0% found this document useful (0 votes)
20 views

Discussion 4.1 Local Area Network (LAN)

This document provides definitions for 15 key terms related to networks and communications: 1) Access point - A networking device that connects wired and wireless networks, enabling wireless devices to access a wired network. 2) Active Directory - A directory service created by Microsoft to track data about networked items for Windows domain networks. 3) Anti-spam software - Software that identifies and prevents unwanted emails from reaching a user's inbox using filters. The document defines several other important network-related terms such as domain, extended service set, network operating system, and server license.

Uploaded by

qfjmmata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Discussion 4.1 Local Area Network (LAN)

This document provides definitions for 15 key terms related to networks and communications: 1) Access point - A networking device that connects wired and wireless networks, enabling wireless devices to access a wired network. 2) Active Directory - A directory service created by Microsoft to track data about networked items for Windows domain networks. 3) Anti-spam software - Software that identifies and prevents unwanted emails from reaching a user's inbox using filters. The document defines several other important network-related terms such as domain, extended service set, network operating system, and server license.

Uploaded by

qfjmmata
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Technological Institute of the Philippines

938 Aurora Blvd. Cubao, Quezon City

College of Computer Studies

CS 004 – NETWORKS AND COMMUNICATIONS

Midterm Period
NETWORKS AND COMMUNICATIONS

Name: Mata,Francis Joy M. Date: 11/07/2023


Program / Section: BSCS-CS31S3 Instructor: Ma’am Karren
Discussion 4.1 Local Area Network (LAN)

1. Access point :A networking device that connects wired and wireless


networks is called an access point (AP). By connecting wireless devices to a
wired network, it enables wireless devices to access the wired network of the
enterprise, which is managed by other devices and provides advanced
network services like internet routing and information security. An onboard
computer, a minimum of one wired network interface, and one or more radios
make up an AP. The radios are used by the AP's onboard computer to
transmit and receive radio waves in accordance with one or more public
standards. As a result, any additional devices using the same radio
frequencies and speaking the same standards can connect with the AP.
Then, utilizing the wired network, the onboard computer creates a bridge
between that radio-based wireless network and one or more wired networks.
2. Active Directory : Microsoft created Active Directory as a directory service
for Windows domain networks. It keeps track of data about networked items,
including shared folders, user and computer accounts, contacts, groups, and
organizational units. The fundamental part of Active Directory is Active
Directory Domain Services (AD DS), which offers the means of storing
directory data and granting network users and administrators access to it. It
enables users to simply and reliably obtain authenticated and authorized
access to devices, apps, and systems both on-premises and via the cloud..
3. Anti-Spam Software :Software that is intended to identify and prevent
unwanted and potentially harmful emails from reaching a user's inbox is
known as anti-spam software. It uses filters to restrict access to user inboxes
to only approved and recognized email addresses. Typically, anti-spam
software use a range of methods, such as DNS prohibit lists,
challenge/response systems, and URL filtering, to detect and prevent spam.
The capacity of anti-spam software to shield companies from security risks
including ransomware email scams, CEO fraud, spear-phishing, and business
email compromise is what makes it so important.
4. Anti-spyware software : Software that prevents and detects the installation
of undesirable spyware applications and removes them from the system is
known as anti-spyware software. After checking the hard drive and registry
for evidence of malware and adware, it either deletes the files automatically
or notifies the user to do so. A strong antivirus or anti-malware application
that offers comprehensive protection against spyware programs can be
considered anti-spyware software, as can specialized software packages
designed to identify and eliminate spyware from the system.
5. Application Programming Interface (API): A collection of procedures, tools,
and protocols known as an Application Programming Interface (API) is used
to create software applications. It outlines the expected interactions between
various software components, enabling programmers to write software that
can interface with other programs without needing to understand how those
programs are implemented. APIs are frequently used to streamline and
expedite software development, saving time and money. They can be used to
access data, services, and functionality from other software applications.
Applications designed in Java, Ruby, Python, and many other languages can
quickly access and comprehend developer-friendly interfaces thanks to
application programming interfaces (APIs), which are often built for HTTP and
accessible through a range of programming languages.
6. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): In
order to prevent collisions during carrier transmission, the Medium Access
Control (MAC) layer uses a network protocol called Carrier Sense Multiple
Access with Collision Avoidance (CSMA/CA). It is a technique for managing
group communication over a common, decentralized transmission channel.
Before starting a transmission, each station is required by CSMA/CA to check
the status of the medium. If the medium is busy, the station must wait a
random amount of time before attempting again. Due to the widespread issue
known as the "hidden node" problem, which occurs when multiple stations are
able to see the Access Point but not each other, the protocol is especially
helpful in wireless LANs..
7. Corporate License: A corporate license is a kind of license that permits an
unlimited number of users to access a product on an unlimited number of
servers or PCs that belong to a business, association, or corporation. An
intellectual property (IP) lease is a legal arrangement in which two business
entities lease one another's IP. Software products are frequently licensed
under corporate licenses, which are advantageous for businesses that need
to give a lot of employees access to a product.
8. Disk mirroring :One way to safeguard a computer system against data loss
and other possible losses from disk failures is to use disk mirroring. This
method of data preservation makes sure that there is always a backup copy
of all data written to a disk by copying data as it is written to different hard
drives. With disk mirroring, you can access your data from the other disk even
if one of the mirrored disks fails because a single copy of the source is
created in real-time.
9. Domain:A domain is a group of computers and other devices under the
direction of a single, designated authority with predetermined rules. More
precisely, a domain is under the ownership of a single business that has its
own IP address and online presence. The domain name, such as Webopedia
or www.webopedia.com, is used to identify the domain.
10. Extended Service Set (ESS): A network architecture used in wireless
networking that consists of one or more interconnected Basic Service Sets
(BSSs) is called an Extended Service Set (ESS). It is a collection of BSSs or
one or more BSSs with their wired network connected to them. Because it
enables the networking of multiple access points (APs) simultaneously, ESS
is essential for enabling seamless mobility for users to move around the AP-
covered areas without losing connection. Scalability, increased coverage,
mobility, and centralized management are some of the benefits of ESS; on
the other hand, complexity and increased cost are some drawbacks.
11. General Public License (GPL): A free software license known as the
General Public License (GPL) permits software to be altered or redistributed
without any limitations or required payments for the licensed code. A
copyright notice, warranty disclaimer, intact GPL notices, and a copy of the
GPL must be displayed alongside the copy of the software that the developer
is distributing if they wish to copy and distribute a verbatim copy of software
covered by this copyleft license. Open-source software is frequently covered
by the GPL, which is intended to prevent software from turning proprietary
when it is altered.
12. Network-Monitoring Software: Software designed to monitor and control
network traffic, devices, and performance is known as network-monitoring
software. It gives administrators instantaneous visibility into network activity,
facilitating the rapid identification and resolution of problems. Network-
monitoring software can be used to identify cybersecurity risks, stop network
outages, and monitor network capacity, uptime, and downtime. Network-
monitoring tools come in both proprietary and open-source varieties, and their
features, usability, and price ranges differ. SolarWinds Network Performance
Monitor, PRTG Network Monitor, Nagios Core, Zabbix, and LibreNMS are a
few of the widely used network monitoring tools.
13. Network Operating System : An operating system specifically designed to
link computers and other devices to a network and enable resource sharing is
called a network operating system, or NOS. It manages network operations
and offers the local area network (LAN) user interface. Users can share files
and peripherals and communicate with each other thanks to the NOS's
communication with the LAN hardware. Creating and maintaining user
accounts on the network, limiting access to network resources, facilitating
communication between networked devices, monitoring and debugging the
network, and configuring and managing network resources are all among the
duties performed by the NOS. Network operating systems come in two
flavors: client/server and peer-to-peer.
14. Server License : One kind of license that permits the installation and use of
software on a server is a server license. It is a license that an organization or
company buys to enable the use of the software on a server that the
organization owns or leases. Software products like database management
systems, web servers, and email servers, which are intended for use by
numerous users or devices, are frequently licensed as servers. Depending on
the software product and the quantity of users or devices using it, a server
license can cost different amounts.
15. Utilities: Software tools called network utilities are made to examine and set
up different parts of computer networks. By enabling network administrators
to monitor different aspects of their network, including device connections,
packet loss, and latency between connections, they aid in maintaining the
proper operation of their network. A few instances of network utilities are
netsh, ping, traceroute, nslookup, and netstat. With the aid of these
instruments, network problems can be resolved and network traffic volume
can be measured for optimal network performance.

Sources:
https://www.geeksforgeeks.org/what-is-a-wireless-access-point/
https://www.manageengine.com/products/ad-manager/what-is-active-directory-and-how-does-it-
work.html
https://blog.comodo.com/email-security/anti-spam-software-applications/
https://www.techtarget.com/whatis/definition/anti-spyware-software
https://www.techtarget.com/searchapparchitecture/definition/application-program-interface-API
https://www.tutorialspoint.com/csma-with-collision-avoidance-csma-ca
https://www.lawinsider.com/dictionary/corporate-license
https://www.techopedia.com/definition/25959/disk-mirroring
https://www.webopedia.com/definitions/domain/
https://www.devx.com/terms/extended-service-set/
https://en.wikipedia.org/wiki/GNU_General_Public_License
https://www.techtarget.com/searchnetworking/definition/network-monitoring
https://en.wikipedia.org/wiki/Network_operating_system
https://en.wikipedia.org/wiki/Software_license_server
https://en.wikipedia.org/wiki/Network_utility

You might also like