0% found this document useful (0 votes)
23 views10 pages

CHP 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views10 pages

CHP 1

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Chapter 1

Lecture Topics: Computer Network and Its Types

Computer Network
A Computer Network is a group of two or more interconnected computer systems that use common
connection protocols for sharing various resources and files. You can establish a computer network
connection using either cable or wireless media. Every network involveshardware and software that
connects computers and tools.

Different Types of Computer Networks

A computer network can be categorized by its size. A computer network is mainly of four types:
o LAN (Local Area Network)
o PAN (Personal Area Network)
o MAN (Metropolitan Area Network)
o WAN (Wide Area Network)

PAN (Personal Area Network)


PAN (Personal Area Network) is a computer network formed around a person. It generally consists of a
computer, mobile, or personal digital assistant. PAN can be used for establishingcommunication among
these personal devices for connecting to a digital network and the internet.

Characteristics of PAN
Below are the main characteristics of PAN:

• It is mostly personal devices network equipped within a limited area.


• Allows you to handle the interconnection of IT devices at the surrounding of a single user.
• PAN includes mobile devices, tablet, and laptop.
• It can be wirelessly connected to the internet called WPAN.
• Appliances use for PAN: cordless mice, keyboards, and Bluetooth systems.
Figure: Personal Area Network (PAN)
LAN (Local Area Network)
A Local Area Network (LAN) is a group of computer and peripheral devices which are connected in a
limited area such as school, laboratory, home, and office building. It is a widelyuseful network for sharing
resources like files, printers, games, and other application. The simplest type of LAN network is to connect
computers and a printer in someone’s home or office. In general, LAN will be used as one type of
transmission medium. It is a network whichconsists of less than 5000 interconnected devices across
several buildings.

Figure: Local Area Network (LAN)


Characteristics of LAN
Here are the important characteristics of a LAN network:

• It is a private network, so an outside regulatory body never controls it.


• LAN operates at a relatively higher speed compared to other WAN systems.
• There are various kinds of media access control methods like token ring and ethernet.
WAN (Wide Area Network)

WAN (Wide Area Network) is another important computer network that which is spread across alarge
geographical area. WAN network system could be a connection of a LAN which connects with other LAN’s
using telephone lines and radio waves. It is mostly limited to an enterprise or an organization.

Figure: Wide Area Network (WAN)


Characteristics of WAN
Below are the characteristics of WAN:

• The software files will be shared among all the users; therefore, all can access to the latestfiles.
• Any organization can form its global integrated network using WAN.

The End
Chapter 1
Lecture Topics: Networking and Security Fundamentals

1. Copper and Fiber-Optic Cables


1.1 Copper Cables
• Types: Twisted pair and coaxial.
o Twisted Pair Cables:
▪ CAT5e: Up to 100 Mbps, common in homes.
▪ CAT6: Supports 1 Gbps, better for noisy environments.
▪ CAT6a: Up to 10 Gbps, high-performance.
o Coaxial Cables:
▪ Used for TV and broadband.
• Advantages: Lower cost, easy to install.
• Disadvantages: Limited bandwidth, interference-prone.
1.2 Fiber-Optic Cables
• Structure: Core, cladding, and protective layers.
o Single-Mode Fiber: For long distances, narrow core.
o Multi-Mode Fiber: For shorter distances, wide core.
Image: Cross-sectional view comparing single-mode and multi-mode fiber.
• Advantages: Higher speeds, less signal loss.
• Disadvantages: Higher cost, fragile.
2. Wired vs. Wireless Networks
2.1 Wired Networks
• Types: Ethernet, token ring.
o Ethernet: Common in LANs, uses twisted pair or coaxial cables.
• Advantages: Faster, more secure.
• Disadvantages: Less flexible, higher installation cost.

2.2 Wireless Networks


• Types: Wi-Fi, Bluetooth, cellular.
o Wi-Fi: Widely used in homes and offices.
• Advantages: Mobility, easier setup.
• Disadvantages: Possible interference, typically slower speeds.
3. Firewalls
3.1 Purpose
• Definition: Monitors and controls network traffic based on security rules.
o Types: Packet-filtering, stateful inspection, proxy, next-generation.
• Functionality: Blocks or permits traffic based on set rules.

4. Antivirus and Anti-Spyware


4.1 Antivirus Software
• Purpose: Detects and removes malicious software.
o Detection Methods: Signature-based, heuristic, and behavioral.

4.2 Anti-Spyware Software


• Purpose: Targets and removes spyware and adware.
o Functionality: Provides real-time protection and scanning.
5. Security in Different Networks
5.1 LAN Security
• Measures: Use strong passwords, segment networks, and apply security policies.
5.2 WAN Security
• Measures: Encrypt data, secure communication channels.
5.3 Wireless Network Security
• Measures: Employ WPA3 encryption and strong passwords.
5.4 Cloud Security
• Measures: Use encryption, access controls, and regular security checks.

The End
Chapter 1
Lecture Topics: Data Transmission and Operating System

Echo Checks:

Echo checks are a simple method of error detection used in data transmission. In an echo check, the sender
transmits data to the receiver. The receiver then sends the data back to the sender, who compares the echoed data
with the original data.

• Process:

1. Transmission: The sender transmits data to the receiver.


2. Echo: The receiver sends the received data back to the sender.
3. Comparison: The sender compares the original data with the echoed data.
4. Error Detection: If there is a discrepancy between the original data and the echoed data, an error
is detected.

• Advantages & Disadvantages:


o Advantages: Simple to implement, no additional hardware required.
o Disadvantages: Not effective for detecting all types of errors, particularly complex errors.

Flowchart for Error Checking:

1. Start: Begin the error-checking process.


2. Transmit Data: Send data to the receiver.
3. Receive Echo: Receive the echoed data from the receiver.
4. Compare Data: Compare the transmitted data with the received echo.
5. Condition - Data Match?
▪ Yes: No error detected, proceed to the next step.
▪ No: Error detected, retransmit data.
6. End: Finish the process.

Operating Systems (OS):

An operating system is the software that manages computer hardware and software resources and provides
services for computer programs.

Features of OS:

1. Process Management: Managing the execution of processes, including multitasking and process
synchronization.
2. Memory Management: Handling memory allocation for processes, ensuring efficient use of
memory.
3. File System Management: Managing files on storage devices, including file creation, deletion,
and access control.
4. Device Management: Controlling and monitoring peripheral devices, such as printers, disks, and
network interfaces.
5. User Interface: Providing a user interface, such as command-line or graphical user interface
(GUI), for interaction with the system.
Network Operating Systems (NOS)

A Network Operating System (NOS) is software that controls and manages network resources, allowing multiple
computers to communicate, share resources, and work together.

• Features of NOS:
1. User Management: Managing multiple users and their access rights.
2. Security: Implementing security protocols to protect data and resources.
3. Resource Sharing: Enabling the sharing of files, printers, and other resources across the network.

Comparison of Network OS with Standard OS

• Network OS:
o Designed to manage and coordinate multiple computers across a network.
o Focuses on resource sharing, security, and user management in a networked environment.
• Standard OS:
o Designed to manage resources on a single computer.
o Focuses on process management, memory management, and device management on a standalone
system.

Utilities Software in Network Management

Utility software helps manage, maintain, and control computer resources.

Importance of Utilities Software in Network Management

1. Network Monitoring: Tools like network analyzers and monitoring software to track network
performance and detect issues.
2. Backup and Recovery: Software that automates data backup across the network and provides recovery
solutions.
3. Security Utilities: Antivirus, firewall, and encryption tools to protect network data and prevent
unauthorized access.
4. File Management: Utilities for managing files, such as archiving, compression, and secure deletion
across the network.

Augmented Reality (AR) in Education, Gaming, and Robotics

Augmented Reality (AR) overlays digital information on the real-world environment, enhancing the user’s
perception of reality.

Applications of AR:

1. Education:

▪ Interactive Learning: AR can create immersive learning experiences, such as visualizing


complex concepts in 3D.
▪ Virtual Laboratories: Students can conduct virtual experiments, providing hands-on
experience without physical labs.
1. Gaming:
▪ Enhanced Gameplay: AR adds digital elements to the real world, creating more engaging
and interactive games (e.g., Pokémon Go).
▪ Physical Interaction: Encourages physical movement and interaction within the real
world, blending reality with the game.
2. Robotics:
▪ Robot Control: AR can provide real-time data overlays for controlling and monitoring
robots.
▪ Simulation and Training: AR allows for the simulation of robotic tasks in a real-world
setting, aiding in training and development.

The End

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy