2. OVERVIEW
• Network
• Small Network
• Twisted pair copper wires, Coaxial cable, Fiber
Optics, Wireless
• Private branch exchange (PBX).
• Telecommunications
• The Internet
3. Introduction
• The terms networks and networking refer to
the broad subject of managing computer
networks and the information on them.
– “A network is a transmission system that
connects two or more applications running on
different computers”.
4. Small networks
• Like all advances in technology, LANs provide a
business need.
• Specifically they do the following:
– Allow resources to be shared.
– Allow data and information to be shared.
What is LAN (Local Area Network)
5. Small networks
What these fast-moving bits travel through from
computing device to computing device are known
as mediums.
6. Small networks
Currently, there are four main medium options:
• Twisted pair copper wires
• Coaxial cable
• Fiber optics
• Wireless
7. Twisted pair copper wires
Twisted pair is the ordinary copper wire that connects home
and many business computers to the telephone
company. To reduce crosstalk or electromagnetic induction
between pairs of wires, two insulated copper
wires are twisted around each other.
8. Coaxial cable
Coaxial cables are a type
of cable that is used by cable TV
and that is common for data
communications. Taking a a round
cross-section of the cable, one
would find a single center solid
wire symmetrically surrounded by
a braided or foil conductor.
Between the center wire and foil is
a insulating dialectric.
9. Fiber optics
A technology that uses
glass (or plastic)
threads (fibers) to
transmit data. A fiber
optic cable consists of
a bundle of glass
threads, each of which
is capable of
transmitting
messages modulated
onto light waves.
10. Wireless
• Wireless is a term used to describe
telecommunications in which electromagnetic
waves (rather than some form of wire) carry the
signal over part or all of the communication path
11. Small networks
• In the hospitality world one common piece of
networking equipment is also found—the
private branch exchange (PBX).
– The PBX has long been a part of the hotel
industry
12. Large networks
• Telecommunications is simply long-distance
communications.
– This long distance communication involves a
network you already use, the telephone
system
13. The Internet
• Perhaps the most well-known network is the
Internet.
– Internet access, particularly wireless, is
almost totally expected from guests, with
pricing always an issue.
15. The Internet
• Specifically, network protocols are concerned
with four main objectives:
– The type of error-checking to be used
– Data compression method, if any, utilized
– How the sending device will indicate that it
has finished sending a message
– How the receiving device will indicate that it
has received a message
16. The World Wide Web
• The World Wide Web is the most recognizable
communication tool on the Internet.
– The Web and the Internet are terms often
used interchangeably, which is incorrect.
• The Web is part of the Internet.
• The Web likewise uses the TCP/IP protocol.
– A uniform resource locator (URL) uses the
aforementioned DNS server to point to Web
resources and addresses such as
www.psu.edu.
• A URL is a Web address.
17. Large wireless networks
• Because of their mobile nature, wireless
networks are on the rise.
– Wireless transmissions are electromagnetic
signals sent through the air.
• Common wireless transmissions include
satellites, and cellular and personal
communication services (PCS).
18. Other network usage in the
enterprise
• Networks also provide organizations with
standard communication services such as faxes,
voice mail, and electronic data interchange
(EDI).
– EDI technology came before the Web and still
enables companies to electronically conduct
business over networks, resulting in lower
transaction costs and paperwork.
19. Security
• Currently, ISPs and organizations utilize virtual
private networks (VPNs).
– A VPN provides a secure connection to
different sites of an enterprise over the
Internet.
– Specific protocols are used that wrap data
transfer, inhibiting penetration from
unauthorized users.
• With innovations such as this, secure
transmissions are further enabled.