You are on page 1of 22

Chapter 3:

Basic Computer Network


Concepts
Networks #1
 Vary in size, number, and location of connected computers
o Local area network (LAN)
o Wide area network (WAN)
o Campus area network (CAN)
o Metropolitan area network (MAN)
 Architecture
o Peer-to-peer network
o Client/server architecture (seen in healthcare agencies)
 Three types for Internet use:
o Intranet, extranet, and virtual private network

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Networks #2
 Connection
o Hardwired
o Wireless (node–router to pick up signals and transmit
to the central server and back to the computer)
 Modem and router
 Protocols (agreements on how data will be exchanged
between participating computers)
o Internet protocol (IP; computers find each other)
o Transmission control protocol (TCP; controls tasks of
data transmission)
o File transfer protocol (FTP; download files)

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Networks #3
 Network authentication
o A standard for home and work computer networks.
o All users must enter the authentication code to
access a secure Wi-Fi network.

 Network connection speed


o Broadband

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Internet #1
 Network of networks

 Initially devised as a means of communication that would


survive nuclear war and provide the most economical use
from then-scarce large computer resources

 Open architecture networking

 Internet service provider (ISP) provides access to


Internet

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Question #1
 Is the following statement true or false?

 The Internet protocol controls data transmission.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Answer to Question #1
 False

 Rationale: The Internet protocol (IP) is the way


computers find each other. The transmission control
protocol (TCP) controls data transfer tasks.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Internet #2
 IP address
o Static: same each time computer is logged on
o Dynamic: changes each time
 Internet domains
o Educational: edu
o Military: mil
o Government source: gov
o Nonprofit organization: org
o Commercial enterprise: com
o Network, often an ISP provider: net

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Internet #3
 Connections to Internet
o Telephone via modem (dial-up or POTS)
o Broadband
 Fiber-optic cable
 Digital subscriber lines (DSL)
 TV cable connection
 Satellite (broadband connections in areas without
DSL or cable)

 Network neutrality

Copyright © 2019 Wolters Kluwer · All Rights Reserved


World Wide Web #1
 Part of the Internet
 Huge worldwide library
 Based on a set of protocols and conventions
 Files created using language: hypertext markup language
(HTML)
 Web browser
o Tool that enables users to retrieve and display files
from the Web
o Transmission protocol: hypertext transfer protocol
(HTTP)

Copyright © 2019 Wolters Kluwer · All Rights Reserved


World Wide Web #2
 Markup languages
o Hypertext markup language (HTML)
o Extensible markup language (XML): tags that define
the meaning of data, making it easier to find
information within a document, database, or website
 Web navigation
o Universal resource locators (URLs): address; most
start with http:
o Browsers and search engines
o Troubleshooting

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Question #2
 Which of the following allows you to choose a search
engine?
A. URL

B. HTTP

C. Web browser

D. Home page

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Answer to Question #2
 C. Web browser

 Rationale: The web browser is the tool that enables the


user to retrieve and display files from the Web. The home
page of the website is the primary starting point of the
site. The URL is the address of the website. HTTP is the
transmission protocol, and often the web address starts
with this.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


World Wide Web #3
 Other web page tools
o Active server page (ASP)
o Java and Java script
o Active X and Active X control
 Rich Internet application (RIA)
 Favorites (bookmarks)
 Secure web pages
 Web cookies (collection of data sent to your computer by
some websites); generally make using the Web more
convenient

Copyright © 2019 Wolters Kluwer · All Rights Reserved


World Wide Web #4
 Plug-ins/helpers
o Helper program for a browser
o Example: Adobe Acrobat Reader

 Streaming
o Delivering information via audio or video
o See or hear before entire file downloaded

Copyright © 2019 Wolters Kluwer · All Rights Reserved


WWW Technology: Other Uses
 Intranet: private network using HTML-formatted
documents and TCP/IP protocols; cost-effective way to
share information within agencies

 Extranet: extension of intranet with added security


features

 Virtual private network (VPN)

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Online Security #1
 Computer malware: all forms of software designed
specifically to damage or disrupt a system
 Botnets: networks of computers that have been hijacked
by a malware virus or worm
 Phishing: Web scam involving e-mail message with
hyperlink to confirm account or some task that will reveal
personal information
 Pharming: Web scam involving an attacker infiltrating a
domain name server and changing the routing address
 Ransomware: lockscreen and encryption

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Online Security #2
 Computer viruses
o E-mail virus
o Worm: uses security holes and computer networks to
replicate
o Trojan horse

 Adware: not usually malicious.

 Spyware: tracks Web surfing; some adware is spyware.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Question #3
 Is the following statement true or false?

 Phishing involves a scam that attacks the domain name


server to change the routing address.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Answer to Question #3
 False

 Rationale: Phishing is a web scam involving an e-mail


message containing a hyperlink for the reader to confirm
an account or do some task that will reveal personal
information. Pharming is a web scam that involves an
attack on the domain name server.

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Online Security #3
 Protection against malware
o Firewalls: block destructive forces
o Antivirus software
o Hoaxes
o Urban legends

 Security pitfalls

Copyright © 2019 Wolters Kluwer · All Rights Reserved


Online Security #4
 Hoaxes
o Virus hoaxes
o Urban legends
o Damaging hoaxes: for example, tragic consequences,
gifts of money, protection from a virus, saying that it
is not a hoax, multiple spelling or grammatical errors,
asking to forward the message, multiple forwarding
already

Copyright © 2019 Wolters Kluwer · All Rights Reserved

You might also like