Search Header Logo
Module 9_Shelly C

Module 9_Shelly C

Assessment

Presentation

Other

University

Practice Problem

Easy

Created by

DR SITTI SYAMSIAR MUHARRAM

Used 2+ times

FREE Resource

49 Slides • 8 Questions

1

media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

1

1

Module 9: Networks and
Network Devices:
Communicating and
Connecting

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discovering
Computers: Digital
Technology, Data,
and Devices, 17e

2

Open Ended

The Internet has changed the way we work and has turned the entire world into a digital village. Discuss the ways the Internet has affected our lives and our ways of working together.

3

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

3

Module Objectives

By the end of the module, you should be able to:

Explain how a user interacts with a network

Identify types of network structures

Describe network standards and protocols

Explain how to use hardware to connect to a network

Explain how to set up a network

Identify network security tools

Describe the role of a network professional

4

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

4

How Do You Interact with a Network

(1 of 9)

A Network is a system of two or more
devices linked by wires, cables, or a
telecommunications system.

Networks allow computers to share
resources, such as hardware, software,
data, and information.

A Network requires a combination of
hardware and software to operate.

Networks act as a communications
system around the globe through the
Internet.

Figure 9-1 Networks can share

resources and data

5

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

5

How Do You Interact with a Network

(2 of 9)

The process in which two or more computers or devices transfer
data, instructions, and information is known as digital
communications.

All types of computers and mobile devices serve as sending and
receiving devices in a communications system.

Communications devices are modems, wireless access points,
routers, and so on.

Transmission media can be wired or wireless.

6

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

6

How Do You Interact with a Network

(3 of 9)

Table 9-1 Communication system components.

Device

Purpose

Communications device

Connects the sending device to the transmission
media

Receiving device

Accepts the transmission of data, instructions, or
information

Sending device

Initiates an instruction to transmit data, instructions,
or information

Transmission media or a
communications channel

Means by which the data, instructions, or information
travel

7

Multiple Choice

A __________ device accepts the transmission of data, instructions, or information in a communication system.

1

communication

2

receiving

3

sending

4

transmission

8

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

7

How Do You Interact with a Network

(4 od 9)

Classification of

Networks

Home

* Exist within a single building
* Easy to install and configure
* Accessed by only a few users

Business

* Accommodate many users

* Access large amounts of data

* Can be spread across many buildings

Structures,

standards, range,

and so on

9

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

8

How Do You Interact with a Network

(5 of 9)

Figure 9-3 Typical home network.

10

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

9

How Do You Interact with a Network

(6 of 9)

Home Networks provide home users with the following capabilities:

Multiple users can share a single Internet connection.

Files on each computer, such as photos, can be shared.

Multiple computers can share a single hardware resource, such as a printer.

Game consoles can connect to the Internet to facilitate online gaming.

Business Networks provide the following advantages to businesses:

Facilitate communication among employees

Share hardware, such as printers and scanners

Share data, information, and software with one another

Centrally store and backup critical information

11

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

10

How Do You Interact with a Network

(7 of 9)

Intranet

An intranet (intra
means within) is
an internal
network that
uses Internet
technologies.

Extranet

An extranet (extra
means outside or
beyond) allows
customers or
suppliers to access
part of its intranet.

VPN

A VPN can allow an
individual to access an
organization’s network
by using encryption
and other technologies
to secure the data
transmitted along the
path.

Businesses use intranets, extranets, and VPNs (virtual private networks)
to provide different services to employees.

12

Match

Match the following

An internal network that uses Internet technologies.

Allows customers or suppliers to access part of its intranet.

A network security system that monitors and controls incoming and outgoing network traffic.

Allows an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path.

A type of network that is designed to be used by a limited number of people.

Intranet

Extranet

Firewall

VPN

LAN (Local Area Network)

13

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

11

How Do You Interact with a Network

(8 of 9)

Wired Networks

It sends signals and data through cables traveling through floors and walls to connect to
other network devices.

Wired networks tend to be more secure and transmit data faster than wireless
networks.

Wireless Networks

It sends signals through airwaves and usually does not require cables.

Wireless networks can be less secure but more convenient and easier to set up than
wired networks.

Cellular network or mobile network is a communication network where the link to and
from end nodes is wireless.

Various types of cellular networks are 3G, 4G, and 5G.

14

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

12

How Do You Interact with a Network

(9 of 9)

Communications software consists of programs and apps that:

Help users establish a connection to another computer, mobile
device, or network

Manage the transmission of data, instructions, and information

Provide an interface for users to communicate with one another

15

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

13

Network Structures (1 of 7)

Home and business networks describe the main users of a Network.

Networks can be classified by:

Their topology (the method by which computers and devices are physically

arranged on a network)

Network architecture (the logical design of all devices on a network)
Geographic reach

Topology describes the layout of network devices, architecture describes the role
of servers and users, and the geographic span of a network determines how wide
the network reaches.

Common network topologies include bus network, ring network, star network, and
mesh network.

16

media
media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

14

Network Structures (2 of 7)

Table 9-2 Network topologies.

Type

Description

Layout

Bus network

All devices are attached to a central cable, called a
“bus,” that carries the data. If the bus fails, the
devices on the network will no longer be able to
communicate.

Mesh
network

All devices are interconnected with one another. If
a single device on the network fails, the rest of the
network will continue to function by communicating
via an alternate route. Two types of mesh
topologies are a full mesh topology (each device on
the network is connected to every other device on
the network) and a partial mesh technology (each
device may or may not be connected to all other
devices on the network).

17

media
media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

15

Network Structures (3 of 7)

Table 9-2 Network topologies (continued).

Type

Description

Layout

Ring network

Data travels from one device to the next in a
sequential fashion. If one device on the
network fails, all communication on the
network could cease to function. Ring
networks are no longer common.

Star network

Each device on the network is attached to a
central device, such as a server or switch. If
the central device fails, the other devices will
be unable to communicate. If a connected
device fails, all other devices will still be able
to communicate. Two or more star networks
may be joined together using a bus to form a
tree topology. Tree topologies are often are
used in schools and businesses.

18

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

16

Network Structures (4 of 7)

On a client/server network, one
or more computers act as a
server, and the other computers
on the network request resources
from the server.

A client is a computer or mobile
device on the network that relies
on the server for its resources.

Client/server networks are
controlled by a network
administrator.

Figure 9-5 Sample client/server network.

19

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

17

Network Structures (5 of 7)

A peer-to-peer (P2P) network is a network architecture that
connects a small number of computers, fewer than 10.

With this type of network, computers communicate directly with one
another and can share one another’s resources.

All computers are treated equally, and a network administrator is not
required.

A type of P2P network where users share files over the Internet.

The files in an Internet peer-to-peer network transfer directly from
one user’s computer to the other.

It is illegal to share copyright-protected files or other resources.

20

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

18

Network Structures (6 of 7)

A local area network (LAN) connects computers and devices in a
limited area.

Figure 9-6 Sample LAN.

21

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

19

Network Structures (7 of 7)

Network configurations come in a variety of sizes, which can be determined
not only by the number of devices they connect but also by their geographic
reach.

A wireless LAN (WLAN) is a LAN that uses wireless connections.

A wide area network (WAN) is a network that connects devices in a large

geographic region.

A metropolitan area network (MAN) is a type of wide-area network that is

operated by a city or county.

A personal area network (PAN) connects personal digital devices connected

via Bluetooth like a smartwatch.

A body area network (BAN) is a form of personal area network that consists

of small, lightweight biosensors implanted in the body.

22

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

20

Network Standards and Protocols (1 of 11)

Network standards define guidelines that specify the way computers access a
network, the type(s) of hardware used, data transmission speeds, and the types of
cable and wireless technology used.

A protocol is a standard that outlines the characteristics of how devices
communicate on a network, such as data format, coding schemes, error handling,
and the sequence in which data transfers over the network.

Network standards and protocols work together to move data through a network.

The most common standard for wired networks is Ethernet. It controls how
network interface cards (NICs), routers, and modems share access to cables and
phone lines, as well as how they transmit data.

Most businesses use a standard, such as EDI (electronic data interchange), that
defines how business documents travel across transmission media.

23

Multiple Choice

A protocol is a standard that outlines the characteristics of how devices
communicate on a network.

1

True

2

False

24

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

21

Network Standards and Protocols (2 of 11)

Name

Type

Sample Usage

Bluetooth

Protocol

Wireless headset

IrDA

Standard

Remote control

LTE

Standard

Mobile phones

NFC

Protocol

Mobile phone
payment

RFID

Protocol

Tollbooth

TCP/IP

Protocol

Internet

Token ring

Standard

LAN

UWB

Standard

Inventory tracking

Wi-Fi

Standard

Hot spots

Table 9-3 Network standards and protocols.

25

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

22

Network Standards and Protocols (3 of 11)

A protocol may define data format, coding schemes, error handling, and the
sequence in which data transfers over a network.

One common family of protocols is TCP/IP (Transmission Control Protocol/Internet
Protocol).

TCP defines how data is routed through a network, and IP specifies that all
computers and devices connected to a network have a unique IP address.

Two types of IP addresses: IPv4 (Internet Protocol version 4) and IPv6 (Internet
Protocol version 6).

The network protocols for LANs, WANs, MANs, and other wireless protocols support
close-distance communication.

These standards include Wi-Fi, LTE, Bluetooth, UWB, IrDA, RFIC, and NFC.

26

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

23

Network Standards and Protocols (4 of 11)

Wireless capability of computers or devices to communicate via radio waves with
other computers or devices using Wi-Fi, which identifies any network based on the
802.11 standards.

802.11 is a series of network standards developed by the IEEE.

Common standards include 802.11a, 802.11b, 802.11g, 802.11n, 802.11ac, and 802.11ax,
with data transfer rates ranging from 11 Mbps to 7 Gbps.

A designation of 802.11 ac/b/g/n/ac/ax on a computer, router, or other device
indicates that it supports those six standards (ac, b, g, n, ac, and ax).

Wi-Fi networks can easily be integrated with wired Ethernet networks.

Extra hardware needs to be installed to extend or strengthen a wireless signal.

27

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

24

Network Standards and Protocols (5 of 11)

Bluetooth is a network protocol that defines how two Bluetooth devices use short-
range radio waves to transmit data.

The data transfers between devices at a rate of up to 3 Mbps.

A Bluetooth device contains a small chip that allows it to communicate with other
Bluetooth devices.

Two Bluetooth devices are connected initially using a code, and devices that share
a Bluetooth connection are said to be paired.

Connect devices with vehicle stereos to use the vehicle’s speakers to project sound

Use GPS receivers to send directions to a mobile phone or GPS-enabled device

Transfer photos wirelessly from a digital camera to a laptop or server. Replace
wired communications devices, such as barcode readers, with wireless devices to
enhance portability

28

media
media
media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

25

Network Standards and Protocols (6 of 11)

Figure 9-7 Connecting your phone to your car’s Bluetooth.

29

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

26

Network Standards and Protocols (7 of 11)

UWB is a network standard that specifies how two UWB devices use short-range
radio waves to communicate at high speeds with each other.

UWB can transmit signals through doors and other obstacles.

UWB is best suited for the transmission of large files, such as video, graphics, and
audio.

Examples of UWB uses include locating and tracking inventory, equipment, or
personnel in remote or dangerous areas.

Devices, such as television remote controls, use the IrDA (Infrared Data
Association) standard to transmit data wirelessly to each other via infrared (IR)
light waves.

Since Bluetooth and UWB do not require line-of-sight transmission, these
technologies are more widespread than IrDA.

30

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

27

RFID (radio frequency identification) is a protocol that defines how a
network uses radio signals to communicate with a tag placed in or
attached to an object, an animal, or a person.

The tag, called a transponder, consists of an antenna and a memory
chip that contains the information to be transmitted.

An RFID reader, also called a transceiver, reads the radio signals and
transfers the information to a computer or other computing device.

Readers can be handheld or embedded in an object, such as a
doorway or a tollbooth.

Network Standards and Protocols (8 of 11)

31

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

28

Network Standards and Protocols (9 of 11)

Figure 9-8 How electronic RFID toll collection works.

32

media
media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

29

Network Standards and Protocols (10 of 11)

NFC (near-field communications) is a
protocol based on RFID.

Smartphones, digital cameras,
televisions, and terminals are NFC-
enabled devices.

Credit cards, tickets, and NFC tags are
examples of objects that also use NFC
technology.

An NFC tag is a chip that can store small
amounts of data.

NFC tags can be found in many different
items, including business cards,
wristbands, stickers, and ski lift tickets.

Figure 9-9 NFC communication

examples.

33

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

30

Network Standards and Protocols (11 of 11)

Network Protocol

Common Uses

Bluetooth

Devices communicating with one another over a short range (usually less
than 30 feet/9 meters)

IrDA

Remote controls or other data transmission within close proximity

LTE

Uses radio signals to communicate data over cellular networks

NFC

Used in credit cards, smartphones, and tickets to facilitate close-range
communication

RFID

Radio signals transmitted through antennas, often found in tollbooth
transponders or embedded chips in animals

UWB

Low-energy radio technology for short-range, high-bandwidth
communications

Wi-Fi

Hot spots and wireless home and small business networks using TCP/IP

Table 9-4 Close-distance network protocols.

34

Match

Match the following:

Devices communicating with one another over a short range (usually less than 30 feet/9 meters.)

Radio signals transmitted through antennas, often found in tollbooth transponders or embedded chips in animals

Hot spots and wireless home and small business networks using TCP/IP.

Uses radio signals to communicate data over cellular networks.

Used in credit cards, smartphones, and tickets to facilitate close-range communication.

Bluetooth

RFID

Wi-Fi

LTE

NFC

35

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

31

Network Connection Hardware (1 of 8)

Nodes, or devices on a network, can be computers, tablets, mobile
phones, printers, game consoles, or smart home devices.

Hubs provide a central point for network cables in a network and are
used to transfer data to all devices.

Switches, used more frequently than hubs, also provide a central
point for network cables in a network and transfer data only to the
intended recipient.

Routers connect two or more networks and direct, or route, the flow
of information along the networks.

36

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

32

Network Connection Hardware(2 of 8)

A modem connects a sending or receiving device, such as a computer,
to a communications channel, such as the Internet.

The modem connects your network to the Internet through an ISP.

A digital modem, also called a broadband modem, is a
communications device that sends and receives data and information
to and from a digital line.

Three types of digital modems are cable modems, DSL modems, and
ISDN modems.

37

Multiple Choice

A driver connects a sending or receiving device, such as a computer,
to a communications channel, such as the Internet.

1

True

2

False

38

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

33

Network Connection Hardware (3 of 8)

A cable modem uses a
cable TV connection. A
splitter connects one part
of the cable to your cable
box or device, and the
other part to the cable
modem.

Figure 9-10 Typical cable modem installation.

39

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

34

Network Connection Hardware (4 of 8)

A DSL modem uses standard copper telephone wiring.

An ISDN (Integrated Services Digital Network) modem is a
broadband modem that sends digital data and information from a
computer to an ISDN line and receives digital data and information
from an ISDN line.

DSL and ISDN modems are external devices.

40

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

35

Network Connection Hardware (5 of 8)

A dedicated line is a type of always-on physical connection that is
established between two communications devices.

Businesses often use dedicated lines to connect geographically
distant offices.

Dedicated lines can be either analog or digital.

Multiplexing is a process that combines multiple analog or digital
signals into a single signal over a shared medium, such as a cable.

Digital dedicated lines include cable television lines, DSL, ISDN lines,
FTTP, T-carrier lines, and ATM.

41

media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

36

Network Connection Hardware (6 of 8)

Table 9-5 Digital dedicated lines.

Type

Description

Cable

The cable television (CATV) network provides high-speed Internet connections.
The CATV signal enters a building through a single line, usually a coaxial cable,
which connects to a modem that typically attaches to your computer via an
Ethernet cable.

DSL, ADSL

DSL (Digital Subscriber Line) transmits on existing standard copper phone wiring.
ADSL (Asymmetric Digital Subscriber Line) is a type of DSL that supports faster
downstream rates than upstream rates.

ISDN

ISDN (Integrated Services Digital Network) refers to both a circuit-switched
telephone network system and a set of communication standards used to
transmit data, voice, and signaling.

42

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

37

Network Connection Hardware (7 of 8)

Type

Description

FTTP

FTTP (Fiber to the Premises) uses fiber-optic cable to provide extremely high-
speed Internet access to a user’s physical permanent location. An optical
terminal at your location receives the signals and transfers them to a router
connected to a computer.

ATM

ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video,
and media at very high speeds. Phone networks, the Internet, and other
networks with large amounts of traffic use ATM.

Table 9-5 Digital dedicated lines (continued).

43

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

38

Network Connection Hardware (8 of 8)

Table 9-5 Digital dedicated lines (continued).

Type

Description

T-Carrier

Any of several types of long-distance digital phone lines that carry multiple
signals over a single communications line. Digital T-carrier lines use
multiplexing so that multiple signals share the line. T-carrier lines provide very
fast data transfer rates. Only medium to large companies usually can afford
the investment in T-carrier lines because these lines are so expensive. The
most popular T-carrier line is the T1 line. Main users of T3 lines include large
corporations, phone companies, and ISPs connecting to the Internet backbone.
The Internet backbone itself also uses T3 lines.

44

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

39

How To: Set Up a Network (1 of 5)

A home network can be as simple as using a cable to connect two devices.

A wireless, Internet-connected home network requires hardware like:

a modem
a router
a wireless access point
devices to be connected

Installation of a home wireless network depends on factors such as:

the type of wireless network hardware you purchase
the size of your home
the devices you want to connect to the wireless network

45

media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

40

How To: Set Up a Network (2 of 5)

Steps to set
up a Network

Step 1

Purchase a modem or separate wireless router and

connect it to your home’s Internet service

Step 2

Enable the wireless network
Configure a name for the network
Configure a wireless network key

Step 3

Enable the device’s wireless functionality
Search for and connect to the name of the wireless

network you specified in Step 2

Enter the wireless network key you set in Step 2

46

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

41

How To: Set Up a Network (3 of 5)

Adding a wireless printer to a home
or small office network has several
advantages.

Multiple computers and mobile
devices on the network can use the
printer.

Once the printer is installed on the
network, you can download an app
from the manufacturer to send
documents to the printer from
network-connected devices.

Figure 9-12 Sending a document to a wireless
printer.

47

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

42

How To: Set Up a Network (4 of 5)

Set the location of the wireless printer within the range of the
wireless network

Place the printer on a stable surface

Access the printer’s settings and navigate to the network settings

Connect to the wireless network in your home or small office

Enter any remaining required information

Install the printer app on the computer(s) and devices from which
you want to print to the wireless printer

48

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

43

How To: Set Up a Network (5 of 5)

If your wireless router or wireless access point
has an antenna(s), extend it completely

If you can remove the antenna(s) from your
wireless router or wireless access point, replace
it with a wireless signal booster

Place the wireless router or wireless access
point in a central location of your home

Purchase a booster (or repeater), which is an
amplifier used to improve reception and extend
the range

Change the router if problems persist

Figure 9-13 Wireless signal booster.

49

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

44

Secure IT: Secure a Network (1 of 5)

Wireless Networks are easily accessible.

It leads to several common network risks.

Change the default password for the wireless access point, the SSID
name, encryption, and a MAC address

Keep a regular check on the number of connected devices to the
wireless router

50

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

45

Secure IT: Secure a Network (2 of 5)

Table 9-6 Common network risks.

Risk

Description

Adware

Displays unwanted advertisements on your computer

Spyware

Tracks and transmits personal information from your computer or
device without your knowledge

Virus

Damages data on your computer or device or changes system settings

Worm

Spreads throughout a computer and/or network without requiring user
interaction

Trojan

Disguises itself as or hides in a legitimate file and then causes damage
to programs and data when opened

Ransomware

Locks you out of programs and data on your computer until you pay a
ransom to regain access

Rootkit

Gains administrator-level, or root-level, access to a computer or
network without the system or users detecting its
presence

51

media
media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

46

Secure IT: Secure a Network (3 of 5)

Encryption scrambles
or codes data as it
is transmitted over a
network.

The Network attached storage (NAS) devices provide a centralized
location for storing programs and data on large and small networks.

Authentication identifies you to
the network. The most
common type of authentication
is providing a username and
password.

Firewalls create a
blockade between
corporate or personal
Networks and the Internet.

Biometric devices
authenticate identity by
scanning your physical
characteristics, such
as a fingerprint.

Figure 9-14 Securing a network.

52

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

47

Secure IT: Secure a Network (4 of 5)

Network monitoring software constantly assesses the status of a
network and sends an email or text message, when it detects a
problem.

Monitoring software can measure the amount of network traffic,
graph network usage, determine when a specific program uses the
network, and show the bandwidth used by each computer or mobile
device.

Packet sniffer software monitors and logs packet traffic for later
analysis.

Hackers use packet sniffer software to hijack a computer.

53

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

48

Secure IT: Secure a Network (5 of 5)

Use the following steps to determine if someone is accessing a wireless
network without permission:

Sign in to the administrative interface

Count the number of connected devices

Secure the network

Enable the router’s firewall and, if possible, use “stealth mode” to
make the network less visible to outsiders

54

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

49

Ethics and Issues: Responsibilities of a

Network Professional (1 of 2)

The role of a network administrator is to plan, design,
purchase equipment for, set up, secure, and maintain a
network.

USENIX is a nonprofit organization that was founded in 1975
to support network and system engineers and operators in
innovation and research.

55

media
media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

50

Ethics and Issues: Responsibilities of a

Network Professional (2 of 2)

Professionalism

Social Responsibility

Personal Integrity

Privacy

Laws and Policies

Communication

System Integrity

Education

Responsibility to Computing Community

The code includes guidelines for:

56

Open Ended

Take a few minutes and reflect on what you learned about networks and network devices. What topics would you like to learn more about?

57

Open Ended

Were there any sections in this module that you found difficult or confusing? If so, describe what they were.

media

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

1

1

Module 9: Networks and
Network Devices:
Communicating and
Connecting

Jennifer T. Campbell, Discovering Computers: Digital Technology, Data, and Devices, 17th Edition. © 2023 Cengage. All Rights Reserved. May
not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.

Discovering
Computers: Digital
Technology, Data,
and Devices, 17e

Show answer

Auto Play

Slide 1 / 57

SLIDE