Communication and network
Module 2
The Internet: Connecting and Communicating Online
The Internet Evolution (1 of 4)
Figure 2-1 People around the world use the Internet
in daily activities such as viewing media, communicating
with others and accessing information.
The Internet Evolution (2 of 4)
(1) enabled scientists in various physical locations to share information
(2) can function even if part of the network was disabled or destroyed by a disaster, such as a nuclear attack
The Internet Evolution (3 of 4)
The Internet Evolution (4 of 4)
Figure 2-2 ARPANET network map from 1974.
Knowledge Check Activity 2-1
A company that provides services for accessing the Internet is called a(n) ________.
Using the World Wide Web�(1 of 11)
Using the World Wide Web�(2 of 11)
Figure 2-3 Web page
Using the World Wide Web�(3 of 11)
Using the World Wide Web�(4 of 11)
Figure 2-4 HTML code.
Using the World Wide Web�(5 of 11)
Table 2-1 Popular Browsers
| Apple Safari | Preinstalled on Apple computers and devices, Safari has been the default browser for macOS since 2003 and is relatively new to Windows. The browser has built-in sharing with online social networks, fast performance, parental controls, and ease of use. |
| Google Chrome | Google’s Chrome was first released in 2008. This free browser is available for Windows, macOS, and Linux, and it must be downloaded and installed. Chrome has independent tabbed browsing; if there is a problem is one tab, the other tabs continue to function normally. |
| Microsoft Edge | Edge is a Microsoft browser included in the Windows operating system. It is the default browser for Windows on most devices and is not compatible with prior versions of Windows. Features include integration with Cortana and OneDrive, along with annotation and reading. |
| Mozilla Firefox | Developed by the Mozilla Corporation for Windows, macOS, and Linux, Firefox is known for its extensive array of plug-ins (discussed later in the module). This free browser was first released in 2004 and must be downloaded and installed. It has enhanced privacy and security features, a spelling checker, tabbed browsing, and a password manager. |
Using the World Wide Web�(6 of 11)
• The browser also keeps track of pages you have viewed in sequence by tracking breadcrumbs—the path you followed to display a web page.
Using the World Wide Web�(7 of 11)
Using the World Wide Web�(8 of 11)
Figure 2-6 Parts of a URL
Using the World Wide Web�(9 of 11)
An IP address is a unique number that consists of four sets of numbers from 0 to 255 separated by periods, or dots, as in 69.32.132.255. The Internet uses two IP addressing schemes: IPv4 and IPv6.
Figure 2-5 The IPv4 and IPv6 addresses, along with the domain name, for Google’s website.
Using the World Wide Web�(11 of 11)
• When you enter a domain name (i.e., google.com) in a browser, a DNS server translates the domain name to its associated IP address so that the request can be routed to the correct computer.
• A DNS server is a server on the Internet that usually is associated with an ISP.
How To: Connect to the Internet (1 of 5)
Figure 2-8 Verizon mobile hot spot
How To: Connect to the Internet (2 of 5)
How To: Connect to the Internet (3 of 5)
Figure 2-9 How a cellular network might work.
�
How To: Connect to the Internet (4 of 5)
FIGURE 2-10 Available wireless networks
How To Connect to the Internet (5 of 5)
Figure 2-11 Netgear wireless access point
Various Online Activities and Services ( 1 of 6)
Various Online Activities and Services (2 of 6)
Figure 2-16: The U.S. Bureau website provides population data.
Various Online Activities and Services (3 of 6)
Various Online Activities and Services (4 of 6)
Various Online Activities and Services (5 of 6)
enable users to access their financial
records from anywhere in the world,
provided they have an Internet
connection.
Figure 2-18 You can manage your bank account, make transfers, and more with banking websites, such as Bank of America.
Various Online Activities and Services (6 of 6)
Pros and cons of using web apps.
Pros | Cons |
Access web apps from any device with a browser and Internet connection | User must be online to use web apps |
Collaborate with others, no matter their location | Files are more vulnerable to security and privacy threats |
Store your work on the app’s website so you can access it anytime and anywhere | If the web app provider has technical problems, you may be unable to access your work |
Save storage space on your device | If the web app provider goes out of business, you can lose your files |
Access the latest version of the app without installing updates | Web apps often offer fewer features and may run slower than installed apps |
Considerations for Online Safety (1 of 3)
Considerations for Online Safety (1 of 2)
Figure 2-22 Digital certificates provide security when visiting websites.
Considerations for Online Safety (2 of 3)
Communicating Online (1 of 6)
Figure 2-24 You can send email to anyone, anywhere in the world.
Communicating Online (2 of 6)
Figure 2-25 How an email message may travel from a sender to a receiver.
Communicating Online (3 of 6)
Figure 2-26 Facebook Messenger is an example of messaging app.
Using Social Networks (4 of 6)
Types of social networks.
Type | Lets You | Includes | Examples |
Social networking | Share ideas, opinions, photos, videos, websites | Personal and business networking, chat, video chat and videoconferencing, instant messaging, online dating, social memorials | Facebook, LinkedIn, Instagram, Snapchat, Microsoft Skype, Google Hangouts |
Blogging and microblogging | Create and update an online journal that you will share with readers | Personal journals, expert advice, information on special areas of Interest | Twitter, Blogger, WordPress, Tumblr, Pinterest |
Media sharing and content sharing | View and distribute pictures, videos, and audio files | Photo and video sharing, podcasting, news sites, online learning, distance learning | YouTube, Break, Dailymotion, Flickr, Photobucket, Picasa |
Using Social Networks (5 of 6)
Type | Lets You | Includes | Examples |
Collaborative projects | Read, add, and discuss articles about topics of interest | Online encyclopedias, forums, wikis, message boards, and news groups | Wikipedia, WikiAnswers, Wikia |
Social curation, bookmarking, and social news | Tag (mark) and search websites; share websites, articles, news stories, and media | Tagging; knowledge management | Delicious, Reddit, Digg |
File sharing | Send and receive files from others on an Internet location | Free or paid access to file storage locations on the Internet | Egnyte, ShareFile, Hightail, Dropbox, WeTransfer |
Types of social networks. (Continued)
Using Social Networks (6 of 6)
Information Literacy Standards�and Web Searches (1 of 3)
Information Literacy Standards�and Web Searches (2 of 3)
Figure 2-35 Steps in a search strategy
Apply Information Literacy Standards�to Web Searches (3 of 3)
You can also refine a web search by using a search operator, also called a Boolean operator. Search operators are characters, words, or symbols that refine the search.
Below are the common search operators:
Operator | Means | Example |
“ ” (quotation marks) | Find web pages with the exact words in the same order | “augmented reality” in business |
| (vertical bar) | OR | augmented | virtual |
- (hyphen) | NOT | augmented reality –virtual |
* | Wildcard (placeholder for any number of characters) | augment* reality |
#..# | Find web pages within a range of numbers | augmented reality 2017..2022 |
Using Online Content Responsibly and Ethically (1 of 3)
Using Online Content Responsibly and Ethically (2 of 3)
Using Online Content Responsibly and Ethically (3 of 3)
Ethics and Issues: Using Online Content�Responsibly (1 of 2)
Ethics and Issues: Using Online Content�Responsibly (2 of 2)
Figure 2-37 Citing sources in Microsoft Word
Module 9
Networks and Network Devices: Communicating and Connecting
How Do You Interact with a Network �(1 of 9)
Figure 9-1 Networks can share resources and data
How Do You Interact with a Network �(2 of 9)
How Do You Interact with a Network �(3 of 9)
Table 9-1 Communication system components.
Device | Purpose |
Communications device | Connects the sending device to the transmission media |
Receiving device | Accepts the transmission of data, instructions, or information |
Sending device | Initiates an instruction to transmit data, instructions, or information |
Transmission media or a communications channel | Means by which the data, instructions, or information travel |
How Do You Interact with a Network �(4 od 9)
Classification of Networks
Home
* Exist within a single building
* Easy to install and configure
* Accessed by only a few users
Business
* Accommodate many users
* Access large amounts of data
* Can be spread across many buildings
Structures, standards, range, and so on
How Do You Interact with a Network �(5 of 9)
Figure 9-3 Typical home network.
How Do You Interact with a Network �(6 of 9)
Home Networks provide home users with the following capabilities:
Business Networks provide the following advantages to businesses:
How Do You Interact with a Network �(7 of 9)
Intranet
Extranet
An extranet (extra means outside or beyond) allows customers or suppliers to access part of its intranet.
VPN
A VPN can allow an individual to access an organization’s network by using encryption and other technologies to secure the data transmitted along the path.
Businesses use intranets, extranets, and VPNs (virtual private networks) to provide different services to employees.
How Do You Interact with a Network �(8 of 9)
Wired Networks
Wireless Networks
Cellular network or mobile network is a communication network where the link to and from end nodes is wireless.
How Do You Interact with a Network �(9 of 9)
Communications software consists of programs and apps that:
Network Structures (1 of 7)
Network Structures (2 of 7)
Table 9-2 Network topologies.
Type | Description | Layout |
Bus network | All devices are attached to a central cable, called a “bus,” that carries the data. If the bus fails, the devices on the network will no longer be able to communicate. | |
Mesh network | All devices are interconnected with one another. If a single device on the network fails, the rest of the network will continue to function by communicating via an alternate route. Two types of mesh topologies are a full mesh topology (each device on the network is connected to every other device on the network) and a partial mesh technology (each device may or may not be connected to all other devices on the network). | |
Network Structures (3 of 7)
Table 9-2 Network topologies (continued).
Type | Description | Layout |
Ring network | Data travels from one device to the next in a sequential fashion. If one device on the network fails, all communication on the network could cease to function. Ring networks are no longer common. | |
Star network | Each device on the network is attached to a central device, such as a server or switch. If the central device fails, the other devices will be unable to communicate. If a connected device fails, all other devices will still be able to communicate. Two or more star networks may be joined together using a bus to form a tree topology. Tree topologies are often are used in schools and businesses. | |
Network Structures (4 of 7)
Figure 9-5 Sample client/server network.
Network Structures (5 of 7)
Network Structures (6 of 7)
Figure 9-6 Sample LAN.
Network Structures (7 of 7)
Network Standards and Protocols (1 of 11)
Network Standards and Protocols (2 of 11)
Table 9-3 Network standards and protocols.
Name | Type | Sample Usage |
Bluetooth | Protocol | Wireless headset |
IrDA | Standard | Remote control |
LTE | Standard | Mobile phones |
NFC | Protocol | Mobile phone payment |
RFID | Protocol | Tollbooth |
TCP/IP | Protocol | Internet |
Token ring | Standard | LAN |
UWB | Standard | Inventory tracking |
Wi-Fi | Standard | Hot spots |
Network Standards and Protocols (3 of 11)
Network Standards and Protocols (4 of 11)
Network Standards and Protocols (5 of 11)
Network Standards and Protocols (6 of 11)
Figure 9-7 Connecting your phone to your car’s Bluetooth.
Network Standards and Protocols (7 of 11)
Network Standards and Protocols (8 of 11)
Network Standards and Protocols (9 of 11)
Figure 9-8 How electronic RFID toll collection works.
Network Standards and Protocols (10 of 11)
Figure 9-9 NFC communication examples.
Network Standards and Protocols (11 of 11)
Table 9-4 Close-distance network protocols.
Network Protocol | Common Uses |
Bluetooth | Devices communicating with one another over a short range (usually less than 30 feet/9 meters) |
IrDA | Remote controls or other data transmission within close proximity |
LTE | Uses radio signals to communicate data over cellular networks |
NFC | Used in credit cards, smartphones, and tickets to facilitate close-range communication |
RFID | Radio signals transmitted through antennas, often found in tollbooth transponders or embedded chips in animals |
UWB | Low-energy radio technology for short-range, high-bandwidth communications |
Wi-Fi | Hot spots and wireless home and small business networks using TCP/IP |
Network Connection Hardware (1 of 8)
Network Connection Hardware(2 of 8)
Network Connection Hardware (3 of 8)
Figure 9-10 Typical cable modem installation.
A cable modem uses a cable TV connection. A splitter connects one part of the cable to your cable box or device, and the other part to the cable modem.
Network Connection Hardware (4 of 8)
Figure 9-11 Cable modem and
wireless router.
Network Connection Hardware (5 of 8)
Network Connection Hardware (6 of 8)
Table 9-5 Digital dedicated lines.
Type | Description |
Cable | The cable television (CATV) network provides high-speed Internet connections. The CATV signal enters a building through a single line, usually a coaxial cable, which connects to a modem that typically attaches to your computer via an Ethernet cable. |
DSL, ADSL | DSL (Digital Subscriber Line) transmits on existing standard copper phone wiring. ADSL (Asymmetric Digital Subscriber Line) is a type of DSL that supports faster downstream rates than upstream rates. |
ISDN | ISDN (Integrated Services Digital Network) refers to both a circuit-switched telephone network system and a set of communication standards used to transmit data, voice, and signaling. |
Network Connection Hardware (7 of 8)
Type | Description |
FTTP | FTTP (Fiber to the Premises) uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical permanent location. An optical terminal at your location receives the signals and transfers them to a router connected to a computer. |
ATM | ATM (Asynchronous Transfer Mode) is a service that carries voice, data, video, and media at very high speeds. Phone networks, the Internet, and other networks with large amounts of traffic use ATM. |
Table 9-5 Digital dedicated lines (continued).
Network Connection Hardware (8 of 8)
Table 9-5 Digital dedicated lines (continued).
Type | Description |
T-Carrier | Any of several types of long-distance digital phone lines that carry multiple signals over a single communications line. Digital T-carrier lines use multiplexing so that multiple signals share the line. T-carrier lines provide very fast data transfer rates. Only medium to large companies usually can afford the investment in T-carrier lines because these lines are so expensive. The most popular T-carrier line is the T1 line. Main users of T3 lines include large corporations, phone companies, and ISPs connecting to the Internet backbone. The Internet backbone itself also uses T3 lines. |
How To: Set Up a Network (1 of 5)
How To: Set Up a Network (2 of 5)
Steps to set up a Network
Step 1
Step 2
Step 3
How To: Set Up a Network (3 of 5)
Figure 9-12 Sending a document to a wireless printer.
How To: Set Up a Network (4 of 5)
How To: Set Up a Network (5 of 5)
Figure 9-13 Wireless signal booster.
Secure IT: Secure a Network (1 of 5)
Secure IT: Secure a Network (2 of 5)
Table 9-6 Common network risks.
Risk | Description |
Adware | Displays unwanted advertisements on your computer |
Spyware | Tracks and transmits personal information from your computer or device without your knowledge |
Virus | Damages data on your computer or device or changes system settings |
Worm | Spreads throughout a computer and/or network without requiring user interaction |
Trojan | Disguises itself as or hides in a legitimate file and then causes damage to programs and data when opened |
Ransomware | Locks you out of programs and data on your computer until you pay a ransom to regain access |
Rootkit | Gains administrator-level, or root-level, access to a computer or network without the system or users detecting its presence |
Secure IT: Secure a Network (3 of 5)
Figure 9-14 Securing a network.
Encryption scrambles or codes data as it
is transmitted over a network.
The Network attached storage (NAS) devices provide a centralized location for storing programs and data on large and small networks.
Authentication identifies you to
the network. The most common type of authentication
is providing a username and
password.
Firewalls create a blockade between corporate or personal
Networks and the Internet.
Biometric devices authenticate identity by scanning your physical
characteristics, such
as a fingerprint.
Secure IT: Secure a Network (4 of 5)
Secure IT: Secure a Network (5 of 5)
Use the following steps to determine if someone is accessing a wireless network without permission:
Ethics and Issues: Responsibilities of a�Network Professional (1 of 2)
Figure 9-15 A network administrator is in a position of trust.
Ethics and Issues: Responsibilities of a�Network Professional (2 of 2)
The code includes guidelines for: