complete network course

20
Computer Network Course - © 2009 Avery Malay sia - ww w.awtxglobal.com.my  1 COMPUTER NETWORK COURSE Table of Contents: Introduction ...................................................................................... 2 Types of Networks.................................. Error! Bookmark not defined. Ethernet ........................................................................................... 2 Network Connections .......................................................................... 3 Bus Network ...................................................................................... 3 Clients and Servers ............................................................................ 5 Protocols ........................................................................................... 6 TCP/IP .............................................................................................. 6 IP Addresses ..................................................................................... 6 Static or Dynamic? ............................................................................. 7 Computer Names ............................................................................... 7 Virus Software ................................................................................... 8 Access Control ................................................................................... 9 Firewalls ........................................................................................... 9 Creatin g an E thernet Network.............................................................. 9 Ethernet Over Twisted Pair (Straight Cable) ........................................ 11 Ethernet Cross Cable ........................................................................ 12 Peer to Peer Setting ......................................................................... 13 Wireless Access Point ....................................................................... 15 Glossary ............................................... Error! Bookmark not defined. 

Upload: hj-razak-al-banjari

Post on 07-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 1/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

COMPUTER NETWORK COURSE

Table of Contents:

Introduction ...................................................................................... 2Types of Networks.................................. Error! Bookmark not defined. Ethernet ........................................................................................... 2

Network Connections .......................................................................... 3

Bus Network ...................................................................................... 3Clients and Servers ............................................................................ 5Protocols ........................................................................................... 6TCP/IP .............................................................................................. 6IP Addresses ..................................................................................... 6Static or Dynamic? ............................................................................. 7

Computer Names ............................................................................... 7Virus Software ................................................................................... 8Access Control ................................................................................... 9Firewalls ........................................................................................... 9Creating an Ethernet Network .............................................................. 9Ethernet Over Twisted Pair (Straight Cable) ........................................ 11

Ethernet Cross Cable ........................................................................ 12Peer to Peer Setting ......................................................................... 13

Wireless Access Point ....................................................................... 15Glossary ............................................... Error! Bookmark not defined. 

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 2/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

INTRODUCTION 

A network is a group of things that are connected together. In a computer network, the things that aconnected are computers, of course. A computer network can be as small as two computers but there is nmaximum size, and many networks have hundreds or thousands of computers.

There are three main reasons for connecting computers in a network:

1.  Share information. This can be messages such as e-mail, or it can be files that are stored on ocomputer and used by someone at a different computer.

2.  Share resources. A printer that can be accessed from different computer systems is a shareresource. So is an Internet connection used by more than one computer.

3.  Centralized control. In most offices, the management determines what the computers may be usefor and what kind of resources and support they need. This is much easier to deal with if thcomputers are connected.

TYPES OF NETWORKS

Just as there is no limit to the number of systems in a network, there is also no limit to the geographical sizof a network. As a practical matter though, there are some structural differences between a network

computers all in the same room, and a network connecting computers in Los Angeles to ones in SydneAustralia.

The most common network includes computers that are close together, usually in the same building or officThis is called a Local Area Network, abbreviated LAN.The computers in a LAN are usually connected with cable made up of pairs of wires, but faster (and morexpensive) cables are made from glass fibers, called fiber optic cable. A network may even use radwaves, in which case it is a wireless LAN.

When the computers being connected are far apart, typically in different cities, it is called a WAN or WidArea Network. The connection is usually done with special high-speed lines leased from the phocompany, but it is also possible to connect over an ordinary phone line using a device called a modem. Itslow, but possible. Accessing a network through a phone line and modem is called a dial-up connection.

Ethernet

Most LANs in existence today use a technology called Ethernet. In an Ethernet network, every piece information put on the network is seen by every other computer on the network, and each computer mudetermine if that information is meant for itself.

To make this work, before the information goes out on the network it is first broken up into small piececalled packets, and each packet has added to it the address of the computer that should receive it. The paof the packet containing the address is called the header.

Header ----------------------------- Data ----------------- 

Packet diagram

Then, each computer looks at the address on each packet that comes by on the network cable, and copiethe ones that have the right address. The computer that sent the packet is called the source, and the onthat is supposed to receive it is called the destination.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 3/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

NETWORK CONNECTIONS

When a packet comes out of the computer that originated it, that packet must have a complete electricpath to every other computer. The simplest way to do this is to have a cable that goes from one computer the next until it has connected to each one. This is called a bus network.

Bus Network

A bus network is the simplest to explain and draw, but it‘s not often the simplest one to use, especially computers are distributed around various offices in a building, and then get added, taken away, movearound and so forth.

A much more practical way to connect more than a couple of systems is to connect each one to a deviccalled a hub. Each system has a cable that goes from it to the hub, and inside the hub an electricconnection is made between all of the cables. Each place where a cable plugs into the hub is called a port.

Hub / Switch PC Configuration

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 4/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

To create larger networks, hubs can use one or more of their connections to connect to other hubs. This called a star network, but as far as the electrical signals are concerned, they go from one computer every other computer, no different than the bus network.

3-hub star network

When networks get really big, with 100s of systems or more, it‘s no longer such a good idea to have eac

computer look at every packet, because almost none of the packets will be for that computer. The largnetwork can be broken up into smaller groups called subnets, and these are connected with a device callea data switch, or just a switch.

Within each subnet, all of the computers still see every packet, and so does the switch. Normally the switwon‘t pass those packets on to the other subnets, but if the packet has an address for a destination another subnet, the switch will pass the packet to the port for that subnet. All of the systems in that  subnwill then see the packet, including the system it is actually addressed to. In order to know where to sendpacket, the switch must have a table of addresses for each subnet.

Switch with 4 subnets

The simplest form of a switch is called a bridge, and it connects just two subnets. A bridge only needs twports then, one for each of the subnets.

Sometimes a network will be so big and complex that one switch isn‘t enough to connect all of the subnetIn that case the subnet receiving a packet might be connected to a different switch than the subnet whethe packet started. This is a more complicated problem, because the switch would need to know not only thpacket‘s destination, but also where to send it next to make sure it got there.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 5/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

For this, a smarter device is needed, called a router. The router needs to know not only the subnaddresses, but also the best path, or route, to get from one to another.

Route path diagram

One place where routers are used in a big way is the Internet. If you send a message on the Internet,might go through many routers before it reaches its destination. And when you surf to a website, all of thgraphics and text showing up on your screen had to go through routers to find their way from the web site tyour computer.

By the way, every LAN that connects to the Internet becomes a subnet of the Internet, even if it has its owinternal subnets.

CLIENTS AND SERVERS 

In addition to the various ways networked systems can be physically connected, there are two basic waythat network activities can be arranged. In one, all of the computers have equal status. This is called peeto-peer, because a peer means someone (or something) that is the equal of another. Peer-to-peer is usemostly in very small networks of less than a dozen systems.

The more common arrangement is called client-server. One system, called the server, is responsible forparticular activity or resource. The other systems are called clients, and they go through the server whethey want to use the function or resource that the server is responsible for.

Clients and Server Configurations

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 6/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

There is also no rule that says a server must serve the entire network. It is usually convenient to haveseparate network server for each subnet. There are other divisions that can occur even within a subneComputers that need to share the same resources can be organized into workgroups. With the Windows Noperating system, the LAN can be divided into sections called domains, and each domain needs its owserver called a domain controller.

PROTOCOLS

A protocol is an agreed-upon standard for how something will be done. When your mother taught you

chew with your mouth closed and keep your elbows off the table, that was a protocol for proper diningComputer protocols are the rules for connecting with other computers and exchanging information with them

Ethernet is a protocol. Earlier we called it a technology, but it is also a set of rules for how that technology used. If each piece of hardware and software complies with the rules, then information can be correcttransferred from one from one system to another in a LAN.

There are many protocols used in networking. There are some protocols that are used together with othprotocols, where each one takes care of different aspects of networking. Sometimes two protocols do thsame thing in different ways, and it is necessary to choose one or the other. The important thing is that bosystems trying to communicate with each other have matching protocols that they can use.

TCP/IP

One very important set of protocols is called TCP/IP. It is important because it is what the creators of tInternet decided would be used for that particular network, which means that any computer that wants connect to the Internet must also use TCP/IP. TCP/IP stands for Transmission Control Protocol / InternProtocol.

TCP/IP is actually in two parts. The TCP portion covers the agreements between systems about how thewill carry on their ‗conversation‘, and the IP portion deals with addressing the packets and routing them. 

The TCP part all happens in the background and we don‘t really need to concern ourselves with it undnormal circumstances. However, in a network that uses TCP/IP, every system must have a unique I

address, and that is something that requires human intervention in one way or another.

IP Addresses

An IP address is made up of four sets of numbers separated by periods. An example is:

192.168.42.122

Each of these sets of numbers is called an octet, because they started out as 8-digit binary numbers. Bchanging them into 3-digit decimal numbers, the whole address is shorter and easier to remember. Thhighest value for any octet is 255, because the highest number you can make with eight binary digits is equto 255 in decimal.

In most networks, the first three octets are the same for all systems, and the last octet is different for evermachine. If there are more than 255 computers in a network, it is usually divided into smaller subnets.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 7/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

STATIC OR DYNAMIC

There are two ways to associate a unique IP address to a specific computer. One way is for the administratto assign a number, which stays the same unless somebody decides to change it some day. That number then a static IP address.

The other way is to assign a group of addresses to a server, and let the server hand them out as needed any system that wants to communicate on the network. This produces a dynamic IP address. It sometimes important to know which method is in use on a network, because with dynamic addressing, the I

address of a machine may be different each time you try to communicate with it.

Static IP Dynamic IP

Computer Names

The example address 192.168.42.122 is only one digit longer than a phone number with area code, but thatplenty long enough to give most of us a hard time. It‘s much easier for people to remember a name insteaof a number, and for this reason computers in a network are also given a unique name.

This is not only easier to remember, but it solves the problem of a dynamic address that changes all th

time, because the computer name doesn‘t normally change. It does create another problem though, becausthe computers use only the addresses and not the names to keep track of each other. Fortunately there ispart of the TCP/IP protocol called address resolution, and it matches up the names and addresses so thingkeep rolling smoothly along.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 8/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

Change Computer Name 

VIRUS SOFTWARE

A computer virus is a little program that makes copies of itself to send to other computers. It‘s very similin some ways to contagious germs spreading a disease from one person to the next. And like diseases, somof these computer viruses have some really nasty side effects, like wiping out important files in the operatinsystem or filling up the hard drive with garbage data.

As we will discuss a little later, there are ways to keep these virus programs from getting to your computebut they are not foolproof. A lot of viruses come in attached to e-mail, and then they will mail copies themselves to everyone in your e-mail address folder. You can‘t completely block them without blocking mail, and most of us like to get e-mail from our friends and coworkers.

The most important prevention for viruses is to have a good anti-virus program installed on your computeNorton, McCaffey and Panda are probably the most popular. The next most important thing is to keep thanti-virus software up-to-date, because the delinquents who write virus software are always coming up winew tricks, and the anti-virus companies are just as quickly coming up with new versions to stop them.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 9/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

ACCESS CONTROL

If you have ever had a computer that was connected to a local area network, you almost certainly had type in a user name and password to get network access. It‘s two forms of ID, just like when you cash check at department store.

The network administrator used that identification information to determine what you could and couldn‘t don the network. And there may have been additional passwords to access the company‘ customer databasemployee payroll records, or files stored on someone else‘s computer. 

Here are a few tips about passwords:

1.  First, if you share files on your computer, use password protection for them even if they are availabto everyone in the network. That way they can‘t be tampered with if a hacker breaks in.

2.  In choosing a password, never use your name, your birthday or other obvious personal informatioThe best is a random combination of letters and numbers.

3.  Commit the password to memory, and if you must write it down, hide it. A password written onpost-it note stuck to your monitor is probably worse than no password at all.

4.  Don‘t give your password to someone you don‘t know personally just because they claim to be tecsupport, the phone company, the police or your long-lost Aunt Matilda. Refer them to the netwoadministrator, or better yet, get their phone number and have the network administrator call theback.

FIREWALLS

In a building, a firewall is a wall to keep fire from spreading from one area to another. In a computnetwork, a firewall is a boundary that can block unwanted data packets. The firewall may be prograrunning on the server or router, or it may be a separate piece of hardware or even a complete computsystem just for that purpose. In any case, its purpose is to look at all of the packets coming through, andecide which ones can pass and which ones get blocked.

Ports – Several pages ago, we defined a port as the place in a hub that a cable plugs into. There is anothcompletely different kind of thing called a port, and that is a location in a computer‘s memory that is used ba device or application to send and receive data. Each application will have one (or more) of these locatiofor its own use.

For instance, there is a common e-mail program that has port # 110, which means that the prograexchanges information with the rest of the system at memory location 110. The popular game called Doouses port # 666.

When a packet is sent over a network, it will contain not only the destination address, but also the ponumber of the application that will use it at that destination. One of the ways a firewall controls the packe

is by looking at the port number, and only passing packets with ports that are appropriate for the destinationIf nobody should be playing Doom on the network‘s computers, then it would make sense to block port 666.

Another way a firewall can control traffic is to look at the source of the packet. It can have a ‗prohibited‘ lithat keeps out packets from certain IP addresses, or it can have an ‗allowed‘ list and block everyone who isnon it. Ports can be done the same way, with a ‗prohibited‘ or ‗allowed‘ list of ports. 

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 10/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

CREATING AN ETHERNET NETWORK

•  To start, your computer must have an Ethernet Network Interface Card (NIC).•  Ethernet NICs have an RJ-45 interface or port.

•  Hubs and Switches are used to connect computers, printers and other devices in the Ethernet LAN.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 11/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

ETHERNET OVER TWISTED PAIR (STRAIGHT CABLE)

Ethernet over twisted pair refers to the use of cables that contain insulated copper wires twisted togetherin pairs for the physical layer of an Ethernet network—that is, a network in which the Ethernet protocolprovides the data link layer. Other Ethernet cable standards use coaxial cable or optical fiber. There areseveral different standards for this copper-based physical medium. The most widely used are 10BASE-T,100BASE-TX, and 1000BASE-T (Gigabit Ethernet), running at 10 Mbit/s, 100 Mbit/s (also Mbps or Mbs -1),and 1000 Mbit/s (1 Gbit/s) respectively. These three standards all use the same connectors. Higher speed

implementations nearly always support the lower speeds as well, so that in most cases different generationsof equipment can be freely mixed. According to the standards, they all operate over distances of up to 100meters.

A 10BASE-T transmitter sends two differential voltages, +2.5 V or −2.5 V.

100BASE-TX follows the same wiring patterns as 10BASE-T but is more sensitive to wire quality and length,due to the higher bit rates.

A 100BASE-TX transmitter sends 3 differential voltages, +1 V, 0 V, or −1 V.

TIA/EIA-568-B T568A Wiring

Pin Pair Wire Color

1 3 tip white/green

2 3 ring green

3 2 tip white/orange

4 1 ring blue

5 1 tip white/blue

6 2 ring orange

7 4 tip white/brown

8 4 ring brown

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 12/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

ETHERNET CROSS CABLE

An Ethernet crossover cable is a type of Ethernet cable used to connect computing devices togetherdirectly where they would normally be connected via a network switch, hub or router, such as directlyconnecting two personal computers via their network adapters.

Two pairs crossed, two pairs uncrossed - 10baseT/100baseTX crossover

Pin

Connection 1: T568A Connection 2: T568B

Pins on plug face

signal  pair  color  signal  pair  color 

1 BI_DA+ 3white/green stripe

BI_DB+ 2white/orange stripe

2 BI_DA- 3green solid

BI_DB- 2orange solid

3 BI_DB+ 2white/orange stripe

BI_DA+ 3white/green stripe

4 1blue solid

1blue solid

5 1white/blue stripe

1white/blue stripe

6 BI_DB- 2orange solid

BI_DA- 3green solid

7 4 white/brown stripe 4 white/brown stripe

8 4brown solid

4brown solid

Certain equipment or installations, including those in which phone and/or power are mixed with data in thesame cable, may require that the "non-data" pairs 1 and 4 (pins 4, 5, 7 and 8) remain un-crossed.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 13/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

PEER TO PEER SETTING

Networking is the linking of two or more computers so that resources such as the printer and the Internet

connection can be utilized by more than one user at a time. You would need to obtain a crossover LAN cable

(not conventional LAN cable) and plug the ends into each of the two computers. This would be reflected in

situations where the Ethernet ports on both computers have the following code ―10 / 100″. Alternatively, if 

Gigabit Ethernet is available on both computers (identified by the code 10 / 100 / 1000), then a normal cabl

would do the job. The subsequent lines explain how the networking is done (assuming the computers are

running Windows 98 and above):

For the sake of simplicity, the two computers will be called MASTER and SLAVE respectively.

ON “MASTER” 

1. Right-click ―My Computer‖, click ―Properties‖  

2. Click ―Computer Name‖ Tab 3. Click ―Change‖  

4. A window should pop-up. Specify a name for the computer.

5. Click ―Workgroup‖ and specify a name. (We will call the computer MASTER and the workgroup HOME)

6. Click OK

7. Click OK in the computer properties windows. Restart the computer if prompted.

Configuring IP

1. Go to Start > Control Panel > Network Connections > Network Connections2. Right-click on your LAN connection and click ―Properties‖  

3. Under the heading ―This connection uses the following items‖, click ―Internet Protocol (TCP/IP)  

4. Click ―Properties‖  

5. A new window should pop up, click ―Alternate Configuration‖  

6. Click ―User configured‖ radio button 

7. Here, you can specify the address. For computer MASTER , specify the IP as 192.168.0.1, subnet mask a

255.255.255.0, Default gateway as 192.168.0.1. Under ―Preferred DNS Server‖, enter the value

 ―202.188.0.133″. As for ―Alternate DNS Server‖, enter the value ―202.188.1.5″. These values are sourced

from TmNet DNS, which will enable the computer to understand the numerical address details of a website

8. Click ―OK‖  

9. Click ―OK‖ under the LAN connection properties. 

You are done for computer MASTER  

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 14/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

ON ―SLAVE ― 

1. Right-click ―My Computer‖, click ―Properties‖  

2. Click ―Computer Name‖ Tab 

3. Click ―Change‖  

4. A window should pop-up. Specify a name for the computer.

5. Click ―Workgroup‖ and specify a name. (We will call the computer  SLAVE and the workgroup HOME)

6. Click OK

7. Click OK in the computer properties windows.

(You may have to restart the computer. If you are prompted to, do so)

Configuring IP

1. Go to Start > Control Panel > Network Connections > Network Connections

2. Right-click on your LAN connection and click ―Properties‖  

3. Under the heading ―This connection uses the following items‖, click ―Internet Protocol (TCP/IP)  

4. Click ―Properties‖  

5. A new window should pop up, click ―Alternate Configuration‖  

6. Click ―User configured‖ radio button 

7. Here, you can specify the address. For computer SLAVE, specify the IP as 192.168.0.2, subnet mask as

255.255.255.0, Default gateway as 192.168.0.1. Under ―Preferred DNS Server‖, enter the value

 ―202.188.0.133″. As for ―Alternate DNS Server‖, enter the value ―202.188.1.5″. These values are sourced

from TmNet DNS, which will enable the computer to understand the numerical address details of a website

8. Click ―OK‖  

9. Click ―OK‖ under the LAN connection properties. 

You are done for computer SLAVE 

When the steps above are done correctly, the computers will automatically discover and connect to each

other. To test the Connection, Select run from start button and type ping 192.168.0.1 to ping Master from

Slave and ping 192.168.0.2 to ping Slave from Master.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 15/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

WIRELESS ACCESS POINT

A wireless access point is a device that connects wireless devices (laptops, etc.) to a wired network, usuallyan Ethernet LAN.

•  The SSID is what will be displayed when people with wireless computers are looking for a wirelessLAN.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 16/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

GLOSSARY

802.11: The IEEE standard for wireless networking.

Access point: The transceiver where a wireless node connects to the network. Also the control system in a HyperLAN

network

Activation: The process of validating the Console and Client seat license information.

Administrator: The person in charge of managing a system or network.

Advanced Encryption Standard: A 128-bit encryption used by some government agencies - Abbreviated AES -

Compare to DES, Data Encryption Standard.

Alphanumeric: Consisting of letters and numbers. Names used in NT and RemoteScope must be made of alphanumeric

characters, with no spaces, symbols or punctuation except the dash and underscore.

Anti-virus software: A utility to detect the intrusion of virus programs and limit their damage.

Application: A computer program to perform a specific task for the user, as opposed to the operating system that runs

the computer itself.

Architecture: The way something is built. Network architecture refers to the various ways a network can be put togethor implemented.

ASCII: American Standard Code for Information Interchange: A digital code for transmitting characters. The format use

by personal computers for data exchange.

Back Office: See Microsoft Back Office.

Bandwidth: The carrying capacity of a data channel, usually expressed in bps (bits per second). Also called throughput

or transfer rate

Bit: The smallest unit of information in a computer, either a zero or a one.

Boot ROM: A ROM chip added to a network card that allows a system with no local disk drive to access and boot from a

operating system residing on the server.

Bootleg: Something made or used illegally or without authorization. In software it refers to additional copies installed o

computers other than the one for which the software was licensed.

Bottleneck: A portion of a system or network that is slower than the rest of the data path, either because of its

throughput speed or because of multiple data streams converging at that point.

Bps: Abbreviation for bits per second.

Bps: Abbreviation for bytes per second.

Bridge: a device for passing signals between two LANs or two segments of a LAN.

Broadcasting: Sending a message simultaneously to all systems of a network, without requiring an acknowledgement.

Compare to multi-casting.

Brouter: A device combining the capabilities of a bridge and a router.

Browser: A program that allows viewing of HTML pages.

Byte: A unit of digital data consisting of eight bits.

CAT 5: The twisted-pair cable normally used for networks

Cisco: A large supplier of networking hardware and software, including router and security products.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 17/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

Client: 1. A workstation in a client-server network. 2. A system controlled by the Remote-Scope Console.

Client-server network: An arrangement where some programs, files or other resources are located on one computer,

called the server, but are available to other systems on the network, called clients.

Command line: In a text-based operating system, the line on which the user types instructions for the system.

Compression: A method of compacting data for storage or transfer.

Configuration: The way the parts of a system or network are arranged or connected.

Console: The primary RemoteScope program from which Clients are controlled. Also, the workstation on which it is

installed

Data Encryption Standard: A common 56-bit encryption standard, and the one used by RemoteScope. Abbreviated

DES

Data switch: A device used to connect multiple networks or segments. It differs from a hub in that packets are routed

the proper port rather than being broadcast on all ports.

Dial-up connection: Accessing a network or the internet through a modem attached to a standard phone line.

Direct connection: The local connection to a network made by a network card, as opposed to the remote connection

made by a modem.

Distribution: Copying a file or software package to multiple Client systems.

DNS: Domain Name System.

Domain: An area under a single point of control. On the Internet there are different levels of control and each is a

domain. At the lowest level is each local area network that has its own network ID. Top-level domains are .com, .org etc

In some operating systems such as NT, a domain is a group of associated computers within a LAN.

Domain Name System (also Domain Name Service): An Internet service that translates the domain names used by

people into the numeric IP addresses used for routing on the Internet. The domain name system is actually a network o

domain name (DNS) servers.

Download: Copy a file from another computer to one's own, over a network or from the Internet.

Driver: A file containing information the operating system needs to interact with a hardware device or software module

In the case of hardware, it is usually called a device driver.

Dynamic addressing: Assigning IP addresses as needed from a pool of available addresses maintained on a server,

rather than assigning a fixed IP address to each system.

Encryption: Encoding data to protect it from being intercepted by unauthorized persons. RemoteScope encrypts all dat

transmissions, all password and user name information, and some application files.

Ethernet: A widespread standard for local area networks. There are versions for coaxial cable, twisted pair cable, fiber

optic cable and wireless.

Exporting: Outputting report information in another format, to be used in a different application - RemoteScope providnearly 40 formats and variations for exporting report information.

Firewall: A barrier in a network that will only pass packets authorized to reach the other side.

Frame: A data structure used in network transmissions, consisting of one or more headers and a footer bracketing a da

packet.

Full control: One of the three remote control modes. Only the user of the Console will be able to enter keystrokes and

mouse movements for the Client machine. The user at the Client has no keyboard or mouse control.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 18/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

Group: A collection of RemoteScope Clients assembled into a unit for common access. Actions can be taken with all

clients in a group simultaneously instead of one at a time.

Header: Data that comes in front of a data packet, containing address and handling information for that packet.

HTML: HyperText Markup Language. A program language for writing web pages that can include links to other pages.

HTTP: HyperText Transfer Protocol. The standard for accessing HTML pages

Hub: A device providing a central point of connection for network cables.

I/O port: A hex memory address used by a device or program to exchange data with the rest of the computer system.

IEEE 802.11: A common standard for wireless networking, issued by the IEEE.

Internet: A cooperative system linking computer networks worldwide.

Inventory: A list of the installed hardware, applications and operating system for a particular system, maintained in a

database at the Console.

Internet Protocol: The portion of the TCP/IP suite that specifies packet formatting, naming and routing. Abbreviated I

IP address: A 32-bit number designating an individual machine on a network or on the Internet. It is usually listed as

four groups of three-digit decimal numbers.

IPv6: A plan for expansion of the domain name system. It stands for Internet Protocol version 6.

IRQ: Interrupt ReQuest. The signal that a peripheral or program uses to request service from the CPU. There are 15

different IRQ values that can be used by system hardware.

ISP: Internet Service Provider. An organization providing access to the Internet

ISS file: A file created for a silent or unattended install using InstallShield. It contains a record of all the keystrokes

required to complete the installation. ISS stands for InstallShield Silent Response.

LAN: Local Area Network. A group of computers connected to each other by cable or some form of wireless technology,

and usually located within the same building.

Log on: Gain access as a current user of a system or network, usually by entering a user ID and password.

Mbps: Megabits per second. A data transfer rate of one million bits each second.

Messaging: A form of network communication that appears instantly on the monitor of the receiving system - Also call

instant messaging

Microsoft Back Office: A collective term for server functions other than domain controller, such as file and print server

on a Microsoft network.

Modem: A device for sending computer data over a voice phone line. Modem stands for modulate/demodulate.

Multi-casting: Sending a message simultaneously to a select group of systems. Compare to broadcasting.

Name resolution: The process of converting a people-friendly alphanumeric system name or domain name into the IP

address recognized by the network

NetWare: A network server operating system from Novell.

Network: A system or group of interconnected elements. A computer network is a group of computers and peripherals

connected together to communicate with each other and to share information and resources.

Network adapter card: A plug-in expansion card with a connection for a network cable, or an antenna for wireless

transmission. Also called a network interface card or NIC

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 19/20

Computer Network Course - © 2009 Avery Malaysia - www.awtxglobal.com.my 

NIC: Network Interface Card. A plug-in expansion card with a connection for a network cable, or an antenna for wireles

transmission - Also called a network adapter card

Node: Any point in a network that can influence the flow of data on that network. This usually refers to each of the

systems and peripherals on the network that have their own physical device address.

Novell: A software company that produces NetWare and other networking products.

NT: Windows NT, an operating system from Microsoft.

Offline: Not available to the network.

Online: Turned on and connected to the network.

Operating system: The master control program that runs the computer and allows it to execute applications.

OS X: The latest operating system for Macintosh computers, based on the Linux kernel but with a more user-friendly

graphic interface. It includes networking capabilities.

Packet: A block of information configured for transmission over a network.

Password: A string of characters that a user must enter to gain access to a resource that is password-protected.

PC Anywhere: A common program used for control of a remote system.

Peer-to-peer: A small network where each computer has equal status and control. Compare to client-server.

Port: An address in memory used to transfer data into and out of a system. TCP/IP needs a port number to be able to

provide the communication connection. RemoteScope allows configuring the Port number between 10000~50000.

Protocol: An agreed-upon standard for how something will be done. Computer protocols are rules for the exchange of 

information.

Proxy server: A server that sits between a client and a web server and represents itself to each end as being the other

It can be used in two ways. For the web server it can cache frequently accessed pages to reduce the web-server's traffic

For security of the LAN clients it can present a single IP address to the Internet and prevent direct access to the rest of 

the LAN.

Remote Access Service : The protocol used in Windows NT and its successors to provide remote dial-in access to a

network running Windows NT or its successors. Abbreviated RAS

Remote connection: The link between a modem and a network through a dial-up connection. Compare to the direct

connection made by a network card.

Repeater: A device to boost network signals transmitted over a long span.

RJ-11: A four-wire jack used with Cat3 cable for telephone

RJ-45: An eight-wire jack used with Cat5 cable and Ethernet cabling.

Rollout: Installing new software or updates to multiple systems in a network.

Router: An intelligent packet sorting device, used to route traffic on a network or between networks.

Session: 1. A logical connection between two systems. It is basically an agreement that they are ready to exchange

information with each other, and includes the specifics of how this will be done, for what duration, etc. 2. The period of 

time that a process or program is active - Each time it is opened or started marks a new session, which lasts until it is

closed or halted.

Sniffer: A utility program that captures packets going over a network.

SOHO network: Small Office / Home Office network, often peer-to-peer.

8/6/2019 Complete Network Course

http://slidepdf.com/reader/full/complete-network-course 20/20

Static addressing: Assigning a specific IP address permanently to a specific system. Compare to dynamic addressing.

Subnet: A LAN that is part of a larger logical network.

System administrator: A person who manages and maintains a network of computers or a large multi-user computer

TCP/IP: A suite of communication protocols used on the Internet and other networks. It stands for Transmission Contro

Protocol / Internet Protocol.

Template: A document or other file used as a standard to create other documents and files. The template will already

contain the properties and content that are common to those files created with the template so that they do not have to

be re-created or re-entered each time.

Throughput: A measure of the amount of data transferred in a specific amount of time, usually expressed as bits per

second (bps).

Tree: A way of organizing information in a hierarchy, with primary levels that have branches and sub-branches under

them.

Tutorial videos: A collection of video clips on the RemoteScope CD that that give a visual presentation of the more

common tasks. Highly recommended for new users

UNIX: Any of a group of operating systems derived from an original program written at AT&T and licensed to

universities. The trademark to the name UNIX is owned by Novell, who sells a version called UnixWare.

User: A person who requires a computer for the performance of a task or recreational activity. Also called an end-user

User ID: The series of characters a system or network uses to distinguish one user from another. Also called a user

name

Virus: A program that cause damage either by deleting or corrupting files, or by interfering with computer operations b

reproducing itself to fill up disk or RAM space. Originally the term applied only to the reproducing kind but it has come to

mean any deliberately harmful software.

Virtual Private Network: A secure connection created over a public network by using tunneling-mode encryption.

Abbreviated VPN

WAN: Wide Area Network. A connection between computers or networks located in separate cities or area codes

Windows NT: The first full-featured network operating system from Microsoft, replaced by Windows 2000 but still in

widespread use.

Workgroup: A group of systems within a network that share specific resources.

WWW: The World Wide Web. That portion of the Internet that uses linking HTML pages.