SlideShare una empresa de Scribd logo
1 de 29
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Managing and Leading a Virtual Team
Introductory concepts @ OxfordCambridge.Org all for free and free for all.
The information gathered here is under KeyPoints format and may be use:
- Either to give the reader an overview before deciding for a full scale study of the topic.
- Or act as a study guide for learners in expanding their knowledge on the given topic.
Some recommendations, perhaps:
- Identify each KeyPoint on which you feel a need to expand your knowledge,
- Choose a good book /ebook or academic journal and Internet info.
- And then work towards gaining that knowledge, at your own pace.
Please enjoy!
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
Computer Networks Foundation – Summary.
☺ A network consists of two or more computers
connected together which share resources such
as data, printers, and an Internet connection.
☺ The term "networking" refers to the sharing of
resources on a network.
☺ Local area networks (LANs) are one of the most
widely used types of networks.
☺ The Open System Interconnection (OSI) model
was developed in 1984 by the International
Organization for Standardization (ISO) to
resolve the problem of incompatible networks.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Computer Networks Foundation - Aim of publication.
To introduce the reader or the learner to basic
networking concepts, topologies, the OSI model,
and the media used to physically connect a
network.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
Computer Networks Foundation - Learning Objectives.
☺ After developing the KeyPoints outlined in this publication, you should mainly be able to:
 identify the primary components of a network and distinguish between the two main network
architectures.
 distinguish between the main types of networks
 distinguish between the OSI reference model and the TCP/IP stack.
 distinguish between common network categorizations and identify the characteristics of data
encapsulation.
 identify the major components of a network PC and list the resources required to install a
NIC.
 identify the functions, features, and operation of network devices used at different layers of
the OSI model.
 distinguish between different network topologies
 match network devices to their functions and distinguish between different network
topologies.
 differentiate between types of network media.
 recognize the types of cable connectors used in modern networks.
 determine the most appropriate network tool to use in a given scenario.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
*** About the Structure and Flow of our Presentations ***
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Computer Networks Foundation - Sections List.
 (Section 1) Networking basics.
 (Section 2) Networking devices and topologies.
 (Section 3) Physical media.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
(Section 1) Networking basics – HighPoints.
 Networking overview.
 Types of networks
 The OSI model
 Understanding basic networking concepts.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 1) HighPoints: Networking overview.
☺ A network is made up of two or more computers linked
together.
☺ Networking is the term used to refer to the sharing of
resources on the network.
☺ Networks can vary in size from local area networks
(LANs), which are contained in a building, to wide area
networks (WANs), such as the Internet.
☺ The three primary components of a network are a server,
a workstation, and a host.
☺ Two of the most common network types are client/server
and peer-to-peer.
☺ Peer-to-peer networks have no centralized authority
while client/server networks are managed from a
centralized point.
☺ Client/server networks have several advantages over
peer-to-peer networks such as ease of management and
better security.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 1) HighPoints: Types of networks.
☺ A local area network (LAN) is used to connect workstations, servers,
and peripheral devices, such as printers, together.
☺ It is confined to a small area, usually within a building.
☺ A wide area network (WAN) covers a large geographic area.
☺ WANs can be public or private. WANs have slower connection speeds
than LANs.
☺ WANs use routers, WAN switches, and modems.
☺ The Internet is an example of a global WAN.
☺ A metropolitan area network (MAN) extends across a city or a large
suburban area.
☺ A MAN develops when two or more LANs are connected together.
☺ An intranet is a private network contained inside a company.
☺ It can contain many LANs linked together.
☺ It allows employees to share information and access company
resources.
☺ An extranet is part of a company's intranet that can be accessed by
anyone outside the company.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 1) HighPoints: The OSI model.
☺ The Open System Interconnection (OSI) reference model was
developed by the International Organization for
Standardization (ISO) to correct the problem of incompatible
network communications.
☺ It is a reference model that describes how information is
exchanged between points on a network.
☺ The OSI model is divided into seven layers - these are the
application, presentation, session, transport, network, data-
link, and physical layers.
☺ Some of the advantages of layering network functions include
accelerating evolution, reducing complexity, and standardizing
network component interfaces.
☺ Encapsulation refers to the process of packaging information
before it is transmitted.
☺ Thus, encapsulation occurs in descending order from the
application layer through to the physical layer.
☺ Headers and trailers are placed around the data as it passes
through each layer.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 1) HighPoints: The OSI model (continues).
☺ Data packets always travel from source to destination
on a network.
☺ They can only travel on a network if each layer of the
OSI model at the source communicates with its peer
layer at the destination.
☺ This form of communication is known as peer-to-peer
communication.
☺ Another open standard traditionally applied to the
Internet is the Transmission Control Protocol/Internet
Protocol (TCP/IP) stack.
☺ Like the OSI model, it uses layering and is comprised
of the application, transport, Internet, and network
access layers.
☺ The TCP/IP and OSI models are similar in a number of
ways.
☺ Both models have application, network, and transport
layers, and they both deal with packet-switched
technology.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 1) HighPoints: Understanding basic networking concepts.
☺ There are different categorizations of networks used to identify their
size, structure, and purpose.
☺ A WAN is a network that covers a large geographic area and can be used
to link together the worldwide locations of a corporation.
☺ A MAN covers a large city or suburban area and consists of several
LANs connected together.
☺ A LAN is a high-speed, low error data network that is confined to a small
area, usually within a building.
☺ Data encapsulation occurs when data is systematically and consistently
packaged before it is sent over the network.
☺ In the encapsulation process, the application layer contains the L7
header, the presentation layer contains the L6 L7 headers, and the
session layer contains the L5 L6 L7 headers.
☺ A data packet contains the L4 L5 L6 L7 header at the transport layer,
the L3 L4 L5 L6 L7 header at the network layer, and the L2 L3 L4 L5 L6
L7 header at the data-link layer.
☺ Bits are associated with the physical layer, frames with the data-link
layer, packets with the network layer, and segments with the transport
layer.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 2) Networking devices and topologies – HighPoints.
☺ Components of a network PC.
☺ Network devices.
☺ Network topologies.
☺ Identifying network devices and topologies.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 2) HighPoints: Components of a network PC.
☺ To enable network connectivity, a computer
uses components such as the central
processing unit (CPU), bus, drives, cards,
ports, and memory.
☺ A computer is composed of drives, the CPU,
expansion slots, a bus, a motherboard, and a
backplane.
☺ A network interface card (NIC) is a device
that enables a computer to communicate with
a network.
☺ Selecting a NIC depends on the type of
network, cable, and expansion slot on your
computer.
☺ If installing a NIC, you should be able to
configure it, perform its diagnostics, and
resolve hardware conflicts.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 2) HighPoints: Network devices.
☺ Hubs, switches, and routers are all networking devices used to connect
networks.
☺ Networking devices operate chiefly at the lower three layers of the Open
System Interconnection (OSI) model. Layer 1 devices, such as repeaters and
hubs, are used to propagate network signals at bit level.
☺ Network Interface Cards (NICs), bridges, and switches are OSI layer 2
devices used to transmit data.
☺ Every NIC has a unique Media Access Control (MAC) address that is used to
identify its host to switches and bridges.
☺ These devices forward traffic based on the host's MAC address.
☺ Routers use layer 3 addresses to transmit packets between networks.
☺ Multilayer switches use layer 3 network addresses (IP) and layer 2 MAC
addresses to manage packet traffic.
☺ Hardware-based layer 3 routing functions provide faster operation than
software versions.
☺ Gateways are used to connect disparate network environments.
☺ Firewalls and AAA (authentication, authorization, and accounting) servers
protect networks from unauthorized attacks and unauthorized access.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 2) HighPoints: Network topologies.
☺ A network topology describes how the network is laid
out, and how data is transmitted on it.
☺ The physical topology defines the physical
arrangement of the devices and cables on a network.
☺ The logical topology defines the paths used by
information to flow through a network.
☺ A network can have the same logical and physical
topologies, but this is not always the case.
☺ Typical network topology types commonly used include
the bus, star, extended star, ring, full mesh, and
partial mesh topologies.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 2) HighPoints: Identifying network devices and topologies.
☺ Commonly used network devices include repeaters, hubs,
NICs, switches, and routers.
☺ Hubs are used as network concentration points, and a
repeater regenerates signals so that they can cover
greater distances along a cable.
☺ A bridge creates two or more LAN segments, with each
segment being a separate collision domain.
☺ A router is an internetworking device that matches
information in the routing table with the destination IP
address of the data and forwards data packets between
networks.
☺ Networks can have different topologies.
☺ A network topology describes how the network is laid
out, and how data is transmitted on it.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) Physical media – HighPoints
☺ Network cabling and wireless media.
☺ Network cable connectors.
☺ Network installation tools.
☺ Connecting the network.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) HighPoints: Network cabling and wireless media.
☺ Twisted pair cable is a common cable type - it is available as
shielded twisted pair (STP) or unshielded twisted pair (UTP).
☺ STP cable combines the techniques of twisting wires and
shielding. UTP cable is a copper wire-based cable used in a
variety of networks.
☺ Coaxial cable operates over relatively large distances, and
transmits data at speeds of up to 100 Mbps.
☺ Installing coaxial cable is more expensive than installing
twisted pair cable.
☺ Fiber optic cable transmits bits in the form of modulated light
data.
☺ Light is refracted along the cable and can go around bends.
☺ Fiber optic cables are available as single-mode or multimode
cable.
☺ Wireless signals are radio frequencies and infrared waves that
can travel through air.
☺ They have been a growth area in network communications.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) HighPoints: Network cable connectors.
☺ Cable connectors differ in modern networks depending on the cable type.
☺ Unshielded twisted pair (UTP) cable normally uses a Registered Jack (RJ)
connector, which is attached using a crimper.
☺ This can be an RJ-11 or an RJ-45. By contrast, coaxial cable often uses
Attachment Unit Interface (AUI)/DB-15, Bayonet Neill-Concelman connector
(BNC) or F-Type connectors.
☺ There are a number of fiber optic cable connectors available also--the one you
choose depends on what you are using it for.
☺ The most common types are Subscriber Connector (SC), Straight Tip (ST),
Local Connector (LC), and MT-RJ.
☺ Digital devices can be connected using the Institute of Electrical and
Electronics Engineers (IEEE) 1394 standard--it supports data transfer rates
of up to 400Mbps (using IEEE 1394a), or 800Mbps (using IEEE 1394b).
☺ The products that support the standard are known by various names, but two
of the most popular products are FireWire (which is made by Apple), and i.link.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) HighPoints: Network installation tools.
☺ A patch panel is a centralized wiring point for multiple
devices on an unshielded twisted pair (UTP) network.
☺ You use a patch panel to connect the cables going to the
network hub with the cables going to the workstations.
☺ You connect components to a patch panel using patch
cables and the total segment length of the network
includes the patch cables at both ends and the drop cable
between.
☺ Wire crimpers and punchdown tools can be used to connect
network cables to connectors and patch panels.
☺ There are a number of different network testing tools and
the type you choose depends on the type of cabling in your
network, cost, and what you are testing it for.
☺ The most popular types of testing tools are the wire map
tester, continuity tester, tone generator, optical loss test
set (OLTS), and the multifunction cable tester.
☺ There are also fiber optic patch panels to take into
consideration.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) HighPoints: Connecting the network.
☺ Understanding the types of media that can be used within a
network provides you with a better understanding of how networks
function, and allows you to select the most suitable means of
connecting your network devices.
☺ Coaxial cable is able to cover 450 meters or more and is resistant
to electromagnetic interference and supports 10 to 100 Mbps.
☺ Thicknet coaxial cable can be used to connect the head office to
the branch office situated less than half a kilometer away.
☺ Thinnet coaxial cable is especially useful for installations that
require the cable to make many twists and turns.
☺ UTP is the cheapest media type – it is easy to install, and can cover
a distance up to 100 meters.
☺ UTP has the ability to reduce interference and is compatible with
most of the major networking architectures.
☺ STP (shielded twisted pair) is more resistant to EMI
(electromagnetic interference) than UTP.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
(Section 3) HighPoints: Connecting the network (continues).
☺ Wireless media allow you to exchange data with devices
where no physical medium exists.
☺ For that matter, wireless communication can use RFs (radio
frequencies) to transmit data between devices on a LAN.
☺ A wireless hub is used for signal distribution as the access
point where PCs and laptops connect to the network.
☺ RJ-45 connectors are used to connect the workstations on
each floor to the workgroup switch for that floor.
☺ Fiber optic cable has data exchange rates of up to 100 Gbps
and can cover distances well over 100 meters.
☺ Multimode fiber optic can support cables for up to two
kilometers only, whereas the maximum cable length of
single-mode cable is 60 kilometers.
☺ ST, LC, and MT-RJ are fibre optic cable connectors that
can be used to connect an organization workgroup network
switches between floors.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
Computer Networks Foundation – Conclusion.
☺ At this point you should be familiar with the following:
 identifying the primary components of a network and
distinguish between the two main network
architectures.
 distinguishing between the main types of networks.
 characteristics of data encapsulation.
 functions of common network devices.
 characteristics of physical topologies.
 potential future developments in wireless services.
 identifying the characteristics and benefits of the
principal and enabling technologies of 4G.
 choosing a specific network media type for a given
scenario.
 specifications of the different media that are
available..
 different cable connector types available.
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
We shall always be on SlideShare!

Más contenido relacionado

La actualidad más candente

5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
Khan Rahimeen
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
Christian Reina
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
Steven Cahill
 

La actualidad más candente (15)

5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
5 intro to networking
5 intro to networking5 intro to networking
5 intro to networking
 
Computer networking and E-commerce
Computer networking and E-commerce Computer networking and E-commerce
Computer networking and E-commerce
 
OSI Model
OSI ModelOSI Model
OSI Model
 
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICESCOMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
COMUNICATION NETWORK NETWORK TOPOLOGY NETWORK CABLES NETWORK DEVICES
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Networking & tele communication
Networking & tele communicationNetworking & tele communication
Networking & tele communication
 
Type of Computer Network Cable .
Type of Computer Network  Cable .Type of Computer Network  Cable .
Type of Computer Network Cable .
 
Linked Data Selectors
Linked Data SelectorsLinked Data Selectors
Linked Data Selectors
 
Types of communication networks
Types of communication networksTypes of communication networks
Types of communication networks
 
Cloud Computing in Laymen terms
Cloud Computing in Laymen termsCloud Computing in Laymen terms
Cloud Computing in Laymen terms
 
Computer Network Introduction full
Computer Network Introduction fullComputer Network Introduction full
Computer Network Introduction full
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Business Data Communications and Networks
Business Data Communications and NetworksBusiness Data Communications and Networks
Business Data Communications and Networks
 
Introduction To Network Design
Introduction To Network DesignIntroduction To Network Design
Introduction To Network Design
 

Destacado

Introduction to ict project management
Introduction to ict project managementIntroduction to ict project management
Introduction to ict project management
manproy
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture Notes
Jasour Obeidat
 

Destacado (13)

ICT Project Management
ICT Project ManagementICT Project Management
ICT Project Management
 
IT Project Management - Study Notes
IT Project Management - Study NotesIT Project Management - Study Notes
IT Project Management - Study Notes
 
Introduction to ict project management
Introduction to ict project managementIntroduction to ict project management
Introduction to ict project management
 
Advance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In DatabaseAdvance Database Management Systems -Object Oriented Principles In Database
Advance Database Management Systems -Object Oriented Principles In Database
 
Adbms
AdbmsAdbms
Adbms
 
DMP Data Management Platform
DMP Data Management PlatformDMP Data Management Platform
DMP Data Management Platform
 
Adbms lab manual
Adbms lab manualAdbms lab manual
Adbms lab manual
 
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMSM.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
M.TECH 1ST SEM COMPUTER SCIENCE ADBMS LAB PROGRAMS
 
Developing and implementing ict project plans
Developing and implementing ict project plansDeveloping and implementing ict project plans
Developing and implementing ict project plans
 
Advanced DBMS presentation
Advanced DBMS presentationAdvanced DBMS presentation
Advanced DBMS presentation
 
Advanced Database Lecture Notes
Advanced Database Lecture NotesAdvanced Database Lecture Notes
Advanced Database Lecture Notes
 
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtapADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
ADVANCE DATABASE MANAGEMENT SYSTEM CONCEPTS & ARCHITECTURE by vikas jagtap
 
Ict ppt
Ict pptIct ppt
Ict ppt
 

Similar a Computer Networks Foundation

How our network_works
How our network_worksHow our network_works
How our network_works
Robin Nappi
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
Lakeisha Jones
 
1- Professional Development Plan for Plant Pathology Meeting (500-.docx
1- Professional Development Plan for Plant Pathology Meeting (500-.docx1- Professional Development Plan for Plant Pathology Meeting (500-.docx
1- Professional Development Plan for Plant Pathology Meeting (500-.docx
monicafrancis71118
 

Similar a Computer Networks Foundation (20)

Computer Networks Foundation 2022
Computer Networks Foundation 2022Computer Networks Foundation 2022
Computer Networks Foundation 2022
 
Routers and Routing Basic Module 1
Routers and Routing Basic Module 1Routers and Routing Basic Module 1
Routers and Routing Basic Module 1
 
What is network architecture
What is network architecture What is network architecture
What is network architecture
 
What is network architecture (full)
What is network architecture (full)What is network architecture (full)
What is network architecture (full)
 
UNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdfUNIT 4 computer networking powerpoint presentation .pdf
UNIT 4 computer networking powerpoint presentation .pdf
 
How our network_works
How our network_worksHow our network_works
How our network_works
 
PACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference ModelPACE-IT: The OSI Networking Reference Model
PACE-IT: The OSI Networking Reference Model
 
Networking Fundamental Course by Haris Chughtai
Networking Fundamental Course by Haris ChughtaiNetworking Fundamental Course by Haris Chughtai
Networking Fundamental Course by Haris Chughtai
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
network.pptx
network.pptxnetwork.pptx
network.pptx
 
Computer Network & Layered Protocols
Computer Network & Layered ProtocolsComputer Network & Layered Protocols
Computer Network & Layered Protocols
 
computer network
computer networkcomputer network
computer network
 
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa EdirisingheDISTRIBUTED NETWORKING - By Hansa Edirisinghe
DISTRIBUTED NETWORKING - By Hansa Edirisinghe
 
Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1Essay On NT1210- Unit 3 Assignment 1
Essay On NT1210- Unit 3 Assignment 1
 
For demo.pptx
For demo.pptxFor demo.pptx
For demo.pptx
 
Computer 3
Computer 3Computer 3
Computer 3
 
Computer networks
Computer networksComputer networks
Computer networks
 
1- Professional Development Plan for Plant Pathology Meeting (500-.docx
1- Professional Development Plan for Plant Pathology Meeting (500-.docx1- Professional Development Plan for Plant Pathology Meeting (500-.docx
1- Professional Development Plan for Plant Pathology Meeting (500-.docx
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
Chapter 1.2 osi model
Chapter 1.2 osi modelChapter 1.2 osi model
Chapter 1.2 osi model
 

Más de Marius FAILLOT DEVARRE

Más de Marius FAILLOT DEVARRE (20)

Aligning IT and Business Strategies - Study Notes
Aligning IT and Business Strategies - Study NotesAligning IT and Business Strategies - Study Notes
Aligning IT and Business Strategies - Study Notes
 
Agile Project Management Principles and Methodologies - Study Notes
Agile Project Management Principles and Methodologies - Study NotesAgile Project Management Principles and Methodologies - Study Notes
Agile Project Management Principles and Methodologies - Study Notes
 
Defining Cryptography (Cryptography fundamentals 1/2)
Defining Cryptography (Cryptography fundamentals 1/2)Defining Cryptography (Cryptography fundamentals 1/2)
Defining Cryptography (Cryptography fundamentals 1/2)
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Information Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & MetricsInformation Security Governance: Concepts, Security Management & Metrics
Information Security Governance: Concepts, Security Management & Metrics
 
Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)Virtualization - An Introduction (Study Notes)
Virtualization - An Introduction (Study Notes)
 
Standard Business Etiquette - Study Notes
Standard Business Etiquette - Study NotesStandard Business Etiquette - Study Notes
Standard Business Etiquette - Study Notes
 
Computer Networks Foundation - Study Notes
Computer Networks Foundation - Study NotesComputer Networks Foundation - Study Notes
Computer Networks Foundation - Study Notes
 
SIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study NotesSIP (Session Initiation Protocol) - Study Notes
SIP (Session Initiation Protocol) - Study Notes
 
Building a Simple Network - Study Notes
Building a Simple Network - Study NotesBuilding a Simple Network - Study Notes
Building a Simple Network - Study Notes
 
IP Mobility Concepts - Study Notes
IP Mobility Concepts - Study NotesIP Mobility Concepts - Study Notes
IP Mobility Concepts - Study Notes
 
Win Over Stress in Work & Life - Study Notes
Win Over Stress in Work & Life - Study NotesWin Over Stress in Work & Life - Study Notes
Win Over Stress in Work & Life - Study Notes
 
Win Over Stress: in Work & Life
Win Over Stress: in Work & LifeWin Over Stress: in Work & Life
Win Over Stress: in Work & Life
 
Reaching a Balanced Life
Reaching a Balanced LifeReaching a Balanced Life
Reaching a Balanced Life
 
Project Management Fundamentals
Project Management FundamentalsProject Management Fundamentals
Project Management Fundamentals
 
Overcoming Negativity in Workplace-Study Notes
Overcoming Negativity in Workplace-Study NotesOvercoming Negativity in Workplace-Study Notes
Overcoming Negativity in Workplace-Study Notes
 
Overcoming Negativity in Workplace
Overcoming Negativity in WorkplaceOvercoming Negativity in Workplace
Overcoming Negativity in Workplace
 
Business Analysis Essentials
Business Analysis EssentialsBusiness Analysis Essentials
Business Analysis Essentials
 
Basic Business Math - Study Notes
Basic Business Math - Study NotesBasic Business Math - Study Notes
Basic Business Math - Study Notes
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Computer Networks Foundation

  • 1. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
  • 2. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
  • 3. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge) Managing and Leading a Virtual Team Introductory concepts @ OxfordCambridge.Org all for free and free for all. The information gathered here is under KeyPoints format and may be use: - Either to give the reader an overview before deciding for a full scale study of the topic. - Or act as a study guide for learners in expanding their knowledge on the given topic. Some recommendations, perhaps: - Identify each KeyPoint on which you feel a need to expand your knowledge, - Choose a good book /ebook or academic journal and Internet info. - And then work towards gaining that knowledge, at your own pace. Please enjoy!
  • 4. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) Computer Networks Foundation – Summary. ☺ A network consists of two or more computers connected together which share resources such as data, printers, and an Internet connection. ☺ The term "networking" refers to the sharing of resources on a network. ☺ Local area networks (LANs) are one of the most widely used types of networks. ☺ The Open System Interconnection (OSI) model was developed in 1984 by the International Organization for Standardization (ISO) to resolve the problem of incompatible networks.
  • 5. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge) Computer Networks Foundation - Aim of publication. To introduce the reader or the learner to basic networking concepts, topologies, the OSI model, and the media used to physically connect a network.
  • 6. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) Computer Networks Foundation - Learning Objectives. ☺ After developing the KeyPoints outlined in this publication, you should mainly be able to:  identify the primary components of a network and distinguish between the two main network architectures.  distinguish between the main types of networks  distinguish between the OSI reference model and the TCP/IP stack.  distinguish between common network categorizations and identify the characteristics of data encapsulation.  identify the major components of a network PC and list the resources required to install a NIC.  identify the functions, features, and operation of network devices used at different layers of the OSI model.  distinguish between different network topologies  match network devices to their functions and distinguish between different network topologies.  differentiate between types of network media.  recognize the types of cable connectors used in modern networks.  determine the most appropriate network tool to use in a given scenario.
  • 7. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) *** About the Structure and Flow of our Presentations ***
  • 8. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge) Computer Networks Foundation - Sections List.  (Section 1) Networking basics.  (Section 2) Networking devices and topologies.  (Section 3) Physical media.
  • 9. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge) (Section 1) Networking basics – HighPoints.  Networking overview.  Types of networks  The OSI model  Understanding basic networking concepts.
  • 10. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 1) HighPoints: Networking overview. ☺ A network is made up of two or more computers linked together. ☺ Networking is the term used to refer to the sharing of resources on the network. ☺ Networks can vary in size from local area networks (LANs), which are contained in a building, to wide area networks (WANs), such as the Internet. ☺ The three primary components of a network are a server, a workstation, and a host. ☺ Two of the most common network types are client/server and peer-to-peer. ☺ Peer-to-peer networks have no centralized authority while client/server networks are managed from a centralized point. ☺ Client/server networks have several advantages over peer-to-peer networks such as ease of management and better security.
  • 11. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 1) HighPoints: Types of networks. ☺ A local area network (LAN) is used to connect workstations, servers, and peripheral devices, such as printers, together. ☺ It is confined to a small area, usually within a building. ☺ A wide area network (WAN) covers a large geographic area. ☺ WANs can be public or private. WANs have slower connection speeds than LANs. ☺ WANs use routers, WAN switches, and modems. ☺ The Internet is an example of a global WAN. ☺ A metropolitan area network (MAN) extends across a city or a large suburban area. ☺ A MAN develops when two or more LANs are connected together. ☺ An intranet is a private network contained inside a company. ☺ It can contain many LANs linked together. ☺ It allows employees to share information and access company resources. ☺ An extranet is part of a company's intranet that can be accessed by anyone outside the company.
  • 12. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 1) HighPoints: The OSI model. ☺ The Open System Interconnection (OSI) reference model was developed by the International Organization for Standardization (ISO) to correct the problem of incompatible network communications. ☺ It is a reference model that describes how information is exchanged between points on a network. ☺ The OSI model is divided into seven layers - these are the application, presentation, session, transport, network, data- link, and physical layers. ☺ Some of the advantages of layering network functions include accelerating evolution, reducing complexity, and standardizing network component interfaces. ☺ Encapsulation refers to the process of packaging information before it is transmitted. ☺ Thus, encapsulation occurs in descending order from the application layer through to the physical layer. ☺ Headers and trailers are placed around the data as it passes through each layer.
  • 13. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 1) HighPoints: The OSI model (continues). ☺ Data packets always travel from source to destination on a network. ☺ They can only travel on a network if each layer of the OSI model at the source communicates with its peer layer at the destination. ☺ This form of communication is known as peer-to-peer communication. ☺ Another open standard traditionally applied to the Internet is the Transmission Control Protocol/Internet Protocol (TCP/IP) stack. ☺ Like the OSI model, it uses layering and is comprised of the application, transport, Internet, and network access layers. ☺ The TCP/IP and OSI models are similar in a number of ways. ☺ Both models have application, network, and transport layers, and they both deal with packet-switched technology.
  • 14. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 1) HighPoints: Understanding basic networking concepts. ☺ There are different categorizations of networks used to identify their size, structure, and purpose. ☺ A WAN is a network that covers a large geographic area and can be used to link together the worldwide locations of a corporation. ☺ A MAN covers a large city or suburban area and consists of several LANs connected together. ☺ A LAN is a high-speed, low error data network that is confined to a small area, usually within a building. ☺ Data encapsulation occurs when data is systematically and consistently packaged before it is sent over the network. ☺ In the encapsulation process, the application layer contains the L7 header, the presentation layer contains the L6 L7 headers, and the session layer contains the L5 L6 L7 headers. ☺ A data packet contains the L4 L5 L6 L7 header at the transport layer, the L3 L4 L5 L6 L7 header at the network layer, and the L2 L3 L4 L5 L6 L7 header at the data-link layer. ☺ Bits are associated with the physical layer, frames with the data-link layer, packets with the network layer, and segments with the transport layer.
  • 15. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 2) Networking devices and topologies – HighPoints. ☺ Components of a network PC. ☺ Network devices. ☺ Network topologies. ☺ Identifying network devices and topologies.
  • 16. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 2) HighPoints: Components of a network PC. ☺ To enable network connectivity, a computer uses components such as the central processing unit (CPU), bus, drives, cards, ports, and memory. ☺ A computer is composed of drives, the CPU, expansion slots, a bus, a motherboard, and a backplane. ☺ A network interface card (NIC) is a device that enables a computer to communicate with a network. ☺ Selecting a NIC depends on the type of network, cable, and expansion slot on your computer. ☺ If installing a NIC, you should be able to configure it, perform its diagnostics, and resolve hardware conflicts.
  • 17. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 2) HighPoints: Network devices. ☺ Hubs, switches, and routers are all networking devices used to connect networks. ☺ Networking devices operate chiefly at the lower three layers of the Open System Interconnection (OSI) model. Layer 1 devices, such as repeaters and hubs, are used to propagate network signals at bit level. ☺ Network Interface Cards (NICs), bridges, and switches are OSI layer 2 devices used to transmit data. ☺ Every NIC has a unique Media Access Control (MAC) address that is used to identify its host to switches and bridges. ☺ These devices forward traffic based on the host's MAC address. ☺ Routers use layer 3 addresses to transmit packets between networks. ☺ Multilayer switches use layer 3 network addresses (IP) and layer 2 MAC addresses to manage packet traffic. ☺ Hardware-based layer 3 routing functions provide faster operation than software versions. ☺ Gateways are used to connect disparate network environments. ☺ Firewalls and AAA (authentication, authorization, and accounting) servers protect networks from unauthorized attacks and unauthorized access.
  • 18. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 2) HighPoints: Network topologies. ☺ A network topology describes how the network is laid out, and how data is transmitted on it. ☺ The physical topology defines the physical arrangement of the devices and cables on a network. ☺ The logical topology defines the paths used by information to flow through a network. ☺ A network can have the same logical and physical topologies, but this is not always the case. ☺ Typical network topology types commonly used include the bus, star, extended star, ring, full mesh, and partial mesh topologies.
  • 19. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 2) HighPoints: Identifying network devices and topologies. ☺ Commonly used network devices include repeaters, hubs, NICs, switches, and routers. ☺ Hubs are used as network concentration points, and a repeater regenerates signals so that they can cover greater distances along a cable. ☺ A bridge creates two or more LAN segments, with each segment being a separate collision domain. ☺ A router is an internetworking device that matches information in the routing table with the destination IP address of the data and forwards data packets between networks. ☺ Networks can have different topologies. ☺ A network topology describes how the network is laid out, and how data is transmitted on it.
  • 20. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) Physical media – HighPoints ☺ Network cabling and wireless media. ☺ Network cable connectors. ☺ Network installation tools. ☺ Connecting the network.
  • 21. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) HighPoints: Network cabling and wireless media. ☺ Twisted pair cable is a common cable type - it is available as shielded twisted pair (STP) or unshielded twisted pair (UTP). ☺ STP cable combines the techniques of twisting wires and shielding. UTP cable is a copper wire-based cable used in a variety of networks. ☺ Coaxial cable operates over relatively large distances, and transmits data at speeds of up to 100 Mbps. ☺ Installing coaxial cable is more expensive than installing twisted pair cable. ☺ Fiber optic cable transmits bits in the form of modulated light data. ☺ Light is refracted along the cable and can go around bends. ☺ Fiber optic cables are available as single-mode or multimode cable. ☺ Wireless signals are radio frequencies and infrared waves that can travel through air. ☺ They have been a growth area in network communications.
  • 22. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) HighPoints: Network cable connectors. ☺ Cable connectors differ in modern networks depending on the cable type. ☺ Unshielded twisted pair (UTP) cable normally uses a Registered Jack (RJ) connector, which is attached using a crimper. ☺ This can be an RJ-11 or an RJ-45. By contrast, coaxial cable often uses Attachment Unit Interface (AUI)/DB-15, Bayonet Neill-Concelman connector (BNC) or F-Type connectors. ☺ There are a number of fiber optic cable connectors available also--the one you choose depends on what you are using it for. ☺ The most common types are Subscriber Connector (SC), Straight Tip (ST), Local Connector (LC), and MT-RJ. ☺ Digital devices can be connected using the Institute of Electrical and Electronics Engineers (IEEE) 1394 standard--it supports data transfer rates of up to 400Mbps (using IEEE 1394a), or 800Mbps (using IEEE 1394b). ☺ The products that support the standard are known by various names, but two of the most popular products are FireWire (which is made by Apple), and i.link.
  • 23. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) HighPoints: Network installation tools. ☺ A patch panel is a centralized wiring point for multiple devices on an unshielded twisted pair (UTP) network. ☺ You use a patch panel to connect the cables going to the network hub with the cables going to the workstations. ☺ You connect components to a patch panel using patch cables and the total segment length of the network includes the patch cables at both ends and the drop cable between. ☺ Wire crimpers and punchdown tools can be used to connect network cables to connectors and patch panels. ☺ There are a number of different network testing tools and the type you choose depends on the type of cabling in your network, cost, and what you are testing it for. ☺ The most popular types of testing tools are the wire map tester, continuity tester, tone generator, optical loss test set (OLTS), and the multifunction cable tester. ☺ There are also fiber optic patch panels to take into consideration.
  • 24. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) HighPoints: Connecting the network. ☺ Understanding the types of media that can be used within a network provides you with a better understanding of how networks function, and allows you to select the most suitable means of connecting your network devices. ☺ Coaxial cable is able to cover 450 meters or more and is resistant to electromagnetic interference and supports 10 to 100 Mbps. ☺ Thicknet coaxial cable can be used to connect the head office to the branch office situated less than half a kilometer away. ☺ Thinnet coaxial cable is especially useful for installations that require the cable to make many twists and turns. ☺ UTP is the cheapest media type – it is easy to install, and can cover a distance up to 100 meters. ☺ UTP has the ability to reduce interference and is compatible with most of the major networking architectures. ☺ STP (shielded twisted pair) is more resistant to EMI (electromagnetic interference) than UTP.
  • 25. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) (Section 3) HighPoints: Connecting the network (continues). ☺ Wireless media allow you to exchange data with devices where no physical medium exists. ☺ For that matter, wireless communication can use RFs (radio frequencies) to transmit data between devices on a LAN. ☺ A wireless hub is used for signal distribution as the access point where PCs and laptops connect to the network. ☺ RJ-45 connectors are used to connect the workstations on each floor to the workgroup switch for that floor. ☺ Fiber optic cable has data exchange rates of up to 100 Gbps and can cover distances well over 100 meters. ☺ Multimode fiber optic can support cables for up to two kilometers only, whereas the maximum cable length of single-mode cable is 60 kilometers. ☺ ST, LC, and MT-RJ are fibre optic cable connectors that can be used to connect an organization workgroup network switches between floors.
  • 26. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford) Computer Networks Foundation – Conclusion. ☺ At this point you should be familiar with the following:  identifying the primary components of a network and distinguish between the two main network architectures.  distinguishing between the main types of networks.  characteristics of data encapsulation.  functions of common network devices.  characteristics of physical topologies.  potential future developments in wireless services.  identifying the characteristics and benefits of the principal and enabling technologies of 4G.  choosing a specific network media type for a given scenario.  specifications of the different media that are available..  different cable connector types available.
  • 27. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Harcourt Hill, West Oxford)
  • 28. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge)
  • 29. Contact Email Design Copyright 1994-2014 © OxfordCambridge.OrgCurricula/Curriculum (This picture: Trinity College, Cambridge) We shall always be on SlideShare!