Saturday, February 29, 2020

WHAT ARE THE TYPES OF CABLE?


TYPES OF CABLE

1. Twisted-pair cable
  • Is the most common type of cable.
  •  Have eight individual copper wires bundled together and covered with an insulating  material.
  •  The copper wire is always color-coded with a plastic insulation and they are twisted in pairs for a total of four pairs.


a.  STP (Shielded Twisted Pair)
  • Often used in “noisy” environments where a shield of metallic foil is wrapped around each of the wire pairs, with an additional overall shielding to protect against excessive electromagnetic interference.



b. UTP (Unshielded Twisted Pair)

  •  Is the most common form of twisted pair wiring. It is less expensive and easier to work with than STP.

 .

2. Coaxial Cable
  •  the standard media used by cable TV operators.
  • it consists of a plastic insulator that separates the solid copper inner conductor and the woven, copper braid outer conductor.


3. Fiber-optic Cable

  • has a reflective coating that allows light beams to travel without outer interference.








WHAT IS A NETWORK ADDRESS?

WHAT IS A NETWORK ADDRESS? 



A network address is a set of numbers called "octets" that identifies any network device(computer, printer, camera, router, switch, etc.), which we will generally refer to as a host in a network. It is more commonly known as Internet Protocol (IP) address.

It can be compared to the physical address that we use for our homes, which uniquely identifies it from the rest of the homes in our neighborhood, town,city,province,country and the whole wide world.

But unlike or home addresses,which points to a specific geographical location, an IP address is just logical address that points to which network group a particular network device(host) belongs.

It doesn't matter where a particular host is located geographically, for as long as it has a valid IP address, other hosts can communicate with it.

IPv4
IPv4 address is the specific version or type of IP address that we all came to know and become accustomed with.

Whenever we speak of IP address, we refer to IPv4 addresses used in the Internet in order for us to have an easier time to understand what it is.

An IP address is a series of four sets of numbers called "octets".

For easier readability, we write this set of octets in what we call a "dotted decimal" notation:e.g., 192.168.1.120 or 74.125.224.72(Google.com).

• Each octet in the series is a decimal value of 8 bits of binary number or 1 byte. Thus, the binary 00000000 is equal to 0 and 11111111 is equal to 255.

So each octet will have a value range of 0-255 only. Having this in mind, it would mean that there will only be a little less than 4.3 billion possible IP addresses available for each network host worldwide.

The net ID is indicated by the first three high order bits of the first octet and is categorized into different classes.

The 3 most common classes are classes A,B and C. Classes D and E are rarely used,especially among end-users like you and me.

Classifying IP addresses allows for easy searching through different networks. It also allows for effective management of hosts in a particular network.

Class A IP addresses are assigned to organizations with a large number of hosts connecting to the network

Class B is for medium-sized network organizations

Class C is usually for networks run by small organizations or offices.

Allocation of IP addresses is done according to the size of network, which is determined by the number of hosts.

Reserved IP Addresses
In some organizations, not all computers are directly connected to the Internet. Usually, these computers are connected through a local network and only connect to the Internet through one computer (usually a proxy or a getaway)

There is no need to reserve an IP address for the computers in these kinds of networks.

Certain IP address blocks are reserved for each network class to make sure that these addresses do not conflict with IP addresses used in the Internet.

Gateway is a node that serves as the access point on a network- typically a router.

Subnet Masks are used to set or assign a logical network within a network. This way, administrators are able to extend the network size by creating logical or sub networks equivalent to as many as the number of bits it borrowed from the host ID side of the IP address.

DCHP AND DNS
DCHP or Dynamic Host Configuration Protocol is a system built in every server operating system that allows computers or hosts to join IP-based networks with minimal manual configuration. It assigns an Ip address from a pool that is allotted to it.

Because of DHCP, we no longer need to figure what IP address to use in order to connect and communicate with other hosts in the network. It also managed the release and renewal of IP addresses assigned to a particular host.

DCHP is present in all servers and some network devices like gateways and routers in an IP-based network. Whenever you connect a computer or host on a network, it broadcasts a signal or communication alerting all other hosts in the network.

DNS(Domain Name Server) is responsible for mapping out and navigating hosts on the internet based on names. These names are referred to as URLs (Uniform Resource Locator). This is naming convention for the different hosts(websites) on the Internet.

• Each of these URLs with known domain names (Google,Yahoo!, Facebook,Speedtest) is representing a specific IP address that points to the computer hosting the site.

WHAT IS THE DIFFERENCE BETWEEN STRAIGHT THROUGH AND CROSSOVER


Straight and Crossover Cable
Examples of common Ethernet network cables are straight and crossover cables. These Ethernet network cable are made of four pairs of high performance cables consisting of twisted pair conductors used for data transmission.

       •       The ends of the cable are called RJ-45 connectors.

Straight and crossover cables can be Cat3,Cat5, Cat5e, or Cat 6 UTP cable; the main difference is that each type will have different wire arrangements and purpose.

Straight Cable

You usually use straight cable to connect different type of devices. This type of cable will be used most of the time and can be used to:
1. Connect a computer to a switch/hub's normal port.
2. Connect a computer to a cable/DSL modem's LAN port.
3. Connect a router's WAN port to a cable/DSL modem's LAN port.
4. Connect a router's LAN port to a switch/hub's uplink port. (normally used for expanding network)
5. Connect 2 switches/hubs with one of the switch/hub using an uplink port and the other one using normal port.


Crossover Cable

Sometimes you will use crossover cable;its usually used to connect same type of devices. A crossover cable can be used to:
1. Connect 2 computers directly.
2. Connect a router's LAN port to a switch/hub's normal port. (normally used for expanding network)
3. Connect 2 switches/hubs by using normal port in both switches/sides.


Generally, a straight-through cable is used to connect end node devices to a networking device. On the other hand, a cross over cable is used to connect same type of devices (e.g., PC-PC, switch-switch, router-switch [for expanding a network])

Saturday, October 19, 2019

WHAT IS A NETWORK TOPOLOGY?

NETWORK TOPOLOGY


A Network Topology is the arrangement of nodes -  usually switchesrouters, or software switch/router features -- and connections in a network, often represented as a graph.  The topology of the network, and the relative locations of the source and destination of traffic flows on the network, determine the optimum path for each flow and the extent to which redundant options for routing exist in the event of a failure.

There are two types of network topologies: physical and logical

Physical Topology emphasizes the physical layout of the connected devices and nodes, while the Logical Topology focuses on the pattern of data transfer between network nodes.



TYPES OF TOPOLOGY

Image result for bus topology

Bus topology is a network type in which every computer and network device is connected to single cable.In networking a bus is the central cable -- the main wire -- that connects all devices on a local-area network (LAN). It is also called the backbone. This is often used to describe the main network connections composing the Internet.  Bus networks are relatively inexpensive and easy to install for small networks. Ethernet systems use a bus topology. When it has exactly two endpoints, then it is called Linear Bus topology.

Advantages of Bus Topology
  1. It is cost effective.
  2. Cable required is least compared to other network topology.
  3. Used in small networks.
  4. It is easy to understand.
  5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
  1. Cables fails then whole network fails.
  2. If network traffic is heavy or nodes are more the performance of the network decreases.
  3. Cable has a limited length.
  4. It is slower than the ring topology.

RING TOPOLOGY
Related image
A local-area network (LAN) whose topology is a ring. That is, all of the nodes are connected in a closed loop. Messages travel around the ring, with each node reading those messages addressed to it. 
Advantages of Ring Topology
  1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes having tokens can transmit data.
  2. Cheap to install and expand

Disadvantages of Ring Topology

  1. Troubleshooting is difficult in ring topology.
  2. Adding or deleting the computers disturbs the network activity.
  3. Failure of one computer disturbs the whole network.

STAR TOPOLOGY
Image result for star topology
All the nodes in the network are connected to a central device like a hub or switch via cables. Failure of individual nodes or cables does not necessarily create downtime in the network but the failure of a central device can. This topology is the most preferred and popular model.
Advantages of Star Topology
  1. Fast performance with few nodes and low network traffic.
  2. Hub can be upgraded easily.
  3. Easy to troubleshoot.
  4. Easy to setup and modify.
  5. Only that node is affected which has failed, rest of the nodes can work smoothly.
Disadvantages of Star Topology
  1. Cost of installation is high.
  2. Expensive to use.
  3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
  4. Performance is based on the hub that is it depends on its capacity

MESH TOPOLOGY
Image result for mesh topology
The topology in each node is directly connected to some or all the other nodes present in the network. This redundancy makes the network highly fault tolerant but the escalated costs may limit this topology to highly critical networks.It is a point-to-point connection to other nodes or devices.

There are two techniques to transmit data over the Mesh topology, they are :
  1. Routing
  2. Flooding

MESH Topology: Routing

In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data to reach the destination using the shortest distance. Or, routing logic which has information about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the failed nodes.

MESH Topology: Flooding

In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the network.
Advantages of Mesh Topology
  1. Each connection can carry its own data load.
  2. It is robust.
  3. Fault is diagnosed easily.
  4. Provides security and privacy.
Disadvantages of Mesh Topology
  1. Installation and configuration is difficult.
  2. Cabling cost is more.
  3. Bulk wiring is required.

HYBRID TOPOLOGY
Image result for HYBRID topology
It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology).

Advantages of Hybrid Topology
  1. Reliable as Error detecting and trouble shooting is easy.
  2. Effective.
  3. Scalable as size can be increased easily.
  4. Flexible.
Disadvantages of Hybrid Topology
  1. Complex in design.
  2. Costly.








WHAT ARE THE DIFFERENT NETWORKING DEVICES?

HUB
Hub Icon
A hub is a simple device that directs data packets to all devices connected to it.
Basically, a hub does nothing except provide a pathway for the electrical signals and regenerate signal before it forwards it to all connected devices.


SWITCH
Related image
Similar to hubs, switches are the connectivity point of a wired network. Devices are connected via twisted-pair cabling, one cable for each device. The difference between the two is in how the devices deal with the data that they receive.
 If a hub forwards the data it receives to all ports on the device, a switch forwards the data it receives only to the port that connects to the destination device.

ROUTER
Image result for router
Routers are completely different devices. If a hub or switch is concerned with transmitting frames, the job of a router, as its name implies, is to route packets to other networks until that packet ultimately reaches its destination. It can transmit through wired and wireless network.
 A router is typically connected to at least two networks, commonly two Local Area Networks(LANs) or Wide Area Network (WANs) or a LAN and its Internet Service Provider's Network.

BRIDGE
Image result for bridge network device

A bridge is used to divide larger networks into smaller sections. It is located between two physical network segments and manages the flow of data between the two. By looking at the physical address of the devices connected to each segment, bridges can forward the data if the destination address is on another interface, or block it from crossing if verified that it is on the interface from which it came.

TYPES OF BRIDGES:
1. TRANSPARENT BRIDGE
  -derives its name from the fact that the devices on the network are unaware of its existence. A transparent bridge does nothing except block or forward date based on the MAC addressed.

2. SOURCE ROUTE BRIDGE
  -is used in Token Ring networks. The source route bridge derives its name from the fact that the entire path to be taken by the packet through the network is embedded within the packet.

3. TRANSLATIONAL BRIDGE
  -is used to convert one networking data format to another; for example from Token Ring to Ethernet, and vice versa.


NETWORK INTERFACE CARD
Image result for network interface card
A Network Card, also called the Network Interface Card, is a device that enables computers to connect to the network.

To install or configure a network interface, you will need this drivers of the device. You might also need to configure it, although many devices are now plug and play. Most network cards are now software configured. 

MODEM
Related image
A Modem, short for modulator/ demodulator,is a device that converts the digital signals generated by a computer into analog signals that can travel over conventional phone lines.
The modem converts the signal back at the receiving end. It converts it into a format the computer can understand. A modem can be used as a means to connect to an ISP,or as a mechanism for dialing up to a LAN. A modem can also be internal add-in expansion cards or external devices that connect to the serial or USB port of a system.

TRANSCEIVERS
Image result for TRANSCEIVER
The Transceivers is responsible for placing signals onto the network media and detecting incoming signals travelling through the same wire. 
The term transceiver does describe a separate network device, but it can also be technology build and embedded in devices such network cards and modems. In a network environment, a transceivers get its name from being both a transmitter and a receiver of signals-thus the name transceivers.Transceivers are found in the network cards, they can be external devices as well. In terms of networking, transceivers can be shipped as a module or chip type. 
Chip transceivers are small and are inserted into a system board or wired directly on a circuit board.
 Module transceivers are external to the network and are installed and function similar to other computer peripherals or they can also function as stand-alone devices. 

FIREWALL
Image result for FIREWALL
A firewall is a networking device that can be either hardware or software-based. It controls access to your organization's network. This controlled access is designed to protect data and resources from outside threat.
 A typical firewalls is placed at entry/exit points of a network. The firewall is configured on the server to allow or permit certain types of network traffic. A firewall is commonly installed on the local system and configured to control traffic
Hardware firewalls are used in networks of all sizes today. Hard firewalls are often dedicated network devices that can be implemented with very little configuration and protect all systems behind the firewall from outside sources.

Wednesday, September 4, 2019

HOW TO BE A RESPONSIBLE NETIZEN?





What is netizen? 

A netizen is someone who uses the internet for any reason. They are someone who uses something online like Facebook, Twitter,Instagram and everything in the Internet including e-mail. 

          Why is it important to be a responsible netizen in using media? 

It is important for us to be responsible in using media to avoid the risk of being in danger when using the media. 


Being a responsible netizen means you need to respect everyone using the internet. It is very important for us nowadays, because some of us are not using the media right and responsibly. We must also be careful of what you say and aware of what you are posting because everything that you post online can put at risk. 

Before using social media sites always think, always observe and think the information that you’ve seen in media if it is true. This will help us to be responsible in gathering the right informations in socil media.

Think and see if the information or the media is useful for you. This will help us to be liable in deciding if you really need the information that you’ve seen in the media. 

Always think if the information from the media is informative or just an useless things. This will help you to use the media to gather reliable information and not just for entertainment and nonsense things. 

Think if it is really needful for you. Always think if you really needed the information before using it or gathering the information. Don’t use the social media in nonsense things,use it for information or communication purposes.

These tips are surely help each and every one of us to be a responsible netizen in using media. Do not abuse the use of social media use it in a right and responsible way. So better watch what you post in social media . And always remember to “THINK before you click”.

Tuesday, September 3, 2019

WHAT IS A COMPUTER NETWORK?

Image result for computer network animated gif

A Computer Network is a digital telecommunications network which allows nodes to share resources.It is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Other shared resources can include a printer or a file server.  In computer networks, computing devices exchange data with each other using connections between nodes. These data links are established over cable media such as wires or optic cables, or wireless media such as Wi-Fi.

 Advantages of Networking

  • Reduce Cost. Everyone in your home or office can share a single printer and a single high-speed internet connection at the same time.
                             Image result for reduce cost

  • Increased Efficiency. You can access data, pictures and many other files on any connected computer without having to save them into a USB or flash drive.
                                Image result for increased efficiency
  • Economical. Purchasing software network licenses is relatively cheaper than purchasing individual licenses.
                                               Image result for Economical.
  • More Productivity. Shared internet access means no one needs to wait to use the internet or email. Everyone can work simultaneously.
                                   Image result for More Productivity
  • Increased access to communication channels. You can communicate with others in the network using the email or an Instant Messaging (IM) software.
                                 Image result for increased access to communication channels

  • More efficient patching of software. Software updates need only be installed once. A patch is a piece of software designed to fix or update the data of a computer.
                            


 Disadvantages of Networking

  • Network Failure. If the network fails, the users lose access to information and the ability to communicate electronically.
 Image result for network failure
  • Server Error. Server faults may prevent you from using some applications, or even from accessing your computer.                                                   


                        Image result for server error
  • Prone to Hacker. Your system is open to hackers, especially if it is connected to the Internet at all times.
Image result for prone to hacker
  • Prone to Virus. Networks are vulnerable to virus attacks. A virus introduced in one workstation can spread quickly to other workstations. 
                          Image result for prone to virus

  • Distance or Location Problem. Resources, such as printers, might be located too far from your table.
   Image result for location problem in computer



Network Media Types:

Wired Networkmost efficient and practical method of networking where computers ares connected with cables.

                                  Image result for wired network


Wireless Network - the connection of option of choice as it does not require any cables to be set in your home.
Image result for wireless network





Types of Networks:

1. PAN (Personal Area Network)
   -is a computer network use to interconnect devices centered on an individual workplace. 
    It can be used for connecting personal devices, which typically involve a mobile computer, a cellphone and/or a handheld computing device  such as PDA.
Image result for personal area network

2. LAN (Local Area Network)
   -is a type of network where two as much as hundreds of computers are connected with each other using a network sharing device known as hub or switch.

                      Image result for local area network




3. MAN (METROPOLITAN AREA NETWORK)
-is a larger network than LAN. It involves connecting several networks together that reside within a city, town, or metropolis.

                           Image result for metropolitan area network



4. WAN ( WIDE AREA NETWORK)
- is a simple network consisting of interconnected LANs. It is usually dispersed over a very wide ares, and it is not uncommon to see WANs reaching across continents to link office networks.
                                         













WHAT ARE THE TYPES OF CABLE?

TYPES OF CABLE 1. Twisted-pair cable Is the most common type of cable.  Have eight individual copper wires bundled together and co...