1 Layered network protocols
Show
5 Internet layer
Activity: Compare IPv4 to IPv6By signing in and enrolling on this course you can view and complete all activities within the course, track your progress in My OpenLearn Create. and when you have completed a course, you can download and print a free Statement of Participation - which you can use to demonstrate your learning. 7.2.1 Switches
Activity: Data ratesResearch the data rates supported by the following Ethernet variants:
Interactive feature not available in single page view (see it in standard view). 7.2.3 Wireless Access Points (WAP)
8 Network address translation
IP addresses in packets
9 Using networks securely
12 ActivitiesActivity: Investigating your home networkBy signing in and enrolling on this course you can view and complete all activities within the course, track your progress in My OpenLearn Create. and when you have completed a course, you can download and print a free Statement of Participation - which you can use to demonstrate your learning. Activity: Network devices and protocols – Packet TracerWe connect our devices to the Internet and the Internet connects them all together. But what is the Internet made of? We say it interconnects all the devices, but how? Network devices are mainly hubs, switches or routers. There are lots of other specialist bits, but the bulk of the interconnectivity is done by switches and routers. In this course you have looked at client server models, web requests and emails. What do these messages look like and how are they sent? For each type of communication over the network there are a set of rules and specifications as to what format and order the information is sent. These are called protocols and they are fundamental in understanding how the Internet works. This Packet Tracer lab explores the devices and protocols used in computer networks. You will need: Activity: Password hintsCompanies do not store a user’s passwords in clear text – they send it through a scrambling algorithm to produce a 'hash', and the hash is then saved. The hash algorithm does not work in reverse, so you can't unscramble a hash to get the original password. When you enter your password the site uses the same algorithm to make a hash, which it then compares to the hash saved against your details. Some sites allow you to store password hints, and they save these as clear text. Adobe was hacked in 2013, and its hashed passwords and hints were stolen for thousands of customers. The hackers looked at all the hints that gave the same hash (hence were the same password). Because they had lots of hints for the same password it was easy to guess what they were. Can you guess the passwords used in this puzzle based on the stolen hints? 13 ResourcesFor more information, take a look at the following resources.
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view).
Interactive feature not available in single page view (see it in standard view). 14 End of course quizNow it’s time to test what you’ve learned in a quiz. 15 AcknowledgementsGrateful acknowledgement is made to the following sources: Figure 1: Birmingham City University (BCU) Figure 2: Birmingham City University (BCU) Figure 3: Cisco Figure 4: Birmingham City University (BCU) Figure 5: Birmingham City University (BCU) Figure 6: CommScope. This file is licensed under the Creative Commons Attribution-Noncommercial-NoDerivatives Licence http://creativecommons.org/licenses/by-nc-nd/2.0/ Figure 7: tlsmith2000. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/licenses/by-sa/2.0/ Figure 8: Bull3t Hughes. This file is licensed under the Creative Commons Attribution-Share Alike Licence http://creativecommons.org/licenses/by-sa/2.0/ Figure 9: Cisco Figure 10: Cisco/Birmingham City University (BCU) Figure 11: Cisco/Birmingham City University (BCU) Figure 12: Cisco/Birmingham City University (BCU) Figure 13: Cisco/Birmingham City University (BCU) Figure 14: Cisco/Birmingham City University (BCU) Figure 15: Cisco Figure 16: Cisco/Birmingham City University (BCU) Figure 17: Cisco/Birmingham City University (BCU) Figure 18: Cisco/Birmingham City University (BCU) Figure 19: Publisher unknown Figure 20: Cisco/BCU Figure 21: Birmingham City University (BCU) Figure 22: Birmingham City University (BCU) Figure 23: Birmingham City University (BCU) Figure 24: Birmingham City University (BCU) Figure 25: Birmingham City University (BCU) Figure 26: Publisher unknown Figure 27: Screenshot taken from Barclays, example of phishing. Every effort has been made to contact copyright holders. If any have been inadvertently overlooked the publishers will be pleased to make the necessary arrangements at the first opportunity. Which one of the given hardware components is used to establish communication between two computers that are connected either through LAN or Internet protocol?Hubs connect multiple computer networking devices together. A hub also acts as a repeater in that it amplifies signals that deteriorate after traveling long distances over connecting cables. A hub is the simplest in the family of network connecting devices because it connects LAN components with identical protocols.
What components are needed to work together when connecting a computer to the Internet?The primary piece of hardware you need is a modem. The type of Internet access you choose will determine the type of modem you need. Dial-up access uses a telephone modem, DSL service uses a DSL modem, cable access uses a cable modem, and satellite service uses a satellite adapter.
What piece of hardware is used to allow a computer to communicate with another computer?A router is a communications device that connects multiple computers or other routers together and transmits data to its correct desti- nation on the network.
Which hardware is used to connect two or more networks?A router is a hardware device that connects two or more networks. Routers are the primary backbone device of the Internet, connecting different network technologies into a seamless whole.
|