You are on page 1of 21

NETWORKING ESSENTIALS

INTERNET CONNECTION GETTING ONLINE


1.1.2 Who Owns “The Internet”?

The internet is not owned by any individual or group. The internet is


a worldwide collection of interconnected networks (internetwork or
internet for short), cooperating with each other to exchange
information using common standards. Through telephone wires,
fiber-optic cables, wireless transmissions, and satellite links,
internet users can exchange information in a variety of forms, as
Intelligent networks allow handheld devices to receive news and emails,
and to send text, Video conferencing instantly connects people around
the globe, Phones connect globally to share voice, text, and images,
nline gaming connects thousands of people seamlessly.

Everything that you access online is located somewhere on the


global internet. Social media sites, multiplayer games, messaging
centers that provide email, online courses — all of these internet
destinations are connected to local networks that send and receive
information through the internet.

Think about all of the interactions that you have during the day
which require you to be online.

Local Networks
Local networks come in all sizes. They can range from simple
networks consisting of two computers, to networks connecting
hundreds of thousands of devices. Networks installed in small
offices, or homes and home offices, are referred to as small
office/home office (SOHO) networks. SOHO networks let you share
resources such as printers, documents, pictures, and music,
between a few local users.
In business, large networks can be used to advertise and sell
products, order supplies, and communicate with customers.
Communication over a network is usually more efficient and less
expensive than traditional forms of communication, such as regular
mail or long distance phone calls. Networks allow for rapid
communication such as email and instant messaging, and provide
consolidation and access to information stored on network servers.

Business and SOHO networks usually provide a shared connection


to the internet. The internet is considered a "network of networks"
because it is literally made up of thousands of local networks that
are connected to each other.

Small Home Networks


Small home networks connect a few computers to each other and
to the internet.

Small Office and Home Office Networks


The SOHO network allows computers in a home office or a remote
office to connect to a corporate network, or access centralized,
shared resources.

Medium to Large Networks


Medium to large networks, such as those used by corporations and
schools, can have many locations with hundreds or thousands of
interconnected hosts.

World Wide Networks


The internet is a network of networks that connects hundreds of
millions of computers world-wide.

1.1.5 Mobile Devices


The internet connects more computing devices than just desktop
and laptop computers. There are devices all around that you may
interact with on a daily basis that are also connected to the internet.
These include mobile devices, home devices, and a variety of other
connected devices.

Smartphone
Smartphones are able to connect to the Internet from almost
anywhere. Smart phones combine the functions of many different
products together, such as a telephone, camera, GPS receiver,
media player, and touch screen computer.

Tablet
Tablets, like smartphones, also have the functionality of multiple
devices. With the additional screen size, they are ideal for watching
videos and reading magazines or books. With on-screen
keyboards, users are able to do many of the things they used to do
on their laptop computer, such as composing emails or browsing
the web.

Smartwatch
A smartwatch can connect to a smart phone to provide the user
with alerts and messages. Additional functions, such as heart rate
monitoring and counting steps, like a pedometer, can help people
who are wearing the device to track their health.

Smart Glasses
A wearable computer in the form of glasses, such as Google Glass,
contains a tiny screen that displays information to the wearer in a
similar fashion to the Head-Up Display (HUD) of a fighter pilot. A
small touch pad on the side allows the user to navigate menus
while still being able to see through the smart glasses.

1.1.6 Connected Home Devices


List of expandable sections. Select each button to expand the content.

Many of the things in your home can also be connected to the


internet so that they can be monitored and configured remotely.
Click below to learn more about connected household devices.

Security System

Many of the items in a home, such as security systems, lighting,


and climate controls, can be monitored and configured remotely
using a mobile device.
Appliances

Household appliances such as refrigerators, ovens, and


dishwashers can be connected to the Internet. This allows the
homeowner to power them on or off, monitor the status of the
appliance, and also be alerted to preset conditions, such as when
the temperature in the refrigerator rises above an acceptable level.
Smart TV

A smart TV can be connected to the Internet to access content


without the need for TV service provider equipment. Also, a smart
TV can allow a user to browse the web, compose email, or display
video, audio, or photos stored on a computer.
Gaming Console

Gaming consoles can connect to the internet to download games


and play with friends online.

1.1.7 Other Connected Devices

List of expandable sections. Select each button to expand the


content.
There are also many connected devices found in the world outside
your home that provide convenience and useful, or even vital,
information.

Click below to learn more about these commonly found connected


devices.

Smart Cars
Many modern cars can connect to the Internet to access maps,
audio and video content, or information about a destination. They
can even send a text message or email if there is an attempted theft
or call for assistance in case of an accident. These cars can also
connect to smart phones and tablets to display information about
the different engine systems, provide maintenance alerts, or display
the status of the security system.

RFID Tags

Radio frequency identification (RFIDs) tags can be placed in or on


objects to track them or monitor sensors for many conditions.
Sensors and Actuators

Connected sensors can provide temperature, humidity, wind speed,


barometric pressure, and soil moisture data. Actuators can then be
automatically triggered based on current conditions. For example, a
smart sensor can periodically send soil moisture data to a
monitoring station. The monitoring station can then send a signal to
an actuator to begin watering. The sensor will continue to send soil
moisture data allowing the monitoring station to determine when to
deactivate the actuator.
Medical Devices

Medical devices such as pacemakers, insulin pumps, and hospital


monitors provide users or medical professionals with direct
feedback or alerts when vital signs are at specific levels.

1.2 Data Transmission

1.2.2 Types of Personal Data

We hear about data all of the time. Customer data, personal data,
health data, census data, but what exactly is data? Perhaps the
simplest definition of data is that data is a value that represents
something. In the physical world, we represent data as numbers,
formulas, alphabetic characters, and pictures. Think about all of the
data that exists just about you. Some examples include birth
records, baby pictures, school records, and health records.

Most people use networks to transmit their data in order to share


with others, or for long-term storage. Every time you hit “send” or
“share” in an app or computer application, you are telling your
device to send your data to a destination somewhere on the
network. Sometimes, data is being sent by your devices and you
may not even be aware that this is happening. Examples of this are
when you set up an automatic backup utility, or when your device
automatically searches for the router in a Wi-Fi hotspot.

The following categories are used to classify types of personal data:

 Volunteered data - This is created and explicitly shared by


individuals, such as social network profiles. This type of data
might include video files, pictures, text or audio files.
 Observed data - This is captured by recording the actions of
individuals, such as location data when using cell phones.
 Inferred data - This is data such as a credit score, which is
based on analysis of volunteered or observed data.

1.2.3 The Bit

Did you know that computers and networks only work with binary
digits, zeros and ones? It can be difficult to imagine that all of our
data is stored and transmitted as a series of bits. Each bit can only
have one of two possible values, 0 or 1. The term bit is an
abbreviation of “binary digit” and represents the smallest piece of
data. Humans interpret words and pictures, computers interpret
only patterns of bits.

A bit is stored and transmitted as one of two possible discrete


states. This can include two directions of magnetization, two distinct
voltage or current levels, two distinct levels of light intensity, or any
other physical system of two discrete states. For example, a light
switch can be either On or Off; in binary representation, these
states would correspond to 1 and 0 respectively.
Every input device (mouse, keyboard, voice-activated receiver) will
translate human interaction into binary code for the CPU to process
and store. Every output device (printer, speakers, monitors, etc.)
will take binary data and translate it back into human recognizable
form. Within the computer itself, all data is processed and stored as
binary.

Computers use binary codes to represent and interpret letters,


numbers and special characters with bits. A commonly used code is
the American Standard Code for Information Interchange (ASCII).
With ASCII, each character is represented by eight bits. For
example:

Capital letter: A = 01000001


Number: 9 = 00111001
Special character: # = 00100011
Each group of eight bits, such as the representations of letters and
numbers, is known as a byte.

Codes can be used to represent almost any type of information


digitally including computer data, graphics, photos, voice, video,
and music.

In the figure, enter up to five characters in the Characters field, then


click the Show Me button to see the ASCII bit translation. Click
Reset to enter a different group of characters.

1.2.4 Common Methods of Data Transmission

After the data is transformed into a series of bits, it must be


converted into signals that can be sent across the network media to
its destination. Media refers to the physical medium on which the
signals are transmitted. Examples of media are copper wire, fiber-
optic cable, and electromagnetic waves through the air. A signal
consists of electrical or optical patterns that are transmitted from
one connected device to another. These patterns represent the
digital bits (i.e. the data) and travel across the media from source to
destination as either a series of pulses of electricity, pulses of light,
or radio waves. Signals may be converted many times before
ultimately reaching the destination, as corresponding media
changes between source and destination.

There are three common methods of signal transmission used in


networks:

 Electrical signals - Transmission is achieved by representing


data as electrical pulses on copper wire.
 Optical signals - Transmission is achieved by converting the
electrical signals into light pulses.
 Wireless signals - Transmission is achieved by using
infrared, microwave, or radio waves through the air.

Click Play in the figure to see an animation of the three types of


signal transmissions.

In most homes and small businesses, network signals are


transmitted across copper wires (cables) or Wi-Fi enabled wireless
connections. Larger networks employ fiber-optic cables in order to
reliably carry signals for longer distances.
Bandwidth and Throughput

1.3.1 Bandwidth
Streaming a movie or playing a multiplayer game requires reliable,
fast connections. To support these “high bandwidth” applications,
networks have to be capable of transmitting and receiving bits at a
very high rate.

Different physical media support the transfer of bits at different


speeds. The rate of data transfer is usually discussed in terms of
bandwidth and throughput.

Bandwidth is the capacity of a medium to carry data. Digital


bandwidth measures the amount of data that can flow from one
place to another in a given amount of time. Bandwidth is typically
measured in the number of bits that (theoretically) can be sent
across the media in a second. Common bandwidth measurements
are as follows:

Thousands of bits per second (Kbps)


Millions of bits per second (Mbps)
Billions of bits per second (Gbps)
Physical media properties, current technologies, and the laws of
physics all play a role in determining available bandwidth.

The table shows the commonly used units of measure for


bandwidth

Unit of Bandwidth Abbreviation Equivalence


Bits per second bps 1 bps = fundamental unit of bandwidth
Kilobits per second Kbps 1 Kbps = 1,000 bps = 103 bps
Megabits per second Mbps 1 Mbps = 1,000,000 bps = 106 bps
Gigabits per second Gbps 1 Gbps = 1,000,000,000 bps = 109 bps
Terabits per second Tbps 1 Tbps = 1,000,000,000,000 bps = 1012 bps

1.3.3 Throughput
Like bandwidth, throughput is the measure of the transfer of bits
across the media over a given period of time. However, due to a
number of factors, throughput does not usually match the specified
bandwidth. Many factors influence throughput including:

The amount of data being sent and received over the connection

The types of data being transmitted

The latency created by the number of network devices encountered


between source and destination

Latency refers to the amount of time, including delays, for data to


travel from one given point to another.

Throughput measurements do not take into account the validity or


usefulness of the bits being transmitted and received. Many
messages received through the network are not destined for
specific user applications. An example would be network control
messages that regulate traffic and correct errors.

In an internetwork or network with multiple segments, throughput


cannot be faster than the slowest link of the path from sending
device to the receiving device. Even if all or most of the segments
have high bandwidth, it will only take one segment in the path with
lower bandwidth to create a slowdown of the throughput of the
entire network.

There are many online speed tests that can reveal the throughput of
an internet connection.

Clients and Servers


1.4.1 Clients and Server Roles

All computers connected to a network that participate directly in


network communication are classified as hosts. Hosts can send and
receive messages on the network. In modern networks, computer
hosts can act as a client, a server, or both, as shown in the figure.
The software installed on the computer determines which role the
computer plays.

Servers are hosts that have software installed which enable them to
provide information, like email or web pages, to other hosts on the
network. Each service requires separate server software. For
example, a host requires web server software in order to provide
web services to the network. Every destination that you visit online
is provided to you by a server located somewhere on a network that
is connected to the global internet.

Clients are computer hosts that have software installed that enables
the hosts to request and display the information obtained from the
server. An example of client software is a web browser, such as
Internet Explorer, Safari, Mozilla Firefox, or Chrome.

Text Description
Emai The email server runs email server software. Clients use mail client software, such as Microsoft Outlook, to access
l email on the server.
The web server runs web server software. Clients use browser software, such as Windows Internet Explorer, to
Web
access web pages on the server.
The file server stores corporate and user files in a central location. The client devices access these files with client
File
software such as the Windows File Explorer.
1.4.2 Peer-to-Peer Networks
Client and server software usually run on separate computers, but it is
also possible for one computer to run both client and server software at
the same time. In small businesses and homes, many computers
function as the servers and clients on the network. This type of network
is called a peer-to-peer (P2P) network.

The simplest P2P network consists of two directly connected computers


using either a wired or wireless connection. Both computers are then
able to use this simple network to exchange data and services with each
other, acting as either a client or a server as necessary.

Multiple PCs can also be connected to create a larger P2P network, but
this requires a network device, such as a switch, to interconnect the
computers.

The main disadvantage of a P2P environment is that the performance of


a host can be slowed down if it is acting as both a client and a server at
the same time. The figure lists some of the advantages and
disadvantages of peer-to-peer networks.

In larger businesses, because of the potential for high amounts of


network traffic, it is often necessary to have dedicated servers to support
the number of service requests.

The advantages and disadvantages of P2P networking are summarized


in the figure.
The advantages of peer-to-peer networking:

 Easy to set up
 Less complex
 Lower cost because network devices and dedicated servers may
not be required
 Can be used for simple tasks such as transferring files and sharing
printers

The disadvantages of peer-to-peer networking:

 No centralized administration
 Not as secure
 All devices may act as both clients and servers which can slow
their performance

1.4.3 Peer-to-Peer Applications

A P2P application allows a device to act as both a client and a


server within the same communication, as shown in the figure. In
this model, every client is a server and every server is a client. P2P
applications require that each end device provide a user interface
and run a background service.
Some P2P applications use a hybrid system where resource
sharing is decentralized, but the indexes that point to resource
locations are stored in a centralized directory. In a hybrid system,
each peer accesses an index server to get the location of a
resource stored on another peer.

Both clients can simultaneously send and receive messages.

1.4.4 Multiple Roles in the Network

A computer with server software can provide services


simultaneously to one or many clients, as shown in the figure.

Additionally, a single computer can run multiple types of server


software. In a home or small business, it may be necessary for one
computer to act as a file server, a web server, and an email server.

A single computer can also run multiple types of client software.


There must be client software for every service required. With
multiple clients installed, a host can connect to multiple servers at
the same time. For example, a user can check email and view a
web page while instant messaging and listening to internet radio.
Network Components

1.5.2 Network Infrastructure

The path that a message takes from its source to destination can be
as simple as a single cable connecting one computer to another, or
as complex as a network that literally spans the globe. This network
infrastructure is the platform that supports the network. It provides
the stable and reliable channel over which our communications can
occur.

The network infrastructure contains three categories of hardware


components, as shown in the figure:

 End devices
 Intermediate devices
 Network media
Devices and media are the physical elements, or hardware, of the
network. Hardware is often the visible components of the network
platform such as a laptop, PC, switch, router, wireless access point,
or the cabling used to connect the devices. Occasionally, some
components may not be so visible. In the case of wireless media,
messages are transmitted through the air using invisible radio
frequencies or infrared waves.

Make a list of the network infrastructure components installed in


your home network. Include the cables or wireless access points
that provide your network connections.

1.5.3 End Devices

The network devices that people are most familiar with are called
end devices, or hosts. These devices form the interface between
users and the underlying communication network.
Some examples of end devices are as follows:

 Computers (workstations, laptops, file servers, web servers)


 Network printers
 Telephones and teleconferencing equipment
 Security cameras
 Mobile devices (such as smart phones, tablets, PDAs, and
wireless debit/credit card readers and barcode scanners)

An end device (or host) is either the source or destination of a


message transmitted over the network, as shown in the animation.
In order to uniquely identify hosts, addresses are used. When a
host initiates communication, it uses the address of the destination
host to specify where the message should be sent.

Click Play in the figure to see an animation of data flowing through


a network.

1.5.4 Lab - My Local Network


In this lab, you will complete the following objectives:

Record all the different network-attached devices in your home or


classroom.

Investigate how each device connects to the network to send and


receive information.

Create a diagram showing the topology of your network.

Label each device with its function within the network.

Communications in a Connected World


Summary

Network Types
The internet is a worldwide collection of interconnected networks,
cooperating with each other to exchange information using common
standards. Using the internet, we can exchange information through
telephone wires, fiber-optic cables, wireless transmissions, and
satellite links. The internet is considered a "network of networks"
because it is literally made up of thousands of local networks that
are connected to each other. The internet connects more computing
devices than just desktop and laptop computers. There are devices
all around that you may interact with on a daily basis that are also
connected to the internet.

Data Transmission

Volunteered data is created and explicitly shared by individuals,


such as social network profiles. Inferred data, such as a credit
score, is based on analysis of volunteered or observed data.
Observed data is captured by recording the actions of individuals,
such as location data when using cell phones. A bit can only have
one of two possible values, 0 or 1. Each group of eight bits, such as
the representations of letters and numbers, is known as a byte.
There are three common methods of signal transmission used in
networks: electrical, optical, and wireless.
Bandwidth and Throughput

The rate of data transfer is usually discussed in terms of bandwidth


and throughput. Bandwidth is typically measured in the number of
bits that (theoretically) can be sent across the media in a second.
Throughput measures the transfer of bits across the media over a
given period of time. Many factors influence throughput including
the amount of data being sent and received over the connection,
the types of data being transmitted, and the latency created by the
number of network devices encountered between source and
destination. Latency is the amount of time, including delays, for data
to travel from one given point to another.
Clients and Servers

Servers are hosts that have software installed that enable them to
provide information, like email or web pages, to other hosts on the
network. Clients are computer hosts that have software installed
that enable them to request and display the information obtained
from the server. In small businesses and homes, many computers
function as the servers and clients on the network. This type of
network is called a peer-to-peer (P2P) network. The simplest peer-
to-peer network consists of two directly connected computers using
either a wired or wireless connection. A P2P application allows a
device to act as both a client and a server within the same
communication. In this model, every client is a server and every
server is a client. In a home or small business, it may be necessary
for one computer to act as a file server, a web server, and an email
server. A single computer can also run multiple types of client
software. There must be client software for every service used.
Network Components

The network infrastructure contains three categories of hardware


components: intermediate devices, end devices, and network
media. Devices and media are the physical elements, or hardware,
of the network. Hardware is often the visible components of the
network platform such as a laptop, PC, switch, router, wireless
access point, or the cabling used to connect the devices. The
network devices that people are most familiar with are called end
devices, or hosts. These devices form the interface between users
and the underlying communication network. An end device (or host)
is either the source or destination of a message transmitted over
the network.

MODULE 2 - ONLINE CONNECTIONS

Introduction
2.0.1 Why Should I Take this Module?
Welcome to Online Connections!

Well, you know a bit about what it takes to create a network, including
the internet. But do you know all the ways to connect online? For
instance, how does your mobile phone connect? How do network
components work together? If you saw a diagram of your school’s
network, would you understand what you were looking at? Would you
like to? Then this module is for you!

2.0.2 What Will I Learn in this Module?

This module contains the following:

 6 Videos
 1 Lab
 2 Check Your Understanding activities
 1 Module Quiz

Module Title: Online Connections

Module Objective: Explain the basic requirements for getting


online.

Topic Title Topic Objective


Wireless Networks Describe the different types of networks used by cell phones and mobile devices.
Local Network Connections Describe the requirements for host connectivity.
Network Documentation Explain the importance of network documentation.

Wireless Networks

You might also like