Академический Документы
Профессиональный Документы
Культура Документы
MODULE 3 : LECTURE 1
COMPUTER NETWORKS AND INTERNET
1/29/2020 1
Outline
Computer Networks
Network Topologies
The Internet
Network Applications
1/29/2020 2
COMPUTER NETWORK
1/29/2020 3
Computer Networks
Two computers
1/29/2020 4
What is a Computer network?
192.168.1.5
192.168.1.4
1/29/2020 5
Connecting Computers
Wireless connection
Access points
1/29/2020 6
Connecting Computers
UTP Cable
Coaxial Cable
Wired
connection
Wireless
Connection
1/29/2020 8
Computer Networks
A network
1/29/2020 9
Components of a Computer Net
wk
There are five component in a computer n
etwork.
10
Components of a Computer Net
wk
1. Sender: Message source
2. Message: Message to be transferred
3. Channel: Path through which message pas
ses
4. Protocol: A set of rules that governs com
munication over a network
5. Receiver: Message recipient
11
What is a protocol?
1/29/2020 12
Common Communication Protocols
1/29/2020 13
Common Communication Protocols
1/29/2020 14
Common Communication Protocols
1/29/2020 15
Types of Computer Networks
mode of connectivity.
1/29/2020 16
Types of Computer Networks
1/29/2020 18
1. Peer-to-Peer Networks
1/29/2020 19
Peer-to-Peer Networks
1/29/2020 20
Types of Computer Networks
1/29/2020 21
2. Client-Server Networks
1/29/2020 23
Types of Computer Networks
1/29/2020 25
TYPES OF NETWORKS
LAN
1/29/2020 26
TYPES OF NETWORKS
1/29/2020 29
TYPES OF NETWORKS
MAN
1/29/2020 30
Types of Computer Networks
1/29/2020 31
TYPES OF NETWORKS
WAN
1/29/2020 32
Types of Computer Networks
C. Mode of Connectivity
Basing on the modes of connectivity, a computer netw
ork includes wireless networks and wired networks.
Wired network is using UTP cable for networking in s
mall area.
For long distance connectivity Fibre Optic Cable (FOC
) facilitates the connectivity is used.
In wireless networks, the transmission of signals is don
e without the presence of physical wire.
1/29/2020 33
Advantages of Computer Networ
ks
1/29/2020 34
NETWORK TOPOLOGIES
1/29/2020 35
NETWORK TOPOLOGIES
Bus
Single cable connects all network nodes without in
tervening connectivity devices
Devices share responsibility for getting data from o
ne point to another
Terminators stop signals after reaching end of wire
Prevent signal bounce
Inexpensive, not very scalable
Difficult to troubleshoot, not fault-tolerant
1/29/2020 36
NETWORK TOPOLOGIES
Bus topology
1/29/2020 37
NETWORK TOPOLOGIES
1/29/2020 38
NETWORK TOPOLOGIES
Disadvantages of
Bus Topology
Management costs can be high
Potential for congestion with network traffic
1/29/2020 39
NETWORK TOPOLOGIES
Ring Topology
1/29/2020 40
NETWORK TOPOLOGIES
Star Topology
1/29/2020 43
NETWORK TOPOLOGIES
1/29/2020 44
NETWORK TOPOLOGIES
1/29/2020 47
THE INTERNET
1/29/2020 48
Internet- A brief History
1/29/2020 49
Internet- A brief History
1/29/2020 50
Internet- A brief History
1/29/2020 51
Internet- A brief History
1/29/2020 52
Internet - World Usage
1/29/2020 53
Internet Usage- Tanzania
1/29/2020 54
Uses of Internet
1/29/2020 56
Common Internet Terms
1/29/2020 57
Common Internet Terms
1/29/2020 59
Common Internet Terms
1/29/2020 60
Common Internet Terms
1/29/2020 61
Common Internet Terms
pathname
protocol
http://wwww.mwananchi.go.tz/michezo/index.htm
filename
Domain name
1/29/2020 63
Domain Names
1/29/2020 64
Internet Service Provider (ISP)
1/29/2020 66
1. Communication
1/29/2020 67
1. Communication…
1/29/2020 68
2. Collaboration
1/29/2020 69
2. Collaboration …
1/29/2020 70
3. Web Services
1/29/2020 71
Cont…
1/29/2020 72
WEB BROWSER:
Is a software program that is used for acce
ssing, retrieving, presenting and traversing
information resources on the web using U
RL.
The purpose of a web browser is to read H
TML documents and compose them into v
isible or audible web pages.
1/29/2020 73
Cont…
1/29/2020 74
Cont…
1/29/2020 75
Cont…
4. REFRESH BUTTON
When a part of the website you are looking for d
oes not appear on the screen may be due to conn
ection problem click on Refresh button to re-load
a page
1/29/2020 76
Types of Browsers
1. Internet Explorer (IE)
Most commonly used
browser
Comes embedded in
Microsoft OS
Represented as “e”
Latest version is IE 9
(March 2011)
For Windows Vista, 7 and
Server 2008
1/29/2020 77
Types of Browsers
2. Mozilla Firefox
Officially announced in Feb
2004
Second most popular after IE
Represented by a world map
Used with both MS Windows OS
and Linux distributions
Latest version is Firefox 50 (Nov
2016)
1/29/2020 78
Types of Browsers
3. Safari
A browser from Apple, Inc
Included in Mac OS X
Supports all the functions
found in other browsers
Represented by a compass
bearing
Latest version is Safari 5 (2016)
1/29/2020 79
Types of Browsers
4.Google Chrome
A browser developed by Google
Initial release in 2008
Browser options similar to that of
Safari
Setting and locations are similar to
IE
Window design similar to
Windows Vista
1/29/2020 80
Types of Browsers
5. Opera
Developed by Opera Software in
1996
Mostly used with internet-
enabled mobile phones, PDAs
and Smartphone
Compatible with all OS types
Represented by a “O” symbol
Latest version is Opera 11.62
(March, 2016)
1/29/2020 81
SEARCH ENGINES
Is a means of searching for information that can be fou
nd on the internet.
For example when accessing a search engine you mig
ht specify that you want to search for information abou
t ‘Polar Bears’ then search engine would return all the
URLs (addresses) it knows about it.
Examples of search engines:
www.google.com
www.yahoo.com
www.altavista.com
www.cycons.com
www.mamma.com
1/29/2020 82
Electronic mail
1/29/2020 83
Cont…
1/29/2020 85
READING AND SENDING E
-MAILS
a) READING MAILS
In the address bar, type e.g.www.yahoo.com, ww
w.google.com
Click on mail button/link
Type your e-mail address and password.
Click sign in(if you already have an account
Click on check mails/inbox
Click on the Subject of the new received mail
1/29/2020 86
Cont…
1/29/2020 87
Cont…
b) SENDING
After signing in with your correct email address and password
Click on compose/new email message
Type recipients e-mail address, subject and then type
the message
Click Send
1/29/2020 88
Cont…
TIPS.
When sending an e-mail observe the following;
TO: Enter the address of the recipient
CC: To copy to other people, enter the addre
ss of the recipients separated by a comma
BCC: The recipient entered here will not be se
en by other recipient
SUBJECT: Enter the subject matter of your mes
sage, then enter the message in the body.
1/29/2020 89
SENDING AN E-MAIL WITH
ATTACHMENTS
Compose a message as usual
Click on attach file
Click on browse
Select the location e.g. C: drive, A: drive or from a fol
der.
Select the file
Click open /attach files
Continue to message.
Click send
Remember to sign out after sending or receiving mails.
1/29/2020 90
Downloading attachments (at
tached files)
Login as usual
Select the mail which contains the attachments
Click on the subject e.g. Examination results
Click on Download file name e.g. Examination result
s
Click on Download attachments
Click open if you want to read the attached file or click
on save if you want to save the attached file
1/29/2020 91
Take Home
1/29/2020 92
E-Commerce
Meaning of e-Commerce
Electronic Commerce (EC) is where business transacti
ons take place via telecommunications networks, espec
ially the Internet
Electronic commerce describes the buying and selling
of products, services, and information via computer net
works including the Internet
Electronic commerce is about doing business electroni
cally
1/29/2020 93
Cont…
1/29/2020 94
e-Commerce Applications
1 - 95
Benefits of e-Commerce
Organizational benefits
Global reach: can easily and quickly locate the best supplie
rs, more customers and more suitable business partners. i.e.
buy cheaper and sell more.
Cost reduction: EC decreases the cost of creating, processin
g, distribution, storing and retrieving paper-based informati
on.
Supply chain improvement: supply chain inefficiencies can
be minimized e.g.. Inventory and deliver delays
Extended hours:24/7/365
Customization: pull-type production (build-to-order)
New business models: tendering (reverse auction), name-yo
ur-own-price model, affiliate marketing, viral marketing etc
.
1 - 96
Benefits of e-Commerce
1 - 97
Benefits of e-Commerce
1 - 98
Benefits of e-Commerce
1 - 99
Disadvantages of e-commerce
Some business processes are not suited to e-commerce, ev
en with improvements in technology
Many products and services require a critical mass of pote
ntial buyers
Costs and returns on e-commerce can be difficult to quanti
fy and estimate
Cultural impediments: People are reluctant to change in or
der to integrate new technology
The legal environment is uncertain: Courts and legislators
are trying to catch up
1 - 100
Computer Viruses
1/29/2020 101
Cont…
1/29/2020 102
Cont…
1/29/2020 103
Cont…
1/29/2020 104
Different Types of Computer V
iruses
There are different types of computer viruse
s which can be classified according to their
origin, techniques, types of files they infect,
where they hide, the kind of damage they ca
use, the type of operating system or platform
they attack etc.
Let us have a look at few of them
1/29/2020 105
Cont…
Resident Virus
This type of virus is a permanent as it dwells in t
he RAM.
From there it can overcome and interrupt all the
operations executed by the system.
It can corrupt files and programs that are opened,
closed, copied, renamed etc.
Examples: Randex, CMJ, Meve, and MrKlunky.
1/29/2020 106
Cont…
1/29/2020 107
Cont…
Overwrite Viruses
Virus of this kind is characterized by the fact that it d
1/29/2020 108
Cont…
1/29/2020 109
Cont…
1/29/2020 110
Web Scripting Virus
Many web pages include complex code in order to create an interesting and i
nteractive content.
This code is often exploited to bring about certain undesirable actions.
Worms
A worm is a program very similar to a virus; it has the ability to self-replicat
e and can lead to negative effects on your system. But they can be detected a
nd eliminated by anti-viruses.
1/29/2020 111
Trojans or Trojan Horses
Another unsavory breed of malicious code are Tr
ojans or Trojan horses, which unlike viruses do n
ot reproduce by infecting other files, nor do they
self-replicate like worms. In fact, it is program w
hich disguises itself as a useful program or applic
ation
1/29/2020 112
How do you get a virus in your
computer
Email: You get an email from a person that contains o
ne or more viruses.
If the attachment is opened, the viruses may infect files
in the computer.
The viruses might also send emails to people from you
r email address book or email folders automatically.
So, you should not open unknown attachments in emai
ls or do a virus scanning after opening them.
1/29/2020 113
Cont…
1/29/2020 114
Cont…
1/29/2020 115
Symptoms of virus infection
1/29/2020 118
Cont…
1/29/2020 119
Review Questions
1/29/2020 120