Reflection Papers: Gapoy, Frednixen B. BSMT 1-Alpha
Reflection Papers: Gapoy, Frednixen B. BSMT 1-Alpha
Papers
in
ICT
Submitted by:
Gapoy, Frednixen B.
BSMT 1- Alpha
Gapoy, Frednixen B. July 4, 2021
BSMT1- Alpha
Reflection Paper about the short video titled “Computer Networks: Crash Course
Computer Science #28”
The short clip titled “Computer Networks: Crash Course Computer Science #28” aims
to discuss about computer network and its types. It was presented by speakers from Crash
Course.
Without a doubt, computers' ability to send and receive data through a global
telecommunications network has permanently altered the world. As a matter of fact, it is
not an overstatement to say that computers are the beacon of hope. Relaying a message
150 years ago would have taken weeks or months for the recipient to have it, and you
would have to pay for express mail. As of the moment, sending an email takes less than a
second. The communication process was ameliorated all thanks to computers.
Computers and networks never went together. Prior to 1970, most computers were
used alone, without the usage of networks. However, when big computers grew more
common in many workplaces and environments, they became increasingly useful in
transmitting data and resources. As such, first computer networks were developed to better
aid computers.
The first type of network is called Personal Area Network (PAN). It is a network that
is set up within a single person and normally has a range of 10 meters. The term "Personal
Area Network" refers to a network that is used to connect personal computer devices. The
Personal Area Network was first proposed by Thomas Zimmerman, a research scientist.
Laptops, mobile phones, media players, and play stations are examples of personal
computing devices that are utilized to form a personal area network.
Next one is the metropolitan area network (MAN) It is a network that connects
multiple LANs to form a larger network that covers a greater geographic area. MAN is used
by government organizations to engage with citizens and private businesses. MAN connects
many LANs using a telephone exchange line. RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
and other protocols are commonly used in MAN. Its range is greater than that of a Local
Area Network (LAN).
After that is wide area network (WAN). It is defined as a network that spans a vast
geographic area, such as many states or countries. A Wide Area Network (WAN) is a much
larger network than a local area network (LAN). It is employed in various fields such as
business, education, and government.
Last but not the least is Local Area Networks, or LANs is a type of network. A local
area network (LAN) connects two or more computers using a communication means such as
twisted pair or coaxial cable. It is less expensive given the fact that it is made up of low-cost
components such as hubs, network adapters, and ethernet cables. A higher level of security
is provided by a Local Area Network.These small networks of close-by computers can range
in size from two machines in the same room to thousands of computers on a university
campus. Although various LAN technologies were created and deployed, Ethernet,
developed in the early 1970s, is the most well-known and is still extensively used today. A
number of PCs is connected to a single, common ethernet cable in its most basic form.
When a computer wants to transmit data to another computer, it writes the data onto the
cable as an electrical signal. Because the cable is shared, every computer connected to the
network sees the transmission but has no way of knowing if the data is for them or for
another computer.
Overall, the video was a spectacular, as it presented facts about computer and its
relation to networks. Now I know what network is and how it is very essential to computer
telecommunication. With the use of networks. Connnecting one and more computers has
never been this easy before.
Gapoy, Frednixen B. July 4, 2021
BSMT1- Alpha
Reflection Paper about the short video titled:
“The Internet: Crash Course Computer Science #29)”
The short clip titled “The Internet: Crash Course Computer Science #29)” is an
introductory educational video which aims to feature various topologies to the viewers. It
was presented by Carrie Anne from CrashCourse Computer Science. It begun by first
introducing the concept of topologies. Afterwards, the different types of topologies were
cited and explained one by one.
Every computer linked to the Internet, including your own, is part of a network. To
connect to an Internet Service Provider, for example, you might use a modem and call a
local number (ISP). Even if you're part of a LAN at work, you're very certainly still connected
to the Internet through an ISP that your employer has signed with. When you join to your
ISP's network, you become a part of it. After then, the ISP can connect to a bigger network
and become a part of it. The Internet is nothing more than a collection of networks.
What I learned from the clip is that an IP address (Internet Protocol address) is a
numerical identification issued to each device connected to a computer network that
communicates using the Internet Protocol. An IP address is used for two purposes:
identifying a host or network interface, and addressing a specific location.One of the
simplest and most common is the User Datagram Protocol, or UDP. UDP has its own header,
which sits inside the data payload. Inside of the UDP header is some useful, extra
information. One of them is a port number. Every program wanting to access the internet
will ask its host computer’s Operating System to be given a unique port.
TCP and UDP are two protocols for transmitting bits of data (packets) across the
Internet. Both protocols are based on the Internet Protocol (IP). In other words, whether
you use TCP or UDP to deliver a packet, the packet is sent to an IP address. These packets
are sent from your computer through intermediary routers and then to their final
destination in the same way.
On the Internet, TCP is the most widely used protocol. When you use your browser
to request a web page, your computer sends TCP packets to the web server's address,
asking it to return the document to you. The web server responds by delivering a stream of
TCP packets to your web browser, which your browser assembles into the web page. When
you click a link, sign in, post a comment, or do anything else, your web browser sends TCP
packets to the server and the server sends TCP packets back.
On the other hand, the UDP protocol is comparable to TCP, except it removes any
error-checking functionality. All of the back-and-forth communication adds latency to the
process, slowing it down. Packets are simply transmitted to the recipient when an app
utilizes UDP. The sender does not wait to see if the receiver has received the packet before
moving on to the next one. If the recipient occasionally misses a few UDP packets,
When our computer wants to make a connection to a website, you need two things -
an IP address and a port. The internet has a special service that maps these domain names
to addresses. It’s like the phone book for the internet. And it’s called the Domain Name
System, or DNS for short. There’s over 300 million registered domain names, so to make
that DNS Lookup a little more manageable, it’s not stored in a tree data structure. What are
called Top Level Domains, or TLDs, are at the very top. Then, there are even lower level
domains, called subdomains.
In the Open System Interconnections (OSI) paradigm, the network physical layer is
the lowest network layer. The transfer of individual bits from one node to another across a
physical media is the major focus of this layer. Above this is the Network Layer, which is
where all the switching and routing technologies that operate. And today, Transport layer,
protocols like UDP and TCP, which are responsible for point to point data transfer between
computers, and also things like error detection and recovery when possible. These are the
bottom five layers of the Open System Interconnection (OSI) model, a conceptual
framework for compartmentalizing all these different network processes.
In conclusion, the video was really effective in delivering information about the
process of connecting to internet. Because of the video, I becane more knowledgeable
about various terms that I seldom heard before such as domain, OSI, and TLD.
Gapoy, Frednixen B. July 4, 2021
BSMT1- Alpha
The short clip titled “Network Topologies (Star, Bus, Ring, Mesh, Ad hoc,
Infrastructure, & Wireless Mesh Topology)” is an introductory educational video which aims
to feature various topologies to the viewers. It was presented by speakers from Crash
Course. It begun by first introducing the concept of topologies. Afterwards, the different
types of topologies were cited and explained one by one.
There are two main types of topologies: wired and wireless. The most common
wired topology that's used is the star topology.A star topology is a network topology in
which each network node is connected to a hub or switch. One of the most significant
advantages of this topology is that if one computer fails or the cable breaks, the other
computers are unaffected because each machine has its own cable connection. A downside
of the star topology is that if the central hub or switch fails, all of the computers connected
to it are affected.
Another example of topology is the bus topology. Just like the ring topology, it is an
outdated technology that isn't widely utilized anymore. This is a network configuration in
which all PCs and network devices are connected to a single coaxial cable or backbone. A
benefit of the bus topology is that it is relatively inexpensive and simple to implement. The
bus topology, on the other hand, has the drawback of requiring the use of terminators at
both ends of the cable. For this configuration to work, there must be no open connections,
including the ends that link to the computers.
The next one is mesh topology. Each computer on the network is connected to every
other computer on the network in a mesh topology. The benefit of a mesh topology is that it
provides a high level of redundancy. Because even if one or more links go down, the
computers can still interact with one another.Wide-area networks, such as the internet, are
where they are most commonly employed. Even if a few routers fall down, the data will be
rerouted to their destination via an alternative way.
The second major category of topology is the wireless.The first type of it is the
wireless infrastructure topology. In this topology, wired and wireless devices are both
employed. This is quite similar to a star topology, in which wired devices are physically
linked to a switch. You also have a wireless access point that is connected to the same
switch through a cable. The wireless access point is intended to allow wireless devices like
laptops, tablets, and cell phones to connect to the network wirelessly. Through it,
depending on the demands of the users, you can now have various wireless access points.
Ad hoc is one type of wireless topology. Ad hoc networking is a very basic wireless
topology. It's easy since it doesn't rely on any infrastructural components like cables,
routers, or wireless access points. In a simple peer-to-peer network, all devices in an ad hoc
network wirelessly connect to other devices. Because they communicate directly with one
another without the assistance of a server or router, each device is responsible for its own
security and authorization. Ad hoc networks are excellent for quickly establishing a wireless
network where devices can share data without the need for an existing network.
Last but certainly not the least is the wireless mesh. Each wireless access point in a
wireless mesh communicates with other wireless access points to create a seamless internet
connection for wireless devices. Because all of the access points are in continual
communication with each other and the modem, you will have internet access regardless of
which access point you are connected to. It won't matter if one or more access points fail
because the data will be rerouted by the other access points.
The short clip titled “Hub, Switch, & Router Explained - What's the difference?” is an
introductory educational video which aims to feature various topologies to the viewers. It
was presented by Powercert Aninmated Videos. It begun by first introducing hubs, switches,
and router. Afterwards, their purpose and roles were discussed.
Hub, switch, and a router are all similar but there is a difference in the way they
handle data. Hub’s purpose is to connect all of your network devices together on an internal
network. It's a device that has multiple ports that accepts Ethernet connections from
network devices
A hub is no longer considered intelligent because it does not filter data or have any
knowledge of where the data should be routed. Because a hub only knows when a device is
attached to one of its ports, this is the case. As a result, every time a data packet arrives at
one of the ports, it is duplicated to all of the others. As a result, data packets are visible to
all devices connected to that hub. So, if a data packet arrives at one port, the hub will simply
rebroadcast it to every other port with a device attached to it. So, even if this computer just
wanted to connect with this computer over here, the data would still be received by these
other computers, even if it wasn't meant for them.As a result, not only does this raise
security issues, but it also generates needless network traffic, wasting resources. A switch
has evolved into something resembling a hub. It's also a gadget that takes Ethernet
connections from network devices and has numerous ports. A switch, unlike a hub, is
intelligent.
A switch may really learn the physical addresses of the devices connected to it and
store them in its database as MAC addresses. So, unlike a hub, when a data packet is
transmitted to a switch, it is only sent to the designated target port, but a hub would just
replay the data to all ports. As an example, if this computer wished to connect with this
computer over here, the data packet would arrive at the switch, which would then search
up the MAC address in its table of matching ports and transfer the data to the appropriate
port. The data packet would then only be sent to that machine. That is the primary
distinction between a hub and a switch. As a result, switches are considerably more favored
than hubs since they eliminate needless network traffic.
To summarize, a hub recognizes only when a device is physically linked to it. A switch
can also recognize particular devices that are connected to it since it maintains track of their
MAC addresses. Now hubs and switches are used to exchange data within a local area
network. Because a device must be able to read IP addresses in order to exchange or route
data beyond their own network to another network, such as the internet. IP addresses are
not read by hubs and switches. This is when the router comes into play. A router now
accomplishes precisely what its name suggests.
A router is a device that uses IP addresses to route or forward data from one
network to another. When a data packet arrives at the router, the router examines the IP
address to identify whether the packet is intended for its own network or for another
network. The router gets the data packet if it is determined that it is intended for its own
network. It transfers it to another network if it isn't intended for its own network. As a
result, a router serves as the network's gateway. So we have a private network with its own
router, which we'll refer to as the'red network,' because the PCs' displays are red.
All in all, this educational video was effective in imparting to the viewers vital
information about Hub, Switches, and Router. Hubs and switches are used to create
networks while routers are used to connect networks. These devices have its own advantaes
and disadvantages and are extensively used to make use of computer networks.