Principles of Information Technology

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Networking Some of the basics. What is a Network Simply put, its two or more computer connected together through a communication medium. A communication.
© Vera Castleman Networks Grade 10. The Network System A network links components electronically. Each component is a NODE. A node could be: A PC A printer.
REVIEW ESSAY BYTEBACK/ REVIEW FOR QUIZ OCTOBER 20, 2014 MS.TIWANA ANDERSON.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
1 Chapter 19 Networks. 2 What’s Inside and on the CD? In this chapter you’ll learn: –Basic network terminology –To identify network components –About.
Chapter 5 Communications and Networks
Computer Networks IGCSE ICT Section 4.
By: Aarman Tarapore 10cc.  a network is a series of points or nodes interconnected by communication paths. Networks can interconnect with other networks.
Network Done by: Athra sultan.
This is the way an organisation distributes the data across its network. It uses different types of networks to communicate the information across it.
Computer Networks.
NETWORK CHONGSEOK PARK 10DD MRS. VEENA MONY Content.
Teaching and Learning with Technology  Allyn and Bacon 2002 Networks and the Internet Chapter 7 Technology in Teaching and Learning.
Computer communication
Chapter 5 Networks Communicating and Sharing Resources
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
What Is A Network A network is a group of computers interconnected with communication lines which allows users to share information and resources.
Network Structure Students should be aware of what is available in order to –create and use an ICT network: communication devices.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
Local Area Networks (LAN) are small networks, with a short distance for the cables to run, typically a room, a floor, or a building. - LANs are limited.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Unit 1—Computer Basics Lesson 7 Networks.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Basic Concepts of a Computer Network
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Definitions What is a network? A series of interconnected computers, linked together either via cabling or wirelessly. Often linked via a central server.
Living Online Module Lesson 23 — Networks and Telecommunication
Lecture 4 Title: Network Components and Types By: Mr Hashem Alaidaros MIS 101.
Networks.
Computers Are Your Future Eleventh Edition
Introduction to Computing Lecture # 11 Introduction to Computing Lecture # 11.
Networking Basics Networking and Web Design Mrs. Zajicek Spring 2013.
What is a Network? Living Online Lesson 1 Mrs. Elzey.
Basic Computer Knowledge. Outline Notes 1 Notes 2 Assessment.
Networks Mr Hewitt. Objectives By the end of this lesson you will be able to: Compare stand alone, networked and laptop computers Define a Network Explain.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Higher Computing Networking. Networking – Local Area Networks.
Communications & Networks National 4 & 5 Computing Science.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Activity 1 5 minutes to discuss and feedback on the following:
Data Communication and Networks Chapter 5. What’s a Network? a network consists of two or more computers that are connected together to share information.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
ITE PC v4.0 Chapter 8 1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public  Networks are systems that are formed by links.  People use different.
Introduction to Networking. What is a Network? Discuss in groups.
1 Lesson 24 Network Fundamentals Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Introduction to Networks. When Personal Computers first appeared in business, software programs were designed for a single user. However as computers.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
COMPUTER NETWORKS Quizzes 5% First practical exam 5% Final practical exam 10% LANGUAGE.
An Introduction to Local Area Networks An Overview of Peer-to-Peer and Server-Based Models.
ICT Unit 4: Network and the effects of using them
Network - definition A network is defined as a collection of computers and peripheral devices (such as printers) connected together. A local area network.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Introduction to Telecommunications, Network and Network Topology I will be able to... Mrs. Morton 8 th Grade Know Network Terminology Know the 2 Main Types.
Unit Communication Hardware
Network and hardware revision
UNIT 4 NETWORK ENVIRONMENTS.
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
Computer Networks Part 1
Networks.
Network Models, Hardware, Protocols and number systems
Computer communications
Principles of Information Technology
Presentation transcript:

Principles of Information Technology Networks and Hackers Copyright © Texas Education Agency, 2013. All rights reserved. Trade & Industrial Education

Computer System A basic computer system is made up of two parts: hardware (physical equipment that you can touch) and software (programs installed on the computer). Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Computer Networks Computer networks allow users to connect over distances. They allow file sharing, hardware sharing, and instant communication, making them a necessary tool for offices, schools, and homes all over the world. A computer network consists of several components, each of which is important to making the network function correctly as a whole. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Network Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Parts of a network Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Workstations These are known as desktop computers. The computer you use at home or school would be called a workstation in a network. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Servers Servers can look like desktop computers; however, most do not look like your “normal” computer. Servers do not really need monitors, graphics and sound cards. What they really do need is hard drives. In most schools, when you save your work, you are saving to a server. By doing this, you can access your school work from any computer that is on your school network. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Modems A modem is a device that enables computers to interpret data they receive from a network or send data in the proper form along a network. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Hubs A hub is sort of like a car radio. Every computer that has that section of network (like a radio station) can hear everything that is being transmitted. All the computers that are connected to that hub receive all the information that goes through it. Usually, if you have a hub, you also have a router. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Switches A switch is more complex than a hub and works a lot like a two-way radio. In a room full of people, only the person holding the other radio can hear what is being said. It keeps track of which computers are where, and when something comes in, it sends it only to that specific computer, not every computer on that section of the network. It is more secure than a hub, and faster than a hub, but not as powerful as a router. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Routers Routers work a lot like a telephone system. Each computer is given its own unique number by the router. When information comes into the router, it is then sent along to the correct number—or in this case, computer. There are more options built into routers than there are available to switches. A router can have the equivalent phone options of call screening and caller ID. This is beyond a switch’s capabilities. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Routers Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Peer-to-Peer Networks Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Peer-to-Peer Network: This is a type of network where the computers in the network share resources among each other. Every computer on this network is equal; all the computers run the same networking software and file systems for sharing. Printers, scanners, and other external devices are shared by the machine they are plugged into, otherwise known as managed by. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Peer-to-Peer Network Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Pros for a Peer-to-Peer Network It is less expensive to set up a peer-to-peer network initially. You may already own the software needed to get a peer-to-peer network set up. This type of network does not require the installation of dedicated server hardware or expensive security software. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Cons for a Peer-to-Peer Network If you have a peer-to-peer network, you need to be aware that shared resources, such as printers, place a special demand on the computers in the network. Also, due to the nature of this type of network, all of the computers on the network provide access to all of the machine’s resources. The down side of this is that you can unintentionally expose private files to all the other users on the network. There is also no data security or protection from hackers, viruses, etc. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Peer-to-Peer Operating Systems In the peer-to-peer network operating system, each of the workstations has an operating system that tells it how to store and share resources with the others. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Client Server Networks Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Ethernet Ethernet is a type of connection between computers that forms the basis of most LANs. It also serves as one of the main methods for connecting a computer or network to an Internet hub. The origin of Ethernet was the idea of connecting several computers together in a network via coaxial cables. Since that time, it has evolved into a much more sophisticated system that uses specialized Ethernet cables that connect to a central hub or router in order to network several computers together. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

The Modern Ethernet Network Backbone Ethernet Hub Ethernet Switch Ethernet Switch The Modern Ethernet Network Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

LAN LAN stands for Local Area Network. A Local Area Network is a group of computers that are linked together that share internet access, file access, applications, storage, and allow connected computers to share printers and scanners. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

LAN Issues For a LAN to work properly, a router must be installed on the primary computer that is connected to the Internet. Each computer connected to the LAN must have an Ethernet card installed. The other issue with a LAN is that they are usually confined in a single building. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

WAN WAN stands for Wide Area Networks. A WAN is a collection of regular local area networks that are all interconnected to form one giant network. Oftentimes, schools and even large companies will operate a WAN on premises. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

WANs Continued Advantages Disadvantages Flexible access: School networks can be created for students to access files throughout the school district. Speed: Networks speed up the file sharing and saving process. Disadvantages Expensive to install: WANs save money over time, but they are expensive to set up at first. Time: WANs require maintenance of the network, which costs both money and time. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Token Rings Token rings work by sending data from one machine to the next and so on around a ring until it ends up back where it started. It also uses a special token passing protocol, which means that a machine can only use the network when it has control of the token. This ensures that there are no collisions because only one machine can use the network at any given time. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Token Ring Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Token Ring Issues In order for token rings to work, all computers must check for lost or duplicate tokens all connected computers must “vote” a new leader to create a new token Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Client/Server Operating Systems Client/Server setup allows the network to centralize functions and applications in one or more file servers. File servers become the “heart” of this system and provide access to files and resources, as well as providing security. Workstations have access to the resources to files on the file servers. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Client/Server Operating Systems There are many different software programs available for this type of network. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Client/Server Operating Systems Advantages This type of network makes it easy to install new technology and new elements. The server can be accessed remotely. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Client/Sever Operating Systems Disadvantages Client/Servers depend on their servers. When they go down, the network will no longer work. There is a hefty investment for a client/server network. It pays off in the long run, but it requires money to set it up. Large networks will require dedicated staff to maintain a client/server network and to work out the “kinks” when problems arise. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Network Threats Trade & Industrial Education Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Hackers A computer hacker is someone who finds access into a computer’s security system to break into another machine. Hackers usually collect information on the target computer and then try to gain access into the computer system. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Security Threats The most common threats are Spam: Unwanted commercial e-mail. Viruses: Can cause your computer to slow down or even destroy your hard drive. Adware/Malware: Software that gets installed on the computer. It can cause annoying pop-ups or even steal information. Information Threats: Hackers steal important information, such as client information, bank account numbers, credit card numbers, etc. Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education

Hackers Networks can take steps to protect their networks. The most common are Installing a firewall Advising caution on the net Making sure that the network is password protected, especially if using a wireless network. . Copyright © Texas Education Agency, 2013. All rights reserved. IT: [Principles of Information Technology] – [Networks and Hackers] Trade & Industrial Education