SlideShare a Scribd company logo
1 of 36
Client, Host, Server
 Server- applications or systems available to clients and
hosts
 Interconnects clients with hosts
 Host- is the main server
 Clients use what is provided by the server
Mainframe, Supercompute
rs
 Synonymous of each other
 Powerful computers used by corporate &
government organization
 Used for processing bulk data such as a census
Grid Computing, Distributed
Processing
 Grid computing- combination of computer resources
 Distributed processing- how the grid computing
works
Ethernet, Peer-to-peer
(P2P)
 Ethernet divides data into packets
 Each frame contains source and destination
addresses and error-checking data
 P2P is am application that distributes workloads
among peers
Local Area Network (LAN),
Wide Area Network (WAN)
 LAN is a computer network that interconnects
computers in a limited area
 WAN is a telecommunication network that covers a
broad area
 Businesses and governments use WANs to relay
data
Virtual LAN (VLAN), Wireless
LAN (WLAN)
 VLAN is a group of hosts with a common set of
requirements
 WLAN links two or more devices using one of
several wireless distribution methods
Internet, Intranet, Extranet
 Internet is publically shared throughout anyone who
has access to it
 Intranet is a private network that is accessible only
to people of the same company or organization
 Extranet allows access with the use of a username
and password
Virtual Private Network
 Uses public telecommunication
 Provides remote offices or traveling users access to
a central organized network
 Users have to be authenticated
Routers, Switches, Hubs
 Routers perform the “traffic directing”
 Forward data packets between computer networks
 Switch- small hardware device that joins multiple
computers together within one (LAN)
 They are capable of inspecting data packets as they are
received
 Hub- small, simple, inexpensive device that joins multiple
computers together
 Support the Ethernet standard
Optical Fiber, Cables
 Optical fiber- the medium and technology associated
with the transmission of information as light pulses
along a glass or plastic strand or fiber
 Carry much more information than conventional
copper wire
 Cables are basic tools used to share data or
transmit power
Wireless Fidelity (WiFi)
 Used to wirelessly connect electronic devices
 300-600 feet of range depending on strength
 Requires a wireless network or an internet hot spot
WiMax
 WiMAX is a wireless digital communications system
that is intended for wireless "metropolitan area
networks”
 It can provide broadband wireless access (BWA) up
to 30 miles for fixed stations, and 3-10 miles for
mobile stations
Bluetooth
 Bluetooth is a very simple type of wireless
networking
 It sends out a weak connection that is only picked up
by devices within a 32 foot range
 Bluetooth uses a technique called
spread-spectrum frequency
hopping
Network Operating System
(NOS) & Utility Software
 NOS is the software that runs on a server and
enables the server to manage data, users, etc
 Utility software is a kind of system software
designed to help analyze, configure, optimize and
maintain the computer
 Usually focuses on how the computer infrastructure
operates
 Utilities are often rather technical and targeted at
people with an advanced level of computer
knowledge
Storage Area Network (SAN) &
Redundant Array of Inexpensive Disks
(RAID)
 SAN is a dedicated network that provides access to
consolidated, block level data storage
 They are primarily used to make storage devices
 RAIDs are used for their higher reliability and data-
transfer rate, rather than for economic reasons
Introduction to Network
Administration
 A network administrator is a person who’s job is to
monitor, install, configure and repair network
equipment
 Also, in some companies a network admin can
involve themselves in fixing some of the computers
on the network.
Access Control
Gaining admission to a network requires both
Identification and Authentication.
Identification: State your identity.
Authentication: Prove it.
Authentication
 Network authentication is usually based off of having
one or more of the following:
 Something you know: a password, or possibly a PIN
 Something you have: a key, ID card
 Something you are: fingerprints, retinas/iris, voice
 Somewhere you are: proximity to a certain place
Authorization
 This is applied once a user has access to network.
 Authorization dictates what a “subject” can do to the
system once they have access
 “One-Note, Google Docs”
 Sometimes these are called “Permissions”
Accountability
 Just as the Authorization system tells you what you
can do, a system for Accountability monitors what
you did.
 These systems will monitor things like:
 Applications used
 Internet history
 Time spent on the network
Computers & Security
 Firewall: a device set up to deny access to a
network if a computer does not match a set of
requirements
 Proxy: a server used to access other computers
 License: gives a owner the right to use a network or
software (single user, multi-user, network-wide)
 Encryption: Information transformed using a cypher
that will seem useless unless one has a certain key
to have it make sense.
Physical Security
 Networks and mainframe data centers can also be
protected physically.
 Locks and doors
 Extra authentification requirements
 Surveillance
 Security Guards
 Ext…
Network Policies
 These are the rules, guidelines and constraints that
dictate how and what things can be done on a
network.
 These will also dictate how the network is protected
from corruption and is archived.
 A more physical policy used to protect data centers
is that of UPS (uninterruptable power supply)
Ethics
 Networks can also be used in more unethical
ways, such as spreading viruses, spam and other
hindrances
 Many people/companies/schools have network rules
that employees must follow while on their network
Protocols
 A set of rules that governs the communications
between computers on a network
 To communicate, two computers must speak the
same “language”
 Different network protocols allow any computer to
communicate around the world
Synchronous &
Asynchronous
 The two different ways used communicating over a
physical circuit
 Synchronous- This connection negotiation process
takes longer on a low error-rate, but is better with
systems that the transmission medium is not very
reliable
 Transmissions are synced by external clock
Synchronous & Asynchronous
Continued
 Asynchronous- Called “best effort” transmission
because on side transmits and the other receives
(the best it can)
 Transmissions synchronized by signals
Remote Access
 People are able to access data or resources from a
remote location.
 Traditional remote access solutions used dial-up
technologies to allow employees to connect to an
office network via telephone networks connecting to
remote access servers
Bandwidth & Broadband
 Bandwidth- The amount of
communication resources
used or vacant expressed in
bits/second
 Broadband- The
telecommunications signal
or device of a
greater bandwidth than
another signal or device
(the broader the band, the
greater the capacity for
traffic)
Bit Rates
 The number of bits that are conveyed or processed
per unit of time
Networking Trends
Networking Trends
Networking Trends

More Related Content

What's hot

BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
Steven Cahill
 
Internet Service Provider
Internet Service ProviderInternet Service Provider
Internet Service Provider
FaheemShah25
 
Types of Network
Types of NetworkTypes of Network
Types of Network
Avishek Kar
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
jpprakash
 

What's hot (20)

wired and wireless networks
wired and wireless networkswired and wireless networks
wired and wireless networks
 
Computer networking ppt
Computer networking pptComputer networking ppt
Computer networking ppt
 
Computer network ppt
Computer network pptComputer network ppt
Computer network ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
Networking
NetworkingNetworking
Networking
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Internet Service Provider
Internet Service ProviderInternet Service Provider
Internet Service Provider
 
Types of Network
Types of NetworkTypes of Network
Types of Network
 
Computer network basic concepts
Computer network   basic conceptsComputer network   basic concepts
Computer network basic concepts
 
Networking Fundamentals
Networking FundamentalsNetworking Fundamentals
Networking Fundamentals
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.PPT ON COMPUTER NETWORK AND IT'S TYPES.
PPT ON COMPUTER NETWORK AND IT'S TYPES.
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Networking Components
Networking ComponentsNetworking Components
Networking Components
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
Computer networks
Computer networksComputer networks
Computer networks
 
networking
networkingnetworking
networking
 

Viewers also liked

iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)
Prof. Erwin Globio
 
Ideas for Writing a Conclusion
Ideas for Writing a ConclusionIdeas for Writing a Conclusion
Ideas for Writing a Conclusion
larchmeany1
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
Draizelle Sexon
 

Viewers also liked (15)

BSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis GuidelinesBSCS | BSIT Thesis Guidelines
BSCS | BSIT Thesis Guidelines
 
Overview of C Language
Overview of C LanguageOverview of C Language
Overview of C Language
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Eclipse vs Netbeans
Eclipse vs NetbeansEclipse vs Netbeans
Eclipse vs Netbeans
 
PSITE Letter for Prof Globio
PSITE Letter for Prof GlobioPSITE Letter for Prof Globio
PSITE Letter for Prof Globio
 
Structured Query Language
Structured Query LanguageStructured Query Language
Structured Query Language
 
Solutions to Common Android Problems
Solutions to Common Android ProblemsSolutions to Common Android Problems
Solutions to Common Android Problems
 
iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)iOS Apps Development (SQLite Tutorial Part 2)
iOS Apps Development (SQLite Tutorial Part 2)
 
Introduction to Android Development
Introduction to Android DevelopmentIntroduction to Android Development
Introduction to Android Development
 
Ideas for Writing a Conclusion
Ideas for Writing a ConclusionIdeas for Writing a Conclusion
Ideas for Writing a Conclusion
 
Mobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence CapitalMobile Enterprise Trends 2015 - Emergence Capital
Mobile Enterprise Trends 2015 - Emergence Capital
 
Embedded System Presentation
Embedded System PresentationEmbedded System Presentation
Embedded System Presentation
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 
The thesis and its parts
The thesis and its partsThe thesis and its parts
The thesis and its parts
 
Writing thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelinesWriting thesis chapters 1-3 guidelines
Writing thesis chapters 1-3 guidelines
 

Similar to Networking Trends

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
UMaine
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
Ankit Garg
 
Basics Of Networking
Basics Of NetworkingBasics Of Networking
Basics Of Networking
paramalways
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
chamwama
 

Similar to Networking Trends (20)

Networking And Telecommunications
Networking And TelecommunicationsNetworking And Telecommunications
Networking And Telecommunications
 
Networks: The Big Picture
Networks: The Big PictureNetworks: The Big Picture
Networks: The Big Picture
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
FUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORKFUNDAMENTAL OF NETWORK
FUNDAMENTAL OF NETWORK
 
Computer networking
Computer networkingComputer networking
Computer networking
 
unit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdfunit 4 cds computer networking notesnotes.pdf
unit 4 cds computer networking notesnotes.pdf
 
Introduction of Networking
Introduction of NetworkingIntroduction of Networking
Introduction of Networking
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
Communications
CommunicationsCommunications
Communications
 
Networking
NetworkingNetworking
Networking
 
Basics Of Networking
Basics Of NetworkingBasics Of Networking
Basics Of Networking
 
Chapter01 -- introduction to networking
Chapter01  -- introduction to networkingChapter01  -- introduction to networking
Chapter01 -- introduction to networking
 
Basic concept of Computer networks
Basic concept of Computer networks Basic concept of Computer networks
Basic concept of Computer networks
 
Introduction to computer networking
Introduction to computer networkingIntroduction to computer networking
Introduction to computer networking
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Data Communications and Networks
Data Communications and NetworksData Communications and Networks
Data Communications and Networks
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Terminologies used with networking
Terminologies used with networkingTerminologies used with networking
Terminologies used with networking
 
What is a network
What is a networkWhat is a network
What is a network
 

More from Prof. Erwin Globio

Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
Prof. Erwin Globio
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
Prof. Erwin Globio
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development Latest
Prof. Erwin Globio
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)
Prof. Erwin Globio
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
Prof. Erwin Globio
 
Human Resource Management Seminar
Human Resource Management SeminarHuman Resource Management Seminar
Human Resource Management Seminar
Prof. Erwin Globio
 

More from Prof. Erwin Globio (20)

Sq lite presentation
Sq lite presentationSq lite presentation
Sq lite presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Cisco Router Basic Configuration
Cisco Router Basic ConfigurationCisco Router Basic Configuration
Cisco Router Basic Configuration
 
Introduction to iOS Apps Development
Introduction to iOS Apps DevelopmentIntroduction to iOS Apps Development
Introduction to iOS Apps Development
 
Cloud Computing Latest
Cloud Computing LatestCloud Computing Latest
Cloud Computing Latest
 
Introduction to Android Development Latest
Introduction to Android Development LatestIntroduction to Android Development Latest
Introduction to Android Development Latest
 
iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)iOS Apps Development (SQLite Tutorial Part 1)
iOS Apps Development (SQLite Tutorial Part 1)
 
A tutorial on C++ Programming
A tutorial on C++ ProgrammingA tutorial on C++ Programming
A tutorial on C++ Programming
 
Introduction to Computer Programming
Introduction to Computer ProgrammingIntroduction to Computer Programming
Introduction to Computer Programming
 
Android Fragments
Android FragmentsAndroid Fragments
Android Fragments
 
Android Development Tools and Installation
Android Development Tools and InstallationAndroid Development Tools and Installation
Android Development Tools and Installation
 
Java Collections Tutorials
Java Collections TutorialsJava Collections Tutorials
Java Collections Tutorials
 
Action Bar in Android
Action Bar in AndroidAction Bar in Android
Action Bar in Android
 
Resource Speaker
Resource SpeakerResource Speaker
Resource Speaker
 
Guidelines to Qualitative Researches
Guidelines to Qualitative ResearchesGuidelines to Qualitative Researches
Guidelines to Qualitative Researches
 
Lecture on E-Presentation
Lecture on E-PresentationLecture on E-Presentation
Lecture on E-Presentation
 
Thesis Writing
Thesis WritingThesis Writing
Thesis Writing
 
Project Proposal Guidelines
Project Proposal GuidelinesProject Proposal Guidelines
Project Proposal Guidelines
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Human Resource Management Seminar
Human Resource Management SeminarHuman Resource Management Seminar
Human Resource Management Seminar
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Networking Trends

  • 1.
  • 2. Client, Host, Server  Server- applications or systems available to clients and hosts  Interconnects clients with hosts  Host- is the main server  Clients use what is provided by the server
  • 3. Mainframe, Supercompute rs  Synonymous of each other  Powerful computers used by corporate & government organization  Used for processing bulk data such as a census
  • 4. Grid Computing, Distributed Processing  Grid computing- combination of computer resources  Distributed processing- how the grid computing works
  • 5. Ethernet, Peer-to-peer (P2P)  Ethernet divides data into packets  Each frame contains source and destination addresses and error-checking data  P2P is am application that distributes workloads among peers
  • 6. Local Area Network (LAN), Wide Area Network (WAN)  LAN is a computer network that interconnects computers in a limited area  WAN is a telecommunication network that covers a broad area  Businesses and governments use WANs to relay data
  • 7. Virtual LAN (VLAN), Wireless LAN (WLAN)  VLAN is a group of hosts with a common set of requirements  WLAN links two or more devices using one of several wireless distribution methods
  • 8. Internet, Intranet, Extranet  Internet is publically shared throughout anyone who has access to it  Intranet is a private network that is accessible only to people of the same company or organization  Extranet allows access with the use of a username and password
  • 9. Virtual Private Network  Uses public telecommunication  Provides remote offices or traveling users access to a central organized network  Users have to be authenticated
  • 10. Routers, Switches, Hubs  Routers perform the “traffic directing”  Forward data packets between computer networks  Switch- small hardware device that joins multiple computers together within one (LAN)  They are capable of inspecting data packets as they are received  Hub- small, simple, inexpensive device that joins multiple computers together  Support the Ethernet standard
  • 11. Optical Fiber, Cables  Optical fiber- the medium and technology associated with the transmission of information as light pulses along a glass or plastic strand or fiber  Carry much more information than conventional copper wire  Cables are basic tools used to share data or transmit power
  • 12. Wireless Fidelity (WiFi)  Used to wirelessly connect electronic devices  300-600 feet of range depending on strength  Requires a wireless network or an internet hot spot
  • 13. WiMax  WiMAX is a wireless digital communications system that is intended for wireless "metropolitan area networks”  It can provide broadband wireless access (BWA) up to 30 miles for fixed stations, and 3-10 miles for mobile stations
  • 14. Bluetooth  Bluetooth is a very simple type of wireless networking  It sends out a weak connection that is only picked up by devices within a 32 foot range  Bluetooth uses a technique called spread-spectrum frequency hopping
  • 15. Network Operating System (NOS) & Utility Software  NOS is the software that runs on a server and enables the server to manage data, users, etc  Utility software is a kind of system software designed to help analyze, configure, optimize and maintain the computer  Usually focuses on how the computer infrastructure operates  Utilities are often rather technical and targeted at people with an advanced level of computer knowledge
  • 16. Storage Area Network (SAN) & Redundant Array of Inexpensive Disks (RAID)  SAN is a dedicated network that provides access to consolidated, block level data storage  They are primarily used to make storage devices  RAIDs are used for their higher reliability and data- transfer rate, rather than for economic reasons
  • 17.
  • 18. Introduction to Network Administration  A network administrator is a person who’s job is to monitor, install, configure and repair network equipment  Also, in some companies a network admin can involve themselves in fixing some of the computers on the network.
  • 19. Access Control Gaining admission to a network requires both Identification and Authentication. Identification: State your identity. Authentication: Prove it.
  • 20. Authentication  Network authentication is usually based off of having one or more of the following:  Something you know: a password, or possibly a PIN  Something you have: a key, ID card  Something you are: fingerprints, retinas/iris, voice  Somewhere you are: proximity to a certain place
  • 21. Authorization  This is applied once a user has access to network.  Authorization dictates what a “subject” can do to the system once they have access  “One-Note, Google Docs”  Sometimes these are called “Permissions”
  • 22. Accountability  Just as the Authorization system tells you what you can do, a system for Accountability monitors what you did.  These systems will monitor things like:  Applications used  Internet history  Time spent on the network
  • 23. Computers & Security  Firewall: a device set up to deny access to a network if a computer does not match a set of requirements  Proxy: a server used to access other computers  License: gives a owner the right to use a network or software (single user, multi-user, network-wide)  Encryption: Information transformed using a cypher that will seem useless unless one has a certain key to have it make sense.
  • 24. Physical Security  Networks and mainframe data centers can also be protected physically.  Locks and doors  Extra authentification requirements  Surveillance  Security Guards  Ext…
  • 25. Network Policies  These are the rules, guidelines and constraints that dictate how and what things can be done on a network.  These will also dictate how the network is protected from corruption and is archived.  A more physical policy used to protect data centers is that of UPS (uninterruptable power supply)
  • 26. Ethics  Networks can also be used in more unethical ways, such as spreading viruses, spam and other hindrances  Many people/companies/schools have network rules that employees must follow while on their network
  • 27.
  • 28. Protocols  A set of rules that governs the communications between computers on a network  To communicate, two computers must speak the same “language”  Different network protocols allow any computer to communicate around the world
  • 29. Synchronous & Asynchronous  The two different ways used communicating over a physical circuit  Synchronous- This connection negotiation process takes longer on a low error-rate, but is better with systems that the transmission medium is not very reliable  Transmissions are synced by external clock
  • 30. Synchronous & Asynchronous Continued  Asynchronous- Called “best effort” transmission because on side transmits and the other receives (the best it can)  Transmissions synchronized by signals
  • 31. Remote Access  People are able to access data or resources from a remote location.  Traditional remote access solutions used dial-up technologies to allow employees to connect to an office network via telephone networks connecting to remote access servers
  • 32. Bandwidth & Broadband  Bandwidth- The amount of communication resources used or vacant expressed in bits/second  Broadband- The telecommunications signal or device of a greater bandwidth than another signal or device (the broader the band, the greater the capacity for traffic)
  • 33. Bit Rates  The number of bits that are conveyed or processed per unit of time

Editor's Notes

  1. http://computer.howstuffworks.com/router.htmhttp://compnetworking.about.com/od/hardwarenetworkgear/g/bldef_switch.htmhttp://compnetworking.about.com/cs/internetworking/g/bldef_hub.htmhttp://www.cisco.com/en/US/products/hw/routers/products_category_buyers_guide.html
  2. http://searchtelecom.techtarget.com/definition/optical-fiberhttp://www.ehow.com/facts_5024530_definition-computer-cables.html http://www.opticalcable.info/spdif-optical-cable/
  3. http://www.howstuffworks.com/wireless-network.htmhttp://www.goingwimax.com/wimax-glossary/wi-fi-or-wlan-wireless-local-area-networks/
  4. http://www.wimax.com/general/what-is-wimax
  5. http://electronics.howstuffworks.com/bluetooth2.htm http://www.shopping.com/Motorola-Motorola-H350-Bluetooth-Headset-Blue-H350BLUE/info