New User Special Price Expires in

Let's log you in.

Sign in with Facebook


Don't have a StudySoup account? Create one here!


Create a StudySoup account

Be part of our community, it's free to join!

Sign up with Facebook


Create your account
By creating an account you agree to StudySoup's terms and conditions and privacy policy

Already have a StudySoup account? Login here

CIS 105 Chapt. 8 Notes

by: Brigette Maggio

CIS 105 Chapt. 8 Notes CIS 105

Brigette Maggio
GPA 3.9
Computer Appls&Info Technology
Wood, McCarthy

Almost Ready


These notes were just uploaded, and will be ready to view shortly.

Purchase these notes here, or revisit this page.

Either way, we'll remind you when they're ready :)

Preview These Notes for FREE

Get a free preview of these Notes, just enter your email below.

Unlock Preview
Unlock Preview

Preview these materials now for free

Why put in your email? Get access to more of this material and other relevant free materials for your school

View Preview

About this Document

These notes cover CIS 105 Chapt. 8.
Computer Appls&Info Technology
Wood, McCarthy
Class Notes
CIS 105
25 ?




Popular in Computer Appls&Info Technology

Popular in Computer Information Systems

This 0 page Class Notes was uploaded by Brigette Maggio on Monday January 4, 2016. The Class Notes belongs to CIS 105 at Arizona State University taught by Wood, McCarthy in Fall 2015. Since its upload, it has received 60 views. For similar materials see Computer Appls&Info Technology in Computer Information Systems at Arizona State University.

Popular in Computer Information Systems


Reviews for CIS 105 Chapt. 8 Notes


Report this Material


What is Karma?


Karma is the currency of StudySoup.

You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!

Date Created: 01/04/16
CIS 105 112415 Chapter 8 Networks network Two or more computers connected to each other to share resources like Folders and files Software Hardware Scanners Printers Webcams Consider a network made up of three computers Clients connected to one computer called a Server The server is connected to a printer and a scanner peripheral devices enabling all three clients to use them Any device connected to a network is called a node 10 computers that all standalone 10 computers if they would have been hooked up would have been called clients Network Advantages Consider a business that tries to save money by not purchasing a network or network software Although their initial capital outlay is smaller than the same size business that chooses to buy a network they suffer from many disadvantage Economic disadvantage With no network each computer would need their own peripheral devices like printers With a network only one shared printer is needed Software Software can be loaded on a server for all clients to use whereas a business with standalone computers needs software loaded on individual boxes Collaboration Networks allow businesses to share and collaborate on projects most important you can do with a network is collaborate it Internet Networks allow businesses to share Internet whereas standalone computers need their own individual Internet connection Building a Computer Network All networks require four basic components 1 Network Interface Controller Card NlC Plugged into the motherboard to interface and connect with other computers NIC card has a MAC address on it computer s name MAC spoofing where you can send out a different MAC address and IP number 2 Protocol rulesTCPP controls how data and information is shared between computers 3 Cables Cables connect servers to clients which can sometimes be replaced through wireless connections Coaxial Cables 4 Hub Typically the central location of a network server that serves to run the network smoothly Transmission Control Protocol Internet Protocol TCPIP When sending a file from one computer to another the file is broken down into smaller files called packets The packets arrive at the receiving computer and must be reassembled correctly to guarantee the receiving computer gets a file that will work not corrupted User Datagram Packets Break large files into packets but unlike TCPIP allows a user to use the incoming file Would YouTubecom exist without UDP User Datagram Packets operating system runs on a standalone computer a standalone computer that s not connected to anything is garbage A Network Operating System NOS is similar to a standalone platform but responsible for much more Automatic hardware detection The N08 recognizes it when it becomes part of the network Supports multiprocessing which allows several processes to occur at one time Recognizes who is using the network Provides security Network Administrator Responsible for smooth network operations Network performance mpementation of new nodes and users Strong business background makes sure it runs smoothly have a strong business background spreadsheets are not networkable database file works on a network server Network Topology Refers to the mapping of a physical network and logical interconnections between nodes Basically the way a network is arranged and laid out Bus Topology Sometimes called a linear bus topology where the network s nodes are connected to a common linear backbone with two endpoints If the backbone fails the whole network fails Star Topology One central server in which clients connect in a spokelike fashion or star If the server fails the network fails Most common topology network will go out if the server goes out Ring Topology Data is transferred between computers in a circular manner napster is illegal making a copy of a book is illegal peertopeer client and server Types of Computer Networks Local Area Network LAN A small network typically confined by a single building Often used by smaller businesses Campus Area Network CAN Connects two or more LANs which are located on universities or large businesses LANs are assigned to business areas like Accounting Metropolitan Area Network MAN A computer network that connects CANs and LANs into a larger network that covers an entire city Wide Area Network WAN Connects LANs CANs and MANs and can cover an entire country Peer to Peer P2P Generally connect computers to each other Exp LimeWire BitTorrent olnternet The world s largest network interconnecting public private commercial and governmental networks Network Security Starts with a solid understanding of network threats Network administrators must adopt policies which define rules for network access Passwords A secret word or combination of keyboard characters typed in by the user to authenticate their identity to a network and gain appropriate access Strong Passwords Same as passwords but requires a user to use upper case characters lower case characters numbers and special characters Passphrase a phrase that is a Strong Password Web Browsing on a Network Part of network security includes policies and procedures regarding employee s web browsing Should a business let employees browse on the Web Email Instant Messaging On a business network consider that all email and instant message is recorded and saved therefore policies and procedures must be in place regarding appropriate usage Permissions Network access is called permissions which grants and denies access to a network depending on the user Firewall Hardware and software on a proxy server that determines who is allowed on a network and who is not acts as a gatekeeper is on a proxy server and you get an intranet


Buy Material

Are you sure you want to buy this material for

25 Karma

Buy Material

BOOM! Enjoy Your Free Notes!

We've added these Notes to your profile, click here to view them now.


You're already Subscribed!

Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'

Why people love StudySoup

Steve Martinelli UC Los Angeles

"There's no way I would have passed my Organic Chemistry class this semester without the notes and study guides I got from StudySoup."

Amaris Trozzo George Washington University

"I made $350 in just two days after posting my first study guide."

Jim McGreen Ohio University

"Knowing I can count on the Elite Notetaker in my class allows me to focus on what the professor is saying instead of just scribbling notes the whole time and falling behind."


"Their 'Elite Notetakers' are making over $1,200/month in sales by creating high quality content that helps their classmates in a time of need."

Become an Elite Notetaker and start selling your notes online!

Refund Policy


All subscriptions to StudySoup are paid in full at the time of subscribing. To change your credit card information or to cancel your subscription, go to "Edit Settings". All credit card information will be available there. If you should decide to cancel your subscription, it will continue to be valid until the next payment period, as all payments for the current period were made in advance. For special circumstances, please email


StudySoup has more than 1 million course-specific study resources to help students study smarter. If you’re having trouble finding what you’re looking for, our customer support team can help you find what you need! Feel free to contact them here:

Recurring Subscriptions: If you have canceled your recurring subscription on the day of renewal and have not downloaded any documents, you may request a refund by submitting an email to

Satisfaction Guarantee: If you’re not satisfied with your subscription, you can contact us for further help. Contact must be made within 3 business days of your subscription purchase and your refund request will be subject for review.

Please Note: Refunds can never be provided more than 30 days after the initial purchase date regardless of your activity on the site.