Sunteți pe pagina 1din 7

What is Network Diagram?

A network diagram shows how computers and network devices (e.g. router, switch, etc) connect
with each other within a network. It is widely used in network architecture design. A typical use
of network diagram is for tracking down network issues by studying how the computers and
devices are connected and inter-related.

1a. Definition - What does Computer Network mean?

A computer network is a group of computer systems and other computing hardware devices that
are linked together through communication channels to facilitate communication and resource-
sharing among a wide range of users.

Networks are commonly categorized based on their characteristics.

Techopedia explains Computer Network

One of the earliest examples of a computer network was a network of communicating computers
that functioned as part of the U.S. military's Semi-Automatic Ground Environment (SAGE) radar
system. In 1969, the University of California at Los Angeles, the Stanford Research Institute, the
University of California at Santa Barbara and the University of Utah were connected as part of
the Advanced Research Projects Agency Network (ARPANET) project.
It is this network that evolved to become what we now call the internet.

Networks are used to:

 Facilitate communication via email, video conferencing, instant messaging, etc.


 Enable multiple users to share a single hardware device like a printer or scanner.
 Enable file sharing across the network.
 Allow for the sharing of software or operating programs on remote systems.
 Make information easier to access and maintain among network users.

There are many types of networks, including:

 Local Area Networks (LAN).


 Global Area Networks (GAN).
 Personal Area Networks (PAN).
 Home Area Networks (HAN).
 Wide Area Networks (WAN).
 Campus Networks.
 Metropolitan Area Networks (MAN).
 Enterprise Private Networks.
 Internetworks.
 Backbone Networks (BBN).
 Global Area Networks (GAN).
 The internet.

1b VPN benefits

 Security – The main reason why businesses choose to adopt virtual private networks.
Having encrypted data, particularly if it is of a sensitive nature, is vitally important. Data
breaches not only lead to compensation and regulatory fines, but can leave lasting
reputational damage.
 Mobility – VPNs give businesses the security to share their resources with employees
and partners that are not based in the office at all times. This can provide a huge boost to
productivity by ensuring that staff are not tethered to traditional office working times and
locations. Organisations have also begun using VPNs to outsource their work, enabling
them to lower internal staff costs.
 Cost – Virtual private networks can prove much more affordable than a physical private
network. Rather than having to lease long distance network connections to achieve a
secure transfer of data, businesses use the existing public network to facilitate their VPN.

1c. Bridge

Definition: A connectivity device that forwards data based on a physical address.

In networking terms, a bridge filters and forwards packets by physical address. Bridges operate
at the Network Access Layer in the TCP/IP protocol stack.
Hub

Definition: A connectivity device to which network cables are attached to form a network
segment. Hubs typically do not filter data, but instead retransmit incoming data packets or frames
to all parts.

Almost all networks today use a central hub or switch to which the computers on the network
connect. In a hubbed network, each computer is connected to the hub through a single line. That
makes adding a host to the network, or taking it off, a simple task.

Switch

Definition: A switch is aware of addresses associated with each of its ports and forwards each
incoming data frame to the correct port. Switches can base forwarding decisions on guidelines
that are provided in the headers of the TCP/IP protocols.

A switch, simplified, is a smarter version of a hub. On a switch, as with a hub, each computer is
connected through a single line. However, the switch is smarter about where it sends data that
comes in through one of its ports.

Router

Defined: A connectivity device that filters and forwards data based on a logical address. In the
case of TCP/IP networks, that would be the IP address.

Routers are an essential part of any larger TCP/IP network. In fact, without the development of
network routers and TCP/IP routing protocols, the Internet (the biggest network in the world)
would not have become as extensive. Routers play a vital role in controlling traffic and keeping
the network efficient.

1d. Stands for "World Wide Web Consortium." The W3C is an international community that
includes a full-time staff, industry experts, and several member organizations. These groups
work together to develop standards for the World Wide Web.

The mission of the W3C is to lead the Web to its full potential by developing relevant protocols
and guidelines. This is achieved primarily by creating and publishing Web standards

Continuation

Roles of W3C Offices


A W3C Office is a regional arm that helps recruit Members and promote W3C
technology. The primary roles of a W3C Office are to:
1. Recruit stake-holders in the region by introducing them
to W3C, developing relationships with local technology or policy leaders,
and guiding organizations through the steps for joining W3C. The W3C
Offices play an important role in maintaining W3C’s Membership base,
which is fundamental to W3C’s operations.
2. Provide support for existing W3C Members in the region.
3. Provide feedback to W3C on regional issues (for example,
in support of W3C’s Internationalization Activity).
4. Promote the adoption of W3C Recommendations with a particular attention to the local
languages and cultures.
5. Initiate translations and help others translate W3C materials and promote
their dissemination.

1e. What is the difference between uploading and downloading?


Uploading is the process of putting web pages, images and files onto a web server.
Downloading is the process of getting web pages, images and files from a web server.

To make a file visible to everyone on the internet, you will need to upload it.
When users are copying this file to their computer, they are downloading it.

2a. meaning of protocol,

Protocol
A protocol is a standard set of rules that allow electronic devices to communicate with each
other. These rules include what type of data may be transmitted, what commands are used to
send and receive data, and how data transfers are confirmed.

You can think of a protocol as a spoken language. Each language has its own rules and
vocabulary. If two people share the same language, they can communicate effectively. Similarly,
if two hardware devices support the same protocol, they can communicate with each other,
regardless of the manufacturer or type of device. For example, an Apple iPhone can send an
email to an Android device using a standard mail protocol. A Windows-based PC can load a
webpage from a Unix-based web server using a standard web protocol.

2b. intranet.

Intranet
An intranet is a private network that can only be accessed by authorized users. The prefix "intra"
means "internal" and therefore implies an intranet is designed for internal communications.
"Inter" (as in Internet) means "between" or "among." Since there is only one Internet, the word
"Internet" is capitalized.
Not to be confused with the Internet.

An intranet is a computer network for sharing corporate information, collaboration tools,


operational systems, and other computing services only within an organization, and to the
exclusion of access by outsiders to the organization. The term is used in contrast to public
networks, such as the Internet, but uses most of the same technology based on the Intern

2c

What is an Extranet?

An extranet is a communications network based on common internet protocols including the


Transport Control Protocol and the Internet Protocol (TCP/IP), and typically used for
information sharing. An extranet differs from an internet website in that access to the extranet is
restricted to individual users possessing the appropriate login credentials. Additionally, an
extranet can be subdivided into multiple specialty areas with each having different access
requirements. Therefore, information and data can be isolated so that a business partner,
customer, or vendor may only access the information pertinent to their operations, and prohibits
access to other sensitive company data.

Extranet Example

FPS is a large shipping company specializing in transporting packages and other goods. FPS has
several customers, one of which is the XYZ Corporation, who ships many products to their
customers. XYZ Corporation requires detailed shipping reports and associated documentation.
FPS does have a website on the internet that everyone can use to track packages, but the website
does not offer the level of detail or meet XYZ's privacy requirements. XYZ needs the ability to
access reports detailing all packages shipped, by whom, and package receipt data. To meet their
customer's needs, FPS creates an extranet that requires a special login. The extranet offers XYZ
Corporation access to their own detailed proprietary reports and related shipping documentation.

Extranet Diagram

Internet vs. Intranet vs. Extranet

 Everyone has access to the internet.


 People who work for a company will have access to the company intranet.
 An extranet is created by a company to offer customers, suppliers, and vendors specific data
without allowing them access to other proprietary or sensitive company data.

2d.

he World Wide Web is another way to describe the Internet, which is a network of computers
which are connected and that share information and allow communication around the world.
An example of the World Wide Web is the Internet.

2e.

A web browser is a software application that people use in order to view web pages on the internet. It
can be used to upload or download files on FTP servers. It uses security methods such as SSL and TLS to
secure internet traffic. It also uses cookies to store information and it caches web pages to make
internet surfing more efficiently.

Search engine,

A search engine is software, usually accessed on the Internet, that searches a database of
information according to the user's query. The engine provides a list of results that best match
what the user is trying to find. Today, there are many different search engines available on the
Internet, each with their own abilities and features. The first search engine ever developed is
considered Archie, which was used to search for FTP files and the first text-based search engine
is considered Veronica. Today, the most popular and well-known search engine is Google. Other
popular search engines include AOL, Ask.com, Baidu, Bing, and Yahoo.

2f

client/server - Computer Definition

A network architecture that distributes intelligence and responsibilities at several levels, with
some machines designated as servers to serve the needs of client machines. A server can be a
mainframe, minicomputer, or personal computer that operates in a time-sharing mode to provide
for the needs of many clients. Client machines are complete, standalone computers that optimize
the user interface, relying on servers to handle the more mundane tasks associated with
application and file storage, network administration, security, and other critical functions. See
also peer-to-peer.

A Web server is a program that uses HTTP (Hypertext Transfer Protocol) to serve the files that
form Web pages to users, in response to their requests, which are forwarded by their computers'
HTTP clients. Dedicated computers and appliances may be referred to as Web servers as well.

The process is an example of the client/server model. All computers that host Web sites must
have Web server programs. Leading Web servers include Apache (the most widely-installed
Web server), Microsoft's Internet Information Server (IIS) and nginx (pronounced engine X)
from NGNIX. Other Web servers include Novell's NetWare server, Google Web Server (GWS)
and IBM's family of Domino servers.

Web servers often come as part of a larger package of Internet- and intranet-related programs for
serving email, downloading requests for File Transfer Protocol (FTP) files, and building and
publishing Web pages. Considerations in choosing a Web server include how well it works with
the operating system and other servers, its ability to handle server-side programming, security
characteristics, and the particular publishing, search engine and site building tools that come
with it.

3g.

E-mail
Short for electronic mail, e-mail or email is information stored on a computer that is exchanged
between two users over telecommunications. More plainly, e-mail is a message that may contain
text, files, images, or other attachments sent through a network to a specified individual or group
of individuals.

3h.

URL

A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on


the internet. It is also referred to as a web address. URLs consist of multiple parts -- including a
protocol and domain name -- that tell a web browser how and where to retrieve a resource.

End users use URLs by typing them directly into the address bar of a browser or by clicking a
hyperlink found on a webpage, bookmark list, in an email or from another application.

S-ar putea să vă placă și