0% found this document useful (0 votes)
7 views

IntotoComp Prefi Reviewer

Uploaded by

zoeprtty609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

IntotoComp Prefi Reviewer

Uploaded by

zoeprtty609
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 70

INTROTOCOMP

REVIEWER
links computers for shared
resources through
the internet.
Computer networking
The smallest type of network with a limited
span interconnects compatible personal
devices. Examples include wireless earphones-
to-smartphone and computer-to-printer
connections.
Personal area network (pan)
This is used to interconnect and
share computer resources in an
establishment such as a corporate
building, house, or several buildings in a
Local arealimited
network
area (lan)
An enterprise network
covering
multiple buildings in a
campus environment,
including universities and
Campus Area
large Network (CAN)
organizations.
This covers multiple city
buildings, traffic lights, and
parking meters, connecting
wirelessly as a metropolitan area
Metropolitan Area Network
network.
(MAN)
A much larger network covering vast
areas, such as cities, provinces, and
countries. WAN can also be a bigger
network consisting of LANs and MANs.
Wide Area Network (WAN)
It is a diagram displaying
the structure of network
devices and services to
serve the clients'
connectivity
Network needs.
architecture
in campuses and branches
bring users and devices
together, such as linking
employees in a
Access networks
corporate building
in a company link multiple
servers with data and
applications and make
them easily accessible to
Networks for data centers
users
connect users to programs
and
services, such as hospital
employees connecting to
Wide-area networks
health (WANs)
applications
reference model of the International
Organization for Standardization was
developed in 1984 as an open standard
for every communication system to
allow the
Openof different
interlinking systemstypes of
interconnection
networks (osi)
aims to provide a structure for
networking that secures
compatibility in the network
hardware and software and expedites
the advancement of upcoming
Osi model
networking technologies.
gives electrical and
mechanical connections to
the network. Handles signal
and media layer
Physical/physical
handles error recovery, flow control, and
sequencing of terminals that are either
sending or receiving. It is the media access
control (MAC) layer where MAC addressing
is
Data link/Data link layer
defined. Assigned for the flow of data
acts as the network controller that receives
outgoing messages and combines
messages and segments into packets with
a header detailing the routing information.
Provides addressing and routing decisions
Network/network layer
liable for end-to-end delivery between
devices. It deals with message integrity
between source and destination and
segmenting and reassembling packets.
Manages end-to-end delivery to ensure error-
Transport/transport layer
free packets
provides the control functions
required to start, manage, and end
connections to satisfy user requests.
Establishes, manages, and terminates
sessions
Session/session layer
accepts and structures the messages for
an application by converting the message
from one code to another. It also
processes data compression and
encryption. Manages protocol conversion
Presentation/presentation
and data translation
layer
It interacts with application programs with
communication components such as a web
browser and email. It is responsible for recording a
message, understanding the request, and
identifying the information needed to support it.
Provides support for applications.
Application/application layer
uses cabling and connectors to
initiate network connections
wired
uses radio signals to initiate
network connections. It is the most
common home network
wirelesstoday
configuration
connects devices within a local area
network. It is limited by length and
durability specifications resulting in
a bad signal if the cable is too long or
of poor quality.
Lan ethernet cable
interconnects networking devices
but risks the broadcast of data it
receives to all devices connected to
it.
hub
initiates a direct connection from
the sender to the destination
bypassing the data traffic to ensure
data privacy, unlike a hub. It is best
for interconnecting networking
switch
devices.
uses a cable connection to
create a broadband network
connection from a home
network to the internet service
provider (ISP).
Cable modem
to divide the cable TV
from the home network.
splitter
provide resources, data, services, and
programs to other computers or clients
over a network. It is tasked to handle
complex operations such as databases,
emails, and shared files.
servers
a security device that monitors and secures
incoming and outgoing network traffic based
on established security policies. It is
essentially the barrier between a private
internal network and the public Internet.
firewall
connects wireless devices and
provides a connection to wired LANs.
The data transfer speed for access
points relies on the wireless
Wireless
technologyaccess point
of the clients
consists of a router, switch, and
wireless access point that uses radio
frequency to link networking devices.
It is the most common way to connect
wireless LANs to the ISPʼs access
Wireless
devicerouter
combines the functionality of a
modem and a router, thus
making it a convenient source for
Internet
Wi-Fi modem
connectivity
described by the protocol and
the topology used for network
access
LAN
is the rule for users to exchange
information
Networking protocol
is the physical
and logical arrangement of
nodes such as a switch or hub
and
connections in a network
Network topology
the simplest network topology where two
devices, like a computer or router, are
connected directly. With this, the
communication only flows between the
Point-to-point
two devices.
Its deterministic nature
ensures access to message
transmissions at regular or
fixed time intervals for each
Token ring
connected station.
has recently replaced token ring
topology.
Ethernet topology
Its deterministic nature ensures
access to message transmissions
at regular or fixed time intervals for
each connected
station.
Token ring
occurs when computers share the
media for data transmission using a
coaxial cable, preventing data
transmission
from being extremely
bus bandwidth
efficient.
the most common networking
topology in LANs today, where all
the devices connect to a central
switch or
star hub.
it is when the networking devices
are directly connected where
several paths exist between the
endmesh
devices.
If a direct path exists from each
end device to other end devices in
the network
Fully meshed
multiple paths are observed
between the end devices
Partially meshed
deals with the fundamental human
rights of a personʼs privacy on the
Internet, including the rights to the
privacy of an owner's displayed,
stored, and confidential
Internet privacy
information.
Web browsers such as Google Chrome
and Mozilla Firefox are the most used
browsers online for their specific
features and familiarity, although a total
security guarantee is not automatic
Securing web browser
It is the best way to have Internet privacy. It does not
just change the IP address; it also protects incoming
and outgoing Internet traffic with extensive
encryption. Online activities and personal information
stay
Using
secure and aprivate
virtual
from private network
snoopers because of this
(vpn)
technology.
Never trust links from suspicious emails, sketchy
websites, and advertisements. Double-check
the URL to see if it has the correct format before
clicking.
Double-checking Unfamiliar Links
Social media platforms like Instagram, Facebook,
and Twitter are all publicly accessible. Their
privacy protection is optional by locking the
account or making it private.
Limited Sharing on Social Media
Can be avoided by simply limiting
too personal posts on social media.
threats
Multi-factor or two-factor authentication is
an added verification step besides a
conventional password. Google applies this
wherein the users must provide a specific
code sent to their smartphones to access
Using Multi-factor Authentication
their accounts.
added verification step
besides a conventional
password
Multi-factor or two-factor
authentication
It ensures the integrity, confidentiality, and
accessibility of computer networks. It is relevant
when cybercriminals are becoming more
dominant in exploiting new users and
enterprises, then it is vital to take extra
Network
precautions to avoidsecurity
any data breach.
It was previously stated that it monitors
and filters incoming and outgoing
network traffic. Additionally, it serves as
a “wall,” either hardware or software
firewall
It is a software or a device for closely
monitoring a network for any malicious
activity or intrusion at the network or the
host.
Intrusion Detection System (IDS)
Used wherein it seeks certain patterns of known
malicious instruction sequences by targeting
new malware sequences. It relies on machine
learning to develop a model of trusted activity,
then compares it to the current activity.
signature-based detection method
used to run on the individual hosts of a
network;therefore, it only monitors the
inflow and outflow of traffic at the host.
host intrusion detection
system (HIDS)
It is the latest wireless network security
certificate protocol by the Wi-Fi alliance.
It focuses its filtering at the “entry”
when a new device requests to connect
to the network.
Wi-Fi Protected Access 3 (WPA3)
if the server's private key is
compromised, the session key will not be
affected. So, if the long-term passwords
were hacked, the past encrypted
sessions cannot be
Forward secrecydecrypted
It connects any remote device to
an enterprise server wherein
company data is hosted.
Virtual Private Network (VPN)
As emails allow scripts to be embedded
inside the device, it is easier for anyone to
write a code, attach it to an email, then send
it. Receivers
tend to click this email which can comprise
Email Security
the device.
One of the most significant
consequences companies face
during an
internet, and network downtime is
_______________.
Revenue loss
best way to ensure network
reliability, as well as an occasional
internet check-up and monitoring.
Poor cable management
best way to ensure network
reliability, as well as an occasional
internet check-up and monitoring.
Poor cable management
Repairing damaged internet and
network lines consumes both time
and maintenance costs, including
acquiring new cables and upgraded
network devices for replacement.
Maintenance cost
encouraged to
prevent sudden company
downtime.
Daily monitoring of the cables and
network devices
Internet and network failure
significantly affect productivity as
tasks heavily rely on the internet.
Employees will remain stagnant until
the downtime is fixed, causing low
productivity outcomes.
Lesser productivity
It is advisable to provide a
___________________________________________________
________________ for quick resolutions for
sudden downtimes.
backup network and a backup
internet service provider
If internet and network failures regularly occur, it
negatively impacts the employees and the
companyʼs clients and partners. It is encouraged
to maintain a system that would ensure the
reoccurrence of the problems.
DAMAGED REPUTATION
Failures in operations and transactions mean
failure to meet agreed upon outputs and
deliverables on time. It could lead to legal
repercussions, especially when crucial outputs
are at risk.
Legal repercussions

You might also like