Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-

Slides:



Advertisements
Similar presentations
Internet Hardware Connected ‘Servers’ Servers provide: – Web pages – – File downloads.
Advertisements

 Html is made up of tags. The majority of them will be in pairs.  Some of the most common tags are shown below. TagsWhat does this mean? Bold Italic.
Computer Networks An Overview. A Computer Network!
COMP101 – Exploring Multimedia and Internet Computing LA1A (Wed 11:00 – 12:50) TA: Jackie Lo.
Exchange server Mail system Four components Mail user agent (MUA) to read and compose mail Mail transport agent (MTA) route messages Delivery agent.
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
Methods of communication
Cyberspace Internet Components. With this presentation we intend to present the different components/equipments that allow us to connect and browse the.
1 Computer Communication & Networks Lecture 27 Application Layer: Electronic mail and FTP Waleed.
© 2010 Computer Science Faculty, Kabul University ELECTRONICE MAIL CONTINUED… 6 TH LECTURE 9, May, 2010 Baseer Ahmad Baheer.
Syllabus outcomes Describes and applies problem-solving processes when creating solutions Designs, produces and evaluates appropriate solutions.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Computer Networks26-1 Chapter 26. Remote Logging, Electronic Mail and File Transfer.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-in 5 NETWORKS and TELECOMMUNICATIONS.
CPT 499 Internet Skills for Educators Electronic Mail Session Five.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
CHAPTER 2 COMMUNICATION, NETWORKS, AND THE WWW. WHAT IS COMMUNICATIONS? A process in which two or more computers or devices transfer data, instructions,
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Electronic Communications Electronic communications describes a process in which two or more computers or devices transfer data, instruction, and information.
Introduction to Internet terms. Topics to Study What is Internet HTTP URL SMS MMS Wi-Fi Video Conferencing Social Webisites.
Wireless Communication Methods
What is and How Does it Work?  Electronic mail ( ) is the most popular use of the Internet. It is a fast and inexpensive way of sending messages.
and its Protocols Hina Patel TCM
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
Connections for Access. FYI… It is important that students are aware that it would be beneficial for them to take notes throughout the lesson on points.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Thornbury U3A Computer Club – Mike Farquhar July 2014.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
G063 - Standards & Protocols. Learning Objectives: By the end of this topic you will be able to: explain the importance of standards for communicating.
26 Kommunikatsiooniteenuste arendus IRT0080 Loeng 2/2008 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Application Security: (April 10, 2013) © Abdou Illia – Spring 2013.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
TCP/IP (Transmission Control Protocol / Internet Protocol)
INTERNET PROTOCOLS. Microsoft’s Internet Information Server Home Page Figure IT2031 UNIT-3.
Describe the characteristics of a personal/desktop computer and its uses, both as a standalone and networked computer Describe the characteristics of a.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
A Quick Look At How Works Understanding the basics of how works can make life a lot easier for any user. Especially those who are interested.
INTERNET AND PROTOCOLS For more notes and topics visit: eITnotes.com.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
By Toby Reed.
Network media, protocols and networking standards, networking hardware.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
By: Derek Ton & Alex Pappas.  Most frequently used internet service that you will manage as network administrator.  You need to understand how they.
Mail Server Mail is just a message in any form sends from sender to receiver. Mail Server is a computerized system that is equivalent to virtual post office.
Ethernet, WiFi & Protocols
Network Programming 10- SMTP-POP3
Application layer tcp/ip
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Year 10 Network Security.
Instructor Materials Chapter 5 Providing Network Services
Chapter 4 Computer Networks – Part 2
SMTP SMTP stands for Simple Mail Transfer Protocol. SMTP is used when is delivered from an client, such as Outlook Express, to an server.
Some bits on how it works
Networking for Home and Small Businesses – Chapter 6
GCSE ICT Revision Topic 2: Connectivity.
Fix Roadrunner Common Issues Call Roadrunner Support.
CompTIA IT Fundamentals Study Guide (FC0-U51)
Teaching Computing to GCSE
Transfer of data in ICT systems
Web Development & Design Chapter 1, Sections 4, 5 & 6
Networking for Home and Small Businesses – Chapter 6
ICT Computing Lesson 4: Computing Network.
Protocols 2 Key Revision Points.
Networking for Home and Small Businesses – Chapter 6
3.3 Mobile Digital Communication
Presentation transcript:

Peer to peer networks

Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1- set up peer to peer networks 2- use an access point for normal Wi-Fi use

Bluetooth: is a peer to peer network Allows devices to communicate automatically within range Can connect up to 8 devices in the same time Low power so dose not interfere with other devices

Q1- Why Bluetooth rather than traditional Wi- Fi is used for communication between a mobile phone and a headset for hands-free phone calls. Q2- Give two reasons to why Bluetooth is not used to network devices in a large office.

Communication protocols The rules the devices must follow when they communicating with each other.

The rules are VoIP, POP, IMAP and SMTP Voice over internet protocoled is the set of rules for transmitting audio messages over the internet. To make free voice calls from your computer, smart phone and with video calls. POP3, IMAP and SMTP used when sending and receiving s

SMTP: simple mail transfer protocol When is sent from the sender’s client to the sender server to notify of the receipt of by the receiver. POP to download from the server to the computer and make it ready to read by the receiver even when is offline IMAP Internet message Access Protocol can be accessed from any where any computer when there is internet connection.

Q1-Layla would like to use VoIP on her netbook to keep in touch with her cousin in Canada. State two pieces of equipment she will need to male calls. Q2- Most of Layla’s friends have computers at home. She finds they she cannot use VoIP to call some of them. Give one possible reason for this

Q3- John’s account uses the POP protocol. Describe how the POP protocol is different from IMAP when retrieving an