0% found this document useful (0 votes)
55 views23 pages

Chapter 6 Student

This document is an instructional module for an Introduction to Computing course at Nueva Vizcaya State University. It provides an overview of basic networking concepts including: what a network is, types of networks like personal area networks and wide area networks, network topologies like logical ring and bus topologies, and transmission media. The module aims to introduce students to data communication, computer networks, and how the internet works through its structures.

Uploaded by

pasionnovelyn04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views23 pages

Chapter 6 Student

This document is an instructional module for an Introduction to Computing course at Nueva Vizcaya State University. It provides an overview of basic networking concepts including: what a network is, types of networks like personal area networks and wide area networks, network topologies like logical ring and bus topologies, and transmission media. The module aims to introduce students to data communication, computer networks, and how the internet works through its structures.

Uploaded by

pasionnovelyn04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 23

Republic of the Philippines

NUEVA VIZCAYA STATE UNIVERSITY


Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021

College: Arts & Sciences


Campus: Bayombong

DEGREE BS in Information COURSE NO. IT ECC 1


PROGRAM Technology
SPECIALIZATION N/A COURSE TITLE Introduction to Computing
YEAR LEVEL 1st Year TIME FRAME 15 hrs WK NO. 12-13 IM 05
NO.

I. LESSON TITLE – BASIC NETWORKING


A. What is Network
B. Types of Network
C. Type of Topologies
D. Transmission Media
E. Internet
F. Internet Protocol
G. IPV4 Overview
H. World Wide Web
I. Computer Ethics
J. Networking Cabling – simple step by step guide

II. LESSON OVERVIEW


This module will introduce Data Communication and Computer Network (DCN) and will also take you
through various advance concepts related to Data Communication and Computer Network which is the
Internet and its structures.

III. DESIRED LEARNING OUTCOMES


At the end of the chapter, the students are expected to:
 discuss Identify the different type of topology
 identify the types of transmission media
 appreciate how the internet works with all its structure
 follow the proper procedure on how to used appropriate tools in crimping (Straight through and
Cross Over)

IV. LESSON CONTENT


A. WHAT IS NETWORK?
Data Communication
• Data communication is an exchange of data between two devices via some form of transmission
media.
Factors on Which Effective Data Communication Depends
1. Delivery. System must deliver data to correct destination. Data must be received by intended device or
user.
2. Accuracy. System must deliver data accurately. Data has been altered in transmission and left as it is
are useless.
3. Timeliness. Must deliver data in timely manner. Data deliver late is useless.
Components Of Data Communication
1. Sender- it is the transmitter of data. Ex. - Terminal, Computer, Mainframe
2. Medium - the communications stream through which the data is being transmitted.
Ex. – Cabling, Microwave, Fiber optics, Radio Frequencies (RF), Infrared Wireless
3. Receiver/Host. The receiver of the data transmitted. Ex. – Printer, Terminal, Mainframe

NVSU-FR-ICD-05-00 (081220) Page 1 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
NETWORK/COMPUTER NETWORK
 A connected system of objects or people
 A collection of computing devices that are connected in various ways in order to communicate and
share resources
 Usually, the connections between computers in a network are made using physical wires or cables,
some connections are wireless, using radio waves or infrared signals
 defined as having two or more devices, such as workstations, printers, and servers, linked together for
the purpose of sharing information, resources, or both
 COMPUTER NETWORKING – is the scientific and engineering discipline concerned with
communication between computer systems.

 Node or host refers to any device on a network


 Data transfer rate - the speed with which data is moved from one
place on a network to another
 Data transfer rate is a key issue in computer networks
 Computer networks have opened up an entire frontier in the world of
computing called the client/server model
 File server A computer that stores and manages files for multiple users on a network
 Web server A computer dedicated to responding to requests (from the
browser client) for web pages

 Goals of networking
 improve productivity, foster communication, control costs, and make
information access faster and easier
 to achieve these goals, the network needs certain attributes :
Simple, Manageable, Adaptable, Reliable, Transparent

 Benefits of Networking
 Sharing Input, Output, Storage Devices
 Sharing Modems and Internet Connections
 Security
 Sharing Data and Applications
 Reduced Expenditure

B. TYPES OF NETWORKS

1. Personal Area Network (PAN)


o Very small scale network; range is less than 2 meters;
o Ex. Connections between Cell phones, PDAs, MP3
players
2. Local-Area Network
o A local-area network (LAN) interconnects computers within a
limited geographical area, such as within a building or
campus. LANs connect workstations, peripheral equipment,
servers, and other devices that are within a few thousand meters of each other. LANs are found in
businesses, schools, governments, and even homes.
a) Home Area Network (HAN) - Small scale network; Connects computers and entertainment
appliances; Found mainly in the home
b) Building-area Networks (BANs) - In this type of network, the owner of a building provides
telecommunications services to tenants just as they would any other services such as water,
heating, and cooling. BANs are particularly popular in Multiple Dwelling Units (MDUs) such as
apartment buildings.
c) Campus Area Networks (CAN) - A LAN in one large geographic area; Resources related to
the same organization; Each department shares the LAN
3.

NVSU-FR-ICD-05-00 (081220) Page 2 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
4. Metropolitan-area Networks (MANs)
o When two or more LANs are linked within a city or limited geographic area, it is considered a
metropolitan-area network (MAN). A university or government that has several campuses or
departments, each with its own LAN, within a metropolitan area can directly interconnect these
LANs to create a MAN so that resources and data can be shared.
5. Wide-area Networks (WANs)
o As its name implies, a wide-area network (WAN) has few geographic limits. WANs can cover a city,
country, or even the entire world. The Internet is an example of a WAN. Since WANs connect users
across great distances, they are also used by large corporations to communicate efficiently and
quickly between offices within a country or around the world.

C. NETWORK TOPOLOGIES

A topology (from Greek topos meaning place) is a description of any kind of locality in terms of its
layout. In communication networks, a topology is a usually schematic description of the arrangement of a
network, including its nodes and connecting lines. There are two ways of defining network geometry: the
logical (or signal) topology and physical topology.

The two types of topology concepts are explained as follows:


1. Logical topologies
 The logical topology of a network describe the function of the network. They describe how the
network gets voice and data from point to point and how data flows through the network.
 The two types of logical topologies are ring and bus.
a) logical ring topology
 data is transmitted from computer to computer until it reaches the destination computer. The
wire transfers a complete data frame with one bit allowed on the wire at a time.
 the logical ring topology is used in manufacturing, where it is often critical that the time it takes
for a message to transmit from a given source to its destination is predictable
b) logical bus topology
 is known as a passive topology because the computers do not regenerate the signal and pass it on
as they do in a ring.
 Instead, special networking devices like repeaters are needed to regenerate the signals over long
distances
 On a logical bus topology, when a failure occurs, communication between all the devices fails as
well. One advantage to a logical ring topology is that if a failure occurs, not all communication fails.
Only the communication on the affected segment fails.

2. Physical Topologies
 The physical topology of a network often differs from the logical topology. It describe the actual
physical layout of the network.
 The following physical topologies are :
a) Bus Topology
o The bus is the simplest topology
o A physical bus topology uses a single length of cable that runs from one end of the network to
the other.
o Users are connected to the central cable by segments of cable.
Advantages
o relatively low cost, since there is a minimal amount of cabling needed and easy to set up.
Disadvantages
o requires termination at each end of the cable
o failure to terminate both ends of the cable results in signal bounce, which can disrupt or
prevent communications on the network
o one end of a bus should be grounded
o troubleshooting a bus topology can be very difficult
o if the cable breaks or fails, none of the devices located along the cable will be able to
communicate.

2. Star Topology
NVSU-FR-ICD-05-00 (081220) Page 3 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
o connects all cables to a central point called “point of concentration” (such as hub or switch)
Advantages
o most popular choice, particularly for small to medium sized networks
o it is easy to design and install, and it is also scalable
o the entire network will not fail if one cable does. If a cable fails, only the device at the end of that
cable is affected. The remainder of the network continues working
o easy to diagnose problems since the fault can be quickly identified.
Disadvantage
o its reliance on the central device such as a hub, switch, or router. If this device fails, the entire
network is affected

3. Extended Star Topology


o it is created by linking together several star topologies to a central point.
Advantages
o most popular choice, particularly for small to medium sized networks
o it is easy to design and install, and it is also scalable
o the entire network will not fail if one cable does. If a cable fails, only the device at the end of
that cable is affected. The remainder of the network continues working
o easy to diagnose problems since the fault can be quickly identified.
o it is considered the backbone topology of choice for structured cabling systems by the
Telecommunications Industry Association (TIA) and Electronic Industries Alliance (EIA)
organizations.

4. Hierarchical Topology
o imposes order on the network by grouping hosts based on their physical location on the network
o this is typical of many telephone networks, where groups of extensions map to floors of
buildings, departments, or rank of personnel.
Disadvantage
o that if one cable fails, it can affect all the hosts that use it to access other parts of the network

5. Ring and Dual Ring Topology


a. ring topology
o all devices are connected by a circle of wire
o providing predictable paths for error recovery.
b. dual ring topology
o provides additional reliability since it has two pathways for traffic to flow
o if there is ever a break in the network, automatic sensors can seal off the bad section and
restore connectivity by using the other ring
6. Mesh Topology
o provides redundancy for a network by connecting each host to every other host
o used when there can be no break in communications
o used in the control system of a nuclear power plant or air traffic control center.
o partial mesh - it still provides redundancy by having several alternative routes. If one route
cannot be used, the data takes another route even if it is longer. The partial mesh topology is
used for many telecommunications backbones, as well as the Internet.
7. Tree Network Topology
o uses two or more star networks connected together
o the central computers of the star networks are connected to a main bus. Thus, a tree network is
a bus network of star networks.

bus topology hierarchical


star extended star
NVSU-FR-ICD-05-00 (081220)
topology Page 4 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021

ring and dual ring


topology mesh tree network

D. TRANSMISSION MEDIA

1. Physical Transmission Media


 Twisted Pair – most prevalent form of communications wiring; used for almost all business
telephone wiring. It consists of strands of copper wire twisted in pairs. Each wire is coated with
plastic and they are bound together in another layer of plastic insulation.

 Two types
 Unshielded twisted pair (UTP) – containing no shielding, it is less expensive but more
susceptible to signal noise.
 Shielded twisted pair (STP) – wire pairs are coated with a foil shield, which reduces signal
noise that might interfere with data transmission.
 Coaxial Cable – commonly known as “coax”, is a high-capacity communications cable consisting of
copper wire conductor, a non con-conducting insulator, a foil shield, a woven metal outer shielding,
and a plastic outer coating. Although it has excellent bandwidth, it is less durable, more expensive
and more difficult to work with than twisted-pair cable
 Fiber – Optic Cable – a bundle of extremely thin tubes of glass, Each tube is called optical fiber, is
much thinner than human hair. It is technologically advanced as compared to the twisted-pair wire
and coaxial cable. Instead of transmitting frequencies, a fiber optic transmits pulsating beams of
light. It can carry a greater volume of data because light travels faster than electricity. It is also
immune from electromagnetic interference which is a problem for copper-based mediums.
 Two types
 Single-mode – has a narrow core, usually less than 10 microns. Light travels a single path
resulting to transmission speed that can exceed 50 gigabytes per second.
 Multi-mode – has relatively wide, 50 to 100 micron core. This width gives a light beam room
to bounce around, causing signal distortion and reducing bandwidth. It is easier to install,
and new technologies keep increasing its transmission speed, making it the optical cable of
choice for most computer networks.
2. Wireless Transmission Media – generally slower than cables and susceptible to signal interference,
eavesdropping and jamming.
 Radio Waves – provide wireless transmission for mobile communications, such as cellular telephones,
and for stationary communications where it is difficult or impossible to install cabling, such as remote,
geographically rugged regions.
 Infrared Transmission – use frequency range just below the visible light spectrum to transport data.
 Broadband Radio – it distributes radio signals through the air over long distances such as between
cities, regions, and countries and short distances such as within an office or home.
 Cellular Radio – form of broadcast radio that is used widely for mobile communications, specifically
wireless modems and cellular telephones.
 Microwave – an electromagnetic wave with a frequency of at least 1 gigahertz. Microwave
transmission sends a high-frequency signal from a transmitting station to a receiving station. Distance
must not be 25 to 30 miles apart because at farther distances, the curve of the earth blocks the line-of-
sight transmission path.
 Satellites – must receive and transmit via line-of-sight but high altitudes overcomes the limitations of
microwave data relay stations.
 Three types of orbits

NVSU-FR-ICD-05-00 (081220) Page 5 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 Geostationary earth orbit (GEO) – satellites orbit 22,300 miles directly above the equator and
maintain a fixed position above the earths surface. Excellent in sending television programs.
Transmission take a quarter of seconds to send and return.
 Medium earth orbit – (MEO) – satellites are located about 6,000 miles above the earth’s
surface.
 Low earth orbit (LEO) – satellites are located 400 to 1,000 miles above the earth’s surface.
Closer to the earth, reducing or eliminating apparent propagation delay.
NETWORKING DEVICES
Network Purpose Illustration
Device

Hub Extends a wired network by adding


additional ports

Switch Intelligently facilitates communication


among multiple devices on a network

Joins two different types of networks,


Gateway such as your home network and the
Internet

Bridge Connects two similar networks

Extends the range of a network by


Repeater restoring signals to maximum strength
and retransmitting them

Allows wireless devices to connect to a


Wireless wired network
Access
Point

E. INTERNET
Definition:
 is a set of computers, ocean, place of fun, entertainment, reunion of families, to do research, commercial
opportunity, support group, gold mine, hundreds of libraries, technology of the future. It is a collection of
computers, World’s largest computer networks or network of networks it is a world-wide collection of
computer networks
 sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in
which users at any one computer can, if they have permission, get information from any other computer
 it is the world’s largest computer network, the networks scattered all over the word
 individuals and organizations on a network connected to the Internet can communicate with and find
information on other computer networks that are also connected to the Internet

 Wide variety of information available via Internet:

NVSU-FR-ICD-05-00 (081220) Page 6 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 economic, geographic, political, social, trade and travel information on cities and countries around the
world
 local and international business and trade opportunities
 government information, including organizational and contact information on each branch
 information and discussion on current issues and topics of interest
 research information
 information on events in world history and places around the world
 sports, entertainment or software or software updates
 job listings and career information
 weather and tidal information from across the world
 artwork and literature, including electronic books

 HISTORY OF THE INTERNET


 The conceptual foundation for creation of the Internet was largely created by three individuals and a
research conference, each of which changed the way we thought about technology by accurately
predicting its future:
 Vannevar Bush wrote the first visionary description of the potential uses for information technology
with his description of the "memex" automated library system.
 Norbert Wiener invented the field of Cybernetics, inspiring future researchers to focus on the use of
technology to extend human capabilities.
 The 1956 Dartmouth Artificial Intelligence conference crystallized the concept that technology
was improving at an exponential rate, and provided the first serious consideration of the
consequences.
 Marshall McLuhan made the idea of a global village interconnected by an electronic nervous system
part of our popular culture.
 In 1957, the Soviet Union launched the first satellite, Sputnik I, triggering US President Dwight
Eisenhower to create the ARPA agency to regain the technological lead in the arms race. ARPA
appointed J.C.R. Licklider to head the new IPTO organization with a mandate to further the research
of the SAGE program and help protect the US against a space-based nuclear attack. Licklider
evangelized within the IPTO about the potential benefits of a country-wide communications network,
influencing his successors to hire Lawrence Roberts to implement his vision.
 Roberts led development of the network, based on the new idea of packet switching invented by Paul
Baran at RAND, and a few years later by Donald Davies at the UK National Physical Laboratory. A
special computer called an Interface Message Processor was developed to realize the design, and
the ARPANET went live in early October, 1969.
 The first communications were between Leonard Kleinrock's research center at the University of
California at Los Angeles, and Douglas Engelbart's center at the Stanford Research Institute.
 The first networking protocol used on the ARPANET was the Network Control Program. In 1983, it
was replaced with the TCP/IP protocol invented by Robert Kahn, Vinton Cerf, and others, which
quickly became the most widely used network protocol in the world.
 In 1990, the ARPANET was retired and transferred to the NSFNET. The NSFNET (National Science
Foundation) was soon connected to the CSNET, which linked Universities around North America, and
then to the EUnet, which connected research facilities in Europe. Thanks in part to the NSF's
enlightened management, and fueled by the popularity of the web, the use of the Internet exploded
after 1990, causing the US Government to transfer management to independent organizations starting
in 1995.

 Internet and Telecommunications in Philippines:

In 1992 the Philippines had one of the lowest levels of telephone penetration in Asia: slightly
more than 1 per 100 inhabitants. By 1995 there were about 60 telephone companies, but most were
operating only in urban areas and the long-distance traffic was controlled by a single company, the
Philippine Long-Distance Telephone Company. In 1995 a new telecommunications policy act was
passed which, although still favoring the dominant carrier, acted to both deregulate
telecommunications and increase coverage in more rural areas. One result was an increase in the
number of phone lines to almost 4 per 100 inhabitants by the end of 1999. However, the cost of a
NVSU-FR-ICD-05-00 (081220) Page 7 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
phone call to the United States is more than 120 times the cost of a flat rate local call. In June 1999
the Philippine League for Democratic Telecommunications called for a boycott of both local and
long-distance telephone services to protest the high rates being charged and the threat of incipient
call metering.
In the Philippines the Internet is growing. Although there are almost 100 Internet Service
Providers in the Philippines, most of them have connections through backbones located in the
United States. Internet dial-up connection charges are approximately 2 dollars hourly (or 33 dollars
for up to 60 hours monthly). This fee is approximately 80% higher than similar charges in the United
States. Since GNP per capita in the Philippines is only 12% of that in the United States, it is clear
that access to the e-world is currently limited to the wealthier citizens and companies. In 2000
Internet users were approximately 2,000,000. In 2003 this number had
increased to 3,500,000 Internet surfers.

According to the research group BSBC Hook UAI, there were 1,925,649 Internet users in 2004
in Metro Manila belonging to the A, B and C classes, ages ranging from 13 to 30 years old, as
compared to 1,885,465 in 2002, indicating a 21.3-percent increase.
The Internet café has been the growth driver of online gaming with a 38-percent share from
January to June 2004, with Metro Manila registering the highest share with 41 percent, followed by
Central Luzon with 17 percent. Since the Philippines has a low personal computer (PC) penetration
rate estimated at less than 10 percent of the total population, the Internet café has provided access
to online gaming and the Web to many Filipinos.

 METHODS FOR GATHERING INFORMATION ON THE INTERNET


These are several basic methods for gathering information on the Internet. These methods are:
1. Electronic Mail (E-mail) - one of primary uses of the Internet; allows one user to send a text-based
message to another
2. Mailing Lists - allow each user or organization on a list to send mail messages to everyone else on the
same list
3. Newsgroups - or “newsies”, are similar to mailing lists in that they allow one user or organization to
send a message to multiple user
4. Telnet - a method for accessing remote computers, viewing other files and using their resources and
information services
5. File Transfer Protocol (FTP) - a method for transferring files from one computer on the internet to
another
6. Gopher Servers - allows accessing Internet resources via an easy-to-use hierarchical menu system
7. World Wide Web (WWW) Servers- takes access a step further, providing a hypertext interface; allows
users to view formatted documents (including graphics) on their screen directly, instead of navigating
hierarchical menus
INTERNET STATISTICS
WORLD INTERNET USAGE AND POPULATION STATISTICS
2020 Year-Q3 Estimates
Population Population Internet Users Penetration Growth Internet
World Regions
( 2020 Est.) % of World 30 Sept 2020 Rate (% Pop.) 2000-2020 World %
Africa 1,340,598,447 17.2 % 631,940,772 47.1 % 13,898 % 12.8 %
Asia 4,294,516,659 55.1 % 2,555,636,255 59.5 % 2,136 % 51.8 %
Europe 834,995,197 10.7 % 727,848,547 87.2 % 593 % 14.8 %
Latin America / Caribbean 654,287,232 8.4 % 467,817,332 71.5 % 2,489 % 9.5 %
Middle East 260,991,690 3.3 % 184,856,813 70.8 % 5,527 % 3.7 %
North America 368,869,647 4.7 % 332,908,868 90.3 % 208 % 6.8 %
Oceania / Australia 42,690,838 0.5 % 28,917,600 67.7 % 279 % 0.6 %
WORLD TOTAL 7,796,949,710 100.0 % 4,929,926,187 63.2 % 1,266 % 100.0 %
NOTES: (1) Internet Usage and World Population Statistics estimates are for October 20, 2020. (2) CLICK on each world
region name for detailed regional usage information. (3) Demographic (Population) numbers are based on data from the United
Nations Population Division. (4) Internet usage information comes from data published by Nielsen Online, by the International
Telecommunications Union, by GfK, by local ICT Regulators and other reliable sources.

NVSU-FR-ICD-05-00 (081220) Page 8 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021

ASIA INTERNET USE, POPULATION STATISTICS DATA


AND FACEBOOK DATA - JUNE 30, 2020
Population Internet Users, Internet Users Penetration Users Facebook
ASIA
( 2020 Est.) (Year 2000) 31-MAY-2020 % Population % Asia 31-MAR-2020
Afganistan 38,928,346 1,000 7,337,489 18.8 % 0.3 % 3,848,400
Armenia 2,963,243 30,000 2,126,716 71.8 % 0.1 % 1,252,000
Azerbaijan 10,139,177 12,000 7,991,630 78.8 % 0.3 % 1,854,000
Bangladesh 164,689,383 100,000 96,199,000 58.4 % 4.2 % 33,713,000
Bhutan 771,608 500 397,499 51.5 % 0.0 % 413,100
Brunei Darussulam 437,479 30,000 416,798 95.3 % 0.0 % 400,200
Cambodia 16,718,965 6,000 8,005,551 47.9 % 0.3 % 7,810,000
China * 1,439,323,776 22,500,000 854,000,000 59.3 % 37.1 % 1,330,000
Georgia 3,989,167 20,000 2,658,311 66.6 % 0.1 % 2,524,000
Hong Kong * 7,496,981 2,283,000 6,698,252 89.3 % 0.3 % 5,361,000
India 1,380,004,385 5,000,000 560,000,000 40.6 % 24.3 % 251,000,000
Indonesia 273,523,615 2,000,000 171,260,000 62.6 % 7.4 % 136,960,000
Japan 126,476,461 47,080,000 118,626,672 93.8 % 5.2 % 28,000,000
Kazakhstan 18,776,707 70,000 14,669,853 78.1 % 0.6 % 9,246,000
Korea, North 25,778,816 -- 20,000 0.1 % 0.0 % 14,000
Korea, South 51,269,185 19,040,000 49,234,329 96.0 % 2.1 % 21,836,000
Kyrgystan 6,524,195 51,600 2,493,400 38.2 % 0.1 % 2,418,000
Laos 7,064,242 6,000 3,056,000 42.0 % 0.1 % 3,056,000
Macao * 649,335 60,000 538,007 83.8 % 0.0 % 406,900
Malaysia 32,365,999 3,700,000 26,353,017 81.4 % 1.1 % 25,520,000
Maldives 540,544 6,000 370,000 68.4 % 0.0 % 375,100
Mongolia 3,278,290 30,000 2,233,000 68.1 % 0.1 % 2,233,000
Myanmar 54,409,800 1,000 22,200,000 40.8 % 1.0 % 22,200,000
Nepal 29,136,808 50,000 16,190,000 55.6 % 0.7 % 10,419,000
Pakistan 220,892,340 133,900 71,608,065 32.4 % 3.1 % 37,070,000
Philippines 109,581,078 2,000,000 79,000,000 72.1 % 3.4 % 71,760,000
Singapore 5,850,342 1,200,000 5,173,907 88.4 % 0.2 % 4,470,000
Sri Lanka 21,413,249 121,500 7,169,533 33.5 % 0.3 % 6,428,000
Taiwan 23,816,775 6,260,000 22,042,902 92.6 % 1.0 % 19,190,000
Tajikistan 9,537,645 2,000 3,013,256 31.6 % 0.1 % 645,500
Thailand 69,799,978 2,300,000 57,000,000 81.7 % 2.5 % 46,000,000
Timor-Leste 1,318,445 0 410,000 31.1 % 0.0 % 390,000
Turkmenistan 6,031,200 2,000 1,262,794 20.9 % 0.1 % 67,200
Uzbekistan 33,469,203 7,500 17,161,534 51.3 % 0.7 % 3,094,000
Vietnam 97,338,579 200,000 68,541,344 70.4 % 3.0 % 66,720,000
TOTAL ASIA 4,294,516,659 114,304,000 2,305,458,859 53.7 % 100.0 % 832,336,400
NOTES: (1) The Asia Internet Statistics were updated for January 31, 2020. (2) The Facebook subscriber data were updated for Dec.
31, 2019 (3) The demographic (population) numbers are based mainly on data contained in United Nations Population Division and
local official sources. (4) The usage numbers come from various sources, mainly from data published by Facebook , ITU , and other
NVSU-FR-ICD-05-00 (081220) Page 9 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
trustworthy sources.

 STRUCTURE OF THE INTERNET


 How does backbone tie the Internet together?
 Backbone links and routers are maintained by NSPs –
Network Service Providers such as AT&T, British Telecom,
Deutsche Telekom, Sprint, and Verizon.
 NSP equipment and links are tied together by network access
points (NAPs), so that, for example, the data can begin its
journey on a Verizon link and then cross over to a Sprint link, if
necessary to reach its destination.
 NSPs supply Internet connections to large Internet service providers, such as EarthLink, AOL,
AT&T, and Comcast.
 Internet Service Provider (ISP)
 a company that offers Internet access to individuals, businesses, and smaller ISPs.
 Operates routers, communication equipment, and other network devices that handle the
physical aspects of transmitting and receiving data between their subscribers and the Internet
 Many ISPs also operate e-mail servers to handle incoming and outgoing mail for their
subscribers. Some ISPs have Web Servers for subscribers Web sites
 An ISP might operate a server that translates an address, such as www. google.com, into a
valid IP address, such as 208.50.141.11
 It can also maintain servers for online discussions, instant messaging, music files sharing, FTP,
streaming video, and other file transfer services.

 HOW DOES MY COMPUTER FIT INTO THE STRUCTURE OF THE INTERNET?


Modem
 Communication device use by the computer to communicate with the ISP
 Contains circuitry that converts the data-carrying signals from your computer to signals that can
travel over various communication channels.
 Standalone computer can communicate with an ISP directly through a modem, or through a
combination of a router and modem.
 If your computer is a part of a network, the network’s router communicates with a modem to handle
the Internet connection.

NVSU-FR-ICD-05-00 (081220) Page 10 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021

 FIXED INTERNET ACCESS


 LATENCY – the elapsed time for data to make a round trip from point A to point B and back to point A.
1. Dial use connections - fixed Internet connection that uses a voiceband modem and telephone lines
to transport data between your computer and your ISP.
2. DSL – Digital Subscriber line - a high speed, digital, always-on, Internet access technology that
runs over standard phone lines.
 ADSL – Asymmetric DSL – Faster for download
 SDSL – Symmetric DSL – Faster for upload

3. Cable Internet Service - means of distributing always-on broadband Internet access over the
same infrastructure that offers cable television service.
4. Satellite Internet Service - means of distributing
always-on, high speed asymmetric Internet access
by broadcasting signals to and from a personal
satellite dish.
5. WIMAX – Worldwide Interoperability for
Microwave Access - an Ethernet- compatible
network standard designated as IEEE 802.16.
Its popularity is growing because it offers an
alternative to wired technologies, such as DSL and cable Internet service.

FIXED INTERNET ACCESS OPTIONS

Dial-up DSL Cable Satellite WiMAX

Download speed (max.) 56 Kbps 384 Kbps-6 5-50 Mbps 1-1.5 Mbps 70 Mbps
Upload speed (max) 33 Kbps 128 Kbps- 256 Kbps-10 Kbps 100-256-Kbps 70 Mbps
Download speed
44 Kbps 2-5 Mbps 3-10 Mbps 400-800 Kbps 70 Mbps
(actual)

Latency 100-200 ms 10-20 ms 10-20 ms 1-3 seconds 10-50 ms

Short Video (72 MB) 4 hours 5 minutes 3.2 minutes 24 minutes


download
Computer
Telephone CATV service that Clear view of
located within 3
line, ISP provides Internet southern sky;
Requirements miles of local
voiceband Access; cable satellite dish
telephone switch,
modem modem and modem
DSL modem

Monthly Fee $ $$ $$ $$

Installation cost $0 $ $ $$

Always-on N Y Y Y
F. INTERNET PROTOCOLS

NVSU-FR-ICD-05-00 (081220) Page 11 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 PACKETS – parcel of data that is sent across a computer network
 PROTOCOLS - set of rules for interacting and negotiating; set of rules for efficiently transmitting
data from one network node to another.
 In some respects, it is like a signals between the pitcher and a catcher in a baseball game.
Before the ball is thrown, the catcher and pitcher use hand signals to negotiate the speed
and style of the pitch
 Just a pitcher signals the catcher in a baseball, two computers on a network might negotiate
their communications protocols through a process called handshaking
 Set standards for encoding and decoding data, guiding data to its destination and mitigating the effects of
interference
 Specifically, protocols are responsible for the following;
 Dividing messages into packets
 Affixing addresses to packets
 Initiating transmission
 Regulating the flow of data
 Checking for transmission errors
 Acknowledging receipt of transmitted data
 reassembling these when they arrive at their destination

Main protocols used by the internet

 TCP/IP – TRANSMISSION CONTROL PROTOCOL/INTERNET PROTOCOL


 TCP – breaks a message file into packets basic communication language/protocol
 IP – responsible for addressing packets so that they can be routed to their destination.
 provides a protocol standard for the Internet that is public, free, extensible, and easy to implement.
 best known communication protocol that regulates Internet data transport and has become standard for
LANs as well
 basic communication language/protocol
 most common protocol use today in the Internet
 IP Addresses are sometimes referred to as TCP/IP addresses or Internet Address

 INTERNET ADDRESSES
 MAC Address - Media Access Control
 Unique number assigned to a network interface card when it is manufactured.
 Used for some low-level network functions and an also be employed to establish network security

NVSU-FR-ICD-05-00 (081220) Page 12 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 IP addresses
 Series of number used to identify a network device, assigned to network computers, servers,
peripherals and devices.
 consisted of four sets of numbers, each less than 256 separated by periods
Ex. 123.245.67.89
 Where do IP Address come from?
 It can be assigned by ISP or System Managers.
 Assigned IP addresses are semi-permanent and stay the same every time you boot your
computer. If you use and assigned IP address, you have to enter it when you configure your
network access.
 It can also be obtained through DHCP (Dynamic Host Configuration Protocol) – a protocol
designed to automatically distribute IP addresses. Most computers are preconfigured to get
an IP address by sending a query to the network device acting as the DHCP server.

 Domain Name System (DNS)


 FULLY QUALIFIED DOMAIN NAME (FQDN), but most people just refer to it as a DOMAIN
NAME.
 Although IP address work for communication between computers, people find it difficult to
remember long strings of numbers.
 Every domain name corresponds to a unique IP address that has been entered into a huge
database called the Domain Name System.
 text version of the IP Address
 the IP number (128.105.192.3) of the computer above might be given the associated
domain name: represents educational, indicating the
example: http.someplace.edu type of organization (domain type)

the organization to which it belongs

indicates a certain type of server or host name


ftp.cocacola.com
type of organization
org. to which it belongs
type of server/hostname

 the Domain name System makes easier to remember an address based on a user and
company name, rather than a series of numbers
 A domain name, such as travelocity.com, must be converted into an IP address before
packets can be routed to it.
 Example:
Example of country-codes
IP Address - 128.105.232.1
Domain name - http.nvsu.edu.ph Code Country
.ph Philippines
TOP LEVEL DOMAIN NAMES .fr France
.de Germany
.it Lithuania
.au Australia
.mx Mexico

NVSU-FR-ICD-05-00 (081220) Page 13 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021

 E-mail Addresses
An email address is made up of:

 a user’s account name;


 the @ symbol; and
 the domain name of the machine on which the user’s account resides
 example: [email protected],
[email protected]
[email protected]

G. IPv4 OVERVIEW
Below is a brief description of the components involved in computer network:
 Hosts − Hosts are said to be situated at ultimate end of the network, i.e. a host is a source of
information and another host will be the destination. Information flows end to end between hosts. A
host can be a user’s PC, an internet Server, a database server etc.
 Media − If wired, then it can be copper cable, fiber optic cable, and coaxial cable. If wireless, it can be
free-to-air radio frequency or some special wireless band. Wireless frequencies can be used to
interconnect remote sites too.
 Hub − A hub is a multiport repeater and it is used to connect hosts in a LAN segment. Because of low
throughputs hubs are now rarely used. Hub works on Layer-1 (Physical Layer) of OSI Model.
 Switch − A Switch is a multiport bridge and is used to connect hosts in a LAN segment. Switches are
much faster than Hubs and operate on wire speed. Switch works on Layer-2 (Data Link Layer), but
Layer-3 (Network Layer) switches are also available.
 Router − A router is Layer-3 (Network Layer) device which makes routing decisions for the
data/information sent for some remote destination. Routers make the core of any interconnected
network and the Internet.
 Gateways − A software or combination of software and hardware put together, works for exchanging
data among networks which are using different protocols for sharing data.
NVSU-FR-ICD-05-00 (081220) Page 14 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 Firewall − Software or combination of software and hardware, used to protect users data from
unintended recipients on the network/internet.

 Host Addressing
Communication between hosts can happen only if they can identify each other on the network. In a single
collision domain (where every packet sent on the segment by one host is heard by every other host) hosts
can communicate directly via MAC address.
MAC address is a factory coded 48-bits hardware address which can also uniquely identify a host. But if a
host wants to communicate with a remote host, i.e. not in the same segment or logically not connected, then
some means of addressing is required to identify the remote host uniquely. A logical address is given to all
hosts connected to Internet and this logical address is called Internet Protocol Address.

 IPv4 - OSI Model


The International Standard Organization has a well-defined model for Communication Systems
known as Open System Interconnection, or the OSI Model. This layered model is a conceptualized
view of how one system should communicate with the other, using various protocols defined in each
layer. Further, each layer is designated to a well-defined part of communication system. For
example, the Physical layer defines all the components of physical nature, i.e. wires, frequencies,
pulse codes, voltage transmission etc. of a communication system.
The OSI Model has the following seven layers −
 Application Layer (Layer-7) − This is where the user
application sits that needs to transfer data between or among
hosts. For example − HTTP, file transfer application (FTP)
and electronic mail etc.
 Presentation Layer (Layer-6) − This layer helps to
understand data representation in one form on a host to
other host in their native representation. Data from the
sender is converted to on-the-wire data (general standard
format) and at the receiver’s end it is converted to the native
representation of the receiver.
 Session Layer (Layer-5) − This layer provides session management capabilities between
hosts. For example, if some host needs a password verification for access and if credentials
are provided then for that session password verification does not happen again. This layer
can assist in synchronization, dialog control and critical operation management (e.g., an
online bank transaction).
 Transport Layer (Layer-4) − This layer provides end to end data delivery among hosts. This layer
takes data from the above layer and breaks it into smaller units called Segments and then gives it to
the Network layer for transmission.
 Network Layer (Layer-3) − This layer helps to uniquely identify hosts beyond the subnets and defines
the path which the packets will follow or be routed to reach the destination.
 Data Link Layer (Layer-2) − This layer takes the raw transmission data (signal, pulses etc.) from the
Physical Layer and makes Data Frames, and sends that to the upper layer and vice versa. This layer
also checks any transmission errors and sorts it out accordingly.
 Physical Layer (Layer-1) − This layer deals with hardware technology and actual communication
mechanism such as signaling, voltage, cable type and length, etc.
 Network Layer
The network layer is responsible for carrying data from one host to another. It provides means to allocate
logical addresses to hosts, and identify them uniquely using the same. Network layer takes data units from
Transport Layer and cuts them in to smaller unit called Data Packet.
Network layer defines the data path, the packets should follow to reach the destination. Routers work on this
layer and provides mechanism to route data to its destination.

NVSU-FR-ICD-05-00 (081220) Page 15 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 IPv4 - TCP/IP Model
A majority of the internet uses a protocol suite called the Internet Protocol Suite also known as the TCP/IP
protocol suite. This suite is a combination of protocols which encompasses a number of different protocols for
different purpose and need. Because the two major protocols in this suites are TCP (Transmission Control
Protocol) and IP (Internet Protocol), this is commonly termed as TCP/IP Protocol suite. This protocol suite has
its own reference model which it follows over the internet. In contrast with the OSI model, this model of
protocols contains less layers.
This model is indifferent to the actual hardware implementation, i.e. the physical layer of OSI Model. This is
why this model can be implemented on almost all underlying technologies. Transport and Internet layers
correspond to the same peer layers. All three top layers of OSI Model are compressed together in single
Application layer of TCP/IP Model.
 Internet Protocol Version 4 (IPv4)
Internet Protocol is one of the major protocols in the TCP/IP
protocols suite. This protocol works at the network layer of the OSI
model and at the Internet layer of the TCP/IP model. Thus, this
protocol has the responsibility of identifying hosts based upon their
logical addresses and to route data among them over the underlying
network.
IP provides a mechanism to uniquely identify hosts by an IP
addressing scheme. IP uses best effort delivery, i.e. it does not
guarantee that packets would be delivered to the destined host, but
it will do its best to reach the destination. Internet Protocol version 4
Comparative depiction of OSI and uses 32-bit logical address.
TCP/IP Reference Models

 IPv4 – Addressing
IPv4 supports three different types of addressing modes. −
 Unicast Addressing Mode
In this mode, data is sent only to one destined host. The Destination
Address field contains 32- bit IP address of the destination host. Here
the client sends data to the targeted server −

 Broadcast Addressing Mode


In this mode, the packet is addressed to all the hosts in a network segment. The Destination Address field
contains a special broadcast address, i.e. 255.255.255.255. When a
host sees this packet on the network, it is bound to process it. Here the
client sends a packet, which is entertained by all the Servers −

 Multicast Addressing Mode


This mode is a mix of the previous two modes, i.e. the packet sent is
neither destined to a single host nor all the hosts on the segment. In
this packet, the Destination Address contains a special address which
starts with 224.x.x.x and can be entertained by more than one host.
Here a server sends packets which are entertained by more than one
server. Every network has one IP address reserved for the Network
Number which represents the network and one IP address reserved for
the Broadcast Address, which represents all the hosts in that network.

NVSU-FR-ICD-05-00 (081220) Page 16 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
Hierarchical Addressing Scheme
IPv4 uses hierarchical addressing scheme. An IP address, which is 32-bits in length, is divided into two or
three parts as depicted –

A single IP address can contain information about


the network and its sub-network and ultimately the host. This scheme enables the IP Address to be
hierarchical where a network can have many sub-networks which in turn can have many hosts.
 Subnet Mask
The 32-bit IP address contains information about the host and its network. It is very necessary to distinguish
both. For this, routers use Subnet Mask, which is as long as the size of the network address in the IP address.
Subnet Mask is also 32 bits long. If the IP address in binary is ANDed with its Subnet Mask, the result yields
the Network address. For example, say the IP Address is 192.168.1.152 and the Subnet Mask is
255.255.255.0 then −

This way the Subnet Mask helps


extract the Network ID and the Host from an IP Address. It can be identified now that 192.168.1.0 is the
Network number and 192.168.1.152 is the host on that network.
 Binary Representation
The positional value method is the simplest form of converting binary from decimal value. IP address is 32 bit
value which is divided into 4 octets. A binary octet contains 8 bits and the value of each bit can be determined
by the position of bit value '1' in the octet.

NVSU-FR-ICD-05-00 (081220) Page 17 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
Positional value of bits is determined by 2 raised to power (position – 1), that is the value of a bit 1 at position
6 is 2^(6-1) that is 2^5 that is 32. The total value of the octet is determined by adding up the positional value
of bits. The value of 11000000 is 128+64 = 192. Some examples are shown in the table:

 IPv4 - Address Classes


Internet Protocol hierarchy contains several classes of IP Addresses to be used efficiently in various situations
as per the requirement of hosts per network. Broadly, the IPv4 Addressing system is divided into five classes
of IP Addresses. All the five classes are identified by the first octet of IP Address.
Internet Corporation for Assigned Names and Numbers is responsible for assigning IP addresses.
The first octet referred here is the left most of all. The octets numbered as follows depicting dotted decimal
notation of IP Address −

The number of networks and the number of hosts per


class can be derived by this formula −

When calculating hosts' IP addresses, 2 IP addresses are decreased because they cannot be assigned to
hosts, i.e. the first IP of a network is network number and the last IP is reserved for Broadcast IP.
 Class A Address
The first bit of the first octet is always set to 0 (zero). Thus the first octet ranges from 1 – 127, i.e.
Class A addresses only include IP starting from 1.x.x.x to
126.x.x.x only. The IP range 127.x.x.x is reserved for
loopback IP addresses.

The default subnet mask for Class A IP address is 255.0.0.0 which implies that Class A addressing can
have 126 networks (27-2) and 16777214 hosts (224-2).
Class A IP address format is thus: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
 Class B Address
An IP address which belongs to class B has the first two bits in the first octet set to 10, i.e.
Class B IP Addresses range from 128.0.x.x to 191.255.x.x. The
default subnet mask for Class B is 255.255.x.x.
Class B has 16384 (214) Network addresses and 65534 (216-2) Host
addresses.
Class B IP address format is: 10NNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
 Class C Address
The first octet of Class C IP address has its first 3 bits set to 110, that is −
Class C IP addresses range from 192.0.0.x to 223.255.255.x. The
default subnet mask for Class C is 255.255.255.x.
Class C gives 2097152 (221) Network addresses and 254 (28-2) Host addresses.
Class C IP address format is: 110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
 Class D Address
Very first four bits of the first octet in Class D IP addresses are set to 1110, giving a range of −
NVSU-FR-ICD-05-00 (081220) Page 18 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
Class D has IP address range from 224.0.0.0 to 239.255.255.255.
Class D is reserved for Multicasting. In multicasting data is not
destined for a particular host, that is why there is no need to extract host address from the IP address,
and Class D does not have any subnet mask.
 Class E Address
This IP Class is reserved for experimental purposes only for R&D or Study. IP addresses in this class
ranges from 240.0.0.0 to 255.255.255.254. Like Class D, this class too is not equipped with any subnet
mask.
 IPv4 - Subnetting
Each IP class is equipped with its own default subnet mask which bounds that IP class to have prefixed
number of Networks and prefixed number of Hosts per network. Classful IP addressing does not provide any
flexibility of having less number of Hosts per Network or more Networks per IP Class.
CIDR or Classless Inter Domain Routing provides the flexibility of borrowing bits of Host part of the IP
address and using them as Network in Network, called Subnet. By using subnetting, one single Class A IP
address can be used to have smaller sub-networks which provides better network management capabilities.
 Class A Subnets
In Class A, only the first octet is used as Network identifier and rest of three octets are used to be
assigned to Hosts (i.e. 16777214 Hosts per Network). To make more subnet in Class A, bits from Host
part are borrowed and the subnet mask is changed accordingly.
For example, if one MSB (Most Significant Bit) is borrowed from host bits of second octet and added to
Network address, it creates two Subnets (21=2) with (223-2) 8388606 Hosts per Subnet.
The Subnet mask is changed accordingly to reflect subnetting. Given below is a list of all possible
combination of Class A subnets −

In case of subnetting
too, the very first and
last IP address of every
subnet is used for
Subnet Number and
Subnet Broadcast IP
address respectively.
Because these two IP
addresses cannot be
assigned to hosts, sub-
netting cannot be
implemented by using
more than 30 bits as
Network Bits, which
provides less than two
hosts per subnet.

 Class B Subnets
By default, using Classful Networking, 14 bits are used as Network bits providing (2 14) 16384 Networks and
(216-2) 65534 Hosts. Class B IP Addresses can be subnetted the same way as Class A addresses, by

NVSU-FR-ICD-05-00 (081220) Page 19 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
borrowing bits from Host bits. Below is given all possible combination of Class B subnetting −

 Class C Subnets
Class C IP addresses are normally assigned to a very small size network because it can only have 254
hosts in a network. Given below is a list of all possible combination of subnetted Class B IP address −

H. WORLD WIDE WEB (WWW or the Web)


 invented by Tim Berners-Lee, while consulting at CERN, (European Organization for Nuclear
Research) in Switzerland which began in 1989, the European Laboratory for Particle Physics
 CERN comes from the French name for the organization, “Conseil Europeen pour la
Recherche Nucleaire”)
 it is a universally-accepted standard for sharing documents and information on the Internet
 The World Wide Web consists of:
 the pages of information accessed (referred to as Web pages)
 the servers on which pages of information reside (referred to as Web servers)
 the client software you use to access the pages (called “Web browsers”)
 the network between your computer and the Web server(s) with which you interact
a. Web Pages
 the pages allow you to do a range of things, from interactive frog dissections to on-line shopping
 each “page” is a document with a unique address on the Web, with most containing links to other
documents
b. Web Browsers
 Enables user to browse and navigate the World Wide Web documents and pages.
 It connects your computer to other computers that are hooked up to the internet
 Examples; NCSA Mosaic, Netscape, Lynx, MSExplorer, Mozilla Firefox and others.
c. Web Servers – refers to the computer that store the hypertext mark-up language
(HTML) files used on the Internet
d. Web Site
 Collection of related Web pages and associated items, stored on Web Servers
NVSU-FR-ICD-05-00 (081220) Page 20 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
 Each web site contains a home page, which is the first documents users see when they enter the
site. It usually serves as the gateway to all other Web pages in a website.
 Types of Websites
 E-Commerce Websites  Social Media and Networking Websites
 Blogs  Government
 Personal Websites  Advocacy Websites
 Photo Sharing Websites  News Websites
 Informational Websites  Educational Websites
 Brochure/Catalogue Style  Portals
Websites  Entertainment Website
 Connection Requirements: graphical browsers are easier to use than text browsers, but require
amount of connectivity to operate

 Using the World-Wide Browsers


a. default page
 the page of information the browser displays when started
 it is a page from which all of excursions to the World Wide Web begin
 “home page” – refers to the opening or main page of a WWW site. Important because it usually
provides information about the contents of the site to visitors.
 Hypertext – allows you to progress or “branch” to other pages of information of interest in a
non-linear fashion, allowing you to return the way you progresses though the information
originally
b. Hypertext Markup Language (HTML)
 it is the foundation of the World Wide Web
 it is the set of markup symbols or codes inserted in a file intended for display on a World Wide
Web browser page
c. Hypertext Transfer Protocol
 it is the protocol used to transmit Web pages from the Web server
being accessed to the computer.
 WWW browser send requests and receives information form
WWW servers over the Internet
 Using a Uniform Resource Locator (URL)
 every Web page has a unique identifier known as a Uniform
Resource Locator, or URL
 WWW browsers use the URL to find a particular Web page among
all the computers on the Internet
 components specify the protocol, server, and pathname of an item

A URL is properly written as: http://www.mcom.com/new/home.html

protocol server pathname

 transfer protocol – identifies the manner for interpreting and transferring computer information,
and can include: http (Hypertext transfer Protocol), gopher (Internet Gopher Protocol), ftp
(File Transfer Protocol), news (Usenet Newsgroups)
 server name – is the domain name of the server you are contacting
 pathname – gives the path to the specific file on the World Wide Web server
 Web Search Engine
 is designed to search for information on the World Wide Web and FTP servers
 search results are generally presented in a list of results often referred to as SERPS, or "search
engine results pages"
o the information may consist of web pages, images, information and other types of files
 the very first tool used for searching on the Internet was Archie
NVSU-FR-ICD-05-00 (081220) Page 21 of 23
Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
o the name stands for "archive" without the "v"
o it was created in 1990 by Alan Emtage, Bill Heelan and J. Peter Deutsch, computer
science students at McGill University in Montreal

I. COMPUTER ETHICS
ETHICS
 Deals with placing a “value”, on acts according to whether they are ‘good’ or ‘bad’.
 The use of computer became widespread in every facet of our lives that the need of COMPUTER
ETHICS comes as consensus.
 Ten Commandments of Computer Use
1. Thou shalt not use a computer to harm other people
2. Thou shalt not interfere with other people’s computer work
3. Thou shalt not snoop around in other people’s files
4. Thou shalt not use a computer to steal
5. Thou shalt not use a computer to bear false witness
6. Thou shalt not use or copy software for which you have not paid
7. Thou shalt not use other people’s computer resources without authorization
8. Thou shalt not appropriate other people’s intellectual output
9. Thou shalt think about the social consequences of the program you write
10. Thou shalt use a computer in ways that show consideration and respect.
J. Networking Cabling – simple step by step guide
 Tools
 Cat5e cable
 RJ45 connectors
 Cable stripper
 Scissors
 Crimping tool
 Steps
1. Strip cable end 2. Untwist wire ends
 Strip 1 – 1½” of insulating sheath  Sort wires by insulation colors
 Avoid cutting into conductor insulation

NVSU-FR-ICD-05-00 (081220) Page 22 of 23


Republic of the Philippines
NUEVA VIZCAYA STATE UNIVERSITY
Bayombong, Nueva Vizcaya
INSTRUCTIONAL MODULE
IM No.: IM-ITECC1-1S-2020-2021
3. Arrange wires 4. Trim wires to size
 TIA/EIA 568A: GW-G OW-Bl BlW-O BrW-Br  Trim all wires evenly
 TIA/EIA 568B: OW-O GW-Bl BlW-G BrW-Br  Leave about ½” of wires exposed

5. Attach connector 6. Check


 Maintain wire order, left-to-right, with  Do all wires extend to end?
RJ45 tab facing downward  Is sheath well inside connector?

7. Crimp 8. Test
 Squeeze firmly to crimp connecter  Does the cable work?
onto cable end (8P)

NVSU-FR-ICD-05-00 (081220) Page 23 of 23

You might also like