Communication is vital for survival, just like air, water, food, and shelter.
Networks connect us in unprecedented ways, transforming our interactions.
Host/End Device: The devices such as computers and smartphones that connect to a network.
Servers: Provide information to end devices.
Email Server: Runs email server software; clients access email via client software.
Web Server: Runs web server software; clients access websites through browsers.
File Server: Stores and shares files accessible by client devices.
Devices can function as both clients and servers.
Advantages:
Easy to set up.
Lower cost and less complexity.
Disadvantages:
No centralized administration.
Less secure and not scalable.
The origin and destination points for messages.
Data transfers from one end device to another through the network.
Connect end devices and manage data traffic.
Examples: Switches, routers, firewalls.
Functions:
Regenerating signals.
Maintaining pathways.
Error notification.
Channels for communication in a network.
Media Types:
Copper Cables: Use electrical impulses.
Fiber-Optic Cables: Utilize light pulses.
Wireless Transmission: Modulates electromagnetic waves.
Network diagrams represent devices using symbols.
Important terms: Network Interface Card (NIC), Ports, Interfaces.
Physical Topology Diagrams: Show physical locations of devices and installation.
Logical Topology Diagrams: Show addressing schemes and devices.
Small Home Networks: Connect few devices.
Small Office/Home Office (SOHO): Connects home or remote office with corporate networks.
Medium to Large Networks: Connect many locations with numerous devices.
World Wide Networks: Involve hundreds of millions of interconnected devices like the internet.
Local Area Network (LAN): Spans a limited area, administered by one entity.
Wide Area Network (WAN): Covers a larger geographical area and is typically managed by service providers.
A global connection of LANs and WANs, using various physical transmission methods.
Institutions like IETF, ICANN, and IAB maintain its structure.
Intranets: Private networks accessible only by members of an organization.
Extranets: Provide access for outsiders needing secure access to organizational data.
Various technologies connect users to the internet:
Popular Home/SOHO Connections: Broadband cable, DSL, wireless WAN, mobile services.
Business Connections: Requires faster connections, such as leased lines and dedicated DSL.
Cable: High bandwidth, continuous internet connection from cable TV providers.
DSL: High bandwidth from telephone lines.
Cellular: Utilizes cell networks for internet access.
Satellite: Ideal for remote areas.
Dial-up: Basic, low bandwidth option.
Corporates need:
Dedicated connections.
Higher bandwidth solutions like leased lines and Ethernet WAN.
Networks that deliver data, voice, and video services on the same infrastructure.
Factors supporting network data movement: Fault Tolerance, Scalability, Quality of Service (QoS), Security.
Minimizes failure impact by providing multiple data paths.
Enables quick and easy expansion without degrading service quality.
Manages bandwidth distribution effectively, especially for voice and video services.
Includes infrastructure security and information security to protect data and access.
Three goals of network security:
Confidentiality
Integrity
Availability
Networks must adapt to: BYOD (Bring Your Own Device), online collaboration, video communications, cloud computing.
Network security is crucial across all network sizes against external and internal threats.
External threats: Viruses, denial-of-service attacks.
Internal threats: Misuse or loss of devices.
Multi-layered security solutions include antivirus, firewalls, and intrusion prevention systems for larger networks.
Demonstrates foundational knowledge of networking technologies and skills relevant to evolving needs, including IP, security, and wireless.
Opportunities can be found through platforms like NetAcad.
Key learnings from the module include: network communication essentials, network types (LANs, WANs), IP addressing, basic security practices.
Host Roles: End Device, Servers (Email, Web, File).
Peer-to-Peer Advantages: Easy setup, low cost; Disadvantages: No central admin, less secure.
Network Differences: LAN vs. WAN.
Internet Access Types: Cable, DSL, Cellular, Satellite, Dial-up.
Security Goals: Confidentiality, Integrity, Availability.