尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
WELCOME
 OBJECTIVE
Students will be able to describe the purpose
and functions of network components.
Describe the purpose and functions
of network components.Types, functions, configuration, topologies and purpose
of networks including:
1. Local Area Network (LAN)
2. Wide Area Network (WAN)
3. Metropolitan Area Network (MAN)
4. Virtual Private Network (VPN)
1. Internet
2. Extranet
3. Intranet
4. Virtual Router software
Transmission Media
 Wired versus Wireless
 Fibre Optic
 Unshielded Twisted Pair (UTP)
 Hotspots
 Protocols
Definitions and Examples
 Network Security
 Firewalls

More Related Content

What's hot

Protocol manet
Protocol manetProtocol manet
Protocol manet
Kunal Prajapati
 
A044060107
A044060107A044060107
A044060107
IJERA Editor
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
IOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
Pospos Pasiposo
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
ijwmn
 
Wireless ad hoc
Wireless ad hocWireless ad hoc
Wireless ad hoc
Mohammed Zuber
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
IJERA Editor
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
ijwmn
 
D43021519
D43021519D43021519
D43021519
IJERA Editor
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
Abdullah Mukhtar
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
Pvrtechnologies Nellore
 
Computer network
Computer network Computer network
Computer network
Gyan Jyoti Gogoi
 
Internet
InternetInternet
Internet
cktanums
 
Assignment1
Assignment1Assignment1
Assignment1
NishatTasnimAli
 
1705 1708
1705 17081705 1708
1705 1708
Editor IJARCET
 
Wmcn outline summer2011
Wmcn outline summer2011Wmcn outline summer2011
Wmcn outline summer2011
Alaa2
 
Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2
NishatTasnimAli
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
IRJET Journal
 

What's hot (19)

Protocol manet
Protocol manetProtocol manet
Protocol manet
 
A044060107
A044060107A044060107
A044060107
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
Analyzing the Impact of Eaves on Energy Consumption of AODV Routing Protocol ...
 
Wireless ad hoc
Wireless ad hocWireless ad hoc
Wireless ad hoc
 
Hg3312711275
Hg3312711275Hg3312711275
Hg3312711275
 
Analysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor networkAnalysis of security threats in wireless sensor network
Analysis of security threats in wireless sensor network
 
D43021519
D43021519D43021519
D43021519
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Computer network
Computer network Computer network
Computer network
 
Internet
InternetInternet
Internet
 
Assignment1
Assignment1Assignment1
Assignment1
 
1705 1708
1705 17081705 1708
1705 1708
 
Wmcn outline summer2011
Wmcn outline summer2011Wmcn outline summer2011
Wmcn outline summer2011
 
Computer Network Theory Part 2
Computer Network Theory Part 2Computer Network Theory Part 2
Computer Network Theory Part 2
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 

Viewers also liked

"Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa""Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa"
Comisión Colombiana de Juristas
 
Sin garantía del derecho a la reparación
Sin garantía del derecho a la reparaciónSin garantía del derecho a la reparación
Sin garantía del derecho a la reparación
Comisión Colombiana de Juristas
 
Koetstock Magazine 2012
Koetstock Magazine 2012Koetstock Magazine 2012
Koetstock Magazine 2012
Interlitho
 
Trivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataTrivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataFormazioneTurismo
 
Hay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierraHay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierra
Comisión Colombiana de Juristas
 
2013 mayo perlas
2013 mayo perlas2013 mayo perlas
2013 mayo perlas
Juan Aldave
 
Frischkorn AV2
Frischkorn AV2Frischkorn AV2
Frischkorn AV2shanita88
 
Aeiou
AeiouAeiou
Neoparamilitarism and new massacres
Neoparamilitarism and new massacresNeoparamilitarism and new massacres
Neoparamilitarism and new massacres
Comisión Colombiana de Juristas
 
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com) Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Justin Barin de Jesus
 
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
1   transtono (disorder) não é um conceito científico nem a cid é uma classif...1   transtono (disorder) não é um conceito científico nem a cid é uma classif...
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
Luiz Miranda-Sá
 
cleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in Rcleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in R
Emmanuel Blondel
 
Koetstock Magazine 2013
Koetstock Magazine 2013Koetstock Magazine 2013
Koetstock Magazine 2013
Interlitho
 
Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014
Westfalen_Gruppe
 
The Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content ManagementThe Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content Management
robinepiserver
 
Revista de seguros fenaseg
Revista de seguros fenasegRevista de seguros fenaseg
Revista de seguros fenaseg
Universidade Federal Fluminense
 
1 4 pl gıda lojistiği sunumu
1  4 pl gıda lojistiği sunumu1  4 pl gıda lojistiği sunumu
1 4 pl gıda lojistiği sunumuİsmail Karayün
 
Kamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La CemacKamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La Cemac
BEAC
 
LI-FI TECHNOLOGY
LI-FI TECHNOLOGYLI-FI TECHNOLOGY
LI-FI TECHNOLOGY
SravanthiReddyK
 
Apostila de louvor e adoracao
Apostila de louvor e adoracaoApostila de louvor e adoracao
Apostila de louvor e adoracao
Rosemary S. Duque
 

Viewers also liked (20)

"Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa""Dejar de ser la amante y pasar a ser la esposa"
"Dejar de ser la amante y pasar a ser la esposa"
 
Sin garantía del derecho a la reparación
Sin garantía del derecho a la reparaciónSin garantía del derecho a la reparación
Sin garantía del derecho a la reparación
 
Koetstock Magazine 2012
Koetstock Magazine 2012Koetstock Magazine 2012
Koetstock Magazine 2012
 
Trivago: Review Firmata e Certificata
Trivago: Review Firmata e CertificataTrivago: Review Firmata e Certificata
Trivago: Review Firmata e Certificata
 
Hay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierraHay que poner los pies sobre la tierra
Hay que poner los pies sobre la tierra
 
2013 mayo perlas
2013 mayo perlas2013 mayo perlas
2013 mayo perlas
 
Frischkorn AV2
Frischkorn AV2Frischkorn AV2
Frischkorn AV2
 
Aeiou
AeiouAeiou
Aeiou
 
Neoparamilitarism and new massacres
Neoparamilitarism and new massacresNeoparamilitarism and new massacres
Neoparamilitarism and new massacres
 
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com) Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
Biologics World Taiwan 2016 (email me at justin.dejesus@imapac.com)
 
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
1   transtono (disorder) não é um conceito científico nem a cid é uma classif...1   transtono (disorder) não é um conceito científico nem a cid é uma classif...
1 transtono (disorder) não é um conceito científico nem a cid é uma classif...
 
cleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in Rcleangeo - Cleaning Geometries from Spatial Objects in R
cleangeo - Cleaning Geometries from Spatial Objects in R
 
Koetstock Magazine 2013
Koetstock Magazine 2013Koetstock Magazine 2013
Koetstock Magazine 2013
 
Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014Unternehmenspräsentation Westfalen Gruppe 2014
Unternehmenspräsentation Westfalen Gruppe 2014
 
The Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content ManagementThe Power of EPiServer 7: Multiscreen Content Management
The Power of EPiServer 7: Multiscreen Content Management
 
Revista de seguros fenaseg
Revista de seguros fenasegRevista de seguros fenaseg
Revista de seguros fenaseg
 
1 4 pl gıda lojistiği sunumu
1  4 pl gıda lojistiği sunumu1  4 pl gıda lojistiği sunumu
1 4 pl gıda lojistiği sunumu
 
Kamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La CemacKamgna, Optimum Des Reserves De Changes De La Cemac
Kamgna, Optimum Des Reserves De Changes De La Cemac
 
LI-FI TECHNOLOGY
LI-FI TECHNOLOGYLI-FI TECHNOLOGY
LI-FI TECHNOLOGY
 
Apostila de louvor e adoracao
Apostila de louvor e adoracaoApostila de louvor e adoracao
Apostila de louvor e adoracao
 

Recently uploaded

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
ScyllaDB
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
Mydbops
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
ScyllaDB
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
ScyllaDB
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
manji sharman06
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
Knoldus Inc.
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
Mydbops
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
ThousandEyes
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
ThousandEyes
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
NTTDATA INTRAMART
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
ScyllaDB
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
AlexanderRichford
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 

Recently uploaded (20)

ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
So You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental DowntimeSo You've Lost Quorum: Lessons From Accidental Downtime
So You've Lost Quorum: Lessons From Accidental Downtime
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - MydbopsMySQL InnoDB Storage Engine: Deep Dive - Mydbops
MySQL InnoDB Storage Engine: Deep Dive - Mydbops
 
ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024ThousandEyes New Product Features and Release Highlights: June 2024
ThousandEyes New Product Features and Release Highlights: June 2024
 
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDBScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
ScyllaDB Leaps Forward with Dor Laor, CEO of ScyllaDB
 
An All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS MarketAn All-Around Benchmark of the DBaaS Market
An All-Around Benchmark of the DBaaS Market
 
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google CloudRadically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
Radically Outperforming DynamoDB @ Digital Turbine with SADA and Google Cloud
 
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
TrustArc Webinar - Your Guide for Smooth Cross-Border Data Transfers and Glob...
 
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
Call Girls Chandigarh🔥7023059433🔥Agency Profile Escorts in Chandigarh Availab...
 
Facilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptxFacilitation Skills - When to Use and Why.pptx
Facilitation Skills - When to Use and Why.pptx
 
Must Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during MigrationMust Know Postgres Extension for DBA and Developer during Migration
Must Know Postgres Extension for DBA and Developer during Migration
 
Introduction to ThousandEyes AMER Webinar
Introduction  to ThousandEyes AMER WebinarIntroduction  to ThousandEyes AMER Webinar
Introduction to ThousandEyes AMER Webinar
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024New ThousandEyes Product Features and Release Highlights: June 2024
New ThousandEyes Product Features and Release Highlights: June 2024
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
intra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_Enintra-mart Accel series 2024 Spring updates_En
intra-mart Accel series 2024 Spring updates_En
 
CTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database MigrationCTO Insights: Steering a High-Stakes Database Migration
CTO Insights: Steering a High-Stakes Database Migration
 
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
QR Secure: A Hybrid Approach Using Machine Learning and Security Validation F...
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 

Lesson 10 assignment

  • 1. WELCOME  OBJECTIVE Students will be able to describe the purpose and functions of network components.
  • 2. Describe the purpose and functions of network components.Types, functions, configuration, topologies and purpose of networks including: 1. Local Area Network (LAN) 2. Wide Area Network (WAN) 3. Metropolitan Area Network (MAN) 4. Virtual Private Network (VPN) 1. Internet 2. Extranet 3. Intranet 4. Virtual Router software
  • 3. Transmission Media  Wired versus Wireless  Fibre Optic  Unshielded Twisted Pair (UTP)  Hotspots  Protocols
  • 4. Definitions and Examples  Network Security  Firewalls
  翻译: