 A network is a group of two or more computer systems linked together.

Slides:



Advertisements
Similar presentations
Introduction to Computers Lecture By K. Ezirim. What is a Computer? An electronic device –Desktops, Notebooks, Mobile Devices, Calculators etc. Require.
Advertisements

Modem Technologies ADSL Modem
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
© Vera Castleman Networks Grade 10. The Network System A network links components electronically. Each component is a NODE. A node could be: A PC A printer.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Four Police Technology Networks.
E-commerce and Information Technology in Hospitality and Tourism Chapter 3 Connecting to the World Copyright 2004 by Zongqing Zhou, PhD Niagara University.
Principles of Information Technology
Hardware & Software Needed For LAN and WAN
Computer Networks IGCSE ICT Section 4.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
How to Integrate a WiFi Network for Mobile Devices
Teaching and Learning with Technology  Allyn and Bacon 2002 Networks and the Internet Chapter 7 Technology in Teaching and Learning.
Basic Data Communication
Communications & Networks
Chapter 4: Computer Networks
Introduction to Networks. Objectives The purpose and uses of networks The Key components of a computer network The Different types of network and the.
Chapter 5 Networks Communicating and Sharing Resources
Networks. What is a Network? Two or more computers linked together so they can send and receive data. We use them for sending s, downloading files,
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco PublicNew CCNA Jianxin Tang IT 1 V4.0 Ch8. Fundamental Networks.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
CSCI-235 Micro-Computer in Science The Network. © Prentice-Hall, Inc Communications  Communication is the process of sending and receiving messages 
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Business Computing 550 Lesson 2. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Living Online Module Lesson 23 — Networks and Telecommunication
Network Environments. Communications Networks LAN – Local Area Network Collection of Computers and peripherals with a common connection in one building.
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Networks CS105. What is a computer network? A computer network is a collection of computing devices that are connected in various ways so that they can.
Networks.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
Teaching and Learning with Technology ck to edit Master title style  Allyn and Bacon 2002 Teaching and Learning with Technology k to edit Master title.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Networking Classification A network is two or more computers that are connected 1 There size 2 Their Servers.
Teaching and Learning with Technology Chapter 7 Networks and the Internet by La Tisha Jenkins.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
1 LAN – local area network overview: 1.Types of networks 2.Network topology 3.LAN local area networks 4.Introduction to TCP/IP 5.IEEE / Wireless.
Mr C Johnston ICT Teacher G055 - Lecture 03 Local and Wide Area Networks.
Term 2, 2011 Week 2. CONTENTS Communications devices – Modems – Network interface cards (NIC) – Wireless access point – Switches and routers Communications.
NetworksNetworks. What is a network? Standard Grade Computing Studies.
Higher Computing Networking. Networking – Local Area Networks.
CSCI-235 Micro-Computer Applications The Network.
NETWORKS AND THE EFFECTS OF USING THEM THIEN HA. NETWORKS A network is a group of computer systems and other computing hardware devices that are linked.
CHAPTER - 4 COMPUTER NETWORK Dr. BALAMURUGAN MUTHURAMAN
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Topic 6, Lesson 3: The Internet Computer Communications and Networking.
Understand how a router works and its purpose
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Computer Networks – the basics Week 1 Lesson 1. In this project, you will be learning about the computer networks which we use every day – when we log.
Chapter 3.  Help you understand what hardware is required to allow networks to work including: ◦ Repeaters ◦ Hub ◦ Switch ◦ Bridge ◦ Gateway (not needed.
ICT Unit 4: Network and the effects of using them
ICT UNIT 4 NETWORKS AND THE EFFECTS OF USING THEM.
Understand how a router works and its purpose
Ethernet, WiFi & Protocols
Unit Communication Hardware
Network and hardware revision
Chapter Objectives In this chapter, you will learn:
The Internet and connections
Networks and effects of using them
Networks and the effects of using them
Unit 9 Network Fundamentals
Chapter 4: Data Communication and Networks
Principles of Information Technology
Presentation transcript:

 A network is a group of two or more computer systems linked together.

 “Modulator demodulator”  Converts digital into analogue over an existing telephone line  Also does the reverse process  Used to allow computer to connect to networks Examples of modems Dial up-modem: slow device, 60 kilobits per sec ADSL (asymmetric digital subscriber line): 100 megabits per sec asymmetric= modem faster at downloading data than uploading it

 Hardware device  Can have a number of devices connected to them  Usually used to form a LAN (local area network)  Main task is to take any data packet (group of data being transmitted)  Hub is not very secure and/or efficient

 Similar to hub but more efficient  Connect computer together to form a LAN  Checks data packet received and works out its destination and sends data to appropriate computer MAC (media access control) =address that identifies network

 Connect one LAN to another LAN that uses the same protocol  Connect different parts of a LAN so that they function as a single LAN

 Enable data packets to be routed between the different networks  WAN (wide area network)  One internet cable plugged in, and several cables connecting to computers and other devices on the LAN  Main function is to transmit internet and transmission protocols between two networks  IP= internet protocol

 Network point or node that acts as an entrance to another network  Key point for data on its way to or from other networks

 Needed to allow device to connect to a network (ex. Internet)  Contains MAC adress

 Instead of wifi  Can be either copper or fibre optics ADVANTAGES  Faster data transfer rates  Can be more secure than wireless networks

 Each device has one  32-bit number  Home computer is given one when it connects to the internet  Only ip adresses that remain uncharged are web servers  Can be used instead of typing in the full URL

 Offers wireless communication  Wi-Fi network makes use of radio waves to transmit information across a network.  The computer should include a wireless adapter that will translate data sent into a radio signal.  This same signal will be transmitted, via an antenna, to a decoder known as the router.  Once decoded, the data will be sent to the Internet through a wired Internet connection.  As the wireless network will work as a two-way traffic, the data received from the Internet will also pass through the router to be coded into a radio signal that will be receipted by the computer's wireless adapter.

 The Bluetooth standard, like WiFi, uses the FHSS technique ( Frequency-Hopping Spread Spectrum )WiFiFHSS technique  which involves splitting the frequency band of GHz into 79 channels (called hops ) each 1MHz wide  then transmitting the signal using a sequence of channels known to both the sending and receiving stations.  Thus, by switching channels as often as 1600 times a second, the Bluetooth standard can avoid interference with other radio signals.

 You would need to buy some hardware: One or more switches / hubs - to link devices together  Network cables to connect devices to the switch, etc.  A separate wireless access point (or this could be part of the switch) - to allow wireless devices (e.g. laptops or smart-phones) to join the network  A router to connect your LAN to the Internet (WAN)  A firewall to protect your network from hackers  Possibly a bridge if you already have a section of network and you want your new network to connect to it  Server(s) to manage network functions such as network security, network file storage, shared resources (such as printers)

 You would need to organise some other things: Set up an account with an Internet Service Provider (ISP)  Get an Internet connection installed from the ISP to your location  Configure various bits of hardware and software so that everything worked with the network

 A l ocal- a rea n etwork (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.computernetwork ADVANTAGESDISADVANTAGES Sharing of resourcesSpread of viruses Ease of communicationSlow access Easy to controlSecurity risk

 WAN is a collection of computers and network resources connected via a network over a geographic area. Wide-Area Networks are commonly connected either through the Internet or special arrangements made with phone companies or other service providers.Internet

 WLAN is a type local network that utilizes radio waves, rather than wires, to transmit data. Today's computers have WLAN built onboard, which means no additional Wi-Fi card needs to be installed.onboardWi-Fi card  Access points (AP) are connected into the wired network at fixed locations

ADVANTAGESDISADVANTAGES Very portable, network signal can be accessed Expensive if hot-spot is not available Persons are more likely to carry them Small display, more difficult to read web pages Easier to use while on the moveKeboards are small Not all websites are mobile friendly Signal less likely to be as stable as wired systems

ADVANTAGES  More mobile than desktops  Touchpad is easier to use than phone touchpad  Keyboards are much better than phone keyboards DISADVANTAGES  Not as large as a desktop  Expensive to access phone networks  Processors are not as powerful as desktop  Slow access speed

ADVANTAGES  Fast processors  Stable internet  All websites are accessable  Use of full-sized keyboard DISADVANTAGES  Parts are all seperate  Expensive to access phone networks  heavy

 Help prevent illegal material being posted  Prevent children from being subjected  Stop incorrect infos  Already available sources  Expensive  Difficult to enforce rules  Laws already exist

Three main aspects to consider:  Reliability  Undesirablility  Security issues

 Up to date rather than books  Easier to get infos  Vast amount of infos  Infos could be incorrect  Risk of information overload

 Risk of finding inppropriate websites  Risk of connecting to websites that are not genuine (real)  Security risk

 Passwords to access account, online banking, social networks Protect your password!  Anti-spyware software  Change password regularly  Hard to remember

 Used to verify that data comes from a secure source

 Check software  Compares possible virus against database of known viruses  Carry out heuristic checking(checking behaviour that could indicate virus)  Needs to be kept up to date  Full system checks need to be carried out

 Avoid unknown websites  Look for padlock symbols  Look out for odd behaviour in URL  Don´t open s from unknown sources

 Don´t leave personal infos lying around  Lock filing cabinets  Use passwords and user Ids  Do not leave data on a computer monitor

 Physical fax=machine connected to telephone line. Allows documents to be sent to another fax machine  Electronic fax=network is required Saves paper, needs computer, transmissions are sent to an account

 Electronic mail  Useful when sending attachments  Available on any device  Require an account  More secure than faxes  No need to print

 Communication method that uses video and sound  Hardware includes: webcam, monitor, microphone, speakers  Agree a time and date  Check if all the hardware is connected and functionable

 Meeting via audio i. Organiser is given two PINs by phone company ii. Organiser contacts all participants and inform them of their PIN iii. Organiser dials conference number iv. Participants call same conference number to join in, once they get through the have to put in their PIN  Also possible with computer,, makes use of VoIp( Voice over Internet Protocol)

 Also webinar  Uses internet to permit conference  Such as business meetings, presentations, online education trainings  Requirment is a computer  You can leave conference whenever you want