Professional Documents
Culture Documents
A network diagram shows how computers and network devices (e.g. router, switch, etc) connect
with each other within a network. It is widely used in network architecture design. A typical use
of network diagram is for tracking down network issues by studying how the computers and
devices are connected and inter-related.
A computer network is a group of computer systems and other computing hardware devices that
are linked together through communication channels to facilitate communication and resource-
sharing among a wide range of users.
One of the earliest examples of a computer network was a network of communicating computers
that functioned as part of the U.S. military's Semi-Automatic Ground Environment (SAGE) radar
system. In 1969, the University of California at Los Angeles, the Stanford Research Institute, the
University of California at Santa Barbara and the University of Utah were connected as part of
the Advanced Research Projects Agency Network (ARPANET) project.
It is this network that evolved to become what we now call the internet.
1b VPN benefits
Security – The main reason why businesses choose to adopt virtual private networks.
Having encrypted data, particularly if it is of a sensitive nature, is vitally important. Data
breaches not only lead to compensation and regulatory fines, but can leave lasting
reputational damage.
Mobility – VPNs give businesses the security to share their resources with employees
and partners that are not based in the office at all times. This can provide a huge boost to
productivity by ensuring that staff are not tethered to traditional office working times and
locations. Organisations have also begun using VPNs to outsource their work, enabling
them to lower internal staff costs.
Cost – Virtual private networks can prove much more affordable than a physical private
network. Rather than having to lease long distance network connections to achieve a
secure transfer of data, businesses use the existing public network to facilitate their VPN.
1c. Bridge
In networking terms, a bridge filters and forwards packets by physical address. Bridges operate
at the Network Access Layer in the TCP/IP protocol stack.
Hub
Definition: A connectivity device to which network cables are attached to form a network
segment. Hubs typically do not filter data, but instead retransmit incoming data packets or frames
to all parts.
Almost all networks today use a central hub or switch to which the computers on the network
connect. In a hubbed network, each computer is connected to the hub through a single line. That
makes adding a host to the network, or taking it off, a simple task.
Switch
Definition: A switch is aware of addresses associated with each of its ports and forwards each
incoming data frame to the correct port. Switches can base forwarding decisions on guidelines
that are provided in the headers of the TCP/IP protocols.
A switch, simplified, is a smarter version of a hub. On a switch, as with a hub, each computer is
connected through a single line. However, the switch is smarter about where it sends data that
comes in through one of its ports.
Router
Defined: A connectivity device that filters and forwards data based on a logical address. In the
case of TCP/IP networks, that would be the IP address.
Routers are an essential part of any larger TCP/IP network. In fact, without the development of
network routers and TCP/IP routing protocols, the Internet (the biggest network in the world)
would not have become as extensive. Routers play a vital role in controlling traffic and keeping
the network efficient.
1d. Stands for "World Wide Web Consortium." The W3C is an international community that
includes a full-time staff, industry experts, and several member organizations. These groups
work together to develop standards for the World Wide Web.
The mission of the W3C is to lead the Web to its full potential by developing relevant protocols
and guidelines. This is achieved primarily by creating and publishing Web standards
Continuation
To make a file visible to everyone on the internet, you will need to upload it.
When users are copying this file to their computer, they are downloading it.
Protocol
A protocol is a standard set of rules that allow electronic devices to communicate with each
other. These rules include what type of data may be transmitted, what commands are used to
send and receive data, and how data transfers are confirmed.
You can think of a protocol as a spoken language. Each language has its own rules and
vocabulary. If two people share the same language, they can communicate effectively. Similarly,
if two hardware devices support the same protocol, they can communicate with each other,
regardless of the manufacturer or type of device. For example, an Apple iPhone can send an
email to an Android device using a standard mail protocol. A Windows-based PC can load a
webpage from a Unix-based web server using a standard web protocol.
2b. intranet.
Intranet
An intranet is a private network that can only be accessed by authorized users. The prefix "intra"
means "internal" and therefore implies an intranet is designed for internal communications.
"Inter" (as in Internet) means "between" or "among." Since there is only one Internet, the word
"Internet" is capitalized.
Not to be confused with the Internet.
2c
What is an Extranet?
Extranet Example
FPS is a large shipping company specializing in transporting packages and other goods. FPS has
several customers, one of which is the XYZ Corporation, who ships many products to their
customers. XYZ Corporation requires detailed shipping reports and associated documentation.
FPS does have a website on the internet that everyone can use to track packages, but the website
does not offer the level of detail or meet XYZ's privacy requirements. XYZ needs the ability to
access reports detailing all packages shipped, by whom, and package receipt data. To meet their
customer's needs, FPS creates an extranet that requires a special login. The extranet offers XYZ
Corporation access to their own detailed proprietary reports and related shipping documentation.
Extranet Diagram
2d.
he World Wide Web is another way to describe the Internet, which is a network of computers
which are connected and that share information and allow communication around the world.
An example of the World Wide Web is the Internet.
2e.
A web browser is a software application that people use in order to view web pages on the internet. It
can be used to upload or download files on FTP servers. It uses security methods such as SSL and TLS to
secure internet traffic. It also uses cookies to store information and it caches web pages to make
internet surfing more efficiently.
Search engine,
A search engine is software, usually accessed on the Internet, that searches a database of
information according to the user's query. The engine provides a list of results that best match
what the user is trying to find. Today, there are many different search engines available on the
Internet, each with their own abilities and features. The first search engine ever developed is
considered Archie, which was used to search for FTP files and the first text-based search engine
is considered Veronica. Today, the most popular and well-known search engine is Google. Other
popular search engines include AOL, Ask.com, Baidu, Bing, and Yahoo.
2f
A network architecture that distributes intelligence and responsibilities at several levels, with
some machines designated as servers to serve the needs of client machines. A server can be a
mainframe, minicomputer, or personal computer that operates in a time-sharing mode to provide
for the needs of many clients. Client machines are complete, standalone computers that optimize
the user interface, relying on servers to handle the more mundane tasks associated with
application and file storage, network administration, security, and other critical functions. See
also peer-to-peer.
A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers'
HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.
The process is an example of the client/server model. All computers that host Web sites must
have Web server programs. Leading Web servers include Apache (the most widely-installed
Web server), Microsoft's Internet Information Server (IIS) and nginx (pronounced engine X)
from NGNIX. Other Web servers include Novell's NetWare server, Google Web Server (GWS)
and IBM's family of Domino servers.
Web servers often come as part of a larger package of Internet- and intranet-related programs for
serving email, downloading requests for File Transfer Protocol (FTP) files, and building and
publishing Web pages. Considerations in choosing a Web server include how well it works with
the operating system and other servers, its ability to handle server-side programming, security
characteristics, and the particular publishing, search engine and site building tools that come
with it.
3g.
E-mail
Short for electronic mail, e-mail or email is information stored on a computer that is exchanged
between two users over telecommunications. More plainly, e-mail is a message that may contain
text, files, images, or other attachments sent through a network to a specified individual or group
of individuals.
3h.
URL
End users use URLs by typing them directly into the address bar of a browser or by clicking a
hyperlink found on a webpage, bookmark list, in an email or from another application.