
Module 9_Shelly C
Presentation
•
Other
•
University
•
Practice Problem
•
Easy
DR SITTI SYAMSIAR MUHARRAM
Used 2+ times
FREE Resource
49 Slides • 8 Questions
1
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
1
1
Module 9: Networks and
Network Devices:
Communicating and
Connecting
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discovering
Computers: Digital
Technology, Data,
and Devices, 17e
2
Open Ended
The Internet has changed the way we work and has turned the entire world into a digital village. Discuss the ways the Internet has affected our lives and our ways of working together.
3
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
3
Module Objectives
By the end of the module, you should be able to:
•
Explain how a user interacts with a network
•
Identify types of network structures
•
Describe network standards and protocols
•
Explain how to use hardware to connect to a network
•
Explain how to set up a network
•
Identify network security tools
•
Describe the role of a network professional
4
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
4
How Do You Interact with a Network
(1 of 9)
•A Network is a system of two or more
devices linked by wires, cables, or a
telecommunications system.
•Networks allow computers to share
resources, such as hardware, software,
data, and information.
•A Network requires a combination of
hardware and software to operate.
•Networks act as a communications
system around the globe through the
Internet.
Figure 9-1 Networks can share
resources and data
5
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
5
How Do You Interact with a Network
(2 of 9)
•
The process in which two or more computers or devices transfer
data, instructions, and information is known as digital
communications.
•
All types of computers and mobile devices serve as sending and
receiving devices in a communications system.
•
Communications devices are modems, wireless access points,
routers, and so on.
•
Transmission media can be wired or wireless.
6
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
6
How Do You Interact with a Network
(3 of 9)
Table 9-1 Communication system components.
Device
Purpose
Communications device
Connects the sending device to the transmission
media
Receiving device
Accepts the transmission of data, instructions, or
information
Sending device
Initiates an instruction to transmit data, instructions,
or information
Transmission media or a
communications channel
Means by which the data, instructions, or information
travel
7
Multiple Choice
A __________ device accepts the transmission of data, instructions, or information in a communication system.
communication
receiving
sending
transmission
8
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
7
How Do You Interact with a Network
(4 od 9)
Classification of
Networks
Home
* Exist within a single building
* Easy to install and configure
* Accessed by only a few users
Business
* Accommodate many users
* Access large amounts of data
* Can be spread across many buildings
Structures,
standards, range,
and so on
9
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
8
How Do You Interact with a Network
(5 of 9)
Figure 9-3 Typical home network.
10
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
9
How Do You Interact with a Network
(6 of 9)
Home Networks provide home users with the following capabilities:
•
Multiple users can share a single Internet connection.
•
Files on each computer, such as photos, can be shared.
•
Multiple computers can share a single hardware resource, such as a printer.
•
Game consoles can connect to the Internet to facilitate online gaming.
Business Networks provide the following advantages to businesses:
•
Facilitate communication among employees
•
Share hardware, such as printers and scanners
•
Share data, information, and software with one another
•
Centrally store and backup critical information
11
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
10
How Do You Interact with a Network
(7 of 9)
Intranet
•
An intranet (intra
means within) is
an internal
network that
uses Internet
technologies.
Extranet
An extranet (extra
means outside or
beyond) allows
customers or
suppliers to access
part of its intranet.
VPN
A VPN can allow an
individual to access an
organization’s network
by using encryption
and other technologies
to secure the data
transmitted along the
path.
Businesses use intranets, extranets, and VPNs (virtual private networks)
to provide different services to employees.
12
Match
Match the following
An internal network that uses Internet technologies.
Allows customers or suppliers to access part of its intranet.
A network security system that monitors and controls incoming and outgoing network traffic.
Allows an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path.
A type of network that is designed to be used by a limited number of people.
Intranet
Extranet
Firewall
VPN
LAN (Local Area Network)
Intranet
Extranet
Firewall
VPN
LAN (Local Area Network)
13
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
11
How Do You Interact with a Network
(8 of 9)
Wired Networks
•
It sends signals and data through cables traveling through floors and walls to connect to
other network devices.
•
Wired networks tend to be more secure and transmit data faster than wireless
networks.
Wireless Networks
•
It sends signals through airwaves and usually does not require cables.
•
Wireless networks can be less secure but more convenient and easier to set up than
wired networks.
Cellular network or mobile network is a communication network where the link to and
from end nodes is wireless.
•
Various types of cellular networks are 3G, 4G, and 5G.
14
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
12
How Do You Interact with a Network
(9 of 9)
Communications software consists of programs and apps that:
•
Help users establish a connection to another computer, mobile
device, or network
•
Manage the transmission of data, instructions, and information
•
Provide an interface for users to communicate with one another
15
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
13
Network Structures (1 of 7)
•Home and business networks describe the main users of a Network.
•Networks can be classified by:
✔ Their topology (the method by which computers and devices are physically
arranged on a network)
✔ Network architecture (the logical design of all devices on a network)
✔ Geographic reach
•Topology describes the layout of network devices, architecture describes the role
of servers and users, and the geographic span of a network determines how wide
the network reaches.
•Common network topologies include bus network, ring network, star network, and
mesh network.
16
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
14
Network Structures (2 of 7)
Table 9-2 Network topologies.
Type
Description
Layout
Bus network
All devices are attached to a central cable, called a
“bus,” that carries the data. If the bus fails, the
devices on the network will no longer be able to
communicate.
Mesh
network
All devices are interconnected with one another. If
a single device on the network fails, the rest of the
network will continue to function by communicating
via an alternate route. Two types of mesh
topologies are a full mesh topology (each device on
the network is connected to every other device on
the network) and a partial mesh technology (each
device may or may not be connected to all other
devices on the network).
17
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
15
Network Structures (3 of 7)
Table 9-2 Network topologies (continued).
Type
Description
Layout
Ring network
Data travels from one device to the next in a
sequential fashion. If one device on the
network fails, all communication on the
network could cease to function. Ring
networks are no longer common.
Star network
Each device on the network is attached to a
central device, such as a server or switch. If
the central device fails, the other devices will
be unable to communicate. If a connected
device fails, all other devices will still be able
to communicate. Two or more star networks
may be joined together using a bus to form a
tree topology. Tree topologies are often are
used in schools and businesses.
18
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
16
Network Structures (4 of 7)
•On a client/server network, one
or more computers act as a
server, and the other computers
on the network request resources
from the server.
•A client is a computer or mobile
device on the network that relies
on the server for its resources.
•Client/server networks are
controlled by a network
administrator.
Figure 9-5 Sample client/server network.
19
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
17
Network Structures (5 of 7)
•A peer-to-peer (P2P) network is a network architecture that
connects a small number of computers, fewer than 10.
•With this type of network, computers communicate directly with one
another and can share one another’s resources.
•All computers are treated equally, and a network administrator is not
required.
•A type of P2P network where users share files over the Internet.
•The files in an Internet peer-to-peer network transfer directly from
one user’s computer to the other.
•It is illegal to share copyright-protected files or other resources.
20
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
18
Network Structures (6 of 7)
•A local area network (LAN) connects computers and devices in a
limited area.
Figure 9-6 Sample LAN.
21
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
19
Network Structures (7 of 7)
•Network configurations come in a variety of sizes, which can be determined
not only by the number of devices they connect but also by their geographic
reach.
• A wireless LAN (WLAN) is a LAN that uses wireless connections.
• A wide area network (WAN) is a network that connects devices in a large
geographic region.
• A metropolitan area network (MAN) is a type of wide-area network that is
operated by a city or county.
• A personal area network (PAN) connects personal digital devices connected
via Bluetooth like a smartwatch.
• A body area network (BAN) is a form of personal area network that consists
of small, lightweight biosensors implanted in the body.
22
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
20
Network Standards and Protocols (1 of 11)
•
Network standards define guidelines that specify the way computers access a
network, the type(s) of hardware used, data transmission speeds, and the types of
cable and wireless technology used.
•
A protocol is a standard that outlines the characteristics of how devices
communicate on a network, such as data format, coding schemes, error handling,
and the sequence in which data transfers over the network.
•
Network standards and protocols work together to move data through a network.
•
The most common standard for wired networks is Ethernet. It controls how
network interface cards (NICs), routers, and modems share access to cables and
phone lines, as well as how they transmit data.
•
Most businesses use a standard, such as EDI (electronic data interchange), that
defines how business documents travel across transmission media.
23
Multiple Choice
A protocol is a standard that outlines the characteristics of how devices
communicate on a network.
True
False
24
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
21
Network Standards and Protocols (2 of 11)
Name
Type
Sample Usage
Bluetooth
Protocol
Wireless headset
IrDA
Standard
Remote control
LTE
Standard
Mobile phones
NFC
Protocol
Mobile phone
payment
RFID
Protocol
Tollbooth
TCP/IP
Protocol
Internet
Token ring
Standard
LAN
UWB
Standard
Inventory tracking
Wi-Fi
Standard
Hot spots
Table 9-3 Network standards and protocols.
25
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
22
Network Standards and Protocols (3 of 11)
•A protocol may define data format, coding schemes, error handling, and the
sequence in which data transfers over a network.
•One common family of protocols is TCP/IP (Transmission Control Protocol/Internet
Protocol).
•TCP defines how data is routed through a network, and IP specifies that all
computers and devices connected to a network have a unique IP address.
•Two types of IP addresses: IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6).
•The network protocols for LANs, WANs, MANs, and other wireless protocols support
close-distance communication.
•These standards include Wi-Fi, LTE, Bluetooth, UWB, IrDA, RFIC, and NFC.
26
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
23
Network Standards and Protocols (4 of 11)
•
Wireless capability of computers or devices to communicate via radio waves with
other computers or devices using Wi-Fi, which identifies any network based on the
802.11 standards.
•
802.11 is a series of network standards developed by the IEEE.
•
Common standards include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax,
with data transfer rates ranging from 11 Mbps to 7 Gbps.
•
A designation of 802.11 ac/b/g/n/ac/ax on a computer, router, or other device
indicates that it supports those six standards (ac, b, g, n, ac, and ax).
•
Wi-Fi networks can easily be integrated with wired Ethernet networks.
•
Extra hardware needs to be installed to extend or strengthen a wireless signal.
27
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
24
Network Standards and Protocols (5 of 11)
•Bluetooth is a network protocol that defines how two Bluetooth devices use short-
range radio waves to transmit data.
•The data transfers between devices at a rate of up to 3 Mbps.
•A Bluetooth device contains a small chip that allows it to communicate with other
Bluetooth devices.
•Two Bluetooth devices are connected initially using a code, and devices that share
a Bluetooth connection are said to be paired.
•Connect devices with vehicle stereos to use the vehicle’s speakers to project sound
•Use GPS receivers to send directions to a mobile phone or GPS-enabled device
•Transfer photos wirelessly from a digital camera to a laptop or server. Replace
wired communications devices, such as barcode readers, with wireless devices to
enhance portability
28
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
25
Network Standards and Protocols (6 of 11)
Figure 9-7 Connecting your phone to your car’s Bluetooth.
29
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
26
Network Standards and Protocols (7 of 11)
•
UWB is a network standard that specifies how two UWB devices use short-range
radio waves to communicate at high speeds with each other.
•
UWB can transmit signals through doors and other obstacles.
•
UWB is best suited for the transmission of large files, such as video, graphics, and
audio.
•
Examples of UWB uses include locating and tracking inventory, equipment, or
personnel in remote or dangerous areas.
•
Devices, such as television remote controls, use the IrDA (Infrared Data
Association) standard to transmit data wirelessly to each other via infrared (IR)
light waves.
•
Since Bluetooth and UWB do not require line-of-sight transmission, these
technologies are more widespread than IrDA.
30
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
27
•
RFID (radio frequency identification) is a protocol that defines how a
network uses radio signals to communicate with a tag placed in or
attached to an object, an animal, or a person.
•
The tag, called a transponder, consists of an antenna and a memory
chip that contains the information to be transmitted.
•
An RFID reader, also called a transceiver, reads the radio signals and
transfers the information to a computer or other computing device.
•
Readers can be handheld or embedded in an object, such as a
doorway or a tollbooth.
Network Standards and Protocols (8 of 11)
31
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
28
Network Standards and Protocols (9 of 11)
Figure 9-8 How electronic RFID toll collection works.
32
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
29
Network Standards and Protocols (10 of 11)
•NFC (near-field communications) is a
protocol based on RFID.
•Smartphones, digital cameras,
televisions, and terminals are NFC-
enabled devices.
•Credit cards, tickets, and NFC tags are
examples of objects that also use NFC
technology.
•An NFC tag is a chip that can store small
amounts of data.
•NFC tags can be found in many different
items, including business cards,
wristbands, stickers, and ski lift tickets.
Figure 9-9 NFC communication
examples.
33
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
30
Network Standards and Protocols (11 of 11)
Network Protocol
Common Uses
Bluetooth
Devices communicating with one another over a short range (usually less
than 30 feet/9 meters)
IrDA
Remote controls or other data transmission within close proximity
LTE
Uses radio signals to communicate data over cellular networks
NFC
Used in credit cards, smartphones, and tickets to facilitate close-range
communication
RFID
Radio signals transmitted through antennas, often found in tollbooth
transponders or embedded chips in animals
UWB
Low-energy radio technology for short-range, high-bandwidth
communications
Wi-Fi
Hot spots and wireless home and small business networks using TCP/IP
Table 9-4 Close-distance network protocols.
34
Match
Match the following:
Devices communicating with one another over a short range (usually less than 30 feet/9 meters.)
Radio signals transmitted through antennas, often found in tollbooth transponders or embedded chips in animals
Hot spots and wireless home and small business networks using TCP/IP.
Uses radio signals to communicate data over cellular networks.
Used in credit cards, smartphones, and tickets to facilitate close-range communication.
Bluetooth
RFID
Wi-Fi
LTE
NFC
Bluetooth
RFID
Wi-Fi
LTE
NFC
35
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
31
Network Connection Hardware (1 of 8)
•Nodes, or devices on a network, can be computers, tablets, mobile
phones, printers, game consoles, or smart home devices.
•Hubs provide a central point for network cables in a network and are
used to transfer data to all devices.
•Switches, used more frequently than hubs, also provide a central
point for network cables in a network and transfer data only to the
intended recipient.
•Routers connect two or more networks and direct, or route, the flow
of information along the networks.
36
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
32
Network Connection Hardware(2 of 8)
•A modem connects a sending or receiving device, such as a computer,
to a communications channel, such as the Internet.
•The modem connects your network to the Internet through an ISP.
•A digital modem, also called a broadband modem, is a
communications device that sends and receives data and information
to and from a digital line.
•Three types of digital modems are cable modems, DSL modems, and
ISDN modems.
37
Multiple Choice
A driver connects a sending or receiving device, such as a computer,
to a communications channel, such as the Internet.
True
False
38
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
33
Network Connection Hardware (3 of 8)
A cable modem uses a
cable TV connection. A
splitter connects one part
of the cable to your cable
box or device, and the
other part to the cable
modem.
Figure 9-10 Typical cable modem installation.
39
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
34
Network Connection Hardware (4 of 8)
•
A DSL modem uses standard copper telephone wiring.
•
An ISDN (Integrated Services Digital Network) modem is a
broadband modem that sends digital data and information from a
computer to an ISDN line and receives digital data and information
from an ISDN line.
•
DSL and ISDN modems are external devices.
40
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
35
Network Connection Hardware (5 of 8)
•A dedicated line is a type of always-on physical connection that is
established between two communications devices.
•Businesses often use dedicated lines to connect geographically
distant offices.
•Dedicated lines can be either analog or digital.
•Multiplexing is a process that combines multiple analog or digital
signals into a single signal over a shared medium, such as a cable.
•Digital dedicated lines include cable television lines, DSL, ISDN lines,
FTTP, T-carrier lines, and ATM.
41
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
36
Network Connection Hardware (6 of 8)
Table 9-5 Digital dedicated lines.
Type
Description
Cable
The cable television (CATV) network provides high-speed Internet connections.
The CATV signal enters a building through a single line, usually a coaxial cable,
which connects to a modem that typically attaches to your computer via an
Ethernet cable.
DSL, ADSL
DSL (Digital Subscriber Line) transmits on existing standard copper phone wiring.
ADSL (Asymmetric Digital Subscriber Line) is a type of DSL that supports faster
downstream rates than upstream rates.
ISDN
ISDN (Integrated Services Digital Network) refers to both a circuit-switched
telephone network system and a set of communication standards used to
transmit data, voice, and signaling.
42
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
37
Network Connection Hardware (7 of 8)
Type
Description
FTTP
FTTP (Fiber to the Premises) uses fiber-optic cable to provide extremely high-
speed Internet access to a user’s physical permanent location. An optical
terminal at your location receives the signals and transfers them to a router
connected to a computer.
ATM
ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video,
and media at very high speeds. Phone networks, the Internet, and other
networks with large amounts of traffic use ATM.
Table 9-5 Digital dedicated lines (continued).
43
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
38
Network Connection Hardware (8 of 8)
Table 9-5 Digital dedicated lines (continued).
Type
Description
T-Carrier
Any of several types of long-distance digital phone lines that carry multiple
signals over a single communications line. Digital T-carrier lines use
multiplexing so that multiple signals share the line. T-carrier lines provide very
fast data transfer rates. Only medium to large companies usually can afford
the investment in T-carrier lines because these lines are so expensive. The
most popular T-carrier line is the T1 line. Main users of T3 lines include large
corporations, phone companies, and ISPs connecting to the Internet backbone.
The Internet backbone itself also uses T3 lines.
44
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
39
How To: Set Up a Network (1 of 5)
•A home network can be as simple as using a cable to connect two devices.
•A wireless, Internet-connected home network requires hardware like:
✔ a modem
✔a router
✔ a wireless access point
✔devices to be connected
•Installation of a home wireless network depends on factors such as:
✔the type of wireless network hardware you purchase
✔the size of your home
✔the devices you want to connect to the wireless network
45
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
40
How To: Set Up a Network (2 of 5)
Steps to set
up a Network
Step 1
• Purchase a modem or separate wireless router and
connect it to your home’s Internet service
Step 2
• Enable the wireless network
• Configure a name for the network
• Configure a wireless network key
Step 3
• Enable the device’s wireless functionality
• Search for and connect to the name of the wireless
network you specified in Step 2
• Enter the wireless network key you set in Step 2
46
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
41
How To: Set Up a Network (3 of 5)
•Adding a wireless printer to a home
or small office network has several
advantages.
•Multiple computers and mobile
devices on the network can use the
printer.
•Once the printer is installed on the
network, you can download an app
from the manufacturer to send
documents to the printer from
network-connected devices.
Figure 9-12 Sending a document to a wireless
printer.
47
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
42
How To: Set Up a Network (4 of 5)
•Set the location of the wireless printer within the range of the
wireless network
•Place the printer on a stable surface
•Access the printer’s settings and navigate to the network settings
•Connect to the wireless network in your home or small office
•Enter any remaining required information
•Install the printer app on the computer(s) and devices from which
you want to print to the wireless printer
48
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
43
How To: Set Up a Network (5 of 5)
•
If your wireless router or wireless access point
has an antenna(s), extend it completely
•
If you can remove the antenna(s) from your
wireless router or wireless access point, replace
it with a wireless signal booster
•
Place the wireless router or wireless access
point in a central location of your home
•
Purchase a booster (or repeater), which is an
amplifier used to improve reception and extend
the range
•
Change the router if problems persist
Figure 9-13 Wireless signal booster.
49
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
44
Secure IT: Secure a Network (1 of 5)
•Wireless Networks are easily accessible.
•It leads to several common network risks.
•Change the default password for the wireless access point, the SSID
name, encryption, and a MAC address
•Keep a regular check on the number of connected devices to the
wireless router
50
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
45
Secure IT: Secure a Network (2 of 5)
Table 9-6 Common network risks.
Risk
Description
Adware
Displays unwanted advertisements on your computer
Spyware
Tracks and transmits personal information from your computer or
device without your knowledge
Virus
Damages data on your computer or device or changes system settings
Worm
Spreads throughout a computer and/or network without requiring user
interaction
Trojan
Disguises itself as or hides in a legitimate file and then causes damage
to programs and data when opened
Ransomware
Locks you out of programs and data on your computer until you pay a
ransom to regain access
Rootkit
Gains administrator-level, or root-level, access to a computer or
network without the system or users detecting its
presence
51
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
46
Secure IT: Secure a Network (3 of 5)
Encryption scrambles
or codes data as it
is transmitted over a
network.
The Network attached storage (NAS) devices provide a centralized
location for storing programs and data on large and small networks.
Authentication identifies you to
the network. The most
common type of authentication
is providing a username and
password.
Firewalls create a
blockade between
corporate or personal
Networks and the Internet.
Biometric devices
authenticate identity by
scanning your physical
characteristics, such
as a fingerprint.
Figure 9-14 Securing a network.
52
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
47
Secure IT: Secure a Network (4 of 5)
•Network monitoring software constantly assesses the status of a
network and sends an email or text message, when it detects a
problem.
•Monitoring software can measure the amount of network traffic,
graph network usage, determine when a specific program uses the
network, and show the bandwidth used by each computer or mobile
device.
•Packet sniffer software monitors and logs packet traffic for later
analysis.
•Hackers use packet sniffer software to hijack a computer.
53
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
48
Secure IT: Secure a Network (5 of 5)
Use the following steps to determine if someone is accessing a wireless
network without permission:
•Sign in to the administrative interface
•Count the number of connected devices
•Secure the network
•Enable the router’s firewall and, if possible, use “stealth mode” to
make the network less visible to outsiders
54
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
49
Ethics and Issues: Responsibilities of a
Network Professional (1 of 2)
•The role of a network administrator is to plan, design,
purchase equipment for, set up, secure, and maintain a
network.
•USENIX is a nonprofit organization that was founded in 1975
to support network and system engineers and operators in
innovation and research.
55
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
50
Ethics and Issues: Responsibilities of a
Network Professional (2 of 2)
•Professionalism
•Social Responsibility
•Personal Integrity
•Privacy
•Laws and Policies
•Communication
•System Integrity
•Education
•Responsibility to Computing Community
The code includes guidelines for:
56
Open Ended
Take a few minutes and reflect on what you learned about networks and network devices. What topics would you like to learn more about?
57
Open Ended
Were there any sections in this module that you found difficult or confusing? If so, describe what they were.
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
1
1
Module 9: Networks and
Network Devices:
Communicating and
Connecting
Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Discovering
Computers: Digital
Technology, Data,
and Devices, 17e
Show answer
Auto Play
Slide 1 / 57
SLIDE
Similar Resources on Wayground
55 questions
CNS Infections
Lesson
•
University
49 questions
Food and Beverages
Lesson
•
University
51 questions
Unit 7 Lesson 1 slides
Lesson
•
KG - Professional Dev...
52 questions
DSF - 07 Digital Forensics
Lesson
•
University
54 questions
Food Safety Training - Summary
Lesson
•
University - Professi...
54 questions
IMMUNE SYSTEM - HH
Lesson
•
KG - University
55 questions
V-NET
Lesson
•
University
55 questions
Forms of Business Ownership
Lesson
•
University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Other
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
5 questions
What is Presidents' Day?
Interactive video
•
10th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
20 questions
Mardi Gras History
Quiz
•
6th Grade - University
10 questions
The Roaring 20's Crash Course US History
Interactive video
•
11th Grade - University
17 questions
Review9_TEACHER
Quiz
•
University