Basic Computer Network Concepts - In-Person - audio recorded
Local Area Network (LAN)
Confined to a small area, such as a building or group of buildings (Beal, 2018a).
Wide Area Network (WAN)
Encompasses a large geographical area, potentially connecting multiple LANs (Beal, 2018b).
Campus Area Network (CAN)
Covers a defined geographic area, such as a college campus (Webopedia, 2018).
Metropolitan Area Network (MAN)
Encompasses a city or town (Beal, 2018c).
Intranet
A private network within an organization for sharing information.
Accessible to specific outsiders with valid credentials.
Extranet
An extension of an intranet with added security features.
Uses encrypted tunnels for file transmission.
Allows remote access for authorized users, such as healthcare professionals.
Virtual Private Network (VPN)
Facilitates confidential communication within an organization.
Caution against using free VPNs due to potential security risks (Sewell, 2019).
Connectivity Materials
Physical connections using twisted-wire cables, phone lines, fiber-optic lines, or radio waves.
Hardwired connections indicate permanence.
Wireless Transmission
Limited distance and susceptible to interference from other radio traffic.
Nodes strategically placed for optimal signal coverage.
Wireless communication is less secure than hardwired due to signal accessibility.
Home & Rural Networks
Home networks often utilize DSL or TV cable connections.
Rural areas may rely on dial-up modems or satellite connections (Sewell, 2019).
Definition
Every device on the Internet has a unique IP address for electronic location.
Structure
Composed of four sets of numbers (0-255) separated by periods.
Static vs. Dynamic IP Addresses
Static: Remains the same each time the device connects.
Dynamic: Changes with each connection.
Internet Service Providers (ISPs)
Assign a limited number of IP addresses in static or dynamic formats (Sewell, 2019).
Definition
A network within the Internet for accessing hypertext documents via web browsers.
Governance
Maintained by the World Wide Web Consortium (W3C) to enforce compatibility and standards.
Web Browsers
Tools for retrieving and displaying files from the Internet using the client-server model.
Users are encouraged to have multiple browsers for better compatibility (Sewell, 2019).
Definition
A URL (Universal Resource Locator) identifies web documents.
Structure
Begins with "http" or "https" (the latter indicating a secure site).
Includes descriptors, domain names, and may contain folder and file names.
Example Breakdown
URL components include domain name, descriptors, folder names, and file names (Sewell, 2019).
Access Issues
Modify the URL by removing file names and folders until reaching the domain.
If access errors occur, delete between forward slashes to simplify the URL.
If unsuccessful, use a search engine to check if the page exists (Sewell, 2019).
Computer Malware
Software designed to damage or disrupt systems for profit.
Social Engineering
Deceptive tactics to trick users into downloading malware.
Drive-by Downloads
Malware embedded in web pages that automatically downloads upon opening.
Preventative Measures
Awareness of vulnerabilities and understanding malware tactics is crucial (Sewell, 2019).
Ransomware
Locks screens or encrypts files, demanding payment for access.
Botnets
Networks of compromised computers used for malicious activities.
Phishing and Pharming
Scams to obtain personal information through deceptive emails or fake websites (Sewell, 2019).
Website Verification
Check URLs and hover over hyperlinks to reveal true destinations.
Caution with Links
Only open links or attachments from trusted sources (Sewell
Local Area Network (LAN)
Confined to a small area, such as a building or group of buildings (Beal, 2018a).
Wide Area Network (WAN)
Encompasses a large geographical area, potentially connecting multiple LANs (Beal, 2018b).
Campus Area Network (CAN)
Covers a defined geographic area, such as a college campus (Webopedia, 2018).
Metropolitan Area Network (MAN)
Encompasses a city or town (Beal, 2018c).
Intranet
A private network within an organization for sharing information.
Accessible to specific outsiders with valid credentials.
Extranet
An extension of an intranet with added security features.
Uses encrypted tunnels for file transmission.
Allows remote access for authorized users, such as healthcare professionals.
Virtual Private Network (VPN)
Facilitates confidential communication within an organization.
Caution against using free VPNs due to potential security risks (Sewell, 2019).
Connectivity Materials
Physical connections using twisted-wire cables, phone lines, fiber-optic lines, or radio waves.
Hardwired connections indicate permanence.
Wireless Transmission
Limited distance and susceptible to interference from other radio traffic.
Nodes strategically placed for optimal signal coverage.
Wireless communication is less secure than hardwired due to signal accessibility.
Home & Rural Networks
Home networks often utilize DSL or TV cable connections.
Rural areas may rely on dial-up modems or satellite connections (Sewell, 2019).
Definition
Every device on the Internet has a unique IP address for electronic location.
Structure
Composed of four sets of numbers (0-255) separated by periods.
Static vs. Dynamic IP Addresses
Static: Remains the same each time the device connects.
Dynamic: Changes with each connection.
Internet Service Providers (ISPs)
Assign a limited number of IP addresses in static or dynamic formats (Sewell, 2019).
Definition
A network within the Internet for accessing hypertext documents via web browsers.
Governance
Maintained by the World Wide Web Consortium (W3C) to enforce compatibility and standards.
Web Browsers
Tools for retrieving and displaying files from the Internet using the client-server model.
Users are encouraged to have multiple browsers for better compatibility (Sewell, 2019).
Definition
A URL (Universal Resource Locator) identifies web documents.
Structure
Begins with "http" or "https" (the latter indicating a secure site).
Includes descriptors, domain names, and may contain folder and file names.
Example Breakdown
URL components include domain name, descriptors, folder names, and file names (Sewell, 2019).
Access Issues
Modify the URL by removing file names and folders until reaching the domain.
If access errors occur, delete between forward slashes to simplify the URL.
If unsuccessful, use a search engine to check if the page exists (Sewell, 2019).
Computer Malware
Software designed to damage or disrupt systems for profit.
Social Engineering
Deceptive tactics to trick users into downloading malware.
Drive-by Downloads
Malware embedded in web pages that automatically downloads upon opening.
Preventative Measures
Awareness of vulnerabilities and understanding malware tactics is crucial (Sewell, 2019).
Ransomware
Locks screens or encrypts files, demanding payment for access.
Botnets
Networks of compromised computers used for malicious activities.
Phishing and Pharming
Scams to obtain personal information through deceptive emails or fake websites (Sewell, 2019).
Website Verification
Check URLs and hover over hyperlinks to reveal true destinations.
Caution with Links
Only open links or attachments from trusted sources (Sewell