ICT Computing Essentials - Lesson 4: Computer Networking 1 ICT Computing Essentials Lesson 4 Cloze Notes Network Two or more computers are ____________ form a network. Network Types Network Type Description Local area network (LAN) A group of connected computers confined within a ____________ geographic area LANs can range in size and scale based on their use Examples include a ____________ network, a school's network or a small office's network Many homes and businesses use wireless local area networks (WLANs) to provide wireless connectivity within a small geographic area Metropolitan area network (MAN) Designated for a network connection within a large city or multiple small cities A MAN is much ____________ than a LAN because it covers a large geographic area MANs are commonly operated by local ____________ or private companies Wide area network (WAN) The largest network type Connects ____________ or more LANs together A WAN is typically owned and maintained by the owner of the LANs that it connects The largest WAN in existence is the Internet Large corporations that span ____________ cities, states or countries. Types of Networks Intranet: designed for a company’s employees to share ____________ information. Cannot be accessed by anyone without company ____________ and a user/password assigned by the company. Extranet: similar to an Intranet, but is usually designed for the company’s ____________ to also access. Virtual Private Network: ____________ networks designed to allow access to a specific group of people. © 2022 Certification Partners, LLC. — All Rights Reserved. Version 2.0 ICT Computing Essentials - Lesson 4: Computer Networking 2 Network Typology How the network is designed to ____________ information. Network Type Description Bus Connects devices through one physical line called a bus cable Information can flow in only one direction Only one computer can send data at a time Requires a device called a terminator at the end of the cable to prevent information from bouncing back if it reaches the end If the bus cable fails, then the entire network will malfunction Star Each computer in the network connects to the same single network device The network device receives information from each computer and transmits it accordingly Capable of high speeds because multiple computers can communicate simultaneously If one computer or cable fails, the rest of the network will still function Most common topology used today Ring (aka Token Ring) Connects all computers in the network through a single line Only one computer can send data at a time A computer must possess the "token" in order to send data on the network The token is passed in a clockwise direction If the main cable fails, then the entire network will malfunction Mesh Each computer has a dedicated connection to every other computer in the network If one cable fails, the rest of the network still functions normally The most secure and reliable topology Also the most expensive topology due to the amount of cable required to run a dedicated line to each computer Client/Server Network Model Clients are all connected to a ____________, or multiple servers Client: end user’s ____________ – processes the information Server: a powerful computer that ____________ information and processes requests from the connected clients file sharing print sharing e-mail © 2022 Certification Partners, LLC. — All Rights Reserved. Version 2.0 ICT Computing Essentials - Lesson 4: Computer Networking 3 Mainframe/Terminal Network Model Mainframe computer runs all programs directly on the ____________ Terminal: an access point to the mainframe that provides a connection for a ____________, mouse and monitor Is ____________ an actual computer and cannot process the information Peer to Peer Model Clients are ____________ to each other to share files or printers There is no ____________ Requirements to Connect to a Network Computer(s) — desktop, notebook, tablet, mobile device Operating ____________ — Windows, Linux, Mac OS, mobile OS ____________ media — wired or wireless connections Network hardware — physical hardware connecting computers across the network Network ____________ — the set of rules defining how the computers on the network will communicate Network Hardware Device Description Network Interface Card (NIC) A NIC is the specialized device that allows your computer to connect physically to the network cable. Modems A device used either internally or externally to connect computers and allows them to transfer data over phone lines. Modem is short for Modulator/Demodulator. Most of the older phone modems are no longer used because Cable and DSL connections are so much faster. Hubs Network Hubs: allow multiple computers to connect over a network. With multiple ports to connect Ethernet cables these are often found in smaller offices or departments within a larger network. USB Hubs: Are used to connect multiple peripherals (speakers, headsets, mouse, keyboard, etc.) to a single USB port of your computer in much the same way as extension cords allow you to plug in multiple electrical devices to a single outlet. Switches Switches are more powerful than a hub and come in various sizes for both home and office use. Unlike a hub, they are capable of controlling some of the network traffic and some people refer to a switch as a "smart hub." Routers Routers are used to connect from a LAN to another network. They are much smarter than switches and can be programmed to only allow authorized machines to connect to one another. Gateways As the name implies, this device acts as a gate between two or more networks. It can be a router, a firewall, or even a server whose function is to enable traffic flow in and out of a network. Access Points Commonly a wireless router, an access point allows wireless devices to connect to a network. © 2022 Certification Partners, LLC. — All Rights Reserved. Version 2.0 ICT Computing Essentials - Lesson 4: Computer Networking 4 Network Protocols: Rules for connecting and transmitting information Protocol Description TCP/IP The standard protocol suite used to connect computer devices to the Internet (Transmission Control Protocol/Internet Protocol) Transmission Control Protocol (TCP) is used to manage the connection between two computers Internet Protocol (IP) is used to identify computers on a network Like a home’s mailing address, each computer must have a unique address to ensure that data reaches the proper destination An example of an IP address is 192.168.1.100 DHCP (Dynamic Host Configuration Protocol) DHCP dynamically assigns network computers a unique IP address, allowing them to communicate with one another Used on TCP/IP networks The alternative to using a DHCP server is to manually access each network device and assign each device a unique IP address, which can be very time-consuming DNS Simplifies accessing computers over the Internet and on private networks (Domain Name System) To access a device over the Internet, you must use its unique IP address DNS associates a word-based name with that unique IP address This enables users to remember the name instead of trying to remember the number-based IP address HTTP Used to transfer data over the World Wide Web (Hypertext Transfer Protocol) When a user visits a Web page, the page’s content must be downloaded to the computer from the Web server HTTP manages the transactions that occur between the Web server and the user's computer FTP Used to transfer files from computer to computer over the Internet (File Transfer Protocol) The most common use for FTP is publishing a Web site to a Web server IMAP An e-mail protocol used for receiving incoming e-mail (Internet Message Access Protocol) IMAP stores messages on the mail server, which allows devices to synchronize email accounts When a user reads or deletes an e-mail message using IMAP, the change is reflected on all devices POP An e-mail protocol used for receiving e-mail (Post Office Protocol) POP downloads all messages to every device When a user reads an e-mail message on one device, that same message will still display as unread on another device because the mail server is not synchronized SMTP An e-mail protocol used for sending outgoing e-mail (Simple Mail Transfer Protocol) © 2022 Certification Partners, LLC. — All Rights Reserved. Version 2.0 ICT Computing Essentials - Lesson 4: Computer Networking 5 Open Systems Interconnection (OSI) Standardize the way that computers ____________ with one another Divides a computer’s communication into ____________ layers OSI/RM Layer Description Application Interacts with the operating system or application to transfer data Presentation Converts data to ensure that it can be read by receiving computer Session Controls communication with the receiving computer Transport Ensures error-free transmission between sending and receiving computer Network Determines how the data will be sent to receiving computer Data Link Determines the appropriate protocol to send data Physical Defines the type of network media that is used to send data © 2022 Certification Partners, LLC. — All Rights Reserved. Version 2.0