Please enable JavaScript.
Coggle requires JavaScript to display documents.
Networks - Chapter 3 (Communications devices - Enable computer users to…
Networks - Chapter 3
Communications devices - Enable computer users to communicate and exchange items such as data, instructions and information with another computer.
Routers - is a device is used to connect multiple network - Several LANs or a LAN and a WAN, such as the internet. A router will connect LANs and WANs irrespective of the hardware and network communications protocol uses in each segment.
Network interface cards and wireless adapters - is a card inserted into an expansion slot of a personal computer, or it may be built in to the computer motherboard. A wireless adapter performs the function of a NIC for notebook and other mobile computers
Switches - is a devices that provides a connecting point for cables in a LAN. Network traffic in a LAN typically follow specific paths that connect members of a works group, such as the accounts department of a business
NBN devices - is a national network of communication infrastructure that use lightning-fast fiber-optic, fixed wireless and satellite technology.
Broadband routers - Routers for home networks also can join multiple networks. These routers are designed specifically to join the home (LAN) to the internet (WAN) to share internet connections.
Wireless access point - is a communications device used on wireless local area networks. It acts as a central transmitter and receiver of wireless radio signals.
Wireless extender - increases the area by a wireless network. They allow users to keep mobile devices, media players and computers connected to a wi-fi network with expanded coverage throughout the home or office
Network communications standards - Today's networks connect terminals, devices and computers from many different manufactures across many types of networks.
The 802.11 standard - was developed to specify how two wireless computers or devices communicate with each via radio waves. This standard uses techniques similar to those of the Ethernet standard and is therefore easy to integrate into existing wired Ethernet networks.
TCP/IP - Is a network standard that manages the transmission of data by breaking it up into packets and transmitting the packets over the internet. An important part of the IP protocol is the IP address. The IP addressing standard - Four number between 0 and 255 separted by full stops.
Ethernet - Is a popular network standard that allows personal computers to contend for access to the network. Ethernet is a popular LAN standard because it is relatively inexpensive and easy to install and maintain
Sending and receiving devices - Sending and receiving devices initiate or accept the transmission of data, instructions and information. Notebook computers, desktop computers, tablets, mid range servers and mainframe computers can all serve as sending and receiving devices
Legal and ethical responsibilities - Network professionals and users of network have legal and ethical responsibilities with respect to social protocols and the ownership of data and information
Ethical responsibilities - Ethical responsibilities relate to following the correct moral path. Not adhering to ethical standards in an online environment has the consequences of a loss of respect, loss of customers and criticism from aggrieved users.
Resolving legal, ethical and social tensions - Tension can arise in a workplace if acceptable work practices are not clearly defined
Legal responsibilities - Legal responsibilities include those actions to which a person can be held accountable under law. Breaching a legal responsibility has the implication of litigation or facing charges in a court of law.
Security practices - Applying appropriate security practices to protect information, particularly sensitive data such as personal details, form part of the social protocols that users of network should follow
Network security - Information transmitted over networks has a higher degree of security than information kept on a company's premises. many security techniques - such as username, passwords, bio metrics and firewalls.
Security threats - The integrity and security of data and information stored within, and communicated between, information systems can be threatened by a number of actions, devices and events.
Accidental threats - Some accidental threats are hard to guard against. For example, people can accidentally delete files or send attachments via email to the wrong person.
Deliberate threats - Deliberate threats to data and information occur when someone tries to damage or manipulate the system. This can be through a hacker finding a way into a network that bypasses security measures, or an employee sabotaging files or altering data for their own benefit.
Communications software - Is an application or program designed to pass or support the movement of information over a network.
Network analysis tools - Network administrators use a variety of software packages designed to monitor devices on a network, check the use of different protocols.
Network operating system - A server operating on a client-server network requires operating system and application software that differs from those of a desktop or portable computer.
-
Networks
A network is a collection of computers and devices connected by communication channels that facilitates communication among users and allows users resources with one another.
Receiving device - Such as a printer, which accepts the data, instruction or information notebook computer, tablets, smartphone and other sending devices usually have a built-in communications device.
Types of networks
network architecture
Peer-to-peer networks - is a simple, inexpensive network that typically connects fewer than 10 computers. Each computer on a peer-to-peer network can share the hardware, data or information located on any other computer in the network.
Internet peer-to-peer - Another use of peer-to-peer involves an internet peer-to-peer network, which enables users with the same networking software to connect to one another's hard disk drives and exchange files directly.
Client-server networks - A server, sometimes called the host computer, controls access to the hardware and software on the network and provides a centralized storage area for programs, data and information.
Virtual private networks (VPN) - Allows businesses to use a public WAN, (the internet) to create a private network that links remote sites and users to the business head office.
Home network - If you have multiple computers in your home or home office, you can connect all of them together with a home network.
Intranets - use it to publish their event calendars, policies, procedure manuals and technical support files, and to allow access to documents required for group work.
Wide area networks (WAN) - Cover a large area - for example, a city, a country or the world - using a communications channel that combines many types of media, such as telephone lines, cables and radio waves.
local area network (LAN) - Connects computers and devices in a limited area, such as a home, school, office building or closely positioned group of buildings.
Digital signal - Consists of individual electrical pulses that represent the bits grouped together into bytes.
Sending device - Such as a notebook computer, which initiates an instruction to transmit data, instructions or information
Benefits and risks associated with using networks - The use of network has become widespread as the technology has become more widely available and the use of the internet and social media has become a seamless part of our lives
-
sending and receiving devices - Sending and receiving devices initiate or accept the transmission of data, instructions and information. Notebook computers, desktop computers, tablets, mid range servers and mainframe computers can all serve as sending and receiving devices