SlideShare a Scribd company logo
IT Infrastructure and Network
Technologies
Midterm
Instructor: Mark John P. Lado
The classes of IPv4 addresses
The different classes of the IPv4 address are the
following:
1) Class A address
2) Class B address
3) Class C address
4) Class D address
5) Class E address
Class A Address
The first bit of the first octet is always set to zero. So
that the first octet ranges from 1 – 127. The class A
address only include IP starting from 1.x.x.x to
126.x.x.x. The IP range 127.x.x.x is reserved for loop
back IP addresses. The default subnet mask for class
A IP address is 255.0.0.0. This means it can have 126
networks (27-2) and 16777214 hosts (224-2).
Class B Address
Here the first two bits in the first two bits is set
to zero. Class B IP Addresses range from
128.0.x.x to 191.255.x.x. The default subnet
mask for Class B is 255.255.x.x. Class B has
16384 (214) Network addresses and 65534
(216-2) Host addresses.
Class C Address
The first octet of this class has its first 3 bits set
to 110. Class C IP addresses range from
192.0.0.x to 223.255.255.x. The default subnet
mask for Class C is 255.255.255.x. Class C
gives 2097152 (221) Network addresses and
254 (28-2) Host addresses.
Class D Address
Class D has IP address range from 224.0.0.0
to 239.255.255.255. Class D is reserved for
Multicasting. In multicasting data is not
intended for a particular host, but multiple ones.
That is why there is no need to extract host
address from the class D IP addresses. The
Class D does not have any subnet mask.
Class E Address
The class E IP addresses are reserved for
experimental purpose only for study. IP
addresses in the class E ranges from
240.0.0.0 to 255.255.255.254. This class too
is not equipped with any subnet mask
IPv4 and IPv6
How to determine whether the IP
is version 4 or version 6?
IPv4 and IPv6
Each number can be zero to 255.
For example for IPv4
1.160.10.240
IPv4 and IPv6
IPv6 addresses are 128-bit IP
address written in hexadecimal
and separated by colons.
IPv4 and IPv6
An example IPv6 address could be
written like this:
3ffe:1900:4545:3:200:f8ff:fe21:67cf
Self Check
1. There are how many classes of IPv4?
2. What are those classes?
3. In the Class A IP Address, the first bit of the
first octet is always set to what number?
4. In the Class A IP Address, the first octet
ranges from 1 to?
Self Check
5. The 127 in Class A IP Address is reserved
for?
The Internet Etiquette
Visiting a province or another country
would require you learn its culture. What
do you think should you learn first if you
are to successfully interact with the
locals?
The Internet Etiquette
Etiquette is a standard that states the
conduct that you should carry when in
public or in a particular culture. Etiquette
serves as your ticket for entering the gate
of a new culture.
The Internet Etiquette
It may take a long time before you can
actually travel on your own but getting into the
Internet community would simply require you
a computer and an Internet connection.
Although simple as it may seem, the Internet
community actually has its own culture that
you need to abide by.
Netiquette - Activity
What do you think are the things you should do
in order to be able to interact smoothly with
other people in the Internet?
Create your own rules that you think are
important for each category for the next slide.
Netiquette - Activity
1. E-mail
2. Forums
3. Chat
4. General Internet Use
Netiquette - Activity
Form groups with 4 members each. Present
your work to the other members. They shall do
the same. Make sure that you listen carefully
and find out if your ideas are similar or different
from your group mates’. Afterwards, the group
should be able to combine all the ideas of the
members on Internet etiquette.
Netiquette - Activity
Each group should present their ideas by
discussing their output to the entire class. Each
members should listen carefully to the reporter
to find out which of their ideas are similar.
The Core Rules of Netiquette
1. Remember the human.
2. Adhere to the same standards of behavior
online that you follow in real life.
3. Know where you are in cyberspace.
4. Respect other people's time and bandwidth.
The Core Rules of Netiquette
5. Make yourself look good online.
6. Share expert knowledge.
7. Help keep flame wars under control.
8. Respect other people's privacy.
The Core Rules of Netiquette
9. Don't abuse your power.
10. Be forgiving of other people's
mistakes.
What is Computer Networks?
Computer Networks
Modern world scenario is ever changing.
Data Communication and network have
changed the way business and other
daily affair works. Now, they highly rely
on computer networks and internetwork.
Computer Networks
A set of devices often mentioned as
nodes connected by media link is
called a Network.
Computer Networks
A node can be a device which is capable of
sending or receiving data generated by other
nodes on the network like a computer, printer
etc. These links connecting the devices are
called Communication channels.
Computer Networks
Computer network is a telecommunication
channel using which we can share data with
other computers or devices, connected to the
same network. It is also called Data Network.
The best example of computer network is
Internet.
In a network there must be a criteria,
what do you think are those?
Give at least three.
A network must be able to meet certain
criteria’s, these are mentioned below:
Performance
Reliability
Security
Computer Networks: Performance
It can be measured in the following ways:
Transit time : It is the time taken to travel a
message from one device to another.
Response time : It is defined as the time
elapsed between enquiry and response.
Computer Networks: Performance
Other ways to measure performance are :
Efficiency of software
Number of users
Capability of connected hardware
Computer Networks: Reliability
It decides the frequency at which
network failure take place. More the
failures are, less is the network's
reliability.
Computer Networks: Security
It refers to the protection of data from any
unauthorized user or access. While travelling
through network, data passes many layers of
network, and data can be traced if
attempted. Hence security is also a very
important characteristic for Networks.
Self Check
1. What are the three criteria's on a
network?
2. Is a set of devices often mentioned as
nodes connected by media link is called
what?
Self Check
3. Elaborate each criteria on a network;
A. Performance
B. Reliability
C. Security
Properties of a Good Network
Properties of a Good Network
Interpersonal Communication:
We can communicate with each other
efficiently and easily.
Example: emails, chat rooms, video
conferencing etc., all of these are possible
because of computer networks.
Properties of a Good Network
Resources can be shared:
We can share physical resources by
making them available on a network such
as printers, scanners etc.
Properties of a Good Network
Sharing files, data: Authorized users
are allowed to share the files on the
network.
Basic Communication Model
Basic Communication Model
A Communication model is used to
exchange data between two parties.
For example:
communication between a computer,
server and telephone (through modem).
Basic Communication Model
Basic Communication Model
Source
Data to be transmitted is generated by
this device, example: telephones,
personal computers etc.
Basic Communication Model
Transmitter
The data generated by the source system is
not directly transmitted in the form its
generated. The transmitter transforms and
encodes the data in such a form to produce
electromagnetic waves or signals.
Basic Communication Model
Transmission System
A transmission system can be a single
transmission line or a complex network
connecting source and destination.
Basic Communication Model
Receiver
Receiver accepts the signal from the
transmission system and converts it into a
form which is easily managed by the
destination device.
Basic Communication Model
Destination
Destination receives the incoming data
from the receiver.
Self Check
On a clean ½ cross wise yellow
pad paper. Answer the following.
Self Check
1. Discuss the following properties of a good
network.
A. Interpersonal Communication
B. Resources can be shared
C. Sharing files, data
Self Check
2. What is a Communication model?
3. Draw the flow of the basic communication
model.
Self Check
4. Define the following in communication model.
A. Source
B. Transmitter
C. Transmission System
D. Receiver
E. Destination
Data Communication
Data Communication
The exchange of data between two
devices through a transmission medium
is called Data Communication. The
data is exchanged in the form
of 0's and 1's.
Data Communication
For data communication to occur, the
communication device must be a part of a
communication system. Data Communication
has two types - Local and Remote which are
discussed in the next slide:
Data Communication
Local
Local communication takes place when
the communicating devices are in the
same geographical area, same building,
or face-to-face etc.
Data Communication
Remote
Remote communication takes place over
a distance i.e. the devices are farther.
Data Communication: Remote
The effectiveness of a data communication can
be measured through the following features :
Delivery: Delivery should be done to the
correct destination.
Timeliness: Delivery should be on time.
Accuracy: Data delivered should be accurate.
Components of Data
Communication
Components of Data Communication
Message: It is the information to be
delivered.
Sender: Sender is the person who is
sending the message.
Receiver: Receiver is the person to
whom the message is being sent to.
Components of Data Communication
Medium: It is the medium through which
the message is sent. For example: A
Modem.
Protocol: These are some set of rules
which govern data communication.
Self Check
On a clean ½ cross wise yellow
pad paper. Answer the following.
Self Check
1. What is Data Communication?
2. What are the two types of Data
Communication?
Self Check
3. Define Local in Data Communication
4. Give a concise discussion of Remote in
Data Communication
Self Check
5. Give the five Components of Data
Communication.
Line Configuration in Computer
Networks
Line Configuration in Computer
Networks
A Network is nothing but a connection
made through connection links between
two or more devices. Devices can be a
computer, printer or any other device that
is capable to send and receive data.
Line Configuration in Computer
Networks
There are two ways to connect the
devices:
Point-to-Point connection
Multipoint connection
Point-To-Point Connection
It is a protocol which is used as a
communication link between two devices.
It is simple to establish. The most
common example for Point-to-Point
connection (PPP) is a computer
connected by telephone line.
Point-To-Point Connection
We can connect the two devices by
means of a pair of wires or using a
microwave or satellite link.
Example: Point-to-Point connection
between remote control and Television for
changing the channels.
Point-To-Point Connection
Point-To-Point Connection
Multipoint Connection
It is also called Multidrop configuration. In
this connection two or more devices share
a single link.
Multipoint Connection
There are two kinds of Multipoint
Connections:
If the links are used simultaneously between
many devices, then it is spatially shared line
configuration.
If user takes turns while using the link, then it
is time shared (temporal) line configuration.
Multipoint Connection
Self Check
On a clean ½ cross wise yellow
pad paper. Answer the following.
Self Check
1. Give a brief and concise
discussion of what is Network.
Self Check
2. In the Line Configuration in
Computer Networks, what are the
two ways to connect the devices?
Self Check
3. Discuss and draw a diagram
A. Point-To-Point Connection
B. Multipoint Connection

More Related Content

PPTX
IT infrastructure and network technologies by Mark John Lado
PPTX
Module 1 - Introduction to system integration.pptx
DOCX
Activity proposal
PPTX
Internet Protocols
PPTX
Information Management
PPTX
Earthquake Hazards
PPTX
Permutation combination
PPTX
IT infrastructure and network technologies by Mark John Lado
Module 1 - Introduction to system integration.pptx
Activity proposal
Internet Protocols
Information Management
Earthquake Hazards
Permutation combination

What's hot (20)

PPTX
Network testing and debugging
DOCX
Networking tools
PPTX
Software and Networking tools
PPTX
CAT5 Cables
PPTX
L15 The Disadvantages of ICT.pptx
PDF
INFORMATION ASSURANCE AND SECURITY 1.pdf
PPTX
Network cable
PPT
Networking Fundamentals
PDF
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
PPT
BASIC CONCEPTS OF COMPUTER NETWORKS
PPTX
Trouble shooting a computer
PPT
Ethics in using computer
PDF
CSS L12 STRUCTURE OF COMPUTER NETWORK
PDF
ICT, the Self, and Society.pdf
PDF
Risks threats and vulnerabilities
PPTX
Network design
PPTX
Computer Networking.
PPTX
Troubleshooting Network and Network Utilities
PPT
Computer network
PDF
Css grade 11 week 3
Network testing and debugging
Networking tools
Software and Networking tools
CAT5 Cables
L15 The Disadvantages of ICT.pptx
INFORMATION ASSURANCE AND SECURITY 1.pdf
Network cable
Networking Fundamentals
CSS L17 - DOS COMMANDS IN COMPUTER NETWORKING
BASIC CONCEPTS OF COMPUTER NETWORKS
Trouble shooting a computer
Ethics in using computer
CSS L12 STRUCTURE OF COMPUTER NETWORK
ICT, the Self, and Society.pdf
Risks threats and vulnerabilities
Network design
Computer Networking.
Troubleshooting Network and Network Utilities
Computer network
Css grade 11 week 3
Ad

Similar to IT infrastructure and Network technologies for Midterm (20)

DOCX
Computer Worksheet Class 8 with answers
DOCX
Question 1The OSI model has seven layers where each layer pe.docx
PDF
Routers and Routing Basic Module 1
PDF
Q3-Week1_.pdf
DOCX
Punit kumar
DOCX
Mi0035 – computer networks
PPTX
Sept 2017 network standards and models
PPTX
Unit 1- Network Layer and Protocols-4.pptx
PPTX
ppt_dcn.pptx networks networks security of networks
PDF
Network File System Version 4.2
PPTX
Module 1 Internet of Things Introduction
PDF
ppt_dcn.pdf
PPTX
403983283sdsadsadsadasdsda-CCNA-PPT-pptx.pptx
PPTX
Introduction To Ethical Hacking
PDF
Solution Manual for Guide to Networking Essentials 6th Edition by Tomsho
PPT
Chapter 2
PPT
OSI Model.ppt
PPT
934 Ch1 Networks
PPTX
Computer Networking Notes Second Year Btech Engeeneering.pptx
PDF
OSI &TCP/IP Model
Computer Worksheet Class 8 with answers
Question 1The OSI model has seven layers where each layer pe.docx
Routers and Routing Basic Module 1
Q3-Week1_.pdf
Punit kumar
Mi0035 – computer networks
Sept 2017 network standards and models
Unit 1- Network Layer and Protocols-4.pptx
ppt_dcn.pptx networks networks security of networks
Network File System Version 4.2
Module 1 Internet of Things Introduction
ppt_dcn.pdf
403983283sdsadsadsadasdsda-CCNA-PPT-pptx.pptx
Introduction To Ethical Hacking
Solution Manual for Guide to Networking Essentials 6th Edition by Tomsho
Chapter 2
OSI Model.ppt
934 Ch1 Networks
Computer Networking Notes Second Year Btech Engeeneering.pptx
OSI &TCP/IP Model
Ad

More from Mark John Lado, MIT (20)

PDF
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
PDF
Optimizing Embedded System Device Communication with Network Topology Design
PDF
Embedded Systems IO Peripherals Wireless Communication.pdf
PDF
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
PDF
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
PDF
4 Module - Operating Systems Configuration and Use by Mark John Lado
PDF
3 Module - Operating Systems Configuration and Use by Mark John Lado
PDF
1 Module - Operating Systems Configuration and Use by Mark John Lado
PDF
2 Module - Operating Systems Configuration and Use by Mark John Lado
PPSX
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PPSX
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PPSX
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PPSX
Dart Programming Language by Mark John Lado
PPTX
What is CRUD in TPS?
PPSX
Computer hacking and security - Social Responsibility of IT Professional by M...
PDF
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PPTX
IT Security and Management - Security Policies
PPTX
Systems Administration - MARK JOHN LADO
PPTX
IT Security and Management - Prelim Lessons by Mark John Lado
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Optimizing Embedded System Device Communication with Network Topology Design
Embedded Systems IO Peripherals Wireless Communication.pdf
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
4 Module - Operating Systems Configuration and Use by Mark John Lado
3 Module - Operating Systems Configuration and Use by Mark John Lado
1 Module - Operating Systems Configuration and Use by Mark John Lado
2 Module - Operating Systems Configuration and Use by Mark John Lado
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Dart Programming Language by Mark John Lado
What is CRUD in TPS?
Computer hacking and security - Social Responsibility of IT Professional by M...
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Security Policies
Systems Administration - MARK JOHN LADO
IT Security and Management - Prelim Lessons by Mark John Lado

Recently uploaded (20)

PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Pharma ospi slides which help in ospi learning
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
master seminar digital applications in india
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Cell Structure & Organelles in detailed.
PDF
Business Ethics Teaching Materials for college
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
Basic Mud Logging Guide for educational purpose
Pharma ospi slides which help in ospi learning
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
Final Presentation General Medicine 03-08-2024.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
master seminar digital applications in india
Supply Chain Operations Speaking Notes -ICLT Program
Pharmacology of Heart Failure /Pharmacotherapy of CHF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Cell Structure & Organelles in detailed.
Business Ethics Teaching Materials for college
Renaissance Architecture: A Journey from Faith to Humanism
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Abdominal Access Techniques with Prof. Dr. R K Mishra

IT infrastructure and Network technologies for Midterm

  • 1. IT Infrastructure and Network Technologies Midterm Instructor: Mark John P. Lado
  • 2. The classes of IPv4 addresses The different classes of the IPv4 address are the following: 1) Class A address 2) Class B address 3) Class C address 4) Class D address 5) Class E address
  • 3. Class A Address The first bit of the first octet is always set to zero. So that the first octet ranges from 1 – 127. The class A address only include IP starting from 1.x.x.x to 126.x.x.x. The IP range 127.x.x.x is reserved for loop back IP addresses. The default subnet mask for class A IP address is 255.0.0.0. This means it can have 126 networks (27-2) and 16777214 hosts (224-2).
  • 4. Class B Address Here the first two bits in the first two bits is set to zero. Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The default subnet mask for Class B is 255.255.x.x. Class B has 16384 (214) Network addresses and 65534 (216-2) Host addresses.
  • 5. Class C Address The first octet of this class has its first 3 bits set to 110. Class C IP addresses range from 192.0.0.x to 223.255.255.x. The default subnet mask for Class C is 255.255.255.x. Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
  • 6. Class D Address Class D has IP address range from 224.0.0.0 to 239.255.255.255. Class D is reserved for Multicasting. In multicasting data is not intended for a particular host, but multiple ones. That is why there is no need to extract host address from the class D IP addresses. The Class D does not have any subnet mask.
  • 7. Class E Address The class E IP addresses are reserved for experimental purpose only for study. IP addresses in the class E ranges from 240.0.0.0 to 255.255.255.254. This class too is not equipped with any subnet mask
  • 8. IPv4 and IPv6 How to determine whether the IP is version 4 or version 6?
  • 9. IPv4 and IPv6 Each number can be zero to 255. For example for IPv4 1.160.10.240
  • 10. IPv4 and IPv6 IPv6 addresses are 128-bit IP address written in hexadecimal and separated by colons.
  • 11. IPv4 and IPv6 An example IPv6 address could be written like this: 3ffe:1900:4545:3:200:f8ff:fe21:67cf
  • 12. Self Check 1. There are how many classes of IPv4? 2. What are those classes? 3. In the Class A IP Address, the first bit of the first octet is always set to what number? 4. In the Class A IP Address, the first octet ranges from 1 to?
  • 13. Self Check 5. The 127 in Class A IP Address is reserved for?
  • 14. The Internet Etiquette Visiting a province or another country would require you learn its culture. What do you think should you learn first if you are to successfully interact with the locals?
  • 15. The Internet Etiquette Etiquette is a standard that states the conduct that you should carry when in public or in a particular culture. Etiquette serves as your ticket for entering the gate of a new culture.
  • 16. The Internet Etiquette It may take a long time before you can actually travel on your own but getting into the Internet community would simply require you a computer and an Internet connection. Although simple as it may seem, the Internet community actually has its own culture that you need to abide by.
  • 17. Netiquette - Activity What do you think are the things you should do in order to be able to interact smoothly with other people in the Internet? Create your own rules that you think are important for each category for the next slide.
  • 18. Netiquette - Activity 1. E-mail 2. Forums 3. Chat 4. General Internet Use
  • 19. Netiquette - Activity Form groups with 4 members each. Present your work to the other members. They shall do the same. Make sure that you listen carefully and find out if your ideas are similar or different from your group mates’. Afterwards, the group should be able to combine all the ideas of the members on Internet etiquette.
  • 20. Netiquette - Activity Each group should present their ideas by discussing their output to the entire class. Each members should listen carefully to the reporter to find out which of their ideas are similar.
  • 21. The Core Rules of Netiquette 1. Remember the human. 2. Adhere to the same standards of behavior online that you follow in real life. 3. Know where you are in cyberspace. 4. Respect other people's time and bandwidth.
  • 22. The Core Rules of Netiquette 5. Make yourself look good online. 6. Share expert knowledge. 7. Help keep flame wars under control. 8. Respect other people's privacy.
  • 23. The Core Rules of Netiquette 9. Don't abuse your power. 10. Be forgiving of other people's mistakes.
  • 24. What is Computer Networks?
  • 25. Computer Networks Modern world scenario is ever changing. Data Communication and network have changed the way business and other daily affair works. Now, they highly rely on computer networks and internetwork.
  • 26. Computer Networks A set of devices often mentioned as nodes connected by media link is called a Network.
  • 27. Computer Networks A node can be a device which is capable of sending or receiving data generated by other nodes on the network like a computer, printer etc. These links connecting the devices are called Communication channels.
  • 28. Computer Networks Computer network is a telecommunication channel using which we can share data with other computers or devices, connected to the same network. It is also called Data Network. The best example of computer network is Internet.
  • 29. In a network there must be a criteria, what do you think are those? Give at least three.
  • 30. A network must be able to meet certain criteria’s, these are mentioned below: Performance Reliability Security
  • 31. Computer Networks: Performance It can be measured in the following ways: Transit time : It is the time taken to travel a message from one device to another. Response time : It is defined as the time elapsed between enquiry and response.
  • 32. Computer Networks: Performance Other ways to measure performance are : Efficiency of software Number of users Capability of connected hardware
  • 33. Computer Networks: Reliability It decides the frequency at which network failure take place. More the failures are, less is the network's reliability.
  • 34. Computer Networks: Security It refers to the protection of data from any unauthorized user or access. While travelling through network, data passes many layers of network, and data can be traced if attempted. Hence security is also a very important characteristic for Networks.
  • 35. Self Check 1. What are the three criteria's on a network? 2. Is a set of devices often mentioned as nodes connected by media link is called what?
  • 36. Self Check 3. Elaborate each criteria on a network; A. Performance B. Reliability C. Security
  • 37. Properties of a Good Network
  • 38. Properties of a Good Network Interpersonal Communication: We can communicate with each other efficiently and easily. Example: emails, chat rooms, video conferencing etc., all of these are possible because of computer networks.
  • 39. Properties of a Good Network Resources can be shared: We can share physical resources by making them available on a network such as printers, scanners etc.
  • 40. Properties of a Good Network Sharing files, data: Authorized users are allowed to share the files on the network.
  • 42. Basic Communication Model A Communication model is used to exchange data between two parties. For example: communication between a computer, server and telephone (through modem).
  • 44. Basic Communication Model Source Data to be transmitted is generated by this device, example: telephones, personal computers etc.
  • 45. Basic Communication Model Transmitter The data generated by the source system is not directly transmitted in the form its generated. The transmitter transforms and encodes the data in such a form to produce electromagnetic waves or signals.
  • 46. Basic Communication Model Transmission System A transmission system can be a single transmission line or a complex network connecting source and destination.
  • 47. Basic Communication Model Receiver Receiver accepts the signal from the transmission system and converts it into a form which is easily managed by the destination device.
  • 48. Basic Communication Model Destination Destination receives the incoming data from the receiver.
  • 49. Self Check On a clean ½ cross wise yellow pad paper. Answer the following.
  • 50. Self Check 1. Discuss the following properties of a good network. A. Interpersonal Communication B. Resources can be shared C. Sharing files, data
  • 51. Self Check 2. What is a Communication model? 3. Draw the flow of the basic communication model.
  • 52. Self Check 4. Define the following in communication model. A. Source B. Transmitter C. Transmission System D. Receiver E. Destination
  • 54. Data Communication The exchange of data between two devices through a transmission medium is called Data Communication. The data is exchanged in the form of 0's and 1's.
  • 55. Data Communication For data communication to occur, the communication device must be a part of a communication system. Data Communication has two types - Local and Remote which are discussed in the next slide:
  • 56. Data Communication Local Local communication takes place when the communicating devices are in the same geographical area, same building, or face-to-face etc.
  • 57. Data Communication Remote Remote communication takes place over a distance i.e. the devices are farther.
  • 58. Data Communication: Remote The effectiveness of a data communication can be measured through the following features : Delivery: Delivery should be done to the correct destination. Timeliness: Delivery should be on time. Accuracy: Data delivered should be accurate.
  • 60. Components of Data Communication Message: It is the information to be delivered. Sender: Sender is the person who is sending the message. Receiver: Receiver is the person to whom the message is being sent to.
  • 61. Components of Data Communication Medium: It is the medium through which the message is sent. For example: A Modem. Protocol: These are some set of rules which govern data communication.
  • 62. Self Check On a clean ½ cross wise yellow pad paper. Answer the following.
  • 63. Self Check 1. What is Data Communication? 2. What are the two types of Data Communication?
  • 64. Self Check 3. Define Local in Data Communication 4. Give a concise discussion of Remote in Data Communication
  • 65. Self Check 5. Give the five Components of Data Communication.
  • 66. Line Configuration in Computer Networks
  • 67. Line Configuration in Computer Networks A Network is nothing but a connection made through connection links between two or more devices. Devices can be a computer, printer or any other device that is capable to send and receive data.
  • 68. Line Configuration in Computer Networks There are two ways to connect the devices: Point-to-Point connection Multipoint connection
  • 69. Point-To-Point Connection It is a protocol which is used as a communication link between two devices. It is simple to establish. The most common example for Point-to-Point connection (PPP) is a computer connected by telephone line.
  • 70. Point-To-Point Connection We can connect the two devices by means of a pair of wires or using a microwave or satellite link. Example: Point-to-Point connection between remote control and Television for changing the channels.
  • 73. Multipoint Connection It is also called Multidrop configuration. In this connection two or more devices share a single link.
  • 74. Multipoint Connection There are two kinds of Multipoint Connections: If the links are used simultaneously between many devices, then it is spatially shared line configuration. If user takes turns while using the link, then it is time shared (temporal) line configuration.
  • 76. Self Check On a clean ½ cross wise yellow pad paper. Answer the following.
  • 77. Self Check 1. Give a brief and concise discussion of what is Network.
  • 78. Self Check 2. In the Line Configuration in Computer Networks, what are the two ways to connect the devices?
  • 79. Self Check 3. Discuss and draw a diagram A. Point-To-Point Connection B. Multipoint Connection