You are on page 1of 12

Name: Jhayvie Francisco

Assignment in IT LEC
___________________________________________________________________________

1. Computer Network - is a group of computer systems and other computing hardware devices
that are linked together through communication channels to facilitate communication and
resource-sharing among a wide range of users. Networks are commonly categorized based on
their characteristics.
2. The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes
and standardizes the communication functions of a telecommunication or computing system
without regard to their underlying internal structure and technology. Its goal is the interoperability
of diverse communication systems with standard protocols. The model partitions a
communication system into abstraction layers. The original version of the model defined seven
layers.

A. Physical layer: Provides electrical, functional, and procedural characteristics to


activate, maintain, and deactivate physical links that transparently send the bit stream;
only recognises individual bits, not characters or multi character frames.
B. Data link layer: Provides functional and procedural means to transfer data between
network entities and (possibly) correct transmission errors; provides for activation,
maintenance, and deactivation of data link connections, grouping of bits into characters
and message frames, character and frame synchronisation, error control, media access
control, and flow control (examples include HDLC and Ethernet)
C. Network layer: Provides independence from data transfer technology and relaying and
routing considerations; masks peculiarities of data transfer medium from higher layers
and provides switching and routing functions to establish, maintain, and terminate
network layer connections and transfer data between users.
D. Transport layer: Provides transparent transfer of data between systems, relieving upper
layers from concern with providing reliable and cost effective data transfer; provides
end-to-end control and information interchange with quality of service needed by the
application program; first true end-to-end layer.
E. Session layer: Provides mechanisms for organising and structuring dialogues between
application processes; mechanisms allow for two-way simultaneous or two-way
alternate operation, establishment of major and minor synchronisation points, and
techniques for structuring data exchanges.
F. Presentation layer: Provides independence to application processes from differences in
data representation, That is, in syntax; syntax selection and conversion provided by
allowing the user to select a "presentation context" with conversion between alternative
contexts.
G. Application layer: Concerned with the requirements of application. All application
processes use the service elements provided by the application layer. The elements
include library routines which perform inter process communication, provide common
procedures for constructing application protocols and for accessing the services
provided by servers which reside on the network.
3. Centralization means having one focus of control. One might have two DNS servers in every
department of a company, but they all might be controlled by a single entity.
Alternatively, decentralized systems distribute control to many parts. In our DNS example, each
of those departments might maintain and control its own DNS server, being responsible for
maintaining the skill set to stay on top of the technology as it changes, to architect the systems as
it sees fit, and to monitor the service. Centralization refers to nontechnical control also.
Companies can structure IT in a centralized or decentralized manner. Centralization is an attempt
to improve efficiency by taking advantage of potential economies of scale: improving the
average; it may also improve reliability by minimizing opportunities for error. Decentralization is
an attempt to improve speed and flexibility by reorganizing to increase local control and
execution of a service: improving the best case. Neither is always better, and neither is always
possible in the purest sense.

4. Types of Networks
There are several different types of computer networks. Computer networks can be characterized by
their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices within
a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:

 Personal area network, or PAN


 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which means they are used
for everything from sending files to a printer to accessing the Internet. Some types of networks,
however, serve a very particular purpose. Some of the different networks based on their main purpose
are:

 Storage area network, or SAN


 Enterprise private network, or EPN
 Virtual private network, or VPN

5. Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer
network. Essentially, it is the topological. structure of a network and may be depicted physically
or logically. Physical topology is the placement of the various components of a network,
including device location and cable installation, while logical topology illustrates how data flows
within a network, regardless of its physical design. Distances between nodes, physical
interconnections, transmission rates, or signal types may differ between two networks, yet their
topologies may be identical.
6. Networking Standards

Standards play an important role in networking. Without standards, manufacturers of


networking products have no common ground on which to build their systems.
Interconnecting products from various vendors would be difficult, if not
impossible. Standardization can make or break networking products. These days many
vendors are hesitant to support new technology unless there is a standardization base from
which to work. Vendors want to know there will be some measure of interoperability for their
hardware and software. Otherwise, releasing a product could be a marketing nightmare if it is
not compatible with standards that are later embraced by the marketplace.

7. Network Devices

1) HUB
2) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
3) -Switches
4) -Bridges
5) Types of Bridges:
6) Transparent Bridge
7) Source Route Bridge
8) Translational Bridge
9) Switches superseding Bridges

10) -Routing tables


11) Static Routing
12) -Dynamic Routing
13) -Brouters
14) -Gateways
15) -Network card
16) -Network protocols
17) -Modems

8. Wireless is a more modern alternative to traditional wired networking that relies on cables to
connect networkable devices together. Wireless technologies are widely used in both home and
business computer networks.

Types of Wireless Network Technologies

 Wi-Fi, especially popular in home networks and as a wireless hotspot technology


 Bluetooth, for low power and embedded applications
 wireless home automation standards like Zig Bee and Z-Wave
9. broadband is a wide bandwidth data transmission with an ability to simultaneously transport
multiple signals and traffic types. The medium can be coaxial cable, optical fiber, radio or twisted
pair.

10. Types of Broadband


DSL (Digital Subscriber Line)
Also known as ADSL or SDSL, this is the most common type of broadband connection and is
delivered through your existing phone line. Unfortunately it requires a good quality phone line, a local
exchange to be “enabled” and you need to be located within a certain distance from the exchange.
This makes it quite limited and is not really an effective solution for much of rural Ireland.

Cable
If you already have cable TV then you live in an area served by a cable operator. You will need a
special modem to run alongside your TV box, and the operator will often bundle the cost of the TV
and Broadband connections together in a cost effective package.

Satellite

Satellite is generally considered to be the last resort for people living in remote areas. It requires the
installation of a special satellite dish and modem, and the equipment and line rentals are often
extremely expensive.

Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust connection across
rural areas and does not require a telephone line of any kind.

11. A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of the hard
drive; when this replication succeeds, the affected areas are then said to be "infected".

12. Data security means protecting data, such as a database, from destructive forces and from
the unwanted actions of unauthorized users.
Steaphen Garcia Bernardo
Assignment: IT Lec

1. Computer Network - is a group of computer systems and other computing hardware devices
that are linked together through communication channels to facilitate communication and
resource-sharing among a wide range of users. Networks are commonly categorized based on
their characteristics.
2. The Open Systems Interconnection model (OSI model) is a conceptual model that
characterizes and standardizes the communication functions of a telecommunication or
computing system without regard to their underlying internal structure and technology. Its
goal is the interoperability of diverse communication systems with standard protocols. The
model partitions a communication system into abstraction layers. The original version of the
model defined seven layers.

A. Physical layer: Provides electrical, functional, and procedural characteristics to


activate, maintain, and deactivate physical links that transparently send the bit stream;
only recognises individual bits, not characters or multi character frames.
B. Data link layer: Provides functional and procedural means to transfer data between
network entities and (possibly) correct transmission errors; provides for activation,
maintenance, and deactivation of data link connections, grouping of bits into
characters and message frames, character and frame synchronisation, error
control, media access control, and flow control (examples include HDLC and Ethernet)
C. Network layer: Provides independence from data transfer technology and relaying and
routing considerations; masks peculiarities of data transfer medium from higher layers
and provides switching and routing functions to establish, maintain, and terminate
network layer connections and transfer data between users.
D. Transport layer: Provides transparent transfer of data between systems, relieving
upper layers from concern with providing reliable and cost effective data transfer;
provides end-to-end control and information interchange with quality of service
needed by the application program; first true end-to-end layer.
E. Session layer: Provides mechanisms for organising and structuring dialogues between
application processes; mechanisms allow for two-way simultaneous or two-way
alternate operation, establishment of major and minor synchronisation points, and
techniques for structuring data exchanges.
F. Presentation layer: Provides independence to application processes from differences
in data representation, That is, in syntax; syntax selection and conversion provided by
allowing the user to select a "presentation context" with conversion between
alternative contexts.
G. Application layer: Concerned with the requirements of application. All application
processes use the service elements provided by the application layer. The elements
include library routines which perform inter process communication, provide common
procedures for constructing application protocols and for accessing the services
provided by servers which reside on the network.
3. Centralization means having one focus of control. One might have two DNS servers in every
department of a company, but they all might be controlled by a single entity.
Alternatively, decentralized systems distribute control to many parts. In our DNS example,
each of those departments might maintain and control its own DNS server, being responsible
for maintaining the skill set to stay on top of the technology as it changes, to architect the
systems as it sees fit, and to monitor the service. Centralization refers to nontechnical control
also. Companies can structure IT in a centralized or decentralized manner. Centralization is an
attempt to improve efficiency by taking advantage of potential economies of scale: improving
the average; it may also improve reliability by minimizing opportunities for error.
Decentralization is an attempt to improve speed and flexibility by reorganizing to increase
local control and execution of a service: improving the best case. Neither is always better,
and neither is always possible in the purest sense.

4. Types of Networks
There are several different types of computer networks. Computer networks can be characterized by
their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the number of
computers that are part of the network. Networks can cover anything from a handful of devices
within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:

 Personal area network, or PAN


 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which means they are used
for everything from sending files to a printer to accessing the Internet. Some types of networks,
however, serve a very particular purpose. Some of the different networks based on their main
purpose are:

 Storage area network, or SAN


 Enterprise private network, or EPN
 Virtual private network, or VPN

5. Network topology is the arrangement of the various elements (links, nodes, etc.) of
a computer network. Essentially, it is the topological. structure of a network and may be
depicted physically or logically. Physical topology is the placement of the various components
of a network, including device location and cable installation, while logical
topology illustrates how data flows within a network, regardless of its physical design.
Distances between nodes, physical interconnections, transmission rates, or signal types may
differ between two networks, yet their topologies may be identical.
6. Networking Standards

Standards play an important role in networking. Without standards, manufacturers of


networking products have no common ground on which to build their systems.
Interconnecting products from various vendors would be difficult, if not
impossible. Standardization can make or break networking products. These days many
vendors are hesitant to support new technology unless there is a standardization base from
which to work. Vendors want to know there will be some measure of interoperability for
their hardware and software. Otherwise, releasing a product could be a marketing
nightmare if it is not compatible with standards that are later embraced by the marketplace.

7. Network Devices

18) HUB
19) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
20) -Switches
21) -Bridges
22) Types of Bridges:
23) Transparent Bridge
24) Source Route Bridge
25) Translational Bridge
26) Switches superseding Bridges

27) -Routing tables


28) Static Routing
29) -Dynamic Routing
30) -Brouters
31) -Gateways
32) -Network card
33) -Network protocols
34) -Modems

8. Wireless is a more modern alternative to traditional wired networking that relies on cables to
connect networkable devices together. Wireless technologies are widely used in both home
and business computer networks.

Types of Wireless Network Technologies

 Wi-Fi, especially popular in home networks and as a wireless hotspot technology


 Bluetooth, for low power and embedded applications
 wireless home automation standards like Zig Bee and Z-Wave
9. broadband is a wide bandwidth data transmission with an ability to simultaneously transport
multiple signals and traffic types. The medium can be coaxial cable, optical
fiber, radio or twisted pair.

10. Types of Broadband


DSL (Digital Subscriber Line)
Also known as ADSL or SDSL, this is the most common type of broadband connection and is
delivered through your existing phone line. Unfortunately it requires a good quality phone line, a
local exchange to be “enabled” and you need to be located within a certain distance from the
exchange. This makes it quite limited and is not really an effective solution for much of rural Ireland.

Cable
If you already have cable TV then you live in an area served by a cable operator. You will need a
special modem to run alongside your TV box, and the operator will often bundle the cost of the TV
and Broadband connections together in a cost effective package.

Satellite

Satellite is generally considered to be the last resort for people living in remote areas. It requires the
installation of a special satellite dish and modem, and the equipment and line rentals are often
extremely expensive.

Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust connection across
rural areas and does not require a telephone line of any kind.

11. A computer virus is a malware program that, when executed, replicates by inserting copies of
itself (possibly modified) into other computer programs, data files, or the boot sector of
the hard drive; when this replication succeeds, the affected areas are then said to be
"infected".

12. Data security means protecting data, such as a database, from destructive forces and from
the unwanted actions of unauthorized users.
Name: Krista Vielka Cruz
Assignments

1. Computer Network - is a group of computer systems and other computing hardware


devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users. Networks are
commonly categorized based on their characteristics.
2. The Open Systems Interconnection model (OSI model) is a conceptual model that
characterizes and standardizes the communication functions of a telecommunication or
computing system without regard to their underlying internal structure and technology. Its
goal is the interoperability of diverse communication systems with standard protocols.
The model partitions a communication system into abstraction layers. The original
version of the model defined seven layers.

A. Physical layer: Provides electrical, functional, and procedural characteristics to


activate, maintain, and deactivate physical links that transparently send the bit
stream; only recognises individual bits, not characters or multi character frames.
B. Data link layer: Provides functional and procedural means to transfer data
between network entities and (possibly) correct transmission errors; provides
for activation, maintenance, and deactivation of data link connections,
grouping of bits into characters and message frames, character and frame
synchronisation, error control, media access control, and flow control
(examples include HDLC and Ethernet)
C. Network layer: Provides independence from data transfer technology and
relaying and routing considerations; masks peculiarities of data transfer
medium from higher layers and provides switching and routing functions to
establish, maintain, and terminate network layer connections and transfer data
between users.
D. Transport layer: Provides transparent transfer of data between systems,
relieving upper layers from concern with providing reliable and cost effective
data transfer; provides end-to-end control and information interchange with
quality of service needed by the application program; first true end-to-end
layer.
E. Session layer: Provides mechanisms for organising and structuring dialogues
between application processes; mechanisms allow for two-way simultaneous
or two-way alternate operation, establishment of major and minor
synchronisation points, and techniques for structuring data exchanges.
F. Presentation layer: Provides independence to application processes from
differences in data representation, That is, in syntax; syntax selection and
conversion provided by allowing the user to select a "presentation context"
with conversion between alternative contexts.
G. Application layer: Concerned with the requirements of application. All
application processes use the service elements provided by the application
layer. The elements include library routines which perform inter process
communication, provide common procedures for constructing application
protocols and for accessing the services provided by servers which reside on
the network.
3. Centralization means having one focus of control. One might have two DNS servers in
every department of a company, but they all might be controlled by a single entity.
Alternatively, decentralized systems distribute control to many parts. In our DNS
example, each of those departments might maintain and control its own DNS server,
being responsible for maintaining the skill set to stay on top of the technology as it
changes, to architect the systems as it sees fit, and to monitor the service. Centralization
refers to nontechnical control also. Companies can structure IT in a centralized or
decentralized manner. Centralization is an attempt to improve efficiency by taking
advantage of potential economies of scale: improving the average; it may also improve
reliability by minimizing opportunities for error. Decentralization is an attempt to improve
speed and flexibility by reorganizing to increase local control and execution of a service:
improving the best case. Neither is always better, and neither is always possible in the
purest sense.

4. Types of Networks
There are several different types of computer networks. Computer networks can be
characterized by their size as well as their purpose.
The size of a network can be expressed by the geographic area they occupy and the
number of computers that are part of the network. Networks can cover anything from a
handful of devices within a single room to millions of devices spread across the entire globe.
Some of the different networks based on size are:

 Personal area network, or PAN


 Local area network, or LAN
 Metropolitan area network, or MAN
 Wide area network, or WAN

In terms of purpose, many networks can be considered general purpose, which means they
are used for everything from sending files to a printer to accessing the Internet. Some types
of networks, however, serve a very particular purpose. Some of the different networks based
on their main purpose are:

 Storage area network, or SAN


 Enterprise private network, or EPN
 Virtual private network, or VPN

5. Network topology is the arrangement of the various elements (links, nodes, etc.) of
a computer network. Essentially, it is the topological. structure of a network and may be
depicted physically or logically. Physical topology is the placement of the various
components of a network, including device location and cable installation, while logical
topology illustrates how data flows within a network, regardless of its physical design.
Distances between nodes, physical interconnections, transmission rates, or signal types
may differ between two networks, yet their topologies may be identical.
6. Networking Standards

Standards play an important role in networking. Without standards, manufacturers of


networking products have no common ground on which to build their systems.
Interconnecting products from various vendors would be difficult, if not
impossible. Standardization can make or break networking products. These days
many vendors are hesitant to support new technology unless there is a
standardization base from which to work. Vendors want to know there will be some
measure of interoperability for their hardware and software. Otherwise, releasing a
product could be a marketing nightmare if it is not compatible with standards that are
later embraced by the marketplace.

7. Network Devices

35) HUB
36) -Hub falls in two categories:
a. Active Hub
b. Passive Hub
c. Ethernet Hubs
37) -Switches
38) -Bridges
39) Types of Bridges:
40) Transparent Bridge
41) Source Route Bridge
42) Translational Bridge
43) Switches superseding Bridges

44) -Routing tables


45) Static Routing
46) -Dynamic Routing
47) -Brouters
48) -Gateways
49) -Network card
50) -Network protocols
51) -Modems

8. Wireless is a more modern alternative to traditional wired networking that relies on


cables to connect networkable devices together. Wireless technologies are widely used
in both home and business computer networks.

Types of Wireless Network Technologies

 Wi-Fi, especially popular in home networks and as a wireless hotspot technology


 Bluetooth, for low power and embedded applications
 wireless home automation standards like Zig Bee and Z-Wave
9. broadband is a wide bandwidth data transmission with an ability to simultaneously
transport multiple signals and traffic types. The medium can be coaxial cable, optical
fiber, radio or twisted pair.

10. Types of Broadband


DSL (Digital Subscriber Line)
Also known as ADSL or SDSL, this is the most common type of broadband connection and
is delivered through your existing phone line. Unfortunately it requires a good quality phone
line, a local exchange to be “enabled” and you need to be located within a certain distance
from the exchange. This makes it quite limited and is not really an effective solution for much
of rural Ireland.

Cable
If you already have cable TV then you live in an area served by a cable operator. You will
need a special modem to run alongside your TV box, and the operator will often bundle the
cost of the TV and Broadband connections together in a cost effective package.

Satellite

Satellite is generally considered to be the last resort for people living in remote areas. It
requires the installation of a special satellite dish and modem, and the equipment and line
rentals are often extremely expensive.
Wireless
Wireless Broadband is the choice of West Net, it provides a high speed and robust
connection across rural areas and does not require a telephone line of any kind.

11. A computer virus is a malware program that, when executed, replicates by inserting
copies of itself (possibly modified) into other computer programs, data files, or the boot
sector of the hard drive; when this replication succeeds, the affected areas are then said
to be "infected".

12. Data security means protecting data, such as a database, from destructive forces and
from the unwanted actions of unauthorized users.

You might also like