CPE 111 - Reviewer
CPE 111 - Reviewer
1. Ports are an interface between the Baby AT Motherboards have the combination
computer and another peripheral of XT and AT. They have both slot type
processor sockets and PGA processor
sockets, SD Ram slots and DDR Ram slots,
PCI slots and ISA slots, 12 Pin power
connector and 20Pin power connector and
Ports.
● ATX Motherboards
● Back Panel Connectors & Ports Connects to the power switch, reset switch,
power LED, hard drive LED and front audio
Connectors and ports for connecting the ports of a computer case.
computer to external devices such as
display ports, audio ports, USB ports,
● IDE Connector
Ethernet ports, PS/2 ports etc.
Connects to older hard drive disks and
● PCI Slots (PCI: Peripheral Component optical drives for data transfer
Interconnect)
3rd Generation 16-bit Microprocessor: The A USB flash drive (also called a thumb drive)
third generation microprocessors were 16- is a data storage
bit microprocessors introduced in 1978 by device that includes flash memory with an
Intel. 80286 is a 3rd generation integrated USB interface.
microprocessor.
Input devices and output devices
4th Generation 32-bit Microprocessor: The In computing, an input device is a piece of
Fourth generation microprocessors were equipment used to provide data and control
introduced in 1985 and they were 32 bit. signals to an information processing system,
80386 or also known as i386 or just 386 is such as a computer or information
the most renowned 4th generation appliance. Examples of input devices include
microprocessor. keyboards, mouse, scanners, cameras,
5th Generation 64-bit Microprocessor: The joysticks, and microphones.
fifth-generation microprocessor or 64-bit
microprocessors were introduced in 1995 An output device is any piece of computer
and they are being used till now. The Intel hardware equipment which converts
Pentium processors were based on 64-bit information into a human- perceptible form
architecture. The recent 64-bit or, historically, into a physical machine-
microprocessor use super scaling to offer readable form for use with other non-
high speed and high performance such as computerized equipment. Examples include
Intel dual, quad, octa-core microprocessors. monitors, printers, speakers, headphones,
projectors, GPS devices, optical mark
Memory chips, including RAM and ROM readers, and braille readers.
A memory chip is an integrated circuit made
out of millions of capacitors and transistors Networking components such as routers and
that can store data or can be used to modems
process code. Memory chips can hold Networking, also known as computer
memory either temporarily through random networking, is the practice of
access memory (RAM), or permanently transporting and exchanging data between
through read only memory (ROM). nodes over a shared medium
in an information system. Networking
comprises not only the design,
construction and use of a network, but also They're designed to be plug and play; no
the management, maintenance and configuration is needed.
operation of the network infrastructure, Unmanaged switches are most effective
software and policies. when only basic switching and
Router is a device that connects two or more connectivity are required. You will often see
packet-switched networks or subnetworks. It them in home networks or
serves two primary functions: managing wherever only a few ports are needed, such
traffic between these networks by as at a desk, in a lab, or in a conference
forwarding data packets to their intended IP room.
addresses, and allowing multiple devices to Smart switches offer some management and
use the same Internet connection. segmentation, quality of
A modem is a network device that both service, and security capabilities, so they
modulates and demodulates analog carrier can be a cost-effective alternative to
signals (called sine waves) for encoding and modular switches. Still, they are not as
decoding digital information for processing. scalable as managed switches. These
Modems accomplish both of these tasks switches are typically deployed at the edge
simultaneously and, for this reason, the term of a large network (while managed switches
modem is a combination of "modulate" and are used in the core), as the infrastructure
"demodulate." for smaller networks, or for low complexity
networks.
Difference between router and modem: A
router forms networks and manages the flow Managed switches Among fixed-
of data within and between those networks, configuration switches, managed switches
while a modem connects those networks to are designed to deliver the most
the Internet. comprehensive set of features to provide the
best application experience, the highest
LESSON 6: levels of security, the most precise control
ENGINEERING COMMUNICATIONS and management of the network, and the
greatest scalability. As a result, managed
NETWORK DEVICES switches are usually deployed as
WHAT IS SWITCH ? aggregation/access switches in very large
Switches facilitate the sharing of resources networks or as core switches in smaller
by connecting together all the devices, networks.
including computers, printers, and servers,
in a small business network. Thanks to the WHAT IS ROUTER?
switch, these connected devices can share Just as a switch connects multiple devices to
information and talk to each other, create a network, a router
regardless of where they are in a building or connects multiple switches, and their
on a campus. Building a small business respective networks, to form an
network is not possible without switches to even larger network. These networks may
tie devices together. be in a single location or across multiple
locations.
DIFFERENT TYPES OF SWITCHES Ultimately, a router works as a dispatcher,
Modular switches let you add expansion directing traffic and choosing
modules as needed, giving you the most efficient route for information, in
flexibility as network requirements change. the form of data packets, to
Expansion modules are travel across a network.
application-specific and include those for
firewalls, wireless connectivity, or network EDGE ROUTER
analysis. They may also allow for additional This is a wired or wireless router that
interfaces, power supplies, or cooling fans. distributes data packets between one or
This type of switch provides you with the more networks but not within a network. As
most flexibility, but at a higher cost. their name indicates, edge routers are
Fixed-configuration switches provide a fixed placed at the edge or boundary of networks,
number of ports and are typically not and typically connect to Internet service
expandable, which makes them less providers (ISPs) or other organizations’
expensive overall. Fixed- configuration networks. Their job is to keep your network
switches include unmanaged switches, communicating smoothly with other
smart switches, and managed switches. networks.
Unmanaged switches are typically used to
provide basic connectivity. CORE ROUTER
These wired or wireless routers distribute computer on each side. The last computer is
data packets within networks, connected to the first, thus forming a ring
but not between multiple networks. They’re shape. This topology allows for each
designed to become the computer to have exactly two neighboring
backbone of your network and do the heavy computers
lifting of data transfer, which is why they’re
usually high-performance.
VIRTUAL ROUTER
Unlike physical routers, virtual routers are
pieces of software that allow
computers and servers to operate like
routers. They’ll share data packets
just as physical routers do. They can offer
more flexibility than physical
devices since they can be scaled as the
business grows; they can also help get
remote offices up and running on your
network more quickly.
STAR TOPOLOGY
Star Topology is the kind of network
topology in which all the nodes are
connected via cables to a single node called
a hub, which is the central
node. The hub can be active or passive in
nature. Active hubs contain
repeaters, while passive hubs are
NETWORK TOPOLOGY considered non-intelligent nodes. Each
Network Topology represents a network node contains a reserved connection to the
arrangement consisting of several nodes, central node, which the central node acts as
i.e. sender and receiver nodes, and the lines a repeater during data transmission.
connecting them.
BUS TOPOLOGY
Bus topology is the kind of network topology
where every node, i.e. every device on the
network, is connected to a solo main cable
line. Data is transmitted in a single route,
from one point to the other. We cannot
transmit data in both ways. When this
topology has precisely two endpoints, it is
known as Linear Bus Topology. It is mostly
used for small
networks.
MESH TOPOLOGY
Mesh topology is the kind of topology in
which all the nodes are
connected with all the other nodes via a
network channel. Mesh topology is a point-
to-point connection. It has n(n-1)/2 network
channels to connect n nodes.
NETWORK LAYERS
OPEN SYSTEMS INTERCONNECTION (OSI)
HYBRID TOPOLOGY
A Hybrid Topology is basically a network
topology comprising two or more different
types of topologies. It is a reliable and
scalable topology, but simultaneously, it is a
costly one. It receives the merits and
demerits of the topologies used to build it.
APPLICATION LAYER
The application layer is used by end-user
software such as web browsers and email
clients. It provides protocols that allow
software to send and receive information
and present meaningful data to users. A few
examples of application layer protocols are
the Hypertext Transfer Protocol (HTTP), File DATA LINK LAYER
Transfer Protocol (FTP), Post Office Protocol The data link layer establishes and
(POP), Simple Mail Transfer Protocol (SMTP), terminates a connection between two
and Domain Name System (DNS). physically connected nodes on a network. It
breaks up packets into frames and sends
PRESENTAION LAYER them from source to destination. This layer
The presentation layer prepares data for the is composed of two parts—Logical Link
application layer. It defines Control (LLC), which identifies network
how two devices should encode, encrypt, protocols, performs error checking and
and compress data so it is synchronizes frames, and Media Access
received correctly on the other end. The Control (MAC) which uses MAC addresses to
presentation layer takes any data connect devices and define permissions to
transmitted by the application layer and transmit and receive data.
prepares it for transmission over the session
layer. PHYSICAL LAYER
The physical layer is responsible for the
SESSION LAYER physical cable or wireless
The session layer creates communication connection between network nodes. It
channels, called sessions, defines the connector, the
between devices. It is responsible for electrical cable or wireless technology
opening sessions, ensuring they connecting the devices, and is
remain open and functional while data is responsible for transmission of the raw data,
being transferred, and closing which is simply a series of 0s and 1s, while
them when communication ends. The taking care of bit rate control.
session layer can also set
checkpoints during a data transfer—if the ADVANTAGES OF OSI MODEL
session is interrupted, devices The OSI model helps users and operators of
can resume data transfer from the last computer networks:
checkpoint.
● Determine the required hardware
TRANSPORT LAYER
The transport layer takes data transferred in and software to build their network.
the session layer and breaks it into ● Understand and communicate the
“segments” on the transmitting end. It is
responsible for process followed by components
reassembling the segments on the receiving communicating across a network.
end, turning it back into data ● Perform troubleshooting, by
that can be used by the session layer. The
transport layer carries out flow control, identifying which network layer is
sending data at a rate that matches the causing an issue and focusing efforts
connection speed of the receiving device, on that layer.
and error control, checking if data was
received The OSI model helps network device
incorrectly and if not, requesting it again. manufacturers and networking software
vendors:
NETWORK LAYER
The network layer has two main functions. ● Create devices and software that
One is breaking up segments
into network packets, and reassembling the can communicate with products
packets on the receiving end. from any other vendor, allowing
The other is routing packets by discovering open interoperability
the best path across a physical network. The
● Define which parts of the network
network layer uses network addresses
(typically Internet Protocol addresses) to their products should work with.
route packets to a destination node.
mandatory to enable any data
● Communicate to users at which
communication.
network layers their product
operates – for SOFTWARE FOR NETWORKING
PACKET TRACER
Packet Tracer is computer software that is
designed with the purpose of
making network simulations to understand
the networking and cyber
security concepts in an easy way. It is built
by Cisco Corporation and is
available for free for different operating
systems like macOS, Windows, Linux, etc. It
is easy to easy with a simple interface.
OSI VS. TCP/IP MODEL
PuTTY
PuTTY is a free and open-source terminal
emulator, serial console and
network file transfer application. It supports
several network protocols,
including SCP, SSH, Telnet, rlogin, and raw
socket connection. It can also
TCP/IP MODEL connect to a serial port. The name "PuTTY"
The Transfer Control Protocol/Internet has no official meaning.
Protocol (TCP/IP) is older than the OSI model
and was created by the US Department of PuTTY (SSH)
Defense (DoD). A key difference between To access network devices using PuTTY via
the models is that TCP/IP is simpler, SSH, need to input IP Address and select
collapsing several OSI layers into one: SSH (Port 22).
● OSI layers 5, 6, 7 are combined into
PuTTY (Telnet)
one Application Layer in TCP/IP To access network devices using PuTTY via
● OSI layers 1, 2 are combined into Telnet, need
to input IP Address and select Telnet (Port
one Network Access Layer in TCP/IP
23).
– however TCP/IP does not take
responsibility for sequencing and PuTTY (Serial)
acknowledgement functions, leaving To access network devices via Console Cable
these to the underlying transport using PuTTY,
layer. need to check first the Com Port which can
Other important differences: be found in Device Manager.
● TCP/IP is a functional model
designed to solve specific
communication problems, and which
is based on specific, standard
protocols. OSI is a generic, protocol-
independent model intended to
describe all forms of network
communication.
● In TCP/IP, most applications use all
the layers, while in OSI simple
applications do not use all seven
layers. Only layers 1, 2 and 3 are