Point of presence (PoP)
Network Access Point (NAP)
Internet Protocol (IP)
Transmission Control Protocol (TCP)
File Transfer Protocol (FTP)
Internet Service Provider (ISP)
Slide 2
Point of presence (PoP)
A point of presence is a physical location. It acts as access point from on place to the rest of the internet. It generally has a unique IP address and two or more different networks or communication devices build a connection with each other when this happens. It also helps other devices establish a connection with the Internet.
A network access point (NAP) is one of several major Internet interconnection points. These serve to connect all the Internet access providers together so that people can contact or send files to each other all over the world. The backbone of the Internet actually consists of sections of high-speed fiber-optic cabling that are owned by different carriers. NAPs are places at which these carriers interconnect their lines so that the Internet can function singly.
An IP is digital message formats and rules for exchanging messages between computers. These are interconnected between networks and will sent across a single one. Messages are exchanged as datagrams, also known as data packets or just packets. Every machine on the Internet has a unique identifying number, called an IP Address.
Caption: : (A typical IP address looks like this: 216.27.61.137.)
Slide 5
Transmission Control Protocol (TCP)
Transmission Control Protocol is is a standard that shows how to get and maintain a network conversation so that two devices can exchange data. TCP is designed to send packages over the internet. TCP works in collaboration with Internet Protocol and both TCP and IP are basic rules that are defining the internet.
FTP is the protocol for exchanging files over the internet. File Transfer Protocol uses the Internet's TCP and IP protocols to transmit this data. FTP is most commonly used to download a file from a server using the Internet or to upload a file to a server.
An Internet Service Provider refers to a company that provides your internet access. For broadband access you would receive the broadband hardware or pay a monthly fee for this equipment that is added to your ISP account billing.
Servers run special software to serve other computers. For example: file servers, print servers, web servers and email servers. A server is a powerful computer the controls the network.
A client is a user's device such as a laptop or a smartphone. This client is a computer/device that gains services from servers. The computer/device that we use to access the internet is a client.
Slide 11
Routers
Routers are devices which directs traffic over the network. This is when devices direct data or 'route' traffic through a network. These routers are intelligent and will try to find the best routes.
This is the part of the computers network infrastructure that interconnects different networks and provides a path for exchange of data between these different networks. A backbone may interconnect different local area networks in offices, campuses or buildings. .A backbone is a big cable (often made out of fibre) that connects a large number of devices together.
Wireless connection is not fixed to a stationary computer and can also be used whenever wireless internet is available. Although, there are some disadvantages to wireless connection. For example: You can't access it if wireless internet isn't available. It also tends to be slower and less secure than wired.
This is a wired connection through a broadband supplier. An advantage of this is that there is better reception and it is also faster that dial-up. A disadvantage of this is that it is wired so it has to be used on a stationary computer to function.
Slide 16
Dial-up
This is a wired connection using a modem and telephone lines. It can use existing telephone line, giving connection where broadband is not available. Although, it's old technology and can give poor reception. Conversion between digital and analogue signals are also in risk of causing errors. On top of this, it is usually slower that other methods.
Hyperlink
Web server
Wizard
HTML
HTML element
URL
Search Engine
Slide 18
Hyperlink
In computing, a hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering. A hyperlink points to a whole document or to a specific element within a document. Hypertext is text with hyperlinks.
A web server is a computer that delivers web pages. Every web server has an Internet Protocol (IP) address and possibly a domain name. Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet.
A wizard guides through steps to help you understand what you have to do. - 'A sequence of dialogue boxes which lead the userthrough a series of well-defined steps'
URL stands for Uniform Resource locator. This includes a protocol which tells the browser what to do with the URl, a path which points to a specific web page and a domain name that is the name of the website.
We need codecs because video and music files are large, they become difficult to transfer across the Internet quickly. To help speed up downloads, mathematical "codecs" were built to encode ("shrink") a signal for transmission and then decode it for viewing or editing. Without codecs, downloads would take three to five times longer than they do now.
Slide 27
Devices/components
Slide 28
Peripheral
A peripheral device is an internal or external device that connects directly to a computer but does not contribute to the computer's primary function, such as computing. It helps end users access and use the functionalities of a computer.
Slide 29
Slide 30
Byte
USB
Client side processing (example and advantages/disadvantage)
Server side processing (example and advantages/disadvantages)
Bi-directional transmission
Packet switching
Simplex
Half Duplex
Full Duplex
In most computer systems, a byte is a unit of data that is eight binary digits long. A byte is the unit most computers use to represent a character such as a letter, number, or typographic symbol (for example, "g", "5", or "?"). A byte can also hold a string of bits that need to be used in some larger unit for application purposes (for example, the stream of bits that constitute a visual image for a program that displays images or the string of bits that constitutes the machine code of a computer program).
A USB drive -- also known as a flash drive or keychain drive -- is a plug-and-play portable storage device that uses flash memory and is lightweight enough to attach to a keychain. A USB drive can be used in place of a floppy disk, Zip drive disk or CD. When the user plugs the device into the USB port, the computer's operating system recognizes the device as aremovable drive and assigns it a drive letter.
Slide 33
Client side processing
The majority of the processing will be done at the server and not on the client's internet browser. When a database needs to be accessed on a server, the web application will post the page back to the web server and server-side code will process the request.
Processing or content generation that is done on the web server or other server, as opposed to on the client computer where the web browser is running. An example is server-side include where one file is inserted in another before it is served, rather than, say, having the browser request the files separately and combine them using an iframe. A very common kind of server-side processing is the inclusion of data from a database in a web page.
Slide 35
Bi-directional transmission
Bi-directional transmission has several meanings within data communication, but it is essentially about transmitting in both directions. Most recently the term has been applied to fibre optics. Using the current technology, light passes in one direction only, so you have to add extra fibres to the bundle to carry a signal in the opposite direction.
Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet. Breaking communication down into packets allows the same data path to be shared among many users in the network. This type of communication between sender and receiver is known as connectionless (rather than dedicated). Most traffic over the Internet uses packet switching and the Internet is basically a connectionless network.
Slide 37
Simplex
Simplex communication is a communication channel that sends information in one direction only. Simplex refers to one-way communications where one party is the transmitter and the other is the receiver.
Refers to the transmission of data in just one direction at a time. For example, a walkie-talkie is a half-duplex device because only one party can talk at a time. In contrast, a telephone is a full-duplex device because both parties can talk simultaneously.
In a full duplex system, both parties can communicate with each other simultaneously. An example of a full-duplex device is a telephone; the parties at both ends of a call can speak and be heard by the other party simultaneously.
Database
Table
Record
Field
Primary key
Foreign key
DBMS
SQL
DDL
DML
Slide 41
Database
Online databases are databases which are accessible using a network, including the Internet. They are very different to local databases as they have to be accessed, and possibly updated, by millions of users. Normally these databases will have thousands of rows of information. Usually information is found in online databases by using asearch engine
The primary key of a relational table uniquely identifies each record in the table. It can either be a normal attribute that is guaranteed to be unique (such as Social Security Number in a table with no more than one record per person) or it can be generated by the DBMS (such as a globally unique identifier, or GUID, in Microsoft SQL Server). Primary keys may consist of a single attribute or multiple attributes in combination.
A foreign key is a column (or columns) that references a column (most often the primary key) of another table. The purpose of the foreign key is to ensure referential integrity of the data. In other words, only values that are supposed to appear in the database are permitted.
Slide 44
A database management system (DBMS) is a computer software application that interacts with the user, other applications, and the database itself to capture and analyse data. A general-purpose DBMS is designed to allow the definition, creation, querying, update, and administration of databases.
SQL is a standard language for accessing databases. Our SQL tutorial will teach you how to use SQL to access and manipulate data in: MySQL, SQL Server, Access, Oracle, Sybase, DB2, and other database systems.
A number of relatively laws exist within the UK in response to the increased use of computer systems.Data Protection Act 1998 - Provide 8 principles that govern the way data about individuals is stored and used.Computer Misuse Act 1990 - Introduced to protect from hackers and malicious use of viruses.Copyright, Designs and Patents Act 1988 - Protects creators of original work.Freedom of Information Act 2000 - Provides the individual the right to see information stored about them. Data can also be accessed about public bodies.
Slide 48
Key Terms
Physical barriers
Password control
Access Levels
Anti virus software
Firewall
Encryption
Backup
Slide 49
Physical Barriers
Slide 50
Firewall
Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. In addition to limiting access to your computer and network, a firewall is also useful for allowing remote access to a private network through secure authentication certificates and logins.
Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ;encrypted data is referred to as cipher text.
Virus protection software is designed to prevent viruses, worms and Trojan horses from getting onto a computer as well as remove any malicious software code that has already infected a computer. Most virus protection utilities now bundle anti-spyware and anti-malware capabilities to go along with anti-virus protection. Internet security suites go a step further by including additional capabilities like anti-spam, anti-phishing, firewall, file protection and PC optimization.
To find out what permissions your account has, go to Special:Preferences. Your permissions are listed in the user profile tab under "Member of groups". A contributor's ability to perform certain actions in Wikipedia depends on their user access level.
Password Control is a tool designed to allow help desk staff and other IT support personnel to reset user passwords. It has a simple and intuitive interface that many users find more productive than a custom MMC console. Password Control is designed to work with Active Directory based domains. It also features other functions such as the ability to enable and disable user accounts (you can edit a config file to remove these features if required).
Personal data shall be processed fairly and lawfully and, in particular, shall not be processed unless –(a) at least one of the conditions in Schedule 2 is met, and(b) in the case of sensitive personal data, at least one of the conditions in Schedule 3 is also met.
Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
Personal data shall be accurate and, where necessary, kept up to date.
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
Personal data shall be processed in accordance with the rights of data subjects under this Act.
Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.