BC: All Copyrights Reserved to Paula Garza The American School of Tampico Mexico, 2012
FC: Paula Garza #05 Ms. Perla Zamora Technology 7A January 16, 2012 | Computer Network
1: Why Computer Networks are so important for current society? | We, the society, use networks all the time. They are already a part of our lives. We use them for work, homework, etc. Imagine a life without network. It would be very different and much harder. Instead of researching on the computer, we'd be stuck with books like the old times. Thank God we have networks!
2: Paula became a network client in The American School of Tampico since she used her blackberry Internet services inside the ATS campus.
3: Do you want to know how the Internet travels? Well, the NODE (Blackberry) sends the information from the outside to the NIC (Network Interface Card). | The Network Interface Card is a plug-in in the cellphone that if it weren't there the services wouldn't be connected nor the files.
4: The Wireless Access Point receives the data given. | The purpose of the Wireless Access Point is to give network to all services, including nodes with wireless connection such as the blackberry.
5: From the Wireless Access Point it goes to th closest Switch. | The Switch is the one where all the cables meet and from there just ONE exits, which is the optic cable. In other words, it diverts the currents from one conductor to another. | The Optic cable is very expensive and fragile, that's why it is located indoors. The good thing about these cables is that they transmit data very fast and it connects buildings.
6: From the Switch it travels through an optic cable and it goes directly to the SITE. | The SITE is normally located in the middle of all the networks so it is connected to everything is needed. | The UTP cables are the harder and less fragile cables. It is placed on both Switch and Site to transmit info from place to place.
7: In the SITE it goes to the Router. | The Router is where all the connections are transferred to a specific area.
8: Since Paula is a visitor, the Proxy Server checks it out! | The Proxy then does its job which is catching and filtering the Web content to reduce network traffic for security and safety.
9: The Proxy says Paula is not from ATS, it then blocks this user.
10: But let's say Paula was a hacker, the data sent by her would go through the firewall. The firewall would protect the ATS network and this data will be destroyed. The Firewall controls what enters and leaves the NODE, in these case blackberry.
11: Doing this whole process, the File Server is being protected! | The File Server is where all the cables and networks connect so they can be directed everywhere. The File server is located in the Site where it has a certain temperature for the machines not to overheat.