SlideShare a Scribd company logo
1 of 11
E-Research Paper




A Research Study presentation to:

       Mr. Jonathan Arriola

   Collage of Arts and Sciences

     Rizal Memorial Colleges




       In Partial Fulfillment

Of the Requirements for the Subject

    Internet & MS Power Point




    By: Ms. Joyen B. Navales

          (BSBA-Student)
A. DISCUSSED THE FOLLOWING TECHNICAL TERMS THOROUGHHLY:

       1. The Internet?
           How does the internet work?

              The Internet works because open standards allow every network to connect to
              every other network.
              This is what makes it possible for anyone to create content, offer services, and sell
              products without requiring permission from a central authority.
              It levels the playing field for everyone and it’s the reason why we have a rich
              diversity of applications and services that many of us enjoy today.

            The history if the internet

The history of the Internet began with the development of electronic computers in the
1950s.       This       began       with point-to-point     communication between mainframe
computers and terminals, expanded to point-to-point connections between computers and then
early research into packet switching. Packet switched networks such as ARPANET, Mark
I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the
late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the
development of protocols for internetworking, where multiple separate networks could be joined
together into a network of networks.
In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide
network of fully interconnected TCP/IP networks called the Internet was introduced. Access to
the ARPANET was expanded in 1981 when the National Science Foundation(NSF) developed
the Computer Science Network (CSNET) and again in 1986 when NSFNETprovided access
to supercomputer sites in the United States from research and education organizations.
Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s. The
ARPANET was decommissioned in 1990. The Internet was commercialized in 1995 when
NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry
commercial traffic.
Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including
the rise of near-instant communication by electronic mail, instant messaging,Voice over Internet
Protocol (VoIP) "phone calls", two-way interactive video calls, and theWorld Wide Web with
its discussion forums, blogs, social networking, and online shoppingsites. The research and
education community continues to develop and use advanced networks such as NSF's very high
speed Backbone Network Service (vBNS), Internet2, and National LambdaRail. Increasing
amounts of data are transmitted at higher and higher speeds over fiber optic networks operating
at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts
of online information and knowledge, commerce, entertainment and social networking.
 What kind of information are available?

Dictionaries and encyclopedias are good for an overview: facts, figures, addresses, statistics,
definitions and dates.

The Library has online dictionaries and encyclopedias in the Quick Reference electronic
collection. TheSubject Guides can also suggest useful encyclopedias and dictionaries in your
subject area.

Books can be:

  Print - use the Library catalogue keyword search to find them.
 Online (eBooks). See the How-to guide eBooks (Online Books) for an explanation about
 them and how to find them.

       They can be available in print or electronic format. See the How-to guide for an
       explanation of the different types of articles inExplaining journal articles
       Want to find good articles faster? See the How-to guide Database searching
       Want to find Newspaper articles? See the How-to guide News & Newspapers
       You will need to evaluate information that hasn't come from a scholarly source. See the
       How-to guideEvaluating Information Resources


             How do people use the internet?

Put simply, the Internet is millions of computers around the world connected to each other. It
was originally developed to connect laboratories engaged in government research, but now
millions of people every day use it for anything from sending Valentines to selling cereal. When
you're on the Internet, your computer is connected to others by a mixture of telephone wires,
cables and satellites. This allows people to exchange large amounts of information, pictures,
video and audio quickly. The Internet is easy to use and offers you the chance to research and
share news, views and information with people across the world.



       2. Operating system standards and practices

       General Concepts
       Handheld and Mobile OS
       Windows OS Components
3. Data Management

A database management system (DBMS) is a software package with computer programs that
controls the creation, maintenance, and use of a database. It allows organizations to conveniently
develop databases for various applications. A database is an integrated collection of data records,
files, and other objects. A DBMS allows different user application programs to concurrently
access the same database. DBMSs may use a variety of database models, such as the relational
model or object model, to conveniently describe and support applications. It typically
supports query languages, which are in fact high-level programming languages, dedicated
database languages that considerably simplify writing database application programs. Database
languages also simplify the database organization as well as retrieving and presenting
information from it. A DBMS provides facilities for controlling data access, enforcing data
integrity, managing concurrency control, andrecovering the database after failures and restoring
it from backup files, as well as maintaining database security.


       4. Network Management

Network management refers to the broad subject of managing computer networks. There exists a
wide variety of software and hardware products that help network system administrators manage
a network. Network management covers a wide area, including:

        Security: Ensuring that the network is protected from unauthorized users.
        Performance: Eliminating bottlenecks in the network.
        Reliability: Making sure the network is available to users and responding to hardware
       and software malfunctions.


   B. MAKE A PRESENTATION USING PPT. PRESENTATION.

   C. LIST DOWN THE DIFFERENT SOPHISTICATED HARDWARE USED IN THE
      FIELD OF COMMUNICATION. CITE AT LEAST 10 ADVANTAGES AND 10
      DISADVANTAGES ACCORDINGLY. ATTACHED PICTURES FOR EVERY
      HARDWARE.


Hubs

Hubs are a form of network connection device that has receded in recent years in favour of more
intelligent devices such as switches. Hubs are used to receive, amplify and retransmit data
throughout a network. Whenever a hub receives a node, it ignores the destination, amplifies it
and retransmits it to all nodes on the network. Hubs are also known as multi-port repeaters
because whenever it receives a packet of data it retransmits this to all attached nodes on the
network.
Switches




Switches are like a type of intelligent hub, they will determine the MAC address of the message
and then send it directly to that node on the network, because of this collisions and other errors
are avoided. The network is also clear of extra transmissions for the nodes to sort through.
Switches are highly capable of receiving and retransmitting multiple messages to multiple
different nodes on the network. Because of this each segment is clear and a computer may send a
transmission at any time, without waiting for a token or taking up additional sending space. In
working this way, the nodes can both receive and transmit at the same time and each message is
on it’s own segment of transmission media directly to the receiver node.



Routers

Routers are devices that choose the most efficient path through a network to the required node,
they often are coupled with more than one router in a network which makes choosing the most
efficient route to a node a little more complicated. Routers also can include various
security features to stop unwanted access. Small scale examples of routers will often only have
one LAN and theinternet to connect. In this case, the addressed node is either an IP address (in
which case the router directs the data to the internet) or a local address(in which case the data is
sent to a local node). Each router has a table of routes which are the most efficient to get to any
given address. In the small scale example given above, this table rarely changes and is much
smaller than most others.

Home or small business systems also have wireless access points in their routers and an Ethernet
switch. Security features can include firewalls, password, blocking of certain IP addresses,
websites or other nodes in the internet. Because of all these other features, routers are often
associated with having other functions as standard, however the term router only describes the
function of efficiently routing data through a network.



Modems

Modem is an abbreviation of the words modulate and demodulate. These words are used to
describe turning signals from digital to analogue or the reverse. This is necessary to transmit data
as the weak signals processed by a CPU will not suffice for long distance transmission. Today
most modems are used to connect a home computer to the internet service provider. Modems are
often connected to a computer by a USB port or an Ethernet connection. The primary role of a
modem is to change signals from digital to analogue and back to digital for transmission.
Bridges

A bridge is similar to a switch except that it is the only link between two sides of a network. It
divides it into two segments, an example of why this would be done is for easier management of
computers. Like a switch, a bridge determines the MAC address of the receiving node and
transmits it only to that side of the network on which the node is located.



Gateways

A gateway allows an administrator to connect two networks together, even if they use
differentprotocols(information on roles of protocols in a communications system. However they
can also be used to filter traffic between two networks, they are frequently used to connect a
LAN to the internet. The idea is that they convert transmissions on one network to be compatible
with another network, such as low level ethernet protocols used in a LAN to the protocols used
by the ISP. The word gateway can be used differently in different contexts and as such, the
words router and gateway are often interchanged by the general public, even though routers
commonly include one or more gateways.



Network Interface Cards (NICs)

A network interface card (NIC) is a device which converts data from a form usable by the node
into a form transmittable through the network. The NIC must also keep track of collision
detection and maintain correct format and protocols for the transmission of data. Each NIC has
it's own unique 48-bit(this makes for a total of

2^48
different combinations) MAC address which allows other nodes on the network to uniquely
identify it in a network. Current trends are moving towards NICs built into motherboards or
coming as standard devices, however NICs are available for PCI or PCI Express slots, USB
wireless NICs and PCMCIA slot cards. Many NICs either built in or separate cards have wireless
capabilities, particularly in laptop computers.



Mobile Phones

The main functions performed by a mobile phone in communication is collecting the audio data,
processing it to be in the correct digital format, processing it into the correct analogue
format(more information). The phone will then transmit this to the telephone tower. It receives
audio from the other end of the phone conversation, converts it from analogue to digital, converts
it into the correct format, converts it to the analogue form preferred by the loudspeaker, then
displays this data. Throughout the process of sending the mobile phone should also include any
extra bits needed for error checking. Other functions performed by the mobile phone include the
sending of text messages and more recently, emails, images and videos. These go through the
same processes to reach the telephone tower and then back to the receiver. The only difference is
that the file formats, data types, display and collecting devices are different.



Cables

The functions performed by cables in a communications system is the medium for electrical
charge to flow through. Cables are always made of metal and usually made of copper, more
information can be found aboutTransmission Media.



Wireless Access Points (WAPs)

These are commonly referred to as WAPs and are used to create a network over multiple nodes
in an area. Conceptually a WAP is like a hub, it simply receives and retransmits all data to all
nodes on the network, what the nodes do with this data and how it is addressed is up to the
nodes. A major issue with WAPs is that anyone within the range can access the network and
potentially access data being transmitted. Two forms of security are currently available: WEP
(Wired Equivalent Privacy) and WPA (WiFi Protected Access). WEP uses a single encryption
key while WPA changes the encryption after a set amount of time. WEP system can be
infiltrated so currently the recommended system is WPA.



Bluetooth Devices

Bluetooth is a technology developed for use over short range in everyday uses through the use of
piconets. A piconet is a network created by the Bluetooth devices. Bluetooth devices will
automatically recognise each other and form these piconets of up to seven devices, these devices
may also at the same time connect with another piconet. Bluetooth operates within the 2.4GHz
spectrum. Each node connected to this wireless network shares the same communication channel
which is split into equally spaced time segments in which packets can be placed.

In a piconet one device is designated as the “Master” and all other devices are “Slaves” this is
because to communicate a Slave must go through the master device. Distance that each
Bluetooth device can transmit varies, with some devices requiring to be closer than 1 metre while
other more high powered devices can transmit up to 100 metres. With Bluetooth the same
processes are involved with error checking, with CRC often being used, and different
transmission types such as synchronous and asynchronous data transmission. Speeds in
Bluetooth are generally up to 1mbps while enhanced data rate mode can increase this to 3mbps.



   D. DIFFERENTIATION IN TERMS OF DATA COMMUNICATIONS:

           a. Local area network


A local area network (LAN) is a computer network that interconnects computers in a limited
area such as a home, school, computer laboratory, or office building using network media.[1] The
defining characteristics of LANs, in contrast to wide area networks (WANs), include their
usually higher data-transfer rates, smaller geographic area, and lack of a need for leased
telecommunication lines.
       ARCNET, Token Ring and other technology standards have been used in the past, but
       Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies
       currently used to build LANs.

           b. Local area network

LAN Resources
The Big-LAN FAQ is for the Big-LAN mailing list, a mailing list for discussion of issues in
designing and operating Campus-Size Local Area Networks, especially complex nets utilizing
multiple technologies and supporting multiple protocols. Topics include repeaters, bridges,
routers and gateways; how to incorporate smaller Personal-Computer type LANs into the
campus-wide LAN; how to unify the mail systems, etc.


           c. Wide area network


A Wide Area Network (WAN) is a network that covers a broad area (i.e., anytelecommunications
network that links across metropolitan, regional, or national boundaries) using private
or public network transports. Business and government entities utilize WANs to relay data
among employees, clients, buyers, and suppliers from various geographical locations. In essence,
this mode of telecommunication allows a business to effectively carry out its daily function
regardless of location. The Internet can be considered a WAN as well, and is used by businesses,
governments, organizations, and individuals for almost any purpose imaginable.
Related terms for other types of networks are personal area networks (PANs),local area
networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which
are usually limited to a room, building, campus or specific metropolitan area (e.g., a city)
respectively.




.
Computer 3

More Related Content

What's hot

Networking technology
Networking technologyNetworking technology
Networking technologySmritiGurung4
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)Mehar Arslan
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usessumitsc
 
Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce projectsirajislam7
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignmentBijay Bista
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix Adpd
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet FundamentalPrithvi Raj M
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation DowningIWCS
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksKak Yong
 
Final draft[2]
Final draft[2]Final draft[2]
Final draft[2]Teshabel
 
File Sharing-R.D.Sivakumar
File Sharing-R.D.SivakumarFile Sharing-R.D.Sivakumar
File Sharing-R.D.SivakumarSivakumar R D .
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamentalnizamhusen
 

What's hot (20)

Networking technology
Networking technologyNetworking technology
Networking technology
 
Learning assignment (computer Networking)
Learning assignment (computer Networking)Learning assignment (computer Networking)
Learning assignment (computer Networking)
 
Powerpoint presentation on internet and its uses
Powerpoint presentation on internet and its usesPowerpoint presentation on internet and its uses
Powerpoint presentation on internet and its uses
 
Internet basic
Internet basicInternet basic
Internet basic
 
Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce project
 
Computer Network ASsignment
Computer Network ASsignmentComputer Network ASsignment
Computer Network ASsignment
 
Internet Appendix A
Internet Appendix AInternet Appendix A
Internet Appendix A
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet Fundamental
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
La3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networksLa3 ict-topic-3-computer-networks
La3 ict-topic-3-computer-networks
 
computer Unit 9
computer Unit 9computer Unit 9
computer Unit 9
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
E content internet
E   content internetE   content internet
E content internet
 
Chapter 3 network
Chapter 3 networkChapter 3 network
Chapter 3 network
 
Final draft[2]
Final draft[2]Final draft[2]
Final draft[2]
 
Lab 3 internet & www
Lab 3   internet & wwwLab 3   internet & www
Lab 3 internet & www
 
File Sharing-R.D.Sivakumar
File Sharing-R.D.SivakumarFile Sharing-R.D.Sivakumar
File Sharing-R.D.Sivakumar
 
E content network
E content networkE content network
E content network
 
Internet
InternetInternet
Internet
 
Chap1 Internet Fundamental
Chap1 Internet FundamentalChap1 Internet Fundamental
Chap1 Internet Fundamental
 

Similar to Computer 3

Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
What exactly is the internet, and how
What exactly is the internet, and howWhat exactly is the internet, and how
What exactly is the internet, and howtgrattidge
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) ghayour abbas
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A SurveyCheryl Brown
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKimtiazalijoono
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to InternetPoojaWalia6
 
Mass Media - Internet
Mass Media - InternetMass Media - Internet
Mass Media - InternetGuimaraess
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorialreddydivakara
 

Similar to Computer 3 (20)

Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Network Notes
Network Notes Network Notes
Network Notes
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Note 01
Note 01Note 01
Note 01
 
What exactly is the internet, and how
What exactly is the internet, and howWhat exactly is the internet, and how
What exactly is the internet, and how
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Essay On Networking
Essay On NetworkingEssay On Networking
Essay On Networking
 
Internet.pdf
Internet.pdfInternet.pdf
Internet.pdf
 
4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321) 4. Network and Internet ( CSI-321)
4. Network and Internet ( CSI-321)
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 
NETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORKNETWORK INTERNET and TYPES OF NETWORK
NETWORK INTERNET and TYPES OF NETWORK
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Mass Media - Internet
Mass Media - InternetMass Media - Internet
Mass Media - Internet
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Fg c
Fg cFg c
Fg c
 
1 web programming
1 web programming1 web programming
1 web programming
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 

Computer 3

  • 1. E-Research Paper A Research Study presentation to: Mr. Jonathan Arriola Collage of Arts and Sciences Rizal Memorial Colleges In Partial Fulfillment Of the Requirements for the Subject Internet & MS Power Point By: Ms. Joyen B. Navales (BSBA-Student)
  • 2. A. DISCUSSED THE FOLLOWING TECHNICAL TERMS THOROUGHHLY: 1. The Internet?  How does the internet work? The Internet works because open standards allow every network to connect to every other network. This is what makes it possible for anyone to create content, offer services, and sell products without requiring permission from a central authority. It levels the playing field for everyone and it’s the reason why we have a rich diversity of applications and services that many of us enjoy today.  The history if the internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced. Access to the ARPANET was expanded in 1981 when the National Science Foundation(NSF) developed the Computer Science Network (CSNET) and again in 1986 when NSFNETprovided access to supercomputer sites in the United States from research and education organizations. Commercial internet service providers (ISPs) began to emerge in the late 1980s and 1990s. The ARPANET was decommissioned in 1990. The Internet was commercialized in 1995 when NSFNET was decommissioned, removing the last restrictions on the use of the Internet to carry commercial traffic. Since the mid-1990s the Internet has had a drastic impact on culture and commerce, including the rise of near-instant communication by electronic mail, instant messaging,Voice over Internet Protocol (VoIP) "phone calls", two-way interactive video calls, and theWorld Wide Web with its discussion forums, blogs, social networking, and online shoppingsites. The research and education community continues to develop and use advanced networks such as NSF's very high speed Backbone Network Service (vBNS), Internet2, and National LambdaRail. Increasing amounts of data are transmitted at higher and higher speeds over fiber optic networks operating at 1-Gbit/s, 10-Gbit/s, or more. The Internet continues to grow, driven by ever greater amounts of online information and knowledge, commerce, entertainment and social networking.
  • 3.  What kind of information are available? Dictionaries and encyclopedias are good for an overview: facts, figures, addresses, statistics, definitions and dates. The Library has online dictionaries and encyclopedias in the Quick Reference electronic collection. TheSubject Guides can also suggest useful encyclopedias and dictionaries in your subject area. Books can be: Print - use the Library catalogue keyword search to find them. Online (eBooks). See the How-to guide eBooks (Online Books) for an explanation about them and how to find them. They can be available in print or electronic format. See the How-to guide for an explanation of the different types of articles inExplaining journal articles Want to find good articles faster? See the How-to guide Database searching Want to find Newspaper articles? See the How-to guide News & Newspapers You will need to evaluate information that hasn't come from a scholarly source. See the How-to guideEvaluating Information Resources  How do people use the internet? Put simply, the Internet is millions of computers around the world connected to each other. It was originally developed to connect laboratories engaged in government research, but now millions of people every day use it for anything from sending Valentines to selling cereal. When you're on the Internet, your computer is connected to others by a mixture of telephone wires, cables and satellites. This allows people to exchange large amounts of information, pictures, video and audio quickly. The Internet is easy to use and offers you the chance to research and share news, views and information with people across the world. 2. Operating system standards and practices General Concepts Handheld and Mobile OS Windows OS Components
  • 4. 3. Data Management A database management system (DBMS) is a software package with computer programs that controls the creation, maintenance, and use of a database. It allows organizations to conveniently develop databases for various applications. A database is an integrated collection of data records, files, and other objects. A DBMS allows different user application programs to concurrently access the same database. DBMSs may use a variety of database models, such as the relational model or object model, to conveniently describe and support applications. It typically supports query languages, which are in fact high-level programming languages, dedicated database languages that considerably simplify writing database application programs. Database languages also simplify the database organization as well as retrieving and presenting information from it. A DBMS provides facilities for controlling data access, enforcing data integrity, managing concurrency control, andrecovering the database after failures and restoring it from backup files, as well as maintaining database security. 4. Network Management Network management refers to the broad subject of managing computer networks. There exists a wide variety of software and hardware products that help network system administrators manage a network. Network management covers a wide area, including:  Security: Ensuring that the network is protected from unauthorized users.  Performance: Eliminating bottlenecks in the network.  Reliability: Making sure the network is available to users and responding to hardware and software malfunctions. B. MAKE A PRESENTATION USING PPT. PRESENTATION. C. LIST DOWN THE DIFFERENT SOPHISTICATED HARDWARE USED IN THE FIELD OF COMMUNICATION. CITE AT LEAST 10 ADVANTAGES AND 10 DISADVANTAGES ACCORDINGLY. ATTACHED PICTURES FOR EVERY HARDWARE. Hubs Hubs are a form of network connection device that has receded in recent years in favour of more intelligent devices such as switches. Hubs are used to receive, amplify and retransmit data throughout a network. Whenever a hub receives a node, it ignores the destination, amplifies it and retransmits it to all nodes on the network. Hubs are also known as multi-port repeaters because whenever it receives a packet of data it retransmits this to all attached nodes on the network.
  • 5. Switches Switches are like a type of intelligent hub, they will determine the MAC address of the message and then send it directly to that node on the network, because of this collisions and other errors are avoided. The network is also clear of extra transmissions for the nodes to sort through. Switches are highly capable of receiving and retransmitting multiple messages to multiple different nodes on the network. Because of this each segment is clear and a computer may send a transmission at any time, without waiting for a token or taking up additional sending space. In working this way, the nodes can both receive and transmit at the same time and each message is on it’s own segment of transmission media directly to the receiver node. Routers Routers are devices that choose the most efficient path through a network to the required node, they often are coupled with more than one router in a network which makes choosing the most efficient route to a node a little more complicated. Routers also can include various
  • 6. security features to stop unwanted access. Small scale examples of routers will often only have one LAN and theinternet to connect. In this case, the addressed node is either an IP address (in which case the router directs the data to the internet) or a local address(in which case the data is sent to a local node). Each router has a table of routes which are the most efficient to get to any given address. In the small scale example given above, this table rarely changes and is much smaller than most others. Home or small business systems also have wireless access points in their routers and an Ethernet switch. Security features can include firewalls, password, blocking of certain IP addresses, websites or other nodes in the internet. Because of all these other features, routers are often associated with having other functions as standard, however the term router only describes the function of efficiently routing data through a network. Modems Modem is an abbreviation of the words modulate and demodulate. These words are used to describe turning signals from digital to analogue or the reverse. This is necessary to transmit data as the weak signals processed by a CPU will not suffice for long distance transmission. Today most modems are used to connect a home computer to the internet service provider. Modems are often connected to a computer by a USB port or an Ethernet connection. The primary role of a modem is to change signals from digital to analogue and back to digital for transmission.
  • 7. Bridges A bridge is similar to a switch except that it is the only link between two sides of a network. It divides it into two segments, an example of why this would be done is for easier management of computers. Like a switch, a bridge determines the MAC address of the receiving node and transmits it only to that side of the network on which the node is located. Gateways A gateway allows an administrator to connect two networks together, even if they use differentprotocols(information on roles of protocols in a communications system. However they can also be used to filter traffic between two networks, they are frequently used to connect a LAN to the internet. The idea is that they convert transmissions on one network to be compatible with another network, such as low level ethernet protocols used in a LAN to the protocols used by the ISP. The word gateway can be used differently in different contexts and as such, the words router and gateway are often interchanged by the general public, even though routers commonly include one or more gateways. Network Interface Cards (NICs) A network interface card (NIC) is a device which converts data from a form usable by the node into a form transmittable through the network. The NIC must also keep track of collision detection and maintain correct format and protocols for the transmission of data. Each NIC has it's own unique 48-bit(this makes for a total of 2^48 different combinations) MAC address which allows other nodes on the network to uniquely identify it in a network. Current trends are moving towards NICs built into motherboards or coming as standard devices, however NICs are available for PCI or PCI Express slots, USB
  • 8. wireless NICs and PCMCIA slot cards. Many NICs either built in or separate cards have wireless capabilities, particularly in laptop computers. Mobile Phones The main functions performed by a mobile phone in communication is collecting the audio data, processing it to be in the correct digital format, processing it into the correct analogue format(more information). The phone will then transmit this to the telephone tower. It receives audio from the other end of the phone conversation, converts it from analogue to digital, converts it into the correct format, converts it to the analogue form preferred by the loudspeaker, then displays this data. Throughout the process of sending the mobile phone should also include any extra bits needed for error checking. Other functions performed by the mobile phone include the sending of text messages and more recently, emails, images and videos. These go through the same processes to reach the telephone tower and then back to the receiver. The only difference is that the file formats, data types, display and collecting devices are different. Cables The functions performed by cables in a communications system is the medium for electrical charge to flow through. Cables are always made of metal and usually made of copper, more information can be found aboutTransmission Media. Wireless Access Points (WAPs) These are commonly referred to as WAPs and are used to create a network over multiple nodes in an area. Conceptually a WAP is like a hub, it simply receives and retransmits all data to all nodes on the network, what the nodes do with this data and how it is addressed is up to the nodes. A major issue with WAPs is that anyone within the range can access the network and potentially access data being transmitted. Two forms of security are currently available: WEP (Wired Equivalent Privacy) and WPA (WiFi Protected Access). WEP uses a single encryption key while WPA changes the encryption after a set amount of time. WEP system can be infiltrated so currently the recommended system is WPA. Bluetooth Devices Bluetooth is a technology developed for use over short range in everyday uses through the use of piconets. A piconet is a network created by the Bluetooth devices. Bluetooth devices will automatically recognise each other and form these piconets of up to seven devices, these devices may also at the same time connect with another piconet. Bluetooth operates within the 2.4GHz
  • 9. spectrum. Each node connected to this wireless network shares the same communication channel which is split into equally spaced time segments in which packets can be placed. In a piconet one device is designated as the “Master” and all other devices are “Slaves” this is because to communicate a Slave must go through the master device. Distance that each Bluetooth device can transmit varies, with some devices requiring to be closer than 1 metre while other more high powered devices can transmit up to 100 metres. With Bluetooth the same processes are involved with error checking, with CRC often being used, and different transmission types such as synchronous and asynchronous data transmission. Speeds in Bluetooth are generally up to 1mbps while enhanced data rate mode can increase this to 3mbps. D. DIFFERENTIATION IN TERMS OF DATA COMMUNICATIONS: a. Local area network A local area network (LAN) is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building using network media.[1] The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines. ARCNET, Token Ring and other technology standards have been used in the past, but Ethernet over twisted pair cabling, and Wi-Fi are the two most common technologies currently used to build LANs. b. Local area network LAN Resources The Big-LAN FAQ is for the Big-LAN mailing list, a mailing list for discussion of issues in designing and operating Campus-Size Local Area Networks, especially complex nets utilizing multiple technologies and supporting multiple protocols. Topics include repeaters, bridges, routers and gateways; how to incorporate smaller Personal-Computer type LANs into the campus-wide LAN; how to unify the mail systems, etc. c. Wide area network A Wide Area Network (WAN) is a network that covers a broad area (i.e., anytelecommunications network that links across metropolitan, regional, or national boundaries) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations. In essence,
  • 10. this mode of telecommunication allows a business to effectively carry out its daily function regardless of location. The Internet can be considered a WAN as well, and is used by businesses, governments, organizations, and individuals for almost any purpose imaginable. Related terms for other types of networks are personal area networks (PANs),local area networks (LANs), campus area networks (CANs), or metropolitan area networks (MANs) which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. .