
media. The whole system works because computers are quick at computing arithmetic, and as
you’ll learn, pretty much all computer operations are really just fast binary math. Let’s take a
look at some Base 10 (or decimal) to binary conversions. Take the decimal number 176. Those
three digits tell us that we have one 100, plus seven 10s, plus six 1s. Table 1 illustrates how
decimal numbers represent this distribution of values.

Notice that we have some 0s in the high-value columns; we can drop those from the beginning
if we want to. You will not have to analyze decimal numbers in this way on the exam; we are
simply demonstrating how Base 10 works so it can be compared to Base 2 and Base 16 in

Page 42 of 68
the same

Page 43 of 68
way. In binary, the columns have different values—the powers of 2. Table 2 lists the values of
the lowest 8 bits in binary.

Note: The biggest values in a binary string (the 1s at the left) are often called the high-order bits
because they have the highest value. Similarly, the lowest-value bits at the right are referred to
as the low-order bits.
Tip: You must know the value of each binary bit position! If you have difficulty memorizing
them,
try starting at 1 and keep doubling as you go to the
left.

To represent the decimal number 176 in binary, we need to figure out which columns (or bit
positions) are “on” and which are “off.” Now, because this is arithmetic, there are a few different
ways to do this. Start with the decimal number you want to convert:
176
Next, look at the values of each binary bit position and decide if you can subtract the highest
column value and end up with a value of 0 or more. Ask yourself: “Can I subtract 128 from
176?” In this case, 176 – 128 = 48.
Yes, you can subtract 128 from 176 and get a positive value, 48. Because we “used” the 128
column, we put a 1 in that column, as shown in Table 3.

Now, we try to subtract the next highest column value from the remainder. We get 176 – 128 =
48. We take the 48 and subtract 64 from it. Notice that you can’t do this without getting a
negative number; this is not allowed, so we can’t use the 64 column. Therefore, we put a 0 in
that column, as shown in Table 4.

Move along and do the math for the rest of the columns: 48 – 32 = 16. We then subtract 16
from 16 and get 0. Note that when you get to 0, you are finished—you need to only fill the
remaining bit positions with 0s to complete the 8-bit string. So, we used only the 128 column,
the 32 column, and the 16 column. Table 5 is what we end up with.
Page 44 of 68
176 decimal = 10110000 binary.
If you add up 128 + 32 + 16, you get 176. That is how you convert from binary to decimal:
Simply add up the column values where there is a 1.

17. HEXADECIMAL
Binary is Base 2; decimal is Base 10; hexadecimal is Base 16. Each column in hex can
represent 16 possible values, from 0 through 15. To represent a value of 10 through 15
with a single character, hex uses the letters A through F. It is important to understand that
the values of 0 through 15 are the possible values of a 4-bit binary number, as shown in Table
6.

Page 45 of 68
18. Conversion Between Binary, Hex, and Decimal

The following sections provide an introduction to converting between binary, hex, and decimal.
Again, there is more than one mathematical approach to finding the correct answer, but the
method shown is simple and reliable. Decimal to Hexadecimal Conversions The easiest way to
get from decimal to hexadecimal and back is to go through binary. Take the example we used
earlier in which we converted 176 decimal to binary:

176 = 10110000

Given that a single hex character represents four binary bits, all we need to do is to break the 8-
bit string 10110000 into two 4-bit strings like this:

1011 0000
Now, simply match the 4-bit strings to their hex
equivalent: 1011 = B
0000 = 0
The answer is simply 10110000 =
0xB0.

The 0x in front of the answer is an expression that means “the following is in hex.” This is
needed because if the hex value was 27, we could not distinguish it from 27 decimal.
Hexadecimal to Decimal Conversions The reverse of the procedure is easier than it seems,
too. Given a hex value of 0xC4, all we need to do is to first convert to binary, and then to
decimal. To convert to binary , take the two hex characters and find their binary value:

C = 1100
0100 = 4
Now, make the two 4-bit strings into one 8-bit
string:

11000100
Finally, add the bit values of the columns where you have a 1:
128 + 64 + 4 = 196

Page 46 of 68
Quiz
1. Write the following binary IP in dotted-decimal
format: 11000000.10101000.00000001.11111110.
2. Write the following subnet mask in binary format: 255.255.255.240.
3. What is 127.0.0.1 in binary?
4. What are the eight binary values found in a single octet of an IP address?
A. 256 128 64 32 16 8 4 2
B. 254 62 30 14 6 4 0
C. 128 64 32 16 8 4 2 1
D. 0 2 4 6 8 10 12 14
5. What is the decimal value of binary 00001110 ?
A. 13
B. 14
C. 1,110
D. 16
E. 15
6. What is the binary value of decimal 256?
A. 11111111
B. 1111111111
C. 100000000
D. 10000000

Quiz Answers
1. 192.168.1.254
2. 11111111.11111111.11111111.11110000
3. 01111111.00000000.00000000.00000001
4. Answer C is correct.
5. Answer B is correct.
6. Answer C is correct.

Page 47 of 68
NETWORKING
FUNDAMENTALS
LIVING IN A NETWORK CENTRIC
WORLD

1. Definitio
n

Loosely defined, a network is a group of computers and other devices (such as printers) that
are connected by some type of transmission media. Variations on the elements of a network
and the way it is designed, however, are nearly infinite.

Now that we are into the second decade of the 21st century, most homes have more than one
computing device that is capable of connecting to the Internet. A typical family, like the Phurutsi
family (see Figure below), might be engaged in the following: Mash (the father) is watching a
movie, which he downloaded yesterday on the large-screen HDTV in the living room while
checking his Gmail on his smartphone. Camila (the mother) is in the kitchen fixing lunch while
checking the weather forecast and watching YouTube videos. Vusi, their fifteen-year-old son, is
in his bedroom playing an online game with his friends (via his PlayStation) and is uploading
a video he made for a class project to a Web site at school. Musa, Vusi’s older sister, is in the
dinning room using her notebook computer to finish a report for school. She’s also watching
a
Blu-ray disc of Avatar, which is one of her all-time favourite movies. Grandma Zodwa is in the
family room viewing pictures from the family’s last vacation and is uploading to Facebook
the
pictures that she took of her grandchildren during their trip to Disneyland last week. And Angel,
the youngest daughter, is playing with Sparky in the backyard and uploading video that she took
of him with her phone so that everyone can see it in the family room while they eat lunch. And
because both Mash and Camila work outside the home, they use webcams to monitor activities
in the house, like ensuring their kids arrive home safely from school, while they are at work.
What makes all this technology transfer and sharing possible? A home network!

Page 48 of 68
By setting up a home network, everyone in the family can connect their computers and others devices whenever and wherever they
desire.
©Pearson Education
2012

A network can be as small as two computers connected by a cable in a home office or as large
as several thousand computers connected across the world via a combination of cable, phone
lines, and cellular links. In addition to connecting personal computers, networks might link

Page 49 of 68
mainframe computers, printers, plotters, fax machines, and phone systems. They might
communicate through copper wires, fibre-optic cable, or radio waves.

This chapter introduces you to the fundamental characteristics of


networks.

2. Network
Components

To function, all networks must include (1) a means of connecting the nodes on the network
(cables or wireless technology), (2) special devices that allow the nodes to communicate
with each other and to send data, and (3) software that allows the network to run. Why Use
Networks?

Networking: Connecting Computing


Devices
©Pearson Education
2012

Using networks offers advantages relative to using a stand-alone computer—that is, a


computer that is not connected to other computers and that uses software applications and data
stored on its local disks. Most important, networks enable multiple users to share devices (for
example, printers) and data (such as spreadsheet files), which are collectively known as the
Page 50 of 68
network’s resources. Sharing devices saves money. For example, rather than buying 20
printers for 20 staff members, a company can buy one printer and have those 20 staff members
share it

Page 51 of 68
over a network. Sharing devices also saves time. For example, it’s faster for co-workers to
share data over a network than to copy data to a removable storage device and physically
transport the storage device from one computer to another—an outdated file-sharing
method commonly referred to as a sneakernet (presumably because people wore sneakers
when walking from computer to computer). Before networks, transferring data via floppy disks
was the only possible way to share data.

Networks also allow you to manage, or administer, resources on multiple computers from a
central location. Imagine you work in the Information Technology (IT) Department of a
multinational bank and must verify that each of 5000 employees around the globe uses the
same version of a database program. Without a network, you would have to visit every
employee’s machine to check and install the proper software. With a network, however, you
could provide employees with access to the database program on a single computer using
a Web page. Because they allow you to share devices and administer computers centrally,
networks increase productivity. It’s not surprising, then, that virtually all organizations depend
on their networks to stay competitive.

What are the benefits of networks? There are several benefits to having computers
networked. Most home users want a network to facilitate resource sharing. For example, a
network allows you to share the high-speed Internet connection coming into your
home. Networks also allow you to share peripheral devices, such as printers. Figure below
shows two computers that are not networked. Computer 1 is connected to the printer, but
Computer 2 is not. To print files from Computer 2, users have to transfer them using a flash
drive or another storage medium to Computer 1, or they have to disconnect the printer from
Computer 1 and connect it to Computer
2. By networking Computer 1, Computer 2, and the printer, as shown in Figure below,
both computers can print from the printer without transferring files or attaching the printer to a
particular computer. Using a wired or wireless network to share a printer saves the cost of
buying one printer for each computer.

Page 52 of 68
(a) Computers 1 and 2 are not networked, and Computer 2 cannot access the printer. (b) Networking allows sharing of the printer.
©Pearson Education 2012

3. Types of Networks

Computers can be positioned on a network in different ways relative to each other. They can
have different levels of control over shared resources. They can also be made to communicate
and share resources according to different schemes. The following sections describe two
fundamental network models: peer-to-peer and client/server.

Peer-to-Peer Networks

The simplest form of a network is a peer-to-peer network. In a peer-to-peer network, every


computer can communicate directly with every other computer. By default, no computer on a
peer-to-peer network has more authority than another. However, each computer can be
configured to share only some of its resources and prevent access to other resources.
Traditional peer-to-peer networks typically consist of two or more general-purpose personal
computers, with modest processing capabilities. Every computer is capable of sending and
receiving information to and from every other computer, as shown in Figure 1-1.

Page 53 of 68
Figure 1-1: Resource sharing on a simple peer-to-peer network
© Cengage Learning 2013

The following are advantages of using traditional peer-to-peer networks:

 They are simple to configure. For this reason, they may be used in environments in
which time or technical expertise is scarce.
 They are often less expensive to set up and maintain than other types of networks. This
fact makes them suitable for environments in which saving money is critical.

How does the distance between nodes define a network? The distance between nodes on a
network is another way to describe a network. A local area network (LAN) is a network in which
the nodes are located within a small geographic area. Examples include a network in a
computer lab at school or at a fast-food restaurant. A home area network (HAN) is a network
located in a home. HANs are used to connect all of a home’s digital devices, such as
computers, peripherals, phones, gaming devices, digital video recorders (DVRs), and
televisions.

The following are disadvantages of using traditional peer-to-peer


networks:

 They are not very flexible. As a peer-to-peer network grows larger, adding or
changing significant elements of the network may be difficult.
 They are also not necessarily secure—meaning that in simple installations, data and
other resources shared by network users can be easily discovered and used by
unauthorized people.
 They are not practical for connecting more than a handful of computers because they do
not always centralize resources.

For example, if your computer is part of a peer-to-peer network that includes five

Page 54 of 68
other computers, and computer users store their spreadsheets and word-processing files on
their own

Page 55 of 68
hard disks, whenever your colleagues want to edit your files, they must access your machine on
the network. If one colleague saves a changed version of one of your spreadsheets on her hard
disk, you’ll find it difficult to keep track of which version is the most current. As you can imagine,
the more computers you add to a peer-to-peer network, the more difficult it becomes to find and
manage resources.

A common way to share resources on a peer-to-peer network is by modifying the file-


sharing controls via the computer’s operating system. For example, you could choose to
create a directory on your computer’s hard disk called “SharedDocs” and then configure the
directory to allow all networked computers to read its files. On a peer-to-peer network, each
user is responsible for configuring her computer to allow access to certain resources and
prevent
access to others. In other words, resource sharing is not controlled by a central computer or
authority. Because access depends on many different users, it might not be uniform or secure.

Although traditional peer-to-peer networks are typically small and contained within a home
or office, examples of very large peer-to-peer networks have emerged to take advantage of
the Internet. These newer types of peer-to-peer networks (commonly called P2P networks) link
computers from around the world to share files between each other’s hard disks.
Unlike
the older style of peer-to-peer network, they require specialized software (besides the
computer’s operating system) to allow resource sharing. Examples of these networks
include Gnutella,
Bitcoin, and the original Napster. In 2001, Napster, which allowed users around
the
globe to share music files, was forced to cease operation due to charges of copyright
infringement from musicians and music producers. Later, the service was redesigned to
provide legitimate music file-sharing services. A company called BitTorrent has made a unique
high-speed peer-to- peer communications method (also called BitTorrent) the foundation of its
business. The company specializes in allowing companies and individuals to share video,
audio, software, and games over the Internet. Although BitTorrent’s peer-to-peer technology
is legal, its use for distributing illegal or copyrighted materials has generated several lawsuits
against the company.

Client/Server
Networks

Another way of designing a network is to use a central computer, known as a server, to


facilitate communication and resource sharing between other computers on the network, which
are known as clients. Clients take the form of personal computers, also known as
workstations, or mobile devices, such as smartphones. A network that uses a server to enable
clients to share data, data storage space, and devices is known as a client/server
Page 56 of 68
network. The term client/server architecture is sometimes used to refer to the design of a
network in which clients rely on servers for resource sharing and processing.

Page 57 of 68
In terms of resource sharing and control, you can compare the client/server network with a
public library. Just as a librarian manages the use of books and other media by patrons, a
server manages the use of shared resources by clients. For example, if a patron does not
have the credentials to check out books, the librarian prevents the patron from doing so.
Similarly, a server allows only authorized clients to access its resources.

Every computer on a client/server network acts as a client or a server. (It is possible, but
uncommon, for some computers to act as both.) Clients on a network can still run applications
from and save data to their local hard disk. But by connecting to a server, they also have the
option of using shared applications, data, and devices. Clients on a client/server network do not
share their resources directly with each other, but rather use the server as an intermediary.
Clients and servers communicate through connectivity devices such as switches or routers.
These devices are covered in detail in this course.

Figure 1-2 illustrates how resources are shared on a client/server network.

Figure 1-2: Resource sharing on a client/server network


© Cengage Learning 2013

To function as a server, a computer must be running an NOS (network operating


system).

An NOS is a special type of software designed to do the


Page 58 of 68
following:

Page 59 of 68
 Manage data and other resources for a number of clients.
 Ensure that only authorized users access the network.
 Control which type of files a user can open and read.
 Restrict when and from where users can access the network.
 Dictate which rules computers will use to communicate.
 Supply applications to clients.

Examples of popular network operating systems include various forms of UNIX and Linux,
Microsoft Windows Server 2008 R2, and Mac OS X Server. By contrast, a stand-alone
computer, or a client computer, uses an operating system, such as Windows 7 or a version of
Linux, UNIX, or Mac OS, and has authority for managing resources on other computers.

Usually, servers have more memory, processing, and storage capacity than clients. They may
even be equipped with special hardware designed to provide network management functions
beyond that provided by the network operating system. For example, a server might contain an
extra hard disk and specialized software so that if the primary hard disk fails, the secondary
hard disk automatically takes its place.

Although client/server networks are typically more complex in their design and maintenance
than peer-to-peer networks, they offer many advantages over peer-to-peer networks, such as:

 User logon accounts and passwords for anyone on a server-based network can be
assigned in one place.
 Access to multiple shared resources (such as data files or printers) can be centrally
granted to a single user or groups of users.
 Problems on the network can be monitored, diagnosed, and often fixed from one location.
 Servers are optimized to handle heavy processing loads and dedicated to handling
requests from clients, enabling faster response time.
 Because of their efficient processing and larger disk storage, servers can connect more
than a handful of computers on a network.

Together, these advantages make client/server networks easier to manage, more secure, and
more powerful than peer-to-peer networks. They are also more scalable than peer-to-peer
networks. In other words, it is easier to add computers and other devices to a client/server
network.

Because client/server networks are by far the most popular type of network, most of the
concepts covered in this book and on the Network+ exam pertain to client/server networks.
Next, you will learn how networks are classified according to
size.

Page 60 of 68
LANs, MANs, and
WANs

As its name suggests, a LAN (local area network) is a network of computers and other
devices that is confined to a relatively small space, such as one building or even one office.
Small LANs first became popular in the early 1980s. At that time, LANs might have consisted of
a handful of computers connected in a peer-to-peer fashion. Today’s LANs are typically much
larger and more complex client/server networks.

Often, separate LANs are interconnected and rely on several servers running many different
applications and managing resources other than data. For example, imagine an office building
in which each of a company’s departments runs its own LAN and all the LANs are connected.
This network may contain dozens of servers, hundreds of workstations, and several shared
storage devices, printers, plotters, fax machines, and even telephone interfaces. Figure 1-3
roughly depicts this type of network (in reality, the network would probably contain many more
clients). As you progress through this book, you will learn about the devices on this network and
how they communicate. After completing this book, you’ll understand how to integrate clients,
servers, and connectivity devices so as to create networks that are reliable, secure, and
manageable.

Networks may extend beyond the boundaries of a building. A network that is larger than a LAN
and connects clients and servers from multiple buildings—for example, a handful of government
offices surrounding a state capitol building—is known as a MAN (metropolitan area network).
Because of the distance it covers, a MAN may use different transmission technology and media
than a LAN.

A network that connects two or more geographically distinct LANs or MANs is called a WAN
(wide area network). Because such networks carry data over longer distances than LANs,
WANs may use different transmission methods and media than LANs. Most MANs can also be
described as WANs; in fact, network engineers are more likely to refer to all networks that
cover a broad geographical range as WANs.

WANs commonly connect separate offices in the same organization, whether they are across
town or across the world from each other. For example, imagine you work for a nationwide
plumbing supply company that keeps its inventory in warehouses in Topeka, Kansas, and
Panama City, Florida. Suppose also that the company’s headquarters is located in New York.
When a customer calls and asks whether you have five faucets of a certain type available to
ship overnight, you need to check the inventory databases for both the Topeka and Panama
City warehouses. Thanks to your WAN, the data are accessible from your New York desktop.
Twice a day, the warehouses’ inventory software automatically updates a database located on a
central server in New York via WAN links that connect the
locations.
Page 61 of 68
WANs are also used to connect LANs that belong to different organizations. For example, all
the public universities within a state might combine and share their resources via a WAN. The
largest and most varied WAN in the world is the Internet. Figure 1-4 depicts a simple WAN.

Figure 1-3: Interconnected LANs


© Cengage Learning 2013

Page 62 of 68
Figure 1-4: A simple
WAN
© Cengage Learning 2013

4. Elements common to Client-Server


Networks

You have learned that networks, no matter how simple or complex, provide some benefits over
stand-alone computers. They also share terminology and common building blocks, some of
which you have already encountered. The following list provides a more complete rundown
of basic elements common to all client/server networks. You will learn more about these topics
throughout this book:

 Client—A computer on the network that requests resources or services from another
computer on a network; in some cases, a client could also act as a server. The term
client may also refer to the human user of a client workstation or to client software
installed on the workstation.

 Server—A computer on the network that manages shared resources; servers usually
have more processing power, memory, and hard disk space than clients. They run
network operating software that can manage not only data, but also users, groups,
security, and applications on the network.

 Workstation—A personal computer (such as a desktop or laptop), which may or may


not be connected to a network; most clients are workstation computers.

 NIC (network interface card)—The device (pronounced nick) inside a computer that
Page 63 of 68
connects a computer to the network media, thus allowing it to communicate with other

Page 64 of 68
computers; many companies (such as Intel, Linksys, and Netgear) manufacture NICs,
which come with a variety of specifications that are tailored to the requirements of the
workstation and the network. Some connect to the motherboard, which is the main circuit
that controls the computer, some are integrated as part of the motherboard, and others
connect via an external port. NICs are also known as network adapters. Figure 1-
5 depicts a NIC connected to a computer’s motherboard.

Note: Because different PCs and network types require different kinds of NICs, you
cannot assume that a NIC that works in one workstation will work in another.

Figure 1-5: A simple WAN


© iStockphoto.com/vetkit

 NOS (network operating system)— The software that runs on a server and enables
the server to manage data, users, groups, security, applications, and other
networking functions. Examples include various types of UNIX and Linux operating
systems, Microsoft Windows Server 2008 R2, and Mac OS X Server.

 Host—A computer that enables resource sharing by other computers on the same
network.

 Node—A client, server, or other device that can communicate over a network and that is
identified by a unique number, known as its network address.

 Connectivity device—A specialized device that allows multiple networks or multiple


parts of one network to connect and exchange data. A small client/server network can
operate without connectivity devices. However, medium- and large-sized LANs use
them to extend

Page 65 of 68
the network and to connect with WANs. WANs use them to connect with the Internet
and with other WANs.

 Segment—A part of a network. Usually, a segment is composed of a group of nodes


that use the same communications channel for all their traffic.

 Backbone—The part of a network to which segments and significant shared devices


(such as routers, switches, and servers) connect. A backbone is sometimes referred to
as “a network of networks” because of its role in interconnecting smaller parts of a LAN
or WAN. Figure 1-6 shows a LAN with its backbone highlighted in yellow.

 Topology— The physical layout of a computer network. Topologies vary according to


the needs of the organization and available hardware and expertise. Networks can
be arranged in a ring, bus, or star formation, and the star formation is the most
common. Hybrid combinations of these patterns are also possible. Figure 1-7
illustrates these network topologies, which you must understand to design and
troubleshoot networks.

 Protocol—A standard method or format for communication between networked devices.


For example, some protocols ensure that data are transferred in sequence and without
error from one node on the network to another. Other protocols ensure that data
belonging to a Web page are formatted to appear correctly in a Web browser window.
Still others encode passwords and keep data transmissions secure.

 Packet—A distinct unit of data exchanged between nodes on a network. Breaking a


large stream of data into many packets allows a network to deliver that data more
efficiently and reliably.

 Addressing—The scheme for assigning a unique identifying number to every node on


the network. The type of addressing used depends on the network’s protocols and
network operating system. Each network device must have a unique address so that
data can be transmitted reliably to and from that device.

 Transmission media—The means through which data are transmitted and received.
Transmission media may be physical, such as wire or cable, or atmospheric (wireless),
such as radio waves. Figure 1-8 shows several examples of transmission media.
Page 66 of 68
Chapter

Page 67 of 68
3, which explains physical transmission media in detail, offers additional images of
network cabling.

Figure 1-6: A LAN backbone


© Cengage Learning 2013

Figure 1-7: Common network topologies


© Cengage Learning 2013

Page 68 of 68
5. Transmission
Media

How are nodes on a network connected? All network nodes are connected to each other and
to the network by transmission media. Transmission media establishes a communications
channel between the nodes on a network and can either be wireless or wired. Wireless
networks use radio waves to connect nodes. With the proliferation of portable devices being
connected to home networks, a network with at least some wireless connectivity is preferred in
most homes. Wired networks use various types of cable (wires) to connect nodes. Twisted-pair
cable is made up of copper wires that are twisted around each other and surrounded by a
plastic jacket. Normal telephone cable is a type of twisted-pair cable, although phone cable
won’t work for connecting a home network and a slightly different type of twisted-pair cable is
used. Coaxial cable consists of a single copper wire surrounded by layers of plastic. If you
have cable TV, the cable running into your TV or cable box is most likely coaxial cable. Fiber-
optic cable is made up of plastic or
glass fibers that transmit data at extremely fast speeds. Verizon’s FiOS service uses fiber-
optic
cable to run very fast data connections directly up to your home, although fiber-optic cable is
not usually run inside the home. On a FiOS network, twisted-pair or coaxial cable is still used
inside the home to transport the network signals.

Figure 1-8: Examples of network transmission media


© Cengage Learning 2013
Page 69 of 68
Now that you are familiar with basic network terminology, you are ready to appreciate the many
uses of computer networks.

6. Network Cabling
What type of cable do I need to connect to a wired Ethernet network? The most popular
transmission media option for wired Ethernet networks is unshielded twisted-pair (UTP)
cable. UTP cable is composed of four pairs of wires that are twisted around each other to
reduce electrical interference. You can buy UTP cable in varying lengths with RJ-45 connectors
(Ethernet connectors) already attached. RJ-45 connectors resemble standard phone
connectors (called RJ-11 connectors) but are slightly larger and have contacts for eight
wires (four pairs) instead of four wires. You must use UTP cable with RJ-45 connectors on an
Ethernet network because a phone cable will not work. Do all wired Ethernet networks
use the same kind of UTP cable?
Figure below lists the three main types of UTP cable you would consider using in home wired
Ethernet networks—Cat 5E, Cat 6, and Cat 6a—and their data transfer rates. Although Cat 5E
cable is the cheapest and is sufficient for many home networking tasks it was designed for 100
Mpbs
wired Ethernet networks that were popular before gigabit Ethernet networks became the
popular standard for home networking. Therefore, you should probably not install Cat 5E cable
although it is still available in stores. Since Cat 6 cable is designed to achieve data transfer
rates that support a gigabit Ethernet network, it is probably the best choice for home networking
cable. Cat 6a cable is designed for Ultra-Fast Ethernet (10 gigabit Ethernet) networks that run at
speeds as fast as 10 Gbps. Installing a 10 gigabit Ethernet network in the home is probably
unnecessary
because today’s home applications don’t require this rate of data transfer.

Page 70 of 68
©Pearson Education 2012

©Pearson Education 2012

Page 71 of 68
7. How Networks are
used

The functions provided by a network are usually referred to as network services. Any network
manager will tell you that the network service with the highest visibility is e-mail. If your
company’s e-mail system fails, users will notice within minutes—and they will not be shy about
informing you of the failure. Although e-mail may be the most visible network service, other
services can be just as vital. Printer sharing, file sharing, Internet access and Web site
delivery, remote access capabilities, the provision of voice (telephone) and video services, and
network management are all critical business functions provided through networks. In large
organizations, separate servers may be dedicated to performing each of these functions. In
offices with only a few users and little network traffic, one server may perform all functions.

File and Print


Services

The term file services refers to a server’s ability to share data files, applications (such as word-
processing or spreadsheet programs), and disk storage space. A server that provides
file services is called a file server. File services accounted for the first use of networks
and remain the foundation of networking today, for a number of reasons. As mentioned
earlier, it is easier and faster to store shared data at a central location than to copy files to
disks and then pass the disks around. Data stored at a central location is typically more
secure
because a network administrator can take charge of backing up this data, rather than relying
on individual users to make their own copies. In addition, using a file server to run applications
for multiple users requires the purchase of fewer copies of the application and less
maintenance work for the network administrator.

Using print services to share printers across a network also saves time and money. A high
capacity printer can cost thousands of dollars, but can handle the printing tasks of an entire
department, thereby eliminating the need to buy a desktop printer for each worker. With one
printer, less time is spent on maintenance and management. If a shared printer fails, the
network administrator can diagnose the problem from a workstation anywhere on the network
using the network operating system’s printer control functions. Often, the administrator can
solve the problem without even visiting the printer.

Access
Services

A network’s access services allow remote users to connect to the network. (The term remote
user refers to a person working on a computer on a different network or in a different
geographical location from the LAN’s server.) Less frequently, access services allow network
Page 72 of 68
users to connect to machines outside the network. Most network operating systems include
built-in access services that enable users to dial in to a remote access server, log on to the
network, and take advantage

Page 73 of 68
of the network just as if they were logged on to a workstation on the office LAN. A remote
access server may also be known as simply an access server.

Organizations might use access services to provide LAN connectivity for workers at home,
workers on the road, and workers at small satellite offices where dedicated WAN connections
are not cost effective. In addition, access services can allow staff from other organizations
(such as a software or hardware vendor) to help diagnose a network problem. For example,
suppose you work for a clothing manufacturer that uses embroidery software to control the
machines that sew insignias on shirts and hats. You are an expert on networking, but less adept
with the automated embroidery software. When the software causes problems, you turn to the
software vendor for help. But suppose the vendor’s technician can’t solve the problem except
by logging on to your network. In that case, it is much more efficient and less expensive to
allow the technician to dial in to your network through a remote access server than to fly the
technician to your office.

It is important to remember that remote access servers—no matter which platform (hardware or
operating system software) they run on—allow external users to use network resources and
devices just as if they were logged on to a workstation in the office. From a remote location,
users can print files to shared printers, log on to hosts, retrieve mail from an internal messaging
system, or run queries on internal databases. Because they can be accessed by the world
outside the local network, remote access servers necessitate strict security measures.

Communications
Services

Today’s networks can help users communicate in many ways: e-mail, telephone, video, fax,
cell phone, smartphone (for example, an iPhone), and personal digital assistant (for
example, a BlackBerry). Using the same network to deliver multiple types of
communications services is known as convergence. A similar term, unified
communications, refers to the centralized management of multiple network-based
communications. For example, your company might use one software program to manage
intraoffice phone calls, long-distance phone calls, cell phone calls, voice mail, faxes, and text
messaging for all the users on your network.

The oldest network communications services are mail services, which coordinate the storage and
transfer of e-mail between users on a network. The computer responsible for mail services is
called a mail server. Mail servers are usually connected to the Internet, but when clients only
need to exchange e-mail within their organization, their mail server may be isolated on their
LAN.

In addition to simply sending, receiving, and storing mail, mail servers can do the following:

Page 74 of 68
 Intercept or filter unsolicited e-mail, known as spam.
 Find objectionable content in e-mails and do something about that content, such as
flagging it to make the recipient aware of it.

Page 75 of 68
 Route messages according to particular rules. For example, if a technical support
representative has not opened a customer’s message within 15 minutes of delivery, a
mail server could automatically forward the message to a supervisor.
 Provide a Web-based client for checking e-mail.
 Notify administrators or users if certain events occur, such as a user’s mailbox
exceeding its maximum amount of space on a server.
 Schedule e-mail transmission, retrieval, storage, and maintenance functions.
 Communicate with mail servers on other networks so that mail can be exchanged
between users who do not connect to the same LAN.

To supply these services, a mail server runs specialized mail server software, examples of
which include Sendmail and Microsoft Exchange Server. Because of their critical nature and
heavy use, maintaining a mail server in any sizable organization requires a significant
commitment of technical support and administration resources.

Internet
Services

You have probably connected to the Internet without knowing or caring about all of the services
running behind the scenes. But in fact, many servers are working together to bring Web pages
to your desktop. For example, a Web server is a computer installed with the appropriate
software to supply Web pages to many different clients upon demand. The most popular
Web server software is Apache. It’s used to deliver more than 60 percent of Web pages on the
Internet.

Supplying Web pages is only one type of Internet service. Other Internet services include file
transfer capabilities, Internet addressing schemes, security filters, and a means for directly
logging on to other computers on the Internet.

Management
Services

When networks were small and simple, a single network administrator could manage the entire
network. For instance, suppose a user called to report a problem logging on to the network and
that the administrator diagnosed the problem as an addressing conflict (that is, two workstations
having the same network address). In a very small network, the conflicting workstations might
be located right around the corner from each other, and one address could be changed
quickly. In another example, if a manager needed to report the number of
copies of Adobe Photoshop in use in a certain department, the network administrator could
probably get the desired information by just walking through the department and checking the
various workstations.

Page 76 of 68
As networks grow larger and more complex, however, they become more difficult to manage.
Using network management services can help you keep track of a large network. Network
management services centrally administer management tasks on the network, such as
ensuring that no more than 20 workstations are using Adobe Photoshop at one time in an
organization that purchased a 20-user license for the software. Some organizations dedicate a
number of servers to network management functions, with each server performing only one or
two unique services.

Numerous services fall under the category of network management. Some of the most
important ones include the following:

 Traffic monitoring and control— Determining how much traffic, or data transmission
activity, is taking place on a network and notifying administrators when the network
becomes overloaded. In general, the larger the network, the more critical it is to monitor
traffic.

 Load balancing— Distributing data transfer activity evenly so that no single device
becomes overwhelmed. Load balancing is especially important for networks in which it’s
difficult to predict the number of requests that will be issued to a server, as is the case
with Web servers.

 Hardware diagnosis and failure alert—Determining when a network component fails


and automatically notifying the network administrator through an e-mail or text message.

 Asset management— Collecting and storing data on the number and types of software
and hardware assets in an organization’s network. With asset management software, a
server can electronically examine each client’s software and hardware and automatically
save the data in a database. Other types of assets might be identified and tracked using
RFID (Radio Frequency Identification) tags, which emit a wireless signal at all times.
Wireless detection devices connected to a network can track the locations of RFID-
tagged devices. For example, a hospital might use RFID tags to keep track of the
wheelchairs, beds, and IV pumps that circulate throughout its campus. Before asset
management services, inventory data had to be gathered manually and typed into
spreadsheets.

 License tracking—Determining how many copies of a single application are currently in


use on the network and ensuring that number does not exceed the number of licenses
purchased. This information is important for legal reasons, as software companies are
vigilant about illegally copying software or using more than the authorized number of
copies.

Page 77 of 68
 Security auditing—Evaluating what security measures are currently in force and
notifying the network administrator if a security breach occurs.

 Software distribution—Automatically transferring a file or installing an application from


the server to a client on the network. The installation process can be started from either
the server or the client. Several options are available when distributing software, such as
warning users about updates, writing changes to a workstation’s system files, and
restarting the workstation after the update.

 Address management— Centrally managing a finite number of network addresses for


an entire network. Usually this task can be accomplished without manually modifying the
client workstation configurations.

 Backup and restoration of data—Backing up critical data files to a secure storage area
and then restoring data if the original files are lost or deleted. Often backups are
performed according to a formulaic schedule. Backup and data restoration services
provide centralized management of data backup on multiple servers and on-demand
restoration of files and directories.

For now, it is enough to be aware of the variety of services and the importance of this growing
area of networking.

8. Reference

Dean, T. (2012). ‘An Introduction to Networking’, in Helba, S. (ed.) Network+ guide to networks.
Cengage Learning, pp 1 – 16.

Network + Guide to Networks 7th Edition (by: Jill West, Tamara Dean, and Jean Andrews/
Cengage) ISBN- 1337685712

Business Data Communications and Networking, 13th Edition (Publisher – Wiley Press)
ISBN- 9781119519744

Shelly Cashman Series Discovering Computers & Microsoft Office 365 & Office 2016: A
Fundamental Combined Approach By: Jennifer T. Campbell; Steven M. Freund; Mark
Frydenberg Publisher: Cengage Learning Print ISBN: 9781337412490, 133741249X eText
ISBN: 9781305901469, 1305901460

Page 78 of 68
Websites:
http://www.jobtesterprep.co.u
k http://www.atunlimited.com

Page 79 of 68

You might also like