Networking

//__** Networking **__// 1. Basics media type="youtube" key="TVvEheZVwdg" height="315" width="420" Remember we added 3 more on the basic Network This list is also arranged from smallest to biggest.
 * Personal Area Network - PAN
 * Local Area Network - LAN
 * Campus Area Network - CAN
 * Metropolitan Area Network - MAN
 * Wide Area Network - WAN known also as the Internet.

2. Basic Hardware connections media type="youtube" key="GyTLPl5t-0Q" height="315" width="420"

3. Network Topology media type="youtube" key="kfEDPQAYH4k" height="315" width="420" We added Hybrid - a combination of 2 or more topologies.

4.Binary media type="youtube" key="ETsfylK7kzM" height="315" width="420" You can have up to 255 if you assign all ones on your 8-bit system 128 64 32 16 8 4 2 1 1 1 1 1 1 1 1 1

5. The 7 Layers of OSI (Open System Interconnection) - Physical Layer media type="youtube" key="DqOvu-wAAM0" height="315" width="420"

Data Link Layer

media type="youtube" key="JL_wrvuvsqc" height="315" width="420"

Network and Transport Layer media type="youtube" key="iWLI_Pz4PZw" height="315" width="420"

Part of the OSI MODEL


 * Bottom Layers (1 -2 ) - Transmit Data Packets
 * Middle Layers (3-5) - Communication Layers
 * Top Layers (6-7) - Presents Data to Users

Note the difference between Analogue, Digital and Fiber Optic Signals.


 * __Basic Network Anatomy: __**
 * 1. __Network Hardware__ - **router, switches, hubs, gateways, access points, network interface cards, cables, bridges, modem, Integrated Services Digital Network (ISDN) and firewalls
 * Enables the users to share computer hardware resources, reducing cost and making it possible for more people to take better advantage of powerful computer equipment.
 * 2. __Network Software__ **
 * Enable users to share data and software programs, increasing efficiency and productivity.
 * 3. __People__ **
 * Network enable people to work, play, communicate in ways that otherwise difficult or impossible.

We will be discussing the IT CONCEPTS OF NETWORKING. Some topics were assigned; you will see the names right beside the topics.

1.Client, host, server (See Basic P2P)
 * Computer systems which are used as central location of data and programs. Commonly shared by different users in a network environment.

2. Mainframe, supercomputers media type="youtube" key="26AdtPBMuyI" height="315" width="420"

3. Grid Computing and Distributed processing [SANG] 4. Ethernet, peer to peer
 * <span style="font-family: 'Times New Roman','serif'; font-size: 20px;">Video will be uploaded soon.
 * Ethernet - uses a communication concept called datagrams to transfer messages across the network. Datagrams take the form of self-contained packets of information comprising fields that contain information about their data, origin, destination and type. The data field in each packet can contain up to 1500 bytes. Take mailing as a . An Ethernet packet is not just a letter. It also contains the sender address, receiver address and the stamp indicating the exact contents of that packet.("DeviceNet vs Ethernet." //Machinery Automation & Robotics - Specialists in Industrial Machinery Service//. Web. 11 Dec. 2011. <http://www.machineryautomation.com.au>)

__** Things you must know about Ethernet **__ media type="youtube" key="Vuno1MhXwlw" height="315" width="560" > > The file-transfer load is distributed between the computers exchanging files, but file searches and transfers from your computer to others can cause bottlenecks. Some people download files and immediately disconnect without allowing others to obtain files from their system, which is called **leeching**. This limits the number of computers the software can search for the requested file. (Content lifted from"HowStuffWorks "Peer-to-peer File Sharing"" //HowStuffWorks "Computer"// Web. 11 Dec. 2011. <http://computer.howstuffworks.com/bittorrent1.htm>.)
 * ===** Peer to peer - ** is different from traditional file downloading. In peer-to-peer sharing, you use a software program (rather than your Web browser) to locate computers that have the file you want. Because these are ordinary computers like yours, as opposed to servers, they are called **peers**. The process works like this:===
 * You run peer-to-peer file-sharing software (for example, a [|Gnutella program]) on your computer and send out a request for the file you want to download.
 * To locate the file, the software queries other computers that are connected to the Internet and running the file-sharing software.
 * When the software finds a computer that has the file you want on its hard drive, the download begins.
 * Others using the file-sharing software can obtain files they want from your computer's hard drive.

media type="youtube" key="Q4PsfCHEoP8" height="315" width="420"
 * __ Basic P2P __**

__** How to do do a peer to peer network with your UTP Cable. **__

media type="youtube" key="-DZi9sMi2zQ" height="315" width="420"

__** The danger of Peer to Peer file sharing **__ media type="youtube" key="fbMiMQwpwfA" height="315" width="420"

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">[|Cloud computing]

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">5. Local Area Network (LAN), Wide Area Network (WAN), Virtual LAN, wireless LAN, Home Network

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">6. Internet, intranet, extranet and virtual private network (VPN)

<span style="color: #ff0000; font-family: 'Arial','sans-serif'; font-size: 25px;">Different VPN <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">media type="youtube" key="jJdW0_yB9vo" height="315" width="420"

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">7. Routers, switches, hubs <span style="color: #ff0000; font-family: 'Arial','sans-serif'; font-size: 25px;">The difference media type="youtube" key="reXS_e3fTAk" height="315" width="420" <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">8. Connection types: Optical fibers, cable, wireless technologies such as wireless fidelity (WiFi), worldwide interoperability for microwave access (WiMax), microwave

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">9. Network operating system and utility software

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">10. Cloud computing <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;"> [TORD] Video will be uploaded soon.

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">11. Storage technologies: for example Storage area Network (SAN), Redundant array of inexpensive disk(RAID) <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;">[IRENE]

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">12. Network functionality <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> - Protocol <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> - Synchronous, asynchronous <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> - Remote access <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;"> [JENNY] <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;">video wil be uploaded soon

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> - Bandwidth and broadband <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;"> [MITCHELL]

<span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">14. Network Administration <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> -Electronic security: <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;"> ~Authorize access, Level of access, biomentrics, login, password, firewalls, proxy server, encryption, secure socket layer (SSL) audit trails. <span style="color: #0000ff; font-family: 'Arial','sans-serif'; font-size: 25px;"> [GELSON]

media type="youtube" key="RE43KowWHgw" height="315" width="560"


 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">License: Single users, Multi-user, Concurrent, network site
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Physical Security: Lock or secured rooms
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Monitoring: keystroke Monitoring, system performance, surveillance
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Codes of ethics and professional conduct: Association of Computing Machinery (ACM)
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Data centers
 * <span style="color: #000000; font-family: 'Arial','sans-serif'; font-size: 25px;">Energy usage, uninterrupted power supply (UPS)


 * Videos That you need to see: TAKE DOWN NOTES to help you with the parts that you need to finish. **

1.Network Communication Protocol for Networks and Internets PART 1 media type="youtube" key="CyosOGHOBHA" height="315" width="420" PART 2 media type="youtube" key="xwdLckwVuBg" height="315" width="420"

2. The Internet media type="youtube" key="9hIQjrMHTv4" height="315" width="560"

3. The Network Society media type="youtube" key="NlmnvOFr3Is" height="315" width="560"

Cloud Computing