0% found this document useful (0 votes)
12 views37 pages

CSS Reviewer

The document provides an overview of various computer and networking technologies, including USB standards, flash memory, read-only memory (ROM), ISO images, Windows operating system requirements, and different types of networks (LAN, WAN, MAN, etc.). It also discusses network security protocols, types of routers, and the importance of network interface cards. Additionally, it highlights the functionalities and applications of these technologies in both personal and industrial contexts.

Uploaded by

Arcānus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views37 pages

CSS Reviewer

The document provides an overview of various computer and networking technologies, including USB standards, flash memory, read-only memory (ROM), ISO images, Windows operating system requirements, and different types of networks (LAN, WAN, MAN, etc.). It also discusses network security protocols, types of routers, and the importance of network interface cards. Additionally, it highlights the functionalities and applications of these technologies in both personal and industrial contexts.

Uploaded by

Arcānus
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

1. USB 2.

0 offers a transfer rate of about 480 Mbps, whereas


USB 3.0 offers a transfer rate of about 4,800 Mbps which is equal to about 5 GB.
This super-fast transfer speed of USB 3.0 can be especially useful when backing up or
transferring large amounts of data, such as an external hard drive

maximum cable length for USB 2.0

5 meters (or about 16 feet and 5 inches).


maximum cable length for USB 3.0 using a non-twisted pair wire

3 Meters

2. Flash Memory is one category of ROM

Flash memory, also known as flash storage, is a type of nonvolatile memory that erases data in
units called blocks and rewrites data at the byte level. Flash memory is widely used for storage
and data transfer in consumer devices, enterprise systems and industrial applications.
Flash memory is a long-life and non-volatile storage chip that is widely used in embedded
systems. It can keep stored data and information even when the power is off. It can be
electrically erased and reprogrammed. Flash memory was developed from EEPROM
(electronically erasable programmable read-only memory).
Types of flash memory
- SSDs store data permanently inside an integrated circuit, typically using flash memory. The
flash memory inside an SSD means data is written, transferred, and erased electronically
and silently

What are 5 uses of flash memory?


IN INDUSTRIAL DEVICES, FLASH MEMORY IS WIDELY USED IN:
 Security systems.
 Military systems.
 Embedded computers.
 Solid-state disk drives.
 Networking and communication products.
 Wireless communication devices.
 Retail management products (e.g., handheld scanners)
 Medical products.

Common types of flash memory


SD, Micro Sd, Flash Drives,SSD

M. 2 is a Form Factor used for expansion cards Storage Drives, and connectors that are internally
mounted into a computer.
3. Read-only memory, or ROM, is a type of computer storage containing non-volatile,
permanent data that, normally, can only be read, not written to. Inside the ROM there’s a
Firmware.
Firmware is software that provides basic machine instructions that allow the hardware to
function and communicate with other software running on a device. Firmware provides low-level
control for a device's hardware.
ROM provides the necessary instructions for communication between various hardware
components. As mentioned before, it is essential for the storage and operation of the BIOS, but it can
also be used for basic data management, to hold software for basic processes of utilities and to read
and write to peripheral devices.

The major advantage of ROM is its non-volatile nature, which helps it retain information even after
you turn off the power or shut down the computer. ROM stores all the data necessary for your PC to
start and load the operating system. It's a more reliable memory since all of its circuitry is very
simple

4. ISO Image / Disk Image


Also know as Disk Image is an exact copy of an entire optical disk such as a CD, DVD, or Blu-ray
archived into a single file. This file, which is also sometimes referred to as an ISO image, is a smaller
sized duplicate of large sets of data.

Function:
An ISO file (often referred to as an ISO image) is an archived file containing an accurate copy (or
image) of data found on an optical disk, for example, a CD or a DVD. This file format is often
used to back up optical disks or arrange large sets of files for further writing to an optical disk.

5. Windows Operating system minimum hard disk Capacity .

For Windows 10
16 GB for Windows 10 32-bit, 20 GB for Windows 10 64-bit.
For Windows Server
Windows Server 2012 requires at least 10 GB of disk space for installation, and at
least 32 GB of available disk space is recommended.

6. Windows Registry or Registry

is a database of information, settings, options, and other values


for software and hardware installed on all versions of Microsoft Windows operating systems.
When a program is installed, a new subkey is created in the registry. This subkey contains
settings specific to that program, such as its location, version, and primary executable.

7. power supply configuration


8. Standard Color Coding

T568A t568B

Types Of Ethernet Cables

Cross Over Straight Through

Cross Over
connect two devices of the same type together.
Ex. Pc to Pc ,switch to switch

Straight Through
connect two devices of different types together.
Ex. PC to Switch , Pc to Router or Access point,

Roll Over
Rollover cable (also known as a Yost cable, Cisco cable, or a Console cable) is a type of null-modem
cable that is used to connect a computer terminal to a router's console port.
-referred to as Yost cables are most commonly used to connect to a device's console
port to make programming changes to the device. Unlike crossover and straight-wired cables,
rollover cables are not intended to carry data but instead create an interface with the device.

9. Lan problem
10. Network Interface Card NIC

-also known as Lan Card or Ethernet Card, is a computer expansion card that allows your PC, laptop, or
server to connect to a network via an ethernet cable and has 2 LED Light Emitting Diode.

therefore it allow your different devices to communicate together and share information and data for a more
productive and efficient IT system.

It is used to create an additional communication port on a computer or similar, which can then be connected
to a network. This will often mean the internet, for which the connection will either be wireless (Wi-Fi) or
via an RJ45 Ethernet cable.

11. Router
It is a networking device that forwards data packets between computer networks. It
connects two or more packet-switched networks or subnetworks. It serves two primary
functions: managing traffic between these networks by forwarding data packets to their intended IP
addresses, and allowing multiple devices to use the same Internet connection.

12.Wifi
Wi-Fi is a wireless networking technology that uses radio waves to provide wireless high-
speed Internet access. A common misconception is that the term Wi-Fi is short for "wireless
fidelity," however Wi-Fi is a trademarked phrase that refers to IEEE 802.11x standards.

13. Computer Networks Types

Lan (Local Area Network)


- a collection of devices connected together in one physical location.

is a group of computers connected to each other in a small area such as schools,


building, Home, office.

is used for connecting two or more personal computers through a communication


medium such as twisted pair, coaxial cable, etc.

less costly as it is built with inexpensive hardware such as hubs, network adapters, and
ethernet cables.

data is transferred at an extremely faster rate in Local Area Network.

Local Area Network provides higher security.


Pan (Personal Area Network)

- is a network arranged within an individual person, typically within a range of 10 meters.

-is used for connecting the computer devices of personal use is known as Personal Area
Network.

-Thomas Zimmerman was the first research scientist to bring the idea of the Personal Area
Network.

-covers an area of 30 feet.

-Personal computer devices that are used to develop the personal area network
are the laptop, mobile phones, media player and play stations.

Types Of Personal Area Network

o Wired Personal Area Network


o Wireless Personal Area Network

Example Body Area network - mobile network moves with a person. Suppose a person
establishes a network connection and then creates a connection with another device to
share the information.

Small Home Office - It is used to connect a variety of devices to the internet and to a
corporate network using a VPN.

Offline Network - it is also known as a home network is designed to integrate the devices
such as printers, computer, television but they are not connected to the internet.
MAN (Metropolitan Area Network)

-is a network that covers a larger geographic area by interconnecting a different LAN to
form a larger network.

-Government agencies use MAN to connect to the citizens and private industries.

-In MAN, various LANs are connected to each other through a telephone exchange line.

-The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN, OC-3, ADSL,
etc.

-It has a higher range than Local Area Network(LAN).

o MAN is used in communication between the banks in a city.


o It can be used in an Airline Reservation.
o It can be used in a college within a city.
o It can also be used for communication in the military.
WAN (Wide Area Network)

-It is a network that interconnects multiple local area network.

is the network that connects your offices, data centers, cloud applications, and cloud
storage together. It is called a wide-area network because it spans beyond a single building or large
campus to include multiple locations spread across a specific geographic area, or even the world.

-A Wide Area Network is a network that extends over a large geographical area such as
states or countries.

-is quite bigger network than the LAN.

-is not limited to a single location, but it spans over a large geographical area through a
telephone line, fibre optic cable or satellite links.

-The internet is one of the biggest WAN in the world.

-A Wide Area Network is widely used in the field of Business, government, and education.
Examples

o Mobile Broadband: A 4G network is widely used across a region or country.


o Last mile: A telecom company is used to provide the internet services to the
customers in hundreds of cities by connecting their home with fiber.
o Private network: A bank provides a private network that connects the 44 offices.
This network is made by using the telephone leased line provided by the telecom
company.

Following are the advantages of the Wide Area Network:

o Geographical area: A Wide Area Network provides a large geographical area.


Suppose if the branch of our office is in a different city then we can connect with
them through WAN. The internet provides a leased line through which we can
connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we do
not need to buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The web
application like Facebook, Whatsapp, Skype allows you to communicate with
friends.
o Sharing of software and resources: In WAN network, we can share the software
and other resources like a hard drive, RAM.
o Global business: We can do the business over the internet globally.
o High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in turn
increases the productivity of our company.
CAN (Campus Area Network)

is a computer network made up of an interconnection of local area networks (LANs)


within a limited geographical area, e.g. corporate buildings.

Campus networks are used in manufacturing, warehousing, universities, and also in


corporate and industrial settings.

Virtual Local Area Network (VLAN)

A logical subnetwork that groups collection of devices from the same network switch.

is a virtualized connection that connects multiple devices and network nodes from different LANs
into one logical network.

VLANs allow multiple LANs and associated devices to communicate via wireless internet.

to increase security measures, and decrease network latency.

Network Latency - is the delay in network communication. Shows the time that data takes to
transfer across the network

the amount of time a message takes to traverse a computer network


14. Anti Virus

Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program


used to prevent, detect, and remove malware or any possible threat to a computer.

15. Peer To Peer Network(P2P)

A peer-to-peer network is an information technology (IT) infrastructure allowing two or more


computer systems to connect and share resources without requiring a separate server or server
software Workplaces may set up a P2P network by physically connecting computers into a linked
system or creating a virtual network. You can also set up computers to be the clients and servers
of their network.
Wireless Local Area Netwotk(WLAN)

a wireless distribution method for two or more devices.

allows users to move around the coverage area in a line of sight while maintaining a network connection.

use high-frequency radio waves and often include an access point to the Internet. A WLAN allows users
to move around the coverage area, often a home or small office, while maintaining a network
connection.

Storage Area Network (SAN)

is a specialized, high-speed network that provides network access to storage devices. SANs are typically
composed of hosts, switches, storage elements, and storage devices that are interconnected using a variety
of technologies, topologies, and protocols. SANs may span multiple sites.

Benefits.
Improved application availability- increased reliability, availability and serviceability
Better application performance- move storage processing from servers onto separate networks
Central and consolidated - make simpler management, scalability, flexibility and high availability
possible
Remote site data transfer and vaulting -protect data from disaster and malicious attacks
Simple centralized management- simplify management by creating single images of storage media.
16. WIRELESS Security Protocol/ Wireless Encryption Protocol

WPA (Wifi Protected Access)

WiFi Protected Access or WPA was created in 2003. This temporary enhancement still has relatively poor
security but is easier to configure. WPA uses Temporal Key Integrity Protocol (TKIP) for more secure
encryption than WEP offered.

WPA 2

WPA2 has stronger security and is easier to configure than the prior options. The main difference with
WPA2 is that it uses the Advanced Encryption Standard (AES) instead of TKIP. AES is able to secure top-
secret government information, so it’s a good option for keeping a personal device or company WiFi safe.

WPA2 is the latest security protocol developed by the Wi-Fi Alliance. There are two versions of
WPA2, Personal and Enterprise. Both use a strong encryption method called AES-CCMP to
encrypt data transmitted over the air. The main difference between these security modes is in
the authentication stage.

WPA2-Personal

-is a type of encryption that uses either the TKIP (Temporal Key Integrity Protocol) or AES
(Advanced Encryption Standard) encryption mechanism to safeguard network access and
data transfer.

WPA2 - Personal protects unauthorized network access by utilizing a set-up password.


WPA2-Enterprice

uses IEEE 802.1X, which offers enterprise-grade authentication, specifically


designed for use in organizations.

Verifies network users through a server and requires a more complicated setup, but
provides additional security.

-802.1X is a network authentication protocol that opens ports for network access when
an organization authenticates a user's identity and authorizes them for access to the network.
An IEEE standard for port-based network access control (PNAC) on wired and wireless
access points. 802.1X defines authentication controls for any user or device trying to
access a LAN or WLAN.

WPA2 - Enterprise verifies network users through a server.

provides better protects critically important information and can save a sufficient amount
of time and money over time.

WPS (Wifi Protected Set-up)

The network security standard that tries to make connections between a router and wireless devices
faster and easier.

is an optional certification program based on technology designed to ease the setup of security-enabled
Wi-Fi® networks in home and small office environments. Wi-Fi Protected Setup supports methods
(pushing a button or entering a PIN) that are familiar to most consumers to configure a network and
enable security.

There are two primary approaches to network setup within Wi-Fi Protected Setup: push-button and PIN
entry. PIN entry is mandatory in all Wi-Fi Protected Setup devices, while push-button is optional and may
also be found in some devices.

Lan Card

A network interface controller also known as Lan Card

Wireless Lan Card


Main Types of Routers

Broadbrand Router

Broadband routers are built for ease of installing home networks, especially for households
with high-speed Internet service. In addition to allowing all consumer appliances devices
to share an internet connection, broadband routers often allow data, printers as well as
other electronic devices to be shared between home computers and other devices.
Edge Router

This router is placed at the edge of an ISP network, which is configured to an external protocol like BGP
(Border Gateway Protocol) to another ISP or BGP.

These routers help to Grow resiliency and density by providing programmability for a scalable network
edge.

type of router that enables an internal network to connect to external network.

Edge routers work to secure the network edge and protect the core by characterizing and securing IP
traffic from other edge routers as well as core routers.

supports data transfer rates from 100 kbps to 300 kbps, delivers application performance, and enables
devices to dynamically optimize for both range and performance.

Virtual Router

Virtual routers provide Computer sharing network by default

provide multitenant network services for private, public, as well as provider-hosted clouds.

It works as per the redundancy protocol for the virtual router (VRRP), it becomes active when the main
or primary router is disabled.

It takes a group of multiple routers to share a virtual IP address. Virtual routers

It help to Increase productivity by providing visibility, real-time analytics, and optimization


control on cloud and other devices.

provide strong encryption methods, Highly secure authentication, as well as segmentation to


secure data, and applications from the WAN edge to the cloud.

open source software based router for PCs running Windows 8, Windows 7 or Windows Server 2008 R2.
Using Virtual Router, users can wirelessly share any internet connection (Wifi, LAN, Cable Modem, Dial-
up, Cellular, etc.) with any Wifi device (Laptop, Smart Phone, iPod Touch, iPhone, Android Phone, Zune,
Netbook, wireless printer, etc.) These devices connect to Virtual Router just like any other access point,
and the connection is completely secured using WPA2 (the most secure wireless encryption.)

Wireless Router

A wireless router is also known as a WLAN (wireless local area network) Or Wifi Router
device. This wireless Network established is termed a Wi-Fi network. Wireless routers must
be secured with Login ID and password. use in Home.

also includes the functions of a wireless access point

Core Router

A core router is a computer communication device and it is design to operate in the Internet backbone
of the network, which means it links all network devices. It allows for fast data communication.
It is a wired or wireless router that distributes data packets within a network but does not distribute data
packets within multiple networks.
refers to the largest and most capable routers of the then-current generation.

Bandwidth
is the data transfer capacity of a network in bits per second (Bps).
is a measure of how much information a network, a group of two or more devices that
communicate between themselves, can transfer.
is the amount of data that can be transmitted in a specified amount of time.

Authentication is a process of recognizing a user’s identity.

Encryption the method by which information is converted into secret code that hides the information's
true meaning.

Molex Connector

Known as Molex power Often refers to the 4-pin connectors used to attach DC power to the drives inside
a PC cabinet. Molex is a large manufacturer of electronics plugs and sockets that dates back to the 1940s.
ATX
is (Advanced Technology eXtended) a motherboard and power supply configuration specification,
patented by David Dent in 1995 at Intel.
is the most common motherboard design.

ITX
Information Technology Extended, or ITX, is a form factor for small computer motherboards developed
by VIA Technologies.
Mini-ITX was to build computing systems for industrial and consumer use with useful features and a
high-speed processor in a compact footprint.

1. Thermal Paste
A silvery-gray substance that you apply to a processor before installing a cooling solution.
It allows for an efficient transfer of heat from the IHS of the processor to the base plate or water
block of the CPU cooler that is designed to dissipate that heat.

2. Maximum cable length

5 meters (or about 16 feet and 5 inches).

3.
Firmware is software that provides basic machine instructions that allow the hardware to
function and communicate with other software running on a device. Firmware provides low-level
control for a device's hardware.

4.disk Image / ISO image

5. The minimum hardware requirements of the computer RAM For Windows 10, 8 ,7,
1 gigabyte (GB) for 32-bit or 2 GB for 64-bit

6. Network Administrator

A network administrator typically manages an organization's network and is responsible for:


installing, monitoring, troubleshooting, and upgrading network infrastructure, including both
hardware and software components. monitoring network activity

7. File Server
is used to store the user documents with a large amount of memory and storage space.
A file server is a central server in a computer network that provides file systems or at least parts
of a file system to connected clients. File servers therefore offer users a central storage place
for files on internal data media, which is accessible to all authorized clients.

Application Server

are network computers that store and run an application for client computers. Application servers,
whatever their function, occupy a large chunk of computing territory between database servers and the
end user.
Most broadly, this is called “middleware”
provide access to a wide variety of data on the network.
application servers connect database information (usually coming from a database server) and the
end-user or client program (often running in a Web browser)
IP Internet Protocol

An IP address is a unique address that identifies a device on the internet or a local network. IP stands for
"Internet Protocol," which is the set of rules governing the format of data sent via the internet or local
network.
They are mathematically produced and allocated by the Internet Assigned Numbers Authority (IANA), a
division of the Internet Corporation for Assigned Names and Numbers (ICANN)

Types of IP Address

Private IP addresses

Every device that connects to your internet network has a private IP address. This includes computers,
smartphones, and tablets but also any Bluetooth-enabled devices like speakers, printers, or smart TVs.
With the growing internet of things, the number of private IP addresses you have at home is probably
growing. Your router needs a way to identify these items separately, and many items need a way to
recognize each other. Therefore, your router generates private IP addresses that are unique identifiers for
each device that differentiate them on the network.

Public IP addresses

A public IP address is the primary address associated with your whole network. While each connected
device has its own IP address, they are also included within the main IP address for your network. As
described above, your public IP address is provided to your router by your ISP. Typically, ISPs have a
large pool of IP addresses that they distribute to their customers. Your public IP address is the address that
all the devices outside your internet network will use to recognize your network.
Public IP Address Comes in two Forms
Dynamic IP addresses

Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP addresses and
assign them automatically to their customers. Periodically, they re-assign them and put the older IP
addresses back into the pool to be used for other customers. The rationale for this approach is to generate
cost savings for the ISP. Automating the regular movement of IP addresses means they don’t have to carry
out specific actions to re-establish a customer's IP address if they move home, for example. There are
security benefits, too, because a changing IP address makes it harder for criminals to hack into your
network interface.
Static IP addresses

In contrast to dynamic IP addresses, static addresses remain consistent. Once the network assigns an IP
address, it remains the same. Most individuals and businesses do not need a static IP address, but for
businesses that plan to host their own server, it is crucial to have one. This is because a static IP address
ensures that websites and email addresses tied to it will have a consistent IP address — vital if you want
other devices to be able to find them consistently on the web.

Class Of IP Address
CLASS A
Range to 0-127
are to be utilized for addresses with larger networks, with a large number of hosts
CLASS B
Range to 128-191
are for medium-sized to large-sized networks.
CLASS C
Range to 192-223
are for small networks.
CLASS D
Range to 224-239
are not allocated to hosts and are used for multicasting. Multicasting allows a single host to send a single
stream of data to thousands of hosts across the Internet at the same time.
CLASS E
Range to 240-255
are not allocated to hosts and are not available for general use. These are reserved for research purposes.

Directory Services
is a database that stores and maintains information about users and resources.
are used in many different applications, including email systems, enterprise resource planning (ERP)
systems, and content management systems.
can be either centralized or distributed.
In a centralized service, all the information is stored on one server. With a distributed directory service,
information is stored on multiple servers. This can be done for redundancy or to provide faster
performance.

Directory Server
provides a central repository for storing and managing information.
allows the central administration and management of network users and network resources.
provides the foundation for the new generation of e-business applications and Web services, with a
centralized and distributed data repository that can be used in your intranet or over your extranet with
your trading partners.

Directory Server two ways in which applications can access its enterprise-wide directory;

 Lightweight Directory Access Protocol (LDAP)

provides a common language that client applications and servers use to communicate with one
another.
LDAP-based applications can easily search, add, delete and modify directory entries.

 Directory Services Markup Language (DSML)

is a markup language that enables you to represent directory entries and commands in XML.
XML-based applications using HTTP can take advantage of directory services while staying
within the existing web infrastructure.

Directory Services
is the collection of software and processes that store information about your enterprise, subscribers, or
both. An example of a directory service is the Domain Name System (DNS), which is provided by DNS
servers.
are an essential part of today's network-centric computing infrastructure. Directory-enabled applications
now power almost all the mission critical processes of an enterprise, including resource planning, value
chain management, security and firewalls, and resource provisioning. Directory services also provide the
foundation for deployment of e-business and extranet applications.
Terminal Server

is a hardware device that enables to connect serial devices across a network.


is a type of server that allows multiple users to connect to a single host computer.
It is also known as a remote desktop server, terminal services server.
It acts as a gateway between client devices and the host computer.

is a powerful tool that can provide cost savings, energy efficiency, remote access, centralized
management, and increased security for businesses and organizations such as educational institutions,
healthcare facilities, and government organizations.

Benefits: Centralized Management, Reduced Hardware Costs, Increased Security,


Increased flexibility, Simplified IT Management, Enhanced Collaboration.

Network Protocol

are a set of rules outlining how connected devices communicate across a network to exchange
information easily and safely.
serve as a common language for devices to enable communication irrespective of differences in
software, hardware, or internal processes.
Types Of Communication Protocol

Communication Protocol
Network Security Protocol
Network Management Protocol

Communication Protocol

determine the rules and formats to transfer data across networks.

Or an established set of rules that determine how data is transmitted between different devices in the
same network.

Communication protocols govern various aspects of analog and digital communications, such as syntax,
authentication, semantics, and error detection.
set of rules that describe how software and hardware should interact within a network
Protocols Use in Network Communications Protocol
Hyper-Text Transfer Protocol (HTTP)
Commonly referred to as the protocol of the internet that allows communication between a server
and browser.

Transmission Control Protocol (TCP)


Facilitates routing the data packets across networks. IP contains addressing and control
information to deliver packets across a network. It works along with TCP. While it ensures delivering the
packets to the right address, TCP aligns them in the right order.
User Datagram Protocol (UDP)
Unlike TCP, UDP is a connectionless protocol that doesn’t ensure a connection between the
application and server before transmitting a message. It’s effective for use cases such as broadcasts or
multicast connections.

File Transfer Protocol (FTP)


Allows file sharing between servers by establishing two TCP connections, one for data transfer
and the other for control. It is also the most efficient in transferring larger files. The data transfer
connection transfers the actual files while the control connection transfers control information such as
passwords to ensure data retrieval in case of data loss.
Network Security Protocols

These protocols ensure safe data transmission over the network connections. Network security
protocols define the procedures to secure data from any unauthorized access. These protocols leverage
encryption and cryptography to safeguard.
 Encryption - protects the data by ensuring that only authorized entities have access;
 Authentication - ensures that the devices on a network are who they claim to be;
 Transportation - ensure the security of data while it is transmitted from one network device to
another.

Here are the most Widely used network Security protocol.


Secure File Transfer Protocol (SFTP)
Helps securely transfer files across a network by using public-key encryption and authenticating
the client and server.

Hyper-Text Transfer Protocol Secure (HTTPS)


Overcomes the limitation of HTTP by ensuring the security of data transmitted between the
browser and server through data encryption. HTTPS is a secure version of HTTP.

Secure Socket Layer (SSL)


Primarily helps secure internet connections and safeguard sensitive data using encryption. SSL
protocol enables both server-client communication and server-server communication.

Network Management Protocols

Network managers require standard policies and procedures to manage and monitor the
network for maintaining smooth communication. Network management protocols ensure quick
troubleshooting and optimal performance across the network.

USB-C

v formally known as USB Type-C, A 24-pin USB connector system with a rotationally symmetrical
connector.
Chipset

a set of chips that extends the interfaces between all of the components of a motherboard.

It facilitates communication between the CPU and other devices in the system
manages the flow of data between components on a motherboard.
it controls communications between the processor and external devices

Two Section of Chipset


Southbridge –
is also known as the input/output controller hub.
handles the motherboard’s slower connections, including input/output (I/O) devices and computer
peripherals like expansion slots and hard disk drives.
Northbridge-
is commonly known as the memory controller hub.

handles a computer’s faster interaction requirements and controls communication between the
CPU, RAM, ROM, the basic input/output system (BIOS), the accelerated graphics port (AGP) and the
southbridge chip.
ANSI (American National Standards Institute)

is the main organization supporting the development of technology standards in the United States. ANSI
works with industry groups.
is a private nonprofit organization that oversees the development of voluntary consensus standards for
products, services, processes, systems, and personnel in the United States.
TIA (Telecommunications Industry Association)
accredited by the American National Standards Institute (ANSI) to develop voluntary, consensus-based
industry standards for a wide variety of Information and Communication Technologies (ICT) products,
and currently represents nearly 400 companies.
represents the interests of the global information and communications technology (ICT) industry.
develops industry standards, drafts policy initiatives, and conducts market intelligence.
brings together communities of interest across -- Technology, Government Affairs, Standards, and
Business Performance -- to enable high-speed networks and accelerate next-generation Information and
Communications Technology (ICT). Ensure quality performance and connectivity. Support technological
innovation.
ANSI/TIA-568

is a technical standard for commercial building cabling for telecommunications products and
services. The title of the standard is Commercial Building Telecommunications Cabling Standard and is
published by the Telecommunications Industry Association (TIA).

Customer Premises Equipment (CPE)


is an umbrella term for hardware that includes any telecommunications or IT equipment
that's physically located on a customer's property.
-acts like a border router to connect corporate sites to wired access lines.
-differs from equipment that located at a vendor’s or service provider’s location or anywhere
else on the network.

Firewall

A network security system that monitors and controls incoming and outgoing network traffic based on
predetermined security rules.
can be viewed as gated borders or gateways that manage the travel of permitted and prohibited web
activity in a private network.
for web traffic management — typically intended to slow the spread of web threats.

Types of Cables
IEEE (Institute of Electrical and Electronics Engineers)

-professional association for electronics engineering, electrical engineering.

was formed from the amalgamation of the American Institute of Electrical Engineers and the Institute of
Radio Engineers[6] in 1963.
It is designed to serve professionals involved in all aspects of the electrical, electronic, and Computer
Engineering and related areas of science and technology that underlie modern civilization.

is the world's largest technical professional organization dedicated to advancing technology for
the benefit of humanity. with more than 423,000 members in over 160 countries around the
world.

-mission of the IEEE is advancing technology for the benefit of humanity.


claims to produce over 30% of the world's literature in the electrical, electronics, and computer
engineering fields.
These include computer scientists, software developers, information technology professionals, physicists,
medical doctors, and many others in addition to IEEE's electrical and electronics engineering core.
IEEE’s fields of interest expanded well beyond electrical and electronics engineering and computing into
areas such as micro- and nanotechnologies, ultrasonics, bioengineering, robotics, electronic materials, and
many others.

IEEE Ethernet standards


-defined in a number of IEEE 802.3 standards
It is Working Group develops standards for Ethernet networks.
-is a working group and a collection of standards defining the physical layer and data link layer's media
access control (MAC) of wired Ethernet.
also defines LAN access method.

Media type specified in the IEEE 802.3 standard for Ethernet local area networks (LANs).

10BASE-2
-consists of Thinwire coaxial cable with a maximum segment length of 185 up to 200 meters.
supports Ethernet’s 10 Mbps data rate

10BASE-5

consists of Thickwire coaxial cable with a maximum segment length of 500 meters.

10BASE-F

is the use of optical fiber in an Ethernet local area network (LAN).

10BASE-T

is ordinary telephone twisted pair wire.

10BASE-36

10-megabit Ethernet that compose of broadband coaxial cable carrying multiple baseband
channels for a maximum length of 3,600 meters.

“10" in the media type designation refers to the transmission speed of 10 Mbps. The
"BASE" refers to baseband signaling, which means that only Ethernet signals are carried
on the medium. "T" represents twisted-pair; the "F" represents fiber optic cable "2", "5",
and "36" refer to the coaxial cable segment length.

In 100 Mbps (megabits per second) Ethernet (known as Fast Ethernet), there are three types of
physical wiring that can carry signals:

• 100BASE-T4 (four pairs of telephone twisted pair wire)

• 100BASE-TX (two pairs of data grade twisted-pair wire)

• 100BASE-FX (a two-strand optical fiber cable)


IEEE 1394

IEEE 1394 or i.LINK, commonly known as FireWire, high-speed computer data-transfer interface that
was used to connect personal computers, audio and video devices, and other professional and consumer
electronics.
a standard connection type for many electronic devices such as digital video cameras, printers and
scanners, external hard drives, and other peripherals.
its fast and reliable transfer rate
interface offered data-transfer rates of up to 3,200 megabits (millions of bits) per second, at that time
considerably faster than other serial buses.
frequently used in professional video editing and real-time video transmissions.
commonly used to connect electronic appliances in automobiles, such as DVD players, stereo sound
systems, and GPS (global positioning system) navigators.

Input/Output Controller Hub

-is a family of Intel southbridge microchips used to manage data communications between a CPU and
a motherboard, specifically Intel chipsets based on the Intel Hub Architecture.
-microchip to manage data communication between a CPU and a motherboard is also known as
Southbridge.
-ICH is used to connect and control peripheral devices.
-It is designed to be paired with a second support chip known as a northbridge. As with any other
southbridge.
-connects input and output (I/O) devices to the bus system of a central processing unit (CPU).

You might also like