Please enable JavaScript.
Coggle requires JavaScript to display documents.
Module 1 - Coggle Diagram
Module 1
network
group of computers and other devices (such as printers) that are connected by some type of transmission media
-
physical topology
Mostly refers to a network’s hardware and how computers, other devices, and cables or radio signals work together to form the physical network
logical topology
Mostly refers to how software controls access to network resources (including how users and software initially gain access to the network) and how specific resources such as applications and databases are shared on the network
-
-
-
AD (active directory)
centralized directory database that contains user account information and security for the entire group of computers
network services
resources a network makes available to its users include applications and the data provided by these applications
-
-
-
-
-
-
FTP service
client-server application that transfers files between two computers, and it primarily uses FTP (File Transfer Protocol)
-
-
switch
receives incoming data from one of its ports and redirects (or switches) it to another port or multiple ports that will send the data to its intended destination(s) within the local network
hub
inefficient and outdated networking device that has been replaced by switches. A hub accepted signals from a transmitting device and repeated those signals to all other connected devices in a broadcast fashion
backbone
central conduit that connects the segments (pieces) of a network and is sometimes referred to as “a network of networks.”
router
device that manages traffic between two or more networks and can help find the best path for traffic to get from one network to another
-
-
-
two primary network protocols are TCP (Transmission Control Protocol) and IP (Internet Protocol), and the suite of all the protocols an OS uses for communication on a network is the TCP/IP suite of protocols
When HTTP is layered on top of an encryption protocol, such as SSL (Secure Sockets Layer) or TLS (Transport Layer Security), the result is HTTPS (HTTP Secure), which gives a secure transmission
The client uses SMTP (Simple Mail Transfer Protocol) to send an email message to the first server, which is sometimes called the SMTP server (see Figure 1-5). The first server sends the message on to the receiver’s mail server, where it’s stored until the recipient requests delivery. The recipient’s mail server delivers the message to the receiving client using one of two protocols: POP3 (Post Office Protocol, version 3) or IMAP4 (Internet Message Access Protocol, version 4)
An encrypted and secure file transfer protocol is SFTP (Secure File Transfer Protocol), which is based on the SSH protocol. SSH is discussed below
Many DBMSs use the programming language SQL (Structured Query Language, pronounced S-Q-L or just sequel) to configure and interact with the database’s objects and data. Popular examples of SQL database software include Microsoft SQL Server, Oracle Database, and the open-source MySQL
The ssh command in Linux uses the SSH (Secure Shell) protocol, which creates an encrypted channel or tunnel between two computers and provides security that Telnet lacks. In Windows operating systems, RDP (Remote Desktop Protocol) also provides secure, encrypted transmissions
The physical topology used by this network is called a star topology because all devices connect to one central device, the switch. Compare this to the physical topology of the network shown earlier in Figure 1-1 where each device connects to multiple other devices, which is called a mesh topology
A network port can be an onboard network port embedded in the computer’s motherboard, such as the port on the laptop in Figure 1-9. Another type of port is provided by a modular NIC (network interface card), also called a network adapter (see Figure 1-10), installed in an expansion slot on the motherboard
BAN (body area network)—Made up of personal fitness devices like a smartwatch, fitness tracker, AR (augmented reality) headset, AI (artificial intelligence) hearing aid, or other wearable devices.
SAN (storage area network)—Consists of high capacity data storage devices in a distinctly defined network segment.
WLAN (wireless local area network)—Consists of two or more devices connected wirelessly.