knowt logo

Basic Computer Network Concepts - In-Person - audio recorded

Network Types and Connectivity

Page 2: Types of Networks

  • Local Area Network (LAN)

    • Confined to a small area, such as a building or group of buildings (Beal, 2018a).

  • Wide Area Network (WAN)

    • Encompasses a large geographical area, potentially connecting multiple LANs (Beal, 2018b).

  • Campus Area Network (CAN)

    • Covers a defined geographic area, such as a college campus (Webopedia, 2018).

  • Metropolitan Area Network (MAN)

    • Encompasses a city or town (Beal, 2018c).


Page 3: Network Types

  • Intranet

    • A private network within an organization for sharing information.

    • Accessible to specific outsiders with valid credentials.

  • Extranet

    • An extension of an intranet with added security features.

    • Uses encrypted tunnels for file transmission.

    • Allows remote access for authorized users, such as healthcare professionals.

  • Virtual Private Network (VPN)

    • Facilitates confidential communication within an organization.

    • Caution against using free VPNs due to potential security risks (Sewell, 2019).


Page 4: Network Connections

  • Connectivity Materials

    • Physical connections using twisted-wire cables, phone lines, fiber-optic lines, or radio waves.

    • Hardwired connections indicate permanence.

  • Wireless Transmission

    • Limited distance and susceptible to interference from other radio traffic.

    • Nodes strategically placed for optimal signal coverage.

    • Wireless communication is less secure than hardwired due to signal accessibility.

  • Home & Rural Networks

    • Home networks often utilize DSL or TV cable connections.

    • Rural areas may rely on dial-up modems or satellite connections (Sewell, 2019).


Page 6: IP Addresses

  • Definition

    • Every device on the Internet has a unique IP address for electronic location.

  • Structure

    • Composed of four sets of numbers (0-255) separated by periods.

  • Static vs. Dynamic IP Addresses

    • Static: Remains the same each time the device connects.

    • Dynamic: Changes with each connection.

  • Internet Service Providers (ISPs)

    • Assign a limited number of IP addresses in static or dynamic formats (Sewell, 2019).


Page 7: World Wide Web

  • Definition

    • A network within the Internet for accessing hypertext documents via web browsers.

  • Governance

    • Maintained by the World Wide Web Consortium (W3C) to enforce compatibility and standards.

  • Web Browsers

    • Tools for retrieving and displaying files from the Internet using the client-server model.

    • Users are encouraged to have multiple browsers for better compatibility (Sewell, 2019).


Page 9: URL Basics

  • Definition

    • A URL (Universal Resource Locator) identifies web documents.

  • Structure

    • Begins with "http" or "https" (the latter indicating a secure site).

    • Includes descriptors, domain names, and may contain folder and file names.

  • Example Breakdown

    • URL components include domain name, descriptors, folder names, and file names (Sewell, 2019).


Page 11: Troubleshooting Basics

  • Access Issues

    • Modify the URL by removing file names and folders until reaching the domain.

    • If access errors occur, delete between forward slashes to simplify the URL.

    • If unsuccessful, use a search engine to check if the page exists (Sewell, 2019).


Page 15: Online Security

  • Computer Malware

    • Software designed to damage or disrupt systems for profit.

  • Social Engineering

    • Deceptive tactics to trick users into downloading malware.

  • Drive-by Downloads

    • Malware embedded in web pages that automatically downloads upon opening.

  • Preventative Measures

    • Awareness of vulnerabilities and understanding malware tactics is crucial (Sewell, 2019).


Page 16: Additional Security Concerns

  • Ransomware

    • Locks screens or encrypts files, demanding payment for access.

  • Botnets

    • Networks of compromised computers used for malicious activities.

  • Phishing and Pharming

    • Scams to obtain personal information through deceptive emails or fake websites (Sewell, 2019).


Page 17: Protective Measures Against Fraud

  • Website Verification

    • Check URLs and hover over hyperlinks to reveal true destinations.

  • Caution with Links

    • Only open links or attachments from trusted sources (Sewell

KB

Basic Computer Network Concepts - In-Person - audio recorded

Network Types and Connectivity

Page 2: Types of Networks

  • Local Area Network (LAN)

    • Confined to a small area, such as a building or group of buildings (Beal, 2018a).

  • Wide Area Network (WAN)

    • Encompasses a large geographical area, potentially connecting multiple LANs (Beal, 2018b).

  • Campus Area Network (CAN)

    • Covers a defined geographic area, such as a college campus (Webopedia, 2018).

  • Metropolitan Area Network (MAN)

    • Encompasses a city or town (Beal, 2018c).


Page 3: Network Types

  • Intranet

    • A private network within an organization for sharing information.

    • Accessible to specific outsiders with valid credentials.

  • Extranet

    • An extension of an intranet with added security features.

    • Uses encrypted tunnels for file transmission.

    • Allows remote access for authorized users, such as healthcare professionals.

  • Virtual Private Network (VPN)

    • Facilitates confidential communication within an organization.

    • Caution against using free VPNs due to potential security risks (Sewell, 2019).


Page 4: Network Connections

  • Connectivity Materials

    • Physical connections using twisted-wire cables, phone lines, fiber-optic lines, or radio waves.

    • Hardwired connections indicate permanence.

  • Wireless Transmission

    • Limited distance and susceptible to interference from other radio traffic.

    • Nodes strategically placed for optimal signal coverage.

    • Wireless communication is less secure than hardwired due to signal accessibility.

  • Home & Rural Networks

    • Home networks often utilize DSL or TV cable connections.

    • Rural areas may rely on dial-up modems or satellite connections (Sewell, 2019).


Page 6: IP Addresses

  • Definition

    • Every device on the Internet has a unique IP address for electronic location.

  • Structure

    • Composed of four sets of numbers (0-255) separated by periods.

  • Static vs. Dynamic IP Addresses

    • Static: Remains the same each time the device connects.

    • Dynamic: Changes with each connection.

  • Internet Service Providers (ISPs)

    • Assign a limited number of IP addresses in static or dynamic formats (Sewell, 2019).


Page 7: World Wide Web

  • Definition

    • A network within the Internet for accessing hypertext documents via web browsers.

  • Governance

    • Maintained by the World Wide Web Consortium (W3C) to enforce compatibility and standards.

  • Web Browsers

    • Tools for retrieving and displaying files from the Internet using the client-server model.

    • Users are encouraged to have multiple browsers for better compatibility (Sewell, 2019).


Page 9: URL Basics

  • Definition

    • A URL (Universal Resource Locator) identifies web documents.

  • Structure

    • Begins with "http" or "https" (the latter indicating a secure site).

    • Includes descriptors, domain names, and may contain folder and file names.

  • Example Breakdown

    • URL components include domain name, descriptors, folder names, and file names (Sewell, 2019).


Page 11: Troubleshooting Basics

  • Access Issues

    • Modify the URL by removing file names and folders until reaching the domain.

    • If access errors occur, delete between forward slashes to simplify the URL.

    • If unsuccessful, use a search engine to check if the page exists (Sewell, 2019).


Page 15: Online Security

  • Computer Malware

    • Software designed to damage or disrupt systems for profit.

  • Social Engineering

    • Deceptive tactics to trick users into downloading malware.

  • Drive-by Downloads

    • Malware embedded in web pages that automatically downloads upon opening.

  • Preventative Measures

    • Awareness of vulnerabilities and understanding malware tactics is crucial (Sewell, 2019).


Page 16: Additional Security Concerns

  • Ransomware

    • Locks screens or encrypts files, demanding payment for access.

  • Botnets

    • Networks of compromised computers used for malicious activities.

  • Phishing and Pharming

    • Scams to obtain personal information through deceptive emails or fake websites (Sewell, 2019).


Page 17: Protective Measures Against Fraud

  • Website Verification

    • Check URLs and hover over hyperlinks to reveal true destinations.

  • Caution with Links

    • Only open links or attachments from trusted sources (Sewell

robot